Software & Web solutions for your Business Company!

Networked business

We provide IT tailor-made solutions to enable companies to interconnect with the digital world. Resources are specifically designed to the wireless and advanced networking for the transfer of data in a safe and fast way.

Learn more...

Infrastructure Management

There are various solutions ranging from broadband connections (ADSL, HDSL, SHDSL) to ultra-broadband (FTTCab, FTTH and direct fiber optic binding). Depending on business needs and compliance management GDPR we provide three possible solutions to the costumer: wired networks, cable and fiber laying, assembly of rack cabinets and networking equipment (switches, balancers, etc.), ?virtual? networks, with the establishment of VLANs for the interaction of geographically separate sites or for users who need access to the company network (VPN), complex wireless networks for the management of hospitality services and separate access profiles.

Cloud Services Management

Cloud computing services are currently offered on three types of infrastructure. Customers choose the option based on their comfort zone and budget. Public cloud solutions are provided (useful for SMEs and for the non-core business of large companies), private clouds ("internal" option for greater control over data compared to a third-party cloud service), hybrid cloud (flexible solution that still allows you to keep sensitive data under your control for security purposes).

Security & Assessment

Our services help the IT infrastructures to implement procedures for safety control, evaluation of the network and protection of privacy, as laid down in the new regulation on data protection (GDPR, General Data Protection Regulation ? UE Regulation 2016/679).

Learn more...

Compliance Management GDPR

A wide range of specific measures of DLP and Data/Database/Cloud protection allows to monitor the access to data and the management of their security through encryption and pseudonymisation until the detection/communication to the competent authorities of any breach data. Services are provided in targeted intervention areas: DLP & Document Classification, Server & Workstation End Point Protection, Web Application security, DB Protection, Cloud security, Code review, Data Encryption and Data Privacy GDPR.

(VAPT) Vulnerability Assessment and Penetration Testing

Intrusion simulations, in hypothetical attack scenarios, allow to evaluate the exposure to non-verifiable vulnerabilities by automatic software, both for structural gaping holes and for the combined sum of individually low risk vulnerabilities. Infrastructural VA / PT (checks on the wired network, servers, clients), VA / PT applications (checks carried out on the individual Web Applications), PT wireless infrastructure (specific checks for wireless networks) will allow the customer to inspect internal and/or external access, without necessary authorization, to company information, sensitive data that allow the attacker privileges escalations, access to the target network.

(IAG) Intelligent Access Governance

International regulations (Sarbanes-Oxley Act (SOX), DL 30/06/2003 no. 196) and national directives (Code of Digital Administration, art.4 - Directive 8/09 of the Minister of Public Administration and Innovation, D.Lgs 231/01) require the adoption of solutions able to guarantee the control of every activity, carried out by users, in the sphere of "Digital Identity". We provide solutions for the automation of monitoring processes of every action that interests the communication of personal data (personal, organizational, assigned resources) both in registration (activation, accreditation, authorization of the profile), and in post-registration phase (change profile, suspension, revocation, reactivation).

(LG) Log Management

With the regulation no. 300/2008 24 December 2008 of Data Protection Authority, the System Administrators (ADS) must adopt suitable systems for the registration of logical accesses (computer authentication) to processing systems and electronic archives. Specific software and tools enable reactive log analysis, console monitoring of logs in clients and servers, generating reports on automated analyses, protection of logs from external attacks or internal errors.

SIEM (Security Information & Event Management)

The right approach to the defence of company security allows the real time and systemic-computational analysis of statistics related to information security. An attentively managed SIEM detects quickly targeted attacks and data breaches, collecting, storing, analysing and making available, through reports, the data coming from the logs for incident response needs, regulatory compliance or forensic analysis.

Web & SEO

A website is the most powerful tool that a business company, from the smallest to the more structured, has got to reach the whole world. The site provides useful information to improve users? brand experience and to let them closer to products/services that are the core of a business company.

Learn more...

SEO Key

In order to be indexed by search engines (first of all Google), the website must be realized SEO Friendly with mod-rewrite technology. This involves the versatile use of multiple styles, programming languages and programming protocols such as LAMP (Linux Apache MySQL PHP), HTML5, CSS3, JavaScript, Ajax, JQuery, XML, https, but also different graphic solutions adapted to the target audience and constantly updated to the new aesthetic taste.

