[vc_row full_width=”stretch_row_content” full_height=”yes” columns_placement=”bottom” gradient_bg=”yes” gradient_bg_color=”linear-gradient(to bottom left,rgba(70, 25, 251, 0.89) 0%,rgba(156, 60, 255, 0.88) 100%)|background-size: auto auto;background-position: 50% 50%;background-repeat: repeat;background-attachment: scroll;background-origin: border-box;background-clip: border-box;”][vc_column el_class=”particles-wrapper”][/vc_column][vc_column enable_responsive_options=”yes” css=”.vc_custom_1508408258303{margin-top: 5% !important;margin-bottom: 5% !important;padding-right: 4vw !important;padding-left: 4vw !important;}” responsive_css=”padding_top_tablet:150|padding_bottom_tablet:150|padding_top_mobile:100|padding_bottom_mobile:100″][vc_row_inner equal_height=”yes” content_placement=”middle” css=”.vc_custom_1508407815063{padding-top: 0px !important;}”][vc_column_inner offset=”vc_col-lg-8 vc_col-md-7″ align=”text-sm-center text-xs-center”][vc_custom_heading text=”ISO 27001″ font_container=”tag:h2|font_size:90px|text_align:left|color:%23ffffff|line_height:1.1875em” use_theme_fonts=”yes” enable_fittext=”yes” css=”.vc_custom_1594978973627{margin-top: 0px !important;margin-bottom: 0.25em !important;}” fittex_size=”80px”][vc_column_text]ISO 27001 is the internacional standard and reference for Information Security, which establishes a standard and code of good practices related to Information Security management. ISO 27001 consists of adopting a set of requeriments, processes and controls to mitigate and manage an organization’s risk.[/vc_column_text][/vc_column_inner][vc_column_inner enable_responsive_options=”yes” offset=”vc_col-lg-4 vc_col-md-5″ css=”.vc_custom_1600160726915{margin-left: -20px !important;}” align=”text-lg-right text-md-center text-sm-center text-xs-center” responsive_css=”margin_right_desktop:-80|margin_right_tablet:0|margin_right_mobile:0″][ra_button style=”btn-default” shape=”circle” size=”btn-lg” border=”border-thick” text=”text-uppercase” others=”wide” i_type=”fontawesome” title=”Request a proposal” i_icon_fontawesome=”fa fa-play” primary_color=”rgba(255,255,255,0.49)” hbg=”#ffffff” text_color=”#ffffff” css=”.vc_custom_1600164618577{padding-top: 1.5em !important;padding-right: 7.5vw !important;padding-bottom: 1.5em !important;padding-left: 7.5vw !important;}” i_mr=”15px” fs=”15px” link=”url:%20%23section-formulario|||” htext_color=”#6f14f1″ fw=”700″][/vc_column_inner][/vc_row_inner][/vc_column][vc_column css=”.vc_custom_1508407489374{padding-right: 4vw !important;padding-left: 4vw !important;}”][vc_row_inner equal_height=”yes”][vc_column_inner width=”1/2″ align=”text-lg-left” offset=”vc_col-md-3″ css=”.vc_custom_1508408144347{padding-right: 10% !important;}”][ra_icon_box template=”” heading_size=”icon-box-heading-sm” heading_weight=”weight-bold” i_type=”linea” title=”Increased system reliability and security” i_icon_linea=”icon-basic_lock” el_class=”text-left” content_color=”rgba(255,255,255,0.4)” icon_color=”rgba(255,255,255,0.7)” title_color=”#ffffff” content_size=”16px” title_size=”18px”]Reliable handling of information from partners and customers.[/ra_icon_box][/vc_column_inner][vc_column_inner width=”1/2″ align=”text-lg-left” offset=”vc_col-md-3″ css=”.vc_custom_1508408144347{padding-right: 10% !important;}”][ra_icon_box template=”” heading_size=”icon-box-heading-sm” heading_weight=”weight-bold” i_type=”linea” title=”Adaptation to the organizational and technological environment” i_icon_linea=”icon-basic_webpage_txt” el_class=”text-left” content_color=”rgba(255,255,255,0.4)” icon_color=”rgba(255,255,255,0.7)” title_color=”#ffffff” content_size=”16px” title_size=”18px”]Increases employees’ sensitivity and participation levels towards Information Security.