www.integrity.pt Open in urlscan Pro
63.33.99.189  Public Scan

Submitted URL: http://www.integrity.pt/
Effective URL: https://www.integrity.pt/
Submission: On April 15 via api from US — Scanned from PT

Form analysis 1 forms found in the DOM

POST https://6z7iuhyxv0.execute-api.eu-west-1.amazonaws.com/prod/contact

<form id="contact-form-en" role="form" action="https://6z7iuhyxv0.execute-api.eu-west-1.amazonaws.com/prod/contact" method="post" enctype="text/plain">
  <div class="form-group">
    <label for="name1">Name</label>
    <input type="text" name="Name" class="form-control" id="name1" placeholder="Write your name here">
  </div>
  <div class="form-group">
    <label for="email1">E-mail</label>
    <input type="email" name="Mail" class="form-control" id="email1" placeholder="Write your e-mail here">
  </div>
  <div class="form-group">
    <label for="message">Message</label>
    <textarea id="message" class="form-control" name="Message" rows="3"></textarea>
  </div>
  <div class="checkbox">
    <label>
      <input type="checkbox" id="Consent" name="consent"> By ticking this box, you will be declaring that you have read and agree to the <a href="/pdf/Politica_de_Privacidade.pdf" target="_blank">Privacy Policy</a> of INTEGRITY S.A., and that you may
      be contacted via email regarding your request. The personal data entered on this website is collected, used, recorded, and processed in accordance with the General Data Protection Regulation (GDPR) and our Privacy Policy. </label>
  </div>
  <br>
  <div class="form-group">
    <div class="g-recaptcha" id="recaptcha" data-sitekey="6LfdktMSAAAAAOXxRf-GOTod_fbsUggR0vSTaA4a" data-callback="verifyRecapcha">
      <div style="width: 304px; height: 78px;">
        <div><iframe title="reCAPTCHA" width="304" height="78" role="presentation" name="a-pvdgfddrrlpc" frameborder="0" scrolling="no"
            sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
            src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6LfdktMSAAAAAOXxRf-GOTod_fbsUggR0vSTaA4a&amp;co=aHR0cHM6Ly93d3cuaW50ZWdyaXR5LnB0OjQ0Mw..&amp;hl=pt-PT&amp;v=rz4DvU-cY2JYCwHSTck0_qm-&amp;size=normal&amp;cb=i3jpsz1v7cnc"></iframe>
        </div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
          style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
      </div><iframe style="display: none;"></iframe>
    </div>
  </div>
  <br>
  <button id="send" disabled="" type="submit" class="btn btn-large btn-filled">Send</button>
</form>

Text Content

Toggle navigation
 * About us
   * Our History
   * Services
   * Innovation
   * Team
   * Co-Founders
   * Certifications & Accreditations
   * Labs
 * Our solutions Our solutions
 * Services
   * Alert Readiness Framework (ARF)
   * KEEP-IT-SECURE-24
   * IntegrityGRC
   * PCI-DSS
   * Offensive Security
   * Consulting
   * KEEP-IT-MANAGED-24
   * Third Party Cyber Risk Management
   * Cybersecurity Engineering
   * Cloud Security
   * Assessments
   * Training & Awareness
   * More Services
 * Clients
   * Sectors
   * Case Studies
   * Testimonies
 * Communication
 * Partners
 * Newsletters
 * Careers
 * Cybersecurity Guide
 * Real-life Cases
 * Contacts
 * More
   * Our Solutions
   * IntegrityGRC
   * Certification ISO 27001
   * Certification CREST
   * Certification ISO 9001
   * Accreditation PNSC
   * Clients
   * Case Studies
   * Testimonies
   * Partners
   * Resource Library
   * Newsletters
   * Careers
   * Cybersecurity Guide
   * Real-life Cases
   * Contacts
 * EN
   * PT
   * ES
 * 
 * 

 1. 
 2. 
 3. 
 4. 
 5. 


MAKING YOUR TECH
JOURNEY MORE SECURE.

With our passion for Cybersecurity and our commitment to excellence, we dedicate
ourselves to making your business thrive securely.


PASSION FOR
CYBERSECURITY

We are a PCI QSA, ISO 27001 and ISO 27701 certified company specialized in
Cybersecurity Services.


