The security technology offered focuses on the 7x24 monitoring of the cloud infrastructure (regardless of the cloud that it may be), observing problems of Identity Management and Access, Files with Malware, Open Ports, Expired Passwords, among many others, as well as providing constant visibility and a low-level forensic analysis of each problem for subsequent decision making.