Home » Marketplace » Protective Technology

Protective Technology

FISHY Secure Infrastructure Abstraction

 

Point-of-access to interact with NFV infrastructure resources, with secure end-to-end communications across the ICT supply chain

FISHY Enforcement & Dynamic Configuration

Framework leveraging a capability model instead of the traditional refinement techniques based on logic rules

FISHY Security & Privacy Dataspace Infrastructure

An enhanced framework for system events' management, including metrics from different sources and promoting co-relation with added semantics​

FISHY Security Assurance & Certification Manager

Component architecture tailored to supply chains needs focussing especially on regulatory obligations (e.g., GDPR) and violations/compliance of service level agreements

FISHY Intent-based Resilience Orchestration

Solution translating high level intents into configured policies, and interact with the system response using AI techniques

FISHY Trust & Incident Manager

When addressing the resilience of supply chains in their complexity, a platform that provides vulnerability forecast, risk estimation and mitigation must consider the heterogeneous nature of supply chain infrastructures as an important driver of architectural design and exposing it with an architecture designed for supply chains, instead of single network.

FISHY CYBER RESILIENT SUPPLY CHAIN SYSTEM

Easing FISHY platform usability, making the whole system user-friendly and ready to be used for different users according to their expected profile and thus permitted functionalities.

Cyber Security Program for Startups

Worldwide Startups can secure their business with Cyber Legion helps.

Every Startup Organization, regardless of its size, collects, stores, and uses important information, and can struggle to implement powerful cybersecurity practices because of limited resources such as time, money, and people.

Cyber Legion team believe that any Organizations should be help to build and maintain trust and lasting relationships with clients and beneficiaries.

Sentry

The Sentry is a service that is designed to detect targeted attacks. When a targeted attack successfully breaches an organization, it is extremely important to be able to detect it is quickly as possible and thus prevent greater damage. The service includes the Sentry software installed on workstations, which finds targeted attacks and more traditional bulk malware.

USBguard

The USBguard is a service designed to protect against threats related to USB storage devices. The service provides you with USBguard devices that have four main functions for interacting with USB storage devices: file listing, scanning (Antivirus and BadUSB), file copying and secure formatting.

USBguard devices automatically fetch antivirus updates and software updates when they are connected to the internet.

The USBguard service is based on a yearly license that includes:

Pages

News

Risk-!n Conference 2022 took place on 19-20 May in Zürich, Switzerland. GEIGER was presented in a dedicated session that built on the comparison of cyber risks and radioactivity, called 'GEIGER - We make the invisible visible!'.

Future Events

The IRIS consortium and the European Cyber Security Organisation (ECSO) have the pleasure to invite you to the official IRIS launch event, taking place virtually on the 5th July from 9:30 to 12:30 CET.

05/07/2022