TG Soft will be sponsor at the 11th Cyber Crime Conference 2023 (RM) May 11-12, organized by ICT Security Magazine.

We look forward to seeing you in Rome c/o the Auditorium della Tecnica, to present the defence technologies built in Vir.IT eXplorer PRO against crypto malware and ransomware
TG Soft Cyber Secuirity Specialist is pleased to announce that this year it will have its own stand at the "Cyber Crime Conference 2023" event on the days:
  • Thursday, May 11;
  • Friday, May 12.
The event, organized by ICT security Magazine, will be held at Rome's Auditorium della Tecnica  in Viale Umberto Tupini 65, which is easily accessible both by public transportation (train and subway from Rome's main train stations) and by car with parking available.
During the 2 scheduled days, leading cyber security experts and companies will meet to discuss the current evolution of cybercrime - both in reference to threats/defense solutions and from the regulatory point of view - with special attention to the Italian situation in the global scenario. The second day will focus on the implications of the current Russian-Ukrainian conflict and the subsequent proliferation of State-sponsored cybercrimes.


Discover our products/services
  • Vir.IT eXplorer PRO
  • Vir.IT Mobile Security PRO
  • Malware Analysis
  • IR Incident Response
  • Cyber Threat-Intelligence & Cyber Threat Hunting
  • Compromise assessment
  • Remediation/Recovery
  • Encryption Resilience Test against Ransomware Attacks
  • EDR Endpoint Detection & Response
  • Security Operation Center (SOC)
  • Vulnerability Assessment
  • Penetration test
  • Red teaming / purple teaming
  • Adversary emulation / simulazione APT
  • DFIR – Digital Forensics & Incident Response
We look forward to seeing you at our stand - reserve your place for the DEMO!

Try Vir.IT eXplorer Lite for Windows® SERVER / Client

Try VirIT Mobile Security for Android™


The free event is open to all enthusiasts, professionals, experts, IT managers, technicians from IT and IT Security companies, and anyone interested in learning more about the evolution of Cyber Crime.
For more information on how to make arrangements to visit the exhibition event, see the Cyber Crime Conference 2023.

TG Soft Cyber Secuirty Specialist sponsor dell'11a edizione della Cyber Cryme Conference 2023

TG Soft Cyber Security Specialist is a leading manufacturer, distributor, and marketer of Cyber-Security software. Our products are 100% proprietary italian technologies, developed during over 30 years of business and research on next-generation computer viruses & malware, analyzed by TG Soft's CRAM (AntiMalware Research Center).
We will illustrate our proprietary technologies, Cyber Security activities and consulting services - also made available nationwide in partnership with MENTAT - and help companies to implement the best defense strategies/solutions against cyber threats.

Clicca quì per scoprire i prodotti che verranno presentati alla Cyber Crime Conference 2023 da TG Soft
MENTAT Solution Partner di TG Soft Servizi di Cyber Security


Discover our products

If you pass by our stand, we will present the solutions offered by  TG Soft Cyber Security Specialist, as well as the activities and consulting services, also made available nationwide in partnership with MENTAT. Analyses and Incident Response activities in the field of Cyber Security require highly qualified personnel with established multi-decade expertise in such areas. Only with the necessary background we can support you in the best way in event of a cyber attack to your IT infrastructure.

Real-time protection solutions

TG Soft Cyber Security Specialist since 1992 has developed, distributed and marketed Cyber-Security software Made in ITALY, to protect individuals and companies from cyber threats:
  1. Vir.IT eXplorer PRO AntiVirus, AntiSpyware, AntiMalware for Windows® which, since 2015, integrates PROPRIETARY technologies AntiRansomware protection Crypto Malware extremely effective and efficient, that can block the encryption process(es) in the initial stage of the attack.
  2. VirIT Mobile Security PRO the ITALIAN AntiMalware for mobile devices with S.O. Android™.
Logo Vir.IT eXplorer PRO

Vir.IT Mobile Security l'AntiMalware di TG Soft per Android(TM)

Technical features of Vir.IT eXplorer PRO software:

