website/_site/en/cybersecurity/index.html

331 lines
18 KiB
HTML
Raw Normal View History

2022-09-09 18:11:19 +02:00
<!DOCTYPE html>
<html lang=it>
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1">
<meta name="theme-color" content="#943526">
<meta name="no-results" content="No result">
<!-- Begin Jekyll SEO tag v2.8.0 -->
<title>
Cybersecurity | Unitoo</title>
<meta name="generator" content="Jekyll v3.9.2" />
<meta property="og:title" content="
Cybersecurity" />
<meta name="author" content="Unitoo" />
<meta property="og:locale" content="en" />
<meta name="description" content="
Vulnerability Assessment and procedures for containing IT risk" />
<meta property="og:description" content="
Vulnerability Assessment and procedures for containing IT risk" />
<link rel="canonical" href="https://www.unitoo.it/en/cybersecurity/" />
<meta property="og:url" content="https://www.unitoo.it/en/cybersecurity/" />
2022-09-09 18:11:19 +02:00
<meta property="og:site_name" content="Unitoo" />
<meta property="og:image" content="https://www.unitoo.it/en/logo.png" />
2022-09-09 18:11:19 +02:00
<meta property="og:type" content="website" />
<meta name="twitter:card" content="summary" />
<meta property="twitter:image" content="https://www.unitoo.it/en/logo.png" />
2022-09-09 18:11:19 +02:00
<meta property="twitter:title" content="
Cybersecurity" />
<meta name="twitter:site" content="@UnitooInc" />
<meta name="twitter:creator" content="@Unitoo" />
<script type="application/ld+json">
{"@context":"https://schema.org","@type":"WebPage","author":{"@type":"Person","name":"Unitoo"},"description":"meta.descriptions.cybersecurity","headline":"meta.titles.cybersecurity","image":"https://www.unitoo.it/en/logo.png","publisher":{"@type":"Organization","logo":{"@type":"ImageObject","url":"https://www.unitoo.it/en/assets/images/logo-extended.webp"},"name":"Unitoo"},"url":"https://www.unitoo.it/en/cybersecurity/"}</script>
2022-09-09 18:11:19 +02:00
<!-- End Jekyll SEO tag -->
<meta property="og:type" content="website" />
<link rel='icon' href="https://www.unitoo.it/favicon.ico" type="image/x-icon">
<link rel='shortcut icon' href="https://www.unitoo.it/favicon.ico" type="image/x-icon">
<link rel="apple-touch-icon" href="https://www.unitoo.it/apple-touch-icon.png">
<link rel="manifest" href="https://www.unitoo.it/path.webmanifest">
2022-09-09 18:11:19 +02:00
<link rel="stylesheet" type="text/css" href="/assets/main-6f2fde8209e857368b14b45467a034852eed10179454c715e41a78afba727a688cd9fe98be7e7b93f06c7ff924d24959b734402e9d9701944a3a44bacfc639ac.css" integrity="sha512-by/eggnoVzaLFLRUZ6A0hS7tEBeUVMcV5Bp4r7pyemiM2f6Yvn57k/Bsf/kk0klZtzRALp2XAZRKOkS6z8Y5rA==" crossorigin="anonymous">
2022-09-09 18:11:19 +02:00
</head>
<body>
<navbar class="navbar site-header pt-2 pb-2 pl-0 pr-0 p-sm-0 sticky-top">
<div class="container">
<a class="site-title" href="/en/">
2022-09-11 22:34:18 +02:00
<img height="30" alt="Unitoo official logo" integrity="sha512-bNkvQ++R/AdMUjqYLPp7BQuD9Eb0xJkZV4cgeCOAOWmTBoTmIo/x0b2m49EqTKtGEaXP4E915cWDpSHrOTz5ow==" crossorigin="anonymous" src="/assets/logo-extended-6cd92f43ef91fc074c523a982cfa7b050b83f446f4c499195787207823803969930684e6228ff1d1bda6e3d12a4cab4611a5cfe04f75e5c583a521eb393cf9a3.webp">
2022-09-09 18:11:19 +02:00
</a>
<nav class="my-2 d-none d-lg-block">
<a class="text-white" id="button-search" href="#search-input"><i class="fa fa-search"></i></a>
<a class="p-2 text-white" href="/en/aboutus/">About us</a>
