SlideShare a Scribd company logo
The First Cloud Cyber Security
& GDPR Platform
In collaboration with
CISCO
FINTECH DISTRICT
community
The First Cloud
Cyber Security
& GDPR Platform
Swascan
Platform
CLOUD
ON PREMISE
The Web App Scan is the automated service to scan Web
Vulnerabilities. The Vulnerability Assessment Scanner that
identifies security vulnerabilities and criticalities in terms of
websites and web applications. The Vulnerability analysis is
necessary to quantify risk levels and to provide the
corrective actions to implement for the remediation.
Identifies the vulnerabilities of websites and web applications including SQL
Injection, Cross-Site Scripting and a lot more.
Assures Compliance to OWASP model and current regulations. Provides a risk level
analysis together with indications to solve vulnerabilities.
Security Scan for Web applications to identify vulnerabilities.
Automatic generation of PDF and CSV reports.
Network Scan is the Network Vulnerability Scan automated
service. The online Network Scan tool scans the
infrastructure and the devices to identify security
vulnerabilities and criticalities. The Vulnerability analysis is
necessary to quantify risk levels and to provide the
corrective actions to implement for the remediation.
It runs the Vulnerability Scan for network and device vulnerabilities and helps fixing
them.
Security Scan of IT infrastructures.
Compliance test with GDPR. Moreover, provides a risk level analysis together with
indications to solve vulnerabilities.
Automatic generation of PDF and CSV reports.
Code Review is the automated tool for the static analysis of
the source code. Source Code analysis is a process that –
trough the source code analysis of applications – verifies
the presence and effectiveness of minimum security
standards. Code verification is useful to be sure that the
application has been developed in order to “auto-defend”
itself in its own environment.
It provides a detailed analysis of the source code in order to identify security
vulnerabilities and criticalities.
The Static Analysis Source Code Tool that supports more than 16 languages.
Compliance test with GDPR. Moreover, provides a risk level analysis together with
indications to solve vulnerabilities.
Automatic generation of PDF and CSV reports.
Reporting
Generazione automatica di report
in pdf e csv.
Web APP SCAN Code Review
Security testing and security
scan of web applications to
identify vulnerabilities
Analysis of third parties
applications vulnerabilities that
could generate the loss or undesired
access to customers data
Compliance to OWASP model
and to current laws
Code review provides an
accurate analysis of the source
code in order to identify
vulnerabilities
It tests source code
vulnerabilities
Identification of
inefficiency and
deficiencies
Identification of critical
areas
Reporting
Automatic generation of PDF
and CSV reports.
Network SCAN
This feature scans networks
and devices, identifies
vulnerabilities and helps fixing
them
Network Security testing scan
It constantly verifies the
compliance to current laws
It monitors internal
procedures and company’s
policies
GDPR Assessment
GDPR Self Assessment
It runs the analysis and provides
the level of GDPR Compliance
GDPR Gap Analysis
Identifies criticalities and
intervention priorities
Action plan
Defines repositioning activities
Reporting
Automatic generation of PDF
and CSV reports.
The First Cloud
Cyber Security
& GDPR Platform
Swascan
Competence
Center
Cyber Security
Testing
Threat
Management
Cyber Threats
Intelligence
Cyber Defense
Incident
Response &
Post-Incident Analysis
Education
Cyber
Simulations & Gaming
4
1
2 3
765
Raoul Chiesa: known worldwide for his knowledge in
cybersecurity, hacking and cyber-crime. He is a member of
several European and International governmental and non-
governmental organizations.
Business Competence: Software&Consultant company
known worldwide for its achievements and awards such as
New York Webby Award, Internet Oscar, GMIC Silicon valley
finalist,...
Key Capital: Venture Capital
Noovle: Is an ICT and Cloud strategic consulting company
and Google first partner in Italy
Italia
Distributori
Estero
Distributori
Italia
Partner
Estero
Partner
15 532
AS - IS
TO - BE
The First Cloud Cyber Security
& GDPR Platform
In collaboration with
CISCO
FINTECH DISTRICT
community

More Related Content

What's hot

Swascan
Swascan Swascan
Swascan
Pierguido Iezzi
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Cigital
 
Splunk for palo_alto
Splunk for palo_altoSplunk for palo_alto
Splunk for palo_alto
Greg Hanchin
 
