Entelgy Security
America

We protect your digital environment with customized cybersecurity solutions and specialized consulting.

With a strategy focused exclusively on this region, Entelgy Security America provides tailored security solutions ranging from managed services to specialized consulting and cybersecurity awareness training.

An approach focused on protection and creating a resilient and trustworthy digital environment.

Entelgy Security America has more than 13 years of experience in the region in cybersecurity services for the financial, industrial, logistics, government and health sectors.

EXPERIENCE

PRESTIGE

KNOWLEDGE

Our professionals have the most prestigious certifications in the sector: CISM, CISSP, CCISO, CRTS, CRISC, CRTP, OSCP, CEH, OFFENSIVE, COMPTIA, ISO27001, Lider Auditor, ITIL, Cobit, eWPT, eCPPT, eJPT…

+ 13 years of experience

Entelgy Security America

The transformation of our society and an increasingly connected future present us with previously unknown challenges. In this new scenario, the security of our clients is one of the fundamental pillars of business transformation.

Entelgy Security America provides the solutions and intelligence needed to prevent and protect businesses from cyberattacks and security breaches. By trusting us, organizations can face the future with solid security and the peace of mind of knowing they are protected against tomorrow’s threats.

Contact our cybersecurity experts

Enrique Santiago

Director of Banking & Insurance

Address:
Transversal 23 #97-73 Office 411. Bogotá
Phone
+57 3 173 656 708
E-mail
info.colombia@entelgy.com

Cyber exercises

We develop methodologies to evaluate the visibility and response capacity of the organization in web applications, mobile, internal infrastructure, WIFI, etc.

RedTeam

We put ourselves “in the enemy’s shoes” to put organizations to the test. We carry out real tests covering different attack vectors, as a cyber attacker would do, in order to evaluate the risk and impact that they could have and thus measure the effectiveness of the organization’s internal controls, such as: response of a SOC, effectiveness of technological controls, etc.

Cloud Security Platform​

Cloud security with CNAPP, CSPM, IAM, CWPP and cloud observability.

Vulnerability analysis

We identify vulnerabilities in the infrastructure.

Social engineering

We apply different techniques to evaluate the level of culture and capacity of the organization's talent, to evade and avoid attacks that take advantage of human vulnerabilities, Phishing, Vishing, QR techniques, among others.

Ethical Hacking

We assess the security of applications (web, mobile, etc.) and infrastructure. Using different techniques, we identify weaknesses before attackers detect them. Our services test defenses so that organizations can proactively anticipate attacks such as credential theft, customer impersonation, and fraud.

Offensive Security

We evaluate the level of security from different approaches. To do this, our professionals have the ability to perform exercises on web applications, mobile, internal infrastructure, WIFI, etc.

Resilience, Governance, Risk and Compliance: GOLDEN TEAM

Our team of security consultants assists our clients to ensure that they comply with all security standards with the highest guarantees:

  • Cybersecurity Assessment and Strategic Plans : We identify the organization’s maturity status and its ability to deal with cyberattacks. Based on international best practices and standards (ISO 27001, ISO 27032, NIST, among others), we generate a RoadMap that allows the objectives to be achieved, always with a practical approach to continuously assess threats in the environment.
  • Resilience and Business Continuity : We identify critical risks and weaknesses in operations to be prepared for events that may jeopardize the continuity of business development.
  • Supply chain audits : We help identify improvements that need to be applied in the supply chain, from the contractual to the technical and cooperation areas, so that the organization is prepared when a cyber attack can transcend the “borders of its suppliers.”
  • Crisis management : Through exercises led by our experts, we help prepare the organization to manage a crisis resulting from a cyber attack, from decision-making by senior executives, management of media and public announcements, and containment and coordination of operational capabilities.
  • Cybersecurity Cells : to address the cybersecurity of projects from the design phases to market launch. We provide the organization with cells of expert talent in different disciplines, which allow projects and initiatives to be addressed with an elastic capacity, thus ensuring the reduction of the attack surface.
  • Development of policies, regulations, procedures : From a regulatory and legal perspective, we assist our clients in the new personal data law.

Resilience, Governance, Risk and Compliance: GOLDEN TEAM

Our team of security consultants assists our clients to ensure that they comply with all security standards with the highest guarantees:

Golden Team Entelgy

Cybersecurity Assessment and Strategic Plans

We identify the organization's maturity status and its ability to deal with cyberattacks. Based on international best practices and standards (ISO 27001, ISO 27032, NIST, among others), we generate a RoadMap that allows the organization to achieve its objectives, always with a practical approach to continuously assess threats in the environment.

Resilience and Business Continuity

We identify critical risks and weaknesses in operations to be prepared for events that may jeopardize the continuity of business development.

Supply chain audits

We help identify the improvements that need to be applied in the supply chain, from the contractual to the technical and cooperation areas, so that the organization is prepared when a cyber attack can transcend the “borders of its suppliers.”

Crisis management

To address the cybersecurity of projects from the design phases to market launch. We provide the organization with cells of expert talent in different disciplines, which allow projects and initiatives to be addressed with an elastic capacity, thus ensuring the reduction of the attack surface.

Development of policies, regulations, procedures

From a regulatory and legal perspective, we support our clients in the new personal data law.

Defensive Security: BLUE TEAM

With our defensive security services we prevent and mitigate real intrusions.

ESA-02

Cyber Intelligence Services

Using different tools, we constantly monitor everything that is exposed in the digital world. We delve into the deep web in search of information leaks, providing a service that alerts and adds value to the business.

Cloud Security

To secure cloud infrastructure. From architectural design to the inclusion of technologies that guarantee access control, visibility, monitoring and response capacity to potential abuses.

Managed Security

Together with our allied vendors, we have personnel certified in security solutions, expanding your organization's capacity to monitor and defend your organization.

Digital Forensic Services

To identify concerns at the time of a cyber incident or fraud such as “what happened, how it happened and who did it.”

SecDevOps: Secure Development

We have a team of security professionals who support development areas in the acquisition of good practices, which allow in the short and medium term to have applications with minimal security breaches. In addition, we provide the technologies, methodologies and resources that allow you to proactively integrate into your software development chain, to identify and resolve vulnerabilities in your applications early.

Threat Hunting

We have developed methodologies based on offensive and forensic security knowledge that allow us to identify the tactics, techniques and procedures used by criminals (external or internal) along with the ability to analyze the artifacts that may be hosted in your organization and that can be exploited by cybercriminals.

Alliances

Scroll to Top
¿Quieres ser el primero en conocer todas nuestras noticias?
¡Suscribete y ponte al día!
I agree with the Terms and conditions and the Privacy policy

“Los datos personales que nos facilite serán tratados por Entelgy con la finalidad de gestionar tu suscripción a nuestra Newsletter. Puedes ejercer tus derechos en materia de protección de datos dataprotection@entelgy.com. datos mediante comunicación dirigida a nuestro Delegado de Protección de Datos en dataprotection@entelgy.com.”