DR

Daniel Rosendo

CTO - Argentina, Chile, Perú y Paraguay

RAN Security


Contact Information

Email
Unlock
LinkedIn

Company Information

Company
RAN Security
Industry
information technology & services
Employees
96.0
Seniority
C suite

Technologies

Dyn Managed DNS Microsoft Office 365 Google Cloud Hosting Bootstrap Framework Varnish Wix Google Tag Manager Mobile Friendly YouTube

Keywords

gestion avanzada de vulnerabilidades soporte especializado it continuidad del negocio consultorias en seguridad implementaciones y capacitacion nac seguridad en moviles mdm mam emm gestion de politicas en firewalls cumplimiento y normativas seguridad informatica information security software servicios de seguridad ti consultoria it cybersecurity security operations center soc it security vulnerability management threat detection data protection cloud security network security email security endpoint protection it consultancy cyber awareness training risk assessment data compliance incident response penetration testing security assessments managed security services penetration testing services cyber threat intelligence regulatory compliance security audits employee training phishing simulations intelligent threat detection cyber resiliency critical infrastructure protection security monitoring managed it services cyber risk management digital asset protection security frameworks security governance user behavior analysis incident management security policy development disaster recovery cloud migration data governance business continuity planning software security remote security monitoring security best practices security architecture planning real-time alerting it resource optimization cybersecurity strategy adaptive security solutions managed services open ran security zero-trust architecture service management orchestration advanced data encryption continuous monitoring telecommunications security mobile network operators 5g security iot security compliance it security solutions south america buenos aires partnerships ai-driven threat detection dynamic security management robust authentication multi-factor authentication encryption protocols security information & event management (siem) telecom infrastructure secure software development lifecycle (sdlc) customer-centric solutions competitive advantage industry standards real-time security monitoring network orchestration data integrity confidentiality integrity availability authenticity computer & network security information technology & services it consulting b2b consulting management consulting

Get Full Contact Details

Subscribe to reveal email addresses and export contacts.

View Plans