Home » Marketplace » Identity Management & Access Control

Identity Management & Access Control

Runtime security monitoring

Verify any security violation at runtime, monitoring stack for the run-time conditions so that the self- learning and self-healing mechanisms can be fed.  

PIACERE Framework

Keywords: cybersecurity, static analysis, model checking, Wazuh, vulnerability assessment 

Benefits: 

  • Able to run integrated vulnerability scanners to scan web applications and detect web vulnerabilities  

Component Security Inspector

Analysing also the IaC code, reports the potential vulnerabilities and proposes potential fixes, addressing the dependency information from the IaC and application code, detect included programs and libraries with known vulnerabilities by querying public vulnerability databases, and produce a report to the PIACERE user.  

PIACERE Framework

Keywords: IaC, component, scanner, vulnerability, reports 

IaC Code Security Inspector

Avoid misconfigurations, insecure coding and configuration patterns through an automated solution for checking the integrity and applicability of IaC code that is to be deployed on an infrastructure. 

PIACERE Framework

Keywords: IaC, code quality, infrastructure, misconfigurations 

Benefits: 

  • Identifies possible vulnerabilities and improvements 

FISHY Security & Privacy Dataspace Infrastructure

An enhanced framework for system events' management, including metrics from different sources and promoting co-relation with added semantics​

FISHY CYBER RESILIENT SUPPLY CHAIN SYSTEM

Easing FISHY platform usability, making the whole system user-friendly and ready to be used for different users according to their expected profile and thus permitted functionalities.

Cyber Security Program for Startups

Worldwide Startups can secure their business with Cyber Legion helps.

Every Startup Organization, regardless of its size, collects, stores, and uses important information, and can struggle to implement powerful cybersecurity practices because of limited resources such as time, money, and people.

Cyber Legion team believe that any Organizations should be help to build and maintain trust and lasting relationships with clients and beneficiaries.

Toolkit for Secure Multi-Party Computation on Ledgers

This toolkit allows  libraries for two/multi-party computation to use a ledger as a communication channel instead of point-to-point connections. The toolkit consists of two parts: 1) the first module generically allows libraries from two/multi-party computation to use a ledger as a communication channel instead of point-to-point connections; 2) the second module is an upgrade of MPyC to add the possibility of verifying computations.

IoTsTrust

In this wild IoT market, estimating cybersecurity risks, selecting the right standard to comply with and getting certified during the manufacturing process is an extremely complex task. Security Requirements, Security Controls and Security Assurance Activities must be considered by all the project stakeholders including business-lines and risk-owners.

SOFIE Privacy and Data Sovereignty Component

Description

The SOFIE Privacy and Data Sovereignty component provides mechanisms that allow actors to better control their data, as well as mechanisms that protect client privacy. 

PDS enables the creation of privacy preserving surveys. These are surveys that allow users to add noise to their responses using local differential privacy mechanisms. The addition of the noise prevents third parties from learning meaningful information about specific users, but at the same time meaningful aggregated statistics can be extracted.

SOFIE Identity, Authentication and Authorisation (IAA) Component

Description

The goal of the SOFIE Identity, Authentication, and Authorisation (IAA) component is to provide mechanisms that can be used for identifying communicating endpoints, as well as for authenticating and authorising users wishing to access a protected resource. 

Pages

News

Startup OLÉ 2023 will take place from the 4th – 7th of September, and has gather along its history +40.000 attendees from +120 countries; +1.500 startups, scaleups and spin offs; +1.200 speakers; +300 corporates and investors with investment portfolio of over €100kM. Our goal is to present the pr

Future Events

 

Terrorist Content Online (TCO): how to prevent it?

How terrorist organisations spread TCO and what can be done to stop it

Terrorists and violent extremists are increasingly trying to find new ways to exploit the internet. The growth of terrorist propaganda to recruit and inspire attacks is a risk to us all.

11/10/2023

Water Knowledge Europe

Networking and Brokerage Event

17-19 October 2023, BluePoint, Brussels

17/10/2023 to 19/10/2023