Cyber Security

Cyber Security

Assessment and testing laboratories, proprietary technologies for threat analysis and data FUSION and specialised vertical cyber-intelligence expertise

Cyber Security

The result of a long-term innovation strategy, the Cyber Sec Business Unit was born from IPS's 30 years of experience in the world of Cyber Intelligence, evolving its business capabilities through the contribution of specific professional skills and in-depth knowledge of all areas of the national Cyber Resilience strategy.

The Unit is equipped with specific resources, both human and infrastructural, capable of supporting requests of different types and with extremely stringent requirements. This convergence has led to new solutions enable to address specialized requirements that complement existing market offerings. The resources deployed are aimed at both defensive and offensive activities.

In the Cyber Security domain, activities are divided into 4 areas: 
Proprietary Technology Development specializes in creating software tailored both to laboratory requirements and the needs of personnel, engaged in operational activities. It also covers activities related to adapting and evolving products for the market, as well as designing, planning and producing innovative solutions in the field of Malware Analysis and Cyber Data Fusion.

Operational activities support customers in completing tasks related to the Cyber domain and in effectively using the solutions that are developed and implemented.

The laboratories, relying on precise ACN (National Cybersecurity Agency) regulations, focus on ICT secuirty testing performance and on the different types of Software.

The Security Assessment Laboratory aims to certify products according to the Common Criteria standard (ISO 15408:2022).

The Accredited Testing Laboratory operates to carry out the testing of all devices which are intended to be deployed on government networks or on the infrastructure of the National Cyber Security Perimeter. The performed tests are both functional and invasive and aim to find out the security and risk level of the device, both software and hardware.

The assigned personnel has proficient expertise in penetration testing, code development, reverse engineering, bypassing of security measures, analysis of structured or unstructured data and red teaming ops.

Related features

Malware Analysis

Malware is a major threat in the IT landscape, for this reason it is essential to implement sophisticated prevention techniques. Malware Analysis deals with the analysis of anomalous codes in static (SAST), dynamic (DAST) and interactive (IAST) modes to identify their form, functioning and operation. In order to determine the security impact related to a given sample, special Reverse Engineering activities are also carried out, to extrapolate useful information for understanding the characteristics of the malicious code, and from these, to identify the necessary remediations.

Cyber Data Fusion

Tools capable of extracting meaningful information, from networks and systems (events, PCAP logs and data of any nature), in order to meet the challenges in a world where the hybrid threat is multifaceted and difficult to identify. In this context, an indispensable element is the ability to fuse large amounts of data (Big Data) and subsequent analysis by combining multiple innovative technologies including Artificial Intelligence (AI). The identification of new vulnerabilities requires an integrated approach that implements tools and methodologies resulting from years of experience by those who have made prevention their mission.

Cyber Threat Intelligence

Intelligence tool that identifies multiple weaknesses within an organization and adopts specific defense techniques for possible cyber attacks. This activity, especially intelligence gathering, is carried out through the use of various sources, and the resulting assets are made available to the entire structure. Therefore, the ultimate goal is to provide information regarding the risks coming from present and future threats, especially within the network, where all organizations are now connected to perform all or part of their business. In this scenario, many of the threats can hide permanently in information systems, hence the need for a tool capable of performing comprehensive understanding regarding the data collected on a potential threat, providing aggregation, interpretation and analysis capabilities.

Analysis and Testing Laboratory

The "Analysis and Testing Laboratory" operates according to the latest ACN guidelines for the verification and control of the security of assets used in national infrastructures. The Laboratory supports Institutions, Entities and Large Enterprises, both in the stages of technological transition and in the development and consolidation of their infrastructures.

Security Assessment Laboratories

Accredited by OCSI, the Security Assessment Laboratories perform evaluations of products/systems or protection profiles according to the National Scheme and under the supervision of the Certification Body. They also carry out customer support and training activities on security issues in the field of information technology in general and on evaluation techniques in particular.

Training

Thanks to its Academy, which has been active for many years, IPS also offers training courses in the field of Cyber Security, delivered by certified and experienced personnel.