We protect your digital world. And much more.

Where there is a threat, we see a responsibility. Kitsune™ is our answer.

Security specialists. Partner of organizations that cannot afford to make mistakes.

Our strength lies in the integration of proprietary technologies, operational intelligence, and a multidisciplinary team that works every day with vision and responsibility.

0

+

years of experience in cyber security

For over 25 years, Meridian Group’s experts have supported public institutions and strategic enterprises in defending against the most complex cyber threats.

More than a method — it’s a lasting commitment.

We believe cybersecurity isn’t a finish line — it’s a journey we walk together. Our approach is built on four essential pillars that turn risk analysis into meaningful action. We guide our clients step by step with a strategy that’s structured, measurable, and deeply connected to their operational reality.
Guidiamo i nostri clienti passo dopo passo, con una strategia strutturata, misurabile e profondamente connessa alla realtà operativa in cui si muovono.

Strategy

We assess real-world risk and design adaptive defense architectures — because every technology choice should serve a clear, purposeful vision.

Roadmap

We build tailored operational plans that align with your business goals. For us, security isn’t a constraint — it’s an enabler.

Security

We apply continuous monitoring, proactive detection, and real-world attack simulations to test resilience — before your adversaries do.

Support

We don’t just deliver technology. We build an ecosystem that grows with you.

Dedicated to red teaming activities.

Focused on developing an Italian EDR solution.

Operating in scientific and medical research.

Non offriamo solo tecnologia. Costruiamo un ecosistema che evolve con te.

Vertical spin-offs, continuous specialization, tailored solutions. With Kitsune™ at the core, every part of our ecosystem works in synergy — to confront today’s threats and anticipate those of tomorrow.
Con Kitsune™ al centro, ogni elemento del nostro ecosistema lavora in sinergia per affrontare le minacce di oggi e anticipare quelle di domani.

PrettyMash

Specialized in communication and marketing within the cyber domain.

From prevention to response,
from detection to reaction,
with a single trusted partner.

Advisory Service

Strategic consulting in cybersecurity.

ISOC

Operational center for threat monitoring, analysis, and response.

MDR

Managed Detection and Response services.

Red Teaming

Attack simulations to test system resilience.

Threat Hunting

Proactive identification of advanced threats.

From the Kitsune™ platform to the SOCrate EDR, our technologies integrate intelligence, automation, and offensive capabilities to anticipate, detect, and neutralize the most advanced threats.

#CyberIntelligence
#ThreatDetection
#AttackSurfaceManagement
#DarkWebMonitoring
#IncidentResponse
#SecurityAutomation
#KitsunePlatform

Proprietary Cyber Digital Intelligence platform that integrates CTI, ASM, dark web monitoring, investigation, and response orchestration.

#EDRSecurity
#BehavioralAnalysis
#EndpointProtection
#ThreatPrevention
#SOCIntegration
#RealTimeMonitoring

Italian proprietary EDR developed by Meridian, based on behavioral intelligence and predictive detection.

Visibility into activities on public blockchains, identifying risks, involved actors, and suspicious movements to enable rapid and informed decision-making.

#BlockchainSecurity
#CryptoThreats
#AMLCompliance
#SmartContractAudit
#OnChainAnalysis
#MobileSecurity
#PhishingDetection
#AppAnalysis
#SMSPhishing
#APKMonitoring

Dedicated module for mobile threat intelligence, featuring SMS phishing analysis and detection of fraudulent applications (APK).

#ThreatActorProfiling
#APTIntelligence
#TTPAnalysis
#CyberThreatHunting
#ThreatActorMapping
#CyberEspionage

Advanced profiling system for APT groups and threat actors, based on the analysis of behaviors, infrastructures, language, and TTPs (Tactics, Techniques, and Procedures).

Component designed to correlate digital threats with potential real-world risks, aiming to protect individuals, strategic assets, operational sites, and critical infrastructures.

#PhysicalSecurity
#CyberPhysicalThreats
#AssetProtection
#FacilitySecurity
#IntegratedSecurity
#RiskAssessment

Module dedicated to the assessment and continuous monitoring of cyber risk generated by suppliers, technology partners, and strategic third parties, with a specific focus on the security of digital supply chains.

#ThirdPartyRisk
#SupplyChainSecurity
#ContinuousMonitoring
#RiskAssessment
#CyberCompliance