MANAGED DETECTION & RESPONSE – CERT

MDR-CERT Services  Innovery offers the Managed Detection & Response services as a single point of contact for the monitoring activities of our Customer’s ICT infrastructure security, aimed at detecting security incidents and/or malfunctioning, as well as technical support for ICT infrastructure management, both on-premise and in the cloud.  Services are structured at several levels that,…

OFFENSIVE SECURITY

SECURITY ASSESSMENTClick to view detailADVANCED SECURITY SERVICESClick to view detailCERTIFICATIONSClick to view detailINNOVERY: EXPERTISE AND EXPERIENCESince 2019 following Wise investments, Innovery aims at further accelerating its expansion by fostering the organic growth, leveraging existing and building new relationships, and by implementing a M&A strategy to develop products, services and markets internationally.

SECURITY OPERATION CENTER

Design, integration and implementation of SOC infrastructure, including software and hardware deployment and technical support. Our Infrastructure is based on the Security Information and Event Management (SIEM) market solution. Monitoring, control and detection of abnormal activities on networks, systems and applications by detecting, correlating and interpreting the logs generated by any single component of the…

SYSTEM INTEGRATION AND DELIVERY SERVICES

From consultation and planning to implementation activities and delivery, designed to meet different needs and provide customers with the most effective support options for their organizations that meet their specific requirements. Customers: Utility, Energy, Public Administration. Technologies: Hadoop HDFS, Flume, Spark, Solr, ZooKeeper. Certifications: Hadoop, Spark.

ETHICAL HACKING/FORENSIC ANALYSIS

Through its security monitoring center, Innovery is able to offer Vulnerability Assessment and Penetration testing services, in order to verify the solidity and security of the customer’s infrastructure and applications. Activities can be carried out either remotely or at the customer’s location, depending on the needs and context of reference. Customers: Utility, Finance, Energy, Telco, Public…

E-GOVERNMENT

Our eGovernment mission is to provide the implementation of standards-based interoperable Public-Key Infrastructure (PKI), tailored to private and public customers, related to: Legal PKI (compliance with eIDAS Rules; assessment); Enterprise PKI (strong and/or secondary authentication; s/mime encryption; key recovery process); RA system with SOA interfaces for third-party sw integratrion; CA and RA event registration and…

IDENTITY & ACCESS MANAGEMENT

Our certified consulting team provides expert advice and creates customized concepts that provide the blueprint for optimized IAM solutions: Consulting. Analyze your specific customer system landscape and then create an IAM solution tailor-made to your requirements; Implementation. Support our customers throughout all stages of their identity and access management project. Customization. Experience has shown that quite all IAM…

DEFENSIVE SECURITY

Endpoint ProtectionEmail ProtectionSecurity Orchestration, Automation and ResponseUser Entity Behavioral AnalysisNetwork ProtectionNetwork Detection & ResponseNetwork Access ControlTreath Intelligent PlatformSandboxingCyber Security PostureContinuous Vulnerability ManagementNetwork SecuritySIEM & Log ManagementeGovernmentIdentity & Access ManagementData SecurityCybersecurity IntelligenceEndpoint Protection Context: EndPoint Protection solutions analyze files, programs, logs and processes in real time and report any detected threats: they continuously monitor advanced threats,…