Digital Identity

Best Practice

Staying ahead of the digital identity evolution

Cyberspace represents the total interconnectedness of human beings through computers and telecommunications, regardless of physical geography. It is a term used to describe the whole range of information resources available through computer networks. For our purposes, cyberspace is a realm in which communication and interaction between two individuals, or between an individual and a computer, is facilitated by digital data exchanged over computer networks.​​

Staying ahead of the digital identity evolution 0

10.07.2015 / Agefi Luxembourg

Press Article

Can we trust a Cloud provider with our most critical corporate assets?

Without a doubt, the Cloud is expanding at the speed of light. This morning I googled for “Cloud Security” and received 57 Million hits, a few hours later and it was already over 69 Million hits. Together with this incredible expansion, threats and cyber security risks are growing at the same speed. Moving your corporate applications and data onto the Cloud is a bit like leaving your child at kindergarten for the first time. It is scary to hand over corporate strategic information into someone else’s control. Leadership teams, executives, security officers, information risk officers and the vast majority of stakeholders have the same question: Is the Cloud secure? Can we trust a Cloud provider with our most critical corporate assets? The short answer, to quote Obama is: “Yes, we can”. However, the true answer is somewhat more nuanced.

Threat Intelligence Services

Best Practice

Underground Security Intelligence for Financial Institutions

Within Financial Sector, Online Banking and Spam Frauds have the most impact for the end user, generating a significant brand damage for the Financial Institution.​

23.06.2014 / Security

News & Communication

Spike Reply penetration-test team wins second prize at the world Hacker’s Dome competition

The penetratie-test team from Spike Reply has come second out of 124 entrants from 24 countries in the Hacker’s Dome competition.

25.02.2014 / Security

News & Communication

RSA appoints Reply as its first RSA Managed Security Program Services Provider in Europe

Reply announced at the RSA Conference in San Francisco, that it has been appointed as the first Europe-based RSA Managed Security Program services provider by RSA, The Security Division of EMC.

IT Consumerization

Best Practice

Impacts of IT Consumerization on Business Security

Over the last few years, consumer devices entered the workplace. IT discovered whole new challenges and opportunities but, today comes the second wave in Consumerization of IT, the Shadow IT.

Cloud Security Strategy


How to create an effective cloud security strategy

The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet with economic benefits as the main driver. However there are still some challenges to be solved. Amongst these are security and trust issues.​

Enterprise Security

Best Practice

Reply Security Pillars

Reply has developed an integrated, consistent and complete offering to support its clients in devising strategies and implementing solutions for business security.

Supported by over 200 highly specialised experts at the main international institutes and bodies, with over 200 qualifications between them in the principal technologies and solutions, Reply’s information-security portfolio has two cornerstones: security governance and security technology.

Our delivery model integrates and synergises these different but closely related dimensions of information security in a global approach to the various issues in business security.

Our offering stands out for its use of cutting-edge components. We use our innovation and lateral thinking to stay one step ahead, in order to support our clients to best effect as the business security world evolves.

Reply Security Pillars 0

Threat Intelligence Services


Prevention, detection and response at every stage of an attack

Enterprises are facing a growing number of threats coming from Organised Crime, fraudsters and Black Hats, mainly aiming at stealing customer’s information. Understanding real exposure to risk is difficult. Communication Valley Reply’s Threat Intelligence Services allow constant monitoring of major threat vectors.

Enterprise security

Best Practice

Feel Secure?

Among the many challenges facing today’s CIO, that posed by security must rank as one of the most pressing. No longer is it a matter that can be handed over to a specific team: executives at all levels need to take responsibility.​​

Security for IoT

Best Practice

The new security paradigms for the Internet of Things

To address security for the Internet of Things (IoT), many of the current methods will have to be revisited and adapted for a connected world with an ever-greater need to enable third parties to develop smart-device applications.


Best Practice

Security of Internet Payments: EBA issues new guidelines

This Briefing Note presents an overview on the regulatory impact of the European Banking Authority’s final Guidelines on the security of internet payments for Payment Services Providers and customers, highlighting areas which should be carefully checked and implemented before the 1 August 2015.