IT security


We have identified several stages, each of which provides customer engagement, which can be summarized as follows:
We start an analysis on the state of the customer's information system, by detecting the level of performance, reliability, security and fulfillment of the requirements of current law and then draw up a project document containing the findings, suggestions on how to intervene and the priorities for action.
In the project document, which is based on the expressed needs and requirements, we discuss what to produce and what is necessary for its implementation, we provide technical drawings and the reasons for those particoular choices and finally we specify the stages of transition from the old to the new structure, hypothetical planning of action, the standards to be adopted and the training for staff in both technical and user.
The construction of the new network infrastructure in a "turnkey" guaranteed.
We carry out performance tests of what has been achieved through testing of application functionality, reliability, stability and vulnerability.
Is always delivered a training course for technical staff used to administration and management of the system: we consider a project completed only when we are sure that the customer has the actual ability to control its new structure.
In case of need the service is guaranteed by the availability provided by technical support, starting from simple troubleshooting over the phone or by logging on the client devices remotely, to the advice necessary to further development of the project.
The above mentioned activities are preparatory activities for computerization, development and integration of existing network architectures with next-generation solutions proposed on the basis of the data available and the needs of the customer.
More specifically, they offer services related to the topics listed below:

  • IP Security
  • Level 2 and 3 VPN
  • Integration of IP and non-IP network
  • Videoconferencing over IP networks
  • Wireless networks implementation
  • Network systems support
  • Network monitor and statistics
  • Network optimization


The focus of Prynet is to support clients in the development of a computer model safe, able to provide added value to your business and be at his side in risk management to improve business performance.
The protection of corporate data from internal and external threats is at the center of the attention Prynet dedication in carrying out the analysis of the IT infrastructure of the customer.
H. ISO 27000
Based on ISO 27000 policy, Prynet is responsible for managing aspects of information security.
For the goal at international level is now known by the acronym ISMS (Information Security Management System) is used to the known PDCA (Plan, Do, Check, Act) in order to implement adequate controls, in the form of organizational structures, operational policies, instructions and procedures to ensure the fulfillment of the objectives of corporate security.
The scheme adopted to achieve the level of security appropriate to the company that is being analyzed, based on the concept of compliance and performance, respectively, for the detection of practical business policies and the effectiveness of security systems. The methods of measurement of what has just indicated are chosen according to the type of business reality and constitute the fundamental component of the real activity of "Risk Management" (ISO 27005).
Latter 'is divided into two main phases: Assessment (Risk Assessment) and treatment (Risk Treatment) risk.
Through appropriate tools Prynet is thus able to provide a complete and detailed documentation on the state of the IT structure of the customer and the action to be taken to achieve the optimal level of corporate security.