Mobile Threats and Trends Changing Mobile App Security
Mobile Threats and Trends Changing Mobile App SecurityMobile Threats and Trends Changing Mobile App Security
Mobile Threats and Trends Changing Mobile App Security
DevOps.com
 
Exploiting parameter tempering attack in web application
Exploiting parameter tempering attack in web applicationExploiting parameter tempering attack in web application
Exploiting parameter tempering attack in web application
Vishal Kumar
 
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
Sonatype
 
IBM AppScan Standard - The Web Application Security Solution
IBM AppScan Standard - The Web Application Security SolutionIBM AppScan Standard - The Web Application Security Solution
IBM AppScan Standard - The Web Application Security Solution
hearme limited company
 
Automatic detction of web apps vulnerability
Automatic detction of web apps vulnerabilityAutomatic detction of web apps vulnerability
Automatic detction of web apps vulnerability
임채호 박사님
 
Finding Zero-Days Before The Attackers: A Fortune 500 Red Team Case Study
Finding Zero-Days Before The Attackers: A Fortune 500 Red Team Case StudyFinding Zero-Days Before The Attackers: A Fortune 500 Red Team Case Study
Finding Zero-Days Before The Attackers: A Fortune 500 Red Team Case Study
DevOps.com
 
End-to-end Testing for IoT Integrity
End-to-end Testing for IoT IntegrityEnd-to-end Testing for IoT Integrity
End-to-end Testing for IoT Integrity
Parasoft
 
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI ComplianceTools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Sonatype
 
Strengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain VisibilityStrengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain Visibility
Sonatype
 
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Sonatype
 
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Ajin Abraham
 
Analyzing the effectivess_and_coverage_of_web_app_scanners
Analyzing the effectivess_and_coverage_of_web_app_scannersAnalyzing the effectivess_and_coverage_of_web_app_scanners
Analyzing the effectivess_and_coverage_of_web_app_scanners
Larry Suto
 
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
Ajin Abraham
 
Integration Testing at go-mmt
Integration Testing at go-mmtIntegration Testing at go-mmt
Integration Testing at go-mmt
Om Vikram Thapa
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
Prateek Jain
 
Accelerating innovation with software supply chain management
Accelerating innovation with  software supply chain management    Accelerating innovation with  software supply chain management
Accelerating innovation with software supply chain management
matthewabq
 
Testing IoT Apps with the Cloud
Testing IoT Apps with the CloudTesting IoT Apps with the Cloud
Testing IoT Apps with the Cloud
Josiah Renaudin
 

What's hot (20)

Swascan
Swascan Swascan
Swascan
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?
 
Splunk for palo_alto
Splunk for palo_altoSplunk for palo_alto
Splunk for palo_alto
 
Mobile Threats and Trends Changing Mobile App Security
Mobile Threats and Trends Changing Mobile App SecurityMobile Threats and Trends Changing Mobile App Security
Mobile Threats and Trends Changing Mobile App Security
 
Exploiting parameter tempering attack in web application
Exploiting parameter tempering attack in web applicationExploiting parameter tempering attack in web application
Exploiting parameter tempering attack in web application
 
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
 
IBM AppScan Standard - The Web Application Security Solution
IBM AppScan Standard - The Web Application Security SolutionIBM AppScan Standard - The Web Application Security Solution
IBM AppScan Standard - The Web Application Security Solution
 
Automatic detction of web apps vulnerability
Automatic detction of web apps vulnerabilityAutomatic detction of web apps vulnerability
Automatic detction of web apps vulnerability
 
Finding Zero-Days Before The Attackers: A Fortune 500 Red Team Case Study
Finding Zero-Days Before The Attackers: A Fortune 500 Red Team Case StudyFinding Zero-Days Before The Attackers: A Fortune 500 Red Team Case Study
Finding Zero-Days Before The Attackers: A Fortune 500 Red Team Case Study
 
End-to-end Testing for IoT Integrity
End-to-end Testing for IoT IntegrityEnd-to-end Testing for IoT Integrity
End-to-end Testing for IoT Integrity
 
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI ComplianceTools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
 
Strengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain VisibilityStrengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain Visibility
 
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
 
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...Automated Security Analysis of Android & iOS Applications with Mobile Securit...
Automated Security Analysis of Android & iOS Applications with Mobile Securit...
 