PARTNERSHIP ATTITUDE

We regard each client as a partner. Our aim is not just to provide a service but
also to guarantee our partners’ goal achievement and business sustainability.


ADAPTABILITY

It is part of our DNA – Very often our clients praise our adaptability and how
quick and practical it is to work with Devoteam Cyber Trust. This is our way of
being in the business market!


FOCUS ON EXCELLENCY

We are proud to provide services of high quality and excellence! It is essential
for us that the final result has met or exceeded the client’s expectations.

Latest news.

Devoteam announces the acquisition of Integrity to boost its Cybersecurity
activity and managed services across EMEA. Read more

Devoteam Cyber Trust grows in the International Market. (Content in PT) Read
more

Devoteam Cyber Trust launches Teleworking & Secure Business Continuity
Assessment offer. (Content in PT) Read more

Are we really ready for the 2nd wave of teleworking and remote business?
(Content in PT) Read more

INTEGRITY was recognized as PCI QSA (Qualified Security Assessor). Read more

Check out our online training solution! (Content in PT) Read more

Devoteam Cyber Trust mentioned in Gartner's Magic Quadrant report: Europe
Context: Magic Quadrant for Global MSSPs.



Cybersecurity Services


WE ARE A CONSULTING AND TECHNOLOGICAL AUDIT COMPANY WITH A STRONG EMPHASIS ON
CYBERSECURITY. IN FACT, WE OFFER SERVICES THAT ALLOW OUR CLIENTS TO HAVE THEIR
INFORMATION SECURE AGAINST POTENTIAL INCIDENTS AND SECURITY ATTACKS.

KEEP-IT-SECURE-24

Information Security should be regarded as a process of the organization and not
only as a project. Therefore, we have developed an innovative approach that is
much more efficient in performing persistent penetration tests.

Read more

Offensive Security

Our Offensive Security Services helps our client to identify potential risks,
namely, Technical Vulnerabilities through one-off or Persistent Penetration
Testing (KEEP-IT-SECURE-24), on top of this, Devoteam Cyber Trust also provides
recommendations and support to mitigate the identified issues.

Read more

Consulting

We support our clients in the implementation and adoption of controls used to
effectively reduce the risk. Based on the deep knowledge and experience of our
team we help companies to implement Information Security Management Best
Practices and Standards.

Read more

Training & Awareness

Organisations tend to invest in Technology and Processes but the weakest link is
People. Thus, it is essential to assure the balance between these three elements
of Information Security.

Read more

Other Services

Complex and peculiar problems deserve a multidisciplinary answer. Our
specialized and crosswise know-how allows us to respond in a more assertive way,
building synergistic teams to give answers to the most complex and critical
challenges.

Read more

OUR TEAM.

A team can only feel good about its clients if it feels good about itself. At
Devoteam Cyber Trust we give utmost importance to knowledge sharing, good
working environment and healthy competition to obtain the maximum performance in
what we do.

Devoteam Cyber Trust is essentially supported by a group of Expert and Senior
professionals who are able to work in every area of focus due to a combination
between their expertise and relevant Internation certifications.


QUALIFICATIONS:

MSc in Information Security (Royal Holloway)

PostGraduate in Information Security (Royal Holloway)

Certified Information Systems Auditor (CISA)

Certified Information Security Manager (CISM)

Certified in Risk and Information Systems Control (CRISC)

ISO 27001 Lead Auditor

Certified Information Systems Security Professional (CISSP)

Information Systems Security Management Professional (CISSP-ISSMP)

Offensive Security Certified Professional (OSCP)

GIAC Penetration Tester (GPEN)

eLearnSecurity Web application Penetration Tester eXtreme (eWPTX)

ITILv3

Offensive Security Web Expert (OSWE)

PCI QSA (Qualified Security Assessor)



INNOVATION.

We can´t keep fighting current and future threats the same way we used to in the
past.
Constant threat evolution and information technology dynamics, compels for a
constant adaptation of practices, tools and approaches in the Cybersecurity
world.
Capitalizing our experience, know-how and acknowledgment of current
requirements, Devoteam Cyber Trust has in its DNA the need to constantly create
new and innovative approaches that can bring added-value.

Learn how we approach the innovation area.

CERTIFICATIONS & ACCREDITATIONS.

We are a certified company that is focused on protecting its client's
information and providing a world class service based on Industry Standards and
best practices.

