Secure Soft

Secure Soft

Secure Soft are experts in Computer and Information Security with a presence in Peru, Colombia and Ecuador. We currently provide Consultancy and Solutions to the most important companies in the countries where we are located. We have certified Engineers in all leading brands worldwide and Auditors ISO 27001: 2013, placing us in a position of leadership, experience and ability to respond to your most complex requirements.

We also have two Security Operations Center (SOC) located in Lima-Peru and Quito-Ecuador, both SOCs are running Active-Active, 24x7 and backed by a TIER III Data Center where we host the critical infrastructure of the SOCs. By having specialized Engineers, state-of-the-art Infrastructure and Multi-Site redundancy, we guarantee high availability of the Services we provide.

We are members of the International Cyber Security Protection Alliance (ICSPA) and Forum of Incident Response and Security Teams. (FIRST)

 

Contact Information

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Need to Evolve to a Risk-Based Vulnerability Management Strategy but Don’t Know How? This Guide Will Show You.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Protective Intelligence

Protective Intelligence

Protective Intelligence brings together a group of information security specialists with a passion for delivering high-quality solutions.

McDermott Will & Emery

McDermott Will & Emery

McDermott Law is an international law firm with offices in North America, Europe and Asia. Practice areas include Privacy and Cybersecurity.

Information Assurance Advisory Council (IAAC)

Information Assurance Advisory Council (IAAC)

The Information Assurance Advisory Council (IAAC) mission is to advance Information Assurance (IA) to ensure that the UK

Guardian360

Guardian360

The Guardian360 platform offers unrivalled insight into the security of your applications and IT infrastructure.

DG Technology

DG Technology

DG Technology focuses on delivering a comprehensive security strategy, solutions and protection across all platforms from desktop to mainframe.

Certis

Certis

Certis is a leading advanced integrated security organisation that develops and delivers multi-disciplinary security and integrated services.

Detelix Argoscope

Detelix Argoscope

Detelix has developed a unique fraud prevention solution that is based on years of experience in detecting and investigating fraud and embezzlement cases.

Militus

Militus

Militus provides the only information security service available that learns and analyzes your network over time using a custom-built network-based toolset.