CYBER SECURITY

CYBER SECURITY

Cyber

CYBER SECURITY PRODUCTS AND SERVICES

Security 

Cyber Security department is a specialized facility in products implementation, customization and security services provision, molded according customer requirements, needs and his field specific threats in which he operates.

Cyber products and services

Cyber Security department is a specialized facility in products implementation, customization and security services provision, molded according customer requirements, needs and his field specific threats in which he operates.

OUR SERVICES

Innovery is set up in ICT world as a System Integrator with a targeted offer to medium and big companies, claiming an important experiences portfolio in these areas:

■ Security Privacy Governance
Advisory services to support the company in the overall compliance process of adapting its organization and technology infrastructure to comply with privacy regulation and international security standards (GDPR, ISO 27001, PSD2, etc.). Our services concern: due diligence, assessment, gap analysis, risk analysis. compliance roadmap, policies and procedures, privacy by design & by default, incident & data breach management, security training & awareness, etc.
Customers: Finance,Utility,Telco.
Certifications: ISO 27001 Lead Auditor, PMI-PMP, PRINCE2, European Privacy Auditor ISDP 10003:2015, ITIL, CFPS, etc.

■ Identity & Access Management
Our certified consulting team provides expert advice and creates customized concepts that provide the blueprint for optimized IAM solutions:
Consulting. Analyze your specific customer system landscape and then create an IAM solution tailor-made to your requirements;
Implementation. Support our customers throughout all stages of their identity and access management project.
Customization. Experience has shown that quite all IAM projects give rise to highly individual requirements that cannot match by means of configuration. In such a case Innovery can perform the required adaptation development services to meet even the most complex customer-specific demands.
Training. Ensure that all project stakeholders are well prepared and have the know-how required to govern IAM projects quickly, effectively and successfully.
Customers: Finance, Public Administration, University.
Technology: Oracle, Forgerock, IBM Identity and access management.

■ E-government
Our eGovernment mission is to provide implementation of standards-based interoperable Public-Key Infrastructure (PKI) tailored to private and public customers, related to: Legal PKI (compliance with eIDAS Rules; assessment); Enterprise PKI (strong and/or secondary authentication; s/mime encryption; key recovery process) ; RA system with SOA interfaces for third-party sw integratrion; CA and RA event registration and correlation; Innovery team provide consultancy to customer’s stakeholders to support environment design and CA personalization together with certificates that have to be used, their trust degree towards legal liabilities and security requirements within customer’s ICT infrastructure. Implementation and integration of a Remote Signature Infrastructures, Electronic Advanced Signature, Encryption, authentication.
Customers: Utility, Telco, Energy, Finance.
Technologies: Entrust, EJBCA, Gemalto SafeNet, Thales, Microsoft.

■ Ethical Hacking/Forensic Analysis
VA/PT Scada
Mobile VA / PT

Through its security monitoring center, Innovery is able to offer Vulnerability Assessment and Penetration testing services in order to verify the solidity and security of the customer’s infrastructure and applications. Activities can be carried out either remotely or at the customer’s location, depending on the needs and context of reference.

Customers: Utility, Finance, Energy, Telco, Public Administration, University.
Technologies: HP Fortify, NMAP, NESSUS, Qualys.
OpenSource – Best practices: OWASP Testing Guide v.3, ANSI/ISA99 Series, NERC CIP-002 through CIP-009 –, DoE/ES-ISAC Guidelines, NIST SP 800-82.
Certifications: CCNA Security, CCNP Security, CCIE, SANS,CISA, CISM, CISSP.

■ Fraud Management
Design, supply,
implementation and
integration of technological platforms to address fraud issues regarding credit card, debit card, check and money-laundering frauds within the bank environment.
Customer: Finance.
Technologies: Nice Actimize, ThetaRay.

■ System Integration And Delivery Services

From consultation and plannning to implementation activities and delivery, designed to meet different needs and provide customers with the most effective support options for their organizations that meet their specific requirements.
Customers: Utility, Energy, Public Administration.
Technologies: Hadoop HDFS, Flume, Spark, Solr, ZooKeeper.
Certifications: Hadoop, Spark.

■ Network Security

Thanks to its certified staff Innovery provides specialized services for installing, configuring, and integrating customer data security and infrastructure technologies such as firewall, endpoint protection, IDS / IPS, APT products from major vendors on the market.
Customers: Utility, Public Administrations, University.
Technologies: Forcepoint, McAfee, SentinelOne, Cyberbit, Fireeye.

