{"id":2637,"date":"2026-02-12T15:18:42","date_gmt":"2026-02-12T14:18:42","guid":{"rendered":"https:\/\/showcase-preprod.neverhack.dev\/b\/?post_type=casestudy&#038;p=2637"},"modified":"2026-02-25T15:18:13","modified_gmt":"2026-02-25T14:18:13","slug":"how-italo-transformed-cybersecurity-into-a-strategic-business-asset","status":"publish","type":"casestudy","link":"https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/","title":{"rendered":"How Italo transformed Cybersecurity into a strategic business asset."},"content":{"rendered":"<div\n    class=\"casestudy-challenge-block casestudy-challenge-block acf-block flex flex-col gap-8 mb-8 sm:mb-12 lg:mb-20 \">\n    <div class=\"flex items-center gap-3 self-start text-white\/80 text-[13px] uppercase\">\n        <div class=\"flex justify-center items-center h-12 w-12 rounded-full bg-white\/8\">\n            <svg class=\"w-5 h-5 fill-white\/80\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\">\n    <path\n        d=\"M13 1L13.001 4.06201C16.6192 4.51365 19.4869 7.38163 19.9381 11L23 11V13L19.938 13.001C19.4864 16.6189 16.6189 19.4864 13.001 19.938L13 23H11L11 19.9381C7.38163 19.4869 4.51365 16.6192 4.06201 13.001L1 13V11L4.06189 11C4.51312 7.38129 7.38129 4.51312 11 4.06189L11 1H13ZM12 6C8.68629 6 6 8.68629 6 12C6 15.3137 8.68629 18 12 18C15.3137 18 18 15.3137 18 12C18 8.68629 15.3137 6 12 6ZM12 10C13.1046 10 14 10.8954 14 12C14 13.1046 13.1046 14 12 14C10.8954 14 10 13.1046 10 12C10 10.8954 10.8954 10 12 10Z\">\n    <\/path>\n<\/svg>\n        <\/div>\n        <span class=\"box-border pb-1 border-b-2 border-white\/20 tracking-[0.1rem]\">The challenge<\/span>\n    <\/div>\n    <div class=\"acf-innerblocks-container\">\n\n<p>Italo is the first private Italian operator on the high-speed rail network and the first in the world to use the Alstom AGV train, capable of reaching speeds up to 360 km\/h. With a strong focus on innovation, comfort, and personalized services, Italo operates in a highly technological and customer-centric environment that requires robust and resilient <a href=\"https:\/\/neverhack.com\/en\/use-cases\/security-concerns\">cybersecurity measures<\/a>.<\/p>\n\n\n\n<p>Over the past year, the railway sector has experienced a significant evolution in cybersecurity. There has been a marked increase in the adoption of AI and machine learning for real-time threat detection, predictive analytics, and automated <a href=\"https:\/\/neverhack.com\/en\/offers\/incident-response\">incident response<\/a>. At the same time, governments and regulatory bodies have intensified their focus on sector-specific cybersecurity standards, increasing compliance requirements for operators.<\/p>\n\n\n\n<p>Within the organization, cybersecurity reports directly to the IT department and works closely with other IT functions to ensure that new business initiatives integrate appropriate security measures from the outset.<\/p>\n\n\n\n<p>However, growing digitalization, the introduction of new services for end customers, and the expanding use of AI technologies have created new challenges. Managing these technologies securely and raising awareness around their responsible use have become strategic priorities. Additionally, there has been a shift in mindset: cybersecurity is no longer seen as a static perimeter defense based solely on implemented technologies, but as a continuously evolving process requiring skilled professionals and adaptive strategies.<\/p>\n\n<\/div>\n<\/div>\n\n\n<div\n    class=\"casestudy-solution-block casestudy-solution-block acf-block flex flex-col gap-8 mb-8 sm:mb-12 lg:mb-20 \">\n    <div class=\"flex items-center gap-3 self-start text-white\/80 text-[13px] uppercase\">\n        <div class=\"flex justify-center items-center h-12 w-12 rounded-full bg-white\/8\">\n            <svg class=\"w-5 h-5 fill-white\/80\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\">\n    <path d=\"M9.9997 15.1709L19.1921 5.97852L20.6063 7.39273L9.9997 17.9993L3.63574 11.6354L5.04996 10.2212L9.9997 15.1709Z\"><\/path>\n<\/svg>        <\/div>\n        <span class=\"box-border pb-1 border-b-2 border-white\/20 tracking-[0.1rem]\">The solution<\/span>\n    <\/div>\n    <div class=\"acf-innerblocks-container\">\n\n<p>To strengthen its security posture, Italo launched a tender for <a href=\"https:\/\/neverhack.com\/en\/offers\/soc-mssp\">SOC services<\/a>, including the monitoring and management of corporate perimeter protection platforms. The collaboration with NEVERHACK began following this tender process.