304 lines
18 KiB
HTML
304 lines
18 KiB
HTML
<!DOCTYPE html>
|
|
<html lang=it>
|
|
|
|
<head>
|
|
<meta charset="utf-8">
|
|
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
|
<meta name="viewport" content="width=device-width, initial-scale=1">
|
|
<meta name="theme-color" content="#943526">
|
|
<meta name="no-results" content="No result">
|
|
|
|
<!-- Begin Jekyll SEO tag v2.8.0 -->
|
|
<title>
|
|
Module Defence, our post Vulnerability Assessment intervention plans | Unitoo</title>
|
|
<meta name="generator" content="Jekyll v3.9.3" />
|
|
<meta property="og:title" content="
|
|
Module Defence, our post Vulnerability Assessment intervention plans" />
|
|
<meta name="author" content="Unitoo" />
|
|
<meta property="og:locale" content="en" />
|
|
<meta name="description" content="
|
|
The solutions built to protect your infrastructures and your servers." />
|
|
<meta property="og:description" content="
|
|
The solutions built to protect your infrastructures and your servers." />
|
|
<link rel="canonical" href="https://www.unitoo.it/en/cybersecurity/defence/" />
|
|
<meta property="og:url" content="https://www.unitoo.it/en/cybersecurity/defence/" />
|
|
<meta property="og:site_name" content="Unitoo" />
|
|
<meta property="og:image" content="https://www.unitoo.it/en/logo.png" />
|
|
<meta property="og:type" content="website" />
|
|
<meta name="twitter:card" content="summary" />
|
|
<meta property="twitter:image" content="https://www.unitoo.it/en/logo.png" />
|
|
<meta property="twitter:title" content="
|
|
Module Defence, our post Vulnerability Assessment intervention plans" />
|
|
<meta name="twitter:site" content="@UnitooInc" />
|
|
<meta name="twitter:creator" content="@Unitoo" />
|
|
<script type="application/ld+json">
|
|
{"@context":"https://schema.org","@type":"WebPage","author":{"@type":"Person","name":"Unitoo"},"description":"meta.descriptions.defence","headline":"meta.titles.defence","image":"https://www.unitoo.it/en/logo.png","publisher":{"@type":"Organization","logo":{"@type":"ImageObject","url":"https://www.unitoo.it/en/assets/images/logo-extended.webp"},"name":"Unitoo"},"url":"https://www.unitoo.it/en/cybersecurity/defence/"}</script>
|
|
<!-- End Jekyll SEO tag -->
|
|
|
|
<meta property="og:type" content="website" />
|
|
|
|
<link rel='icon' href="/favicon.ico" type="image/x-icon">
|
|
<link rel='shortcut icon' href="/favicon.ico" type="image/x-icon">
|
|
<link rel="apple-touch-icon" href="/apple-touch-icon.png">
|
|
<link rel="manifest" href="/path.webmanifest">
|
|
|
|
<link rel="stylesheet" type="text/css" href="/assets/main-f701f931f9bea9a5c7ff95045b42d8f191887b69a8411b7df65e58a80a21c173658787077ef2b7f1f27b231d02553c1146425054913d61766e7630c2098c76a3.css">
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
</head>
|
|
|
|
|
|
<body>
|
|
<navbar class="navbar site-header pt-2 pb-2 pl-0 pr-0 p-sm-0 sticky-top">
|
|
|
|
<div class="container">
|
|
|
|
<a class="site-title" href="/en/">
|
|
<img height="30" alt="Unitoo official logo" src="/assets/logo-extended-6cd92f43ef91fc074c523a982cfa7b050b83f446f4c499195787207823803969930684e6228ff1d1bda6e3d12a4cab4611a5cfe04f75e5c583a521eb393cf9a3.webp">
|
|
</a>
|
|
|
|
|
|
<nav class="my-2 d-none d-lg-block">
|
|
<a class="text-white" id="button-search" href="#search-input"><i class="fa fa-search"></i></a>
|
|
<a class="p-2 text-white" href="/en/aboutus/">About us</a>
|
|
<a class="p-2 text-white" href="/en/services-and-products/">Services and Products</a>
|
|
