ehcgroup.io Open in urlscan Pro
159.65.33.102  Public Scan

Submitted URL: http://ehcgroup.io/
Effective URL: https://ehcgroup.io/
Submission: On June 25 via api from GB — Scanned from GB

Form analysis 11 forms found in the DOM

POST /contact

<form action="/contact" method="post"><input type="text" name="name" placeholder="Name"><input type="hidden" name="category" value="services"><input type="hidden" name="topic" value="Security Penetration Testing"><input type="text" name="email"
    placeholder="Email"><textarea rows="13" cols="28" name="message" placeholder="Message"></textarea><input type="submit" value="Send"></form>

POST /contact

<form action="/contact" method="post"><input type="text" name="name" placeholder="Name"><input type="hidden" name="category" value="services"><input type="hidden" name="topic" value="Audit and Certification of ATMs"><input type="text" name="email"
    placeholder="Email"><textarea rows="13" cols="28" name="message" placeholder="Message"></textarea><input type="submit" value="Send"></form>

POST /contact

<form action="/contact" method="post"><input type="text" name="name" placeholder="Name"><input type="hidden" name="category" value="services"><input type="hidden" name="topic" value="Computer Forensics"><input type="text" name="email"
    placeholder="Email"><textarea rows="13" cols="28" name="message" placeholder="Message"></textarea><input type="submit" value="Send"></form>

POST /contact

<form action="/contact" method="post"><input type="text" name="name" placeholder="Name"><input type="hidden" name="category" value="services"><input type="hidden" name="topic" value="Advice Computer Law"><input type="text" name="email"
    placeholder="Email"><textarea rows="13" cols="28" name="message" placeholder="Message"></textarea><input type="submit" value="Send"></form>

POST /contact

<form action="/contact" method="post"><input type="text" name="name" placeholder="Name"><input type="hidden" name="category" value="services"><input type="hidden" name="topic" value="Specialized Audits"><input type="text" name="email"
    placeholder="Email"><textarea rows="13" cols="28" name="message" placeholder="Message"></textarea><input type="submit" value="Send"></form>

POST /contact

<form action="/contact" method="post"><input type="text" name="name" placeholder="Name"><input type="hidden" name="category" value="services"><input type="hidden" name="topic" value="Computer Intelligence"><input type="text" name="email"
    placeholder="Email"><textarea rows="13" cols="28" name="message" placeholder="Message"></textarea><input type="submit" value="Send"></form>

POST /contact

<form action="/contact" method="post"><input type="text" name="name" placeholder="Name"><input type="hidden" name="category" value="services"><input type="hidden" name="topic" value="Security Training"><input type="text" name="email"
    placeholder="Email"><textarea rows="13" cols="28" name="message" placeholder="Message"></textarea><input type="submit" value="Send"></form>

POST /contact

<form action="/contact" method="post"><input type="text" name="name" placeholder="Name"><input type="hidden" name="category" value="services"><input type="hidden" name="topic" value="Big Data Solutions"><input type="text" name="email"
    placeholder="Email"><textarea rows="13" cols="28" name="message" placeholder="Message"></textarea><input type="submit" value="Send"></form>

POST /contact

<form action="/contact" method="post"><input type="text" name="name" placeholder="Name"><input type="hidden" name="category" value="partnership"><input type="hidden" name="topic" value="contact"><input type="text" name="email"
    placeholder="Email"><textarea rows="13" cols="28" name="message" placeholder="comments"></textarea><input type="submit" value="Send"></form>

POST https://ehcgroup.us17.list-manage.com/subscribe/post?u=f0a96b2ae5161c05a2d854810&id=841ab085d8

<form id="subscription-form" action="https://ehcgroup.us17.list-manage.com/subscribe/post?u=f0a96b2ae5161c05a2d854810&amp;id=841ab085d8" method="post" target="_blank" novalidate=""> <label>Security Newsletter</label> <input type="email" value=""
    name="EMAIL" placeholder="Email"> <input hidden="" type="text" name="b_f0a96b2ae5161c05a2d854810_841ab085d8" value=""> <button type="submit">Subscribe</button> <button
    type="button"><a href="http://feeds.feedburner.com/BlogEhcgroup" target="_blank">RSS Feed</a></button></form>

