Cybersecurity and IT Protection
What are your team's response times in the event of an attack?
Our MDR team responds within 30 minutes to detected attacks, mitigating damage and initiating the necessary countermeasures. This swift intervention is crucial in limiting the impact of potential breaches.
How do you test the effectiveness of your defenses?
We continuously test the effectiveness of our defenses through actions such as:
■ Phishing attack simulations
■ Weekly testing of our services to verify their effectiveness
■ Vulnerability assessments on networks and applications
What is the MDR service and why is it essential for a company?
The Managed Detection and Response (MDR) combines 24/7 monitoring with XDR technologies and attack response within 30 minutes. It ensures proactive defense against ransomware and phishing, analyzing 100% of alerts through dedicated analysts.
What are the advantages of the Centurio Platform?
The Centurio Platform is an integrated solution that fully covers the main corporate cybersecurity needs. It consists of three key components:
■ MDR (Managed Detection and Response)
■ NOC (Network Operation Center)
■ CSG (Communication Security Gateway)
Providing comprehensive protection against digital threats.
What services do you offer for vulnerability management?
Our Patch Management service proactively manages patches and vulnerabilities, an aspect often overlooked by companies and competitors who only respond to incidents after they occur. This preventive approach significantly reduces the risk of exploitation of vulnerabilities.
What advantages does the Network Operation Center (NOC) offer?
We reduce infrastructure costs by 50% through proactive optimizations, monitor backups, and ensure system status with preventive fault detection.
How do you protect our corporate emails?
With the Communication Security Gateway (CSG): we block 99.9% of phishing attacks, manage SPF/DKIM/DMARC authentication, and archive communications for 10 years in compliance with GDPR regulations.
How does your phishing attack simulation service work?
We conduct phishing scenario simulations to assess employees’ readiness to recognize and respond to threats. This proactive approach helps identify vulnerability areas and improve security training.
What are the main cyber risks for businesses in 2025?
The main cyber risks for businesses are multiple, including:
■ EVOLVED RANSOMWARE ATTACKS
Ransomware is becoming increasingly sophisticated, with double or triple extortion techniques that include the threat of disclosing sensitive data.
■ INSIDER THREATS
Disgruntled or malicious employees, or even those who are unaware, pose a significant risk to the security of corporate information.
■ SUPPLY CHAIN VULNERABILITIES
Targeting suppliers or partners to access business systems is a strategy increasingly used by hackers.
■ PHISHING AND SOCIAL ENGINEERING
Advanced social engineering techniques use artificial intelligence to create highly personalized phishing attacks.
■ UNSECURE IOT DEVICES
With the rise of IoT devices in businesses, vulnerabilities in these devices can be exploited as an access point for attacks.
■ CYBERATTACKS AGAINST CRITICAL INFRASTRUCTURE
Sectors like energy, healthcare, and transportation remain priority targets for cybercriminal groups and state actors.
■ CLOUD SECURITY GAPS
Configuration errors and unauthorized access to cloud systems increase the risk of exposing sensitive data.
■ NON-COMPLIANCE WITH REGULATIONS
Companies that fail to comply with regulations such as NIS2, DORA, or GDPR risk heavy fines in the event of a breach.
■ ZERO-DAY THREATS
Vulnerabilities not yet known to software vendors are increasingly exploited for targeted attacks.
■ DATA COMPROMISED ON THE DARK WEB
Information stolen in previous breaches can be used for subsequent attacks.
■ LACK OF A SECURITY CULTURE
The absence of awareness and employee training makes companies more vulnerable to attacks.
Compliance and Regulations
Does our company fall under the obligations of the NIS2 Directive?
If you operate in critical sectors such as energy, transportation, or healthcare, your company is likely subject to the NIS2 Directive, but many other sectors are also included. We offer audits to verify compliance and avoid penalties of up to 2% of turnover.
How do you help companies comply with the NIS2 Directive?
We offer specialized consulting to help companies implement the measures required by the NIS2 Directive. Our approach includes compliance assessments, the implementation of security measures, and ongoing support to avoid penalties.
What are the risks of non-compliance with regulations?
Non-compliance with cybersecurity and data protection regulations, such as NIS2, DORA, and GDPR, can result in serious consequences for a company, including:
■ FINANCIAL PENALTIES
Violations can lead to fines of up to 2% of global annual turnover under NIS2, while GDPR fines can reach up to 20 million euros or 4% of turnover.
■ LEGAL LIABILITY
Executives may be held directly accountable for non-compliance, with potential legal actions.
■ REPUTATIONAL DAMAGE
A non-compliant company risks losing the trust of customers and partners, leading to negative impacts on business.
■ FACILITATED CYBERATTACKS
Regulations like NIS2 and DORA impose high security standards; failure to implement these measures exposes the company to cyber threats.
■ OPERATIONAL SHUTDOWN
In some cases, the regulatory authority may suspend the company’s activities until security issues are resolved.
To avoid these risks, a compliance audit and proactive implementation of the required security measures are essential.
Do you offer solutions for business continuity?
Yes, our agency provides real-time monitoring for:
■ Backup integrity
■ Server and network health
■ Endpoint security
IT Management and Infrastructure
How do your services integrate with Microsoft 365?
The Centurio Platform includes:
■ Advanced protection for SharePoint and Teams
■ DLP (Data Loss Prevention) for OneDrive
■ Continuous audit of security settings
■ Monitoring of on-premise and cloud data
How do you support companies with complex IT infrastructures?
Our services are particularly suited for companies with complex infrastructures. Through MDR, NOC, and CSG, we are able to keep company data and communications secure.
By integrating these with specialized consulting from Centurio Project, we can help companies manage complex projects and optimize security strategically.
How do you manage vulnerabilities?
We manage vulnerabilities through continuous updates and by performing Vulnerability Assessments to check the overall status of the infrastructure.
What guarantees do you offer on response times?
We offer a fast assistance service:
■ 30 minutes for attack containment (contractual SLA)
■ 24/7 or 9×6 technical support
Partnerships and Collaborations
What are your main technology partners?
We collaborate with industry leaders such as Microsoft, SentinelOne, Proofpoint, and Mimecast to provide cutting-edge security solutions to our clients.