Case Study Vector
Reduced its critical vulnerabilities by over 90%
and gained full visibility into its infrastructure thanks to CITI’s continuous monitoring and security services
Key results
-90%
reduction in critical
internet-exposed vulnerabilities
within the first 3 months
99.98%
availability of monitored
infrastructure
-85%
reduction in incidents caused by
CPU and disk saturation
Juan Carlos Balboa
CTO of Vector
Shares how CITI has become their trusted partner in strengthening security, ensuring operational continuity, and achieving complete visibility over their critical infrastructure
The challenges
In an increasingly threat-exposed environment, Vector faced a critical need: to strengthen visibility and protection across its network perimeter, thereby reducing exposure to technological vulnerabilities. This was essential to address several strategic challenges such as:
- Ensuring operational continuity without interruptions caused by technical failures or vulnerabilities
- Providing comprehensive protection against both internal and external threats
- Having proactive monitoring of the health status of critical infrastructure
- Implementing a system for alerts, vulnerability management, and remediation
The solution
At CITI we designed a comprehensive, scalable technological solution and aligned with Vector’s critical business requirements, including the following key components:
- Implementation and configuration of Check Point firewalls and IDS/IPS sensors
- Deployment of monitoring agents across critical infrastructure (CPU, disk, network, memory)
- Continuous vulnerability management with regular scans and impact analysis
- 24/7 operation from CITI’s Security Operations Center (SOC), with real-time response
- Training Vector’s IT staff on new threats and best practices

Over 20 CITI specialists participated in the deployment of the solutions, including architects, engineers, SOC analysts, and vulnerability experts
With CITI’s support, Vector now operates a secure infrastructure, monitored 24/7, capable of anticipating risks, maintaining operational continuity, and ensuring regulatory compliance. This has transformed their tech strategy into a competitive advantage
Do you have cybersecurity or monitoring challenges?
We would like to help you strengthen your infrastructure
Compliance with ISO 27001, ISO 20000, CNBV y BMV

Information Security Certificate No. 2018CRI-059

IT Services Certificate No. 2021CRG155