<form><input type="text" name="name" placeholder="Name"><input type="text" name="email" placeholder="Email"><textarea rows="10" cols="28" name="message" placeholder="Comments"></textarea><input type="submit" value="Send"><input type="hidden"
    name="category" value="contact"><input type="hidden" name="topic" value="contact"></form>

Text Content

 * Home
 * About
 * Services
 * Products
 * Training
 * Events
 * Partnership
 * EHC News
 * Contact


EnglishEspañol

   
 * Home
 * About
 * Services
 * Products
 * Training
 * Events
 * Partnership
 * EHC News
 * Contact

Computer Forensics and Computer Crimes
 * Advice on computer crimes.
 * Investigation of high technology crimes.
 * Forensic computer analysis.
 * Forensic analysis of mobile devices.

LEARN MORE
Compliance Audit PCI (PA-DSS)
 * Audit of source code.
 * Authentication mechanisms.
 * Data Encryption.
 * Storage security.

LEARN MORE
Become a Certified Ethical Hacker
 * Practical courses.
 * Laboratories virtualized.
 * Lessons recorded with audio and video.
 * Teachers recognized internationally.
 * E-learning web platform.
 * Online support in 3 languages.

LEARN MORE
Mobile Applications Audits
 * Malware analysis.
 * Transportation security.
 * Reversing applications.
 * Audit of banking applications.

LEARN MORE
Computer Forensics and Computer Crimes
 * Advice on computer crimes.
 * Investigation of high technology crimes.
 * Forensic computer analysis.
 * Forensic analysis of mobile devices.

LEARN MORE
Compliance Audit PCI (PA-DSS)
 * Audit of source code.
 * Authentication mechanisms.
 * Data Encryption.
 * Storage security.

LEARN MORE
Become a Certified Ethical Hacker
 * Practical courses.
 * Laboratories virtualized.
 * Lessons recorded with audio and video.
 * Teachers recognized internationally.
 * E-learning web platform.
 * Online support in 3 languages.

LEARN MORE
Mobile Applications Audits
 * Malware analysis.
 * Transportation security.
 * Reversing applications.
 * Audit of banking applications.

LEARN MORE
Computer Forensics and Computer Crimes
 * Advice on computer crimes.
 * Investigation of high technology crimes.
 * Forensic computer analysis.
 * Forensic analysis of mobile devices.

LEARN MORE
Compliance Audit PCI (PA-DSS)
 * Audit of source code.
 * Authentication mechanisms.
 * Data Encryption.
 * Storage security.

LEARN MORE
Become a Certified Ethical Hacker
 * Practical courses.
 * Laboratories virtualized.
 * Lessons recorded with audio and video.
 * Teachers recognized internationally.
 * E-learning web platform.
 * Online support in 3 languages.

LEARN MORE
Mobile Applications Audits
 * Malware analysis.
 * Transportation security.
 * Reversing applications.
 * Audit of banking applications.

LEARN MORE
About


At the start of 2001, born Ethical Hacking Consultants, with the firm commitment
to support in the management of information security projects, from the analysis
and evaluation of the security of the systems and infrastructures, to the
implementation of robust security solutions that allow the integration of
processes, technology and human resources in our clients.

As specialists in protection of information assets, our mission is to support
our clients in covering the three major areas of information security and
information: confidentiality of information, data integrity and availability of
computer systems.

Ethical Hacking Consultants is made up of first class human capital and
certified in different areas of security.

With security professionals from different countries and certified in several
areas of security, we have a first-hand experience in the area of the protection
of digital assets, training of the human resources of the clients and we develop
under the pillars of the ethics professional.

Services

 * External intrusion testing.
 * Internal intrusion testing.
 * Wireless intrusion testing.
 * Social engineering intrusion testing.
 * ATM intrusion testing.
 * SAP systems intrusion testing.
 * SCADA systems intrusion testing.

These intrusion tests are also known as Ethical Hacking or Pentesting.

LEARN MORE

Thank you for your interest in our services and technological solutions. Please
fill the following form and a commercial agent will contact you to assist you
within the first two workings days.


 * Audit of VISA, MASTERCARD, PROSA controls.
 * Audit of PCI-DSS, PA-DSS, PCI-PTS, ISO 8583 controls.
 * Audit of protections and perimeters of ATMs.
 * Audit of operating system and applications of ATMs.
 * Security Audit in Binaries and Anti-Malware of ATMs.
 * Audit of Frequency spectrum of ATMs.
 * Audit of Communications and standards of ATMs.