<a class="p-2 text-white" href="/en/services-and-products/">Services and Products</a>
<a class="btn btn-primary ml-3 text-white" href="/en/contactus/">Contact us</a>
<a class="ml-3 text-decoration-none" href="/cybersecurity/">🇮🇹</a>
</nav>
<a class="d-block d-lg-none" href="javascript:openNav();">
<i class="fa-menu"></i>
</a>
</div>
</navbar>
<div id="mySidenav" class="sidenav">
<a href="javascript:void(0)" class="closebtn" onclick="closeNav()">&times;</a>
<a class="text-decoration-none" href="/cybersecurity/">🇮🇹</a>
2022-09-09 18:11:19 +02:00
<a class="btn-outline-primary" href="/en/aboutus/">About us</a>
<a class="btn-outline-primary" href="/en/services-and-products/">Services and Products</a>
<a class="btn-outline-primary" href="/en/technical-assistance/"> └ IT consultancy</a>
<a class="btn-outline-primary" href="/en/cybersecurity/"> └ Cybersecurity</a>
<a class="btn-outline-primary" href="/en/communications/"> └ Communications</a>
<a class="btn-outline-primary" href="/en/projects/">Projects</a>
<a class="btn-outline-primary" href="/en/contactus/">Contact us</a>
</div>
<section class="jumbotron jumbotron-fluid bg-transparent d-flex header header-cybersecurity text-white mb-0">
<div class="w-100 d-flex" style="background-color: rgba(0,0,0,0.5)">
<div class="container my-auto">
<h1 class="display-4">
Cybersecurity
</h1>
<p class="lead">
By definition in the IT field it is clear that security is determined by three main factors: <br><br> <strong> Confidentiality </strong> - Access to sensitive resources and data is allowed only to authorized users <br><br> <strong> Integrity </strong> - System data is protected from loss or modification due to attack or accident <br><br> <strong> Availability </strong> - Availability means the ability to access a data or resource at any time.
</p>
</div>
</div>
</section>
<section class="bg-white pt-5 pb-5">
<div class="container">
<p>In information technology, hardening is the process of securing a system that reduces its vulnerable surfaces.<br><br>Reducing the available attack modes typically includes changing default passwords, adding systems two-factor authentication, removing software and/or services, usernames or unnecessary logins.<br><br>There are various methods to harden GNU/Linux based systems. This can involve, among other measures, patching the kernel, closing open network ports, adding intrusion detection systems, firewalls, and intrusion prevention systems.<br><br>There are also scripts and hardening tools such as Lynis, which can, for example, analyze a system thoroughly and allow you to disable unsolicited functionality in configuration files or perform various other security measures.</p>
2022-09-09 18:11:19 +02:00
</div>
</section>
<section class="jumbotron jumbotron-fluid bg-transparent">
<div class="container">
<h2 class="text-center">I nostri moduli</h3>
<hr class="border-primary">
<div class="card-columns mt-5">
<div class="card border-0 shadow">
2022-09-11 22:34:18 +02:00
<img class="card-img-top" integrity="sha512-P0LZ0DmMq7EJgiUyo3eQITFp/Q+S+cEnq4pJGAqDOmRuCkwAXg13Iu6uZMt4kRg80fv9mu6QYE30s0IYBKseoQ==" crossorigin="anonymous" src="/assets/card-m-sonde-3f42d9d0398cabb109822532a37790213169fd0f92f9c127ab8a49180a833a646e0a4c005e0d7722eeae64cb7891183cd1fbfd9aee90604df4b3421804ab1ea1.webp">
2022-09-09 18:11:19 +02:00
<div class="card-body">
<h5 class="card-title">Module Probe</h5>