AntiRansomware Protezione Crypto-Malware
AntiRansomware Technologies Crypto-Malware Protection.
Vir.IT's proprietary eXplorer PRO technologies that, through the heuristic-behavioral approach, block in the initial phase of the attack the encryption of data files saving, on average, at least 99.63% of PC and SERVER files. Find out more
Vir.IT Safe Browser
Vir.IT SAFE Browser
Technology built into Vir.IT Security Monitor that report any computer fraud attempt, such as theft of home banking credentials but not only....
Vir.IT Backup
Vir.IT BackUp
Backup system specifically designed and built in the Vir.IT eXplorer PRO suite, that not only creates backup copies of your most valuable data files in an automated manner, but also preserves them from encryption by the Crypto-Malware families/types known to date, as well as next-generation families/types. Find out more
Vir.IT Controllo Genitori
Vir.IT Parental Control
A tool built into Vir.IT Security Monitor that can be used in both private and corporate environments, and enable the setting of web access limits (via White-List or Black-List approach) in order to protect minors and/or to set policies for browsing in the company.
Vir.IT Console SERVER / Client 3.0
Vir.IT Console SERVER / Client 3.0
New features that make it even more "enterprise," such as Group Management that simplifies PC administration and gives the ability to modify and apply Vir.IT eXplorer PRO and Vir.IT Security Monitor options to entire groups of Clients. In addition, Report Client allows you to generate a report containing various information about the protection status of all clients: it indicates whether Windows® and other software are up-to-date, whether there are active remote assistance programs as services or whether there are other types of vulnerabilities. Furthermore you can send the report automatically via email.
Servizio di supporto tecnico da remoto in lingua ITALIANA
TECHNICAL and REMOTE support service
It's a Technical Assistance and Support Service, delivered by TG Soft's team of researchers and analysts, to guarantee competence and professionalism. For Vir.IT eXplorer PRO customers, remote support service (e-mail, telephone or teleservice) is included for the license subscription period.

Vir.IT eXplorer PRO
is an internationally CERTIFIED PRODUCT by some of the best-known independent certifying bodies.

Vir.IT eXplorer PRO dal 2016 Certificato VB100
Vir.IT eXplorer PRO certificato dal 2012
Vir.IT eXplorer PRO certificato dal 2019
Vir.IT eXplorer PRO certificato dal 2016

Advanced Cyber Security Services by TG Soft

Every day, businesses and individuals suffer from cyber attacks related to Cyber-Spionage. These attacks usually try to steal personal data and/or access to business products/services, or try Cyber-Extortion (Ransomware and exfiltration of personal or business data).

Data encryption with ransom demands, data exfiltration, and theft of confidential information are among the main threats affecting companies and public entities in Italy. Cyber attacks are steadily increasing, and their complexity and obfuscation is growing day by day, making them increasingly difficult to detect.

Clicca quì per scoprire i prodotti che verranno presentati alla Cyber Crime Conference 2023 da TG Soft Equipping ourselves with a real-time protection system that recognizes and blocks cyber threats is essential.
This is  possible
also through the heuristic-behavioral technologies already mentioned. In addition, TG Soft offers consulting activities and analysis in Cyber-Security field that require experienced personnel with established and proven skills in these areas.Therefore we can proceed with the remediation of the IT infrastructure through the following activities/services:
Malware Analysis of Cyber espionage cyber attacks (cyber intrusions through viruses, spyware, malware, password stealer, ransomware etc.).

IR Incident Response activities aim at explaining how the cyber attack - particularly a ransomware attack - occurred, the attack nature, the gateway and the attacker's targets (blackmail purpose, industrial espionage, etc...). IR activity seeks to minimize the damage mitigating, in the shortest possible time, the ongoing action and facilitating the restoration of the company's systems and data.

Cyber Threat-Intelligence & Cyber Threat Hunting are advanced cyber attack analysis activities aimed at preventing a possible attack. In fact, to prevent cyber attacks, it's important to know and analyze cyber criminals' behaviour to implement more effective and efficient prevention and defense strategies. This activity of information research and analysis requires established specific experience and specific skills.

Compromise assessment of Servers, PCs, and Devices for next-generation viruses/malware as well as Advanced Persistent Threats (APT).

Remediation / Recovery in the case of cyber attacks arising from any type of threat.

Resilience Testing of IT infrastructure in case of Ransomware attacks. This activity will use Ransomware samples "captured" by our Anti Malware Research Center from real attacks and not from simulations.  It is an activity aimed at verifying whether the current defense techniques are effective and whether Remediation activities after the attack allow the IT infrastructure to become operational again. When this is possible, we need to establish the time request to recover, so as to ensure, if not Business Continuity, at least the expected time to get the machines affected/involved by a Ransomware attack, back to production.

EDR Endpoint Detection & Response
is an endpoint protection solution that provides monitoring, investigation and response to cybersecurity incidents.
Security Operation Center (SOC) where all information about the security status of your company's IT is centralized with highly trained personnel to recognize and mitigate all types of cyber attacks.