International reference and standard in Information Security Management. Its
principle is to adopt a set of requirements, processes and controls to properly
manage organisation risk. The goal of the accreditation has been the protection
of our clients projects information.
Read more

We are the only Portuguese company approved by CREST concerning its Penetration
Testing services, that take into account all the Technical and Management issues
of Penetration Testing.
Read more

International reference and standard in Quality Management. The scope of our
certification has been Consulting, Auditing and Advisory in Information Security
and Implementation of Management Systems.
Read more

We undergone a process of accreditation with the Portuguese National Security
Cabinet (PNSC) to meet customer requirements and requests regarding the access
and handling of classified information.
Read more

Integrity S.A. was recognized by PCI Security Standards Council as a Qualified
Security Assessor (QSA) certified entity, being our team of qualified
consultants now capable of auditing companies’ processes associated with payment
card transactions independently, in accordance with the PCI-DSS global security
standard.
Read more

We submitted to the accreditation process by Bancontact for payment security
assessments in mobile applications under the Bancontact approval system.
Read more

International standard addressing Private Information Management Systems. Its
principles involve defining requirements and providing guidance to assist
businesses in managing privacy risks related to personally identifiable
information. The scope of certification aims to protect customers' personal data
and ensure compliance with privacy regulations.
Read more

OUR CLIENTS

We provide service to a considerable number of large and medium-sized companies
both at a national and international level. if you wish to find more about our
references and projects, we will be happy to arrange a meeting with you.

Banking and Insurance

Retail

Aviation

Industry

Energy

Healthcare

Government

Service Organisations

Transportation

Information Technology

Telcos

Entertainment

TESTIMONIES

Industry

"THANK YOU VERY MUCH FOR YOUR COMMITMENT AND THANKS FOR BEING SO PROFESSIONAL."

Energy

"THIS IS A WIN-WIN SERVICE AND THE REPORT LEVEL IS AMAZING."

Health

"THE PROJECT IS A SUCCESS, THE TEAM HAS LOADS OF TECHNICAL EXPERTISE, THEY
PERFORMED ABOVE EXPECTATIONS."

Banking

"IT’S VERY EASY AND RELIABLE TO WORK WITH DEVOTEAM CYBER TRUST."

Government

"EXTERNAL AUDITORS SAY THAT THEY HAVE NEVER SEEN SIMILAR METHODOLOGIES AND THEY
REALLY MAKE SENSE."

Industry

"THANK YOU VERY MUCH FOR YOUR COMMITMENT AND THANKS FOR BEING SO PROFESSIONAL."

Energy

"THIS IS A WIN-WIN SERVICE AND THE REPORT LEVEL IS AMAZING."

Health

"THE PROJECT IS A SUCCESS, THE TEAM HAS LOADS OF TECHNICAL EXPERTISE, THEY
PERFORMED ABOVE EXPECTATIONS."

Banking

"IT’S VERY EASY AND RELIABLE TO WORK WITH DEVOTEAM CYBER TRUST."

Government

"EXTERNAL AUDITORS SAY THAT THEY HAVE NEVER SEEN SIMILAR METHODOLOGIES AND THEY
REALLY MAKE SENSE."

Industry

"THANK YOU VERY MUCH FOR YOUR COMMITMENT AND THANKS FOR BEING SO PROFESSIONAL."

Energy

"THIS IS A WIN-WIN SERVICE AND THE REPORT LEVEL IS AMAZING."

Health

"THE PROJECT IS A SUCCESS, THE TEAM HAS LOADS OF TECHNICAL EXPERTISE, THEY
PERFORMED ABOVE EXPECTATIONS."

 * 1
 * 2
 * 3
 * 4
 * 5

GLOBAL REACH.

Currently we provide services in more than 20 Countries over 5 Continents.



LABS

by Bruno Morisson


THE CURIOUS CASE OF APPLE IOS IKEV2 VPN ON DEMAND

TL;DR Apple’s iOS IKEv2 VPN On Demand may leak traffic when it is unable to
establish an IPSEC tunnel to the defined VPN gateway. We’ve reported this to
Apple, and after analysing it they didn’t consider it a security issue. Details
VPN On Demand is a feature from iOS (and OSX) that allows the enforcement of a
specific set of rules when the connection being used by the iOS device requires
a specific VPN connection in order to...

