Rely on our team

Corporate IT security specialists

More info

IT Security

Being a distinct market force from the very beginning, Joy Comm offers innovative solutions of Fortinet, VmWare and Sentinel ONE

IT Networking

Joy Comm supports their clients in the design of an IT network that ensures the maximum visibility at elevated performance

Consulting

We have consolidated our experience through the application of internationally recognized methods such as Vulnerability Assessment and Penetration Test (VA & PEN TEST)

Cloud

With the modernization of corporate applications, we offer the automatization and coherence of all operations on-premise or in the cloud by applying security to the infrastructure

ABOUT US

In a scenario of continuous technological evolution Joy Comm proposes itself as partner of reference for the supply of devices and services for IT and OT Networking, Security and Compliance, Managed Service and Cloud for small, medium and large businesses, Global Corporates as well as the mail Service Providers in the Region.

Networking

Joy Comm designs, realizes and manages IT and OT networks, private and public cloud solutions by providing a complete service of consultancy and support.

Cyber Security

The privileged and consolidated rapport with market leading producers of a range of technologies, such as the multinational Fortinet, allows us to offer cutting-edge solutions, and the trust that our clients place in our professional approach helps us realize ever more high-performance and innovative projects.

Experience

Joy Comm was born through the merger of two companies: Joy System and Comunica. The experience and competences gained over that period of business activity allow us to design, implement and manage the most advanced technological solutions available on the market.

Skills

A tight network of collaboration between partners and system integrators backed by certified technical competences makes us the ideal interlocutor for projects of any kind regarding the integration of informatic systems.

Partners

The privileged and consolidated rapport with market leading producers of a range of technologies, such as the multinational Fortinet, allows us to offer cutting-edge solutions, and the trust that our clients place in our professional approach helps us realize ever more high-performance and innovative projects.

Human Rapport

It is indeed this close rapport we maintain with our clients and suppliers that underlines further the ability of JCSE International to create strong interpersonal relations aiming at high level technologies and competences without disregarding the human aspect.

Products & Services

Security assessment on premise and cloud Infrastructure & Security Posture

One-to-one interviews with Key People at C-Level, in Product and Sales departments

One-to-one interview with Key Peoples in IT, Networking and Engineering

Our consulting approach is based on a preliminary study on company products and needs by interviewing C-level and key personnel

of the Company, applying our framework of mutually exclusive and collectively exhaustive methodology to produce an in-depth report with suggestions on how to enhance the Corporate’s security posture.

REPORT Information

We will discuss and provide you with a detailed report that highlights the capabilities necessary to secure the environment, working with you to define a priority list for the next tasks.

This report will be created by leveraging the expertise of our senior personnel with 20 to 30 years of hands-on experience in the field, and more than 11 years of experience on cloud providers such as AWS.

Operational Technology visibility, vulnerability management and automatic response

Discovery of the OT Network, vulnerability assessment and asset inventory

Leveraging of Fortinet Security Fabric’s OT features, Deception and security posture Enhancement

Our Approach to OT security is normative-based and handled in ways to leverage our expertise in Fortinet products and security Fabric to merge with IDS visibility vendors and other Endpoint security instruments. This concept of OT security perimeter permits us to be present in every phase of any critical event occurring and to react immediately.

REPORT Information

We will discuss and provide you with several reports during all phases of the OT assessment and security enhancement to guarantee the compliance with the framework of the most recent OT cyber security normatives such as NIS2, DPA.

