Competences

Product

Reply Security Pillars

Reply has developed an integrated, consistent and complete offering to support its clients in devising strategies and implementing solutions for business security.

Supported by over 200 highly specialised experts at the main international institutes and bodies, with over 200 qualifications between them in the principal technologies and solutions, Reply’s information-security portfolio has two cornerstones: security governance and security technology.

Our delivery model integrates and synergises these different but closely related dimensions of information security in a global approach to the various issues in business security.

Our offering stands out for its use of cutting-edge components. We use our innovation and lateral thinking to stay one step ahead, in order to support our clients to best effect as the business security world evolves.

23.06.2014 / Security

News & Communication

Spike Reply penetration-test team wins second prize at the world Hacker’s Dome competition

The penetration-test team from Spike Reply has come second out of 124 entrants from 24 countries in the Hacker’s Dome competition.

News & Communications

Award

RSA appoints Communication Valley Reply as its first RSA Managed Security Program Services Provider in Europe

A​t the RSA Conference in San Francisco, that it has been appointed as the first Europe-based RSA Managed Security Program services provider by RSA, The Security Division of EMC.

IT Consumerization

Best Practice

Impacts of IT Consumerization on Business Security

​Over the last few years, consumer devices entered the workplace. IT discovered whole new challenges and opportunities but, today comes the second wave in Consumerization of IT, the Shadow IT.

Threat Intelligence Services

Best Practice

Underground Security Intelligence for Financial Institutions

Within Financial Sector, Online Banking and Spam Frauds have the most impact for the end user, generating a significant brand damage for the Financial Institution.​

Cloud Security Strategy

Service

How to create an effective cloud security strategy

The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet with economic benefits as the main driver. However there are still some challenges to be solved. Amongst these are security and trust issues.​

Enterprise Security

Service

First Class Security Operation Center

The Security Operation Center (SOC) of Reply is a physical and logical structure – the only one in Italy - specialized in providing managed and professional services in the field of IT security. SOC is a real “control tower”, guarded 24 hours per day for 365 days per year by a security team composed of analysts, system engineers and testers who specialize respectively in real time monitoring, security device management and security assessment activities.

Enterprise Security

Best Practice

Feel Secure?

Among the many challenges facing today’s CIO, that posed by security must rank as one of the most pressing. No longer is it a matter that can be handed over to a specific team: executives at all levels need to take responsibility.​​

Security for IoT

Best Practice

The new security paradigms for the Internet of Things

To address security for the Internet of Things (IoT), many of the current methods will have to be revisited and adapted for a connected world with an ever-greater need to enable third parties to develop smart-device applications.

18.03.2014 - 20.03.2014

Event

Security Summit 2014

Technology Reply, who is Oracle Platinum Partner, took part in Security Summit 2014, an event dedicated to information security. The event was held in Milan from 18 to 20 March 2014.

Security

Best Practice

A methodology for identifying best practice for communications providers

Innovative enterprises seeking to be ‘lean operators’ are characterised by the identification and implementation of Best Practice. This paper is written in the context of a global Communications Provider seeking to gain common practices and maximum effectiveness across all of its entities.

14.11.2013

Event

Information Security role in Consumerization

Spike Reply organised, in collaboration with IBM and with the participation of Alfredo Gatti (Managing Partner at NextValue), a workshop aimed at discussing the impacts on Security generated by the introduction of new technologies and consumer models in business IT. The event was held in Milan on 14 November 2013.

29.10.2013 - 31.10.2013

Event

CPEXPO 2013

Reply joined CPEXPO 2013, a three-day event dedicated to Community Protection: critical infrastuctures, Cyber Security and Smart City. The event was held in Genoa from 29 to 31 October 2013.

13.06.2013

Event

Security Governance: managing the innovation of SAP Business Suite

Spike Reply in collaboration with IBM organised the event Security Governance: managing the innovation of SAP Business Suite. The event was held in Milan on 13 June 2013.

05.06.2013 - 06.06.2013

Event

Banks and Security 2013

Communication Valley Reply joined the annual conference dedicated to the Security in the banking sector. The event was held in Rome on 5 and 6 June 2013.

22.05.2013

Event

Glue Reply's Brave New World dinner

Glue Reply organised, in collaboration with D Group, an exclusive event dedicated to Capability Management in the Defence industry. The event took place on 22 May 2013 in London.

18.10.2012

Event

ISSA Security Conference 2012

Spike Reply joined the annual event ISSA Security Conference which was held in Rome on 18 October 2012, within the Forum Expo ICT Security.

12.04.2012

Event

Business Security Waves

Spike Reply, in collaboration with Symantec, organised an event dedicated to the most recent evolutions in the Security sector. The event was held on 12 April 2012 in Milan.

20.03.2012 - 22.03.2012

Event

Security Summit 2012

Spike Reply took part in Security Summit, the event dedicated to the ICT Security. The event was held from 20 to 22 March 2012 in Milan.

Best Practice

How to prevent DDoS attacks in a service provider environment

The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest DDoS attacks were simply arbitrary attempts by hackers to gain simple notoriety. However, they have evolved into serious criminal operations that threaten to attack businesses with significant financial and operational implications.

Best Practice

Mobile Malware

The report details the current status of Malware for mobile devices, their security risks, the possible future evolution of Mobile Malware and Future Mitigation Options.

29.02.2012

Event

Glue Reply Defence CIO Roundtable Dinner

Glue Reply had welcomed key industry players to join them for networking and industry discussion at The Gherkin. The event was held on 29 February 2012 in London.