- CISO as a Service
- Training: Secure Software Development, Incident Response & Ethical Hacking
- Security Awareness Campaigns
- Security Policies and Procedures
- Security Management with Business Process Approach
- Security Requirements Engineering
- Privacy Protection
- Secure Coding Standards
- BCRA
- CNV
- Implementation of Protection Infrastructure
- 2FA solutions
- PKI & Digital Signature
- Platform Hardening
- Penetration test
- API security testing
- Security Analysis of Applications and Services
- Forensic Analysis
- Malware Analysis