TELSY S.p.A.
This post is also available in:
Italiano (Italian)
This post is also available in:
Italiano (Italian)
Information
-
Url www.telsy.it
-
Company Dimension
Big
-
Share capital
€ 5,390,000.00
Locations
-
Headquarter
Via Antonio Nibby, 6
Roma (RM) 00161
Italy
- Other Locations
-
Corporate
Via Bartolomeo Marliano, 27 Rome (RM) 00162 Italy
-
Registered office and operational office
Corso Svizzera, 185 Torino (TO) 10149 Italia
T: +39 011 77 14 343
-
Operational
Centro Direzionale, Isola F7 Naples (NA) 80143 Italia
-
Business Location
Via Gaetano Negri, 1 Milano (MI) 20123 Italia
Founded in Turin in 1971 and part of the TIM Group since 2001, Telsy is today the primary reference point in Italy for secure communications and cryptography, with a strategic role also recognized under the Italian Golden Power regulatory framework. With more than 50 years of experience, about 350 professionals, and a widespread presence throughout the national territory, Telsy operates as a center of excellence for secure communications, cybersecurity, and quantum-security solutions, serving governmental, institutional, industrial, and research clients in Italy and abroad.
For the Defense sector and Italian institutions, Telsy provides its complete suite of secure communications products for both classified and unclassified domains, as well as advanced cybersecurity solutions and capabilities.
Telsy also operates internationally with a selected portfolio of exportable products and services, in full compliance with national and international regulations governing dual-use export controls.
CRYPTO
NETWORK ENCRYPTION
Secure Communications for the Italian Classified Domain
Telsy encryption devices ensure end-to-end protection of IP communications, regardless of the nature of the traffic involved—data, audio, or video. The product range includes several types of certified equipment selected according to the classification level of the traffic to be protected and the performance required in terms of throughput.
The management of cryptographic material is centralized in a dedicated Key Distribution Center (KDC) operating in air-gapped mode, thereby eliminating any remote attack surface in the key distribution process.
All devices are approved for operational use by the Italian National Authority, confirming compliance with the most stringent national security requirements for the handling of classified information.
Secure Communications for the Unclassified Domain
Musa Family Encryption Solutions
The TelsyMusa family of software encryption solutions is designed to provide the highest standards of security for data in transit. It can support use cases ranging from simple configurations to the most complex network environments, thanks to proprietary Telsyguard protocol which combines cryptographic security features from both traditional and PQC (Post-Quantum Cryptography) algorithms.
Compared with traditional firewalls and routers using standard VPN technologies, TelsyMusa encryption solutions provide a higher level of security, resulting from Telsy’s long-standing experience in cryptography in support of governmental institutions and defense organizations.
Quantum Key Distribution
Quantum Key Distribution (QKD) is a physical-layer methodology that enables the generation of symmetric cryptographic keys for extremely high-security communications. It allows two or more remote users to generate and share a random secret key known exclusively to them, which can then be used to encrypt and decrypt messages. These secret keys can be used by existing encryption devices to ensure the highest level of security for digital communications.
A unique feature of QKD is the system capability to detect the presence of a third party (an eavesdropper) attempting to obtain information about the key. As a result, QKD systems are secure against both classical and quantum interception attempts.
A QKD system consists of a transmitter (Alice unit) and a receiver (Bob unit). Alice and Bob are connected through both a quantum channel and a classical channel. The quantum channel is used for the exchange of quantum states, while the classical channel is used for synchronization and for exchanging the information required to extract the cryptographic key from the quantum state exchange.
SECURE COMMUNICATIONS
Intouch – Secure Messaging App
TelsyIntouch is a secure collaboration application developed by Telsy to ensure the protection of communications and data through security protocols which make use of encryption algorithms compliant with U.S. cryptographic standards (NIST).
Its intuitive user experience expands the concept of instant messaging by enabling users to exchange text messages, voice messages, documents, photographs, and videos, as well as conduct voice and video calls, all in a fully secure environment. Security is ensured through the combination of strong end-to-end encryption, on-premise dedicate infrastructure, and application access protected through PIN or biometric authentication.
The self-consistent architecture implemented on a private infrastructure grants the customer full control and sovereinity over the solution.
Antares – Secure Videoconferencing System
TelsyAntares is a web conferencing platform developed on the open-source Jitsi framework. It uses asymmetric cryptographic protocols to ensure participant authentication.
