CYBERSECURITY

We take care of the security of your corporate network, defending it against all types of attacks, whether they come from outside or within the corporate network. We respond to all connectivity issues in the LAN and WAN environment and manage and maintain active networks and equipment. In the Wireless sector we provide new radio communication technologies from WIFI to Bluetooth and RFID.

SERVICES

NETWORK SECURITY

• Perimeter Defense and Firewall
• Networks VPN (Virtual Private Network)
• Intrusion prevention systems (IDS)

WIRELESS SECURITY

We design and build secure wireless architectures.

DIGITAL RISK MANAGEMENT

Business continuity and disaster recovery projects.

INTERNAL SECURITY

• Authentication and internal control solutions
• Identity management
• Cryptography and PKI
• Digital signature

IT INFRASTRUCTURE

• Microsoft Systems and Networks: Windows 2012/2016 Microsoft Exchange server family; MS Back Office Solutions
• GNU/Linux: Red Hat, CentOS, Debian, Ubuntu, ecc…
• Unix: Sun Solaris, IBM Aix
• Open source systems: FreeBSD, OpenBSD, MacOS

RISK MANAGEMENT AND GLOBAL SECURITY MANAGEMENT

Information is a corporate asset and like all assets it has real economic value that can be measured and evaluated. The risks can come from many fronts such as cyber crimes, espionage, sabotage, vandalism and natural destructive events.
Then there are the specific computer risks such as Viruses, denial of service (denial of services) attacks, hackers attacks, which are increasingly frequent. The security of the information system requires, in order to achieve an effective and efficient system, the definition of a Risk Management Plan, which allows to design, plan, implement and manage the appropriate physical countermeasures, The European Commission’s Green Paper on Safety and Health at Work on the Safety of Workers and Workers at Work on the Safety of Workers.

SECURITY AUDIT

The Security Audit is a comprehensive diagnosis of the organizational structure and internal and external security in order to implement an IT risk management system. The project identifies and evaluates IT risks and elaborates a technological and organizational adaptation plan for IT risk mitigation and transfer.

– Identify and quantify IT infrastructure risks
– Classification of the information
– Provides recommendations based on test results to improve safety
– Represents a decision-making tool for business management

It also meets the control requirements provided by Italian legislation L. 231 and Privacy Code.

PENETRATION TEST

The Remote Penetration Test that consists in “attacking” the Firewalls, the Web servers, the Mail servers and in general the visible services from internet using the same tools and simulating the typical behavior of the hackers (ethical hacking) in order to highlight vulnerabilities and risks.

– Are we protected against cyber attacks?
– How do they see us and what could hackers do on our network?
– Has the firewall we have been configured properly?
– Our system was secure 2 months ago, is it still secure today?
– Is our image protected?

The answer is in the attack simulation via the Remote Penetration Test which consists of an independent verification, carried out by non internal personnel that shows exactly what a hacker could see or do and what are the risks to which he is exposed. It offers a precise evaluation and allows all subjects to ascertain and document the analysis of IT risks.

OUTSOURCING

FACILITY MANAGEMENT

It allows you to outsource infrastructure management while maintaining control over the operation of the information system.

OPERATIONAL MANAGEMENT

It allows you to outsource the operational responsibility of the information system.

FULL
OUTSOURCING

You can outsource the entire IT management activity by handing over the assets and/or personnel involved.