Home » Marketplace » Detect

Detect

Runtime security monitoring

Verify any security violation at runtime, monitoring stack for the run-time conditions so that the self- learning and self-healing mechanisms can be fed.  

PIACERE Framework

Keywords: cybersecurity, static analysis, model checking, Wazuh, vulnerability assessment 

Benefits: 

  • Able to run integrated vulnerability scanners to scan web applications and detect web vulnerabilities  

FISHY Secure Infrastructure Abstraction

 

Abstract interface allowing the orchestration and connectivity of virtualized functions for monitoring and mitigation actions on different types of underlying infrastructure (IoT, IaaS, baremetal, etc) 

FISHY Security Assurance & Certification Manager

Component architecture tailored to supply chains needs focussing especially on regulatory obligations (e.g., GDPR) and violations/compliance of service level agreements

FISHY Trust & Incident Manager

When addressing the resilience of supply chains in their complexity, a platform that provides vulnerability forecast, risk estimation and mitigation must consider the heterogeneous nature of supply chain infrastructures as an important driver of architectural design and exposing it with an architecture designed for supply chains, instead of single network.

FISHY CYBER RESILIENT SUPPLY CHAIN SYSTEM

Easing FISHY platform usability, making the whole system user-friendly and ready to be used for different users according to their expected profile and thus permitted functionalities.

Sentry

The Sentry is a service that is designed to detect targeted attacks. When a targeted attack successfully breaches an organization, it is extremely important to be able to detect it is quickly as possible and thus prevent greater damage. The service includes the Sentry software installed on workstations, which finds targeted attacks and more traditional bulk malware.

Asset Tracker

The Asset tracker service enables you to track your organizations sensitive data and find out if your data has leaked to the internet. Tracking this information enables quick response and helps minimize damages. When we know what has leaked, we can help isolate and fix weaknesses in your security. The service also helps organizations to fulfill the requirement of notifying affected parties in the event of a data breach, as outlined in the GDPR.

Advanced Persistent Threat Feed

The Fitsec Advanced Persistent Threat feed is a collection of data used to identify malware fingerprints and attacks targeted towards an organization. It is designed to be easily integrated into your existing systems and to improve your malware detection capabilities. With our APT-feed, your organization is equipped to possibly stop an advanced attack altogether, or at least minimize the damages to your operation.

Quantimatter Cybertesting on-demand for SMB

Quantimatter provides a Cybersecurity testing “as-a-Service” platform using Robotic Process Automation to assess Cybersecurity maturity and mitigate exploits  in days, instead of weeks. We help Small Medium Businesses build digital resilience through vulnerability testing and automated pen testing for online infrastructures.

CYBERWISER.eu Platform - ADVANCED Offering Level

In the ADVANCED offering level all the features in the INTERMEDIATE level are upgraded to their full potential to guarantee adequate training materials, the provision of cyber-rage training scenarios and exercises, simulation of cyber-attacks and defence mechanisms, monitoring and measurement of user performance for those users already tasked with the defence of high-risk organisations against cyber-attacks and incidents.

Pages

News

On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.