Security & Infrastructure
Business Unit Security & Infrastructure, ISO Certificate 27001, is one of the Company’s points of excellence and is able to respond with a comprehensive approach to all needs in this area. We handle the design and implementation of systems and solutions for data security, infrastructure and systems, thanks to the professionalism of our resources and the availability of our personnel with certifications in various fields.
Our BU Security & Infrastructure implements comprehensive Security Governance, combining technological and process expertise to design, develop and manage solutions for security infrastructure, systems and networks. We provide highly specialized services ranging from conformity evaluation, Penetration Testing and Vulnerability Assessment, both in traditional infrastructure as well as the mobile environment. We provide solutions for Data Security (Database Firewall, Web Application Firewall, encryption / obfuscation, etc.), for Forensics, for Network Security and Event Management. We are experts in the field of specialist advice for risk analysis, for the definition of security management policies and procedures as well as performing compliance audits in relation to standards 196/03 and ISO27001.
The Mobile Security Lab, consisting of a team of professionals with a solid academic background and significant experience in the field, is a unit specializing in consulting and research in the Mobile Security sector. Operating since 2008, it has published numerous articles and participated in important security events. It continues to be a point of reference, both nationally and internationally, for the issues related to Mobile Security.
Vulnerability Assessment e Penetration Test
Our specialized security evaluation services (Vulnerability Assessment and Penetration Test), are intended to ensure an independent and objective evaluation of security levels of systems and platforms, according to methodologies and reference standards.
Secure Design e Security Assessment
We have considerable experience in the fields of Secure Design and Security Assessment, namely support to the safe design of software components and complete solutions, through techniques of reverse engineering analysis and evaluation of the robustness of mission-critical platforms.
We support our customers in the analysis of business processes in optical security, in the evaluation of organizational and technological risks and the implementation of proper business models.
We design, manufacture and manage Security Operation Centers, supporting the customer in identifying the organizational model, the definition of processes and operational management.
Data and Application Security
Design, implementation and management of solutions aimed at securing and monitoring application platforms and support to their databases.
Security Analytics e Network Forensics
Design, implementation and management of platforms for the collection and analysis of network traffic, the detection and prevention of threats and identification of routes of leakage of sensitive corporate materials.
Advanced Threat Prevention
Realization of solutions for the identification of advanced threats and protection against them, both at the endpoint level and at the network level.
Email Security e Reputation Services
Implementation of tools for e-mail security, the prevention of email-based fraud and the defense of “brand reputation”.
Virtual Infrastructure Security
Design, implementation and management of solutions for the security of the virtual infrastructure and platforms to support the delivery of services in the cloud.
Security Information and Event Management
Implementation of systems for the collection, analysis and archiving of trace data generated by IT platforms, both business and in support of operations and security.
Realization of solutions (Firewall, IDS / IPS, etc.) for the implementation of security policies of resources and network systems.
Logical Network Security
Implementation of solutions based on cryptographic techniques and micro segmentation, a network security support.
IT Asset Management
Design and supply of solutions for the effective management of IT assets, with the aim of rationalizing costs and improving response times against significant security events.
Network Lock Evasion
Study, through reverse engineering and dynamic analysis of the evasion techniques of Network Lock mechanisms (Sim Lock) implemented by telephone operators; identification and implementation of the relevant technology and process.
Secure Mobile Device Management
Mobile Device Management solutions for Android / iOS platforms, designed and built with particular attention to the confidentiality and integrity of the system.