As companies' activities become more and more integrated - from computers to smart phones and cloud computing, the risk that cyber threats pose to information grows exponentially. certSIGN provides innovative solutions for organizations that need data protection and IT systems.

NIS Directive and the Cyber Security Law.

The recent Law no. 362/2018 (in force since January 2019) introduces new cyber-security obligations as well as sanctions in the event of non-compliance. certSIGN provides you with a range of services that cover system and information security requirements in line with this normative act transposing the NIS Directive.



Network traffic analysis (NTA) is the process of intercepting, recording and analyzing network traffic communication patterns in order to detect and respond to security threats. NTA uses a combination of machine learning, advanced analytics and rule-based detection to detect suspicious activities on enterprise networks. NTA tools continuously analyze raw traffic and/or flow records to build models that reflect normal network behavior. When the NTA tools detect abnormal traffic patterns, they raise alerts.

Key features:

• Broad network traffic visibility

• Encrypted traffic analysis

• Entity tracking

• Comprehensive baseline for network traffic

• Detection and Response

certSIGN provides Vectra Cognito Detect for NTA processes, also employed in our MSSP services. Cognito Detect automates the hunt for cyber attackers, shows where they’re hiding and tells you what they’re doing. The highest-risk threats are instantly triaged, correlated to hosts and prioritized so security teams can respond faster to stop in-progress attacks and avert data loss.



“Who changed the configuration? Root? Who is Root?”

Privileged Access Management (PAM) refers to solutions that help secure, control, manage and monitor privileged access to critical assets.

To achieve these goals, PAM solutions typically take the credentials of privileged accounts – i.e. the admin or root accounts – and put them inside a secure repository (a vault) isolating the use of privileged accounts to reduce the risk of those credentials being stolen. Once inside the repository, sysadmins must go through the PAM system to access their credentials. With PAM solutions they are authenticated, and their access is logged.

By centralizing privileged credentials in one place, PAM systems can ensure a high level of security for them, control who is accessing them, log all accesses and monitor for any suspicious activity.

certSIGN provides Wallix solutions to help organizations maintain complete control and visibility over their most critical systems and data. A robust PAM solution ensures that all user actions, including those taken by privileged users, are monitored and can be audited in case of a security breach.

Applications .

We produce cyber security applications using Public Key Infrastructure (PKI). certSAFE and shellSAFE are accredited for the protection of classified information. They are presented in the National Catalog with packages, products and profiles INFOSEC managed by ORNISS and in the NATO Information Assurance Catalog Catalog (NIAPC)



Certification authority



Protection of information on workstations

shellSAFE Mobile

shellSAFE Mobile

Information protection on mobile devices.



Authentication and Authorization of Users

Remote signature solutions .

Legally binding electronic signatature, under the sole control of the user


trust4Mobile .

trust4Mobile provides protection for phone calls and messages


Cyber security solutions .

  • Security consulting
  • Security audit
  • Managed Security Services
  • Training services
  • GDPR Compliance