cybersecurity and encryption


Virtual Security Offices


Comprehensive solution for regulatory compliance in Cybersecurity

OSV is a comprehensive solution that consolidates and improves the information security risk requirements of organizations and complies with the various existing regulations.

Regulations and


OSV enables organizations to comply with key cybersecurity regulations and standards.


Protection of individuals in the processing of their personal data.
More info


Security of electronic media of the Public Administration, to guarantee information.
More info

ISO 27001

International standard for information security management systems (ISMS).
More info

Cybersecurity in figures

sanctions dictated by the AEPD in 2020
in sanctioning resolutions in 2020
0 M €
in sanctions to financial entities in 2021
0 M €
in sanctions to telecommunications entities

Customer knowledge

By gathering information and holding meetings, we will understand the needs of the project and draw up an initial roadmap to guide the project in order to achieve maximum satisfaction in the results.

Service planning

The different parts and stages to be carried out during the provision of the service will be defined and planned.

Formalization of the service

Formalization of the Work Plan and calendar for the regular service, which we will update and adapt to the client's needs.

Stable execution period of the service

We will monitor the service on a continuous basis and will ensure at all times the optimal fulfillment of the service.

Service transition

Before the end of the contract, we will carry out the process of returning control of the service to the customer.



We design and execute an action plan based on continuous support, maintenance, review and improvement based on a PDCA model, so that all the necessary actions are executed to guarantee the optimal start-up of the services included in OSV.

Do you comply with the main regulations and standards?

Contact our specialist

Who trusts us

OSV: Comprehensive solution for Cybersecurity Compliance

01 -

Drafting of policies and regulations

RGPD, ENS, NIS, ISO 27001/22301

Drafting of security policies for the organization as well as all necessary regulations.

02 -

Risk analysis and management

RGPD, ENS, NIS, ISO 27001/22301

Analysis of the risks that may arise from the work activity, creating a safe environment.

03 -

Risk action plans

RGPD, ENS, NIS, ISO 27001/22301

Measures to be taken to prevent and even eliminate such risks will be developed.

04 -

Response to citizens' rights


Response service to citizens regarding any request for information related to their rights of access, opposition, deletion, rectification and portability.

05 -

Relationship with authorities


Contact with the different authorities relating to cybersecurity and data protection tasks as required by current regulations.

06 -

Compliance audits


Periodic audits of the organization’s compliance with applicable regulations shall be carried out, ensuring at all times that it is in line with any changes in the regulations that may occur.

07 -

Digital operational resilience testing


We will identify weaknesses, deficiencies or gaps in the capabilities and functions related to the ICT risk management framework.

08 -

Threat-guided penetration testing


Controlled attack exercise, better known as ethical hacking, to test the organization’s information security systems, vulnerabilities and possible security breaches.

09 -

Intelligence exchange


With the aim of creating a network in which all financial institutions can go hand in hand, thus being prepared and informed about the current cyber threats within the sector.


Third-party ICT risk


Third-party ICT risk will be assessed, monitored and documented.

Visualize your scorecard

Complete and comprehensive overview of cybersecurity services.

View your statistics, risks and evolution

You will have an overview of the risks and developments.

Send your questions to our specialists

You will be able to consult our specialists whenever you need to.

Create and track tickets

Generate and track your requests quickly and easily.

SLA compliance

Meet the agreed level of service quality.

Updated information

You will be up to date on the latest in cybersecurity.

360º vision

on the evolution of the main safety indicators



Prevention, detection and protection of cybersecurity threats according to the specific needs of your organization.


  • Risk management
  • Threat-guided penetration testing


  • Jumpstart
  • Third-party ICT risk


  • Basic
  • Digital operational resilience test


  • Risk management
  • Notification of incidents
  • Intelligence exchange

All of our


in cybersecurity

Our solutions enable us to provide our customers with the cybersecurity services they need.



Continuous monitoring to prevent, detect and protect organizations from cybersecurity threats.
More info


Cybersecurity training and awareness for enterprises
More info


Fundamental pillar for ensuring business continuity in industrial environments
More info


The solution that tests the security of your systems and the real strength of your business against a cyber attack.
More info

Increases the level of


of your company

Contact our cybersecurity specialists and they will advise you on what is best for your company.


+34 91 309 86 00

¿Quieres saber si tu empresa superaría un ataque de phising?

Simulación de Ciberataque

Política de Privacidad: información básica de protección de datos: Le informamos que los datos personales que nos proporcione a través de este formulario serán tratados por Grupo Oesía, con la finalidad de gestionar y responder su solicitud de información. El tratamiento de sus datos tiene su base jurídica en su consentimiento, marcando las casilla de aceptación de la política. No se cederán sus datos a terceros, salvo obligación legal. Puede ejercer sus derechos de acceso, rectificación, supresión, portabilidad, limitación y oposición a su tratamiento, en la dirección de correo electrónico Puede consultar información adicional sobre el tratamiento de datos en el siguiente enlace (Política de Privacidad y Cookies).

Want to know if your company would survive a phishing attack?

Cyber Attack Simulation

Privacy Policy: basic data protection information: We inform you that the personal data you provide us through this form will be treated by Grupo Oesía, with the purpose of managing and answering your request for information. The processing of your data has its legal basis in your consent, by checking the box of acceptance of the policy. Your data will not be disclosed to third parties, unless required by law. You can exercise your rights of access, rectification, deletion, portability, limitation and opposition to their treatment, at the email address You can consult additional information about data processing in the following link (Privacy and Cookies Policy).


Family of SATCOM On The Move (SOTM) terminals for vehicular installation and stable mobile connection

SGoSat is a family of high-tech SOTM (Satellite Comms On The Move) terminals that are installed in a vehicle, providing the ability to target and maintain a stable connection to the satellite when the vehicle is in motion in any type of conditions.

The SGoSat family is composed of versatile terminals, which can be installed on any type of platform: trains and buses, military and/or government vehicles, aircraft, ships, etc. Originally designed for the military sector, SGoSat terminals are extremely reliable and robust, integrating high-performance components that comply with the most stringent environmental and EMI/EMC regulations. The product uses low-profile, high-efficiency antennas and a high-performance positioning and tracking unit, allowing the terminal to be operated anywhere in the world.

In order to meet the diverse needs of its customers, INSTER has developed single band and dual band terminals in X, Ka and Ku frequencies.

The SGoSat family of terminals can also be configured with a wide range of radomes (including ballistic options) to suit customer requirements.