shark (shared risk)
Information security management should be carried out following a double closed loop of control.
The first level is «logical» and directs the management of controls and technical and organizational countermeasures.
Control objectives are established, tasks are assigned and feedback is collected (governance).
The level of it risk for the company is then determined.
The second level is «physical» and is aimed at minimizing the attack surface, carrying out field measurements (va / pt) and managing the appropriate remedial actions.
Feedback on remediation activities determine the level of punctual risk (ip vulnerability score).
shark allows the evolution and integration of managed services by introducing new innovative "cyber security" services with high added value.
shark allows a logical "top-down" and physical "bottom-up" approach.
Each customer has a DB physically separated from the others and the data is resident in a cloud located in Italy.
A user can connect to multiple of a DB, but not at the same time: each connection has a separate logical access.
shark comes distributed in two modes: client / server (c/s) and web terminal server (wts).
The c/s mode provides the installation of the sharkage on each client and the connection through a specific port to the shark server.
The wts mode only needs an html5 web browser.