Reply Best Practice

DEFENCE AGAINST ATTACKS

Reply Security Pillars

Reply Security Pillars 0

CyberSecurity Control

Best Practice

Stay on top of your Cybersecurity

Risk-Based Threat and Vulnerability Management is the combination of methods and tools to check your security control effectiveness and your risk posture. Discover new methods and tools to check your security control effectiveness.

Stay on top of your Cybersecurity
 0

Quantum Computing

Best Practice

Cybersecurity in the age of Quantum Supremacy

Quantum Cybersecurity is an emerging market and there are few specialist technology players capable of carrying out quantum-resilient data integration. Reply's added value comes from the quantum skills developed in recent years, and from our experiential approach and extensive experience in the fields of networking, security, and integration.

Cybersecurity in the age of Quantum Supremacy 0

09.10.2020 / Online

Event

REPLY CYBER SECURITY CHALLENGE 2020

Reply Cyber Security Challenge is a team competition open to both students and professionals created by the “Keen Minds Team”, Reply’s group of Cyber Security experts.

STAY TUNED!

READ MORE

28.09.2020 / IT Pro

Press Article

The New World of Cyber Security

Cyber crime has been steadily growing over the last few years. As new and advancing technologies increase the number of ways and amount of time we spend online, the opportunities for cyber criminals to take advantage of these connections also grows. Read more about the challenge cyber security experts face in Reply's latest article in IT Pro.

Do you have trust in iot?

In a IoT context, Reply mission is to proactively detect and thwart cyber-attacks and incidents against customers’ IoT solutions adopting a 5-building blocks approach: Concept Sketching, Security Requirements and Design, Secure Coding, Advanced Security Testing, Security Product Sustainment.

Do you have trust in iot? 0

IoT Security

Best Practice

IoT security test unit. Making security tangible.

Smart factories, smart grids, smart cities… a new world arises, where things communicate with each other. Reply’s IoT Security Test Unit helps to demonstrate and test possible attacks so organisations can react fast to security issues and reduce risks of production outages.

IoT security test unit. Making security tangible. 0

28.01.2021

News & Communication

Spike Reply and Storm Reply Achieve AWS Security Competency Status

Reply announced today that its companies Storm Reply and Spike Reply achieved Amazon Web Services (AWS) Security Competency status. This designation recognizes that the two companies of the Reply Group have demonstrated deep expertise that helps customers achieve their cloud security goals.

08.10.2020 - 27.11.2020 / Webinar Series

Event

Levelling up Cyber Security

One way to meet new security challenges and targets for attacks is sharing knowledge and raising awareness. Join this series of Spike Reply sessions as part of the EU Cyber Security Month.

30.09.2020 / Professional Security Magazine

Press Article

Brave New World

As COVID-19 continues, and office workers become home or remote workers, incidences of cyberattack have been rising steeply. Reply takes a look at the three key reasons for this in Professional Security Magazine Online.

13.05.2019

News & Communication

Reply is “EMEA Oracle Security Partner of the Year” thanks to Technology Reply’s commitment

During the Oracle EMEA IaaS PaaS Partner Community Forum 2019 which was held in Rome on the 8th of May 2019, Reply was awarded by Oracle “EMEA Oracle Security Partner of the Year” thanks to Technology Reply’s commitment.

29.01.2018 - 02.02.2018 / Barcelona

Event

Cisco Live 2018

Communication Valley Reply, the Reply group company specialising in managed security services, participates in this year’s Cisco Live Event in Barcelona from 29 January to 2 February 2018 in Barcelona.

Automotive Cybersecurity

Best Practice

The automotive industry on the Cyber (Security) curve

In a more than ever connected world, the automotive industry is following the fast pace of the new technology. Cars are smarter but also more subject to cybercrime / cyber vandalism with a possible impact on the physical security of people. Spike Reply can help you.​

The automotive industry on the Cyber (Security) curve 0

21.09.2017 / Milano

Event

Cyber security battle extends to personal data protection

Spike Reply in collaboration with FireEye organizes the event “Cyber Security battle extends to Personal Data Protection”, the third workshop of the GDPR Roadshow.

