Contain your incidents

Ransomware, Trojan horses, phishing and CEO scams are some of the main threats that constantly affect organizations around the world. Thanks to the digital forensic analysis service, we help you to contain potential incidents in your company in a timely manner, to analyze and take the necessary security measures to prevent them from happening again.

  • Expert advice for containment and response to any security incident, physical or virtual

  • Proven experience in a multitude of forensic experts, in civil and criminal cases, in national and international companies

  • Expert opinions signed by qualified engineers, in accordance with Art. 340 of the Civil Procedure Law (1/2000)

How do we work?


  • We help contain and analyze your cybersecurity incidents using forensic techniques, with the necessary guarantees of evidence preservation and chain of custody.

  • We support the definition of security plans in order to prevent investigated incidents from materializing again.

  • We have certified personnel and experts who will allow you to respond to most of the current threats and who will safeguard the interests of your organization.
contact us
  • 1

    We study the background of the incident, the environment surrounding the event, the personnel and third parties involved and their contractual and legal situation.

  • 2

    We establish the proper chain of custody, generating a documentary record to control access to all the forensic evidence.

  • 3

    We extract all data from the evidence using forensic techniques that guarantee its integrity and non-repudiation.

  • 4

    We analyze the evidence using cutting-edge forensic technologies, based on the recommendations of the UNE 71506 standard.

  • 5

    We issue an expert forensic report with complete detail on the action carried out, in accordance with the guidelines set out in the UNE 197001 standard.

Response Services

Forensic examinations

We analyze your electronic assets in order to determine the events that occurred during a cybersecurity incident, writing complete expert reports as third-party experts.

Threat Hunting

We proactively analyze your systems assuming a possible compromise by analyzing the TTPs used by cybercrime.

Incident response

We support you in the assessment and containment of security incidents you may experience. Our expert staff will help you contain the problem and take the necessary steps to restore the service.

Playbook design

We design and write playbooks for your response processes to any type of cyber incident.