PERFORMANCE MAP

NIST® Oriented

Tempest's portfolio is designed and aligned with the NIST (National Institute of Standards and Technology) security framework. Talk to one of our experts and ask for a demo.
icone

To detect

Desenvolva e implemente as atividades apropriadas para identificar a ocorrência de um evento de segurança cibernética.

Categories:

  • Anomalies and Events
  • Security Continuous Monitoring
  • Detection Processes
icone

Identify

Develop organizational understanding to manage cybersecurity risk to systems, assets, data and resources.

Categories:

  • Asset Management
  • Business Environment
  • Governance Risk Assessment
  • Risk Management Strategy

 

icone

Protect

Develop and implement appropriate safeguards to ensure delivery of critical infrastructure services.

Categories:

  • Access Control
  • Awareness and Training
  • Data Security
  • Info Protection Processes and Procedures
  • maintenance
  • Protective Technology
icone

Respond

Develop and implement appropriate activities to take action on a detected cybersecurity event. .

Categories:

  • Response Planning

  • communications

  • Analysis

  • mitigation

  • improvements

  • Mais sobre o texto original

icone

To recover

Develop and implement appropriate activities to maintain resilience plans and restore any resources or services that were impaired in a cybersecurity incident.

Categories:

  • Recovery Planning
  • improvements
  • communications

Discover customized solutions for you.

CONTACT US

We are the largest company specializing in cybersecurity in Brazil.

We offer end-to-end solutions for companies, reducing costs, offering more agility and generating much more efficiency in cybersecurity risk management.

3.5mm+

Anomalies reported to customers in 2020

450+

Employees in Recife, São Paulo, Rio and London

500+

Customers in Brazil, LATAM and Europe

22+

Years of experience

Our business partners

We work with key business partners to deliver the best tools in cybersecurity