Our IT security services

We help our clients quickly and significantly raise the level of cybersecurity through innovative technologies and compliance with new regulations.

We offer a personalized service that reflects the needs of small, medium, and large enterprises.

XYLER Service

The technological proposal is based on the CSS platform to support the proprietary Autonomic Incident Response (AIR) framework for the implementation of an eXtended Detection & Response - XDR system:
  •  
    Framework (AIR): Detection coverage through technical mappings of the MITRE ATT&CK framework and the proprietary Autonomic Incident Response framework application, capable of identifying and qualifying alarms coming from the telemetry of the customer's systems/technologies at the perimeter
  •  
    SOAR / Incident Response - (owner tenant MSSP)
  •  
    SIEM / Security Data Lake - (owner tenant MSSP)
  •  
    Cybereason EDR System

Regarding the Endpoint Protection product, the Cybereason EDR solution or other solution will be integrated on all network nodes that allow this possibility.

Image placeholder

Servizio Cyber Security Awareness

  •  
    Some estimates even suggest that 80-90% of cyber incidents are attributable to human error or personnel misconduct. These errors include involuntary errors, due to the negligence and carelessness of internal company personnel, but also intentional errors committed by disloyal workers who sabotage their organization.
  •  
    For this reason, our trainers have collaborated to create a series of training courses on everyday topics, necessary to raise awareness of how certain behaviors are dangerous for the entire company and can undermine efforts and investments.
  •  
    For the Cyber ​​Security Awareness service, the customer's contact person will be asked for the list of names who will access the training. The required data will be: Name, Surname and email address.
Image placeholder

Email Security Service

We use our sandboxing technologies to analyze all links and documents. URLsand and QuickSand quickly analyze all links and documents for active code and evasive behavior. This prevents users from visiting dangerous links or receiving and opening malicious files.

Image placeholder

HoneyPot Service

A honeypot works by creating an isolated environment that simulates real resources or systems, but does not contain sensitive data. When an attacker attempts to exploit the honeypot's vulnerabilities, their actions are recorded and analyzed, providing security experts with valuable insights into the attackers' methods and techniques.

Image placeholder

MDR Managed Detection & Response Service

  •  
    Framework (AIR): Detection coverage through technical mappings of the MITRE ATT&CK framework and the proprietary Autonomic Incident Response framework application, capable of identifying and qualifying alarms coming from the telemetry of the customer's systems/technologies at the perimeter
  •  
    SOAR / Incident Response - (owner tenant MSSP)
  •  
    SIEM / Security Data Lake - (owner tenant MSSP)
  •  
    Cybereason EDR System

The XDR Service from the SOC will be provided remotely.

Image placeholder

SOC - Security Operation Center

  •  
    Security alarms and events are monitored in real time to ensure the availability and confidentiality of the IT systems through which business services are provided. Security event analysis includes classifying them into potential attack attempts or full-blown security incidents requiring escalation processes.
  •  
    Incident response activities include, in addition to traditional mitigation and blocking techniques, the ability to gather forensic information from the attack's target hosts and timely response activities to isolate hosts within the network.
Image placeholder