<\/p>\n\n\n\n<p>What distinguished NEVERHACK was not only the technical proposal but the presentation of an evolutionary roadmap specifically tailored to Italo&#8217;s business context. This roadmap demonstrated a strong customer-centric approach and a long-term vision that aligned with the company&#8217;s strategic objectives.<\/p>\n\n\n\n<p>The partnership has extended beyond basic service delivery. NEVERHACK has provided support ranging from technical solution scouting to assistance with internal processes. Together, the teams have worked on reviewing and improving network segmentation and segregation within the primary data center. Enhanced security measures were introduced through the implementation of <a href=\"https:\/\/neverhack.com\/en\/offers\/network-security\">Next-Generation Firewall (NGFW) controls<\/a>, while also optimizing and improving network flow efficiency.<\/p>\n\n\n\n<p>Through ongoing collaboration, joint procedures have been developed to address key security aspects, fostering synergy between external experts and internal teams. This cooperation has enabled continuous improvement of existing solutions and the development of new methodological approaches to managing <a href=\"https:\/\/neverhack.com\/en\/offers\/incident-response\">security incidents<\/a>.<\/p>\n\n\n\n<p><\/p>\n\n<\/div>\n<\/div>\n\n\n<div\n    class=\"casestudy-result-block casestudy-result-block acf-block flex flex-col gap-8 \">\n    <div class=\"flex items-center gap-3 self-start text-white\/80 text-[13px] uppercase\">\n        <div class=\"flex justify-center items-center h-12 w-12 rounded-full bg-white\/8\">\n            <svg class=\"w-5 h-5 fill-white\/80\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\">\n    <path\n        d=\"M5 3V19H21V21H3V3H5ZM20.2929 6.29289L21.7071 7.70711L16 13.4142L13 10.415L8.70711 14.7071L7.29289 13.2929L13 7.58579L16 10.585L20.2929 6.29289Z\">\n    <\/path>\n<\/svg>\n        <\/div>\n        <span class=\"box-border pb-1 border-b-2 border-white\/20 tracking-[0.1rem]\">The results<\/span>\n    <\/div>\n    <div class=\"acf-innerblocks-container\">\n\n<p>Since the partnership began, Italo has achieved greater effectiveness and efficiency across the managed security areas. The infrastructure has been strengthened, and with the support of the <a href=\"https:\/\/neverhack.com\/en\/offers\/noc-msp\">NOC<\/a>, technological solutions have been optimized to provide greater visibility and more efficient configuration management.<\/p>\n\n\n\n<p>The review of data center network segmentation and the implementation of NGFW controls have significantly improved both security and operational performance. The organization now benefits from enhanced monitoring, better incident management procedures, and a more proactive security approach.<\/p>\n\n\n\n<p>Most importantly, the perspective on cybersecurity has evolved. What was once perceived as a matter of deploying sufficient perimeter technologies is now understood as an ongoing process that depends on continuous evolution, skilled professionals, and strong collaboration. This shift has positioned cybersecurity as a strategic asset within the company, with external partners like NEVERHACK playing an increasingly critical role in supporting future growth and resilience.