<p class="card-text">The Probe Module carries out an automated analysis of the work environment by releasing a report of the vulnerabilities and possible optimizations to be carried out based on the criticalities detected.</p>
<a class="btn btn-primary" href=/en/cybersecurity/sonde/>Take control with the Probe Module</a>
</div>
</div>
<div class="card border-0 shadow">
2022-09-11 22:34:18 +02:00
<img class="card-img-top" integrity="sha512-x8iTCO3s+e1VvallPknQ56iKsyId94m0K4xavWiLu2b+qaGfncyQ6tLF6tQgl35dQtMyaHe3bNIYlygnQPAnAw==" crossorigin="anonymous" src="/assets/card-m-rover-c7c89308edecf9ed55bda9653e49d0e7a88ab3221df789b42b8c5abd688bbb66fea9a19f9dcc90ead2c5ead420977e5d42d3326877b76cd21897282740f02703.webp">
2022-09-09 18:11:19 +02:00
<div class="card-body">
<h5 class="card-title">Module Rover</h5>
<p class="card-text">The Rover Module offers a detailed and specific analysis of all the problems and vulnerabilities of one or more structures to be analyzed, the procedure is not automated and has a higher cost than the Probe Module.</p>
<a class="btn btn-primary" href=/en/cybersecurity/rover/>Climb into our Rover for a detailed exploration</a>
</div>
</div>
<div class="card border-0 shadow">
2022-09-11 22:34:18 +02:00
<img class="card-img-top" integrity="sha512-ndpY2bz6m5zNMY9zqxbMBLLTiRo/YLK1FC1r+z2o0TpEGK94NCJ0hp/9K2sW6LXBqU9V7d7z8w05JlYOzE9VgQ==" crossorigin="anonymous" src="/assets/card-m-defence-9dda58d9bcfa9b9ccd318f73ab16cc04b2d3891a3f60b2b5142d6bfb3da8d13a4418af78342274869ffd2b6b16e8b5c1a94f55eddef3f30d3926560ecc4f5581.webp">
2022-09-09 18:11:19 +02:00
<div class="card-body">
<h5 class="card-title">Module Defence</h5>
<p class="card-text">The defence modules are the procedures put in place to increase the safety of the environment previously analyzed through the Probe and/or Rover modules.</p>
2022-09-09 18:11:19 +02:00
<a class="btn btn-primary" href=/en/cybersecurity/defence/>Request the help of our fleet</a>
</div>
</div>
<div class="card border-0 shadow">
2022-09-11 22:34:18 +02:00
<img class="card-img-top" integrity="sha512-PIiYOZI6GGNxAZj8Dr9mucuz5F5ndRPLPaP4IZ0foJdBpQCKb9B24CjZZ7WJye7UTo7s51tHwL4JiE8Y8pIRKA==" crossorigin="anonymous" src="/assets/card-m-graphene-3c889839923a1863710198fc0ebf66b9cbb3e45e677513cb3da3f8219d1fa09741a5008a6fd076e028d967b589c9eed44e8eece75b47c0be09884f18f2921128.webp">
2022-09-09 18:11:19 +02:00
<div class="card-body">
<h5 class="card-title">Module Grafene</h5>
<p class="card-text">The Graphene Module provides the configuration and installation of the GrapheneOS operating system on a supported device.<br>This system is designed for individuals seeking a high degree of security and confidential data processing on their mobile device.</p>
<a class="btn btn-primary" href=/en/cybersecurity/graphene/>Find out more about the benefits of GrapheneOS</a>
</div>
</div>
<div class="card border-0 shadow">
2022-09-11 22:34:18 +02:00
<img class="card-img-top" integrity="sha512-Yw94decV6gMYyPOmihPGM1/IO1qM/g7IgWubiQpTvpDi9mFrAbdALUk6bgPfaOws6/3lhMqJ+LP/TsUq4+37Rw==" crossorigin="anonymous" src="/assets/card-m-monitoring-630f7875e715ea0318c8f3a68a13c6335fc83b5a8cfe0ec8816b9b890a53be90e2f6616b01b7402d493a6e03df68ec2cebfde584ca89f8b3ff4ec52ae3edfb47.webp">
2022-09-09 18:11:19 +02:00
<div class="card-body">
<h5 class="card-title">Module Monitoring</h5>
