Anomalies and Events

Home » Marketplace » Anomalies and Events

GuardYoo

GuardYoo is an easy-to-use, agentless, yet powerful solution, that enables organizations of all sizes to proactively discover malware and persistent threats (active or dormant), that have breached existing defenses including online and real-time protection measures.

H-PREDICTIVE PLATFORM

H-Predictive Platform (PAR) merges digital twins and adversary simulation to anticipate attacks and manage risk in an ICT infrastructure, thru a life long continuous process of assessment and remediation

H-Time Machine

H-Time Machine (Forensics module) supports the discovery of successful, undetected attack against a previous version of the infrastructure, and forensics investigation in case of data breach

H-AI Real Time module

H-AI Real Time module (CAP), using predictive cyber attacks database generated by H-PAR, continuously monitor the infrastructure to predict, attribute and stop attacks in Real Time. H.CAP dramatically reduces the false positive, detects 0-Day exploitation and finally neutralize it

MAIA: MOBILE APPS INTELLIGENCE FOR ANDROID

How it works?
HISPASEC has created a malware analysis services for Android. We currently have more than 50 million applications of which a third of them have been listed as Malware. Once detected, malware is analyzed and cataloged within our systems.

SANA: Analysis, Notification and Alerts Service

SANA: Service Analysis, Notification and Alerts.

Our security alert system, which allows you to be aware of any incidents related to your systems or integrated into your applications.

Motion Detection and Local Decision Making

In complex IOT systems, nowadays it is often the case that we might have requirements that require end-to-end encryption between an edge device and a backend system. However, it might still be interesting to be able to perform some sort of local decision making at the gateway level, be it to save bandwidth, or reduce the latency in the decision-making process.

IoC Analysis

LastInfoSec's "IoC Analysis" is a data submission service to determine if the data is considered malicious or not. The malicious data returned will be enriched in order to reduce the time needed for Threat Intelligence teams to analyze the threat.

Threat Feed

LastInfoSec's Threat Feed is a data feed that makes it easier to detect threats within the information system. It contains enriched compromised evidences in order to reduce the time of threat analysis once detected.

 

Cybersecure gateway and solutions for IoT services

Usable and transparent security suite oriented for smart home systems based on Internet of Things (IoT) use, including all the features and capabilities stated in the GHOST project, as follow:

Pages

News

The future of digital security was discussed by Prof. Christos Xenakis and Demosthenes Economou, Head of Operational Security Unit of ENISA, in the “Athens Calling” broadcast on Greek National Radio (Proto Programma – ERT).

Future Events

A two-day conference exploring how hostile or criminal intent can be identified through the observation of behavioural indicators and the use of tactical risk analysis and non-racial profiling technique.

10/06/2020 to 11/06/2020

 Cyberwatching.eu and the SOFIE project are collaborating to organise a 2-hour workshop entitled “Decentralised operation and security in the IoT Space” to be held on 18th June at 11 AM CEST (12 PM EEST). The workshop will be showcasing how decentralized operation and security in the IoT Space help our society and economy.

18/06/2020