The combination of offensive and defensive services of our teams allows your company to have security that evolves and continually adjusts to current risks.
Our cybersecurity solutions are offered via a monthly subscription with possible add-ons
Request your personalized quote or speak to a member of our team to learn why the best companies choose Metabase Q.
The goal of this service is to evaluate the security of point-of-sale devices from three attack vectors: hardware, software and signaling, allowing the proactive identification of vulnerabilities as well as a continuous improvement in the configuration and hardening of these devices.
Test Bed Setup: In this initial stage, the device is replicated in our laboratory to understand and test its end-to-end operation.
Blackbox: Attacks at the hardware level trying to obtain sensitive information that allow us to understand the operation of the device, such as Firmware or Flash Memory extraction.
Main-In-The-Middle: Attacks without taking advantage of device knowledge: With our own technology through ELMA, we verify the communication between PoS and card at EMV and SIM card level.
Whitebox: Identification of vulnerabilities by analyzing the source code of components including but not limited to: authentication bypass, encryption errors, privilege escalation, information disclosure, local and remote code execution, device impersonation, etc.
Protocol Stack level Pentest:
We released the first and only transactional switch secure code guide which covers the following points:
We review authorizers at the Banking/Transactional Switch level for ATM and PoS, identifying transactions being approved erroneously, unplanned reversals, abends affecting service availability, PCI violations.
Our methodology is agnostic to the Busy Switch technology: Base24, Postilion, ACCL, ACH Transfers, Device Handlers, T24, etc.
We can integrate and manage security tools and agents.
We seek to provide coverage, to know the installation status and to be able to manage registrations and cancellations.
By specific objectives in any of our areas of expertise.
Complete teams dedicated to managing your entire cloud infrastructure and security, including the implementation of DevOps methodologies.
We provide human resources in our different areas of expertise.
You’re not hiring individuals, you’re hiring a team certified in AWS, Google Cloud, Azure, Kubernetes and expert in other technologies such as:
Cloud infrastructure management services and DevOps methodologies are ideal for all types of organizations. Our multidisciplinary team offers guidance and expertise in managing various areas
Automation of software development lifecycles.
Create and/or customize CI/CD pipelines
Automate infrastructure as a deployment of code
Collaborate with engineering teams to find the best options for implementing and deploying IT solutions in the cloud.
Follow security and compliance guidelines and best practices.
This price includes fees for subscription services
Price for one shot payment services
Price for Subscription services
Name:
Date:
Metabase Q is the leading end-to-end cybersecurity company focused on Latin America. We help your business get and stay secure through an integrated platform suite of offensive and defensive services and technologies
2193 Fillmore St. San Francisco, CA 94115