Areas of Application

SOC 4.0 and Cybersecurity

With the advent of Big Data and related analysis techniques, it is possible to use previously inaccessible and/or unusable data sources, correlating information also external to the IT world and considering business impacts by providing the results to interested stakeholders.

In 2018, 90% of organizations feel vulnerable to insider attacks, both voluntary and due to negligence, which mainly concern issues of users with too high privileged access, devices connected to the corporate network that are not monitored and the increase in IT complexity .

Often data is not centralized in internal silos but resides in external environments: this implies that there is no longer a static and well-defined perimeter that clearly separates the company from the outside world.

The “product-based” Cybersecurity, which makes only the technological part (DLP / AIM / PAM) its own, is destined to fail precisely because it is necessary to understand and integrate the business operations processes: so that security can become a value of the company , it is necessary to have an analytics engine that implements predictive algorithms of machine learning and neural networks for the advanced correlation of events.

Maritime

At our headquarters in Genoa we have configured a class “C” bridge simulator equipped with a station for instructors to manage all aspects of simulation training. Our simulator allows you to conduct various types of training, both commercial and educational, also recreating cyber attack scenarios on the vessel: through Anomaly Detection algorithms we are able to identify any unexpected behavior.

IoT and Industry 4.0

Data analysis allows companies to find out when machinery is about to break down and carry out the necessary maintenance before the machine is stopped or broken. Another element to consider is the reduction of costs for repairs, which in the case of highly specialized machinery weigh heavily in the budget of any company, whether small or large.

The development of sensors and the spread of broadband (both mobile and fixed) makes it possible to find data in any condition and geographical position.

Subscribe to the Newsletter!