Home » Marketplace » Identify

Identify

OpView™

OpView™ is one of the most flexible security monitoring systems on the market which leverages a completely new database architecture to collect, correlate and report on all data types so you can successfully monitor security (SIEM), vulnerability, configuration & availability (SOC), performance, asset & flow (NOC) all in a single configurable system.

The European Project Radar

Based on the well known "Technology Radar" methodology developed and open-sourced by ThoughtWorks, the Cyberwatching.eu project uses a number of underpinning information sources to visualise the state of the art of these projects as a means to maintain oversight of the larger European Cybersecurity research landsc

H-PREDICTIVE PLATFORM

H-Predictive Platform (PAR) merges digital twins and adversary simulation to anticipate attacks and manage risk in an ICT infrastructure, thru a life long continuous process of assessment and remediation

H-Time Machine

H-Time Machine (Forensics module) supports the discovery of successful, undetected attack against a previous version of the infrastructure, and forensics investigation in case of data breach

H-AI Real Time module

H-AI Real Time module (CAP), using predictive cyber attacks database generated by H-PAR, continuously monitor the infrastructure to predict, attribute and stop attacks in Real Time. H.CAP dramatically reduces the false positive, detects 0-Day exploitation and finally neutralize it

MAIA: MOBILE APPS INTELLIGENCE FOR ANDROID

How it works?
HISPASEC has created a malware analysis services for Android. We currently have more than 50 million applications of which a third of them have been listed as Malware. Once detected, malware is analyzed and cataloged within our systems.

SANA: Analysis, Notification and Alerts Service

SANA: Service Analysis, Notification and Alerts.

Our security alert system, which allows you to be aware of any incidents related to your systems or integrated into your applications.

Privacy-Preserving Statistical Analysis

This FENTEC use case addresses the privacy-preserving computation of data analytics, focusing on the computation of statistics over large usage data.

Addressing the privacy-preserving computation of data analytics

The objective is to enable WALLIX clients to perform analytics with their clients’ data guaranteeing the privacy of it.

Privacy-preserving and auditable Digital Currency

This FENTEC use-case provides a digital-based currency as a one-to-one counterpart to physical money or issued by debit and credit cards. This would remove the privacy issues but still allowing some opportunities of taxability or auditability by governments or its taxes agencies.

Ethical Stack

The Ethical Stack is a series of tools to support creators of new connected technology to reflect on their product’s ethical and social impacts.

We approach ethics not only as a way of reflecting on technology but also as a way of building it. Our practical approach to ethics in action is based on three different frameworks: virtue ethics, care ethics and the capabilities approach. Materials and resources are intended to help you understand how our approach can be useful in the development of connected technologies.

Pages

News

On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.