cybersecurity and encryption

NORNAS

ENSURES BUSINESS SURVIVAL THROUGH BUSINESS CONTINUITY MANAGEMENT

Comprehensive solution to ensure fast and effective response to business interruptions

NORNAS is the end-to-end solution that ensures that the company continues to deliver its products or services, at an acceptable and predefined level, after a disruptive incident.

Our approach to

fast and effective reaction

Detailed approach tailored to the operational strategy of each organization.

Pre-established plans and strategies

Minimize downtime of processes, services and systems

Controlling financial, legal, operational and image impacts

Plan and anticipate resources, establish priorities and realistic objectives.

Building organizational resilience

Preparing personnel and ensuring the maintenance of plans

Cybersecurity in figures

0 K
CYBER ATTACKS NEWSPAPERS IN SPAIN
K€
SME LOSSES BETWEEN 2 AND 50 THOUSAND EUROS
0 M€
LOSSES OF THE LARGE COMPANIES
0 %
ANNUAL INCREASE OF CYBERATTACKS

Context and Environment Knowledge

Analysis of the organization's situation and environment for the development of solutions adapted to the operational strategy of each organization.

Evaluation of critical processes and activities

Identify, evaluate and manage the most risky activities of each organization.

Understanding hazards and disaster scenarios

Determination of the different threats and vulnerabilities presented by the organization.

Determination of resources

Identification of each organization's assets: people, systems, suppliers, etc.

Development and selection of strategies and solutions

Quantitative and qualitative analysis of possible business continuity strategies and solutions.

Testing, maintenance and continuous improvement

Following the PDCA (Plan, Do, Check, Act) cycle and the ISO: 22301: 2019 standard.

ISO: 22301:2019 methodology

of Nornas

Our methodology is based on an internationally recognized standard that determines the requirements for implementing, operating, reviewing, maintaining and improving a Business Continuity Management System (BCMS).

Want to know if your company would survive a cyber attack?

Performs a simulation

Who trusts us

What do we do?

Thanks to our adaptability, we offer you the best solutions and resources to respond quickly and effectively to any risk, threat or disruptive event.

01 -

GAP analysis of status of situation

Study of the starting situation and degree of maturity of the organization in terms of business continuity.

02 -

Business Impact Analysis (BIA)

Identification of critical activities, their dependencies and resources required to operate at a minimum acceptable level.

03 -

Scenarios and Strategies

Identification of disaster scenarios and selection of the best continuity strategies for the organization’s critical activities.

04 -

Business Continuity Plan (BCP)

Documented procedure that guides the Organization in the detection, escalation and declaration of crises, as well as in the response and resumption of operations.

05 -

Continuity Policy

Documentation that reflects the purposes and commitments of the Organization.

06 -

Risk analysis and management

Identification, analysis and assessment of the main vulnerabilities and threats that could affect the Organization’s continuity.

07 -

Testing and training program

Testing and measuring the effectiveness of the plans.

08 -

Maintenance and improvement plan

Definition of maintenance, review and continuous improvement procedures to establish monitoring activities that allow the BCMS to be updated.

09 -

Certification Consulting

Consulting to initiate, prepare and process the process of obtaining ISO:22301 Certification.

Our

packs

Disaster and business interruption management and response systems to meet your organization’s needs.

BASIC

  • GAP analysis of status of situation
  • Business Impact Analysis (BIA)
  • Scenarios and Strategies
  • Business Continuity Plan (BCP)

PREMIUM

  • Basic Package
  • Continuity Policy
  • Risk analysis and management
  • Maintenance and improvement plan
  • Certification Consulting

CUSTOM

  • Contact us without obligation to study and design additional solutions customized to your needs.

All of our

solutions

in cybersecurity

Our solutions enable us to provide our customers with the cybersecurity services they need.

Heimdall

Heimdall

Continuous monitoring to prevent, detect and protect organizations from cybersecurity threats.
More info
Minerva

Minerva

Cybersecurity training and awareness for enterprises
More info

Industrial

Fundamental pillar for ensuring business continuity in industrial environments
More info
Ragnarok

Ragnarok

The solution that tests the security of your systems and the real strength of your business against a cyber attack.
More info

Increases the level of

security

of your company

Contact our cybersecurity specialists and they will advise you on what is best for your company.

Phone

+34 91 309 86 00

¿Quieres saber si tu empresa superaría un ataque de phising?

Simulación de Ciberataque

Política de Privacidad: información básica de protección de datos: Le informamos que los datos personales que nos proporcione a través de este formulario serán tratados por Grupo Oesía, con la finalidad de gestionar y responder su solicitud de información. El tratamiento de sus datos tiene su base jurídica en su consentimiento, marcando las casilla de aceptación de la política. No se cederán sus datos a terceros, salvo obligación legal. Puede ejercer sus derechos de acceso, rectificación, supresión, portabilidad, limitación y oposición a su tratamiento, en la dirección de correo electrónico dpo@oesia.com. Puede consultar información adicional sobre el tratamiento de datos en el siguiente enlace (Política de Privacidad y Cookies).

Want to know if your company would survive a phishing attack?

Cyber Attack Simulation

Privacy Policy: basic data protection information: We inform you that the personal data you provide us through this form will be treated by Grupo Oesía, with the purpose of managing and answering your request for information. The processing of your data has its legal basis in your consent, by checking the box of acceptance of the policy. Your data will not be disclosed to third parties, unless required by law. You can exercise your rights of access, rectification, deletion, portability, limitation and opposition to their treatment, at the email address dpo@oesia.com. You can consult additional information about data processing in the following link (Privacy and Cookies Policy).

SGoSat

Family of SATCOM On The Move (SOTM) terminals for vehicular installation and stable mobile connection

SGoSat is a family of high-tech SOTM (Satellite Comms On The Move) terminals that are installed in a vehicle, providing the ability to target and maintain a stable connection to the satellite when the vehicle is in motion in any type of conditions.

The SGoSat family is composed of versatile terminals, which can be installed on any type of platform: trains and buses, military and/or government vehicles, aircraft, ships, etc. Originally designed for the military sector, SGoSat terminals are extremely reliable and robust, integrating high-performance components that comply with the most stringent environmental and EMI/EMC regulations. The product uses low-profile, high-efficiency antennas and a high-performance positioning and tracking unit, allowing the terminal to be operated anywhere in the world.

In order to meet the diverse needs of its customers, INSTER has developed single band and dual band terminals in X, Ka and Ku frequencies.

The SGoSat family of terminals can also be configured with a wide range of radomes (including ballistic options) to suit customer requirements.