Home » Marketplace » Information Protection Processes and Procedures

Information Protection Processes and Procedures

WITDOM Protection Orchestrator

The Protection Orchestrator (PO) coordinates several protection components and services in order to effectively protect data before they leave a trusted environment for processing or storing reasons. The PO is in charge of parsing the protection configuration of an application and applying it. This is done by building requests to Protection Components deployed in the trusted domain and calling them for protecting the input data that a service in the untrusted domain will need, or for unprotecting the results after a service in the untrusted domain has processed them.

WITDOM Identity Access Management

The WITDOM Identity and Access Management (IAM) component ensures that sensitive data in WITDOM is only accessible to individuals who are granted explicit entitlements to specific services, and has the ability to monitor / audit access to data and operations.

CREDENTIAL Cryptographic Components

All server-side and client-side components and apps needed for secure and privacy-friendly data sharing and identity management in the cloud. It is an open and flexible cloud identity wallet architecture to easily connect to other identity management systems

TREDISEC Security Primitives

"Piece of software that facilitates the Cloud Security technology providers to manage the entire lifecycle of the TREDISEC Primitives and Recipes. The framework also supports consumers of such technologies in locating and identifying them in a simple and effective manner, as well as in testing and deploying those in a specific cloud-based environment, in order to fulfil consumers’ own requirements. "

UNICORN CI Monitoring

A H2020 research and innovation project which facilitate the design and deployment of cloud applications and services and improve developers’ productivity by reducing cloud application design time via code annotations and blueprints for security.

SecureCloud Monitoring

SecureCloud is an ecosystem of cloud facilities characterized by superior security guarantees, providing protection from attacks by privileged users.

SecureCloud Secure Stream

SecureCloud is an ecosystem of cloud facilities characterized by superior security guarantees, providing protection from attacks by privileged users.

UNICORN Integrated Platform

A H2020 research and innovation project which facilitate the design and deployment of cloud applications and services and improve developers’ productivity by reducing cloud application design time via code annotations and blueprints for security.

ASAP - Autonomous System Adaptation Platform

Autonomous System Adaptation Platform (ASAP) is a service responsible for monitoring and, where necessary, interceding in the execution of applications deployed by DRIP. ASAP will collect a range of measurements based on a set of metrics determined by the requirements of the developer and the intrinsic monitorability of application and underlying infrastructure.

DRIP - Dynamic Real-Time Infrastructure Planner

Dynamic Real-time Infrastructure Planner (DRIP) is responsible for the planning, validation and provisioning of the virtual infrastructure enlisted to support an application specified in SIDE. DRIP has formulated an acceptable proposed infrastructure, which automatically negotiates with cloud providers in real-time to provision the infrastructure with respect to an agreed set of service level agreements (SLAs) that will satisfy (in principle) all quality of service requirements.

Pages

News

The Tech.eu Summit gathered over a thousand tech enthousiasts to Brussels, Belgium, on 17 May 2022. GEIGER was present at the expo hall, introducing the solution to the visitors at its booth, and giving them a sneak peak to the alpha version of the GEIGER app.

Future Events

We have achieved many exciting and interesting results during the SOCCRATES project, highlighted in many dissemination activities. At this point in time, however, the project will soon be finalized. That is why in this final SOCCRATES webinar, we want to focus on how we have exploited or plan to exploit these results, to ensure a continuous impact also after the project has ended. As a starting point, we will provide a short demonstration of the SOCCRATES pilot platform, following one of the SOCCRATES use cases.

07/06/2022