What we do

We at FeelSec can help you to protect your business. Providing awareness to your employees is fundamental as most information breaches are done by inside people, unintentionally compromising your company’s security. By conducting internal audits to identify risks we can help you identify specific assets, threats, and vulnerabilities, and show how you can raise your security maturity to a higher level. Infrastructures are vulnerable to a wide range of risks, not only IT related, and the most challenging elements of security are quickly and constantly evolving nature of security risks.


ISO/IEC 27001

The ISO/IEC 27001 provides a methodology for the implementation of information security management in your company. We can provide you with all the requirements and best practices for compliance by performing an internal audit in your company. We can also prepare you company to become certified.


The European Data Protection Regulation will be applicable as of May 25th, 2018. At FeelSec we have IT consultants and lawyers that can evaluate your company related to the requirements of the regulation (partnership with Trust Data Privacy).

Risk Assessment

The risk-based approach is very important for information security management, because it helps you identify the risks related to information security. In order for you to be able to protect your information, you need to know what kind of risks it is exposed to. We can define the risk management process for your company.

Our competencies

We have developed a clear competency framework that combines the knowledge that we have and the services that we provide. The framework covers knowledge and services of advanced security topics, ISO/IEC security related standards, risk assessment, penetration tests, innovative computing architecture solutions, information security awareness and crisis management exercises. Our team has several certifications and a strong academic background.

What else we do

Security related software

GLPI is an incredible Free and Open-Source ITSM software tool that helps you plan and manage IT changes in an easy way, solve problems efficiently when they emerge and allow you to gain legit control over your company’s IT budget, and expenses.

OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. The framework is part of Greenbone Networks' commercial vulnerability management solution from which developments are contributed to the Open Source community since 2009.

OpenIAM has grown into the number one open standards Identity and Access Management company in the world. It's architecture is second to none. It's products have not been clobbered together from acquisitions but have been built from the ground up on a common platform. Provision a user through the Identity Management product, and control this user’s access rights with the Access Management product.

Centralize logs from applications, network devices, operating systems, containers and more to diagnose and troubleshoot problems without learning a complex query language. Trigger alerts from common threats or automatically kick off a post incident investigation in response to an alarm from your existing SIEM. Cost effectively demonstrate due care by collecting, reporting, alarming and archiving all of your log data in one place.

Highly scalable mature platform designed for real-time monitoring of millions of metrics collected from thousands of devices, applications, cloud resources.

Crisis management exercises

Assess that your information security arrangements are working properly and are capable of facing crisis situations.

Penetration tests

Evaluate the security of your IT infrastructure or website by safely trying to exploit different types of vulnerabilities.

Information security awareness

Protect your company by training your employees on information security.

Our clients



Modelo Integrado de Atividades para a Gestão de Segurança da Informação, Cibersegurança e Proteção de Dados Pessoais

Design of a Case-Based Reasoner for Information Security in Military Organizations

Planning Method of Information Security for Military Organizations

Sensibilização e Treino em Cibersegurança - Exercício de Recolha de informação


Phone: +351 919 419 685 | +351 917 811 298