[all news]

Two-Factor Authentication (2FA) is Coming

After countless suffered slaps, stolen passwords to millions (1 billion in Yahoo case), hacked personnel accounts, illegal access to the online storage (do you remember the photos on iClaud?), it seems that many big brands, start to encourage users to adopt another layer of security on access their Internet profiles

Clicca "mi piace" sulla Pagina Facebook [link] Q-ID e condividi.
Anche i tuoi amici potranno così conoscere e utilizzare una tecnologia veramente utile

GT50 is a Visionary Innovators Company

We are focused in turning technology into real worth applications

GT50 people has got more than 30 years experience in digital security and protection

We are engaged in combining different existing and robust technologies - like 2D Timbro Digitale and QR Code - to enhance Security and application of Digital Certification Solutions

Our Mission is turning technology into real Value Added Applications, keeping the best standards in term of security of the process managed

We give Technical Service and Support to more than 100 Customers - Public and Private Market - provided with "Digital Secure Seal" or "Timbro Digitale" Solutions

We also provide our customers with Consulting Services, to share our competences with Customers who prefer to make instead of buying

GT 50 can provide with its competence and experiences as Consulting Services. Consulting can help when Customer is at a very first stage of his project or when the choice to make or buy has not been taken yet
GT Consulting Services cover different areas:

Secure Application Designing
The competence developed on Security and Digital Strong Authentication and Certification allows GT 50 to be a primary Partner in designing robust Applications and Architecture
GT 50 provides its Customers with ultra specialistic competences joined with a great business vision
Customers preferring the "make" philosophy will find in GT 50 a solid, affordable and competent 3rd Party in order to be sure to develop robust digital architectures and applications

Security Assessment
Security Assessment includes activities such as:
- Risk Assessment
- Vulnerability Assessment
- Penetration test
- Security Systems Audit
- Forensic

Incident handling
Damage caused by intrusions to corporate computer systems is most consistent the more the information contained herein is critical. Whenever a computer system is breached  a readily organized team conducts incident handling activities in order to:
* Framing the event and isolating its causes?     
* Limiting the amount of damage and neutralizing the threat?     
* Preventing further violations??