<a class="btn btn-primary ml-3 text-white" href="/en/contactus/">Contact us</a>
|
|
|
|
|
|
<a class="ml-3 text-decoration-none" href="/cybersecurity/defence/">🇮🇹</a>
|
|
|
|
|
|
</nav>
|
|
|
|
<a class="d-block d-lg-none btn-open-nav" href="javascript:;">
|
|
<i class="fa-menu"></i>
|
|
</a>
|
|
|
|
</div>
|
|
|
|
</navbar>
|
|
|
|
|
|
<div id="mySidenav" class="sidenav">
|
|
<a href="javascript:;" class="closebtn">×</a>
|
|
|
|
<a class="text-decoration-none" href="/cybersecurity/defence/">🇮🇹</a>
|
|
|
|
<a class="btn-outline-primary" href="/en/aboutus/">About us</a>
|
|
<a class="btn-outline-primary" href="/en/services-and-products/">Services and Products</a>
|
|
<a class="btn-outline-primary" href="/en/technical-assistance/"> └ IT consultancy</a>
|
|
<a class="btn-outline-primary" href="/en/cybersecurity/"> └ Cybersecurity</a>
|
|
<a class="btn-outline-primary" href="/en/communications/"> └ Communications</a>
|
|
<a class="btn-outline-primary" href="/en/projects/">Projects</a>
|
|
<a class="btn-outline-primary" href="/en/contactus/">Contact us</a>
|
|
</div>
|
|
|
|
|
|
<section class="jumbotron jumbotron-fluid mb-0">
|
|
<div class="container">
|
|
<h1 class="text-center">Module Defence</h1>
|
|
<hr class="border-primary">
|
|
|
|
<p class="mt-5">
|
|
Below are our solutions built to protect your infrastructures and servers. These solutions offer configurations designed to embrace multiple levels of protection, which in some situations must rightly be high, such as when dealing with sensitive data or when it is necessary to ensure maximum control of the system.<br><br>Our technicians and consultants will show you the solution that best suits your needs.
|
|
</p>
|
|
</div>
|
|
</section>
|
|
|
|
<section class="bg-white pt-5 pb-5">
|
|
<div class="container">
|
|
<div class="row">
|
|
<div class="col text-left d-block d-lg-none">
|
|
<img alt="Illustration of a space defence spacecraft" class="mt-3 mt-lg-0" src="/assets/element-starfighter-b4edf8872bd39e6d73b6c756517f0a11ee8a5ce98f64d15312b1b5ec94fbaf66b77867619d84bfd0afa219aaa21ab36c2a82f3eb39e2a51871d8f7ac6234351e.webp">
|
|
</div>
|
|
<div class="col-lg-7">
|
|
<h3>Starfighter</h3>
|
|
<p>
|
|
The Starfighter type solution includes, starting from the identification of the assets to be protected, the assessment of possible threats in terms of probability of occurrence and relative potential damage (severity). Certain "best practices" procedures are then applied to offer the customer an effective solution and at the same time able to provide protection from most of the threats present on the network; in this regard, firewalls will be configured and basic protection protocols applied. In addition, the systems will be equipped with automatic security updates with a predetermined frequency. However, this defence system is not very suitable in situations where there are several services or personalized services and in the case in which sensitive and biometric data are dealt with.<br><br><strong>This module requires in advance that an analysis be carried out through the Probe Module.</strong>
|
|
</p>
|
|
</div>
|
|
<div class="col text-right d-none d-lg-block my-auto">
|
|
<img alt="Illustration of a space defence spacecraft" class="mt-3 mt-lg-0" src="/assets/element-starfighter-b4edf8872bd39e6d73b6c756517f0a11ee8a5ce98f64d15312b1b5ec94fbaf66b77867619d84bfd0afa219aaa21ab36c2a82f3eb39e2a51871d8f7ac6234351e.webp">
|
|
</div>
|
|
</div>
|
|
|
|
<br><br>
|
|
<hr class="border-dark">
