Home » Marketplace » Anomalies and Events

Anomalies and Events

Cybersecure gateway and solutions for IoT services

Usable and transparent security suite oriented for smart home systems based on Internet of Things (IoT) use, including all the features and capabilities stated in the GHOST project, as follow:

MiCADO framework

Auto-scaling Framework for Docker container orchestrated by Kubernetes [Infrastructure as Code]​

The MiCADO framework automates deployment and orchestration of applications in the cloud. The framework is generic, pluggable, technology agnostic as well as open-source and supports various public and private cloud environments, like Open Nebula, Open Stack, Azure, AWS, Cloud Sigma and CloudBroker Platform. 

SecureCloud Platform

Ecosystem of cloud facilities characterized by superior security guarantees, providing protection from attacks by privileged users (e.g. the cloud provider or the system administrator) and software (e.g. the hypervisor). SecureCloud is flexible, since it can satisfy a wide range of customers-specific requirements including big data processing, secure intra-cloud communication, precise microservice scheduling and reliable data storage. SecureCloud is interoperable, in that its facilities can be seamlessly integrated with best of breed offerings from the Open Source community.

Redborder

Redborder is a cybersecurity solution based on Open Source, Big Data, and traffic analysis accompanied by a set of active probes managed in an integrated manner. This platform unifies in real time the different data sources provided by redborder Apps and Probes or by other manufacturers, enabling easy creation of customizable dashboards and reports to support deployments like Netwok Visibility, Critical Infrastructures Security, Wifi Security, or Security Operation Centers.

Simarks BestSafe

Simarks™ BestSafe™ is a tool focused on privilege management for any Microsoft Windows operating system version and edition running on any workstation, desktop, laptop or server running on any physical, portable or virtualized hardware.

The main goal of BestSafe™ is to allow administrators to assign any application/process the security context it has to be executed with, no matter which user credentials it was created with. However, BestSafe™ also offers complete support for traditional per user privilege management.

Pages

News

On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.