Find out more of these on our Labs page

by Bruno Morisson


XXE ALL THE THINGS!!! (INCLUDING APPLE IOS'S OFFICE VIEWER)

This article summarises the discovery and analysis of the XXE vulnerability in
Apple iOS Office Viewer (CVE-2015-3784). It assumes the reader already has a
basic understanding of XXE attacks. Also, tests are performed on a jailbroken
iOS device for...

Read more

by Marco Vaz


FROM 0-DAY TO EXPLOIT – BUFFER OVERFLOW IN BELKIN N750 (CVE-2014-1635)

A vulnerability in the guest network web interface of the Belkin N750 DB Wi-Fi
Dual-Band N+ Gigabit Router with firmware F9K1103_WW_1.10.16m, allows an
unauthenticated remote attacker to gain root access to the operating...

Read more

Cybersecurity newsletter

DO YOU WANT TO RECEIVE OUR NEWSLETTER?

Subscribe here

CONTACT US.

HEADQUARTERS

Edifício Atrium Saldanha
Praça Duque de Saldanha, nº 1, 2º andar
1050-094, Lisboa | Portugal
T: +351 21 33 03 740
E: info@integrity.pt

AND WE ARE PRESENT IN 18 MORE COUNTRIES ACROSS EMEA.



 

   



Name
E-mail
Message
By ticking this box, you will be declaring that you have read and agree to the
Privacy Policy of INTEGRITY S.A., and that you may be contacted via email
regarding your request. The personal data entered on this website is collected,
used, recorded, and processed in accordance with the General Data Protection
Regulation (GDPR) and our Privacy Policy.



Send


JUST LAUNCHED


ALERT READINESS FRAMEWORK

More info

Close


JUST LAUNCHED


ALERT READINESS FRAMEWORK

More info

© 2024 Integrity S.A.. All rights reserved.
Please read our Privacy and Cookies Policy | Terms & Conditions | Whistleblower
Channel




Check out our solutions Check out our solutions
x close


 * OUR SOLUTIONS

 * Testing / Vulnerability Management
 * Compliance / Certification / Best Practices
 * Security Management
 * Training / Awareness

PENTESTING PROJECT

 * Offensive Security projects are customized according to the needs and aims of
   our clients. They can be technical component, processes, people or more
   broadly combined context oriented. They can also be oriented to deal with
   questions related to compliance or regulation.
 * Read more

PERSISTENT PENTESTING (MSP)

 * 
 * At KEEP-IT-SECURE-24 we test your Security in a continuously way and provide
   you a cost-effective model in a Managed Service approach. Find out about the
   other features that make our model unique.
 * Read more

MOBILE APPLICATION PENETRATION TESTING

 * Devoteam Cyber Trust proposes to carry out penetration tests that include the
   security of client's applications installed on mobile devices and on the
   backend services that support them. In this sense, Devoteam Cyber Trust
   proposes a holistic analysis to the mobile application's security.
 * Read more

ISO 27001

 * ISO/IEC 27001 is the best-known standard in the family providing requirements
   for establishing, implementing, maintaining and continually improving an
   information security management system (ISMS) within the context of the
   organisation.
 * Read more

ISO 27701

 * ISO 27701 provides specific requirements and guidance for continuously
   establishing, implementing, maintaining, and improving a Privacy Information
   Management System (PIMS) as an extension of the Information Security
   Management System (ISMS) defined in ISO 27001.
 * Learn more

GENERAL DATA PROTECTION REGULATION (GDPR)

 * 
 * Preparation of a corporate governance model that will help adopt and comply
   with all recommendations and demands (such as policies, accountability
   frameworks, monitoring and control processes and mechanisms) is a pressing
   concern.
 * Read more

PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI-DSS)

 * 
 * Persistent management service entirely focused on PCI-DSS requirements.
 * Read more

--------------------------------------------------------------------------------

 * 
 * Set of PCI Compliance services customized and delivered by a certified QSA
   team, focused on customer assistance, and activities supporting the
   compliance with PCI-DSS requirements.
 * Read more

--------------------------------------------------------------------------------

 * 
 * We not only audit the environment of the organisation but also assist to
   implement the required controls. Our services are customised to meet your
   needs.
 * Read more

RISK MANAGEMENT

 * 
 * Through the use of Risk Management software, organizations will often will
   uncover more systemic issues, and allow companies to not only prioritize
   events by risk, but also report on those risks to foster continuous
   improvement.
 * Read more