GDPR

Best Practice

Data management and data discovery services GDPR compliance

Data Reply supports customers in the design and implementation of data platforms that aim to enhance and capitalise on corporate information assets. Data Reply introduces the theme of personal data protection within the scope of the General Data Protection Regulation (GDPR), which will come into force in May 2018.

22.06.2017 / Milan

Event

Operational building blocks for accelerating GDPR implementation

Spike Reply in collaboration with Blue Reply organizes the event “OPERATIONAL BUILDING BLOCKS FOR ACCELERATING GDPR IMPLEMENTATION”, the second workshop of the GDPR Roadshow.

Cyber Security Operation Center

Best Practice

Protect your business

Reply’s new Cyber Security Operation Centre is a structure specialised in the provision of Premium-level security services, tailored to the customer's needs, processes, and the specific threats characteristic of the sector in which it operates.

DISCOVER MORE

Protect your business 0

Security and Fraud Management

Best Practice

Communication Valley Reply leader in cyber security is a partner of the European Union

Communication Valley Reply has partnered with the European Union on a research project aimed at improving the security of the European digital ecosystem with the addition of an advanced and immediate user control process designed to prevent online fraud.

Advanced Cyber Operations

Best Practice

A new Cyber Security services model

Communication Valley Reply helps companies protect their data and systems through its ISO27001 certified Cyber Security Operation Center. An advanced security management model is essential for protecting company data against external attacks, limiting a company’s vulnerability and minimising the impact of incidents.

31.05.2017 / Milan

Event

Setting the right priorities to be gdpr ready

Spike Reply in collaboration with Target Reply and Informatica organizes the event “SETTING THE RIGHT PRIORITIES TO BE GDPR READY”. During the workshop we will give you an insight on the main data governance and data protection challenges posed by GDPR and we will provide you with a practical approach to kick-starting a successful GDPR Program, introducing also real cases.

19.03.2017 - 23.03.2017 / Las Vegas

Event

IBM InterConnect 2017

Communication Valley Reply, the Reply Group company specialising in managed security services, takes part in IBM InterConnect on 19-23 March 2017.

Cyber Security

Best Practice

Cyber Security and Cloud Computing in the Industry 4.0 Era

Communication Valley Reply is a leading player in the corporate security market. With the arrival of Industry 4.0 security is a main topic.

14.02.2017 / Milan

Event

F5 Forum 2017

Communication Valley Reply, the Reply Group company specializing in managed security services, takes part in the first edition of the Italian F5 Forum in Milan (Borsa Italiana, Palazzo Mezzanotte, Piazza degli Affari 6) on 14th February 2017.

20.02.2017 - 24.02.2017 / Berlin

Event

Cisco Live 2017

Communication Valley Reply, the Reply group company specialising in managed security services, will participate in this year’s CISCO Live Event in Berlin from 20-24 February2017.

18.10.2016 / Milan

Event

CLOUDERA SESSIONS 2016

Data Reply takes part in Cloudera Sessions – Milan, the Italian event focused on Big Data both from a technological and business point of view.​

30.06.2016 / Infosecurity Magazine

Press Article

Software Defined Security: Going Beyond Traditional Measures

Organizations today are evolving and rapidly adopting new technologies. But what this brings is an increase in their threat footprint. Alexander Seyf, Partner at Sytel Reply, explains how organizations now need to look towards leveraging emerging technologies such as Software Defined Networking in order to efficiently and dynamically address security threats and attacks​.

14.06.2016 / Milan

Event

Cyber Security Insights into Markets and Regulations

Spike Reply in collaboration with FireEye organizes the event "Cyber Security Insights into Markets and Regulations". The workshop analyses the Italian Market situation and regulatory changes, providing new approaches to IT Security Governance (threats and risks) introducing real cases.