Cybersecurity as competitive advantage in a world of uncertainty

We are a team of talented and passionate security professionals.

Certifications

About Us

At Thor, we're dedicated to providing our clients with reliable and effective cybersecurity solutions that protect against the growing risk of cyber threats. With over 15 years of experience across various sectors, such as finance, retail, e-commerce, healthcare, and more, we have the knowledge to understand your business risks and help you reduce your level of exposure.

Our approach to cybersecurity is based on a thorough assessment of your business risks, enabling us to identify potential vulnerabilities and develop customized solutions that align with your specific needs. By taking a risk-based approach, we're able to provide a more comprehensive and effective cybersecurity strategy that meets the unique challenges of your organization.

At Thor, we recognize that cybersecurity is essential for achieving strategic goals. It's a powerful business enabler that can help build trust, differentiate your organization from competitors, improve productivity, and foster a culture of innovation.

It's a powerful business enabler that can help build trust, differentiate your organization from competitors, improve productivity, and foster a culture of innovation.

By adopting a cybersecurity-first approach, businesses can ensure regulatory compliance and minimize risks while achieving their business objectives.

We understand the importance of regulatory compliance in today's business landscape, and we work with you to ensure your organization meets all relevant standards and regulations. Our compliance experts stay up-to-date with the latest requirements, and we help you implement the necessary measures to meet them.

At Thor, we believe that security is not an option, it's a necessity. By partnering with us, you can focus on your business while we focus on keeping you safe from cyber threats.

Services

Protect your business from cyber threats, reduce risk, and maintain a strong security posture with our managed services. Explore our service list today.

Análisis de Superficie de Ataque

Análisis de Superficie de Ataque

Mapeo exhaustivo de todos los puntos de exposición digital visibles desde internet.

Análisis Certificado de Infraestructura

Análisis Certificado de Infraestructura

Evaluación metódica y certificada de la infraestructura tecnológica contra estándares de seguridad reconocidos.

Análisis de Seguridad de APIs

Análisis de Seguridad de APIs

Evaluación especializada de interfaces de programación de aplicaciones que conectan sistemas críticos y transfieren datos sensibles.

Denegación de Servicio

Denegación de Servicio

Evaluación controlada de la resistencia de sistemas y aplicaciones frente a ataques de denegación de servicio.

Virtual RedTeam

Virtual RedTeam

Servicio externalizado de gestión integral y operación completa de actividades de seguridad ofensiva (Red Teaming).

Pentest Interno de Aplicaciones e Infraestructura

Pentest Interno de Aplicaciones e Infraestructura

Simulación de ataques desde dentro de la red corporativa para evaluar defensas internas y propagación de amenazas.

Pentest Web no Autenticado

Pentest Web no Autenticado

Evaluación de seguridad de aplicaciones web desde la perspectiva de un atacante externo sin credenciales.

Pentest Web Autenticado

Pentest Web Autenticado

Evaluación exhaustiva de seguridad de aplicaciones web con acceso autenticado que simula ataques externos e internos.

Pentest Mobile

Pentest Mobile

Evaluación de seguridad específica para aplicaciones móviles (iOS/Android)

Pentest POS

Pentest POS

Evaluación de seguridad integral de terminales de pago, con enfoque en análisis lógico (aplicaciones, APIs y SDKs) y físico (hardware y periféricos).

Pentest IA / LLM

Pentest IA / LLM

Evaluación especializada de seguridad para sistemas de Inteligencia Artificial y Modelos de Lenguaje (LLM).

Contact

Get in touch with us to know more about our products and services