The solution has been designed to allow simple and rapid deployment in any operational environment while guaranteeing security levels higher than those offered by conventional videoconferencing platforms. Cryptographic keys are held and managed exclusively by the infrastructure owner, without external intermediaries.
As an additional security layer, TelsyAntares supports end-to-end encryption, where cryptographic keys are available only to participants in the active session, thereby significantly reducing vulnerability surfaces against sniffing attacks and similar threats.
The self-consistent architecture implemented on a private infrastructure grants the customer full control and sovereinity over the solution.
The solution currently supports up to 50 concurrent participants.
CYBER
PREVENTION
Cyber Threat Intelligence
TS-Intelligence is a cyber-intelligence solution designed to meet the needs of organizations seeking effective tools to prevent, identify, or mitigate cyber threats.
The solution provides detailed information, in both Italian and English, on existing and emerging threats, malicious tools used by adversaries, and vulnerabilities actively exploited by state-sponsored, criminal, or hacktivist actors.
TS-Intelligence provides access to strategic, tactical, operational, and technical reports covering IT and OT vulnerabilities, malware, emerging cyber threats, data breaches; it also provides technical intelligence, including Indicators of Compromise (IoCs), with preventive indicators that enhance threat detection capabilities using the technological tools already deployed within the organization.
Red Teaming
Telsy offers its institutional and governmental clients a structured Red Teaming service based on an internal team of experts possessing advanced offensive security certifications and proven expertise in dealing with sophisticated threats.
The team also benefits from solid experience gained through NATO cyber exercises in this specific domain, demonstrating advanced capabilities in both cyber defense and offensive cyber operations.
The service consists of a controlled simulation of a cyber attack conducted using the same techniques, tactics, and procedures employed by real adversaries, with the objective of achieving specific goals defined at the beginning of the engagement.
In crisis or active conflict scenarios, the service provides immediate strategic value by enabling partner countries and their institutions to verify the real resilience of their cyber defenses before adversaries exploit potential weaknesses, relying on a trusted and qualified team fully aware of the operational context and specific threats of the relevant theater.
Vulnerability Assessment and Penetration Testing
The Vulnerability Assessment (VA) consists of the systematic activity of identifying known cybersecurity vulnerabilities that could compromise the confidentiality, integrity, and availability of data, through the use of specific tools and validation activities.
The activity is structured in the following phases:
| Vulnerability Assessment | Description |
| Information Gathering | Collection of publicly available information |
| Discovery | Network mapping and service identification |
| Vulnerability Scan | Identification of Vulnerabilities |
| Manual Verification | Manual verification of identified vulnerabilities |
| Impact Analysis | Analysis of the impact of the identified vulnerabilities |
| Remediation Analysis | Identification of corrective actions |
| Report | Documentation output |
At the end of the activities, a vulnerability report will be generated, including the severity level and the recommended remediation actions.
Following the delivery of the report, a Feedback Meeting will be organized in order to discuss the results of the Vulnerability Assessment with the Client.Vulnerability Assessment (VA) is performed using dedicated tools designed to scan IT environments and identify vulnerabilities.
Penetration Testing (PT) adds an additional layer to the Vulnerability Assessment by objectively demonstrating the actual exploitability—and therefore compromise potential—of vulnerabilities identified during previous phases, whether technological vulnerabilities or logical flaws within target applications.
Penetration tests may be conducted on different assets and infrastructures, with or without authentication. These activities include:
- Infrastructure PT: performed on servers and/or network devices, without application interfaces
- Application PT: conducted on web applications (Web Apps) or mobile applications (Mobile Apps)
- Wi-Fi Infrastructure PT: testing of the infrastructure responsible for providing corporate Wi-Fi connectivity
- SCADA PT: testing performed on SCADA systems supporting industrial infrastructures and processes
Security Awareness
TelsySkills is an e‑learning platform, specifically designed to enhance employees’ cybersecurity awareness through advanced training methodologies, including gamification mechanisms.
PROTECTION
The protection from threats that are external to infrastructures includes the use of adequate software, protocols, and actions capable of recognizing and blocking cyberattacks.
Endpoint Protection
Solutions deployed on endpoint devices to prevent file-based malware attacks, detect malicious activity and provide the investigation and remediation capabilities needed to respond to dynamic security incidents and alerts.