Analyzing the effectivess_and_coverage_of_web_app_scanners
Analyzing the effectivess_and_coverage_of_web_app_scannersAnalyzing the effectivess_and_coverage_of_web_app_scanners
Analyzing the effectivess_and_coverage_of_web_app_scanners
 
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
G4H Webcast: Automated Security Analysis of Mobile Applications with Mobile S...
 
Integration Testing at go-mmt
Integration Testing at go-mmtIntegration Testing at go-mmt
Integration Testing at go-mmt
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
 
Accelerating innovation with software supply chain management
Accelerating innovation with  software supply chain management    Accelerating innovation with  software supply chain management
Accelerating innovation with software supply chain management
 
Testing IoT Apps with the Cloud
Testing IoT Apps with the CloudTesting IoT Apps with the Cloud
Testing IoT Apps with the Cloud
 

Similar to Evento - Fintech Districht - Pierguido Iezzi - SWASCAN

Swascan brochure-eng
Swascan brochure-engSwascan brochure-eng
Swascan brochure-eng
SWASCAN
 
Swascan brochure-EN
Swascan brochure-ENSwascan brochure-EN
Swascan brochure-EN
Pierguido Iezzi
 
Brochure SWASCAN-ENG On Premise
Brochure SWASCAN-ENG On PremiseBrochure SWASCAN-ENG On Premise
Brochure SWASCAN-ENG On Premise
SWASCAN
 
Swascan Cyber Security Testing Platform
Swascan Cyber Security Testing PlatformSwascan Cyber Security Testing Platform
Swascan Cyber Security Testing Platform
Pierguido Iezzi
 
Brochure swascan ENG
Brochure swascan ENGBrochure swascan ENG
Brochure swascan ENG
SWASCAN
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docx
Aardwolf Security
 
(English) XSCAN 브로슈어_Redpensfot 엑스스캔.pdf
(English) XSCAN 브로슈어_Redpensfot 엑스스캔.pdf(English) XSCAN 브로슈어_Redpensfot 엑스스캔.pdf
(English) XSCAN 브로슈어_Redpensfot 엑스스캔.pdf
redpensoft
 
Brochure Swascan Overview
Brochure Swascan OverviewBrochure Swascan Overview
Brochure Swascan Overview
Sara Colnago
 
Positive Technologies Application Inspector
Positive Technologies Application InspectorPositive Technologies Application Inspector
Positive Technologies Application Inspector
qqlan
 
What is Software Composition Analysis and Why is it Important?
What is Software Composition Analysis and Why is it Important?What is Software Composition Analysis and Why is it Important?
What is Software Composition Analysis and Why is it Important?
Dev Software
 
Types of Vulnerability Scanning An in depth investigation.pdf
Types of Vulnerability Scanning An in depth investigation.pdfTypes of Vulnerability Scanning An in depth investigation.pdf
Types of Vulnerability Scanning An in depth investigation.pdf
Cyber security professional services- Detox techno
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools used
Zoe Gilbert
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
Bhagyashri Chalakh
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
martinvoelk
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
Alan Kan
 
vulnerability scanning and reporting tool
vulnerability scanning and reporting toolvulnerability scanning and reporting tool
vulnerability scanning and reporting tool
Bhagyashri Chalakh
 
App checker
App checkerApp checker
App checker
Startupvillage2015
 
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
Agile Testing Alliance
 
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
PROP - P ATRONAGE OF  PHP W EB  A PPLICATIONSPROP - P ATRONAGE OF  PHP W EB  A PPLICATIONS
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
ijcsit
 
Analysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security VulnerabilitiesAnalysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security Vulnerabilities
KaashivInfoTech Company
 

Similar to Evento - Fintech Districht - Pierguido Iezzi - SWASCAN (20)

Swascan brochure-eng
Swascan brochure-engSwascan brochure-eng
Swascan brochure-eng
 
Swascan brochure-EN
Swascan brochure-ENSwascan brochure-EN
Swascan brochure-EN
 
Brochure SWASCAN-ENG On Premise
Brochure SWASCAN-ENG On PremiseBrochure SWASCAN-ENG On Premise
Brochure SWASCAN-ENG On Premise
 
