Security
Transkrypt
Security
ICT Solutions for Security: This market includes companies that design, produce and/or integrate ICT tools aimed at data and information protection, across different security domains (e.g. physical, logical, organizational security, privacy). These tools are essential for those companies which core business is data itself (banking, finance, insurance, telecommunications, software companies), and for other organizations and companies such as PA, where information is a critical resource to ensure proper and efficient business processes. Several factors are expanding these tools' application field, such as the digitalization process, integration of organizational and technological solutions, the hackering escalation, the development of the Enterprise Risk Management. These technologies are: Physical assets protection systems where information are guarded (server rooms, storage centers, etc..); Office automation and information protection systems over public or third parties networks; Corporate and personal data protection systems; Security systems to protect from applications' voluntary or unintentional errors; Systems to protect from employees' and co-workers unintentional or voluntary errors (unethical behavior) Access control, mobile app and proximity sensors (LBS, RFID, Bluetooth) Disaster prevention Geocraphic Company 1 AXIS Sector Security and CCTV Surveillance Description Axis is the world leader in network video and offers a wide portfolio of products for professional IP video surveillance City and Monuments Surveillance Website http://www.axis.com/ http://www.youtube.com/watch?v=t502aenWKm c Intelligence & Law Enforcement Within the Security Cluster, BEA offers systems for audio surveillance in fixed or mobile installation, audio analysis, miniaturised tracking systems GPS / GSM / Satellite, mobile phone activity monitoring and jamming, real-time video surveillance over 3G network, multimedia audio and data recording systems. They have strong know-how in hardware, firmware and miniaturized embedded system http://www.beanet.it/about.html M2M / Mobile Apps BMOOBLE develops enabling technologies ( MEAP: Mobile Enterprise Application Platform) for the design and the deployment of a variety of mobile services that bring together information and services from different sources by connecting all kinds of devices, such as mobile phones, smart phones, palm handhelds and tablet PCs. http://www.bmooble.it/en.html 4 C SYSTEM Physical Security Within the Security Cluster, C System offers an integrated solution with videosurveillance, intrusion alarms, fire detection system, access control and intelligent video analysis. They have installation in different site: from hospitals to prisons, from airports to city centers, from stadiums to plants http://www.csystem.it/Eng/Sicurezza.aspx 5 DUEVI Physical Security Within the Security Cluster, DueVi offers anti-intrusion systems, perimeter systems, CCTV systems 2 BEA 3 BMOOBLE 6 EURESYS 7 EURIX 8 HS CUSTOM 9 ITACHA 10 MEDIASERVICE http://lnx.duevi.eu/eng/ Security & HR Management Head-ID control software is a complete, easy-to-use tool for monitoring the flow of people accessing plants, offices or reserved areas by means of specific apparatuses (cameras, turnstiles, access terminals, etc.) to guarantee access to those holding the necessary authorizations and allowing real time control by the system supervisor. Hhead-ID is complete with hardware, software and services for RFIF terminals with badge or tags reader, turnstiles, CCTV etc http://www.euresys.it/eng/ Security Management The risk analysis and related technical actions must agree with business processes continously evaluated to strongly align security strategy. Eurix offers comprehensive solutions for: virtualized, on cloud, in large datawarehouse, providing disaster recovery, on mobile devices, using VoIP, on social networks, using innovating technologies, answering to exigent customers with evolving pricing models … http://www.eurix.it/en/content/securitymanagement Security on Things Within the Security Cluster, HS Custom offers RFID Solutions to prevent counterfeiting http://www.hscustom.it/index.php?lang=en Early impact analysis disaster prevention Logical Security impact of disasters, especially data on affected areas and population. The rapid mapping activities aimed at supporting the first stage of disaster management are generally based on satellite remote sensing data. Mediaservice.net is a Security Advisory Company. Services cover Data Security - Proactive Security (Vulnerability Assessment, Penetration Test , Security Evaluation, IT Risk Management, Security Audit), Information Security - Process Security (Consulting service aimed at improving the security governance process, in compliance with reference laws and standards. Gap Analysis, ISO/IEC 27001:2005, Business Continuity Management, PCI-DSS Compliance) and Security Training http://www.ithacaweb.org/projects/early_impact/ http://www.mediaservice.net/?lang=eng 11 MICRONTEL 12 POLIMATICA Physical Security Polimatica offers a consulting service on all problems regarding security: IT and perimeter security perimeter security, content filtering, email filtering, strong authentication, analysis and definition of security procedures, adaptation to current regulations. 13 SITI 14 SSB PROGETTI 15 URMET MICRONTEL designs, engineers and manufactures Access Control, Time Attendance and Shop Floor Data Collection Systems. The products are supplied to a client range that encompasses as many as 3000 companies to date, including at least 600 of considerable size. Security Security The service includes the safety and security assessment of the environment where objects are stored, through a proper environmental monitoring of physical parameters (temperature, relative humidity, etc.) and the vulnerability assessment against thefts and vandalisms. A key role is played by the definition of protocols for a safe transport of artworks, on the basis of international standards. Furthermore, SiTI can provide a support to manage security and safety of mobile cultural heritage in case of emergency, like natural events (earthquakes, floods, etc.) and malicious and involuntary anthropic threats. SSB Progetti offers its experience to translate into an integrated system "modern security technology" such us: Vulnerability Assessment; Penetration Test; Policy and Architecture definition; Infrastructure Hardening; Identity and Access Management IPervoice is the ideal system for simplifying installation in residential compounds with a high number of users. Needs may also extremely various in such large systems, and IPervoice has all the answers. Extremely versatile, it manages integrated access control, technological systems (CCTV, intrusion alarms, fire alarms) and many other functions, all from the video door phone system. To deliver the biggest ever residential IP door-entry project in Europe at the London 2012 Athletes’ Village - 17,000 people using over 850 doors! https://www.microntel.com/en/default.asp http://www.polimatica.eu/index.php/computersecurity/security-consulting http://www.siti.polito.it/index.php?l=ENG http://www.ssbprogetti.it/sicurezza.php http://www.urmet.it/urmet_web/en/home.html http://www.ipervoice.co.uk/