Incident Response Services

IT security experts with specific skills and know-how in handling cyber-attacks are at your service to restore the proper functioning of services impacted by an incident.

INSTANT RESCUE

Incident Response
Services

  • Cyber Task Force

  • Legal Assistance

Cyber Task Force

The main objectives of Cyber Task Force

The ProntoCyber® team of analysts, in collaboration with the operational teams managing your infrastructure, shall provide support and resolve all problems indicated.

Determine the incident that occurred by pinpointing errors, weaknesses and strategies adopted for handling such.

The right technical operation renders it possible to detect the attack and minimise the damage.

The forensic analysis of attack-related information is a key step in legal action.

Nowadays, web reputation is increasingly important – with our expertise, it is constantly defended.

During a cyber-attack, the privacy of your data can be compromised, yet this can be prevented with the right techniques.

Learn from past attacks to prevent future ones – ProntoCyber® improves responses to future incidents.

Defend yourself against computer security incidents

ProntoCyber® can actively defend you from all types of computer security incidents.

  • Persistence

    Qualsiasi accesso, azione o modifica

  • Escalation of privileges

    Qualsiasi accesso, azione o modifica della configurazione di sistema che

  • Defence evasion

    Qualsiasi accesso, azione o modifica della configurazione di sistema che possa fornire a un avversario una presenza persistente

  • Credential access

    Qualsiasi accesso, azione o modifica della configurazione di sistema che possa fornire a un avversario una presenza persistente

  • Discovery

    Qualsiasi accesso, azione o modifica della configurazione di sistema che possa fornire a un avversario una presenza persistente

  • Execution

    Qualsiasi accesso, azione o modifica della configurazione di sistema che possa fornire a un avversario una presenza persistente

  • Collection

    Qualsiasi accesso, azione o modifica della configurazione di sistema che possa fornire a un avversario una presenza persistente

  • Exfiltration

    Qualsiasi accesso, azione o modifica della configurazione di sistema che possa fornire a un avversario una presenza persistente

  • Command & Control

    Qualsiasi accesso, azione o modifica della configurazione di sistema che possa fornire a un avversario una presenza persistente

  • Denial of Service (Dos)

    Qualsiasi accesso, azione o modifica della configurazione di sistema che possa fornire a un avversario una presenza persistente

Protect yourself from data breaches and cybercrimes

The ProntoCyber® team will support you in the event of any data breach or any potential cybercrime encountered.

Contact Us

Legal Assistance

Legal Support in Case of Data Breach

We provide your company with legal professionals specialised in handling computer security incidents.

Prompt legal intervention provides clients with support in the event of a confidentiality breach or when unauthorised or accidental disclosure of or access to personal data occurs.

With ProntoCyber®, you have at your disposal legal professionals specialised in assessing the extent of an availability breach upon any inaccessibility to or loss or destruction of personal data, be it accidental or unauthorised.

With ProntoCyber®, you can defend yourself against an information integrity breach after any unauthorised or accidental alteration of personal data.

Support in the obligation to notify the Data Protection Authority

ProntoCyber® helps you manage notifications to the Personal Data Protection Authority, which is required in the event that the breach poses a risk to the rights and freedoms of individuals.

Your work and that of your employees is important

ProntoCyber® is the IT security company that helps you protect your business by making available to you its cyber security experts to help in the event of cyber-attacks and incidents.

Policy

The information contained herein is subject to change without notice. The only guarantees regarding PRONTOCYBER® services are those set out in the General Terms and Conditions accompanying these services. Nothing contained herein may be construed as an additional guarantee. PRONTOCYBER® accepts no liability for technical or editorial errors or omissions contained herein.

  • The Digital Emergency Response services covered by the Core Subscription are provided in accordance with the relevant Service Description for the established period (initial or renewal) of the Subscription.

  • CY4GATE undertakes to utilise all means at its disposal to resolve security incidents (best effort) in the shortest reasonable time possible without any obligation in terms of outcome.

  • The timing and means of intervention are set out in the General Terms and Conditions, in the Annex on the Core Subscription Service SLAs.

  • Tokens are issued following sign-up (with the number of tokens depending on the type of subscription).

  • The availability of tokens is determined upon the expiry of a predetermined two-week period. If immediate availability is required, a variation in price must be accepted, taking into account the urgency in accordance with the objective criteria established.

  • Cyber Assessment services include a Vulnerability Assessment and Penetration Testing, provided in accordance with the relevant Service Description for the period (initial or renewal) established in the Subscription

  • Cyber Awareness services include Cyber Education and Phishing Campaigns, provided in accordance with the relevant Service Description for the period (initial or renewal) agreed upon in the Subscription.

  • Throughout the duration of the Contract and without prior notice, CY4GATE may perform checks on the valid activation of the Service. Such verifications may also be carried out with the aid of computer programmes.

  • By their very nature, the activities performed by the Company are subject to constant technological and regulatory evolution that necessitate continuous and onerous updating and development activities required to guarantee the correct and complete provision of the Cyber Security Service.

  • In consideration of the foregoing, the Company maintains the right to modify the Fee even beyond the ISTAT Index.

Notice

The information contained herein is subject to change without notice. The only warranties for PRONTOCYBER® services are those set forth in the General Terms and Conditions accompanying such services. Nothing herein should be construed as an additional warranty. PRONTOCYBER® disclaims any liability for technical or editorial errors or omissions contained herein.

  • The Incident Response Retainer services included in the core subscription are provided in accordance with the relevant Service Description for the agreed period (initial or renewal) of the Subscription.

  • CY4GATE commits to using all available resources to resolve security incidents (best effort) as quickly as reasonably possible without obligation of result.

  • Timing and methods of intervention are outlined in the general conditions, in the attachment related to the SLA of the Core Subscription service.

  • Token release occurs after subscription is signed (the number of tokens depends on the type of subscription).

  • Token availability is established after a predefined period of two weeks. If immediate availability is required, a price adjustment is accepted to account for the urgency, according to established objective criteria.

  • Cyber Assessment Services include Vulnerability Management, Risk Exposure Evaluation, Phishing Simulation Campaign, and Penetration Testing, and are provided in accordance with the relevant Service Description for the agreed period (initial or renewal) of the Subscription.

  • Cyber Awareness services include the Cyber Awareness Program and are provided in accordance with the relevant Service Description for the agreed period (initial or renewal) of the Subscription.

  • During the Contract term and without notice, CY4GATE may conduct checks on the valid activation of the Service. Such checks may also be performed with the assistance of software programs.

  • The activities provided by the Company are subject to constant technological and regulatory evolution, requiring ongoing and costly update and development activities to ensure the correct and complete provision of the Cyber Security Service.

  • As a result, the Company will have the right to adjust the Fee even above the ISTAT index.

Copyright © 2013-present Magento, Inc. All rights reserved.