Go directly to the content
  • Company
    • About us
    • Our history
    • Management team
    • They talk about us
    • Suppliers
    • Corporate Social Responsibility
    • Zerolynx Plus
  • Catalog
    • ID
      • Threat Intelligence
      • Monitoring of campaigns and events
      • Strategic intelligence
      • Digital surveillance
      • Fingerprint of VIP personalities
      • Corporate digital footprint
      • Fraud investigation and analysis
      • Identification of information leaks (surface, deep and dark web)
      • Due Diligence Assistance
      • Litigation Assistance
      • Digital asset recovery
      • Shadow IT Search
      • Malicious actor analysis
    • Protection
      • Security offices
      • Identity management
      • Vulnerability management
      • Security architecture
      • Awareness and phishing simulation campaigns
      • Hardening/Basting of systems and networks
      • Integration of security solutions
      • Secure development
      • Training
      • Asset security audit
      • Management and direction of asset security
      • Internal threats
      • Operations Security (OPSEC)
      • TSCM Electronic Countermeasures
    • Detection
      • Red Team
      • Internal and external pentesting
      • Social engineering
      • Hacking over wireless networks (WiFi)
      • Vulnerability scan
      • Web security audit
      • Mobile App Security Audit
      • IIoT Security Audit
      • Cloud infrastructure security audit
      • Source code audit
      • Active Directory Audit
      • Reverse engineering and hardware hacking
      • Hacking banking systems
      • Ransomware simulation
      • Denial of Service (DoS) Testing
    • Answer
      • Forensic examinations
      • Threat Hunting
      • Incident response
      • Playbook design
    • Recovery
      • Restoration of services and systems
      • Business continuity and recovery
    • Government
      • CISO as a Service
      • Policy and regulatory compliance
      • Global security strategy
      • Third Party Security Management
  • Services
    • Purchase a service
    • NIST-based services
    • Services by Sectors
    • Services by Area
  • Employment
  • Divulgation
    • News and Awareness Blog
    • Technical Blog (Flu-Project)
    • Libros y publicaciones
    • Cybersecurity Tips
  • Contact
Log in

Language

  • Español
  • English
  • Euskara
  • Català
  • Deutsch
  • X (Twitter)
  • YouTube
Zerolynx
  • Company
    • About us
    • Our history
    • Management team
    • They talk about us
    • Suppliers
    • Corporate Social Responsibility
    • Zerolynx Plus
  • Catalog
    • ID
      • Threat Intelligence
      • Monitoring of campaigns and events
      • Strategic intelligence
      • Digital surveillance
      • Fingerprint of VIP personalities
      • Corporate digital footprint
      • Fraud investigation and analysis
      • Identification of information leaks (surface, deep and dark web)
      • Due Diligence Assistance
      • Litigation Assistance
      • Digital asset recovery
      • Shadow IT Search
      • Malicious actor analysis
    • Protection
      • Security offices
      • Identity management
      • Vulnerability management
      • Security architecture
      • Awareness and phishing simulation campaigns
      • Hardening/Basting of systems and networks
      • Integration of security solutions
      • Secure development
      • Training
      • Asset security audit
      • Management and direction of asset security
      • Internal threats
      • Operations Security (OPSEC)
      • TSCM Electronic Countermeasures
    • Detection
      • Red Team
      • Internal and external pentesting
      • Social engineering
      • Hacking over wireless networks (WiFi)
      • Vulnerability scan
      • Web security audit
      • Mobile App Security Audit
      • IIoT Security Audit
      • Cloud infrastructure security audit
      • Source code audit
      • Active Directory Audit
      • Reverse engineering and hardware hacking
      • Hacking banking systems
      • Ransomware simulation
      • Denial of Service (DoS) Testing
    • Answer
      • Forensic examinations
      • Threat Hunting
      • Incident response
      • Playbook design
    • Recovery
      • Restoration of services and systems
      • Business continuity and recovery
    • Government
      • CISO as a Service
      • Policy and regulatory compliance
      • Global security strategy
      • Third Party Security Management
  • Services
    • Purchase a service
    • NIST-based services
    • Services by Sectors
    • Services by Area
  • Employment
  • Divulgation
    • News and Awareness Blog
    • Technical Blog (Flu-Project)
    • Libros y publicaciones
    • Cybersecurity Tips
  • Contact

Language

  • Español
  • English
  • Euskara
  • Català
  • Deutsch
Log in Trolley

Item has been added to your cart

See small car

Thanks for trusting us!

We will contact you shortly.

