The client
Since 2004 Skytechnology has provided compliance and integrated services to the automotive sectors, telecommunications, aerospace and defense, rail, medical devices, pharma, energy and automation sectors.
The company supplies key-in-hand products, which include tested manufactured prototypes and certificates ready for production. Hardware and software development is carried out in accordance with international standards (Cenelec, CE, etc.) and market-specific directives (IEC61508, EN50128, DO254, etc.).
Skytechnology builds test and simulation systems. Provides consulting services in the areas of Verification & Validation, and RAMS analysis.
Using the services provided by Skytechnology,clients can focus resources and expertise in developing value-added components unique to their products and applications.
The technological areas in which Skytechnology operates are:
- HW Services - FPGA Services - SW Services - Test and simulation systems - Governance & Compliance
Website
Commodities Sector
Development of HW and SW in embedded environment
Number of employees
Over 100
Partner
Case history data
This is custom heading element
The systems used within the offices, as dated, they were obsolete and could not guarantee reliability in the field of cybersecurity. Today, thanks to the intervention carried out, the system guarantees continuity of service through the new technologies of the Fortigate Suite.
The latest version of FortiOS allowed the implemented solution to manage the devices in a more granular way in relation to their use,ensuring full transparency on the network. For this very reason, the functionality offered by systems such as FortiView is critical to evaluating users' network traffic, the most used applications, and the layers of intercepted threats. FortiOs has improved the implementation of Antivirus protection in Flow Based and Proxy. How does FortiOS work? Directly from the console you can, among other things, send any suspicious file to Forti Guard SandBox for verification, without exiting the dashboard, or take action on email filtering verification. In addition, the IPsec and VPN SSL tools were improved, in this latter case with a Wizard to generate a new VPN template and the ability to compose your own model yourself.
It is important to be able to condense all management possibilities into a single container (repository). In FortiOS, policies, people, devices, and VPNs are saved in one place, allowing centralized control of all accesses. It is an enterprise-class security appliance, but at the same time practical to manage even for those who have limited resources ypical of medium-sized companies, or startups that are part of a very large collaboration network.
All this is possible with a minimum baseline implementation time that will allow you to act on each parameter later in a simple and intuitive way.
Solutions adopted
3 FORTIGATE D300 (one per location) for perimeter security management
Products used
Fortigate D300
Benefits obtained
- Protezione anti-malware e antivirus nativa- VPN IPSEC tra le sedi- Accesso controllato alla rete tramite accessi in VPN (Microsoft) per le risorse esterne alla rete aziendale- Proxy per la gestione controllato dell’accesso ad Internet- Monitoraggio e Reportistica puntuale sullo stato della rete ed ottimizzazione del traffico- Possibilità di utilizzare OWA in modalità offline
Business benefits
- Anti-malware and native antivirus protection - IPSEC VPN between locations - Controlled network access via VPN (Microsoft) access for resources outside the corporate network - Proxy for controlled management of Internet access - Monitoring and timely network status reporting and traffic optimization - Ability to use OWA in offline mode
Business benefits
- Business Continuity - Less downtime for maintenance - Controlled access monitoring - Access data safely as quickly as possible - Perimeter Security with High Security Standards Optimization Summary Thanks to the work carried out, the system ensures continuity of service through the new technologies of the Fortigate Suite. The latest version of FortiOS has allowed the implemented solution to manage the devices in a more granular way in relation to their use,ensuring full transparency on the network. All this is possible with a minimum baseline implementation time that will allow you to act on each parameter later in a simple and intuitive way.
Future developments
Betacom is the core of the project, as it manages all of the client's internal infrastructure with its team. New opportunities are currently being developed to adapt the client to the new regulations regarding procedures under the new EU General Data Protection Regulation, also called GDPR.