Home » Marketplace » Protect


Toolkit for Privacy-Preserving Data Storage on Ledgers

This toolkit is meant for data storage is a ledger-oriented solution for bridging data re-siding on a blockchain with those stored in an off-chain database. It is responsible for coordinating interaction between the backend ledger, storage, and the cryptographic library of an API service.

This toolkit was produced by National Infrastructures for Research and Technology for Greece and is available here.

Toolkit for Zero-knowledge Proofs for Ledgers

This toolkit, with the nickname SNARKY, is a Rust implementation of the Snarky Ceremonies protocol over the BLS12- 381 elliptic curve. It is the first experimental version of a production-grade library for running the protocol in real-life applications. 

This toolkit was produced by National Infrastructures for Research and Technology for Greece and The University of Edinburgh and is available here.

Toolkit for Secure Multi-Party Computation on Ledgers

This toolkit allows  libraries for two/multi-party computation to use a ledger as a communication channel instead of point-to-point connections. The toolkit consists of two parts: 1) the first module generically allows libraries from two/multi-party computation to use a ledger as a communication channel instead of point-to-point connections; 2) the second module is an upgrade of MPyC to add the possibility of verifying computations.

Toolkit for Mir-BFT: High-throughput Consensus for Hyperledger Fabric

This toolkit introduces an efficient consensus algorithm to Hyperledger Fabric to accommodate high-throughput applications.

This toolkit was produced by IBM and is available here.

Toolkit for Post-Quantum Secure Protocols

This enables authentication and integrity protection based on hash functions which are believed to be resilient against quantum attacks. Hash function based time-stamping can also indemnify transactions authenticated with current technology against future quantum attacks.

This toolkit was produced by Guardtime and is partially available here.

Toolikit for Anonymous Authentication for Hyperledger Fabric

This toolkit allows users to anonymously authenticate their Hyperledger Fabric transactions while supporting revocation and audit functionalities.

This toolkit was produced by IBM Research and is available here.


The Sentry is a service that is designed to detect targeted attacks. When a targeted attack successfully breaches an organization, it is extremely important to be able to detect it is quickly as possible and thus prevent greater damage. The service includes the Sentry software installed on workstations, which finds targeted attacks and more traditional bulk malware.


The USBguard is a service designed to protect against threats related to USB storage devices. The service provides you with USBguard devices that have four main functions for interacting with USB storage devices: file listing, scanning (Antivirus and BadUSB), file copying and secure formatting.

USBguard devices automatically fetch antivirus updates and software updates when they are connected to the internet.

The USBguard service is based on a yearly license that includes:

Quantimatter Cybertesting on-demand for SMB

Quantimatter provides a Cybersecurity testing “as-a-Service” platform using Robotic Process Automation to assess Cybersecurity maturity and mitigate exploits  in days, instead of weeks. We help Small Medium Businesses build digital resilience through vulnerability testing and automated pen testing for online infrastructures.

Catalog of TRINITY Demonstrators and Modules

TRINITY Robitcs DIHs Demonstrators and Modules

Catalogue available here.


Use case 1: Collaborative assembly with vision-based safety system




In its third edition, Concordia Open Door (COD) continued the series of annual meetups for the European heterogenous cybersecurity community.

Future Events

Quick and efficient management of ongoing incidents are paramount factors to consider when designing a SOC. To this end, the SOCCRATES platform provides with a flexible approach based on customizable workflows and the integration of specific security tools. This webinar will demostrate how the SOCCRATES platform manages incidents notified from the security monitoring systems deployed in an infrastructure, from incident analysis to containment and supported by the orchestrator of several different tools.


In order to ensure that the SOCCRATES platform is fit for purpose, the project will carry out three pilots to validate the platform in realistic environments. This webinar will show results and experiences from the second pilot, in which the complete SOCCRATES platform was validated in realistic (on-site) environments at Vattenfall, mnemonic and Shadowserver.