Cybersecurity
for digital
transformation

Before filling out the registration form, please read the Privacy notice pursuant to Article 13 of EU Regulation 2016/679

Invalid Input
Invalid Input
Invalid Input
Invalid Input
Invalid Input
Invalid Input
Invalid Input

Privacy


I declare that I have read and fully understood the Privacy Notice and I hereby express my consent to the processing of my personal data by Reply SpA for marketing purposes, in particular to receive promotional and commercial communications or information regarding company events or webinars, using automated contact means (e.g. SMS, MMS, fax, email and web applications) or traditional methods (e.g. phone calls and paper mail).

ABOUT SPIKE REPLY

Spike Reply is the company within the Reply Group focusing on cybersecurity and personal data protection. Its mission is to safeguard the values and privacy of people, companies and processes in order to support the growth of a global, sustainable digital world through innovation. Confidentiality, integrity and availability of systems are top priorities. Together with its partners, the company provides vendor-independent consulting services to help enterprises achieve a group-wide, security-oriented culture.

Service Portfolio

Spike Reply's security portfolio is constantly evolving to ensure comprehensive protection.

  • strip-0 image

    Identity and Access Management

    Identity management, also known as identity and access management (IAM or IdAM), is a framework of policies and technologies to ensure that the right users (that are part of the ecosystem connected to or within an enterprise) have the appropriate access to technology resources. IAM systems fall under the overarching umbrellas of IT security and data management. Identity and access management systems not only identify, authenticate, and control access for individuals who will be utilizing IT resources but also the hardware and applications employees need to access.

  • strip-0 image

    Security Assessments

    Security Assessments ensure that necessary security controls are integrated into the design and implementation of a project/product or an operation. Our security assessments provide documentation outlining any security gaps between a project design and approved corporate security policies. Security gaps can be addressed in three ways: Management can decide to cancel the project, allocate the necessary resources to correct the security gaps, or accept the risk based on an informed risk / reward analysis. Spike Reply will evaluate security controls to examine the overall organisation’s security infrastructure, provide you with a gap analysis against most current information and best practice recommendation relative to your security posture, and finally help develop an appropriate roadmap to prioritise and resolve them.

  • strip-1 image

    Cloud Security Posture Management – CSPM

    Cloud security data breaches are commonplace today, with most breaches involving a misconfiguration in the Cloud infrastructure settings. Cloud Security Posture Management (CSPM), offers a policy-based tools that empower security personnel to automate thousands of settings in a consistent manner and give them a standing chance of managing the drift. Spike Reply consultancy offers advice for policy setting by providing automated visibility, continuous monitoring and remediation workflows for your Cloud computing services.

  • strip-1 image

    Workload Protection - CNAPP or CWPP

    As Applications have evolved to now also be delivered as serverless functions or containers, the collective noun in use seems to be the Workloads. Workload protection refers to a collection of security tools that safeguard Workloads across different Cloud environments. CNAPP tools are an integrated set of security and compliance capabilities designed to help secure and protect cloud-native applications across development and production.

    The most significant benefit of a CNAPP approach is better visibility and control of cloud-native application risk. Attempts to identify and remediate application risk have been fragmented across multiple toolsets spanning development and runtime. By integrating vulnerabilities, context and relationships across the development life cycle, excessive risk can be surfaced, enabling development teams and product owners to focus on remediating the areas of the application that represent the most risk.

  • strip-2 image

    Governance, Risk and Compliance

    Spike Reply’s expertise makes it possible to tailor cyber security programs and controls according to client’s business missions. Standards and best practices are integrated with approaches gathered in fieldwork and innovation aptitude. The experts guide clients towards managing security risks and compliance with standards and regulations, working towards a continuous improvement on the security maturity level.

  • strip-2 image

    Security Operation Services

    Especially larger companies are attempting to deliver as many critical services as possible with their own employees. While this can be an efficient method for critical and large scaled topics, it can become very expensive for smaller or customer-individual solutions. Long-term operation is another challenge due to a shortage of skilled IT personnel. To assist businesses with these topics, Spike Reply has setup a Managed Security Services department.

Security

White Paper

Security for an Upside-Down Network

Due to digitalization, companies need a decentralized network architecture with the cloud as the new central hub. At the same...

Security for an Upside-Down Network 0

21.11.2023 - 23.11.2023 / FRANKFURT

Event

Reply is represented at the FI Forum in Frankfurt. Meet Reply at their booth and learn all about the range of services for the...

