Skip to main content
Logo GMV

Main navigation

  • Sectors
    • Icono espacio
      Space
    • Icono Aeronáutica
      Aeronautics
    • Icono Defensa y Seguridad
      Defense and Security
    • Icono Sistemas Inteligentes de Transporte
      Intelligent Transportation Systems
    • Icono Automoción
      Automotive
    • Icono Ciberseguridad
      Cybersecurity
    • Icono Servicios públicos Digitales
      Digital Public Services
    • Icono Sanidad
      Healthcare
    • Icono Industria
      Industry
    • Icono Financiero
      Financial
    • Icono Industria
      Services
    • All Sectors

    Highlight

    Incendios en España
    The increasing challenge of forest fires in Spain, and the response from space
  • Talent
  • About GMV
    • Get to Know the Company
    • History
    • Management Team
    • Certifications
    • Corporate Social Responsibility
  • Communication
    • News
    • Events
    • Blog
    • Magazine GMV News
    • Press Room
    • Media library
    • Latest from GMV

Secondary navigation

  • Products A-Z
  • GMV Global
    • Global (en)
    • Spain and LATAM (es - ca - en)
    • Germany (de - en)
    • Portugal (pt - en)
    • Poland (pl - en)
    • All branches and all GMV sites
  • Home
  • Sectors

Cybersecurity

We cover the entire cybersecurity life cycle: identify, protect, detect, respond, and recover

  • Print
Contact
GMV Cybersecurity
https://www.youtube.com/watch?v=Lub9mHOCMUE
Overview

Global handling of cyber risks

At GMV, we provide protection against advanced cyber threats for our clients and their most critical assets. We apply a comprehensive approach based on the five main elements of cybersecurity: identify, protect, detect, respond, and recover. We offer a broad range of services, including everything from protecting technological infrastructure to developing our own innovative solutions for operational resilience, regulatory compliance, and cyberdefense.

Our cybersecurity model is designed for compliance with European initiatives, as well as regulatory frameworks such as NIS 2, CRA, DORA, and the Spanish National Security Scheme (ENS), while addressing the need to build resilient organizations that can anticipate, resist, and recover from all types of cyber threats.

+ 30 years of experience in cybersecurity

for critical industries such as space, finance, healthcare, and industrial production 

Milestones

ATM

Use of the Checker ATM Security solution to protect more than 350,000 ATMs in nearly 40 countries and prevent physical and digital attacks on banking networks.

Centro de Operaciones de Ciberseguridad (SOC)

Cybersecurity responsibility and leadership for protecting the ground control segment of Europe’s satellite navigation system (Galileo) against critical cyber threats

GMV_CERT

Operation of the CyberSOC for the Spanish public-sector organization red.es, with the GMV‑CERT Center of Excellence providing services to strengthen cyber resilience in compliance with the National Cybersecurity Plan

cybersecurity

Awarding of the cybersecurity contract for Spain’s ports and port authorities, including aspects such as managed security services, regulatory compliance, and incident response in critical environments.

ciberinteligencia

Acceptance of GMV-CERT as a member of Europe’s Trusted Introducer Network (TF‑CSIRT), enhancing the company’s response and collaboration capabilities in the context of Europe’s incident response center ecosystem

np_011_presentacionincibe.jpg

Coordination of the Luis del Valle R&D and Innovation Program (INCIBE), which is developing a sovereign digital identity solution and an SOC focused on the space industry, as part of the Spain’s Strategic Initiative for Innovative Public Procurement.

np_028-imperva.jpg

Recognition as Imperva’s only Premier Partner in Spain, after more than 15 years of collaboration on data protection, applications, and digital identities in compliance with European regulations.

Crowdstrike

Recognition as Imperva’s only Premier Partner in Spain, after more than 15 years of collaboration on data protection, applications, and digital identities in compliance with European regulations.

Solutions and Services

Cybersecurity

Cybersecure Infrastructures
Visibility
  • In cybersecurity, you can’t manage what you don't know. A lack of knowledge is generally due to a lack of vision of what is happening.
  • It is possible to anticipate most cyber incidents by accurately analyzing many sources of information and if both the technology and professionals are prepared to manage it in real time or after the fact.
  • If you have access to your organization’s cybersecurity activity information, do you just store it or do you use it to make the best decisions?
Data
  • Data has become one an organization's most valuable assets, and thus boosting their appeal to criminals.
  • The digital transformation depends on data, so cybersecurity must be present by design and by default.
  • Data are generated, obtained, exploited, stored, transmitted… What cybersecurity and privacy controls do you apply in each of these stages?
     
Cloud
  • The cloud is here to stay in all sectors, handling data and running business-specific applications as a any other part of corporate infrastructure, though sometimes it is underused.
  • It offers a new, faster, larger-scale, and more robust way of providing cybersecurity services.
  • Do you leverage all of the capabilities offered by the cloud to detect advanced malware or stop denial of service attacks?
DevSecOps
  • DevOps is the new paradigm that is taking hold because of the benefits it offers when developing and rolling out corporate applications, which requires a working method.
  • DevSecOps incorporates cybersecurity controls into the different phases of the DevOps iterative cycle, integrating fully into that cycle.
  • How can the interests of the development, operations, and cybersecurity departments be aligned?  
     
