Goals that define B&SiT

Our professionals forged their experience working for top-level consulting firms and companies, locally and internationally. Their knowledge is supported by different international certifications, such as CISSP (ICS2), Audit and Implementation ISO 27001, CISM/CISA and certifications in various leading technologies.

Leading company in Information Security solutions and IT management services. It is recognized in the market for the experience of the professionals that comprise it, and for achieving the product expected by the client, providing innovative ideas and solutions.

Protect digital assets that are critical to organizations. Generate value in the IT area. Safeguard information from damage or loss, unauthorized use, modification or disclosure by implementing logical and physical access controls that ensure that information assets are protected.

850

Cybersecurity projects carried out

30

Active monitoring of technological infrastructures

550

IT governance/information security projects

Security risks

Information security

It is an important specialization for both public and private sector businesses, and to protect critical infrastructure. In these sectors, information security will function as an enabler to avoid or reduce relevant risks.

At present

Currently, there is a broad consensus that risks related to information security and data privacy have a high impact on the business, potentially generating financial losses, as well as damage to the reputation and operational capacity of the company. companies and organizations.

The shareholders

Shareholders, customers and business partners expect that these risks are adequately covered, encompassing not only the security of information systems but also compliance with laws and regulations and as well as corporate governance.

Our services

Cloud Strategies

Development of a cloud adoption strategy, whether public, private or hybrid, to achieve cost reduction and agility using the right balance between technology and services.cloud adoption strategy.

  • Migration of on-premise services.
  • Implementation of DLP tools.
  • Sizing and management.
  • Migrations to Office365.
  • Design and assembly of tenants in Azure and AWs.
  • Change management.
  • CASB Solutions.
Risk analysis

B&SiT has developed services that allow you to Plan, Develop and Measure Information Security Management Systems correctly. To do this, we manage the risks and security of information, to manage the level of acceptable corporate risk.

Our role is to advise, help, prepare and improve Risk and Security Management in your company.

  • Security Management System
  • Development of the Master Plan and Strategic Information Security Plan.
  • Control Board / Dashboard for Information Security.
  • Risk Management.
Continuity Plan

The concept of Continuity Plans has, in a short time, become a key component of the Management Strategy aimed at having functionalities that guarantee being able to continue operating in the face of crises or events, even of extreme magnitude, that compromise the services provided by the IT infrastructure. and the information it maintains.

That is why the related Services cover the comprehensive or partial implementation of the Business Continuity Management and Disaster Recovery System in an effective and efficient manner, which responds to possible incidents that could jeopardize the continuity of critical business activities. the organization. The services cover the entire life cycle of a Business Continuity process, that is, the diagnosis, evaluation, development, implementation and implementation of each of the stages of Risk, Business Impact Analysis, Plan Development, Testing, Awareness, Training and Maintenance.

  • Business continuity program administration.
  • Development of business continuity plans (“BCP”) and technological disaster recovery (“DRP”) 
  • Training and Testing of the Continuity Program, to ensure the maintenance of business continuity capabilities, and sustaining compliance with the requirements of shareholders and regulators over time
Security Management

Consulting Services related to security analysis, impact assessment and protection of information systems to detect vulnerabilities and develop the most appropriate solutions that are aligned with good Information Security practices, allowing the best ways to be found and used. to work to achieve business objectives.

It is about implementing and maintaining “best practices” based on our know-how through advice on the design, installation and configuration of a wide range of Computer Security components that allow us to have a complete and objective vision of the security levels. information security to protect the company's IT assets by reducing risks to acceptable levels.

  • IT security outsourcing service.
  • Data and privacy control.
  • Change management control.
  • Data analysis with CAAT's tools.
  • Employee awareness and training.
  • Information Classification.
  • Risk management.
  • Training of Incident Response Teams.
  • Computer Security Government and Information Security.
  • Application security and control.
  • Identity management (authentication, authorization and auditing).
IT Staff

We have a team of specialists in searching for IT personnel: We provide advice on Human Resources. We take the time necessary to get to know the companies that call us. We prepare a proposal adjusted for each need. In them, we contemplate objectives, modality and stipulate work time.

