Espandi / Comprimi barra

 

adv slide uk

DISCOVER

Collection and analysis of information about the company in-house and on the Internet

 

1. OSINT Discovery

LET'S FIND OUT ALL THE INFORMATION ON THE INTERNET

Any cyber attack begins with the collection of public information about the domain, so it is critically important to know it, as hackers can do, in order to adequately protect yourself.

Information gathering is done by a proprietary tool that uses OSINT (Open Source INTelligence) methodology to analyze all public sources and collect existing information. This immense amount of data is then analyzed by our certified cyber specialists who select meaningful information and eliminate false positives.

 

The results from this service are:

  • An analytical report of the information collected (over 100 types of information)
  • A management report to present the main risks to which you are exposed and suggested corrective actions

 

2. ASSET INVENTORY

WE DETECT AND ANALYZE ALL ICT ASSETS IN THE COMPANY

The IT asset inventory service is used to detect, classify and learn about the characteristics of all technological elements in the company, such as personal computers, servers, mobile devices, printers, IoT, etc.

Once placed in a special repository, all hardware and software characteristics are collected by identifying the installed versions, and thanks to the connection with device and sw databases, update levels are verified by reporting vulnerabilities and the relative level of risk present in the sw versions used and any patches to be applied.

The results from this service are:

  • An analytical report of assets, their characteristics (sw version and patches) and vulnerabilities
  • A management report to present the main risks to which you are exposed and suggested corrective actions

 

3. RISK ASSESSMENT

WE IDENTIFY AND ASSESS ICT RISKS TO THE BUSINESS

Our IT risk management service is used to identify, assess and manage the risks associated with the use of technology within the company and their impacts on the business.

 

The risks are analyzed from various aspects particularly data security, the readiness of the systems for use by the business in carrying out its activities, and compliance with various applicable regulatory requirements (e.g., personal data protection).

The results from this service are:

  • An analytical report with an assessment of cyber threats and their severity
  • A business impact analysis, carried out in conjunction with management
  • A corrective action plan identified based on the priorities for action

CHECK

Verification with attack vectors of system security

 

Penetration Test 

  • in BLACKBOX mode: in this case, no information is provided about the infrastructure to be attacked. The penetration tester attempts to compromise the security of the infrastructure from the outside as is the case in most common cases.
  • In WHITEBOX mode: this is an assisted scenario simulation mode. The penetration tester receives in-depth information about the target and the infrastructure (e.g., network map, application access credentials,...). The information provided allows for an activity with increased coverage of possible attacks from the inside as well as the outside.

 

DoS o DDoS attacks:

DoS means Denial of Service and DDoS means Distributed DoS. The purpose is to understand the level of sensitivity of various assets to an overload of requests that can engender system failure and to assess the effects this disruption can have on the business

The results of these services are:

  • Reports on attack-sensitive entities in both summary form for management and detailed form for technicians

MANAGE

Infrastructure security management

WAF (Web Application Firewall)

Through the remote deployment of our WAF in the cloud it is possible to trace a domain-level security perimeter and through the ruleset engine using machine learning algorithms to have instant, continuous and constant protection.

 

SOC (Security Operation Center)

Remote specialist support, integrated with the WAF service, managed with our experts available 24x7 enables even medium-sized companies to have, at an affordable cost, coverage in terms of managing their company's security comparable to that of large organizations.

 

Specialized consulting and audits

Our ICT security and architecture specialists can support you in designing your infrastructure with a view to maximizing security and service continuity to ensure the highest level of peace of mind.

 

Auditing activities on relevant standards (ISO 27001, personal data protection, mandatory standards,...) supports your company in achieving certification or regulatory compliance goals.

Book an appointment

Ask for a free customized demo!

We can demonstrate live with a custom demo what we can do for your specific needs. Please feel free to contact us!

Let's talk