<p class="card-text">The monitoring module retrieves any type of data from company services and allows you to view it directly in Grafana. This means you can make the most of your complex and expensive business infrastructures by viewing all data in a simple, effective and personalized way. You can also configure custom notifications that will be redirected to your favorite communication channel.</p>
<a class="btn btn-primary" href=/en/cybersecurity/monitoring/>Find out how to monitor your infrastructure</a>
</div>
</div>
</div>
</div>
</section>
<section class="bg-white text-center pt-5 pb-5">
<div class="container">
<h1>Here's how to contact us!</h1>
<hr class="border-primary">
<p class="mt-5"> Getting information or learning more about our modules is really simple:<br><br>1.<strong> Contact us to get a free appointment</strong> with our technicians<br> 2. Make yourself <strong>available </strong> in this appointment <strong> for a free checklist</strong>, perhaps even involving your trusted technician<br> 3. We will then elaborate a personalized <strong>resolutive estimate</strong> using the information that emerged from the inspection, divided into risk factors (from the most critical to the less serious) or by the needs exposed (services, configurations, requests).<br><br> You will therefore be free to evaluate and choose from the Modules proposed, the one you consider to be the best situation for you, always taking into account any risk factors reported.<br><br> Finally, you can contact us by sending an email<br><br><small><i>If you want to experiment with new technologies, you can also contact us in the Fediverse or on the Matrix! Our links in the footer.</i></small><br><br> </p>
<a class="btn btn-primary" href="mailto:info@unitoo.it"><i class="fa fa-mail"></i> info@unitoo.it</a>
<br><br>
<hr class="mt-4 mb-4">
<a href="/info_at_unitoo_dot_it.gpg">Download the GPG Public Key</a>
<br><br>
<small>
<strong>GPG Fingerprint</strong><br> 732C B3AA B142 22AD 5650 E6E2 0A67 0F04 54EA BD72
<br><br>
<strong>sha512sum </strong><br><span style="word-wrap: break-word;">855cc60e031bd0f71d36751f8a28dc96301047b157e9abac34600128be15fffd3f78f1dada60ceb0ef0eab897da459adcdbf19522dd615868831900289216695</span>
</small>
<br><br>
</div>
</section>
<footer class="site-footer">
<div class="row text-center text-lg-left ml-0 mr-0">
<div class="col-0 col-lg-2 ml-auto"></div>
<nav class="col-12 col-lg-2">
<strong class="text-uppercase">Sitemap</strong>
<ul class="list-unstyled ml-0">
<li><a href="/">Home</a></li>
<li><a href="/en/aboutus/">About us</a></li>
<li><a href="/en/services-and-products/">Services and products</a>
</li>
<li><a href="/en/contactus/">Contacts</a></li>
</ul>
</nav>
<div class="col-12 col-lg-2">
<strong class="text-uppercase">Projects</strong>
<ul class="list-unstyled ml-0">
<li><a href="/en/cybersecurity/referral/">Referral</a></li>
<li><a href="/en/projects/radio/">Our CC and open source radio</a></li>
<li><a href="/en/projects/software/">Projects - The software</a></li>
<li><a href="/en/news/">News</a></li>
</ul>
</div>
<div class="col-12 col-lg-2">
<strong class="text-uppercase">Channels</strong>
<ul class="list-unstyled ml-0">
<li><a href="/en/partners/peertube/">Partners - Peertube Italia</a></li>
<li><a href="/en/partners/funkwhale/">Partners - Funkwhale Italia</a></li>
</ul>
</div>
<div class="col-1 col-lg-2 mr-auto"></div>
</div>
<br>
<div class="container">
<div class="input-group mb-5">
<input type="text" id="search-input" class="form-control rounded-right" placeholder="Do you want to look for something?"
