The smart cybersecurity for micro and SMEs
Find out more
From the use of eco‑sustainable technologies to the development of lightweight AI models that consume far less energy than traditional ones.
Global Fellow: The Smithsonian Inst.
SA Board Member: Parsons Corp. (PSN or NYSE)
Traditional cybersecurity methods are no longer working that well. Many companies now claim to have a 'new approach' that solves the problem. But so far, I haven't seen anything better than what bitCorp has developed.
CEO, Nextamina
As CEO of Nextamina, I’ve seen firsthand how critical it is to stay ahead of cyber threats with truly innovative solutions. bitCorp® stands out not just for its technology, but for its strategic vision and flawless execution. Their work represents the kind of forward-thinking cybersecurity that modern companies need: smart, adaptive, and relentlessly impact-driven. AI still has a long road ahead in cybersecurity, and we are proud and honored to support bitCorp® in its strategic planning as it explores the full potential of its market applications.
Co-Founder & Managing Director, NextStar Venture Partners
I consider bitCorp® a great example of what Italian innovators—or innovators from anywhere in the world—can accomplish when they have that rare combination of talent, experience, passion, and vision. Co-founders Gianluca Tirozzi and Christian Persurich, along with their team, embody all these qualities and more. I met Gianluca and Christian last year in San Francisco, when the Italian innovation agency Innovit brought a dozen tech companies to visit Silicon Valley. I saw detailed demos of bitCorp’s zadig® product suite. In addition to building excellent products, bitCorp® has formed strategic relationships in both the public and private sectors—across Italy and the U.S.—which is essential for success in the crowded cybersecurity space. In my years at IBM Ventures and in Silicon Valley, I’ve met hundreds of companies, so I don’t impress easily. But bitCorp impressed me, and I expect great things from this team.
R&D investments in the last 2 years
zadig® clients, €1M+ in recurring XDR revenue
International patents
Innovative defense strategies
Blue TeamOur defensive security professionals are responsible for maintaining customers internal network and increasing its defenses against attacks and threats
Attack tactics
Red TeamOur attack team, able to enter without leaving any trace in the most complex computer systems and break down any form of defense, even the most advanced
Follow our official channel for all the updates from the world of bitCorp!
In a scenario of constant threat, various forms of cyberattacks are recorded. Many are carried out by amateur digital tinkerers, others by criminal organizations, and still others are true acts of hybrid warfare with clear strategic and economic objectives. It was precisely this second type of attack that struck a major multinational corporation. A group affiliated with a hostile intelligence service literally brought a strategic national company to its knees, halting production and threatening the integrity of its data and that of its valuable clients with a ransomware attack of rare destructiveness.
The head of the secretariat for the President of a major private healthcare group fell victim to one of the most basic cyberattacks—yet one that could have severely damaged the entire group’s reputation. It was a case of digital identity theft, where the victim was deceived into voluntarily providing their own Cloud login credentials. No protections were in place (e.g., two-factor authentication), allowing the attacker to operate undisturbed until they linked the victim’s WhatsApp profile to another device, disabling access from the legitimate owner’s phone.
A major national organization active in research and innovation began to notice that one of its competitors consistently anticipated its results and inexplicably launched the same research initiatives. This raised serious concerns that the competitor might be engaged in industrial espionage.
BITCORP established an operational command center involving the company’s extensive internal IT department, the ICT service provider for information systems, and the external SOC responsible for perimeter monitoring. The type of malicious agent used was immediately identified, and its structure made it possible to reconstruct the intrusion method. Thanks to our cryptography experts, the encryption keys were successfully recovered, and after a thorough cleanup and replacement of compromised peripherals, production was restored. Once the emergency was resolved, the client’s security posture was reinforced through the implementation of our Zadig XDR solution.
Thanks to our prompt intervention—and especially to the client’s quick request for help—we were able to recover the Cloud credentials, remove the unauthorized device, and reassign access to the rightful owner’s device, avoiding potentially disastrous consequences. After all, how many secrets can be compromised just by gaining access to a single smartphone?
Assigned to carry out the necessary investigations in the company’s ICT segment, no critical IT issues were found. However, it was not possible to rule out more traditional forms of espionage, such as printing sensitive projects for later exfiltration to third parties. A series of penetration tests revealed a lack of protection for both Endpoints and the Network. To defend that perimeter, our ZADIG XDR was implemented, which also made it possible to monitor the improper use of printing systems and data extraction in general.