
Cybersecurity

IT Security:
a pillar of our production process
At Terranova, information security is not an afterthought: it is an integral part of our identity and how we operate. Protecting data, systems, and people means ensuring business continuity, service quality, and trust with our customers.
That's why we take a structured and constantly evolving approach, based on advanced technologies, in-house expertise, and continuous training. Our security architecture is designed to anticipate threats and adapt to change, ensuring that every stage of the production process is protected.
A comprehensive security architecture
Our strategy is based on multiple layers of protection that work together to ensure resilience and reliability:
Perimeter Protection
Next-generation firewalls, intrusion prevention systems, DNS and web filtering: tools that block threats before they can enter the network.
Secure Access
Strong authentication (MFA), centralized identity management, and application of the principle of least privilege to reduce access-related risks.
Endpoint Defense
Advanced antivirus, EDR solutions, patch management, and mobile device management to protect every access point, wherever it is located.
Monitoring and Response
SIEM systems and incident response automation to detect anomalies and respond quickly.
Governance and Compliance
Strict policies and compliance with international standards such as GDPR, ISO 27001, and NIS2, to ensure transparency and reliability.
Business Continuity
Secure backups and regularly tested disaster recovery plans to ensure business continuity even in the event of critical incidents.
Cybersecurity by default and by design
in solutions for utilities
In Terranova solutions, cybersecurity is an integral part of the application design model and not an additional layer. The by default and by design approach guides the entire software lifecycle: from requirements definition to architectural design, development, testing, and operational management. The platforms are designed to ensure secure configurations, structured identity and privilege management, data protection, and activity traceability from the outset, reducing risk exposure and simplifying the adoption of consistent security models over time.
This approach is particularly relevant for the utilities sector, which is now required to comply with the NIS2 Directive, which calls for integrated, demonstrable security measures that are proportionate to the risks. The robustness of our model is supported by ISO/IEC 27001, ISO/IEC 27017, and ISO/IEC 27018 certifications, which attest to the adoption of a structured information security management system, specific security practices for cloud services, and advanced personal data protection. This combination of elements enables our customers to embrace digital transformation with reliable, compliant solutions designed for critical environments.
Security in application design
Security guides the architectural and technological choices of the solutions, ensuring consistency between functionality, protection, and management over time.
Secure default configurations
The platforms come with security settings enabled, reducing operational risk and simplifying application governance.
Controlled and traceable access
Identities, roles, and operations are managed in a structured manner to support auditing, control, and operational accountability.
NIS2 compliance support
The solutions promote the adoption of integrated and demonstrable security measures, in line with the requirements of the NIS2 Directive.
Certifications guaranteeing the model
ISO/IEC 27001, 27017, and 27018 certify the reliability of the security system and cloud practices adopted.
Reliability for critical environments
A security-oriented design approach supports operational continuity and resilience in essential services.

Security Training and Culture
Technology is essential, but the human factor is the first line of defense. That's why we invest in awareness programs, phishing simulations, and annual courses for all employees, so that security becomes part of our corporate culture.
Our commitment
We don't just react: we anticipate threats and integrate security into every stage of the lifecycle of our processes and products. For us, cybersecurity is synonymous with responsibility, innovation, and quality.

OUR CERTIFICATIONS
Always attentive to quality management, in 2013 we began the certification process that has allowed us to optimize our production and management processes, always with a view to maximizing the satisfaction of our stakeholders. Continuous improvement for the company, our customers, and society.
In January 2025, we received the Responsibility Award, which highlights our commitment to the responsible management of the main aspects involved in our business activities, as demonstrated by the existence of multiple management systems certified by Bureau Veritas.
Our Cybersecurity partners

HWG SABABA
HWG Sababa è un provider di cybersecurity, partner di Terranova, che offre una suite completa di soluzioni strategiche di sicurezza, servizi gestiti e consulenza. Terranova ha scelto la soluzione di HWG Sababa per la gestione del SOC per il servizio SIEM attivo 24x7 per il monitoraggio attivo e proattivo dell’intera infrastruttura e rete. Grazie a questa soluzione tutti i sistemi sono costantemente monitorati e possibili comportamenti anomali o tentativi di accesso non autorizzato vengono immediatamente bloccati.

SIEM – IBM QRadar
IBM QRadar is a consolidated platform for managing and correlating security events in complex IT environments. Its adoption allows Terranova to guarantee a high level of visibility on relevant events, supporting structured processes for analysis, governance, and incident response, in line with the reliability and control requirements typical of the utilities sector.

EDR – CrowdStrike Falcon
CrowdStrike Falcon is an advanced endpoint protection solution designed to combat known and emerging threats. The use of this technology strengthens the security of operating systems and cloud environments, helping to reduce the risk of compromise and ensure the operational continuity of supported services.

Security Email Gateway – Darktrace Email
Darktrace Email provides advanced protection for email, based on behavioral analysis and artificial intelligence. The solution allows you to intercept targeted threats and anomalous activity, reducing exposure to one of the main attack vectors and protecting the confidentiality of communications.

NDR – Darktrace Network
Darktrace Network enables continuous monitoring of network traffic and detection of behaviour that does not comply with expected operating models. The adoption of this technology helps to strengthen infrastructure resilience, supporting the protection of critical and distributed environments.

Contact
Want to know more?
We’d be happy to talk more in detail about your needs and explore how we can become your ideal partner, to assist you in your business venture of innovation, digitization and sustainability