We base our services on the following axes:

  • Search and selection of personnel.
    • Recruitment and selection by Competencies.
    •  Head hunting
    • Psychotechnical and Potential Evaluation
  • Organizational Consulting. Organizational diagnosis, coping with crisis situations, overcoming and managing change.
  • Training and training to achieve teamwork, with creative and flexible professionals. Talent search to enhance the strengths of each member of the organization.
Consulting services

Consulting and advisory services allow the development of diagnosis, gap analysis, implementation, audit for compliance with national and international regulations.

International Standards among which stand out:

  • Computer Security Assessments
  • Advice on international standards (ISO 17799 – BS7799 – ISO/IEC 27001).
  • Consulting and advice on BCRA regulations (“A“ 4609/5374)
  • Consulting and advice on BCRA regulations (“A“ 4609/5374) Consulting and advice on Payment Card Industry Data Security Standard (PCI-DSS)
  • Advice on Personal Data Protection (Law 25,326)
  • HIPPA (Health Insurance Portability and Accountability Act)
  • COBIT (Control Objectives for Information and related Technology)

It is about implementing and maintaining “best practices” based on our know-how through advice on the design, installation and configuration of a wide range of Computer Security components that allow us to have a complete and objective vision of the security levels. information security to protect the company's IT assets by reducing risks to acceptable levels.

  • IT security outsourcing service
  • Data and privacy control
  • Change management control
  • Data analysis with CAAT's tools
  • Employee awareness and training
  • Information Classification
  • Risk management
  • Training of Incident Response Teams
  • Computer Security Government and Information Security
  • Application security and control
  • Identity management (authentication, authorization and auditing)
Security Assessment

We evaluate and manage technological environments to identify the
actual security status of the application, the platform that supports it
supports networking and security controls.

Our services cover the evaluation, diagnosis and resolution of:

  • Perimeter architecture.
  • Internal and external penetration tests.
  • Technological platforms.
  • Forensic analysis.
  • Web applications.
  • Vulnerabilities of the source code and technologies used for smartphones and tablets.
  • Evaluation of information security areas.
Advice on computer fraud analysis
  • Assistance in the selection of Systems for Fraud Detection and Prevention of Money Laundering and Terrorist Financing.
  • Advice on self-assessment of risks for compliance with the different existing regulations.
  • Review and audit in non-face-to-face customer identification processes.
  • Automation of list processes and filtering of negative news. 
  • Standardization of regulatory reports.
  • Preparation of Standards and Procedures according to current regulations.

Brands we trust

We provide a combination of excellence between specialized technical knowledge, cutting-edge technologies in computer security in which we place confidence, and efficient processes that adapt and integrate to the particular needs of each company.

Specialized Training

Our trainers have a University Professor degree or certificates in the subject and have significant experience.

Authorized Partner

B&SIT Partners

LICENCIADO PABLO A. BUCCAFUSCA

Graduate in Systems Analysis. It has the international certifications CISA (CertifiedInformationSystemsAuditor) and CISM (CertifiedInformationSecurity Manager) granted by ISACA. For fifteen years he worked at PricewaterhouseCoopers in the areas of Information Systems Consulting, specializing in the area of service companies.

INGENIERO DIEGO ROSENHAIN

Information systems engineer graduated from the National Technological University. He has the international certifications Lead Auditor ISO / IEC 27001, CISSP (Certified Information Systems Security Professional), SAP Security, SonicWall Certified Trainer. He developed his professional career at PricewaterhouseCoopers in the areas of Information Systems Consulting and Auditing.

Companies that trust B&SiT

Get in contact us

Complete the form and one of our consultants will contact you.

B&SIT SRL / Triunvirato Av. 3779 (C1431) Capital Federal – BS.AS. / Phone: (+5411) 2153-1009 / Email: info@bsit.com.ar

Descargar Brochure Corporativo
Para ofrecer las mejores experiencias, utilizamos tecnologías como las cookies para almacenar y/o acceder a la información del dispositivo. El consentimiento de estas tecnologías nos permitirá procesar datos como el comportamiento de navegación o las identificaciones únicas en este sitio. No consentir o retirar el consentimiento, puede afectar negativamente a ciertas características y funciones. Politica de Cookies - Politica de Privacidad - Politica de divulgacion responsable   
Privacidad