COMPLIANCE MANAGEMENT

 * 
 * IntegrityGRC works with upper levels of management to ensure strategies are
   in place to deal with compliance problems when they occur before the
   reputation and integrity of the company and its staff are jeopardized.
 * Read more

CUSTOM PROJECT

 * Complex and peculiar problems deserve a multi-disciplinary response. Our
   specialized and crosswise know-how allows us to respond in a more assertive
   way to the most critical challenges.
 * Read more

INTEGRITY 360º SECURITY REVIEW

 * In order to support organisations, Devoteam Cyber Trust introduces Integrity
   360º Security Review, a holistic service to provide current and
   multidisciplinary status on the maturity, risks, and vulnerabilities of the
   organisation in different vectors.
 * Read more

TELEWORKING & SECURE BUSINESS CONTINUITY

 * Multidisciplinary risk assessment service in the Business Continuity and
   Telework context.
 * Read more

RANSOMWARE RESILIENCE ASSESSMENT

 * Structured multi-disciplinary assessment of resilience in the context of
   Ransomware threats.
 * Read more

INTEGRITYGRC

 * 
 * IntegrityGRC is a platform that helps organisations to manage their
   processes, risk and compliance in a structured way. Our platform creates a
   close link between the Security organisation, its management and its
   operational practice, providing full control of the Organisation’s
   Information Security Management.
 * Read more

27001 MANAGER

 * 
 * Specially designed to meet all 27001 requirements and effectively support
   your information security program. 27001 Manager operates security
   effectively and helps obtaining compliance as the result of this seamless
   link. It contemplates features that allow knowing both the big picture and
   the details required by the ISMS, at any time.
 * Read more

INFOSECRATING

 * 
 * Infosec Rating is a Solution that allows you to manage your third-party risk.
   Through this Solution it is possible to support a continuous process of
   improvement and risk reduction, also providing analytical information and
   benchmarking.
 * Read more

KEEP-IT-SECURE-24

 * 
 * Companies usually hire Pen-Testing once a year to test their Security. At
   KEEP-IT-SECURE-24 we test your Security in a continuously way and provide you
   a cost-effective model in a Managed Service approach. Given the dynamics that
   applications and infrastructures require these days, testing your Security
   once a year is a poor approach to your company’s Security. Find out about the
   other features that make our model unique.
 * Read more

KEEP-IT-MANAGED-24

 * 
 * It's a dynamic and continuous Consulting Service designed to meet the
   requirements of ISO 27001. It's supported by IntegrityGRC Platform to
   withstand and maintain the desired goal in the Information Security
   Management context.
 * Read more

SECURITY MANAGEMENT

 * The Information Security Management tracing addresses a blend of Best
   Management practices, based on the most common Standards and Frameworks, such
   as ISO 27001, COBIT, ITIL, among others.
 * Read more

SECURITY AWAKENING

 * The practice of Information Security Management is a strategic action in
   organizations for a transversal and effective approach to Security.
 * Read more

SECURITY DEVELOPMENT

 * The track of Secure Development is composed of different modules that aim to
   equip development professionals with safe code practices, addressing
   practical cases, common vulnerabilities, as well as the best practices to
   adopt in this context. Application development errors are the source of a
   considerable number of Security vulnerabilities.
 * Read more

 * x close
 * Our Solutions
 * Testing / Vulnerability Management
   * PenTesting Project
   * Persistent PenTesting (MSP)
   * Mobile Application Penetration Testing
 * Compliance / Certification / Best Practices
   * ISO 27001
   * ISO 27701
   * General Data Protection Regulation (GDPR)
   * Payment Card Industry Data Security Standard (PCI-DSS)
   * Risk Management
   * Compliance Management
   * Custom Project
   * Integrity 360º Security Review
   * Teleworking & Secure Business Continuity
   * Ransomware Resilience Assessment
 * Security Management
   * IntegrityGRC
   * 27001 Manager
   * InfosecRating
   * Keep-It-Secure-24
   * Keep-It-Managed-24
 * Training / Awareness
   * Security Management
   * Security Awakening
   * Security Development

COOKIE CONSENT X

Devoteam Cyber Trust S.A. uses cookies for analytical and more personalized
information presentation purposes, based on your browsing habits and profile.
For more detailed information, see our Cookie Policy.

Accept