[/ra_icon_box][/vc_column_inner][vc_column_inner width=”1/2″ align=”text-lg-left” offset=”vc_col-md-3″ css=”.vc_custom_1508408144347{padding-right: 10% !important;}”][ra_icon_box template=”” heading_size=”icon-box-heading-sm” heading_weight=”weight-bold” i_type=”linea” title=”More efficient and risk – oriented investments” i_icon_linea=”icon-basic_helm” el_class=”text-left” content_color=”rgba(255,255,255,0.4)” icon_color=”rgba(255,255,255,0.7)” title_color=”#ffffff” content_size=”16px” title_size=”18px”]Broad and complete approach to Information Security.[/ra_icon_box][/vc_column_inner][vc_column_inner width=”1/2″ align=”text-lg-left” offset=”vc_col-md-3″ css=”.vc_custom_1508408144347{padding-right: 10% !important;}”][ra_icon_box template=”” heading_size=”icon-box-heading-sm” heading_weight=”weight-bold” i_type=”linea” title=”Continuous identification of improvement opportunities” i_icon_linea=”icon-basic_settings” el_class=”text-left” content_color=”rgba(255,255,255,0.4)” icon_color=”rgba(255,255,255,0.7)” title_color=”#ffffff” content_size=”16px” title_size=”18px”]Improves the organization’s operational performance.[/ra_icon_box][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row full_width=”stretch_row_content_no_spaces”][vc_column align=”text-center” css=”.vc_custom_1489502385447{margin-bottom: 160px !important;}”][vc_empty_space height=”50px”][ra_button style=”btn-v-line” vline_direction=”line-bottom” text=”text-uppercase” title=”Why implement it?” link=”url:%23|||” text_color=”#000000″][/vc_column][/vc_row][vc_row full_width=”stretch_row_content_no_spaces” equal_height=”yes” content_placement=”middle”][vc_column css=”.vc_custom_1497275709661{margin-bottom: 0px !important;}” offset=”vc_col-md-6″][ra_content_box style=”s12″ image=”13546″ primary_color=”#ffffff”][/ra_content_box][/vc_column][vc_column css=”.vc_custom_1497275717669{padding-right: 12% !important;padding-left: 12% !important;background-color: #f6f8fb !important;}” offset=”vc_col-md-6″][vc_row_inner][vc_column_inner parallax=”yes” parallax_preset=”custom” scale_from_x=”1″ scale_from_y=”1″ scale_from_z=”1″ from_opacity=”0″ scale_to_x=”1″ scale_to_y=”1″ scale_to_z=”1″ to_opacity=”1″ to_easy=”Quint.easeOut” css=”.vc_custom_1500970475604{padding-top: 0px !important;}” parallax_duration=”0%” parallax_time=”2″ translate_from_y=”151″][vc_custom_heading text=”ISO 27001 STANDARD” font_container=”tag:h5|font_size:14px|text_align:left|color:rgba(0%2C0%2C0%2C0.35)|line_height:1.5em” google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:400%20regular%3A400%3Anormal” letter_spacing=”0.15em”][/vc_column_inner][vc_column_inner parallax=”yes” parallax_preset=”custom” scale_from_x=”1″ scale_from_y=”1″ scale_from_z=”1″ from_opacity=”0″ scale_to_x=”1″ scale_to_y=”1″ scale_to_z=”1″ to_opacity=”1″ to_easy=”Quint.easeOut” css=”.vc_custom_1500970489785{padding-top: 0px !important;}” parallax_duration=”0%” parallax_time=”2″ translate_from_y=”151″][vc_custom_heading text=”Why implement it?” font_container=”tag:h2|font_size:42px|text_align:left|color:%23000000|line_height:62px” use_theme_fonts=”yes” css_animation=”fadeInUp” css=”.vc_custom_1600164979982{margin-bottom: 25px !important;}”][/vc_column_inner][vc_column_inner parallax=”yes” parallax_preset=”custom” scale_from_x=”1″ scale_from_y=”1″ scale_from_z=”1″ from_opacity=”0″ scale_to_x=”1″ scale_to_y=”1″ scale_to_z=”1″ to_opacity=”1″ to_easy=”Quint.easeOut” css=”.vc_custom_1500970508031{padding-top: 0px !important;}” parallax_duration=”0%” parallax_time=”2″ translate_from_y=”151″][vc_custom_heading text=”• Adoption of an adequate model for the implementation, monitoring and review of an Information Security Management System;” font_container=”tag:p|font_size:17px|text_align:left|color:%23737e80|line_height:32px” google_fonts=”font_family:Muli%3A300%2C300italic%2Cregular%2Citalic|font_style:400%20regular%3A400%3Anormal” css_animation=”fadeInUp”][vc_custom_heading