Fredda Stanza

Fredda Stanza

Fredda Stanza specialize in Information Security and Forensics Consulting.

Below are just some of the consulting services "Tailor made":
• Security Infrastructure Architecture Design
• Analysis of Information Security for Business Processes
• Analysis of Information Security Risks
• Analysis and Elaboration of Policies
• Response and handling of Information Security Incidents
• Implementation of Information Security standards
• Security Operations Center (SOC), architecture, design, support in implementation of Blue Teams and Red Teams

Our audit services provide you with specialized technical knowledge in security, the reviews are carried out with objectivity and independence.
• Fraud Prevention
• Policy compliance audits
• Corporate Forensic Analysis
• Safety audits to Source Code
• Mobile application audits
• Audit and Analysis of the Corporate Image
• Ethical Hacking - Penetration Tests
• Hardening - Information Technology Infrastructure Assurance
• Security Audit of IT Infrastructure

Contact Information

Categories:
Digital Forensics

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Vera Security

Vera Security

Vera is a data security platform that provides 360-degree visibility and control over critical business data, anywhere it's shared or stored.

CLUSIS

CLUSIS

CLUSIS is an association for the information security industry in Switzerland.

First Response

First Response

First Response is a Cyber Incident Response and Digital Forensic Investigation company.

Cisco Talos

Cisco Talos

Talos is an industry-leading threat intelligence solution that protects your organization’s people, data and infrastructure from active adversaries.

Celare

Celare

Celare delivers DPI based network perimeter monitoring solutions with integrated Big Data security analytics and threat detection.

Digitronic Computersysteme

Digitronic Computersysteme

Digitronic focus on innovative software to protect your personal and sensitive corporate data.

Hornetsecurity

Hornetsecurity

Meet Hornetsecurity – Leading Cloud Email Security Provider. We protect global organizations so you can focus on what you do best.

Cylus

Cylus

Cylus, a global leader in rail cybersecurity, helps rail and metro companies avoid safety incidents and service disruptions caused by cyber-attacks.

Assertion

Assertion

Assertion secures your collaboration (UC/CC) systems from cyber risks. Enforcing the right set of controls and monitoring them continually brings down risk to acceptable levels.

Fischer Identity

Fischer Identity

Fischer Identity provide identity & access management and identity governance administration solutions.

IdentityIQ

IdentityIQ

IdentityIQ is a US-based identity theft and credit protection company designed to help users stay on top identity thieves and data breaches.

Zerodium

Zerodium

Zerodium is the leading exploit acquisition platform for premium zero-days and advanced cybersecurity research.

MyDocSafe

MyDocSafe

MyDocSafe is an all-in-one document security and e-sign software.

Imageware

Imageware

Imageware is a leader in biometric cybersecurity. Protect against costly, damaging ransomware hacks by employing biometric cybersecurity solutions.

Triangle

Triangle

Triangle enable innovative business transformation by ensuring critical hybrid infrastructures are optimised, interoperable and secure.

Operant Networks

Operant Networks

Operant Networks mission is to provide Operational Technology (OT) teams with solutions that simplify their increasingly complex worlds.