Revisiones de seguridad
Config MDM, postura de endpoints, alcance de identidad, estado de parches y exposición de datos — hallazgos por impacto y esfuerzo, no por gravedad teórica.
I look at device fleets the way an attacker would — asking what can be reached, what’s not configured, and what a compromised endpoint would expose.
What a review covers
- MDM configuration audit: what profiles are deployed, what gaps exist
- Endpoint posture: encryption, firewall, SIP, Gatekeeper, secure boot
- Identity and access: SSO scope, privileged access, offboarding processes
- Data exposure: what’s on-disk, what syncs to cloud, what leaves the network
- Patch posture: OS versions, app versions, known CVEs in your tooling
Output
A written report with findings ranked by impact and effort, specific remediation steps, and a follow-up call to work through questions.
What this isn’t
A penetration test. I don’t exploit live systems or simulate attacks. This is a configuration and posture review — written, specific, and actionable.
✍️ Hablamos
¿Listo para definir el alcance? Escríbeme directamente.
Email: adam@mpc.ad
Teléfono: +376 647 764
WhatsApp: +376 647 764