
What if your company is the victim of a cyberattack ?
In addition to the significant economic impact it could cause, its reputation would also be jeopardized, and it could even lead to the complete paralysis of the company if all information is lost during this incident.
" 79% of SMEs suffered cyberattacks in 2020 "
Source: Reforma - Read note
" SMEs are at greater risk of cyberattacks "
Source: Forbes - Read note

ISO 27001 Gap Analysis

Periodic analysis of information assets (Windows or Linux Servers).
Scanning for malware with known signatures or known indicators.
Analysis model: White Box.
Quarterly analysis.
First analysis: Baseline.
3 quarterly reports
Vulnerability management

Periodic analysis of information assets (Windows or Linux Servers).
Scanning for malware with known signatures or known indicators.
Analysis model: White Box.
Quarterly analysis.
First analysis: Baseline.
3 quarterly reports
Event Correlation (Basic SIEM)

Sources: Servers, FW and AV.
Security Alerts (Standard):
Login Alerts - Server.
Account Change Alerts - Server.
Privilege Change Alerts - Server.
Application Installation Alerts - Server.
Crash Alerts - FW.
Infected Device Alerts - AV.
Correlation use cases. (Standard)
Log storage for 60 days.
Incident Response (Basic)

Incident Response Hours Pool.
Full Incident Response Cycle:
Triage.Analysis of incident evidence.
Diagnosis.
Accompaniment in Containment of
Incidents (malware, email, ransomware1.)
Recommendations for preventing subsequent incidents
Penetration testing

An annual penetration test.
White Box Model (Basic, for companies with 500 users or less).
Gray and Black Box Model (Advanced, for companies with 501 to 1000 users)

Phishing test

Simulated Phishing Tests.
Sending hooks (deceptive emails) to all or a defined sample of end users.
Training in best practices for phishing prevention.
Awareness

Pre-lesson assessments to certify the necessary level of knowledge and skills.
Interactive lessons. The program is divided into short lessons (2 to 10 minutes).
Reinforcement. Sending reminders to encourage participation.
Cybersecurity Bulletins

Monthly bulletin on the main threats recorded in the environment.
Threat description.
Preventive recommendations.
Even more security?
Nordstern also offers independent and optional Cybersecurity modules for companies looking to scale their technology or infrastructure to complement the services offered in the CaaS package.
Management, monitoring and support
Specialized management of security infrastructure
(Firewall, UTM, Antivirus, EDR) in a continuous (7x24) and completely remote scheme, under international operating standards.
Continuous monitoring
It allows us to know the health, operational, and availability status of the security infrastructure, increasing our response speed.
Specialized technical support
We solve problems with expert support, in spanish and english, and with a thorough understanding of each client's operational needs and priorities.
Firewall, antivirus and EDR as a Service
If your company requires a technology upgrade or a first-time implementation, Nordstern can provide any of these solutions from market-leading brands on a sales or as-a-service basis.



Why Nordstern?
We are certified by the manufacturers we work with and by international organizations specializing in safety, security management, and risk management.
Our approach stands out for its technical excellence, supported by policies and processes that guarantee quality results and customer satisfaction.







