Security is a Process
not a
Product
© Luca Locatelli
Certifications
ISO 14001
ISO 9001
ISO 27001
ISO 45001
Researches
Cattolica
Vela Firenze
Supported By
ELITE
Eit
Some of our numbers...
€0M+
Last 2 Years R&D Investments
€0.2M
2024 Incame
€0M+
Recurring revenue from XDR
0+
Zadig's Customers
0
International Patents
VS
Innovative defense strategies
Blue Team
Engineers and researchers devoted to the protection of cyber interests of our customers. Technical proficiency for planning, framework analysis and the most appropriate solution.
Attack techniques
Red Team
Qualified to break into IT systems and infrastructure by verifying the resilience of adopted defenses and researching possible vulnerabilities.
ELTA
bitCorp LegalTech
Strategic Business Partner that combines legal practice into customers’ digitization pathways.
Consis
Main Projects
bitCorp is a member of the CONSIS consortium, taking part in CONSIP competitive bidding processes.
YouTube
Follow our official channel for all bitCorp's updates!
Partnership
Case studies 1
Cyber warfare
In a scenario of constant threat, various forms of cyberattacks are recorded. Many are carried out by amateur digital tinkerers, others by criminal organizations, and still others are true acts of hybrid warfare with clear strategic and economic objectives. It was precisely this second type of attack that struck a major multinational corporation. A group affiliated with a hostile intelligence service literally brought a strategic national company to its knees, halting production and threatening the integrity of its data and that of its valuable clients with a ransomware attack of rare destructiveness.
Case studies 2
Digital gangsters
The head of the secretariat for the President of a major private healthcare group fell victim to one of the most basic cyberattacks—yet one that could have severely damaged the entire group’s reputation. It was a case of digital identity theft, where the victim was deceived into voluntarily providing their own Cloud login credentials. No protections were in place (e.g., two-factor authentication), allowing the attacker to operate undisturbed until they linked the victim’s WhatsApp profile to another device, disabling access from the legitimate owner’s phone.
Case studies 3
World of Spies
A major national organization active in research and innovation began to notice that one of its competitors consistently anticipated its results and inexplicably launched the same research initiatives. This raised serious concerns that the competitor might be engaged in industrial espionage.
Problems
Solutions
bitCorp
CyberSecurity Creative Lab

BITCORP SRL
headquarters: Via Carlo Freguglia, 10 20122 Milano
P.IVA/C.F.: IT10273460963 | N. REA: MI-2521794
Share capital: € 200.000,00 i.v.

Transport Encrypted Protocol (TEP)

"La parte del progetto afferente la particolare metodologia di instradamento delle comunicazione mediate il protocollo TEP é stata finanziata con la misura "Brevetti +" con fondi dell’Unione Europea – NextGenerationEU"

CLP: BRE 0001323

CUP: C89J23000070008

"Progetto di valorizzazione del brevetto n. IT102020000014518"

Il brevetto nr IT102020000014518 ha inteso tutelare un’invenzione riguardante un metodo di comunicazione tra nodi di una rete di telecomunicazione capace di sfruttare un database a grafo per instradare le trasmissioni nell’ambito di una rete a nodi distribuiti. Questa particolare metodologia si inserisce nel più ampio progetto TEP, ovvero un protocollo di comunicazione, Telco e Dati, che applica il paradigma della blockchain alle telecomunicazioni.