In the meantime, you may be interested in purchasing some of our services:

  • Digital Research

    Digital Research

    Offer

    Digital Research

    regular price €1.980,00 EUR
    regular price €2.480,00 EUR Offer price €1.980,00 EUR
    Unit price /  by 
    Offer
  • Pentesting: Internal Audit Service for Networks and Systems (Ethical Hacking)

    Pentesting: Internal Audit Service for Networks and Systems (Ethical Hacking)

    Pentesting: Internal Audit Service for Networks and Systems (Ethical Hacking)

    regular price From €3.874,00 EUR
    regular price Offer price From €3.874,00 EUR
    Unit price /  by 
  • Implementation of the ISO 27001 Standard

    Implementation of the ISO 27001 Standard

    Implementation of the ISO 27001 Standard

    regular price €5.265,00 EUR
    regular price Offer price €5.265,00 EUR
    Unit price /  by 
  • Implementation of the National Security Scheme (ENS)

    Implementation of the National Security Scheme (ENS)

    Implementation of the National Security Scheme (ENS)

    regular price €6.494,00 EUR
    regular price Offer price €6.494,00 EUR
    Unit price /  by 
  • Identification of internal email fraud

    Identification of internal email fraud

    Identification of internal email fraud

    regular price From €590,00 EUR
    regular price Offer price From €590,00 EUR
    Unit price /  by 
1 / of 5
See everything

Or read some of our latest articles:

See everything
  • Normativas y estándares para el ámbito forense digital (III de III)

    Normativas y estándares para el ámbito forense ...

    June 30, 2025

    Hoy se dará finalización a esta cadena de artículos analizando las últimas normas UNE relacionadas y tratando las diferentes leyes de aplicación. UNE 71506: Guía para la actuación del perito...

    Normativas y estándares para el ámbito forense ...

    June 30, 2025

    Hoy se dará finalización a esta cadena de artículos analizando las últimas normas UNE relacionadas y tratando las diferentes leyes de aplicación. UNE 71506: Guía para la actuación del perito...

  • Normativas y estándares para el ámbito forense digital (II de III)

    Normativas y estándares para el ámbito forense ...

    June 23, 2025

    Hoy se dará continuidad a la cadena Normativas y estándares para el ámbito forense digital, que dio comienzo el pasado lunes con su primera edición, la cual puede ser consultada desde...

    Normativas y estándares para el ámbito forense ...

    June 23, 2025

    Hoy se dará continuidad a la cadena Normativas y estándares para el ámbito forense digital, que dio comienzo el pasado lunes con su primera edición, la cual puede ser consultada desde...

  • Normativas y estándares para el ámbito forense digital (I de III)

    Normativas y estándares para el ámbito forense ...

    June 16, 2025

    En el ejercicio del análisis forense digital, el cumplimiento normativo y la alineación con estándares internacionales representan un pilar crítico para garantizar la integridad, validez y admisibi...

    Normativas y estándares para el ámbito forense ...

    June 16, 2025

    En el ejercicio del análisis forense digital, el cumplimiento normativo y la alineación con estándares internacionales representan un pilar crítico para garantizar la integridad, validez y admisibi...

  • Entendiendo el PEB

    Entendiendo el PEB

    June 9, 2025

    Este será el primero de una serie de artículos donde se tratará de comprender la teoría básica necesaria para adentrarse en el mundo del malware en entornos Windows.  Es difícil...

    Entendiendo el PEB

    June 9, 2025

    Este será el primero de una serie de artículos donde se tratará de comprender la teoría básica necesaria para adentrarse en el mundo del malware en entornos Windows.  Es difícil...

1 / of 4
See everything
ISO27001   ENS_Alto    NIS-2    Cybersecurity Made In Europe    Pyme Innovadora

Your security starts today

  • Services
  • Employment
  • News
  • Contact

Madrid Headquarters

  • Pol. Ventorro del Cano.
  • Av. Arroyomolinos, 15. 28925
  • Alcorcón (Madrid)
  • (+34) 91 164 93 01

Araba/Álava Headquarters

  • Álava Technology Park
  • C/Hermanos Lumiere, 11. 01510
  • Miñano (Álava)
  • (+34) 94 501 23 25

Gipuzkoa/Guipúzcoa Headquarters

  • Business Park Zuatzu. Of.218.
  • C/Juan Fermín Gilisagastia, 2. 20018
  • Donostia-San Sebastian (Gipuzkoa)
  • (+34) 94 325 56 57

Subscribe to our news

  • YouTube
  • X (Twitter)

Language

  • Español
  • English
  • Euskara
  • Català
  • Deutsch
© 2025, Zerolynx Canal de denuncia
  • Privacy Policy
  • Terms of service
  • Legal warning
  • Selecting an option refreshes the entire page.
  • It opens in a new window.
Accessibility
Adjust text colors
Checked mark
Adjust heading colors
Checked mark
Adjust background colors
Checked mark