We are the only company that has created more than 300 controls to audit ATMs.

LEARN MORE

Thank you for your interest in our services and technological solutions. Please
fill the following form and a commercial agent will contact you to assist you
within the first two workings days.


 * Computer Expert report.
 * Judicial rulings Computer.
 * Legal expert counterparts.
 * Computer arbitrations.
 * Preliminary or extrajudicial arbitration.
 * Insurance: Risk assessment or IT damage.
 * Recover of deleted information.

We preserve the digital evidence adequately so that it has judicial and legal
value.

LEARN MORE

Thank you for your interest in our services and technological solutions. Please
fill the following form and a commercial agent will contact you to assist you
within the first two workings days.


 * Research and sponsorship in Computer Crime cases.
 * Analysis and elaboration of computer contracts.
 * Copyright on the Internet.
 * ODR - Online Dispute Resolution.
 * Electronic Commerce and trustmarks.
 * Electronic signature.
 * Infringement of privacy by computer or electronic means.
 * Scam, fraud or computer conspiracy.

LEARN MORE

Thank you for your interest in our services and technological solutions. Please
fill the following form and a commercial agent will contact you to assist you
within the first two workings days.


 * Audit to Servers and Data Centers.
 * Data Network Audit (LAN, WAN, Wireless, VoIP).
 * Audit to Web Applications and the process of secure development.
 * Mobile applications Audit.
 * Perimeter Security Audit.
 * Binary Code audit.
 * Compliance Audit PCI-DSS v3.0.
 * Compliance Audit ISO 27001/27002.

LEARN MORE

Thank you for your interest in our services and technological solutions. Please
fill the following form and a commercial agent will contact you to assist you
within the first two workings days.


 * Training of intelligence corps.
 * Cyber intelligence services(CYBINT).
 * Communications Intelligence services(COMINT).
 * Training of Human Intelligence(HUMINT).
 * Development of Cyber Incident Response Centers.
 * Development of Monitoring Centers and Security Centers.

These services are offered only to governments.

LEARN MORE

Thank you for your interest in our services and technological solutions. Please
fill the following form and a commercial agent will contact you to assist you
within the first two workings days.


 * Certified Professional Pentester.
 * Web Application Security Auditor.
 * Expert in Computer Crime and Computer Forensics.
 * Lead Auditor ISO 27001.
 * Metasploit Profesional Pentester.
 * Wireless Network Defense Professional.
 * ATMs Lead Security Auditor.
 * Cyber Security Multivendor ATM.

LEARN MORE

Thank you for your interest in our services and technological solutions. Please
fill the following form and a commercial agent will contact you to assist you
within the first two workings days.


 * Asymmetric: Big Data Security Analytics.
 * ATM Risk Operation Center.
 * Security Center Log Manager.
 * Analysis and Detection of Fraud in Telecommunications.
 * Integration of SIEM Systems with Big Data.
 * Big Data Solutions in the Cloud.
 * Threat Monitoring Center for IT infrastructures.
 * Development of Splunk and Hadoop solutions.

LEARN MORE

Thank you for your interest in our services and technological solutions. Please
fill the following form and a commercial agent will contact you to assist you
within the first two workings days.


Security Penetration Testing
Audit and Certification of ATMs
Computer Forensics
Advice Computer Law
Specialized Audits
Computer Intelligence
Security Training
Big Data Solutions
Products

 * Persistent pentesting solution on cloud.
 * Security and threat monitoring 24/7, 365 days of the year.
 * Identification of web technologies and search of exploits.
 * Dashboard and Customizable alerts.
 * Discovery of IoT devices and certificate analysis.
 * Programming of pentesting tasks.
 * Vulnerability reports and PCI compliance v3.2.

WEBSITE
 * Electronic signature of documents.
 * Certified email.
 * Testigo Digital Online (Notario Web).
 * Electronic Signature of Transactions.
 * Electronic Invoice Stamping.
 * HTTP Secure Stamps.

WEBSITE

BLACKFOG is a security and privacy tool.

 * Secure your remote computers and data.
 * 100% fileless protection.
 * Multiple layers of defense.
 * Ransomware protection.
 * Device privacy.
 * Cryptojacking protection.

IR AL SITIO

SealPath is a data-centric security tool for your company.