Multi-channel

The website must be responsive so that it can be easily reached by mobile devices that are, according to statistics, the most widely used tools for browsing and searching for online information.

Targeted interventions

The website restyling, its maintenance and a possible SEO redesign are just three of the tools required to maintain high levels of efficiency and compatibility with the use of many devices. After reviewing the proper functioning of the website, we make a plan that, if necessary, require different measures: from simple changes to legislative updates and implementations requested by the customer, to an update of the technological infrastructure.

Solutions

The Eclettica Growing was born out of the will of professionals with high experience in systems consultancy, software development and SEO websites.

Eclettica Showcase 1

Great benefits for growing business

The Eclettica Growing offers to companies the most suitable IT solutions and the necessary advice to the development of their business. We take care of services for three main growth areas.

  • Company-web interaction
  • Protection of company data
  • Creation of custom products for the business

Eclettica Showcase 2

Focus on the business need

The Eclettica Growing supports specific business? needs by interacting business aspirations with the solutions dedicated to them. The work plan provides.

  • Auditing and analysis of the existing framework
  • Profiling of the target framework
  • Proposal and adaptation of the tools to achieve the goal

Products

Business platform based on Ad serving and management.
© Software developed by Eclettica Growing

Eclettica

General features of the platform:

The structure

  • Https software compatible with all the most common platforms and browsers
  • Releases HTML5 validated code
  • Responsive technology with desktop version, tablet, smartphone
  • Full platform management from the control panel
  • Custom control panel for specific customer needs
  • System for creating and updating new ads
  • System for designing websites (simple, tabbed, ...)
  • Entering, amending and deleting for texts, photos, links, files, audio, video, etc.
  • Possibility to create an infinite number of pages depending on the type of business
  • Preview of the pages created with the possibility of interactive and visual editing
  • Management and configuration of the navigation menu (macro-categories / categories / subcategories)
  • Ad placement: free, paid, with fixed or periodic payment
  • Booking form with anti-spam system, clickable calendar to indicate dates, customizable fields
  • Product catalogue divisible into macro-categories / categories / sub-categories
  • Internal search engine for website users

Graphics

  • Automated management of all the elements layout that make up the page (images, texts, links, documents, etc.)
  • Remote management of a popup displayed when the page is opened (not blocked by browsers)
  • Text that can be formatted using an embedded editor
  • Automatic resizing of images during insertion (without loss of image quality)
  • Possibility to insert images in different formats (.jpg, .gif, .png)
  • Tiling and alignment of images with automated texts (images always perfectly aligned)
  • Possibility of personalization with the insertion of texts over the images (with semi-transparent base)
  • Zoom function for uploaded images (fully automated)
  • Animation of images manageable by the panel (with fading effect or other effects), linkable links, compatible with smartphones and tablets)
  • Downloads page with support for any file format
  • Insertion of time-based advertising banners
  • Full management of audio and video

For Users

  • Possibility to create website areas or pages visible only to registered users (with cascade permissions)
  • Optional function to add visitors? comments with administrator control
  • Writing permissions
  • User free registration form to insert data
  • Registered users? registry (completely manageable and with internal search engine)
  • System for questions and answers
  • Agenda for managing dating, events, etc.
  • System to chat with registered users
  • Data backup
  • Link page with the possibility to insert text links and images
  • Encrypted access password in order to ensure the maximum level of security

It's social

  • Integrated blog
  • Multilingual management of meta tags from the control panel
  • Integrated newsletter and possibility to send HTML formatted email
  • Page 'Where we are' with integrated Google Maps
  • Sitemap generator in XML and TXT format
  • Full news management with the latest news on the homepage. News archive organized by date
  • Insertion of news in a sliding window (with formatted text and images)
  • Links to the main social networks
  • Multilingual support
  • Integrated professional web traffic statistics, with accurate and detailed reports

Services

Our services and our solutions

CONSULTING

The Eclettica Growing team will be able to follow the design and implementation of ICT projects, following the whole commissioning evolution, with its own consulting activities. The consulting activity starts by supporting the customer in the technological study of the platform. The needs analysis guides the architectural and technological design.

The choice of technologies and products is supported by testing activities that can be provided by the QL team in their own laboratories.