HAVEiBeenEMOTET (https://www.haveibeenemotet.com) the new web portal that allows you to tell if an e-mail address or domain has been hacked and/or compromised by EMOTET. The portal is progressively updated by TG Soft's Anti-Malware Research Center researchers with e-mail addresses used in MalSpam campaigns to spread EMOTET.
If your company has suffered a cyber-attack or you think you are being spied on and you want to secure your IT infrastructure, turning to qualified and experienced professionals is essential to better protect your company's assets from more and more frequent cyber-attacks. Of course, TG Soft & MENTAT are among the most qualified organizations in Italy to support you in dealing with these issues!

...and in partnership with Mentat

MENTAT Solution Partner di TG Soft Servizi di Cyber Security
TG Soft Cyber Security Specialist in partnership with MENTAT presents Cyber Security services offered in partnership at the Cyber Crime Conference.
The services-applicable to the IT, OT, IoT, IioT sectors-vary in relevance depending on the maturity of the security model adopted by the client.

Vulnerability Assessment
aims to quickly identify known vulnerabilities and obvious security weaknesses, highlighting priorities for appropriate countermeasures. It is usually carried out with the help of automated tools and a manual review of the results, aimed at eliminating any false positives and correctly contextualizing the level of risk. This type of activity does not represent a complete assessment and is to be considered as a starting point for more in-depth audits. In fact it does not exploit identified vulnerabilities but merely verifies their presence, without "translating" them into a concrete risk.
It is preferable if:
  • No security assessment has ever been conducted or you are in the early stages of security model development.
  • You do not have an accurate knowledge of the security posture of your network.

Penetration testing is the ideal prosecution of vulnerability assessment and consists of a manual, controlled simulation of an attack, conducted by professionals from inside or outside the organization. In addition to overcoming the limitations of vulnerability assessments and finding vulnerabilities that would otherwise go undetected, it allows you to discover how individual vulnerabilities or some combination of them can translate into real risks, providing a realistic assessment of the impact of attacks on your infrastructure. It can be carried out with different mode combinations (e.g., black box, white box) and scenarios.
It is preferable if:
  • A vulnerability assessment has already been conducted or you have a vulnerability management process in place.
  • There have been substantial changes to the technology ecosystem (e.g., addition of new systems/software, etc.).
  • Your security model is not mature enough for Red Teaming activities.
  • Corrective actions have been taken as a result of security incidents.
Red teaming/purple teaming These activities simulate realistic attack campaigns over longer time frames with narrow scopes, which may include individual access to targets/"flags". This type of service is performed over a longer time frame than penetration testing. It is characterized by the use of different vectors of entry, extending not only to the technological but also to the human domain (e.g., social engineering). It may include the use of offensive tools such as existing or custom malware.
It is preferable if:
  • Penetration tests have already been conducted.
  • Its security model is evolving but not yet mature enough to include defined and relevant threat actors.

Adversary emulation / APT simulation The service simulates a realistic, enterprise-wide attack campaign with the characteristics and techniques of real cyber criminals, but without the catastrophic consequences of a real attack. The activity involves emulating the tactics, techniques, and procedures (TTPs) used by threat actors relevant to the client (e.g., included in its threat model or typically targeting its industry).
It allows to:
  • Check the effectiveness of the implementation of security countermeasures and controls, including perimeter security, network security, hardening policies, antivirus and XDR solutions, DLP systems etc.
  • examine and verify the ability to withstand a targeted attack, the operation and coordination of security teams and/or SOCs, and incident response and threat hunting processes.
This type of campaign is designed to be carried out over a longer time frame than penetration testing or red teaming activities, and continues over time. It is also characterized by the use of different entry vectors, extended not only to the technological domain but also to the human domain (e.g., social engineering). In fact, the simulation can involve the entire enterprise perimeter, including external assets, cloud, employees, and uses (as appropriate) the most common attack vectors.The tools are also extended and diversified, going so far as to include  - depending on the scenario and the type of threat actor being simulated (hackers, ransomware groups, competitors/industrial espionage, hostile governments, etc.) - existing or custom malware with advanced infection/persistence/propagation/data capture and exfiltration capabilities.

DFIR - Digital Forensics & Incident Response Emergency Response services allow customers to receive immediate support during a breach. The service is provided by resources with specific skills and know-how in security incident management and experience in Incident Response in complex realities. If required, it is possible to support and coordinat the activities of restoration of the damaged services.

The goals are:
  • quickly detect a breach and identify the most appropriate response strategies;
  • Minimizing response time and damage caused;
  • Gather information needed to support possible legal action;
  • Protect the client's reputation and assets;
  • Analyze the incident that occurred by identifying errors, weaknesses, and strategies adopted for management, improving response to future incidents.