Anti-fraud
  • Detecting and preventing fraud requires the best talent working with the best technology on multidisciplinary teams, however managing these teams is a real challenge. 
  • Artificial intelligence is a reliable method that can be fully customized to the type of fraud to be fought.
  • Do you make a positive contribution to the bottom line by fighting fraud effectively?
Incident, Role, and Access Management
  • Identity management is probably the key pillar of cybersecurity on all levels and, paradoxically, it tends to be pushed aside due to how difficult it is to define and implement.
  • It can be covered by the corporate scope, e.g., making it part of the entire organization's identity, specifically, e.g., managing privileged users, or globally, e.g., identity on the cloud for cases requiring mobility.
  • How are you going to manage your identity in the face of the imminent avalanche of IoT devices?
ATM Security

Checker ATM Security® is a world-class cybersecurity product specifically designed for ATMs and kiosks. Checker® will help you protect your ATMs from logical fraud while meeting applicable PCI-DSS requirements quickly and effectively, even for unsupported versions of the ATM operating system.

Products

Checker ATM Security®

Comprehensive and Effective Solution Designed for ATMs

Partners
cybersecurity
Consultancy
Vulnerability Management
  • Behind every cyberattack is an unresolved vulnerability that is taken advantage of by criminals.
  • It is not only a matter of discovering vulnerabilities in your systems, but also ensuring that they are resolved.
  • Would you know how to manage the vulnerabilities of thousands of assets in your organization?

Products

Gestvul

Vulnerability Management

 

Compliance
  • There is a growing number of laws and regulations that demand certain levels of cybersecurity and privacy, in addition to those previously on the books.
  • In addition to being mandatory, compliance is an opportunity to evolve the level of cybersecurity and privacy in your organization.
  • Would you be able to demonstrate that your organization has implemented the measures required by current legislation in the event of a reported cyber incident?
     
Forensic Analysis
  • The truth is that negligent behaviors must be from organized groups or even people from your organization must be organized.
  • Reconstructing past actions that have caused damage to the organization is a very effective improvement and learning method, determining the who, what, when, why, and how.
  • If your organization is the victim of data theft, how would you gather the evidence you need to determine liability?
     
GMV-CERT
Computer Security Incident Response Team

Cyberintelligence

  • GMV CERT is GMV’s Computer Security Incident Response Team (CSIRT).
  • GMV CERT is a comercial CSIRT that provides managed security services to its customer base.
Services

Reactive services

Proactive services

  • Incident handling
  • Security audits and assessments
  • Vulnerability handling
  • Pen Testing and ethical hacking
  • Forensics, artifact & evidence handling
  • Configuration and maintenance of security tools, applications, and infrastructures
 
  • Intrusion detection services
 
  • Security intelligence

 

 

 

Certificates
Certificates GMV-Cert
Contact
Teléfono

 

(+34) 902 46 46 01

Email

 

Generic

[email protected]

Incidents

[email protected]

Key GMV_Cert

 

PGP Key ID (Generic)

0x6542DA75

PGP Key ID (Incidents)

0x350850F0

Products
Biolock

User Control Access System

Checker ATM Security®

Comprehensive and Effective Solution Designed for ATMs

CosmicGuard

Safeguarding Space Mission Ground Segments

Gestvul

Vulnerability Management

 

GMV Penbot

AI-driven automated pentesting

resQit Remote Recovery

The enterprise-class solution for remote recovery of Windows systems

uTile

Welcome to information exchange 2.0

Success Stories

Media

Patricia Tejado
Video
Experiences and challenges for recruiting and retaining cybersecurity talent | #18ENISE
Programa Luis Valle
Video
Digital identity and space cybersecurity innovation, key elements of the Luis Valle Program
Quantumanía
Video
Quantumania: Hopes and realities | GMV
Javier Hidalgo
Video
45th Spanish Logistics Center (CEL) Conference - Javier Hidalgo, Solutions Architect and Cybersecurity Expert at GMV
Enrique Crespo
Video
Quantum technologies applied to cybersecurity - Enrique Crespo (GMV)
II Jornadas STIC
Video
2nd ICT Security (STIC) Workshops - Colombia Chapter | Cybersecurity in the post-quantum era - Óscar Gaspar
Presentación CIBER
Video
Presentation on GMV and the Innovative Public Procurement Cyber Scale project - Precommercial public procurement and cybersecurity
Incorporando la Ciberseguridad
Video
Incorporating cybersecurity into the industrial supply chain (Spain’s Industrial Cybersecurity Center)
Enrique Crespo
Video
Key principles for cryptographic migration (Enrique Crespo, GMV)
More media

News

XV Cloud Security Alliance Summit
  • Cybersecurity
15th Cloud Security Alliance Summit
18 Sep
Curso de Verano de la Universidad de Málaga
  • Cybersecurity
GMV shares expert insights on space cybersecurity challenges at the University of Málaga
Encuentro de la Economía Digital y las Telecomunicaciones
  • Cybersecurity
Digital Economy and Telecommunications Forum
01 Sep - 03 Sep
More news

Contact

Isaac Newton, 11 Tres Cantos
E-28760 Madrid

Tel. +34 91 807 21 00

Contact menu

  • Contact
  • GMV around the world

Blog

  • Blog

Sectors

Sectors menu

  • Space
  • Aeronautics
  • Defense and Security
  • Intelligent Transportation Systems
  • Automotive
  • Cybersecurity
  • Digital Public Services
  • Healthcare
  • Industry
  • Financial
  • Services
  • Talent
  • About GMV
  • Shortcut to
    • Press Room
    • News
    • Events
    • Blog
    • Products A-Z
© 2025, GMV Innovating Solutions S.L.

Footer menu

  • Contact
  • Legal Notice
  • Privacy Policy
  • Cookie Policy

Footer Info

  • Commitment to the Environment
  • Financial Information