Home » Marketplace » Communications

Communications

FISHY Secure Infrastructure Abstraction

 

Abstract interface allowing the orchestration and connectivity of virtualized functions for monitoring and mitigation actions on different types of underlying infrastructure (IoT, IaaS, baremetal, etc) 

FISHY Security & Privacy Dataspace Infrastructure

An enhanced framework for system events' management, including metrics from different sources and promoting co-relation with added semantics​

FISHY Security Assurance & Certification Manager

Component architecture tailored to supply chains needs focussing especially on regulatory obligations (e.g., GDPR) and violations/compliance of service level agreements

FISHY Intent-based Resilience Orchestration

Solution translating high level intents into configured policies, and interact with the system response using AI techniques

FISHY Trust & Incident Manager

When addressing the resilience of supply chains in their complexity, a platform that provides vulnerability forecast, risk estimation and mitigation must consider the heterogeneous nature of supply chain infrastructures as an important driver of architectural design and exposing it with an architecture designed for supply chains, instead of single network.

FISHY CYBER RESILIENT SUPPLY CHAIN SYSTEM

Easing FISHY platform usability, making the whole system user-friendly and ready to be used for different users according to their expected profile and thus permitted functionalities.

Cybersecurity Awareness Solution for Local Public Administrations

CS-AWARE is a cybersecurity situational awareness software solution for Local Public Administrations. It was designed to detect, classify and visualize cybersecurity incidents in real time, supporting the prevention or mitigation of cyber-attacks. It addresses small, medium or big size Local Public Administrations and it can be taylored to any local software set-up, any European language and any type of LPA internal workflow and specifics.

The main features are:

1) Versatile connectivity: it is capable to connect to any type of internal or external data source

IoTsTrust

In this wild IoT market, estimating cybersecurity risks, selecting the right standard to comply with and getting certified during the manufacturing process is an extremely complex task. Security Requirements, Security Controls and Security Assurance Activities must be considered by all the project stakeholders including business-lines and risk-owners.

H-PREDICTIVE PLATFORM

H-Predictive Platform (PAR) merges digital twins and adversary simulation to anticipate attacks and manage risk in an ICT infrastructure, thru a life long continuous process of assessment and remediation

Pages

News

Startup OLÉ 2023 will take place from the 4th – 7th of September, and has gather along its history +40.000 attendees from +120 countries; +1.500 startups, scaleups and spin offs; +1.200 speakers; +300 corporates and investors with investment portfolio of over €100kM. Our goal is to present the pr

Future Events

 

Terrorist Content Online (TCO): how to prevent it?

How terrorist organisations spread TCO and what can be done to stop it

Terrorists and violent extremists are increasingly trying to find new ways to exploit the internet. The growth of terrorist propaganda to recruit and inspire attacks is a risk to us all.

11/10/2023

Water Knowledge Europe

Networking and Brokerage Event

17-19 October 2023, BluePoint, Brussels

17/10/2023 to 19/10/2023