We look forward to seeing you at our stand

All you have to do is stop by and visit us to discover the all-Italian technologies that can defend PC and SERVER data files from Virus&Malware and much more of our products/services.

Tecnologie Cyber Security PROPRIETARIE 100% italiane per proteggere il tuo BUSINESS!

On Thursday, May 11 and Friday, May 12, 2023, our sales manager will be present for the entire duration of the event to present our business solutions and policies for end customers and RESELLERS.

Make a reservation for the DEMO ==> you can witness a real Ransomware attack WITHOUT and WITH the 
Heuristic Technologies - Behavioral AntiRansomware  Crypto-Malware Protection built in the Vir.IT eXplorer PRO AntiVirus + AntiSpyware + AntiMalware + AntiRansomware Protection Crypto-Malware suite for all S.O. Microsoft Windows®.

You will have the opportunity to see live:
  • A real attack by next-generation Crypto-Malware on PC / SERVER;
  • the effects produced by the attack on a PC / SERVER machine without the protection given by Vir.IT eXplorer PRO;
  • the effects produced by the attack on a PC / SERVER machine with the active protection built into Vir.IT eXplorer PRO (Heuristic-Behavioral Technologies).
Segna in AGENDA la Demo sulle tecnologie di protezione Anti Crypto-Malware integrate in Vir.IT eXplorer PRO

You can find more information and links to FREE registration for the event >here< or by clicking on the image below.

Cyber Crime Conference 2023 => Vieni a trovarci allo stand di TG Soft Cyber Security Specialist
Accreditation to the Cyber Crime Conference 2023 will give you the opportunity to access the 2 days (Thursday, May 11 and Friday, May 12) and be able to attend all the scheduled events, seats are limited hurry up and book yours!!!

Try Vir.IT eXplorer Lite

If you are not yet using Vir.IT eXplorer PRO, it is advisable to install, Vir.IT eXplorer Lite -FREE Edition-.to supplement the antivirus in use to increase the security of your computers, PC and SERVER indifferently.

Vir.IT eXplorer Lite has the following special features:
  • freely usable in both private and corporate environments with Engine+Signature updates without time limitation;
  • fully interoperable with other AntiVirus software and/or Internet Security products (both free and commercial) already installed on your computer. It doesn't need any uninstallation and it doesn't cause slowdowns, as some features have been appropriately reduced to ensure interoperability with the AntiVirus software already on your PC/Server. This, however, allows cross-checking through the scan. It is EXPRESSLY RECOMMENDED to use Vir.IT eXplorer Lite together with the AV software already in use on the PC/Server to have a SIGNIFICANT INCREASE in SECURITY !
  • It dentifies and, in many cases, even removes most of the viruses/malware actually circulating or, alternatively, allows them to be sent to the C.R.A.M. Anti-Malware Research Center for further analysis to update Vir.It eXplorer PRO;
  • through Intrusion Detection technology, also made available in the Lite version of Vir.IT eXplorer, the software is able to report any new-generation viruses/malware that have set in automatically and proceed to send the reported files to TG Soft's C.R.A.M.
  • Proceed to  download Vir.IT eXplorer Lite from the official distribution page of TG Soft's website.

VirIT Mobile Security AntiMalware ITALIAN for ALL Android DevicesTM

VirIT Mobile Security, the Italian Anti-Malware software that protects Android™ smartphones and tablets, from Malware intrusions and other unwanted threats and empowers the user to safeguard their privacy with an advanced heuristic approach (Permission Analyzer).

VirIT Mobile Security l'Antimalware di TG Soft per Android(TM)TG Soft makes VirIT Mobile Security available for free by accessing the Google Play Store market (https://play.google.com/store/apps/details?id=it.tgsoft.virit) where you can download the Lite version, which can be freely used in both private and business settings

You can upgrade to the PRO version by purchasing it directly from our website : Order

TG Soft
External Relations

Any information published on our site may be used and published on other websites, blogs, forums, facebook and/or in any other form both in paper and electronic form as long as the source is always and in any case cited explicitly “Source: CRAM by TG Soft www.tgsoft.it” with a clickable link to the original information and / or web page from which textual content, ideas and / or images have been extrapolated.
It will be appreciated in case of use of the information of C.R.A.M. by TG Soft www.tgsoft.it in the report of summary articles the following acknowledgment/thanks “Thanks to Anti-Malware Research Center C.R.A.M. by TG Soft of which we point out the direct link to the original information: [direct clickable link]”

Vir.IT eXplorer PRO is certified by the biggest international organisation: