Company Profile


Certego is the company of the VEM Sistemi Group specialised in providing managed computer security services and to contrast Cyber Crime. Set up in May 2003, with registered office in Modena, Certego is an innovative provider of computer security services, represented by a model of business and an offer which is totally unique and exclusive in the Italian panorama and by a team of analysts with extensive experience in online fraud analysis.


Certego has developed a Cloud-based platform to provide Computer Security Managed Services to detect the presence of new threats and to deliver the best response to reduce, remove and analyse the attack.


The in-depth competences and extensive experience in Incident Response, Security Intelligence and Malware Analysis merge with the passion and desire of the security analysts to be constantly updated on what is happening in the world of computer threats.

With the goal of offering greater value and competence to its clients, Certego aims at a structure of human resources in continuous training, accredited with the highest certifications on Information Security, including GIAC Certified Perimeter Protection Analyst (GPPA), GIAC Web Application Penetration Tester (GWAPT), ISECOM, OSSTMM Professional Security Tester (OPST), ISC2 Certified Information System Security Professional (CISSP).


Compared with traditional defence systems, based primarily on a preventive type approach, the model of protection developed by Certego is able to improve the overall efficacy of protection in that it improves both the ability to identify the new threats and reduce the impacts of attacks.

In the new scenarios of attack, in which the main goal of intrusion is no longer to create immediate damage, but rather to gain control of the victim’s systems to launch an attack within the most lucrative times and methods, it becomes essential to focus on understanding the methods of attack to activate the fastest and most effective corrective measures. Certego has developed a managed service able to:

  • identify the presence of anomalies in network traffic and execution of the application processes within client-server systems
  • carry out targeted analysis and investigation activities aimed at understanding the nature of the anomalies and identify any presence of computer attacks
  • confirm the presence of intrusions and fraud attempts
  • formulate incident response operations to reduce the impacts on the business and support the client in carrying them through.

Technology Partners

  • Carbon Black
  • Fortinet
  • Seculert
  • Splunk