ATMO
TelsyATMO is an ultrasonic audio jammer that inhibits the recording of ongoing voice conversations by malicious applications, present on compromised smartphones and mobile devices.
The system prevents any conversation held in the presence of mobile devices, contained within the TelsyATMO, from being unintentionally overheard by potential eavesdroppers or malicious actors.
SpywareDetector
Smartphones are increasingly prone to advanced malware attacks installed without the owner’s knowledge by exploiting unknown vulnerabilities in the operating system and particular APPs.
TelsySpywareDetector is the solution that can detect potential Spyware on mobile devices without the need for installation on the scanned device.
MONITORING DETECTION & RESPONSE
Security Operation Center with 24/7 Monitoring Capabilities
Telsy provides institutional and private clients with a managed security service delivered through its proprietary Security Operations Center (SOC), operational 24 hours a day, 7 days a week, ISO/IEC 27001 certified, located in Naples.
The Telsy SOC employs approximately 60 specialists and is organized across three operational tiers: the fist level operates help desk functions and event triage, the second level is made of highly specialized analysts performing in-depth incident analysis, the third level is the CSIRT team, specialized in advanced incident response, digital forensics, and cyber threat intelligence.
The Telsy SOC integrates best-of-breed international technologies with internally developed solutions, including its proprietary Threat Intelligence platform.
Key services include:
- Security Monitoring: continuous monitoring of security events with advanced correlation and anomaly detection
- Incident Response and Crisis Management: support for incident analysis, containment, and eradication, with coordination of the client’s technical stakeholders
- Vulnerability Assessment and Penetration Testing: periodic evaluation of the organization’s security posture
- Vulnerability Management: continuous vulnerability management through the Tenable.sc platform, including dashboards, reporting, and remediation workflows
- Technology Early Warning: proactive monitoring of OSINT sources to identify new vulnerabilities affecting technologies used by the client
- Cyber Threat Intelligence: predictive service monitoring the deep and dark web to anticipate targeted attack campaigns against sectors, organizations, or specific entities of interest
Decision intelligence
The Decision Intelligence service is offered through a modular platform based on innovative technologies of Machine Learning and Natural Language Processing, that allows to integrate and process real-time data inside and outside the organization to provide decision-makers with the key elements to make time-sensitive decisions and at the same time automate often time-consuming analytical processes.
Research & Development
Research and innovation represent a core pillar of Telsy’s strategy. In close cooperation with public and private partners, Telsy is actively engaged in the development of post quantum technologies to address the significant security challenges arising from the advent of quantum computing, delivering solutions designed to ensure long term and future resilient protection.
Telsy’s Research and Development team is dedicated to the investigation of highly innovative and strategically relevant topics in the fields of cryptography, cybersecurity, and quantum technologies. The team participates in national and European research initiatives and maintains structured and continuous collaboration with leading academic institutions, contributing to thesis work, internships, and PhD programs, as well as to the organization of scientific conferences and webinars.
- CONSULTATION, COMMAND AND CONTROL, COMMUNICATION AND INFORMATION SYSTEMS/EQUIPMENT
- DESIGNING
- ELECTRONIC MEASURE AND COUNTERMEASURE SYSTEMS AND EQUIPMENT
- MAINTENANCE, TRANSFORMATION AND OVERHAUL
- R&D ACTIVITIES
- SECURITY, SURVIVAL AND RESCUE
- HANDSETS
- CRYPTO COMMUNICATION SYSTEMS
- COMMAND, CONTROL AND INFORMATION
- COMMUNICATION SYSTEMS
- DATA/IMAGE PROCESSING, DISPLAY AND RECORDING SYSTEMS/EQUIPMENT, DATA MANAGEMENT AND TRANSFER
- GROUND SEGMENT FOR OPERATIONS AND DATA PROCESSING
- MISSION-RELATED SYSTEMS
- SOFTWARE
- SYSTEMS AND EQUIPMENT FOR CRIMINAL INVESTIGATIONS ND FORENSIC SCIENCE
- DECISION SUPPORT SYSTEMS
- MISSION-RELATED SYSTEMS
- ICT
- FACILITIES SECURITY
- strategic, tactical and integrated
- underwater
- airborne
- base security systems
- naval
- big data analytics
- artificial intelligence
- Cybersecurity systems for military bases and related communications