Policy &
Procedures

Definition of security policies as a guide for the development and implementation of an information security management system

TRANSFORMATIONAL

Policy &
Procedures

  • Security Policy Consulting

  • Consultancy for designing Cyber Resilient Architectures

Buy

Security Policy Consulting

The Security of Your Information

The definition of security policies and procedures provides guidance on the development and implementation of an information security management system (ISMS) that will be able to meet the reference standards (ss. 27001).

Analysing the incident that occurred by identifying errors, weaknesses and strategies adopted for the management, improving the response to future incidents

The threat analysis process requires time and expertise. With numerous international cyber threat databases at their disposal, our experts can quickly define the attribution of an attack.

Attacks become more effective day by day and their goal is not just to strike in order to gain money, but to destroy so as to prevent those defending themselves from restoring their systems and data.

Prioritising current risks and supervising teams working in IT security is a key role. Our technical advice will enable you to implement the best security governance for your company.

The Information Security Management System helps your company identify technological and organisational measures to protect information assets from any threat.

ProntoCyber® Policies

Procedures implemented to protect information security

  • Governance security

    Any access, action or change

  • Asset management

    Any access, action or change to the system configuration that

  • Confidentiality management

    Any access, action or change to the system configuration that may provide an opponent with a persistent presence

  • Identity and Credentials

    Any access, action or change to the system configuration that may provide an opponent with a persistent presence

  • Security Monitoring

    Any access, action or change to the system configuration that may provide an opponent with a persistent presence

  • Patches & Backups

    MovimentoLaterale Any access, action or change to the system configuration that may provide an opponent with a persistent presence

  • Vulnerability Assessment

    Any access, action or change to the system configuration that may provide an opponent with a persistent presence

  • Mobile Devices

    Any access, action or change to the system configuration that may provide an opponent with a persistent presence

  • Vendor Management

    Any access, action or change to the system configuration that may provide an opponent with a persistent presence

Your work and that of your co-workers is important

ProntoCyber® is the cyber security company that helps you protect your business by providing its own cyber security experts in case of cyber attacks and incidents

Design your Cyber Resilient architecture

Consulting service for the definition of secure architecture models valid for the applications in use

Protect your business

Cyber Resilient Architectures

Design consultancy

The goal is to define a secure architecture model, understood as a set of technical specifications for segmentation, coordinated protection, redundancy, authentication, logging, in order to normalise the network insertion model.

Our expertise will enable you to build multi-layered architectures which use the most advanced security methodologies (protocols and multi-factor authentication).

To prevent today's threats, systems need verification at the time of access: complex passwords, two-factor authentication, token authentication, etc.

Do you want to certify that the product has been manufactured in accordance with the configuration requirements? Request a technical consultation.

Analysing the results obtained and predicting those to come can give a considerable architectural advantage. Assessment Review allows you to leverage our expertise for this analysis process.

SharePoint functionalities enable companies to go beyond simple content repositories, but also increase security risks, particularly when open to external parties.

Adhere to the right security plan for your company.

ProntoCyber® prevention services minimise the risk of cyber-attacks by monitoring and blocking any malicious events.

Subscriptions Plans

Essential

see the price table

Premium

see the price table

Platinum

see the price table

Subscriptions Plans

CORE
  • Preliminary Risk Evaluation

  • Digital Emergency Response
    *Cyber/Legal Annual Tokens included

ADJACENT
  • Vulnerability Assessment

  • Penetration Test

  • Cyber Education

  • Email Phishing

TRANSFORMATIONAL
  • Consultation in drafting
    security procedures and policies

  • Consultation in the design
    of Cyber Resilient architectures

  • Security Monitoring
    and Incident Management Services (Security Operations Centre – SOC)

  • Log Management
    *licences on premise and SaaS

Essential

see the price table

  • 3 tokeni

  • Add-On

  • Add-On

  • Add-On

  • Add-On

  • Add-On
    (-5% off the Listed Price)

  • Add-On
    (-5% off the Listed Price))

  • Add-On

  • Add-On

Premium

see the price table

  • 6 tokeni

  • 1 per year

  • Add on

  • Free Trial 1 Month

  • 2 Campaigns

  • Add-On
    (-21% off the Listed Price)

  • Add-On
    (-21% off the Listed Price)

  • Add-On

  • Add-On

Platinum

see the price table

  • 8 tokeni

  • 2 per year

  • 1 per year

  • 4 Campaigns

  • Add-On
    (-33% off the Listed Price)

  • Add-On
    (-33% off the Listed Price)

  • Add-On

  • Add-On

Protect your work and that of your employees

The cyber security experts at ProntoCyber® are at your service with specific skills and know-how for handling cyber security incidents

Contact us

Policy

The information contained herein is subject to change without notice. The only guarantees regarding PRONTOCYBER® services are those set out in the General Terms and Conditions accompanying these services. Nothing contained herein may be construed as an additional guarantee. PRONTOCYBER® accepts no liability for technical or editorial errors or omissions contained herein.

  • The Digital Emergency Response services covered by the Core Subscription are provided in accordance with the relevant Service Description for the established period (initial or renewal) of the Subscription.

  • CY4GATE undertakes to utilise all means at its disposal to resolve security incidents (best effort) in the shortest reasonable time possible without any obligation in terms of outcome.

  • The timing and means of intervention are set out in the General Terms and Conditions, in the Annex on the Core Subscription Service SLAs.

  • Tokens are issued following sign-up (with the number of tokens depending on the type of subscription).

  • The availability of tokens is determined upon the expiry of a predetermined two-week period. If immediate availability is required, a variation in price must be accepted, taking into account the urgency in accordance with the objective criteria established.

  • Cyber Assessment services include a Vulnerability Assessment and Penetration Testing, provided in accordance with the relevant Service Description for the period (initial or renewal) established in the Subscription

  • Cyber Awareness services include Cyber Education and Phishing Campaigns, provided in accordance with the relevant Service Description for the period (initial or renewal) agreed upon in the Subscription.

  • Throughout the duration of the Contract and without prior notice, CY4GATE may perform checks on the valid activation of the Service. Such verifications may also be carried out with the aid of computer programmes.

  • By their very nature, the activities performed by the Company are subject to constant technological and regulatory evolution that necessitate continuous and onerous updating and development activities required to guarantee the correct and complete provision of the Cyber Security Service.

  • In consideration of the foregoing, the Company maintains the right to modify the Fee even beyond the ISTAT Index.

Copyright © 2013-present Magento, Inc. All rights reserved.