<\/p>\n\n<\/div>\n<\/div>\n\n\n<div class=\"quote-block acf-block\">\n            <div class=\"quote-container w-full flex flex-col gap-2 px-8 pt-6 pb-8 xl:px-12 xl:pt-8 xl:pb-12 my-12 rounded-2xl bg-white\/4\">\n            <svg class=\"h-12 w-12 xl:h-14 xl:w-14 fill-white\/12\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" fill=\"none\">\n    <path d=\"M4.58341 17.3211C3.55316 16.2274 3 15 3 13.0103C3 9.51086 5.45651 6.37366 9.03059 4.82318L9.92328 6.20079C6.58804 8.00539 5.93618 10.346 5.67564 11.822C6.21263 11.5443 6.91558 11.4466 7.60471 11.5105C9.40908 11.6778 10.8312 13.159 10.8312 15C10.8312 16.933 9.26416 18.5 7.33116 18.5C6.2581 18.5 5.23196 18.0095 4.58341 17.3211ZM14.5834 17.3211C13.5532 16.2274 13 15 13 13.0103C13 9.51086 15.4565 6.37366 19.0306 4.82318L19.9233 6.20079C16.588 8.00539 15.9362 10.346 15.6756 11.822C16.2126 11.5443 16.9156 11.4466 17.6047 11.5105C19.4091 11.6778 20.8312 13.159 20.8312 15C20.8312 16.933 19.2642 18.5 17.3312 18.5C16.2581 18.5 15.232 18.0095 14.5834 17.3211Z\"><\/path>\n<\/svg>            <p class=\"text-xl xl:text-2xl text-white font-light leading-snug pb-8 border-b-1 border-white\/8\">With Neverhack&#8217;s support, we were able to review the segmentation and segregation of the network in the primary data center, adopting improved security measures by implementing NGFW controls and optimizing and improving network flow efficiency.<\/p>\n            \n                <div class=\"flex gap-4 xl:gap-6 items-start\">\n                                            <figure class=\"flex w-7 xl:w-12 shrink-0 aspect-square rounded-full my-0! overflow-hidden\">\n                            <img decoding=\"async\" src=\"https:\/\/neverhack.com\/b\/app\/uploads\/2026\/02\/pierpaolo-romano-italo.jpg\" alt=\"\" class=\"object-cover \">\n                        <\/figure>\n                                        <div class=\"flex flex-col\">\n                        <p class=\"mb-1 lg:mb-0 text-white font-medium text-sm lg:text-base\">Pierpaolo Romano<\/p>\n                                                    <p class=\"mb-0 text-white\/70 font-light text-xs lg:text-base\">Information Technology Responsable Cyber Security &#8211; ITALO<\/p>\n                                            <\/div>\n                <\/div>\n\n\n                    <\/div>\n    <\/div>\n\n\n<p><\/p>\n","protected":false},"featured_media":2646,"template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2637","casestudy","type-casestudy","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v26.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Italo SOC &amp; cybersecurity transformation | Neverhack<\/title>\n<meta name=\"description\" content=\"See how Italo transformed cybersecurity into a strategic business asset with Neverhack&#039;s SOC services and perimeter security management.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Italo transformed Cybersecurity into a strategic business asset.\" \/>\n<meta property=\"og:description\" content=\"See how Italo transformed cybersecurity into a strategic business asset with Neverhack&#039;s SOC services and perimeter security management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/\" \/>\n<meta property=\"og:site_name\" content=\"Neverhack\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-25T14:18:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/neverhack.com\/b\/app\/uploads\/2026\/02\/treno-italo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1792\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/\",\"url\":\"https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/\",\"name\":\"Italo SOC & cybersecurity transformation | Neverhack\",\"isPartOf\":{\"@id\":\"https:\/\/neverhack.com\/b\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/neverhack.com\/b\/app\/uploads\/2026\/02\/treno-italo.jpg\",\"datePublished\":\"2026-02-12T14:18:42+00:00\",\"dateModified\":\"2026-02-25T14:18:13+00:00\",\"description\":\"See how Italo transformed cybersecurity into a strategic business asset with Neverhack's SOC services and perimeter security management.