■ SECURITY OPERATION CENTER

Design, integration and implementation of SOC infrastructure, including software and hardware deployment and technical support. Our Infrastructure is based on Security Information and Event Management (SIEM) market solution. Monitoring, control and detection of abnormal activities on networks, systems and applications by detecting, correlating and interpreting the logs generated by any single component of the monitored infrastructure 24 hours per day for 365 days per year.
Customers: Utility, Finance, Energy, Telco.
Certifications: CCNA Security, CCNP Security, CCIE, CISA

■ Security Privacy Governance
Advisory services to support the company in the overall compliance process of adapting its organization and technology infrastructure to comply with privacy regulation and international security standards (GDPR, ISO 27001, PSD2, etc.). Our services concern: due diligence, assessment, gap analysis, risk analysis. compliance roadmap, policies and procedures, privacy by design & by default, incident & data breach management, security training & awareness, etc.
Customers: Finance,Utility,Telco.
Certifications: ISO 27001 Lead Auditor, PMI-PMP, PRINCE2, European Privacy Auditor ISDP 10003:2015, ITIL, CFPS, etc.

■ Identity & Access Management
Our certified consulting team provides expert advice and creates customized concepts that provide the blueprint for optimized IAM solutions:
Consulting. Analyze your specific customer system landscape and then create an IAM solution tailor-made to your requirements;
Implementation. Support our customers throughout all stages of their identity and access management project.
Customization. Experience has shown that quite all IAM projects give rise to highly individual requirements that cannot match by means of configuration. In such a case Innovery can perform the required adaptation development services to meet even the most complex customer-specific demands.
Training. Ensure that all project stakeholders are well prepared and have the know-how required to govern IAM projects quickly, effectively and successfully.
Customers: Finance, Public Administration, University.
Technology: Oracle, Forgerock, IBM Identity and access management.

■ E-government
Our eGovernment mission is to provide implementation of standards-based interoperable Public-Key Infrastructure (PKI) tailored to private and public customers, related to: Legal PKI (compliance with eIDAS Rules; assessment); Enterprise PKI (strong and/or secondary authentication; s/mime encryption; key recovery process) ; RA system with SOA interfaces for third-party sw integratrion; CA and RA event registration and correlation; Innovery team provide consultancy to customer’s stakeholders to support environment design and CA personalization together with certificates that have to be used, their trust degree towards legal liabilities and security requirements within customer’s ICT infrastructure. Implementation and integration of a Remote Signature Infrastructures, Electronic Advanced Signature, Encryption, authentication.
Customers: Utility, Telco, Energy, Finance.
Technologies: Entrust, EJBCA, Gemalto SafeNet, Thales, Microsoft.

■ Ethical Hacking/Forensic Analysis
VA/PT Scada
Mobile VA / PT

Through its security monitoring center, Innovery is able to offer Vulnerability Assessment and Penetration testing services in order to verify the solidity and security of the customer’s infrastructure and applications. Activities can be carried out either remotely or at the customer’s location, depending on the needs and context of reference.

Customers: Utility, Finance, Energy, Telco, Public Administration, University.
Technologies: HP Fortify, NMAP, NESSUS, Qualys.
OpenSource – Best practices: OWASP Testing Guide v.3, ANSI/ISA99 Series, NERC CIP-002 through CIP-009 –, DoE/ES-ISAC Guidelines, NIST SP 800-82.
Certifications: CCNA Security, CCNP Security, CCIE, SANS,CISA, CISM, CISSP.

■ Fraud Management
Design, supply,
implementation and
integration of technological platforms to address fraud issues regarding credit card, debit card, check and money-laundering frauds within the bank environment.
Customer: Finance.
Technologies: Nice Actimize, ThetaRay.

■ System Integration And Delivery Services

From consultation and plannning to implementation activities and delivery, designed to meet different needs and provide customers with the most effective support options for their organizations that meet their specific requirements.
Customers: Utility, Energy, Public Administration.
Technologies: Hadoop HDFS, Flume, Spark, Solr, ZooKeeper.
Certifications: Hadoop, Spark.

■ Network Security

Thanks to its certified staff Innovery provides specialized services for installing, configuring, and integrating customer data security and infrastructure technologies such as firewall, endpoint protection, IDS / IPS, APT products from major vendors on the market.
Customers: Utility, Public Administrations, University.
Technologies: Forcepoint, McAfee, SentinelOne, Cyberbit, Fireeye.

■ SECURITY OPERATION CENTER

Design, integration and implementation of SOC infrastructure, including software and hardware deployment and technical support. Our Infrastructure is based on Security Information and Event Management (SIEM) market solution. Monitoring, control and detection of abnormal activities on networks, systems and applications by detecting, correlating and interpreting the logs generated by any single component of the monitored infrastructure 24 hours per day for 365 days per year.
Customers: Utility, Finance, Energy, Telco.
Certifications: CCNA Security, CCNP Security, CCIE, CISA