text=”• Intervention in the areas of telecommunications, application security, protection of the physical environment, Human Resources, licensing and business continuity;” font_container=”tag:p|font_size:17px|text_align:left|color:%23737e80|line_height:32px” google_fonts=”font_family:Muli%3A300%2C300italic%2Cregular%2Citalic|font_style:400%20regular%3A400%3Anormal” css_animation=”fadeInUp”][vc_custom_heading text=”• Consists of two parts: the definition of rules/requirements and the adoption of controls.” font_container=”tag:p|font_size:17px|text_align:left|color:%23737e80|line_height:32px” google_fonts=”font_family:Muli%3A300%2C300italic%2Cregular%2Citalic|font_style:400%20regular%3A400%3Anormal” css_animation=”fadeInUp”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row full_width=”stretch_row” equal_height=”yes” content_placement=”middle” css=”.vc_custom_1600168371131{margin-top: 80px !important;padding-bottom: 110px !important;}”][vc_column width=”5/6″ align=”text-lg-center” offset=”vc_col-sm-offset-1″][vc_empty_space height=”80px”][vc_custom_heading text=”Did you know that some organizations compel their partners and suppliers to hold this certification?” font_container=”tag:h2|font_size:28px|text_align:center|color:%237f7f7f|line_height:48px” google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:400%20regular%3A400%3Anormal” css_animation=”fadeInUp”][ra_button style=”btn-default” shape=”circle” size=”btn-md” border=”border-thicker” text=”text-uppercase” others=”wide” title=”CONTACT US” link=”url:%20%23section-formulario||target:%20_blank|” primary_color=”#ffffff” text_color=”#6f14f1″ htext_color=”#ffffff” lh=”1.75em” fw=”700″ css=”.vc_custom_1600168495176{margin-right: 40px !important;margin-bottom: -30px !important;}” hbg=”#6f14f1″ bc=”#6f14f1″ hbc=”#6f14f1″][/vc_column][/vc_row][vc_row full_width=”stretch_row_content_no_spaces” css=”.vc_custom_1600161203130{margin-top: 100px !important;}”][vc_column align=”text-center” css=”.vc_custom_1489502385447{margin-bottom: 160px !important;}”][ra_button style=”btn-v-line” vline_direction=”line-bottom” text=”text-uppercase” link=”url:%23|||” text_color=”#000000″ title=”How we perform?” css=”.vc_custom_1600165105328{margin-right: 50px !important;}”][/vc_column][/vc_row][vc_row full_width=”stretch_row_content_no_spaces” equal_height=”yes” content_placement=”middle” css=”.vc_custom_1497270909854{margin-bottom: 0px !important;}”][vc_column css=”.vc_custom_1497275728950{padding-right: 12% !important;padding-left: 12% !important;background-color: #f6f8fb !important;}” offset=”vc_col-md-6″][vc_row_inner][vc_column_inner parallax=”yes” parallax_preset=”custom” scale_from_x=”1″ scale_from_y=”1″ scale_from_z=”1″ from_opacity=”0″ scale_to_x=”1″ scale_to_y=”1″ scale_to_z=”1″ to_opacity=”1″ to_easy=”Quint.easeOut” css=”.vc_custom_1500970524295{padding-top: 0px !important;}” parallax_duration=”0%” parallax_time=”2″ translate_from_y=”150″][vc_custom_heading text=”ISO 27001 STANDARD” font_container=”tag:h5|font_size:14px|text_align:left|color:rgba(0%2C0%2C0%2C0.35)|line_height:1.5em” google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:400%20regular%3A400%3Anormal” letter_spacing=”0.15em”][/vc_column_inner][vc_column_inner parallax=”yes” parallax_preset=”custom” scale_from_x=”1″ scale_from_y=”1″ scale_from_z=”1″ from_opacity=”0″ scale_to_x=”1″ scale_to_y=”1″ scale_to_z=”1″ to_opacity=”1″ to_easy=”Quint.easeOut” css=”.vc_custom_1500970551843{padding-top: 0px !important;}” parallax_duration=”0%” parallax_time=”2″ translate_from_y=”151″][vc_custom_heading text=”How we perform?” font_container=”tag:h2|font_size:42px|text_align:left|color:%23000000|line_height:62px” use_theme_fonts=”yes” css=”.vc_custom_1600165125058{margin-bottom: 