\",\"breadcrumb\":{\"@id\":\"https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/#primaryimage\",\"url\":\"https:\/\/neverhack.com\/b\/app\/uploads\/2026\/02\/treno-italo.jpg\",\"contentUrl\":\"https:\/\/neverhack.com\/b\/app\/uploads\/2026\/02\/treno-italo.jpg\",\"width\":2400,\"height\":1792,\"caption\":\"italo train\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/neverhack.com\/b\/en\/home-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case studies\",\"item\":\"https:\/\/neverhack.com\/b\/en\/casestudies\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Italo transformed Cybersecurity into a strategic business asset.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/neverhack.com\/b\/#website\",\"url\":\"https:\/\/neverhack.com\/b\/\",\"name\":\"Neverhack\",\"description\":\"Advanced cybersecurity solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/neverhack.com\/b\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Italo SOC & cybersecurity transformation | Neverhack","description":"See how Italo transformed cybersecurity into a strategic business asset with Neverhack's SOC services and perimeter security management.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How Italo transformed Cybersecurity into a strategic business asset.","og_description":"See how Italo transformed cybersecurity into a strategic business asset with Neverhack's SOC services and perimeter security management.","og_url":"https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/","og_site_name":"Neverhack","article_modified_time":"2026-02-25T14:18:13+00:00","og_image":[{"width":2400,"height":1792,"url":"https:\/\/neverhack.com\/b\/app\/uploads\/2026\/02\/treno-italo.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/","url":"https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/","name":"Italo SOC & cybersecurity transformation | Neverhack","isPartOf":{"@id":"https:\/\/neverhack.com\/b\/#website"},"primaryImageOfPage":{"@id":"https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/#primaryimage"},"image":{"@id":"https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/#primaryimage"},"thumbnailUrl":"https:\/\/neverhack.com\/b\/app\/uploads\/2026\/02\/treno-italo.jpg","datePublished":"2026-02-12T14:18:42+00:00","dateModified":"2026-02-25T14:18:13+00:00","description":"See how Italo transformed cybersecurity into a strategic business asset with Neverhack's SOC services and perimeter security management.","breadcrumb":{"@id":"https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/#primaryimage","url":"https:\/\/neverhack.com\/b\/app\/uploads\/2026\/02\/treno-italo.jpg","contentUrl":"https:\/\/neverhack.com\/b\/app\/uploads\/2026\/02\/treno-italo.jpg","width":2400,"height":1792,"caption":"italo train"},{"@type":"BreadcrumbList","@id":"https:\/\/neverhack.com\/b\/en\/casestudies\/how-italo-transformed-cybersecurity-into-a-strategic-business-asset\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/neverhack.com\/b\/en\/home-en\/"},{"@type":"ListItem","position":2,"name":"Case studies","item":"https:\/\/neverhack.com\/b\/en\/casestudies\/"},{"@type":"ListItem","position":3,"name":"How Italo transformed Cybersecurity into a strategic business asset."}]},{"@type":"WebSite","@id":"https:\/\/neverhack.com\/b\/#website","url":"https:\/\/neverhack.com\/b\/","name":"Neverhack","description":"Advanced cybersecurity solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/neverhack.com\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"lang":"en","translations":{"en":2637},"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/casestudy\/2637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/casestudy"}],"about":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/types\/casestudy"}],"version-history":[{"count":14,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/casestudy\/2637\/revisions"}],"predecessor-version":[{"id":2878,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/casestudy\/2637\/revisions\/2878"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/media\/2646"}],"wp:attachment":[{"href":"https:\/\/neverhack.com\/b\/wp-json\/wp\/v2\/media?parent=2637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}