Reply is the place to meet an incredible variety of enthusiastic, passionate, ideas-driven people, who want to make a difference and an impact.Would you like to know more?
Risk-Based Threat and Vulnerability Management is the combination of methods and tools to check your security control effectiveness and your risk posture. Discover new methods and tools to check your security control effectiveness.
Quantum Cybersecurity is an emerging market and there are few specialist technology players capable of carrying out quantum-resilient data integration. Reply's added value comes from the quantum skills developed in recent years, and from our experiential approach and extensive experience in the fields of networking, security, and integration.
Reply Cyber Security Challenge is a team competition open to both students and professionals created by the “Keen Minds Team”, Reply’s group of Cyber Security experts. STAY TUNED!
Cyber crime has been steadily growing over the last few years. As
new and advancing technologies increase the number of ways and amount of time we spend online, the opportunities for
cyber criminals to take advantage of these connections also grows. Read more about the challenge cyber security experts face in
Reply's latest article in
In a IoT context, Reply mission is to proactively detect and thwart cyber-attacks and incidents against customers’ IoT solutions adopting a 5-building blocks approach: Concept Sketching, Security Requirements and Design, Secure Coding, Advanced Security Testing, Security Product Sustainment.
Reply joined CPEXPO 2013, a three-day event dedicated to Community Protection: critical infrastuctures, Cyber Security and Smart City. The event was held in Genoa from 29 to 31 October 2013.
Spike Reply in collaboration with IBM organised the event Security Governance: managing the innovation of SAP Business Suite. The event was held in Milan on 13 June 2013.
Communication Valley Reply joined the annual conference dedicated to the Security in the banking sector. The event was held in Rome on 5 and 6 June 2013.
Glue Reply organised, in collaboration with D Group, an exclusive event dedicated to Capability Management in the Defence industry. The event took place on 22 May 2013 in London.
Spike Reply joined the annual event ISSA Security Conference which was held in Rome on 18 October 2012, within the Forum Expo ICT Security.
Spike Reply, in collaboration with Symantec, organised an event dedicated to the most recent evolutions in the Security sector. The event was held on 12 April 2012 in Milan.
Spike Reply took part in Security Summit, the event dedicated to the ICT Security. The event was held from 20 to 22 March 2012 in Milan.
The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest DDoS attacks were simply arbitrary attempts by hackers to gain simple notoriety. However, they have evolved into serious criminal operations that threaten to attack businesses with significant financial and operational implications.
The report details the current status of Malware for mobile devices, their security risks, the possible future evolution of Mobile Malware and Future Mitigation Options.
Glue Reply had welcomed key industry players to join them for networking and industry discussion at The Gherkin. The event was held on 29 February 2012 in London.
Spike Reply joined the annual conference dedicated to the Security in the banking sector. The event was in Rome on 26 and 27 May 2011.
Spike Reply, the Reply Group’s company specializing in the field of Information Security, Personal Data Protection and Fraud Management, participated at the AIPSA conference "Comunicazione della Security: esperienze a confronto", that took place on 17 May 2011 in Milan.
Improving or maintaining the enterprise security posture is a continuous process, that must be based on a robust, enterprise-level security architecture. Reply has a wealth of experience in all of the fields needed to help you to move to a mature enterprise security posture and to operate your security more effectively.
CIO - Business Technology Leadership
Spike Reply, the Reply Group’s company specialized in the field of Information Security, Personal Data Protection and Fraud Management, took part to the 2011 Security Summit edition in Milan from 14 to 16 of March.
Glue Reply took part in the event and held an executive boardroom delivering an overview of the latest strategies developing in response to increasing threat landscapes and how to build robust security at an enterprise level.
Published on the UK infosecurity.com, the article by Daniele Vitali (Glue Reply) describes the debate held in London last October, dedicated to Information Security and Risk Management.
Cloud Computing and new threats on the networks. These was the main themes at the 2010 Security Conference, which was attended by Spike Reply and Communication Valley Reply, held in Rome at the Sheraton Hotel the 28th of October.
During the recent RSA EMEA Partner Council held in Barcelona on October 4th and 5th, 2010, Communication Valley Reply, the Reply Group business unit specialising in managed security services, was awarded the prize for the best EMEA partner for 2010 by RSA, the security division of EMC2.
Spike Reply took part to the event with a desk inside the exhibition area reserved to the Oracle Community for Security and with a speech foused on Security in the field of Cloud Computing.
Reply participated at the 6th edition of the ABI Lab Forum, which took place in Milan on 23 and 24 March. The event was dedicated to the topics concerning the role of ICT in the banking field.
Spike Reply took part to the event, from 16 to 18 March 2010 with a speech and with a desk inside the exhibition area reserved to the Oracle Community Security.
Security architecture is a key area of overall enterprise architecture and of significant importance to organisations.
Matrix S.p.A., a company of the Telecom Italia Group specialized in the creation of Web 2.0 services and in marketing on web and mobile channels, developed and implemented, in cooperation with Spike Reply, an innovative management process of all aspects concerning the functional and technology security of its products.