The second step ? implementation - requires specific activities of project management to interface the realities of the territory that deal with the installation - especially in large-scale multi-site projects - customers, telcos, service providers, and all the structures involved.

The last step is the management of the service or of the implemented infrastructure. The great experience of the QL team in the implementation of network management (NOC) and security management (SOC) structures will allow customers to study management procedures, to train staff, to write the processes and procedures in order to proceed independently.

NETWORKING

The Eclettica Growing provides installation, configuration and support services on a wide range of devices:

Networking Systems: Routers, Switches and Traffic Balancers, Private and Public Wi-Fi Infrastructure, Mail Servers, Web Servers, DNS, Proxies, Monitoring and Management Systems, Single Sign-On Systems (SSO), IPAM Systems and VOIP.

Security Systems: Firewall, Intrusion Prevention System, Authentication and PKI Systems, Perimeter Antivirus to Centralized Management Locations, Url Filtering Systems, AntiSpam and Network Access Control (NAC).

Thanks to our Systemists and System Integrators experience every element of the network interacts with the others in the best way and according to the customer expectations. All services can have a "Training on The Job" to provide maximum configurations transparency and to guarantee customer the autonomous management of the implemented platforms.

Software Development

The Eclettica Growing started a divide between hardware and software development to realize customized solutions in order to satisfy customers? needs with due attention to the software quality.

Our staff development experience covers the assembly, the structured languages (C / Pascal) and the object-oriented languages (C ++ / Java)

The Eclettica Growing can design and implement:

- Web-based systems
- Embedded systems (Linux / Windows)
- Software support and / or integration with the latest cryptographic technologies
- "LSM" Solutions (Linux Security Module)
- Kernel modules (Linux / Windows / * BSD)
- Firewall modules customization and integration (netfilter/opsec)
- Network Based Services and Network Protocol Designing
- Database design and customization
- Integration of third-party USB / Serial devices with your own software
- Custom authentication systems

Information Security

For years, the Eclettica Growing's technical staff has taken a particular interest in research and study activities and has gained a high level of experience in the provision of services in all phases of the system security management process. From the design support to the management of the infrastructure in production, there are several phases that require the involvement of experts in the field of information security:

Network design: Consulting
The design support of new network infrastructures allows to analyse needs and to choose architectures and technologies already knowing what the logical processes will be and how to manage the security aspects. It is possible to start designing next to who focuses on the efficiency and scalability aspects of the network, to optimize investments and start with an adequate level of security.

Ethical Hacking: Vulnerability Assessment and Penetration Test
This service aims to test the security measures of an information system. The methods applied range from the automatic analysis tools to the writing of specific code for the service or for the analysed network; it?s depends on the level of service. It is possible to analyse systems regardless of the technology used on them or on the networks that interconnect them.

The analysis result is a report that highlights problems and gives possible solutions. The produced reports are declined in many forms with different levels of technical depth, depending on whether the recipient is the technical department, who must know what configurations to change, or the management of the company, which must evaluate the investments.

Software Auditing: Code Auditing & Review, Reverse Engineering e Binary Hackproofing
The auditing software service analyses the application software looking for possible ways of compromising data or unauthorized access. The activity has as its object a system of which the source code is owned, named ?Code Review?, or a binary code, called Reverse Engineering. The activity usually looks for insecure authentication mechanisms, information Leakage routines or Backdoors, but it can be adapted according the individual?s needs. After analysis, a report on the vulnerabilities found is delivered. This report may contain instructions to correct problems and to project a safe code in a specific context.

Forensic Analysis:
Forensic analysis means the use of analytical and investigative techniques in order to identify, collect, examine and preserve evidence that are stored in many forms on systems under investigation. The execution of a forensic investigation would be particularly useful in case of crimes in which the use of information technology is preconfigured.

R&D

After having played the role of system integrator in a lot of projects, the Eclettica Growing has acquired the expertise to start a research and development division in order to fill the gap in the products currently on the market.

The products developed by the R&D division are at your disposal by the Eclettica Growing to guarantee quality and cutting-edge solutions to you and your business.

For more information, please contact us

For any request we kindly ask to contact us by email.

  • Email info@ecletticagrowing.com
  • Address head office ORMOND BUILDING, 31-36 ORMOND QUAY UPPER | DUBLIN 7 D07 N5YH | IE