Reply Best Practice


Reply Security Pillars

Reply Security Pillars 0

Digital Identity

Best Practice

Staying ahead of the digital identity evolution

Cyberspace represents the total interconnectedness of human beings through computers and telecommunications, regardless of physical geography. It is a term used to describe the whole range of information resources available through computer networks. For our purposes, cyberspace is a realm in which communication and interaction between two individuals, or between an individual and a computer, is facilitated by digital data exchanged over computer networks.​​

Staying ahead of the digital identity evolution 0

Software Defined Security

Best Practice

Advanced security mechanisms to protect assets and networks: Software-Defined Security

Organisations can now leverage the emerging technologies of Software Defined Networking (SDN) and Network Functions Virtualisation (NFV) for implementing security, as opposed to using traditional methods, and outlines some of the benefits that can be realised.​

17.11.2015 / Milan


How to build a Threat Intelligence for your Company

Communication Valley Reply hosts the workshop "How to build a Threat Intelligence for your Company" on 17 November 2015 at the Reply Cyber Security Command Center.


News & Communication

Reply's Cyber Security Command Center, a center specialised on managed security services

Communication Valley Reply, the Reply Group company that specialises in managed security services, has opened its new Cyber Security Command Center, an ISO27001-certified facility situated in Milan and for 24 hours x 365 days per year.

08.10.2015 / Milan


FireEye Security Summit 2015

Spike Reply FireEye and Mandiant Platinum Partner, takes part in the 1st edition of FireEye Security Summit, an event dedicated to Business Security managers. Spike Reply shows how the mix of Technologies, Intelligence and Governance helps to fight Cyber Risks to which all enterprises are exposed.

DNS Security

Best Practice

Domain Name System Security Extensions

The aim of this white paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions (DNSSEC).

Personal data protection

Best Practice

How Much Data are People Giving Away?

In today’s connected world, the amount of data available about an individual has increased exponentially. This white paper aims to outline the technologies being used to gather data about individuals, how this is being used and what the future could hold for data gathering.

Practice note

Best Practice

Security of Internet Payments: EBA issues new guidelines

This Briefing Note presents an overview on the regulatory impact of the European Banking Authority’s final Guidelines on the security of internet payments for Payment Services Providers and customers, highlighting areas which should be carefully checked and implemented before the 1 August 2015.

23.06.2014 / Security

News & Communication

Spike Reply penetration-test team wins second prize at the world Hacker’s Dome competition

The penetration-test team from Spike Reply has come second out of 124 entrants from 24 countries in the Hacker’s Dome competition.


News & Communication

RSA appoints Communication Valley Reply as its first RSA Managed Security Program Services Provider in Europe

Communication Valley Reply today announced at the RSA Conference in San Francisco, that it has been appointed as the first Europe-based RSA Managed Security Program services provider by RSA, The Security Division of EMC.

IT Consumerization

Best Practice

Impacts of IT Consumerization on Business Security

​Over the last few years, consumer devices entered the workplace. IT discovered whole new challenges and opportunities but, today comes the second wave in Consumerization of IT, the Shadow IT.

Threat Intelligence Services

Best Practice

Underground Security Intelligence for Financial Institutions

Within Financial Sector, Online Banking and Spam Frauds have the most impact for the end user, generating a significant brand damage for the Financial Institution.​

Cloud Security Strategy


How to create an effective cloud security strategy

The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet with economic benefits as the main driver. However there are still some challenges to be solved. Amongst these are security and trust issues.​

Threat Intelligence Services


Prevention, detection and response at every stage of an attack

Enterprises are facing a growing number of threats coming from Organized Crime, fraudsters and Black Hats, mainly aiming at stealing customer’s information. Understanding real exposure to risk is difficult. Communication Valley Reply’s Threat Intelligence Services allow constant monitoring of major threat vectors.

Enterprise Security

Best Practice

Feel Secure?

Among the many challenges facing today’s CIO, that posed by security must rank as one of the most pressing. No longer is it a matter that can be handed over to a specific team: executives at all levels need to take responsibility.​​

Security for IoT

Best Practice

The new security paradigms for the Internet of Things

To address security for the Internet of Things (IoT), many of the current methods will have to be revisited and adapted for a connected world with an ever-greater need to enable third parties to develop smart-device applications.

18.03.2014 - 20.03.2014


Security Summit 2014

Technology Reply, who is Oracle Platinum Partner, took part in Security Summit 2014, an event dedicated to information security. The event was held in Milan from 18 to 20 March 2014.


Best Practice

A methodology for identifying best practice for communications providers

Innovative enterprises seeking to be ‘lean operators’ are characterised by the identification and implementation of Best Practice. This paper is written in the context of a global Communications Provider seeking to gain common practices and maximum effectiveness across all of its entities.

29.10.2013 - 31.10.2013



Reply joined CPEXPO 2013, a three-day event dedicated to Community Protection: critical infrastuctures, Cyber Security and Smart City. The event was held in Genoa from 29 to 31 October 2013.



Security Governance: managing the innovation of SAP Business Suite

Spike Reply in collaboration with IBM organised the event Security Governance: managing the innovation of SAP Business Suite. The event was held in Milan on 13 June 2013.

05.06.2013 - 06.06.2013


Banks and Security 2013

Communication Valley Reply joined the annual conference dedicated to the Security in the banking sector. The event was held in Rome on 5 and 6 June 2013.



Glue Reply's Brave New World dinner

Glue Reply organised, in collaboration with D Group, an exclusive event dedicated to Capability Management in the Defence industry. The event took place on 22 May 2013 in London.



ISSA Security Conference 2012

Spike Reply joined the annual event ISSA Security Conference which was held in Rome on 18 October 2012, within the Forum Expo ICT Security.