Home » Marketplace » Protective Technology

Protective Technology

Redborder

Redborder is a cybersecurity solution based on Open Source, Big Data, and traffic analysis accompanied by a set of active probes managed in an integrated manner. This platform unifies in real time the different data sources provided by redborder Apps and Probes or by other manufacturers, enabling easy creation of customizable dashboards and reports to support deployments like Netwok Visibility, Critical Infrastructures Security, Wifi Security, or Security Operation Centers.

Simarks Deployment Manager

Based on a patented technology of privilege management at process level, Simarks SDM allows to build an application corporate catalog where the end user is who installs the applications without granting him administrator permissions. This approach allows
complete implementation of the principle of least privilege without affecting the productivity.

Simarks BestSafe

Simarks™ BestSafe™ is a tool focused on privilege management for any Microsoft Windows operating system version and edition running on any workstation, desktop, laptop or server running on any physical, portable or virtualized hardware.

The main goal of BestSafe™ is to allow administrators to assign any application/process the security context it has to be executed with, no matter which user credentials it was created with. However, BestSafe™ also offers complete support for traditional per user privilege management.

nVision 10

Axence nVision is a software consolidating all the functions required for the management of the entire IT infrastructure. It is a feature-rich system which is the perfect choice for companies focusing on network security, risk reduction and software legality.
It is integrated solution of 5 modules:

Security Advisory service

The Security Adivisory Team of @Mediaservice.net provides two different categories of services:

  • Analysis & Testing: it assesses the level of safety of a defined area, both from a technological and organizational point of view.
  • Compliance & Governance: improves safety management, and ensures compliance with laws and market standards

@Mediaservice.net also provides the well-known ISECOM certification courses, plus professional training courses focused on three different IT/ICT security issues:

Consulting services

BL4CKSWAN SRL offers four kinds of services:

Libsafecrypto

SAFEcrypto provides a new generation of practical, robust, and physically secure post-quantum cryptographic functions. Work Package 6 developed a suite of software routines to implement the lattice-based constructions identified in Work Package 4 of the SAFEcrypto project, whilst providing cryptographic primitives for use in the demonstrations developed in Work Package 9.

MiCADO

COLA develops a generic set of services (called MiCADO - Microservices-based Cloud Application-level Dynamic Orchestrator ) that provide dynamic and automated resource scalability on clouds for all (or at least a very wide range of) applications. MiCADO services can be expressed with a set of well-defined (standardised) interfaces to be easily embedded into application control code without changing the original application logic.

MUSA TOOLS

The MUSA tools is a collection of tools developed to support the integration of security in all phases of multi-cloud applications life-cycle. These tools are applicable to different phases of the applications life-cycle right from applications design to development, deployment up till runtime. The MUSA tools are listed below.

MIKELANGELO technology stack

MIKELANGELO consists of a set of technologies and approaches, all aiming to improve IO performance or to help with integration of MIKELANGELO components into larger systems.

Pages

News

The Tech.eu Summit gathered over a thousand tech enthousiasts to Brussels, Belgium, on 17 May 2022. GEIGER was present at the expo hall, introducing the solution to the visitors at its booth, and giving them a sneak peak to the alpha version of the GEIGER app.

Future Events

We have achieved many exciting and interesting results during the SOCCRATES project, highlighted in many dissemination activities. At this point in time, however, the project will soon be finalized. That is why in this final SOCCRATES webinar, we want to focus on how we have exploited or plan to exploit these results, to ensure a continuous impact also after the project has ended. As a starting point, we will provide a short demonstration of the SOCCRATES pilot platform, following one of the SOCCRATES use cases.

07/06/2022