Ibuildsolutionsthatworkovertime.

Software, AI, and technical systems designed with criteria, not slogans.

Cybersecurity Services

Concrete protection, structured processes, and targeted interventions to reduce operational risk and improve security posture.

Vulnerability Assessment

Complete vulnerability analysis of networks, systems, and applications with detailed reports and remediation priorities.

Penetration Test

Attack simulations based on recognized methodologies to evaluate the real resilience of your infrastructure.

Supplier Security Audit

Security assessment of critical suppliers: contracts, SLAs, security postures, and supply-chain risks.

Cyber Hygiene Program

Hardening, patching, permission reviews, secure configurations, and quarterly security posture monitoring.

Security Awareness Training

Anti-phishing, social engineering, and safe device usage training, with dedicated simulations and materials.

CSIRT / Incident Response Consultant

Immediate support in case of a suspected incident: analysis, containment, recovery, and reporting.

Want to find out in detail how these services work, what benefits they offer, and which legal obligations (GDPR, minimum security measures, ISO/IEC 27001, NIS2) they can address?

→ Go to the dedicated page

Services

Serious technical support: software, infrastructure, automation, and systems that won't fail you after six months.

Custom Software

Robust and easy-to-maintain applications, designed to grow without becoming a nightmare.

SaaS Platforms

Complete projects based on APIs, cloud, and modern architectures, without unnecessary complications.

Complex Integrations

I connect old and new systems, even when they don't speak the same language. Automation included.

AI & Data Intelligence

AI analysis, models, and automations that are actually useful, not just buzzwords.

Security & Monitoring

Advanced monitoring, alerting, and technical response systems (SMX).

IT Consultancy

Architectures, scalability, cloud, performance, and sensible technical decisions.

Products

A selection of works that represent my way of building software: concrete, structured, and result-oriented.

Security Monitor X

Security Monitor X

Monitoring platform with AI, automation, and device management.

Django • Python • AI • Postgres

Stay Safe

Stay Safe

Personal security system with real-time checks, alarms, and notifications.

Flutter • Node.js • Maps • Notifications

EasyPayCard

EasyPayCard

Cashless platform for hospitality facilities with shop, payments, and complete management.

Next.js • Prisma • Postgres • Stripe

Why work with me

A technical, practical approach focused on solving real problems, not selling standard solutions.

Cross-functional Skills

Software development, infrastructure, DevOps, and cybersecurity. This allows me to have a complete vision and reduce unnecessary dependencies and steps.

Cybersecurity and risk awareness

Experience in technical assessments, vulnerability assessments, penetration testing, and hardening, with focus on regulated contexts and security best practices.

Complex systems and integrations

I work on platforms, critical integrations, and corporate systems, not on superficial or isolated projects.

Complex systems and integrations

I work on platforms, critical integrations, and corporate systems, not on superficial or isolated projects.

Reliability and method

Clear processes, documentation, respect for deadlines, and technical choices designed to last over time.

Do you have a concrete project?

Write to me: let's understand what is really needed and what is not.

Contact me

Cusati Solutions | Software, Cybersecurity & IT Consulting