This post is also available in: Italiano (Italian)
This post is also available in: Italiano (Italian)
Via Antonio Nibby, 6
Roma (RM) 00161
- Other Locations
Via Bartolomeo Marliano, 27 Rome (RM) 00162 Italy
Corso Svizzera, 185 Torino (TO) 10149 Italia
T: +39 011 77 14 343
Centro Direzionale, Isola F7 Naples (NA) 80143 Italia
Via Gaetano Negri, 1 Milano (MI) 20123 Italia
To ensure today’s security, tomorrow’s threats must be anticipated. Telsy works to develop future-proof products and solutions that support the protection of sensitive data and communications, contributing to the strengthening of national defense and the security of business customers, also ensuring the protection of the infrastructures and services offered by the TIM Group in the area of information and communications security.
With proprietary made-in-Italy technologies and a strong innovative drive, Telsy dedicates highly specialized resources to serve the customer’s needs both through prevention strategies and threat neutralization interventions, guaranteeing timely support in critical situations even on premises.
Telsy offers advanced, integrated, scalable and customizable cybersecurity-as-a-service solutions to build and improve defense strategies tailored to customer needs. The Cyber products and services portfolio includes Prevention (Cyber Risk Management, Vulnerability Management, Securty Awareness), Protection (Network Security, Endpoint Protection, Application & Cloud Securoty, OT Security) and Monitornig, Detection & Response (iSOC, Cyber Threat Intelligence and Decision Intelligence).
In addition, the Telsy cryptographic systems guarantee the highest security standards in data and communications transfer, the result of over fifty years of experience and continuous innovation in ever new and captivating areas. The Crypto products and services portfolio includes Nework Encryption (IP encryption), Secure Communication (Voice Security, File Encryption, Videoconference, Secure Collaboration, Environment Protection) and solutions designed for government use.
On the side of Quantum Technologies and innovative technologies, Telsy directs its research efforts in the fields of QKD (Quantum Key Distribution), PQC (Post-Quantum Cryptography), SCADA Protection, Artificial Intelligence, Homomorphic Encryption and Crypto, Cyber & Cloud Convergence.
Telsy operates in the market fields of Energy, Utilities & Transportation, Retail, Manufacturing, Finance & Gaming, Central Government, Local Government, Education & Health.
Speed, reliability, efficiency. These are imperatives in today’s communications security landscape. Protecting your data from theft and tampering is increasingly complex and requires tools that are up to the task. With its fifty years of experience in the development of proprietary ciphers and algorithms, Telsy guarantees maximum protection in the transfer of data and communications, providing security solutions for the Government and Defense to support national security.
Our private and professional conversations are constantly vulnerable: illegal wiretapping, eavesdropping, and malicious apps are just some of the threats. Telsy’s Voice Security solutions offer simple and efficient answers to these problems: without the need for expensive infrastructural and instrumental adjustments, it’s possible to ensure maximum protection for your conversations while maintaining the classic usability of traditional devices. Design, elegance, and reliability on any eventuality.
Telsy’s historic tradition in the supply of government and military equipment is the bearer of over fifty years of experience and innovation. Secure radios, positioning ciphers, and customized security protocols are just some of the solutions that have characterized Telsy’s history and its solid relationship with the institutions.
The best way to prevent an attack is to test own infrastructures to better comprehend their vulnerabilities and put in place appropriate crisis response initiatives. Telsy puts its technologies and experts at the service of quality and efficiency, averting crises in the bud and providing high-level consulting and support for the user’s security strategies.
CYBER RISK MANAGEMENT
These are solutions that assess the comprehensive risk level and security posture concerning predefined benchmark targets.
In order to strengthen the cyber security infrastructure, Telsy performs both Vulnerability Assessment activities, through the use of automatic tools, and Penetration Test activities to identify weaknesses and draw a correct preventive strategy.
In the cybersecurity domain, people’s behaviors make the difference even more than technologies: security awareness, i.e. the capacity to remain vigilant, act and react in front of potential risks and cyber threats, has become an essential capability both in work and private environments.
The protection from threats that are external to infrastructures includes the use of adequate software, protocols, and actions capable of recognizing and blocking specific cyberattacks. Thanks to up-to-date software and certified proprietary technologies, Telsy protects the devices and networks of government and corporate customers based on their specific needs.
Network security concern measures taken to protect a communications pathway from unauthorized access to, and accidental or willful interference of, regular operations.
Solutions deployed on endpoint devices to prevent file-based malware attacks, detect malicious activity and provide the investigation and remediation capabilities needed to respond to dynamic security incidents and alerts.
APPLICATION & CLOUD SECURITY
Applications and cloud technologies for security without compromise or borders.
Safety component linked to customers and organizations that make extensive use of smart systems, robotization and processes, and production automation.
Products and solutions monitored and distributed by Telsy.
MONITORING, DETECTION & RESPONSE
Thanks to technologies, infrastructures, and the dedication of its experts, Telsy provides customized solutions that allow the user to manage their security perimeter independently and on-premise.
