Reply is the place to meet an incredible variety of enthusiastic, passionate, ideas-driven people, who want to make a difference and an impact.Would you like to know more?
Reply Cyber Security Challenge is a team competition open to both students and professionals created by the “Keen Minds Team”, Reply’s group of Cyber Security experts. STAY TUNED!
In a IoT context, Reply mission is to proactively detect and thwart cyber-attacks and incidents against customers’ IoT solutions adopting a 5-building blocks approach: Concept Sketching, Security Requirements and Design, Secure Coding, Advanced Security Testing, Security Product Sustainment.
Cyber crime has been steadily growing over the last few years. As
new and advancing technologies increase the number of ways and amount of time we spend online, the opportunities for
cyber criminals to take advantage of these connections also grows. Read more about the challenge cyber security experts face in
Reply's latest article in
Spike Reply took part to the event, from 16 to 18 March 2010 with a speech and with a desk inside the exhibition area reserved to the Oracle Community Security.
Security architecture is a key area of overall enterprise architecture and of significant importance to organisations.
Matrix S.p.A., a company of the Telecom Italia Group specialized in the creation of Web 2.0 services and in marketing on web and mobile channels, developed and implemented, in cooperation with Spike Reply, an innovative management process of all aspects concerning the functional and technology security of its products.
Spike Reply participated at Vordel World Forum, dedicated to uses cases on Cloud and Soa. Marco Graia, Senior Consultant Spike Reply, attended on 5th November at 12.15pm.
Leading Italian Security Systems Integrator and Security Consultancy, Spike Reply, selected by Vordel as go-to-market partner for SOA implementations.
Reply can face the criminal activity aimed at stealing the user identity and its mimicking in order to steal information or defraud both the user and the company.
Reply provides innovative solutions for Fraud Management based on Business Rules Management Systems (BRMS). With a BRMS-based approach, organizations can analyze their own data in order to prevent and fight against fraud, ensuring the business profitability.
Spike Reply –through the application of advanced methodologies (e.g. OWASP)- carries out some activities of Application Vulnerability Assessment and Penetration Test with the aim of checking the security level of company applications and to define a detailed countermeasure plan in order to minimize the vulnerabilities.
Spike Reply develops Identity and Access Management projects using a proprietary methodology able to adapt to the Client’s specific requirements and checked using the best-of-breed technology solutions available on the market.
The web application security moves to a more complex level with Web 2.0. An application penetration test is no longer enough. That is why Spike Reply –with its “Spike Application Security”- offers a modular solution to bring security into the software life cycle.
A correct security management is based first of all on an appropriate knowledge of the present protection level of the systems. Starting from here, Spike Reply has consolidated its experience in the application of internationally known Vulnerability Assessment and Penetration Testing methodologies.
Through consolidated methodologies, like those offered by Owasp or by Microsoft, Spike Reply is able to support the Client’s software lifecycle offering the best options available on the market.
Spike Reply, through specific skills acquired also through targeted certifications (GPCI of SANS), successfully provides its customers with methodological, organizational and technological support, to carry out enterprise projects for standard compliance.
Spike Reply can support the companies which want to create a Security Governance System and that – in more general terms - need to define and implement appropriate solutions for an effective and efficient management of Business Security processes.
Reply has an integrated, consistent and complete offer to support its Clients in the development of suitable strategies and in the implementation of adequate solutions for the effective management of Business Security & Data Protection.
Spike Reply and Communication Valley organized the "Security Day - Journey to the Center of the SOC - Security Operations Center", an occasion for experts to share opinions on the importance of Informatics Security in the companies.
The present strategic value and the increasing complexity of data networks imply the need for tools to be used for management and control of the involved human and technological resources.
The Communication Valley response to online frauds is carried out on two main aspects: anti-phishing to minimize the identity theft risk; transaction monitoring to block fraudulent activities with identity data obtained in an illegal way.
Spike Reply participated at the Security Summit, a new appointment dedicated to the security of both the net and information, that was in Milan from 24 to 26 March 2009.
The Security Operation Center is the place where the trust relationship between Communication Valley Reply and Customer takes place. It is characterized by competences, updates, continuous training and experience.
Monitoring is a fundamental stage in the security life cycle since it allows for a verification of the efficacy of the protection technologies used, the check of their correct functioning and the indication of the improvement interventions which could further strengthen security.
Communication Valley S.p.A. organized, in cooperation with RSA - The Security Division of EMC, the workshop entitled "SOC Experience - skills and technologies exhibition". The meeting was held in Parma on 20 November 2008.
Paolo Perego and Carlo Pelliccioni, both Spike Reply Senior Consultants, participated at OWASP Day - "The State of the Art of the Web Application Security and the OWASP guidelines in the Companies". The event took place on 31 March 2008 in the Congress Center of "La Sapienza" University in Rome.