Cyber Security

Yaffo consulting offers an extensive set of Information Security services, including Black-box, Gray-box and White-box security reviews of applications/services/software; as well as Network penetration testing and Vulnerability Scanning of network infrastructure.

Consulting

Risk management: Comprehensive IT and operational risk management services aligned to international standards. Definition of methodologies, administration, compliance with regulations and presentation of reports.
Business Continuity Management: Services preparation of business continuity plans allowing organizations to recover and restore functionality during a contingency. Business impact analysis, global and detailed planning of the test, test program and evidence collection.

App Development

Software developments on demand: We build technological solutions through the development of systems.

Proactive Cyber Threat Prevention and Identity Solutions

PENETRATION TESTING

Empower security teams to conduct advanced penetration tests with ease. With guided automation and certified exploits, safely test your environment using the same techniques as today's adversaries.

SIEM

Identify security risks in real-time and ensure critical events get the attention they need with comprehensive, centralized security information and event management.

NETWORK TRAFFIC ANALYSIS

Immediately detect critical threats on any device within your infrastructure and gain complete visibility into network threat-related activities with pinpoint accuracy.

IDENTITY AND ACCESS MANAGEMENT

Simplify how you manage user access and secure data with identity governance and administration solutions, password management, and privileged access management.

Featured Core Security Products

Cyber Threat Prevention

Reduce the risk of compromise by uncovering cyber threats wherever they reside.




  • Core Impact

    Powerful penetration testing software for replicating real-world attacks in your own environment to uncover critical vulnerabilities.

  • Penetration Testing Services

    Our Security Consulting Services (SCS) team delivers expert penetration tests, security assessments, and red teaming exercises.

  • Cobalt Strike

    A powerful threat emulation tool that provides a post-exploitation agent and covert channels ideal for adversary simulations and Red Team exercises.

  • Event Manager

    Centralized, flexible Security and Information Event Management (SIEM) that normalizes and translates data streams for simplified monitoring and analysis of assets.

Identity and Access Management

Secure systems, applications, and platforms by easily managing access to critical data.




  • Core Access

    Centralized access requests and approvals in a single portal for simplified, streamlined access management.

  • Core Compliance

    A complete access certification and compliance management solution to review and certify access rights in a single interface.

  • Core Password and Secure Reset

    Simple, secure self-service password resets to automate password management and easily enforce robust password policies.

  • Core Privileged Access Manager (BoKS)

    Centralized privileged access management (PAM) that offers granular control of privileged accounts for Linux and UNIX.

Our customers

Contact

Thank you for your interest in our services.

Please complete the form below and we will immediately respond to your request.

Your message has been sent. Thanks so much!
An error occurred while trying to send the message.