A pillar of Telsy’s capabilities is OMNIA, an integrated cybersecurity platform that leverages the combination of its three components to provide highly specialized functionality. The first component is MIRO, a SIEM solution able to monitor customer infrastructures thanks to Artificial Intelligence. ODINO is the Threat Intelligence Platform that collects cybersecurity feeds from various open and closed sources, merging them with analyzes carried out internally by Telsy. The integration between ODINO and MIRO continuously updates the latter on the latest threats in order to improve and speed up analysis and correlation. The last component is OLIMPO, a Decision Intelligence platform that uses the most sophisticated AI algorithms to collect and analyze unstructured data (such as, for example, those coming from social platforms or the Dark Web) and correlate them with the information present on the knowledge base in order to enrich and improve it, at the same time providing support to operators to facilitate them in investigations and in making important decisions.
ISOC – MONITORING & RESPONSE
Security monitoring implies the collection and analysis of information, to detect suspicious behaviors and unauthorized system modifications on a network, defining alert/warning targets and countermeasure procedures based on the needs identified.
CYBER THREAT INTELLIGENCE
Cyber Threat Intelligence represents the intelligence capacity developed in the cybersecurity field. Include the collection and analysis of information in order to characterize possible cyber threats from a technical, resource/motivation, and purpose point of view, often concerning specific operational contexts.
The Decision Intelligence service is offered through a modular platform based on innovative technologies of Machine Learning and Natural Language Processing, that allows to integrate and process real-time data inside and outside the organization to provide decision-makers with the key elements to make time-sensitive decisions and at the same time automate often time-consuming analytical processes.
RESEARCH & QUANTUM
Today the threat of quantum attacks is a real danger. The protection of data and communications is linked to technologies that give future-proof answers, capable of thwarting threats with still partially unknown potential. In this context, quantum-resistant solutions are needed that offer superior protection, bypassing the logic of traditional security protocols.
Telsy and QTI (a Telsy subsidiary company, leader in quantum communication technologies) take the field with Quantum Key Distribution (QKD) to overcome the problem exposed by quantum cyber attacks. QKD is a physical layer method that allows for the secure distribution of random keys between remote users. These (secret) keys can then be used by existing ciphers, ensuring maximum security in communications. The association between Telsy and QTI ensures a fully reliable end-to-end encryption system, compatible with the current telecommunications infrastructure for private and government applications.
Post-quantum Cryptography (PQC) is a mathematical response that attempts to identify new mathematical problems, not vulnerable to quantum algorithms, which can be used within public-key cryptographic schemes. Post quantum cryptography, therefore, refers to the development of cryptographic systems, interoperating with existing communications protocols, adequate to face the threats posed by quantum, and also classical, computers.
SCADA networks are physiologically vulnerable to various types of attacks and intrusion by malicious actors. Being widely used in industry, infrastructure, and communication systems of large machinery (such as ships), the surface of exposure to attacks is a problem of absolute importance. Telsy, in collaboration with institutions, private partners, and research centers, studies and develops cutting-edge technological solutions to avoid these risks.
Telsy integrates the most advanced artificial intelligence systems by actively collaborating in the development of new models and algorithms for multiple purposes:
The “classic” correlation algorithms, to refine and optimize the integrations with the normal security alerts;
The innovative Adversarial Machine Learning systems, which exploit Deep Learning models to create samples that escape detection engines, using them as evaluators of the goodness of the defensive system, allowing them to be strengthened towards potential new threats;
Natural Language Processing applications, to give access to the huge amount of unstructured data that the web offers, without requiring huge amounts of human resources for the analysis of the sources.
Homomorphic encryption is a class of encryption methods allowing calculations to be performed on encrypted data without first decrypting it. The possibility to perform computation without requiring access to the secret key makes homomorphic encryption different from typical encryption methods, that require data to be decrypted to be processed correctly.
The computations resulting from homomorphic encryption remain in an encrypted form and can be decrypted by the owner of the secret key at a later time, indeed it allows encrypted data to be processed as if it were in plaintext and produce the correct value once decrypted.
CRYPTO, CYBER & CLOUD CONVERGENCE
Within the natural convergence of the most innovative technologies towards the paradigm of the Cloud world, Telsy is focusing on issues relating to information security. In particular, on the cybersecurity side, the focus is on solutions dedicated to the Cloud to support operators in the design and implementation of attack mitigation and response plans, while on the cryptography side, multi-cloud key management schemes are being considered to ensure transparency and privacy for the user.
- CONSULTATION, COMMAND AND CONTROL, COMMUNICATION AND INFORMATION SYSTEMS/EQUIPMENT
- ELECTRONIC MEASURE AND COUNTERMEASURE SYSTEMS AND EQUIPMENT
- MAINTENANCE, TRANSFORMATION AND OVERHAUL
- R&D ACTIVITIES
- SECURITY, SURVIVAL AND RESCUE
- CRYPTO COMMUNICATION SYSTEMS
- COMMAND, CONTROL AND INFORMATION
- COMMUNICATION SYSTEMS
- DATA/IMAGE PROCESSING, DISPLAY AND RECORDING SYSTEMS/EQUIPMENT, DATA MANAGEMENT AND TRANSFER
- GROUND SEGMENT FOR OPERATIONS AND DATA PROCESSING
- MISSION-RELATED SYSTEMS
- SYSTEMS AND EQUIPMENT FOR CRIMINAL INVESTIGATIONS ND FORENSIC SCIENCE
- DECISION SUPPORT SYSTEMS
- MISSION-RELATED SYSTEMS
- FACILITIES SECURITY
- strategic, tactical and integrated
- base security systems
- big data analytics
- artificial intelligence
- base security systems
- security-related consultancy services