Cookie Policy This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.

Continue Learn more

Reality Net System Solutions

SECURITY AND DIGITAL INVESTIGATIONS.

A man’s real possession is his memory. In nothing else is he rich, in nothing else is he poor. – Alexander Smith

Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety – Benjamin Franklin

The telegraph, telephone, radio, and especially the the computer have put everyone on the globe within earshot, at the price of our privacy – Steven Levy

It is a capital mistake to theorize before one has data. Insensibly one begins to twist facts to suit theories, instead of theories to suit facts – Sherlock Holmes

Latest Event

05 11 2016

Tracce Digitali

Meeting

Mattia Epifani
Festival della Scienza 2016
Genova

04 11 2016

Introduzione alla Mobile Forensics

Courses

Mattia Epifani
Master Universitario di II livello in Cyber Security and Data Protection
Università degli Studi di Genova

29 10 2016

Analisi Forense di file system

Courses

Francesco Picasso
Master Universitario di II livello in Cyber Security and Data Protection
Università degli Studi di Genova

28 10 2016

Analisi Forense dei sistemi Windows

Courses

Mattia Epifani
Master Universitario di II livello in Cyber Security and Data Protection
Università degli Studi di Genova

22 10 2016

Introduzione alla Digital Forensics

Courses

Mattia Epifani
Master Universitario di II livello in Cyber Security and Data Protection
Università degli Studi di Genova

09 10 2016

iOS Forensics: where are we now and what are we missing?

Meeting

Mattia Epifani – Pasquale Stirparo
SANS European Digital Forensics Summit 2016
Prague

SERVICES

  • Digital Forensics

    Identification, storage, analysis and documentation of the data extracted from devices (computer, server, smartphone, network, cloud, social network) in order to present digital evidence in civil and criminal proceedings.

  • Forensic Readiness

    Implementation of rules and system policies suited to the reconstruction of the facts in case of an accident in order to optimize the process for a successful digital forensics analysis

  • Incident Response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack.

  • Mobile Security

    Implementation of rules and policies specific to mobile devices connected to the corporate network, in order to prevent or mitigate any incidents. Security analysis of mobile enterprise applications.

  • Data Protection & Privacy

    Analysis, design and deployment of the company's Privacy System compliant with European General Data Protection Regulation 2015.

  • Data Recovery

    Data recovery from damaged or deleted devices (Personal Computer, Server, Smartphone).

  • Data Erasure

    Secure data erasure on digital devices

  • Training

    Training & Teaching (TT) of side-by-side consultancy with customers and educational courses for dissemination, academicals divulgation and industry seminars.

RESOURCES