Swascan Cyber Security Testing Platform
Swascan Cyber Security Testing PlatformSwascan Cyber Security Testing Platform
Swascan Cyber Security Testing Platform
 
Brochure swascan ENG
Brochure swascan ENGBrochure swascan ENG
Brochure swascan ENG
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docx
 
(English) XSCAN 브로슈어_Redpensfot 엑스스캔.pdf
(English) XSCAN 브로슈어_Redpensfot 엑스스캔.pdf(English) XSCAN 브로슈어_Redpensfot 엑스스캔.pdf
(English) XSCAN 브로슈어_Redpensfot 엑스스캔.pdf
 
Brochure Swascan Overview
Brochure Swascan OverviewBrochure Swascan Overview
Brochure Swascan Overview
 
Positive Technologies Application Inspector
Positive Technologies Application InspectorPositive Technologies Application Inspector
Positive Technologies Application Inspector
 
What is Software Composition Analysis and Why is it Important?
What is Software Composition Analysis and Why is it Important?What is Software Composition Analysis and Why is it Important?
What is Software Composition Analysis and Why is it Important?
 
Types of Vulnerability Scanning An in depth investigation.pdf
Types of Vulnerability Scanning An in depth investigation.pdfTypes of Vulnerability Scanning An in depth investigation.pdf
Types of Vulnerability Scanning An in depth investigation.pdf
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools used
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
 
vulnerability scanning and reporting tool
vulnerability scanning and reporting toolvulnerability scanning and reporting tool
vulnerability scanning and reporting tool
 
App checker
App checkerApp checker
App checker
 
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
 
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
PROP - P ATRONAGE OF  PHP W EB  A PPLICATIONSPROP - P ATRONAGE OF  PHP W EB  A PPLICATIONS
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
 
Analysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security VulnerabilitiesAnalysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security Vulnerabilities
 

More from SWASCAN

iot iox per SMAU
iot iox per SMAUiot iox per SMAU
iot iox per SMAU
SWASCAN
 
EVENTO PARADIGMA
EVENTO PARADIGMAEVENTO PARADIGMA
EVENTO PARADIGMA
SWASCAN
 
Evento abi
Evento abi Evento abi
Evento abi
SWASCAN
 
Evento SMAU - DATA BREACH
Evento SMAU - DATA BREACHEvento SMAU - DATA BREACH
Evento SMAU - DATA BREACH
SWASCAN
 
Valutazione d'impatto sulla protezione (Infografica) DPIA
Valutazione d'impatto sulla protezione (Infografica) DPIAValutazione d'impatto sulla protezione (Infografica) DPIA
Valutazione d'impatto sulla protezione (Infografica) DPIA
SWASCAN
 
Cyber Security Threats for Healthcare
Cyber Security Threats for HealthcareCyber Security Threats for Healthcare
Cyber Security Threats for Healthcare
SWASCAN
 
Healthcare infographic
Healthcare infographicHealthcare infographic
Healthcare infographic
SWASCAN
 
Code Review di Swascan
Code Review di SwascanCode Review di Swascan
Code Review di Swascan
SWASCAN
 
Trattamento dei dati (Infografica)
Trattamento dei dati (Infografica)Trattamento dei dati (Infografica)
Trattamento dei dati (Infografica)
SWASCAN
 

More from SWASCAN (9)

iot iox per SMAU
iot iox per SMAUiot iox per SMAU
iot iox per SMAU
 
EVENTO PARADIGMA
EVENTO PARADIGMAEVENTO PARADIGMA
EVENTO PARADIGMA
 
Evento abi
Evento abi Evento abi
Evento abi
 
Evento SMAU - DATA BREACH
Evento SMAU - DATA BREACHEvento SMAU - DATA BREACH
Evento SMAU - DATA BREACH
 
Valutazione d'impatto sulla protezione (Infografica) DPIA
Valutazione d'impatto sulla protezione (Infografica) DPIAValutazione d'impatto sulla protezione (Infografica) DPIA
Valutazione d'impatto sulla protezione (Infografica) DPIA
 
Cyber Security Threats for Healthcare
Cyber Security Threats for HealthcareCyber Security Threats for Healthcare
Cyber Security Threats for Healthcare
 
Healthcare infographic
Healthcare infographicHealthcare infographic
Healthcare infographic
 
Code Review di Swascan
Code Review di SwascanCode Review di Swascan
Code Review di Swascan
 
