Home » Marketplace » Maintenance

Maintenance

FISHY Secure Infrastructure Abstraction

 

Point-of-access to interact with NFV infrastructure resources, with secure end-to-end communications across the ICT supply chain

FISHY KER7

FISHY Enforcement & Dynamic Configuration

Framework leveraging a capability model instead of the traditional refinement techniques based on logic rules

FISHY KER 6

FISHY Intent-based Resilience Orchestration

Solution translating high level intents into configured policies, and interact with the system response using AI techniques

FISHY KER3

FISHY Trust & Incident Manager

When addressing the resilience of supply chains in their complexity, a platform that provides vulnerability forecast, risk estimation and mitigation must consider the heterogeneous nature of supply chain infrastructures as an important driver of architectural design and exposing it with an architecture designed for supply chains, instead of single network.

FISHY CYBER RESILIENT SUPPLY CHAIN SYSTEM

Easing FISHY platform usability, making the whole system user-friendly and ready to be used for different users according to their expected profile and thus permitted functionalities.

Toolikit for Anonymous Authentication for Hyperledger Fabric

This toolkit allows users to anonymously authenticate their Hyperledger Fabric transactions while supporting revocation and audit functionalities.

This toolkit was produced by IBM Research and is available here.

IoTsTrust

In this wild IoT market, estimating cybersecurity risks, selecting the right standard to comply with and getting certified during the manufacturing process is an extremely complex task. Security Requirements, Security Controls and Security Assurance Activities must be considered by all the project stakeholders including business-lines and risk-owners.

GuardYoo

GuardYoo is an easy-to-use, agentless, yet powerful solution, that enables organizations of all sizes to proactively discover malware and persistent threats (active or dormant), that have breached existing defenses including online and real-time protection measures.

QualityGate

QualityGate is software that continuously measures and monitors the quality of the source code of your systems as-well-as the performance of the development team. Source code is analyzed onsite, by our static analyzer tools, without ever getting out of your infrastructure. Only the final results of the analysis (metrics, list of coding issues and duplications, etc.) are uploaded to our servers for having them evaluated against our benchmarks by using sophisticated quality models. You can browse and further analyze the results at any time on our dashboards.

H-PREDICTIVE PLATFORM

H-Predictive Platform (PAR) merges digital twins and adversary simulation to anticipate attacks and manage risk in an ICT infrastructure, thru a life long continuous process of assessment and remediation

Pages

News

The Tech.eu Summit gathered over a thousand tech enthousiasts to Brussels, Belgium, on 17 May 2022. GEIGER was present at the expo hall, introducing the solution to the visitors at its booth, and giving them a sneak peak to the alpha version of the GEIGER app.

Future Events

We have achieved many exciting and interesting results during the SOCCRATES project, highlighted in many dissemination activities. At this point in time, however, the project will soon be finalized. That is why in this final SOCCRATES webinar, we want to focus on how we have exploited or plan to exploit these results, to ensure a continuous impact also after the project has ended. As a starting point, we will provide a short demonstration of the SOCCRATES pilot platform, following one of the SOCCRATES use cases.

07/06/2022