ELECTRONICS AND DEFENCE

INNOVATION TECHNOLOGY
MECHANICAL DESIGN

DATA PROTECTION

The care SIPAL has always taken to maintain the confidentiality and security of the data it handles has led the company to develop a totally dedicated area to designing and developing electronic data protection systems.

SENSITIVE INFORMATION PROTECTION

Our Cyber Security area deals with services, solutions, design, consulting and the construction of data protection equipment, infrastructures and infostructures.
Specifically, SIPAL operates in the field of sensitive information subject to classification by the National Security Authority.
Our customers include both economic operators operating in the defence sector and important public bodies: Ministry of Defence, Presidency of the Council, Arma dei Carabinieri, Ministry of the Interior.

Our offer

IT Security

  • Classified data network design and realisation.
  • Classified infrastructure design and realisation (Class I and II reserved areas, shielded areas, CIS areas, COMSEC areas).
  • Assistance in the production of documentation for the approval of secure areas (physical risk assessment, residual risk analysis, CIS risk assessment, internal security regulations, COMSEC plans).
  • Shielded room maintenance and verification.
  • Electronic data encryption device design and production.
  • Organization of courses on information security, security assessment and certification processes.

WORKING DIRECT WITH CUSTOMERS

The Logistic Support Division (Integrated Logistic Support), made up of specialist engineers and technicians, is capable of developing work packages in-house, in addition to providing on-site consulting services.

Our ILS specialists work closely with clients to define and develop the various means for best supporting complex systems, aimed at guaranteeing and maintaining their performance over time.

Our skills

Design, Production,
Distribution

  • of TEMPEST hardware and peripherals (All-In-One PCs, Desktop PCs, Laptop PCs, Workstations, Monitors, Multi-functions, Servers, Switches, Transceivers, Video Conferencing System) according to the different classification levels (Level A, B, C) in the reference standards.
  • TEMPEST Facility Zoning: a procedure designed to determine the level of risk of an environment where sensitive information is to be processed. An activity carried out by our qualified personnel before installing TEMPEST devices, to establish the level of the device to be used to limit compromising emissions.
  • TEMPEST Equipment Zoning, a procedure that determines the emission level of a device according to the reference regulations. This activity takes place in our National Security Authority approved laboratory.

ADVANCED TECHNOLOGY

ILS operations are themselves highly complex, and demand the most sophisticated technology and software for managing the diverse needs and providing full spectrum service.

Our credentials

Specialists and Laboratory

  • Assessment services to obtain, maintain and renew security certification for ICT systems/products processing classified information.
  • Security support services before, during and after certification: risk assessment, definition of security requirements, policies and objectives, design support, documentation support in accordance with Common Criteria standards.
  • Support to essential services operators and providers in fulfilling the requirements of the National Cybernetic Security Perimeter: ontological design, ICT assets list, architecture description, risk analysis, implementation of minimum security measures, support in test required by the National Certification Centre (CVCN).
  • Support in application of the National Cybersecurity and Data Protection Framework.
  • Support in the secure management of Core Services.
  • Vulnerability Assessment and Penetration Test to assess known vulnerabilities in ICT environments.
Menu