Home » Marketplace » Information Protection Processes and Procedures

Information Protection Processes and Procedures

Simarks BestSafe

Simarks™ BestSafe™ is a tool focused on privilege management for any Microsoft Windows operating system version and edition running on any workstation, desktop, laptop or server running on any physical, portable or virtualized hardware.

The main goal of BestSafe™ is to allow administrators to assign any application/process the security context it has to be executed with, no matter which user credentials it was created with. However, BestSafe™ also offers complete support for traditional per user privilege management.

Mercury

Mercury is an all-in-one solution that defines zones and conduits, encrypts communications and provides active security and advanced threat resistance with a seamless deployment.

By encrypting communications, Mercury virtually isolates the load side from the rest of the world. Thanks to its key-management system grants secure access and enables policy access-rights.

Mercury is a unified security solution: it provides all the elements required in active security in a single product that does not require downtimes during the deployment process.

Ethical Hacking Services

SKIT Cyber security (SKIT) has more than eighteen years of experience in IT security field, assisting a multitude of companies in different sectors. SKIT team has been involved in a broad range of projects dealing with penetration testing:

•Ethical Hacking/Penetration Testing ICT systems (infrastructure, network, application, mobile iOS and Android)

•Ethical Hacking/Penetration Testing Industrial systems (Scada/ICS)  •Ethical Hacking/Penetration Testing IoT systems

Security Advisory service

The Security Adivisory Team of @Mediaservice.net provides two different categories of services:

  • Analysis & Testing: it assesses the level of safety of a defined area, both from a technological and organizational point of view.
  • Compliance & Governance: improves safety management, and ensures compliance with laws and market standards

@Mediaservice.net also provides the well-known ISECOM certification courses, plus professional training courses focused on three different IT/ICT security issues:

Consulting services

BL4CKSWAN SRL offers four kinds of services:

CloudTeams

CloudTeams is a new platform that brings together the software development community and potential end users. CloudTeams aims to create a link between the creators of technology and the people who add meaning to it, the users.

PlusPrivacy

PlusPrivacy provides you with a unified dashboard for protecting yourself from a variety of threats to your privacy. It will enable you to control the privacy settings in your social network accounts, hide your email identity, block ads, trackers and malware and prevent unwanted apps and browser extensions from tracking you and collecting your private data.

There  are four main functions for your benefit:

Cyberwiser Essential

CyberWISER Essential is a complete service that incorporates a decisive feature brought by WISER: the real-time monitoring and assessment of cyber risk.

CyberWiser Light

CyberWISER Light is a free, new online self-assessment service that helps organisations to build resilience against growing cyber risks, within and outside the company.
CyberWISER Light significantly lowers the entry barrier to effective risk management especially for the many small firms that don’t have time, money or IT savvy staff.
It is composed of two parts, an online questionnaire and an online vulnerability test, and it can be performed in less than 30'.

CyberWiser Plus

CyberWISER Plus is the most complex and advanced mode of operation designed for the WISER Platform.

Pages

News

The Tech.eu Summit gathered over a thousand tech enthousiasts to Brussels, Belgium, on 17 May 2022. GEIGER was present at the expo hall, introducing the solution to the visitors at its booth, and giving them a sneak peak to the alpha version of the GEIGER app.

Future Events

We have achieved many exciting and interesting results during the SOCCRATES project, highlighted in many dissemination activities. At this point in time, however, the project will soon be finalized. That is why in this final SOCCRATES webinar, we want to focus on how we have exploited or plan to exploit these results, to ensure a continuous impact also after the project has ended. As a starting point, we will provide a short demonstration of the SOCCRATES pilot platform, following one of the SOCCRATES use cases.

07/06/2022