






























































Development of a cloud adoption strategy, whether public, private or hybrid, to achieve cost reduction and agility using the right balance between technology and services.cloud adoption strategy.
B&SiT has developed services that allow you to Plan, Develop and Measure Information Security Management Systems correctly. To do this, we manage the risks and security of information, to manage the level of acceptable corporate risk.
Our role is to advise, help, prepare and improve Risk and Security Management in your company.
The concept of Continuity Plans has, in a short time, become a key component of the Management Strategy aimed at having functionalities that guarantee being able to continue operating in the face of crises or events, even of extreme magnitude, that compromise the services provided by the IT infrastructure. and the information it maintains.
That is why the related Services cover the comprehensive or partial implementation of the Business Continuity Management and Disaster Recovery System in an effective and efficient manner, which responds to possible incidents that could jeopardize the continuity of critical business activities. the organization. The services cover the entire life cycle of a Business Continuity process, that is, the diagnosis, evaluation, development, implementation and implementation of each of the stages of Risk, Business Impact Analysis, Plan Development, Testing, Awareness, Training and Maintenance.
Consulting Services related to security analysis, impact assessment and protection of information systems to detect vulnerabilities and develop the most appropriate solutions that are aligned with good Information Security practices, allowing the best ways to be found and used. to work to achieve business objectives.
It is about implementing and maintaining “best practices” based on our know-how through advice on the design, installation and configuration of a wide range of Computer Security components that allow us to have a complete and objective vision of the security levels. information security to protect the company's IT assets by reducing risks to acceptable levels.
We have a team of specialists in searching for IT personnel: We provide advice on Human Resources. We take the time necessary to get to know the companies that call us. We prepare a proposal adjusted for each need. In them, we contemplate objectives, modality and stipulate work time.
We base our services on the following axes:
Consulting and advisory services allow the development of diagnosis, gap analysis, implementation, audit for compliance with national and international regulations.
International Standards among which stand out:
It is about implementing and maintaining “best practices” based on our know-how through advice on the design, installation and configuration of a wide range of Computer Security components that allow us to have a complete and objective vision of the security levels. information security to protect the company's IT assets by reducing risks to acceptable levels.
We evaluate and manage technological environments to identify the
actual security status of the application, the platform that supports it
supports networking and security controls.
Our services cover the evaluation, diagnosis and resolution of:
We provide a combination of excellence between specialized technical knowledge, cutting-edge technologies in computer security in which we place confidence, and efficient processes that adapt and integrate to the particular needs of each company.
Our trainers have a University Professor degree or certificates in the subject and have significant experience.
The Sonicwall Firewall course allows to know and implement security and protection measures required by the current company. This course is also used as a preparatory to obtaining the SNSA Certification – SonicWall Network Security Administrator
In the next course of Firewall Sonicwall, we will analyze the technological advancement that has resulted today companies or businesses face multiple intruders or malicious users trying to breach their information and communication systems.
Because information is one of an organization’s most important assets, to take care of it, it is necessary to manage its risks with appropriate processes and technologies, which has led administrators to demand tools needed to deliver an informed security strategy that protects all of their assets from constant attacks and vulnerabilities, thus taking care of the three key elements of security : availability, integrity and privacy.
Because of this need Sonicwall has become a global leader in high-performance data protection and network security solutions.
Duration: 16 hours
Purpose
Learn how to configure Sonicwall firewall to protect and audit Internet access.
Objectives
Support Sonicwall firewall devices and define security policies to protect and audit Internet access.
Content
It´s oriented to
Requirements
Graduate in Systems Analysis. It has the international certifications CISA (CertifiedInformationSystemsAuditor) and CISM (CertifiedInformationSecurity Manager) granted by ISACA. For fifteen years he worked at PricewaterhouseCoopers in the areas of Information Systems Consulting, specializing in the area of service companies.
Information systems engineer graduated from the National Technological University. He has the international certifications Lead Auditor ISO / IEC 27001, CISSP (Certified Information Systems Security Professional), SAP Security, SonicWall Certified Trainer. He developed his professional career at PricewaterhouseCoopers in the areas of Information Systems Consulting and Auditing.
B&SIT SRL / Triunvirato Av. 3779 (C1431) Capital Federal – BS.AS. / Phone: (+5411) 2153-1009 / Email: info@bsit.com.ar