Operational Technology visibility, vulnerability management and automatic response

Our OT security framework

PHASE 1 VISIBILITY

We position ourself inside critical OT infrastructure and insert various probes to acquire visibility on OT environment. At the end of this phase, we will acquire knowledge of OT devices and their vulnerabilities, CVEs and misconfigurations, and how to fix them. —> First report

PHASE 2  SECURITY POSTURE ENHANCEMENT

Based on the Knowledge gained in phase 1, we take actions of remediation for known vulnerabilities, ACL enforcement and Firewall policy tuning specifically for every individual OT device. —> Second report

PHASE 3 AUTOMATIC RESPONSE

Leveraging IDS visibility vendorspassive collection & alerting function over Fortinet Security Fabric, we create a complex environment capable to assess any phase of known attacks and works to individuate and mitigate 0-days.—> Final report

CISO – As – A – Service

On Client’s needs, we will be able to continue the collaboration after the initial report to strengthen the cyber posture of the Company and support the upper management in their choices and needs regarding the cybersecurity field on a long-term basis.

CASE HISTORY

Intervention speed and efficient solutions to guarantee the secure smart working environment of the corporate Network Contacts during the COVID 19 emergency

Smart working and IT security: A hot topic that the COVID 19 emergency has forced into the limelight in recent months.

The widespread and fast outbreak of the Coronavirus has pushed corporates worldwide to opt for speedy implementation of remote working, clearly with all inherent difficulties and risks, especially from the IT security viewpoint, that such a sudden change of course could bring with it.

The following case history of Joy Comm can be framed in this scenario. In the middle of the pandemic, we were called to intervene to ensure the security and remote operability of the IT infrastructure at Network Contact, an Apulia based leader of outsourcing of corporate processes (BPO), management of client relation, digital interaction, and contact center.

A complex and specific intervention, which our team managed to carry out in record time with highly efficient solutions owing to the support of Fortinet technology.

Among the main problems the team had to confront was predominantly the one to verify that all corporate operators could authenticate themselves in an accurate and secure manner.

It became therefore crucial to activate the FortiAuthenticator in record time to enable the remote authentication of all call-center employees (more than 3000 operators).

Infrastructure and teamwork have permitted remote working within only 48 hours.

Owing to the support of Joy Comm consultants and Fortinet solutions, Network Contact could guarantee continued operation without any repercussion for the final client.

CASE HISTORY

Consultancy regarding the Cybersecurity of the American Corporate Cuebiq

Among the case histories that have seen Joy System as protagonist and now regard Joy Comm as major partner we can find the activities regarding IT assistance to the corporate network of the American corporate Cuebiq with seats in New York, Chicago and San Francisco. This company is considered a leader in the intelligence and localization sector for which Joy Comm takes on the role as important consultancy specialist regarding the infrastructure of their IT security.

Cuebiq had the initial requirement to focus on the cloud security of their services. Moreover, and also in view of their rapid growth, ever more attention was paid to the protection of the corporate network of their various offices with focus on data traffic and the endpoints used by the corporate employees.

Owing to the Fortinet firewall, at first the entire internal network, both wireless and wired, was secured. This was carried out via devices switch and access point to finally arrive at the personal computers that are equipped with the clients.

Once this task was completed in Italy, the implementation of the Fortinet infrastructure with the respective solutions FortiGate, FortiSwitch, FortiAP, FortiAnalyzer, EMS and FortiClient Telemetry was emulated also in the offices in the United States, counting well over 100 employees during the single setup phase, and  an even greater number today.

This has allowed for complete transparency by means of centralized Fortinet monitoring equipment, the FortiAnalyzer

CASE HISTORY

Security solutions architect at PAM Plasticos

Among the most particular interventions undertaken by Joy System, special mention deserves one carried out at PAM PLasticos, a company located in Manaus, Brasil. This South- American company, leader in the processing of plastic, experienced a situation of serious difficulty due to the malfunctioning of their Fortinet firewall infrastructure as it had been configured and managed by a company in Sao Paolo.

Joy System started to analyze the situation remoted and intervened in the following with their technicians directly on the premises to reset the internal company security system in Manaus thus permitting regular operation.

Security Assessment Approach

JoyComm analyze and improve the security level of your corporate network

Partner

Contact us

Fill this form to contact JoyComm or call us to +39 06.88653711

    By checking this box you accept our Privacy Policy