Managed Security Services

Prontocyber® infrastructure, made up of the Security Operation Centre team

TRANSFORMATIONAL

Security
Managed

  • Safety Monitoring and Incident Management (SOC)

  • Reporting

Buy

Security Monitoring

Incident Management (SOC)

The SOC, located in a restricted area to ensure the highest level of physical security, provides analysts with useful tools for Malware Reverse Engineering and a set of tools to identify security vulnerabilities and adopted attack techniques

An infrastructure often hosts different tools for monitoring and protecting end points. Firewalls and Antivirus are tools used daily to analyse the health of our network. The SOC supports the customer in collecting and standardising all data from these tools to facilitate reading and decision making.

One of the security measures used within the SOC is strong client authentication; this is a procedure aimed at validating user identification based on the use of two or more authentication elements (so-called 'two-factor authentication').

Combining security information management (SIM) and security event management (SEM), security information and event management (SIEM) offers real-time event monitoring and analysis, as well as monitoring and logging of security data for compliance or auditing purposes.

One of the activities provided by our SOC is troubleshooting, which is able to identify and solve a problem in the cyber architecture according to a logical and systematic root cause search process.

Adopting an effective threat hunting programme helps companies identify and root out threats hidden in their network, find out how they got in and take all possible countermeasures to prevent future attacks.

SOC ProntoCyber®service

The study of the vulnerabilities exploited makes it possible to simulate the attack and identify the countermeasures needed to secure the target systems

  • Real time monitoring

    Any access, action or change

  • Security Early Warning

    Any access, action or change to the system configuration that

  • Incident Response

    Any access, action or change to the system configuration that may provide an opponent with a persistent presence

  • Periodic Reporting

    Any access, action or change to the system configuration that may provide an opponent with a persistent presence

  • Monitoring solutions

    Any access, action or change to the system configuration that may provide an opponent with a persistent presence

Your work and that of your co-workers is important

ProntoCyber® is the cyber security company that helps you protect your business by providing its cyber security experts in case of cyber attacks and incidents

Regular ProntoCyber® reporting

A high-level reporting system for digital incident management

Protect your business

Reporting

Round-the-clock Reporting

The periodic reporting process to aid incident management contains performance indicators, trend reports and insights.

It is necessary to constantly implement new measures and solutions and to frequently evaluate the effectiveness of the protections one invests in. A fundamental and predominant part of an effective security strategy is therefore the definition and analysis of KPIs.

Reporting requires that for each incident resolved, all impacted services and possible remedies are taken into account. The theory of 'Learning by Doing' also allows us to set alarms on activities not monitored before.

Constant reporting from our technicians, useful for monitoring the health of infrastructures and applications.

Incident analysis is a key step in monitoring the infrastructure and identifying further vulnerabilities. Our experts will support you in the technical and legal investigation of the most relevant incidents in order to identify key data.

Adhere to the right security plan for your company.

ProntoCyber® prevention services minimise the risk of cyber-attacks by monitoring and blocking any malicious events.

Subscriptions Plans

Essential

see the price table

Premium

see the price table

Platinum

see the price table

Subscriptions Plans

CORE
  • Preliminary Risk Evaluation

  • Digital Emergency Response
    *Cyber/Legal Annual Tokens included

ADJACENT
  • Vulnerability Assessment

  • Penetration Test

  • Cyber Education

  • Email Phishing

TRANSFORMATIONAL
  • Consultation in drafting
    security procedures and policies

  • Consultation in the design
    of Cyber Resilient architectures

  • Security Monitoring
    and Incident Management Services (Security Operations Centre – SOC)

  • Log Management
    *licences on premise and SaaS

Essential

see the price table

  • 3 tokeni

  • Add-On

  • Add-On

  • Add-On

  • Add-On

  • Add-On
    (-5% off the Listed Price)

  • Add-On
    (-5% off the Listed Price))

  • Add-On

  • Add-On

Premium

see the price table

  • 6 tokeni

  • 1 per year

  • Add on

  • Free Trial 1 Month

  • 2 Campaigns

  • Add-On
    (-21% off the Listed Price)

  • Add-On
    (-21% off the Listed Price)

  • Add-On

  • Add-On

Platinum

see the price table

  • 8 tokeni

  • 2 per year

  • 1 per year

  • 4 Campaigns

  • Add-On
    (-33% off the Listed Price)

  • Add-On
    (-33% off the Listed Price)

  • Add-On

  • Add-On

Protect your work and that of your employees

The cyber security experts at ProntoCyber® are at your service with specific skills and know-how for handling cyber security incidents

Contact us

Policy

The information contained herein is subject to change without notice. The only guarantees regarding PRONTOCYBER® services are those set out in the General Terms and Conditions accompanying these services. Nothing contained herein may be construed as an additional guarantee. PRONTOCYBER® accepts no liability for technical or editorial errors or omissions contained herein.

  • The Digital Emergency Response services covered by the Core Subscription are provided in accordance with the relevant Service Description for the established period (initial or renewal) of the Subscription.

  • CY4GATE undertakes to utilise all means at its disposal to resolve security incidents (best effort) in the shortest reasonable time possible without any obligation in terms of outcome.

  • The timing and means of intervention are set out in the General Terms and Conditions, in the Annex on the Core Subscription Service SLAs.

  • Tokens are issued following sign-up (with the number of tokens depending on the type of subscription).

  • The availability of tokens is determined upon the expiry of a predetermined two-week period. If immediate availability is required, a variation in price must be accepted, taking into account the urgency in accordance with the objective criteria established.

  • Cyber Assessment services include a Vulnerability Assessment and Penetration Testing, provided in accordance with the relevant Service Description for the period (initial or renewal) established in the Subscription

  • Cyber Awareness services include Cyber Education and Phishing Campaigns, provided in accordance with the relevant Service Description for the period (initial or renewal) agreed upon in the Subscription.

  • Throughout the duration of the Contract and without prior notice, CY4GATE may perform checks on the valid activation of the Service. Such verifications may also be carried out with the aid of computer programmes.

  • By their very nature, the activities performed by the Company are subject to constant technological and regulatory evolution that necessitate continuous and onerous updating and development activities required to guarantee the correct and complete provision of the Cyber Security Service.

  • In consideration of the foregoing, the Company maintains the right to modify the Fee even beyond the ISTAT Index.

Copyright © 2013-present Magento, Inc. All rights reserved.