|
|
<br><br>
|
|
|
|
<div class="row">
|
|
<div class="col text-left my-auto">
|
|
<img alt="Illustration of a spacecraft for the most advanced space defence" class="mb-3 mb-lg-0" src="/assets/element-cruiser-44fae0a89294a81925d25f1d75cc87cb2fb6ebb6281ae0efc0bd791a579ff11b56d9c74417af8df22d1ca6e7aecd37e4fa4f465ba55306b658ede5dfdcdc120f.webp">
|
|
</div>
|
|
<div class="col-lg-7">
|
|
<h3>Cruiser</h3>
|
|
<p>
|
|
The Cruiser-type defence system offers a higher level of security and optimization than the Starfighter solution, the Server Hardening level of procedures also affects user permissions and kernel configuration, in addition to protection systems and security of critical and specific services through a firewall configuration. This module also allows you to encrypt and verify the authenticity of connections by setting up a system of encrypted connections through WireGuard, an open source program that allows you to create secure point-to-point connections in routed or bridged configuration. In addition, the systems will be equipped with automatic security updates on a periodic basis. The procedure allows you to offer your services in total security even where sensitive and biometric data are present.<br><br><strong>This module requires in advance that an analysis be carried out using the Rover module.</strong>
|
|
</p>
|
|
</div>
|
|
</div>
|
|
|
|
<br><br>
|
|
<hr class="border-dark">
|
|
<br><br>
|
|
|
|
<div class="row">
|
|
<div class="col text-left d-block d-lg-none">
|
|
<img alt="Illustration of a very advanced and performing space defence spacecraft" class="mt-3 mt-lg-0" src="/assets/element-stardestroyer-a6db4d74168fc8ac724ddde43bbe72afb687e6e9cfb164cc741874e592e04e7f291118778d0e6a80d4aa4d50edfff23f3ae0f1b9b629ed31cd74d0ac54b1c1bf.webp">
|
|
</div>
|
|
<div class="col-lg-7">
|
|
<h3>Star Destroyer</h3>
|
|
<p>
|
|
The Star Destroyer defence system adds an additional layer of security thus offering an optimized configuration of the server boot, a hardening of the partitions, a further customization of permissions and the total removal of any unused and obsolete protocols, services and applications in the operating system. In addition, the Star Destroyer module implements a technology for the synchronization and verification of certificates as well as a system of point-to-point encrypted connections (WireGuard). Threats and possible attack methodologies to which services and resources are exposed are evaluated. It also allows you to detect any system intrusions through IDS systems (Intrusion Detection System) in real time. This procedure allows to reach an advanced and personalized level of security, therefore inhospitable for possible cyber attacks. The Star Destroyer Module uses a customized automatic security update system configured ad hoc to optimize the environment in which it is applied.<br><br><strong>This Module requires in advance that an analysis be carried out through the Rover Module.</strong>
|
|
</p>
|
|
</div>
|
|
<div class="col text-right d-none d-lg-block my-auto">
|
|
<img alt="Illustration of a very advanced and performing space defence spacecraft" class="mt-3 mt-lg-0" src="/assets/element-stardestroyer-a6db4d74168fc8ac724ddde43bbe72afb687e6e9cfb164cc741874e592e04e7f291118778d0e6a80d4aa4d50edfff23f3ae0f1b9b629ed31cd74d0ac54b1c1bf.webp">
|
|
</div>
|
|
</div>
|
|
|
|
</div>
|
|
</section>
|
|
|
|
<section class="text-center pt-5 pb-5">
|
|
<div class="container">
|
|
