DGS CyLABs
The reinforcement and reorganisation of our cyber security laboratories enables us to continue to offer services and solutions that are always in step with the future. We aim to support our customers more strongly in the entire security governance process and make our contribution to the protection of the digital ecosystem.
In a landscape where identities represent the new corporate perimeter to be protected, in an increasingly dematerialised context of cloud and hybrid infrastructures, the increased attack surface amplifies the risk of compromising processes, systems and data, with negative implications for the economy and sustainability.
To protect infrastructures and data from cyber-attacks and to promote energy savings by optimising processes and the use of technological resources, at DGS we have developed an approach aimed at consolidating internal competencies by strengthening, verticalising and reinforcing the organisational structure of our Cybersecurity Labs (CyLABs).
Within these factories, our experts test cutting-edge solutions and technologies from innovative start-ups and leading industry vendors in various fields.
By strengthening and reorganising the Cybersecurity Labs, we are consolidating our expertise to meet the challenges of the industry with greater strength.
Identity Threat Detection and Response (ITDR)
We experiment news threat detection techniques and tools, leveraging the know-how of our resources, to protect Digital Identities and secure corporate assets.
Cloud Native Application Protection Platform (CNAPP)
We develop new techniques for identifying and responding to infrastructural gaps in cloud-native environments to guarantee the integrity, confidentiality and availability of information.
eXtended Detection and Response (xDR)
We identify new methodologies and technologies for automatic threat detection and response to protect the entire technological infrastructure.
Advanced Threat Detection Intelligence (ATDI)
We experiment with new methodologies and technologies to detect, prevent and respond to threats in order to preserve the security of the entire technological infrastructure.
Business Email Compromise (BEC)
We orchestrate training, analysis tools and infrastructure protocols for effective protection against Business E-mail Compromise attacks.
Critical Infrastructure & IoT Protection (ICS & IoT Protection)
We protect critical infrastructures that are increasingly interconnected and vulnerable to cyber attacks by developing customised solutions.
Attack Surface Check and Remediation (ASCR)
We experiment with solutions that help our customers keep an eye on changes in their attack surface, to defend their core assets from cyber attacks.
Automation & Orchestration (A&O)
We experiment with innovative solutions and technologies for the automation and orchestration of IT security management processes.
Data Access and Governance (DAG)
We study and identify new methodologies and technologies for identifying and mitigating risks to sensitive corporate data to reduce the attack surface and the likelihood of a data breach.
Web Application and API Protection (WAAP)
We test new services and solutions to protect companies’ and users’ web applications and APIs from the most insidious cyber risks.