Unique insurance scheme
Secure technology assets
Control the accesses and actions of privileged accounts in the technological assets of your company.
Agile | Simple | Safe
Create robust, unified and personalized security policies according to your company's security strategy.


Specialized in environments
TELECOM AND IT
Personalized
Customize according to the needs of your company, it is 100% configurable.
Flexible and scalable
Integrate your current and future assets with Red Cricket.
Secure
Protect all your assets and unify security levels.
Make your project successful
Red Cricket Consulting
Solving problems related to projects.
Coverage of a gap.
Advanced management analysis.
Project management according to the best practices, from the PMBOK® Guide.
Ensure the success of your projects.

ISO/IEC 27 001 – 2013
Mejores prácticas en protección de la información
Taller virtual presentado en el taller virtual de PROMTEL por la Ing. Verónica Calderón.
Contra el robo de identidad
¿Qué es DMARC?
Protocolo revolucionario que le ayuda a proteger su marca, clientes y proveedores del Phishing.
Red Cricket
Retos del acceso privilegiado
El futuro del acceso privilegiado en infraestructuras informáticas y como solucionarlo con herramientas especializadas.
Interface
Totally intuitive
Powerfully functional anti-vulnerabilities minimalist design.












COMM
Insured TELECO equipment.
Data
Insured databases.
IT
Insured IT equipment.
Networking
Insured network equipment.
Expert team
Red Cricket Support
We have a support service, in which our specialized team provides a response, complying in a timely manner with the SLAs of your organization.
Guarantee the operation of information systems in a fast, timely and accurate way.
Keep an excellent response time to any incident.
Save excessive expenses in critical situations caused by lack of support in the event of any incident.
Increase the productivity of your operational team.

Single Sign - On
Create standard access policies from a centralized point, to the various assets of your organization.
Privileges
Define the access privileges and activities that privileged users can perform.
Access by time
Generate custom access to your assets for custom time ranges.
Vault
Protection and custody of the activities carried out by privileged users during their operation.
Geo-Redundancy
Keep the operation of your assets always available from any physical point.
Analytics
Audit the activities carried out and blocked in your technological assets.
Contact
Red Cricket
LATAM
CDMX, México. Tel.: +52 (55) 5122 8965 redcricket.net
Full On Net
Europa
Madrid, España. Tel.: +34 91 406 16 99 full-on-net.com
CONIAN Technology
Caribe
Santo Domingo, Rep. Dominicana. Tel.: (809) 740-8080 coniantech.com