Data security

Xtranet provides technical and management consultancy services applied to IT security, with the aim of supporting institutions and companies in the development of Cyber ​​Risk Management strategies. Years of experience allow us to secure access to your organization’s data through preventive analysis and planning. In the event of an attack, we intervene with the best immediate defense solution.

  • Compliance Assessment: complete picture of the degree of compliance with the requirements addressed by the national and international regulations and standards applicable to the Customer’s context, in terms of Information Security and Privacy.
  • Security Certification Support: consultancy on Gap Analysis, Information Security Management System implementation and Certification maintenance.
  • Policy & Procedures Implementation: implementation and updating of a system that represents the various entities that make up the information assets.
  • Risk Evaluation & Security Planning: risk assessment and definition of recovery actions through specific security plans.
  • Data Protection Impact Assessment (DPIA): assessment of the risks of violation of the rights and freedoms of natural persons resulting from the processing of personal data, carried out in any manner (automated or manual) and with the aid of any digital medium.

Business Continuity

How long can your company’s activity stop?
Due to human error, but also natural events, operations may be interrupted for a few hours, or for several days. Xtranet offers cyber security services and solutions, essential to guarantee the continuity of your business.
Among the most frequent causes we find simple breakdowns, electricity interruptions, flooding, employee errors or distractions, cyber attacks, theft, sabotage and intentional damage. Less frequent, but more devastating are disasters due to fires and natural events such as floods or earthquakes.
We offer vulnerability assessment and penetration test services on the entire technological and organizational infrastructure, identifying the weak points present on workstations, servers, network devices and exposed applications/services. In line with the assessment of critical company assets, priorities are established and an intervention plan is provided.

Data Loss Prevention

  • Vulnerability Scanning: network vulnerability and data access examinations.
  • Security Plan: creation of the security plan for the network and corporate information systems, i.e.: network, host, physical access to environments, data and users, with drafting of the customized best practice security protocol.
  • Intrusion Detection: detection of unauthorized intrusions on the company data network.
  • Virus and Spyware Remotion: detection and removal of spyware/Malware.
  • Network Security: solutions for controlling traffic at strategic points of the information system and allowing rapid diagnosis in the event of alert/warning.
  • Content Security: control customer application traffic such as web traffic or e-mail, distinguishing what is potentially risky from what is legitimate and must be allowed.
  • Cyber ​​Security Assessment: knowledge of one’s weak points and scheduled control.