25px !important;}”][/vc_column_inner][vc_column_inner parallax=”yes” parallax_preset=”custom” scale_from_x=”1″ scale_from_y=”1″ scale_from_z=”1″ from_opacity=”0″ scale_to_x=”1″ scale_to_y=”1″ scale_to_z=”1″ to_opacity=”1″ to_easy=”Quint.easeOut” css=”.vc_custom_1500970566935{padding-top: 0px !important;}” parallax_duration=”0%” parallax_time=”2″ translate_from_y=”151″][vc_custom_heading text=”• Initial analysis of the company’s processes, requirements and controls;” font_container=”tag:p|font_size:17px|text_align:left|color:%23737e80|line_height:32px” google_fonts=”font_family:Muli%3A300%2C300italic%2Cregular%2Citalic|font_style:400%20regular%3A400%3Anormal”][vc_custom_heading text=”• Workshops for the implementation and maintenance of the Information Security Management System;” font_container=”tag:p|font_size:17px|text_align:left|color:%23737e80|line_height:32px” google_fonts=”font_family:Muli%3A300%2C300italic%2Cregular%2Citalic|font_style:400%20regular%3A400%3Anormal”][vc_custom_heading text=”• Support in the preparation of documents and processes required by the Standard;” font_container=”tag:p|font_size:17px|text_align:left|color:%23737e80|line_height:32px” google_fonts=”font_family:Muli%3A300%2C300italic%2Cregular%2Citalic|font_style:400%20regular%3A400%3Anormal”][vc_custom_heading text=”• Preparation for the certification audit.” font_container=”tag:p|font_size:17px|text_align:left|color:%23737e80|line_height:32px” google_fonts=”font_family:Muli%3A300%2C300italic%2Cregular%2Citalic|font_style:400%20regular%3A400%3Anormal”][/vc_column_inner][/vc_row_inner][/vc_column][vc_column width=”1/2″ css=”.vc_custom_1496947065122{padding-right: 0px !important;padding-left: 0px !important;}”][ra_content_box style=”s12″ image=”13133″ primary_color=”#ffffff”][/ra_content_box][/vc_column][/vc_row][vc_row full_width=”stretch_row” equal_height=”yes” content_placement=”middle” css=”.vc_custom_1600168558261{padding-bottom: 110px !important;}”][vc_column width=”5/6″ align=”text-lg-center” offset=”vc_col-sm-offset-1″][vc_empty_space height=”110px”][vc_custom_heading text=”Strongstep provides support services for the implementation and certification in the ISO 27001 standard with an experienced
team and its own methodology.” font_container=”tag:h2|font_size:28px|text_align:center|color:%237f7f7f|line_height:48px” google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:400%20regular%3A400%3Anormal” css_animation=”fadeInUp” css=”.vc_custom_1600800156628{margin-top: -30px !important;}”][ra_button style=”btn-default” shape=”circle” size=”btn-md” border=”border-thicker” text=”text-uppercase” others=”wide” title=”Implement in your company” link=”url:%20%23section-formulario||target:%20_blank|” primary_color=”#ffffff” text_color=”#6f14f1″ htext_color=”#ffffff” lh=”1.75em” fw=”700″ css=”.vc_custom_1600800332597{margin-right: 50px !important;margin-bottom: -30px !important;}” hbg=”#6f14f1″ bc=”#6f14f1″ hbc=”#6f14f1″][vc_empty_space height=”80px”][/vc_column][/vc_row][vc_row enable_responsive_options=”yes” css=”.vc_custom_1600163842248{margin-top: -140px !important;padding-top: 185px !important;padding-bottom: 100px !important;}” responsive_css=”padding_top_desktop:200|padding_bottom_desktop:50|padding_top_tablet:200|padding_bottom_tablet:0″][vc_column][vc_custom_heading text=”Testimonials” font_container=”tag:h2|font_size:42px|text_align:center|color:%23000000|line_height:62px” use_theme_fonts=”yes” css_animation=”fadeInUp” css=”.vc_custom_1600165280698{margin-right: 40px !important;margin-bottom: 25px !important;}”][vc_empty_space][ra_testi_slider][ra_testi author=”EBANKIT CERTIFICATION (ISO 27001)” image=”15650″]ebankIT joins the small elite of international companies with ISO 27001, COSO & GDPR certification with the support of Strongstep.

