Project Description

We Are Here To Serve You

Qwince specialises in providing security services for different industries (press agency, associations, pharmaceutical companies, and trust companies). Our extensive experience in working through examinations and audits makes us qualified to provide these services.
Our security specialists understand the technology and applications utilised in the industry as well as the regulatory requirements imposed on individual institutions. We strive to provide superior service and customer satisfaction, that’s why we work with cutting-edge products like Safend, Kaspersky, LogBank and SecureLog, etc.
Here are a few of the security and compliance products and services we can provide you with.

Our consulting services

Computer forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analysing and presenting facts and opinions about the information. Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings.
Computer forensics deals with law courts, Public Prosecutor’s offices (for example crimes involving fraud), police and law enforcement (for image enhancement or the improvement of digital image quality) and private companies.
What is ISO 27001?
ISO/IEC 27001 is an Information Security Management System (ISMS) standard published in October 2005 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). ISO/IEC 27001 formally specifies a management system that is intended to bring information security under explicit management control. Being a formal specification means that it mandates specific requirements. Organizations that claim to have adopted ISO/IEC 27001 can therefore be formally audited and certified compliant with the standard .
We provide valuable consulting services to make you compliant.
Our consultant activities can be divided into four different steps:
– Security Assessment: complete analysis of the information system and production of a detailed risks map in order to identify any security countermeasures.
– Gap Analysis: existing system gap individuation and solutions to reduce it.
– Application Auditing: application software analysis and critical points research.
– Disaster Recovery: Business Continuity recovery in case of information accidents.
A penetration test is an effective process of evaluating the security of computer systems or networks by simulating an attack from a malicious source, such as a hacker attack or using social engineering techniques.
This method is useful both in large and small-scale enterprises, also in medium-sized firms that want to test the security of their network or system. A penetration test is a simulation of a hacker attack and protects enterprise networks and systems from internal vulnerabilities (such as the lack of specialised resources or security awareness), External vulnerabilities (as hacker attacks, router and firewall misconfigurations, exploits) and physical vulnerabilities (as accidental loss of confidential information, disgruntled employees, etc.).

Penetration tests can be conducted with a ‘black box’ approach (testing assumes no prior knowledge of the infrastructure to be tested) or ‘white box’ approach (testing provides the tester with complete knowledge of the infrastructure to be tested).
Our penetration test and analysis methodology is divided into four different steps:

  1. Information gathering (focused on collecting as much information as possible about a target application)
  2. Vulnerability identification (this is the step in which all vulnerabilities are identified)
  3. Penetration (the proper phase of system violation to test its security from vulnerabilities)
  4. Reporting (containing information concerning potential vulnerabilities of the company system or network)
Thanks to the strategic partnership with Kroll Ontrack (worldwide leader in data recovery operations) and RecuperaDati we are able to recover data from different situations:
– Data loss: data recovery from simple situations such as accidental data erasing to more complex ones such as informatics virus, natural events etc..
– Damaged hard disk: from damaged hard disk data recovery to RAID systems to all kinds of operating systems.
Qwince is the technological partner which most company should have: effective, quick, skilled, innovation oriented, made up by creative and reliable resources, able to satisfy the customers needs and identify the market opportunities.
Stefano Di Lecce, CEO, Innovandia
A young company of experienced professionals in ICT sector. I worked with them very well and together we managed serious issues. Well done, guys!!
Senior Researcher, Engineering
Our feedback is surely positive. We perceived competence, precision and reliability while working with you.
Executive, Caffè Trombetta