 * Protect and control corporate data wherever it travels
 * Control who accesses your data, when and with what permissions
 * You can see the details of the accesses to the documents.

IR AL SITIO

With our new service, we provide to security managers with answers to urgent
questions, which are necessary to accurately evaluate your organization's cyber
posture, on an ongoing basis.

 * New brand service.

IR AL SITIO

SafeData is a Personal Data security management system service.

 * Consulting, training and auditing services.
 * PDP diagnoses include Pentesting tests.
 * Minimize errors or failures in the processing of Personal Data.

IR AL SITIO
Pentest365
Firmanza - your trust signature
Blackfog
SealPath
RedTeam
Safedata
 * 2021
 * 2022
 * 2023

 * April
 * May
 * June
 * July
 * August

junio 2022

LMXJVSD  123456789101112131415161718192021222324252627282930   



Training
Events


EHC Group not only strives to provide the best services in the area of Computer
Security, It is also dedicated to sharing and disseminating knowledge through
events, training and security certifications, CTF's and talks, with a presence
in 7 countries in Latin America and the United States providing high security
services in technologies.

 * We actively participate in more than 80 events.
 * We visit more than 15 countries.
 * We make a community in cybersecurity.
 * We share knowledge and experiences.

Ethical Hacking Consultants is not only a Company

Partnership

EHCGroup services are managed by several strategic partners around Latin
America, the US and Canada through our channel program.

If you are interested in representing our products to your customers, you can
fill out the following form and a business agent will contact you within the
first two working days.


 * * nameCerty Group
   * emailrfernandez@certygroup.com
   * phone+1 809-793-1124
   * websitewww.certygroup.com
 * * nameIntegsa
   * emailservicio@integsa.com.mx
   * phone+52 81 1100 1150
   * websitewww.integsa.com.mx
 * * nameADSI
   * emailinfo@adsintl.net
   * phone+1 954 889 1366
 * * nameInfinyt
   * emailinfo@infinyt.mx
   * phone+52 (81) 2474-5555
   * websiteinfinyt.mx
 * * nameBushido Security
   * emailinfo@bushidosec.com
   * phone(+57) 3182704207
   * websitebushidosec.com
 * * nameREDTISEG
   * emailcontacto@redtiseg.com
   * phone+591 62674446
   * websitewww.redtiseg.com


COMPANIES THAT RELY ON ETHICAL HACKING CONSULTORES.


EHC NEWS
 * 
   Conti ransomware finalmente cierra la fuga de datos, los sitios de
   negociación
 * 
   CISA: Los exploits Log4Shell todavía se utilizan para piratear servidores
   VMware
 * 
   Dos actualizaciones de MS para la misma vulnerabilidad en RDP
 * 
   NSO confirma que el spyware Pegasus es utilizado por al menos 5 países
   europeos
 * 
   Hackers rusos explotan la vulnerabilidad de Microsoft Follina contra Ucrania
 * 
   Investigadores descubren formas de descifrar el cifrado del servicio de
   almacenamiento en la nube ‘MEGA’

Security Newsletter Subscribe RSS Feed
To navigate, press the arrow keys.






Styled Map











Keyboard shortcuts
Map DataMap data ©2022 Google
100 m 

Terms of Use
Report a map error
Map data ©2022 Google
Contact
Punta Pacífica, Torre de las Américas, Torre B, piso 7, Oficina 704
+507 3873850
info@ehcgroup.io

You can also contact us by filling out the following form with your comments.

By filling up you agree to our privacy policy.



Privacy policy
TWITTER
 * @EHCGroup
   
   ¿Pentest con potencia de más de 1000 pentesters, trabajando 24Hrs, todos los
   días del año? Conoce n...
   
    [more]
   3/1/2021
 * @EHCGroup
   
   La operación de ransomware Conti finalmente cerró su última infraestructura
   pública, cerrando el cap...
   
    [more]
   6/24/2022
 * @EHCGroup
   
   Nuestra solución @pentest365 es una herramienta preventiva que trabaja en
   tiempo real, le permite an...
   
    [more]
   6/24/2022




flag{Yeah! you find the EHC Flag}

 * 
   Wait a moment, we're processing your request
 * 
   Oh snap! Please Change a few things up and try submitting again.
 * 
   Well done! You successfully contact with us. In a moment We'll respond you.
 * 
   Your browser is in spanish
   Change to spanish?YesNo