Home » Marketplace » Identify

Identify

FISHY Secure Infrastructure Abstraction

 

Point-of-access to interact with NFV infrastructure resources, with secure end-to-end communications across the ICT supply chain

FISHY Enforcement & Dynamic Configuration

Framework leveraging a capability model instead of the traditional refinement techniques based on logic rules

FISHY Intent-based Resilience Orchestration

Solution translating high level intents into configured policies, and interact with the system response using AI techniques

FISHY Trust & Incident Manager

When addressing the resilience of supply chains in their complexity, a platform that provides vulnerability forecast, risk estimation and mitigation must consider the heterogeneous nature of supply chain infrastructures as an important driver of architectural design and exposing it with an architecture designed for supply chains, instead of single network.

FISHY CYBER RESILIENT SUPPLY CHAIN SYSTEM

Easing FISHY platform usability, making the whole system user-friendly and ready to be used for different users according to their expected profile and thus permitted functionalities.

Cyber Security Program for Startups

Worldwide Startups can secure their business with Cyber Legion helps.

Every Startup Organization, regardless of its size, collects, stores, and uses important information, and can struggle to implement powerful cybersecurity practices because of limited resources such as time, money, and people.

Cyber Legion team believe that any Organizations should be help to build and maintain trust and lasting relationships with clients and beneficiaries.

Asset Tracker

The Asset tracker service enables you to track your organizations sensitive data and find out if your data has leaked to the internet. Tracking this information enables quick response and helps minimize damages. When we know what has leaked, we can help isolate and fix weaknesses in your security. The service also helps organizations to fulfill the requirement of notifying affected parties in the event of a data breach, as outlined in the GDPR.

Catalog of TRINITY Demonstrators and Modules

TRINITY Robitcs DIHs Demonstrators and Modules

Catalogue available here.

 

Use case 1: Collaborative assembly with vision-based safety system

LEARN MORE

Secure Marketplace for Access to Ubiquitous Goods (SMAUG)

Description

SMAUG is a decentralised and open marketplace developed as a reference implementation for SOFIE framework component usage. SMAUG demonstrates how smart locker owners can put their smart lockers for rent, and potential smart locker renters can place bids, for those smart lockers to get the authorisation to use them. Smart locker owners publish smart lockers on the marketplace by creating a request, i.e., a request for offers. The bids that smart locker renters place for those requests are called offers. 

Pages

News

Risk-!n Conference 2022 took place on 19-20 May in Zürich, Switzerland. GEIGER was presented in a dedicated session that built on the comparison of cyber risks and radioactivity, called 'GEIGER - We make the invisible visible!'.

Future Events

The IRIS consortium and the European Cyber Security Organisation (ECSO) have the pleasure to invite you to the official IRIS launch event, taking place virtually on the 5th July from 9:30 to 12:30 CET.

05/07/2022