<h1>Here's how to contact us!</h1>
|
|
|
|
<hr class="border-primary">
|
|
|
|
<p class="mt-5"> Getting information or learning more about our modules is really simple:<br><br>1.<strong> Contact us to get a free appointment</strong> with our technicians<br> 2. Make yourself <strong>available </strong> in this appointment <strong> for a free checklist</strong>, perhaps even involving your trusted technician<br> 3. We will then elaborate a personalized <strong>resolutive estimate</strong> using the information that emerged from the inspection, divided into risk factors (from the most critical to the less serious) or by the needs exposed (services, configurations, requests).<br><br> You will therefore be free to evaluate and choose from the Modules proposed, the one you consider to be the best situation for you, always taking into account any risk factors reported.<br><br> Finally, you can contact us by sending an email<br><br><small><i>If you want to experiment with new technologies, you can also contact us in the Fediverse or on the Matrix! Our links in the footer.</i></small><br><br> </p>
|
|
|
|
<a class="btn btn-primary" href="mailto:info@unitoo.it"><i class="fa fa-mail"></i> info@unitoo.it</a>
|
|
<br><br>
|
|
|
|
<hr class="mt-4 mb-4">
|
|
<a href="/info_at_unitoo_dot_it.gpg">Download the GPG Public Key</a>
|
|
<br><br>
|
|
<small>
|
|
<strong>GPG Fingerprint</strong><br> 732C B3AA B142 22AD 5650 E6E2 0A67 0F04 54EA BD72
|
|
<br><br>
|
|
<strong>sha512sum </strong><br><span style="word-wrap: break-word;">855cc60e031bd0f71d36751f8a28dc96301047b157e9abac34600128be15fffd3f78f1dada60ceb0ef0eab897da459adcdbf19522dd615868831900289216695</span>
|
|
</small>
|
|
<br><br>
|
|
</div>
|
|
|
|
</section>
|
|
|
|
|
|
<footer class="site-footer">
|
|
<div class="row text-center text-lg-left ml-0 mr-0">
|
|
<div class="col-0 col-lg-2 ml-auto"></div>
|
|
<nav class="col-12 col-lg-2">
|
|
<strong class="text-uppercase">Sitemap</strong>
|
|
<ul class="list-unstyled ml-0">
|
|
<li><a href="/">Homepage with our featured services</a></li>
|
|
<li><a href="/en/aboutus/">About us and what we are passionate about</a></li>
|
|
<li><a href="/en/services-and-products/">Our services and products aimed at the IT sector</a>
|
|
</li>
|
|
<li><a href="/en/contactus/">How to contact us, what are our procedures, our dedicated number and our email</a></li>
|
|
</ul>
|
|
</nav>
|
|
<div class="col-12 col-lg-2">
|
|
<strong class="text-uppercase">Projects</strong>
|
|
<ul class="list-unstyled ml-0">
|
|
<li><a href="/en/cybersecurity/referral/">Referral</a></li>
|
|
<li><a href="/en/projects/radio/">Our free radio, always dedicated to CC content and software</a></li>
|
|
<li><a href="/en/projects/software/">Free as in freedom software as a project and basic requirement, some details</a></li>
|
|
<li><a href="/en/news/">Canale Telegram dedicato alle news che abbiamo selezionato per noi e per voi</a></li>
|
|
</ul>
|
|
</div>
|
|
<div class="col-12 col-lg-2">
|
|
<strong class="text-uppercase">Channels</strong>
|
|
<ul class="list-unstyled ml-0">
|
|
<li><a href="/en/partners/peertube/">Partners - Peertube Italia</a></li>
|
|
<li><a href="/en/partners/funkwhale/">Partners - Funkwhale Italia</a></li>
|
|
</ul>
|
|
</div>
|
|
<div class="col-1 col-lg-2 mr-auto"></div>
|
|
</div>
|
|
<br>
|
|
<div class="container">
|
|
<div class="input-group mb-5">
|
|
<input type="text" id="search-input" class="form-control rounded-right" placeholder="Do you want to look for something?"