Trattamento dei dati (Infografica)
Trattamento dei dati (Infografica)Trattamento dei dati (Infografica)
Trattamento dei dati (Infografica)
 

Recently uploaded

Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
my Pandit
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
sssourabhsharma
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
MJ Global
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
CLIVE MINCHIN
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
jeffkluth1
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
SalesTown
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
Lacey Max
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
my Pandit
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
ssuser567e2d
 
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
Stephen Cashman
 

Recently uploaded (20)

Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
 
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
 

Evento - Fintech Districht - Pierguido Iezzi - SWASCAN

  • 1. The First Cloud Cyber Security & GDPR Platform In collaboration with CISCO FINTECH DISTRICT community
  • 2.
  • 3. The First Cloud Cyber Security & GDPR Platform Swascan Platform
  • 5. The Web App Scan is the automated service to scan Web Vulnerabilities. The Vulnerability Assessment Scanner that identifies security vulnerabilities and criticalities in terms of websites and web applications. The Vulnerability analysis is necessary to quantify risk levels and to provide the corrective actions to implement for the remediation. Identifies the vulnerabilities of websites and web applications including SQL Injection, Cross-Site Scripting and a lot more. Assures Compliance to OWASP model and current regulations. Provides a risk level analysis together with indications to solve vulnerabilities. Security Scan for Web applications to identify vulnerabilities. Automatic generation of PDF and CSV reports.
  • 6. Network Scan is the Network Vulnerability Scan automated service. The online Network Scan tool scans the infrastructure and the devices to identify security vulnerabilities and criticalities. The Vulnerability analysis is necessary to quantify risk levels and to provide the corrective actions to implement for the remediation. It runs the Vulnerability Scan for network and device vulnerabilities and helps fixing them. Security Scan of IT infrastructures. Compliance test with GDPR. Moreover, provides a risk level analysis together with indications to solve vulnerabilities. Automatic generation of PDF and CSV reports.
  • 7. Code Review is the automated tool for the static analysis of the source code. Source Code analysis is a process that – trough the source code analysis of applications – verifies the presence and effectiveness of minimum security standards. Code verification is useful to be sure that the application has been developed in order to “auto-defend” itself in its own environment. It provides a detailed analysis of the source code in order to identify security vulnerabilities and criticalities. The Static Analysis Source Code Tool that supports more than 16 languages. Compliance test with GDPR. Moreover, provides a risk level analysis together with indications to solve vulnerabilities. Automatic generation of PDF and CSV reports.
  • 8. Reporting Generazione automatica di report in pdf e csv. Web APP SCAN Code Review Security testing and security scan of web applications to identify vulnerabilities Analysis of third parties applications vulnerabilities that could generate the loss or undesired access to customers data Compliance to OWASP model and to current laws Code review provides an accurate analysis of the source code in order to identify vulnerabilities It tests source code vulnerabilities Identification of inefficiency and deficiencies Identification of critical areas Reporting Automatic generation of PDF and CSV reports. Network SCAN This feature scans networks and devices, identifies vulnerabilities and helps fixing them Network Security testing scan It constantly verifies the compliance to current laws It monitors internal procedures and company’s policies GDPR Assessment GDPR Self Assessment It runs the analysis and provides the level of GDPR Compliance GDPR Gap Analysis Identifies criticalities and intervention priorities Action plan Defines repositioning activities Reporting Automatic generation of PDF and CSV reports.
  • 9. The First Cloud Cyber Security & GDPR Platform Swascan Competence Center
  • 10. Cyber Security Testing Threat Management Cyber Threats Intelligence Cyber Defense Incident Response & Post-Incident Analysis Education Cyber Simulations & Gaming 4 1 2 3 765
  • 11. Raoul Chiesa: known worldwide for his knowledge in cybersecurity, hacking and cyber-crime. He is a member of several European and International governmental and non- governmental organizations. Business Competence: Software&Consultant company known worldwide for its achievements and awards such as New York Webby Award, Internet Oscar, GMIC Silicon valley finalist,... Key Capital: Venture Capital Noovle: Is an ICT and Cloud strategic consulting company and Google first partner in Italy
  • 12.
  • 14.
  • 15. The First Cloud Cyber Security & GDPR Platform In collaboration with CISCO FINTECH DISTRICT community