Within the service provided, the technological infrastructures and respective applications are audited to timely identify and correct any vulnerability in the infrastructure of customers that may pose risk to the confidentiality, integrity or availability of information.