WATCH VIDEO[/ra_testi][ra_testi author=”INNOWAVE CERTIFICATION ISO 27001 + GDPR” image=”12069″]Strongstep supports InnoWave to obtain international information security certification (ISO27001) respecting data protection (GDPR).

WATCH VIDEO[/ra_testi][/ra_testi_slider][/vc_column][/vc_row][vc_row enable_responsive_options=”yes” css=”.vc_custom_1585663986577{margin-top: -80px !important;padding-top: 75px !important;padding-bottom: 145px !important;}” responsive_css=”padding_top_tablet:50|padding_bottom_tablet:100|padding_top_mobile:25|padding_bottom_mobile:50″][vc_column width=”2/3″ offset=”vc_col-md-offset-3 vc_col-md-6 vc_col-sm-offset-2″][vc_custom_heading text=”Consulting Services” font_container=”tag:h2|font_size:42px|text_align:center|color:%23000000|line_height:62px” use_theme_fonts=”yes” css_animation=”fadeInUp” css=”.vc_custom_1600165612646{margin-bottom: 25px !important;}”][vc_empty_space][/vc_column][vc_column width=”1/3″][ra_content_box style=”s10″ show_button=”yes” ib_style=”btn-naked” ib_text=”text-uppercase” ib_i_type=”fontawesome” ib_i_align=”right” title=”CMMI Development” image=”13536″ ib_title=”KNOW MORE” ib_i_icon_fontawesome=”fa fa-long-arrow-right” ib_i_color=”#ffffff” title_size=”17px” ib_link=”url:https%3A%2F%2Fstrongstep.pt%2Fen%2Fservices%2Fcertification%2Fsoftware%2Fcmmi-for-development%2F|||”][/ra_content_box][/vc_column][vc_column width=”1/3″][ra_content_box style=”s10″ show_button=”yes” ib_style=”btn-naked” ib_text=”text-uppercase” ib_i_type=”fontawesome” ib_i_align=”right” title=”GDPR” image=”13532″ ib_title=”KNOW MORE” ib_i_icon_fontawesome=”fa fa-long-arrow-right” ib_i_color=”#ffffff” title_size=”17px” ib_link=”url:https%3A%2F%2Fstrongstep.pt%2Fen%2Fservices%2Fcertification%2Fsecurity%2Fgdpr%2F|||”][/ra_content_box][/vc_column][vc_column width=”1/3″][ra_content_box style=”s10″ show_button=”yes” ib_style=”btn-naked” ib_text=”text-uppercase” ib_i_type=”fontawesome” ib_i_align=”right” title=”ITMARK DEVELOPMENT” image=”13325″ ib_title=”KNOW MORE” ib_i_icon_fontawesome=”fa fa-long-arrow-right” ib_i_color=”#ffffff” title_size=”17px” ib_link=”url:https%3A%2F%2Fstrongstep.pt%2Fen%2Fservices%2Fcertification%2Fsoftware%2Fitmark-for-development%2F|||”][/ra_content_box][/vc_column][/vc_row][vc_row full_width=”stretch_row_content_no_spaces”][vc_column align=”text-center” css=”.vc_custom_1489502385447{margin-bottom: 160px !important;}”][ra_button style=”btn-v-line” vline_direction=”line-bottom” text=”text-uppercase” title=”Request a proposal” link=”url:%23|||” text_color=”#000000″][/vc_column][/vc_row][vc_row css=”.vc_custom_1600168049377{background-color: #fcfcfc !important;}” el_id=”section-formulario”][vc_column][vc_custom_heading text=”Contact Form” font_container=”tag:h2|font_size:20px|text_align:left|color:%234c4c4c|line_height:62px” google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:400%20regular%3A400%3Anormal”][vc_custom_heading text=”We are here to help you! Get in touch with us.” font_container=”tag:h2|font_size:23px|text_align:left|color:%234c4c4c|line_height:62px” use_theme_fonts=”yes” css=”.vc_custom_1600165846958{margin-top: -40px !important;}”]

Request more information.
[vc_column_text]By submitting your data, you are agreeing to our  Privacy Policy.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_empty_space height=”100px”][/vc_column][/vc_row]

Open chat
💬 Podemos ajudar? / Can we help?