Shield was created to provide constant protection against cybersecurity threats by monitoring potential risks to the security of networks, systems, and data for Italian and multinational companies.

The Shield Business Unit is the “elite force” defending information systems. The team members are continuously trained and operate like a paramilitary structure, following well-defined processes and procedures.

Vulnerability Area

Cybercriminals primarily use the exploitation of known vulnerabilities as their main attack vector. The services include a verification of the logical security status of the client’s infrastructure.

The goal is to help reduce the attack surface by identifying vulnerabilities in systems and active network devices.

Evaluation

Compliance Assessment

Contiuous Monitoring

Executive Reporting

Penetration Test

Penetration testing activities are carried out both in “non-credentialed” mode and in “credentialed” mode, using a temporary, non-privileged user account.

The tests are conducted by specialists using automated tools, simulating the condition of a hacker or an unauthorized malicious external user. High-value activities, such as Penetration Tests in “Ethical Hacking” mode, are then carried out.

Web Application Penetration Test

Infrastructure Penetration Test

Cyber Monitoring

Active monitoring service focused on two main processes: Event Classification and Triage, and Prioritization and Analysis.

Within BlueIT’s operational structure, an isolated and dedicated Tenant is created for the client, where all agreed EDR agents are deployed.

Each detected threat is handled, tracked, and concluded with a cyber risk classification.

Managed Detection Response

Insider Treat Detection

Risk Scoring

Treat Intelligence Integration

Cloud Security Posture

Incident Response

Cyber Treat Intelligence

The “rumours” in the hidden part of the web can reveal potential targets for future attacks on industrial sectors and/or client companies.

The service is preventive and allows companies to prepare for potential attacks.

Machine Learning Predictive

OSINT Research

CLOSINT Research

Deep – Dark Web Monitoring