Itway S.p.A. - ITWAY CYBER SECURITY SERVICES

Cyber Security - Security Consulting
Information Security or Cyber Security? When we move from the analysis of networks and the technology used to make IT security considering what can happen to people's lives following an attack, here we start talking about Cyber Security.
Security Consulting - FROM PREVENTION TO DEFENSE
Managed Security Services: managed IT security services
Managed Security Servicesis the technological platform that allows for prevention and defense, monitoring, thanks to a single control panel, the state of the IT security of companies.
Itway is certified ISO 9001:2015, ISO 27001:2013, certifications that attest to the quality of our services, including the monitoring of the functionality and security of the customers' Information Technology (IT) infrastructures, including MOC ( Monitoring Operation Center) NOC (Networking Operation Center), SOC (Security Operation Center) and assistance in IT security, CERT (Computer Emergency Response/Readiness Team) services. Furthermore, the innovative international standard for Operation Technology (OT) Cybersecurity (Cybersecurity for industrial plants) is enabled.
The services can be provided H24 / 365 days a year. Their primary objective is to increase profitability, optimize operating costs and improve data and process security through the outsourcing of services.

ASSESSMENT
Analysis and adaptation of security processes and procedures, ISO27001 and EC 62443STANDARD E LAW COMPLIANCE
GDPR-European Privacy Regulation (EU) 2016/679 Directive (EU) 2016/680 Legislative Decree 231/2001, Legislative Decree 196/03 PCI DSS and Business ContinuityETHICAL HACKING
Vulnerability Assessment, Penetration testing, Code analysis, SCADA and critical infrastructures, Reverse Engineering, Social EngineeringPROACTIVE SAFETY
Analysis and adaptation of the infrastructure. Introduction of new control instruments, environmental remediationCYBER RISK MANAGEMENT
Analysis, measurement and risk managementTRAINING AND AWARENESS
Continuous update on legal issues and new standards
Ethical Hacking
The highly critical of the information managed by the companies, sometimes make it necessary to photograph the security status of the systems.The activities of Ethical Hacking are among the most advanced from a technical point of view, as they also allow you to simulate real attacks by malicious hackers.
Advantages
These activities allow both to have an overview of the security status of company systems or applications, through automated or manual activities, and to simulate a real attack by external or internal users and therefore have a more complete view of the status. security of the infrastructure.1
VULNERABILITY ASSESSMENT
Activities aimed at assessing the security status of the application or the infrastructural components examined
2
VULNERABILITY MANAGEMENT
They offer a continuous management of the risks associated with the vulnerabilities found on the verified infrastructure
3
COMPUTER FORENSIC
Activity that allows the identification and extraction of computer data using appropriate methodologies that guarantee the integrity of the information
4
WI-FI ASSESSMENT
The activity of WiFi Security Probe is aimed at identifying any gaps in the security of the wireless infrastructure
5
SOCIAL ENGINEERING
Set of communication and persuasion techniques one aimed at inducing a predefined victim to perform actions with the aim of obtaining information and tools necessary for access to systems or resources of the company
6
EXPOSURE ASSESSMENT
Search and collection of data from available sources (OSINT), from the Surface Web, from the Deep and from the Dark Web to carry out a precise analysis of the company's exposure to any cyber attacks and the presence of exposed information
7
CODE REVIEW
The Code Review activity aims to examine the source code of the applications in order to identify any vulnerabilities
8
REVERSE ENGINEERING
Analysis details of devices or software in order to understand and analyze their behavior in depth
9
PENETRATION TESTING
Evaluate the status of the protections and security controls, carrying out a detailed in-depth analysis on a group of critical assets
10
RETURN PLANS
Implementation of the remediation plans from vulnerabilities found on an infrastructure or an application
11
SCADA - OT (INFRASTRUTTURE CRITICHE)
The security of SCADA systems and OT (Operational Technology) is one of the biggest challenges in the field of computer security, given the role of these systems in the industries and in the delivery of essential services