Skip to content
Viriatus
Case Studies

Real Results. Real Sectors.

Learn how Viriatus transforms cybersecurity across different sectors.

PUBLIC ADMINISTRATIONFINANCIALHEALTHCAREINDUSTRYNIS2DORAGDPRISO 27001PUBLIC ADMINISTRATIONFINANCIALHEALTHCAREINDUSTRYNIS2DORAGDPRISO 27001
01
Case 01

Public Administration

Context

A mid-sized municipality in central Portugal, responsible for critical services to over 80,000 citizens. Manages IT infrastructure distributed across 12 buildings, with over 400 endpoints and legacy systems for urban planning, accounting, and citizen services.

Problem
  • Zero visibility over the attack surface — no updated inventory of exposed assets
  • Disconnected security tools — antivirus from one vendor, firewall from another, no correlation
  • Inability to meet NIS2 and DL 65/2021 requirements within legal deadlines
  • Reduced IT team (3 people) with no specific cybersecurity training
  • Previous incidents undocumented — no playbooks or formal procedures
Solution with Viriatus
  • Deployment on CyberS3C infrastructure with VPN access — operational in under 1 hour
  • External Module: automatic discovery of 47 unknown subdomains, 12 with critical vulnerabilities
  • Internal Module: XDR/EDR integration with complete inventory of 423 endpoints, 18 with outdated software
  • Incidents Module: CNCS/NIS2 workflow configured with automatic 4-phase notification
  • vCISO: daily executive summary for the responsible council member, no technical knowledge required
  • Probus: autonomous pentest that identified 3 attack vectors undetected by the vulnerability scanner
47
Subdomains discovered
89%
Reduction in response time
100%
NIS2 compliance
< 1h
Deployment time
02
Case 02

Financial Sector

Context

A financial institution regulated by the Bank of Portugal, with operations in specialized credit and over 200 employees. Subject to regular audits by BdP, CMVM, and DORA requirements.

Problem
  • Regulator audits identified gaps in technology risk management
  • Risk analysis based on qualitative matrices — no quantification of impact in euros
  • Total dependency on external consultants for annual pentests (cost: €25,000/year)
  • Technology vendor management without structured framework (DORA requirement)
  • Average incident response time: 72 hours (regulator requires < 24h)
Solution with Viriatus
  • GRC: FAIR risk analysis with Monte Carlo — first time the board received risk in euros
  • Multi-framework compliance: NIS2 + DORA + ISO 27001 monitored in a single dashboard
  • DORA: vendor management with criticality classification and monitored SLAs
  • Probus: continuous pentesting that replaced annual external pentests — €20,000/year savings
  • Incidents: response time reduced to < 4 hours with automated playbooks
  • vCISO: recommendations prioritized by financial impact, aligned with board KPIs
95%
Reduction in external pentest costs
VaR 95
Risk quantified in €
< 4h
Response time
DORA
Compliance achieved
03
Case 03

Healthcare

Context

A hospital group with 3 units, over 1,500 employees, and critical infrastructure including PACS (imaging), RIS, medication administration systems, and IoMT devices such as infusion pumps and vital signs monitors.

Problem
  • IoMT medical devices with no visibility — over 200 devices connected to the network without inventory
  • PACS system with known vulnerabilities (CVE-2023-*) with no immediate patching possibility
  • Strict GDPR requirements for clinical data — risk of fines up to €20M
  • Two ransomware incidents at Portuguese hospitals in 2023 increased board pressure
  • Security team: 1 CISO shared across 3 units
Solution with Viriatus
  • Internal Surface: complete inventory including IoMT devices, with CIA classification
  • Vulnerabilities: prioritization with SSVC — critical medical devices (affect lives) treated as P1 even with medium CVSS
  • Firewall: east-west traffic monitoring between clinical and administrative segments
  • vCISO: reports adapted for clinical directors — non-technical language, focus on patient risk
  • Business Impact Analysis (ISO 22301): maximum acceptable downtime per critical system
  • Probus: continuous intrusion tests on exposed network segments, without affecting production medical devices
234
IoMT devices inventoried
0
Ransomware incidents since deployment
GDPR
Compliance for clinical data
3
Units with complete BIA
04
SCADA PLC IT / OT BOUNDARY SAP ERP VPN
Case 04

Industry

Context

A Portuguese industrial group with 4 factories, exports to 15 countries, and ISO 9001 and ISO 14001 certifications. OT infrastructure with Siemens PLCs and SCADA, connected to the corporate IT network. Over 800 employees and SAP ERP systems.

Problem
  • IT/OT convergence without adequate segmentation — corporate network accessible from the factory floor
  • SCADA systems with insecure protocols (Modbus, OPC DA) without encryption
  • Supply chain attack on an industrial software vendor compromised VPN credentials
  • Cyber insurance required evidence of intrusion tests and vulnerability management
  • Production downtime costs €150,000/hour — zero tolerance for unplanned incidents
Solution with Viriatus
  • External Surface: continuous monitoring of customer portals and online ordering systems
  • Firewall: traffic analysis between IT and OT segments with anomaly detection in industrial protocols
  • Vulnerabilities: CVE inventory for SCADA and PLC systems with OT-adjusted prioritization
  • Case Management: remediation workflow with OT-specific SLAs (maintenance windows)
  • GRC: risk register integrated with cyber insurance — automatic evidence for the insurer
  • Probus: autonomous pentest focused on the external surface and industrial DMZ
0
Unplanned downtime from cyber incidents
15%
Insurance premium discount
100%
IT/OT visibility
Secured
Supply chain
Get Started

Is your organization next?

Contact us to learn how Viriatus can transform cybersecurity in your sector.

Public Admin
Financial
Healthcare
Industry