Detect

Home » Marketplace » Detect

IoTsTrust

In this wild IoT market, estimating cybersecurity risks, selecting the right standard to comply with and getting certified during the manufacturing process is an extremely complex task. Security Requirements, Security Controls and Security Assurance Activities must be considered by all the project stakeholders including business-lines and risk-owners.

SOFIE Energy Data Exchange Business Vertical

Description

This project SOFIE business vertical furthers the liberation of energy sector data, by providing currently missing building blocks for a future where the energy service providers and consumers have more control, freedom and flexibility over their data. This vertical establishes seamless access to the data with a few clicks done by the data owner  (the citizen), regardless of where the person lives or what existing energy networks are in place.

Benefits for targeted end-users:

GuardYoo

GuardYoo is an easy-to-use, agentless, yet powerful solution, that enables organizations of all sizes to proactively discover malware and persistent threats (active or dormant), that have breached existing defenses including online and real-time protection measures.

OpIndex™

OpIndex™ is one of the most accurate and comprehensive Dark Web Intelligence solutions on the market with unique Spider software custom-built to circumvent anonymisation measures and circumnavigate routing relays in order to Search and/or Index content with Reporting and Alerting to disrupt threat actors who operate in the Dark Web.

OpView™

OpView™ is one of the most flexible security monitoring systems on the market which leverages a completely new database architecture to collect, correlate and report on all data types so you can successfully monitor security (SIEM), vulnerability, configuration & availability (SOC), performance, asset & flow (NOC) all in a single configurable system.

H-PREDICTIVE PLATFORM

H-Predictive Platform (PAR) merges digital twins and adversary simulation to anticipate attacks and manage risk in an ICT infrastructure, thru a life long continuous process of assessment and remediation

H-Time Machine

H-Time Machine (Forensics module) supports the discovery of successful, undetected attack against a previous version of the infrastructure, and forensics investigation in case of data breach

H-AI Real Time module

H-AI Real Time module (CAP), using predictive cyber attacks database generated by H-PAR, continuously monitor the infrastructure to predict, attribute and stop attacks in Real Time. H.CAP dramatically reduces the false positive, detects 0-Day exploitation and finally neutralize it

MAIA: MOBILE APPS INTELLIGENCE FOR ANDROID

How it works?
HISPASEC has created a malware analysis services for Android. We currently have more than 50 million applications of which a third of them have been listed as Malware. Once detected, malware is analyzed and cataloged within our systems.

Pages

Future Events

One of the goals of the Cyberwatching.eu project is to identify ways to cluster (still active) projects with similar aims for their mutual benefit, and support these with targeted support activities (webinars, deep dives, focus events, etc.)

Cyberwatching.eu is organising two (2) separate virtual meetings with two different groups of projects, in order to help them improve their market capabilities.

09/07/2020 to 16/07/2020

COINS is the premier conference devoted to omni-layer techniques for smart AIdriven IoT systems, by identifying new perspectives and highlighting impending research issues and challenges.

27/07/2020 to 29/07/2020