Home » Marketplace » Detection Processes

Detection Processes

FISHY Security Assurance & Certification Manager

Component architecture tailored to supply chains needs focussing especially on regulatory obligations (e.g., GDPR) and violations/compliance of service level agreements

FISHY Trust & Incident Manager

When addressing the resilience of supply chains in their complexity, a platform that provides vulnerability forecast, risk estimation and mitigation must consider the heterogeneous nature of supply chain infrastructures as an important driver of architectural design and exposing it with an architecture designed for supply chains, instead of single network.

FISHY CYBER RESILIENT SUPPLY CHAIN SYSTEM

Easing FISHY platform usability, making the whole system user-friendly and ready to be used for different users according to their expected profile and thus permitted functionalities.

Sentry

The Sentry is a service that is designed to detect targeted attacks. When a targeted attack successfully breaches an organization, it is extremely important to be able to detect it is quickly as possible and thus prevent greater damage. The service includes the Sentry software installed on workstations, which finds targeted attacks and more traditional bulk malware.

Advanced Persistent Threat Feed

The Fitsec Advanced Persistent Threat feed is a collection of data used to identify malware fingerprints and attacks targeted towards an organization. It is designed to be easily integrated into your existing systems and to improve your malware detection capabilities. With our APT-feed, your organization is equipped to possibly stop an advanced attack altogether, or at least minimize the damages to your operation.

Quantimatter Cybertesting on-demand for SMB

Quantimatter provides a Cybersecurity testing “as-a-Service” platform using Robotic Process Automation to assess Cybersecurity maturity and mitigate exploits  in days, instead of weeks. We help Small Medium Businesses build digital resilience through vulnerability testing and automated pen testing for online infrastructures.

CYBERWISER.eu Platform - ADVANCED Offering Level

In the ADVANCED offering level all the features in the INTERMEDIATE level are upgraded to their full potential to guarantee adequate training materials, the provision of cyber-rage training scenarios and exercises, simulation of cyber-attacks and defence mechanisms, monitoring and measurement of user performance for those users already tasked with the defence of high-risk organisations against cyber-attacks and incidents.

CYBERWISER.eu Platform - INTERMEDIATE Offering Level

The INTERMEDIATE offering level enables a much more personalised experience with a larger number of features. These include the number of elements that can be used for defining a cyber-range training scenario, the possibility to create new training scenarios, a suite of available automated attacks and a first version of vulnerability assessment tools.

CYBERWISER.eu Platform - BASIC Offering Level

The BASIC offering level targets users that are familiar with cybersecurity and want or need to test and improve their skills at a higher level.

CYBERWISER.eu Platform - PRIMER Offering Level

The PRIMER offering level is the starting point to CYBERWISER.eu platform, it is an offering level mainly addressed to Students or Early professionals that do not have any knowledge of the cybersecurity framework. The first Learning goal of the Primer level is to give a complete understanding of the basic concepts like most common Cybersecurity threats and best practice. Another learning goal is to understand the overall process of cyber-risk analysis and its relationship with cybersecurity.

Pages

News

The Tech.eu Summit gathered over a thousand tech enthousiasts to Brussels, Belgium, on 17 May 2022. GEIGER was present at the expo hall, introducing the solution to the visitors at its booth, and giving them a sneak peak to the alpha version of the GEIGER app.

Future Events

We have achieved many exciting and interesting results during the SOCCRATES project, highlighted in many dissemination activities. At this point in time, however, the project will soon be finalized. That is why in this final SOCCRATES webinar, we want to focus on how we have exploited or plan to exploit these results, to ensure a continuous impact also after the project has ended. As a starting point, we will provide a short demonstration of the SOCCRATES pilot platform, following one of the SOCCRATES use cases.

07/06/2022