|
|
aria-label="Do you want to look for something?" aria-describedby="button-search" autocomplete="off">
|
|
<div class="input-group-append">
|
|
<div id="results-container" class="dropdown-menu d-block p-0 border-0"></div>
|
|
</div>
|
|
</div>
|
|
<p>
|
|
Copyright © Unitoo 2017-2023<br>
|
|
Software solutions, IT security and uncompromising IT consultancy<br><br>
|
|
<small>
|
|
The site (except logos) is fully released under the terms of the AGPLv3 license. You can find the sources here:
|
|
<a target="_blank" rel="nofollow" href="https://git.unitoo.it/unitoo/website">
|
|
<i class="fas fa-link-ext"></i> Gitea
|
|
</a>
|
|
<br>
|
|
</small>
|
|
</p>
|
|
|
|
<ul class="list-inline social-buttons mt-2 mb-3 mx-auto">
|
|
<li class="list-inline-item">
|
|
<a href="https://git.unitoo.it/unitoo" rel="nofollow" target="_blank" data-original-title="" title="">
|
|
<i class="fab fa-gitea" data-original-title="" title=""></i></a>
|
|
</li>
|
|
<li class="list-inline-item">
|
|
<a href="https://github.com/UnitooTeam" rel="nofollow" target="_blank" data-original-title=""
|
|
title=""><i class="fab fa-github-circled" data-original-title="" title=""></i></a>
|
|
</li>
|
|
<li class="list-inline-item">
|
|
<a href="https://social.unitoo.it/admin" rel="me" target="_blank" data-original-title="" title="">
|
|
<i class="fab fa-fediverse"></i>
|
|
</a>
|
|
</li>
|
|
<li class="list-inline-item">
|
|
<a href="https://matrix.to/#/#nodo-1-unity:unitoo.it" target="_blank" rel="nofollow"
|
|
data-original-title="" title="">
|
|
<i class="fab fa-element"></i>
|
|
</a>
|
|
</li>
|
|
<li class="list-inline-item">
|
|
<a href="/en/news/" target="_blank" data-original-title="" title="">
|
|
<i class="fab fa-telegram"></i>
|
|
</a>
|
|
</li>
|
|
<li class="list-inline-item">
|
|
<a href="https://liberapay.com/Unitoo/" rel="nofollow" target="_blank" data-original-title="" title="">
|
|
<i class="fab fa-liberapay"></i>
|
|
</a>
|
|
</li>
|
|
</ul>
|
|
|
|
<div class="small mt-3">
|
|
Unitoo di Claudio Maradonna, Via Circonvallazione Sud 28/A, Monteprandone, 63076 (AP) - IT02324570445 - REA:
|
|
AP-204883 - info@unitoo.it
|
|
<br>
|
|
<a href="/en/privacy-policy/">Privacy policy</a>
|
|
</div>
|
|
</div>
|
|
</footer>
|
|
|
|
|
|
<script type="text/javascript" src="/assets/main-b717254d1fae8a37a9098e1a66407ea2b9b7cd76acbbb5eee749296fc98760e748eea4448524bb48757b90e6e117046833e449715d736c9c11c933c76f57a42e.js"></script>
|
|
<script type="text/javascript" src="/assets/matomo-e9fa97b4ef39fda9e24f7c0db2744bdb731c84e01a8d86e42498e98788ec7a460d26029adc873f45b18028476792bae8286b88c013ee24d3dd3d72cff6923f8f.js"></script>
|
|
<script defer async="" type="text/javascript" src="/assets/analytics-10d4957b588a254ce37a63c7be90e4aaa63ec55cd10c784ff67cbcc98b793e6fb635942cd4abce23d24fb6777b0475962c65e10d477ec4603cc6eac28480a62c.js"></script>
|
|
|
|
|
|
<div id="cookie-notice">
|
|
<span>We use Matomo (a free as in freedom technology) to analyze traffic and give a better service.</span>
|
|
<a id="cookie-notice-accept" class="btn btn-primary btn-sm text-white">Approve</a>
|
|
<a href="https://matomo.org/gdpr/" rel="nofollow" target="_blank" class="btn btn-primary btn-sm text-white">Understand better</a>
|
|
<a id="cookie-notice-dismiss" class="mt-1 float-right text-decoration-none border border-secondary rounded btn btn-sm btn-secondary text-white">X</a>
|
|
</div>
|
|
|
|
</body>
|
|
|
|
</html>
|