Security

The Security Professional is the reference figure for the management of all aspects of the Company’s security for the purpose of protecting its human, material and cognitive patrimonies.

Corporate protection of plants, logistics and transport
  • Risk analysis and division
  • Cost / benefit analysis of protection interventions
  • External, perimeter and restricted area protection
  • Protection of logistics and transport
  • Access control and video surveillance
  • Organization of surveillance services
  • Definition of organizational security policies at various levels
Crisis management and disaster recovery
  • Definition and implementation of crisis management plans for the company
  • Definition and implementation of disaster recovery plans aimed at allowing the continuation or resumption of company processes
  • Crisis communication
Preparation, analysis and defense of corporate IT networks

Security of data and resources means being able to guarantee SECRECY and INTEGRITY  (from changes, destruction, cancellation) despite the availability of legitimate users (access to those who are legitimized must be easy). Those who deal with IT security must therefore be a profound connoisseur and programmer of networks. Cyber ​​crime has become one of the world’s most dangerous corporate threats. ULISSE has efficient IT security specialists to provide design and assistance, through the creation and verification of systems, the implementation of security measures for information and the introduction of organizational procedures to prevent abusive access.
Furthermore, how can you define a secure system if you do not have proof that it has never been violated or subjected to an external attack by unauthorized parties?
Our technicians, with your authorization, can carry out the so-called “penetration tests”, aimed at testing the real safety conditions of your structure … why not try?

Environmental and Bug Sweeping and protection of confidential communications (voice and data).

How can we assume that nobody is listening to us or watching us while we talk about ourselves, our company, our customers, our accounting …? With the best technology, ULISSE company “reclaims” your environment by ensuring that there are no radio or GSM signals in transmission (audio-video bugs). Advice is then provided to defend against these “interferences”, also with reference to data communication.

Corporate protection of plants, logistics and transport
  • Risk analysis and division
  • Cost / benefit analysis of protection interventions
  • External, perimeter and restricted area protection
  • Protection of logistics and transport
  • Access control and video surveillance
  • Organization of surveillance services
  • Definition of organizational security policies at various levels
Crisis management and disaster recovery
  • Definition and implementation of crisis management plans for the company
  • Definition and implementation of disaster recovery plans aimed at allowing the continuation or resumption of company processes
  • Crisis communication
Preparation, analysis and defense of corporate IT networks

Security of data and resources means being able to guarantee SECRECY and INTEGRITY  (from changes, destruction, cancellation) despite the availability of legitimate users (access to those who are legitimized must be easy). Those who deal with IT security must therefore be a profound connoisseur and programmer of networks. Cyber ​​crime has become one of the world’s most dangerous corporate threats. ULISSE has efficient IT security specialists to provide design and assistance, through the creation and verification of systems, the implementation of security measures for information and the introduction of organizational procedures to prevent abusive access.
Furthermore, how can you define a secure system if you do not have proof that it has never been violated or subjected to an external attack by unauthorized parties?
Our technicians, with your authorization, can carry out the so-called “penetration tests”, aimed at testing the real safety conditions of your structure … why not try?

Environmental and Bug Sweeping and protection of confidential communications (voice and data).

How can we assume that nobody is listening to us or watching us while we talk about ourselves, our company, our customers, our accounting …? With the best technology, ULISSE company “reclaims” your environment by ensuring that there are no radio or GSM signals in transmission (audio-video bugs). Advice is then provided to defend against these “interferences”, also with reference to data communication.

Organizational Consulting for the Safety of Major Events and Training
  • Definition of safety objectives
  • Risk Analysis and Evaluation
  • Preparation of General and Site Security Plans
  • Preparation of Safety Procedures
  • Integration of Security Plans and Procedures with other Company Processes
  • Integration with Public Security
  • Procurement consultancy within the available budget
  • Security Auditing
  • Training and awareness of employees and volunteers
  • Organization and control of surveillance services
  • Test event
Security services with personnel
  • Concierge services
  • Security
  • Courtesy
Major events (some examples)

The ULISSE Company has had an important managerial role in the Planning and Coordination of the Security of the TORINO 2006 Winter Olympics and other sporting and other events and has experts able to provide consultancy for large-scale events such as meetings, fairs, concerts and events, dealing with both the preliminary and preparatory phase as well as that of the development of the events themselves.