Home » Marketplace » Detect

Detect

H-Time Machine

H-Time Machine (Forensics module) supports the discovery of successful, undetected attack against a previous version of the infrastructure, and forensics investigation in case of data breach

H-AI Real Time module

H-AI Real Time module (CAP), using predictive cyber attacks database generated by H-PAR, continuously monitor the infrastructure to predict, attribute and stop attacks in Real Time. H.CAP dramatically reduces the false positive, detects 0-Day exploitation and finally neutralize it

MAIA: MOBILE APPS INTELLIGENCE FOR ANDROID

How it works?
HISPASEC has created a malware analysis services for Android. We currently have more than 50 million applications of which a third of them have been listed as Malware. Once detected, malware is analyzed and cataloged within our systems.

SANA: Analysis, Notification and Alerts Service

SANA: Service Analysis, Notification and Alerts.

Our security alert system, which allows you to be aware of any incidents related to your systems or integrated into your applications.

Motion Detection and Local Decision Making

In complex IOT systems, nowadays it is often the case that we might have requirements that require end-to-end encryption between an edge device and a backend system. However, it might still be interesting to be able to perform some sort of local decision making at the gateway level, be it to save bandwidth, or reduce the latency in the decision-making process.

Malware & PCAP Feed

LastInfoSec’s "Malware & PCAP Feed" is an access to a set of tests allowing evaluation of the effectiveness of the intrusion and threat detection solution. It contains malicious files and pcaps of current or past attacks, which can be used to simulate those attacks for the sole purpose of testing the intrusion-detection solutions. 

IoC Analysis

LastInfoSec's "IoC Analysis" is a data submission service to determine if the data is considered malicious or not. The malicious data returned will be enriched in order to reduce the time needed for Threat Intelligence teams to analyze the threat.

Threat Feed

LastInfoSec's Threat Feed is a data feed that makes it easier to detect threats within the information system. It contains enriched compromised evidences in order to reduce the time of threat analysis once detected.

 

mF2C Agent and microagent

mF2C provides a coordinated management of traditional cloud architectures and novel fog ones, offering unique capabilities for distributed execution of applications throughout IoT, fog and cloud environments across a variety of industry verticals. At the same time, it facilitates the efficient usage of resources within the stack built from the edge upt to the cloud, taking into consideration services' requirements (e.g. immediate data collection and processing, low latency) and user demands (e.g.

Cybersecure gateway and solutions for IoT services

Usable and transparent security suite oriented for smart home systems based on Internet of Things (IoT) use, including all the features and capabilities stated in the GHOST project, as follow:

Pages

News

The Tech.eu Summit gathered over a thousand tech enthousiasts to Brussels, Belgium, on 17 May 2022. GEIGER was present at the expo hall, introducing the solution to the visitors at its booth, and giving them a sneak peak to the alpha version of the GEIGER app.

Future Events

We have achieved many exciting and interesting results during the SOCCRATES project, highlighted in many dissemination activities. At this point in time, however, the project will soon be finalized. That is why in this final SOCCRATES webinar, we want to focus on how we have exploited or plan to exploit these results, to ensure a continuous impact also after the project has ended. As a starting point, we will provide a short demonstration of the SOCCRATES pilot platform, following one of the SOCCRATES use cases.

07/06/2022