Cyber security & Technology for Intelligence
Our offer in the Security domain includes services and products designed to strengthen governance models and security systems of critical infrastructures. Our products aim to make organisations more resilient against cyber attacks of various types (including illegal eavesdropping, malware, ransomware) through proprietary deception technologies and secure communications.
In the Technology for Intelligence domain, we have a proprietary big data and analytic platform at our disposal, which is scalable and customizable to adapt to individual use cases. The end goal is the effective use of a large set of structured and unstructured data for specific Data Intelligence purposes.
Services
Malware Analysis
The Malware Lab is our Research Centre that studies Evasion, Diffusion, Persistence and Infection techniques.
It analyses all major ongoing campaigns, identifying the way they work and the technologies used, as well as profiling the threat actors active on the scene. We have a dedicated honeynet, designed to analyse new malware campaigns targeting the national perimeter in real time.
Code Review
Our Code Review service is designed to proactively identify and mitigate software vulnerabilities, preventing potential system compromises. We combine the efficiency of automated tools, with the accuracy of manual analysis, adhering to the most common and effective Secure Coding standards, such as those outlined by OWASP and NIST.
Main activities:
- Source Code Analysis: in-depth examination to detect potential vulnerabilities and anomalies.
- Risk and Impact Assessment: classification of vulnerabilities according to severity and potential impact.
- Remediation and Optimisation Strategies: definition of action plans to correct vulnerabilities and improve code quality.
Tools used:
- Advanced Code Scanners: use of state-of-the-art static analysis tools for automated vulnerability detection.
- Standardised Inspection Frameworks: application of checklists and guidelines based on internationally recognised standards.
- Code Tracking Tool: change monitoring and version management to ensure code consistency.
- Proprietary Analysis Tools: in-house developed solutions for a customised and in-depth analysis.
Offensive Security
The goal of our Offensive Security Team is to identify and exploit vulnerabilities within a perimeter, testing the effectiveness of the security measures adopted and improving resilience against real attacks. Services include Vulnerability Assessment and Penetration Testing, conducted according to the White Box, Black Box and Grey Box approaches, in line with the leading international standards (OWASP, NIST, PTES).
Activities also extend to highly critical contexts, with deep domain expertise on:
- IoT devices and infrastructure (consumer, industrial, smart city)
- connected medical systems and health technologies (eHealth, medical devices)
- SCADA/ICS environments and OT infrastructures for industrial control
To assess security holistically, we also offer Red Teaming exercises, designed to simulate Advanced Persistent Threats (APTs), testing not only technological defences, but also human processes and response. With a view to Purple Teaming, we work with defensive teams (Blue Teams) to improve the ability to detect, contain and respond to attacks in real time.
Activities:
- Vulnerability Assessment
- Penetration Testing
- Red Teaming
- Social Engineering / Phishing Simulation
- Physical Security Testing
- Adversary Simulation
- Exploit Development
- Security Code Review
Digital Forensics and Incident Response (DFIR)
The Digital Forensics business unit primarily operates in the context of litigation, proceedings (criminal, civil, arbitration), fraud, corruption and intellectual property litigation.
This business unit includes a team of technical experts in IT incident response and forensic evidence acquisition. The laboratory where we operate is equipped with innovative technologies available on the market, allowing cases to be managed in compliance with data acquisition, integrity, and preservation procedures.
Activities:
- IT incident management using state of the art forensic methods
- Expert consultancy during judicial authorities’ proceedings
- Support in disputes relating to the design and implementation of hardware and software systems
- Documentary support for law firms in civil and criminal cases
- Risk exposure assessment of IT systems on the Internet
- Specialist consultancy supporting trademark protection
- PC and Smartphone malware remediation
- Support for the protection of know-how and loss of business information
- Support in cases of corporate disloyalty and termination of employment
Laboratories
Evaluation Centre (Centro di Valutazione accreditato - Ce.Va.)
The lab is accredited by the Italian Department of Security Intelligence (DIS) - Central Secrecy Office (UCSe) and its main objective is to assess the security of ICT products and systems that handle classified information. The evaluation centre is responsible for verifying the conformity of a product or system with pre-defined security requirements.
Evaluation Centre (Centro di Valutazione accreditato - Ce.Va.)
The lab is accredited by the Italian Department of Security Intelligence (DIS) - Central Secrecy Office (UCSe) and its main objective is to assess the security of ICT products and systems that handle classified information. The evaluation centre is responsible for verifying the conformity of a product or system with pre-defined security requirements.
Laboratory for Security Assessment (LVS)
Technical evaluation of commercial ICT products and systems (OCSI Organismo di Certificazione della Sicurezza Informatica).
Laboratory accredited by the Organismo di Certificazione della Sicurezza Informatica, OCSI, at the Agenzia per la Cybersecurezza Nazionale, for security assessments of products, systems and protection profiles according to the standards of the National Scheme.
SECURITY FOR SPACE
OUR VISION ON SECURITY OF DOMAIN SPACE