Cyber Security

Cyber Security

Assessment and testing laboratories, proprietary technologies for threat analysis and data FUSION, vertical cyber intelligence expertise

Cyber Security

The result of a long-term innovation strategy, the Cyber Sec Business Unit was born from IPS's 30 years of experience in the world of Cyber Intelligence, evolving its business capabilities through the contribution of specific professional skills and in-depth knowledge of all areas of the national Cyber Resilience strategy.

The Unit is equipped with specific resources, both human and infrastructural, capable of supporting requests of different types and with extremely stringent requirements. This convergence has given rise to new solutions capable of meeting special needs that are complementary to current market solutions. The resources deployed are aimed at both defensive and offensive activities.

Activities are divided into 4 areas in the Cyber Security domain: 
Development specializes in creating software both for the needs of laboratories and for those of personnel, who are in charge of carrying out operational activities; it also deals with tasks of adapting and evolving products for the market and implementing the design, planning and production of specific innovative solutions in the area of Malware Analysis and Cyber Data Fusion.

Operational activities are, therefore, also to support customers in completing tasks related to the Cyber domain and in the effective use of the solutions that are produced and implemented.

The laboratories, linked by precise regulations to the ACN (National Cybersecurity Agency), have as their purpose the performance of security testing of ICT devices and Software of different types.

The Security Assessment Laboratory aims to certify products according to the Common Criteria standard (ISO 15408:2022).

The Accredited Testing Laboratory operates to carry out the testing of all devices which are intended to be deployed on government networks or on the infrastructure of the National Cyber Security Perimeter. The tests performed are both functional and invasive and aim to identify the security and risk level of the device, both software and hardware.

The assigned personnel have deep expertise in penetration testing, code development, reverse engineering, bypassing of security measures, analysis of structured or unstructured data and red teaming ops.

Related features

Malware Analysis

Malware is a major threat in the IT landscape, for this reason it is essential to implement sophisticated prevention techniques. Malware Analysis deals with the analysis of anomalous codes in static (SAST), dynamic (DAST) and interactive (IAST) modes to identify their form, functioning and operation. In order to determine the security impact related to a given sample, special Reverse Engineering activities are also carried out, to extrapolate useful information for understanding the characteristics of the malicious code, and from these, to identify the necessary remediations.

Cyber Data Fusion

Tools capable of extracting meaningful information, from networks and systems (events, PCAP logs and data of any nature), in order to meet the challenges in a world where the hybrid threat is multifaceted and difficult to identify. In this context, an indispensable element is the ability to fuse large amounts of data (Big Data) and subsequent analysis by combining multiple innovative technologies including Artificial Intelligence (AI). The identification of new vulnerabilities requires an integrated approach that implements tools and methodologies resulting from years of experience by those who have made prevention their mission.

Cyber Threat Intelligence

Intelligence tool that identifies multiple weaknesses within an organization and adopts specific defense techniques for possible cyber attacks. This activity, especially intelligence gathering, is carried out through the use of various sources, and the resulting assets are made available to the entire structure. Therefore, the ultimate goal is to provide information regarding the risks coming from present and future threats, especially within the network, where all organizations are now connected to perform all or part of their business. In this scenario, many of the threats can hide permanently in information systems, hence the need for a tool capable of performing comprehensive understanding regarding the data collected on a potential threat, providing aggregation, interpretation and analysis capabilities.

Analysis and Testing Laboratory

The "Analysis and Testing Laboratory" operates according to the latest ACN guidelines for the verification and control of the security of assets used in national infrastructures. The Laboratory supports Institutions, Entities and Large Enterprises, both in the stages of technological transition and in the development and consolidation of their infrastructures.

Security Assessment Laboratories

Accredited by OCSI, the Security Assessment Laboratories perform evaluations of products/systems or protection profiles according to the National Scheme and under the supervision of the Certification Body. They also carry out customer support and training activities on security issues in the field of information technology in general and on evaluation techniques in particular.


Thanks to its Academy, which has been active for many years, IPS also offers training courses in the field of Cyber Security, delivered by certified and experienced personnel.