aria-label="Do you want to look for something?" aria-describedby="button-search" autocomplete="off">
<div class="input-group-append">
<div id="results-container" class="dropdown-menu d-block p-0 border-0"></div>
</div>
</div>
<p>
Copyright © Unitoo 2017-2022<br>
Software solutions, IT security and uncompromising IT consultancy<br><br>
2022-09-09 18:11:19 +02:00
<small>
The site (except logos) is fully released under the terms of the AGPLv3 license. You can find the sources here:
<a target="_blank" rel="nofollow" href="https://git.unitoo.it/unitoo/website">
<i class="fas fa-link-ext"></i> Gitea
</a>
<br>
</small>
</p>
<ul class="list-inline social-buttons mt-2 mb-3 mx-auto">
<li class="list-inline-item">
<a href="https://git.unitoo.it/unitoo" rel="nofollow" target="_blank" data-original-title="" title="">
<i class="fab fa-gitea" data-original-title="" title=""></i></a>
</li>
<li class="list-inline-item">
<a href="https://github.com/UnitooTeam" rel="nofollow" target="_blank" data-original-title=""
title=""><i class="fab fa-github-circled" data-original-title="" title=""></i></a>
</li>
<li class="list-inline-item">
<a href="https://social.unitoo.it/admin" rel="me" target="_blank" data-original-title="" title="">
<i class="fab fa-fediverse"></i>
</a>
</li>
<li class="list-inline-item">
<a href="https://matrix.to/#/#nodo-1-unity:unitoo.it" target="_blank" rel="nofollow"
data-original-title="" title="">
<i class="fab fa-element"></i>
</a>
</li>
<li class="list-inline-item">
<a href="/en/news/" target="_blank" data-original-title="" title="">
<i class="fab fa-telegram"></i>
</a>
</li>
<li class="list-inline-item">
<a href="https://liberapay.com/Unitoo/" rel="nofollow" target="_blank" data-original-title="" title="">
<i class="fab fa-liberapay"></i>
</a>
</li>
</ul>
<div class="small mt-3">
Unitoo di Claudio Maradonna, Via Circonvallazione Sud 28/A, Monteprandone, 63076 (AP) - IT02324570445 - REA:
AP-204883 - info@unitoo.it
<br>
<a href="/en/privacy-policy/">Privacy policy</a>
</div>
</div>
</footer>
2022-09-11 22:34:18 +02:00
<script integrity="sha512-xl8hyGyYC/db2VOIzC/xFgOGfZ/2fz2y7JsTR2lm+lI1CpyY3G0fK2bLIP7i1LnuxKd65wl0k1WaeKKjZkswCQ==" crossorigin="anonymous" type="text/javascript" src="/assets/main-c65f21c86c980bf75bd95388cc2ff11603867d9ff67f3db2ec9b13476966fa52350a9c98dc6d1f2b66cb20fee2d4b9eec4a77ae7097493559a78a2a3664b3009.js"></script>
<script integrity="sha512-6fqXtO85/aniT3wNsnRL23MchOAajYbkJJjph4jsekYNJgKa3Ic/RbGAKEdnkrroKGuIwBPuJNPdPXLP9pI/jw==" crossorigin="anonymous" type="text/javascript" src="/assets/matomo-e9fa97b4ef39fda9e24f7c0db2744bdb731c84e01a8d86e42498e98788ec7a460d26029adc873f45b18028476792bae8286b88c013ee24d3dd3d72cff6923f8f.js"></script>
<script defer async="" integrity="sha512-ENSVe1iKJUzjemPHvpDkqqY+xVzRDHhP9ny8yYt5Pm+2NZQs1KvOI9JPtnd7BHWWLGXhDUd+xGA8xurChICmLA==" crossorigin="anonymous" type="text/javascript" src="/assets/analytics-10d4957b588a254ce37a63c7be90e4aaa63ec55cd10c784ff67cbcc98b793e6fb635942cd4abce23d24fb6777b0475962c65e10d477ec4603cc6eac28480a62c.js"></script>
2022-09-09 18:11:19 +02:00
<div id="cookie-notice">
<span>Utilizziamo Matomo (una tecnologia libera) per analizzare e migliorare il servizio che offriamo.</span>
<a id="cookie-notice-accept" class="btn btn-primary btn-sm text-white">Approva</a>
<a href="https://matomo.org/gdpr/" rel="nofollow" target="_blank" class="btn btn-primary btn-sm text-white">Scopri di più</a>
<a id="cookie-notice-dismiss" class="mt-1 float-right text-decoration-none border border-secondary rounded btn btn-sm btn-secondary text-white">X</a>
</div>
</body>
</html>