17.04.2023 - 21.04.2023 / HANNOVER

Event

Spike Reply will be at Hannover Messe 2023 from 17 to 21 April. The cybersecurity experts will show which new security risks Industry 4.0...

Mobile First

White Paper

Mobile-First Architecture

"Mobile-First" is an enterprise architecture approach that reduces the amount of hardware required and optimizes the user experience with network connections. Spike Reply has developed a state-of-the-art...

Mobile-First Architecture 0

Article

API management for zero trust endpoint protection

Check out the interview Cluster Reply and Spike Reply have provided Information Age on using their expertise in cloud computing and...

18.07.2022 - 21.07.2022 / STUTTGART / ONLINE

Event

The Digital Product Forum, is the central information and interaction platform around the digitalization of development at Mercedes-Benz AG...

30.05.2022 - 02.06.2022 / Hannover

Event

Reply is represented at Hannover Messe 2022 from 30 May to 02 June 2022, showing how Robots, VR/Metaverse, 5G, Edge and Security...

11.05.2022 - 12.05.2022 / Frankfurt

Event

From 11-12 May 2022, Cloud Expo Europe Frankfurt will bring together cloud innovators, technology experts and business leaders to help...

Security

White Paper

PKI GOES CLOUD

To facilitate operational streamlining, security related platform services (PaaS) are becoming increasingly more popular, in order to support the often existing (multi-)cloud setup. A traditional and...

PKI GOES CLOUD 0

07.09.2021 - 08.09.2021 / Cologne

Event

On 7 and 8 September 2021, Reply presents the topics of digital experience, robotics, cybersecurity, cloud and edge computing as well as...

Security

Service

Spike Reply offers clients a Cyber Security Command Center...

Security for your AWS Environment 0

CyberSecurity Control

Best Practice

Stay on top of your Cybersecurity

Risk-Based Threat and Vulnerability Management is the...

Stay on top of your Cybersecurity
 0

24.11.2020 / Webinar

Event

The concept of Zero Trust gained a lot of attention in cybersecurity. In this session, Spike Reply Cybersecurity and Checkpoint introduces...

IoT Security

Best Practice

IoT security test unit. Making security...

Smart factories, smart grids, smart cities… a new world arises, where things communicate with each other. Reply’s IoT Security Test Unit...

IoT security test unit. Making security tangible. 0

Global Security Operations Center

Best Practice

Cyber-Attacks will occur – Be prepared to detect them

A multinational telecommunications company has set up a GSOC together with the security experts from Spike Reply with the aim of ensuring increased visibility and faster response times to IT security...

Security Operation Center

GDPR

Brochure

A new privacy and data protection regime is going to be applied, starting from 25 May 2018, imposing strict fines up to € 20 million and...

16.10.2020 / Webinar

Event

Serverless computing increases your company’s agility and innovation by allowing it to focus on delivering value to customers rather than...

Enterprise Security

Best Practice

Reply Security Pillars

Reply has developed an integrated, consistent and complete offering to support its clients in devising strategies and implementing solutions for business security.

Supported by over 200 highly specialised experts at the main international institutes and bodies, with over 200 qualifications between them in the principal technologies and solutions, Reply’s information-security portfolio has two cornerstones: security governance and security technology.

Our delivery model integrates and synergises these different but closely related dimensions of information security in a global approach to the various issues in business security.

Our offering stands out for its use of cutting-edge components. We...

Reply Security Pillars 0

09.10.2020 / Online

Event

REPLY CYBER SECURITY CHALLENGE 2020

Reply Cyber Security Challenge is a team competition open to both students and professionals created by the “Keen Minds Team”, Reply’s group of Cyber Security experts...

READ MORE

11.10.2019 / Online

Event

REPLY CYBER SECURITY CHALLENGE 2019

Reply Cyber Security Challenge is a team competition open to both students and professionals created by the “Keen Minds Team”, Reply’s group of Cyber Security experts. ...

GET THE DETAILS

01.04.2019 - 05.04.2019 / Hannover

Event

Reply is exhibitor at Hannover Messe, the most important industrial fair in the world, from 1 to 5 April 2019. See exciting showcases in ...

SPIKE REPLY

UNITED KINGDOM


LONDON

38 Grosvenor Gardens,
London SW1W 0EB, United Kingdom
Tel: +44 (0) 207 730 6000
Fax: +44 (0) 207 259 8600

spike@reply.com

ITALY


Milan

Via Robert Koch 1/4,
20152 Milan, Italy
Tel: +39 02-535761

Silea

Via Avogadri 6,
31057 Silea (TV), Italy
Tel: +39 0422 1836521

spike@reply.com

VIEW ALL