Detection Processes

Home » Marketplace » Detection Processes

IoC Analysis

LastInfoSec's "IoC Analysis" is a data submission service to determine if the data is
considered malicious or not. The malicious data returned will be enriched in order to reduce
the time needed for Threat Intelligence teams to analyze the threat.

Threat Feed

LastInfoSec's Threat Feed is a data feed that makes it easier to detect threats within the
information system. It contains enriched compromised evidences in order to reduce the time
of threat analysis once detected.

 

SecureCloud Platform

Ecosystem of cloud facilities characterized by superior security guarantees, providing protection from attacks by privileged users (e.g. the cloud provider or the system administrator) and software (e.g. the hypervisor). SecureCloud is flexible, since it can satisfy a wide range of customers-specific requirements including big data processing, secure intra-cloud communication, precise microservice scheduling and reliable data storage. SecureCloud is interoperable, in that its facilities can be seamlessly integrated with best of breed offerings from the Open Source community.

Training on the GDPR (in Spanish)

Through this course you will learn, in a very simple and understandable language, all the requirements and new obligations established by the new General Regulation of Data Protection of Europe (GDPR), which replaces the LOPD.

You will be assigned a personal tutor, who will be a certified teacher of Data Protection Delegate with professional experience in the regulations.

 

Training to become a Data Protection Delegate (in Spanish)

This is the essential training to practice as a DPD.
The aim of this course is to train new professionals who will become Data Protection Delegates, either within the company itself or as a service provided to other entities. A sector in full growth.

This course is based on the Official Schema developed by the AEPD for the Certification of Data Protection Delegates.

You can choose between the 100h course or the extended 180h course which includes the final project of complete adaptation and simulation of the certification examination.

Training on LSSICE (in Spanish)

Specialized training to learn about the new Organic Law on Personal Data Protection and Digital Rights Guarantee (LOPDPGDD).
Throught this course you will learn, in a very simple and understandable language, all the requirements and new obligations established the new Organic Law 3/2018, of 5 December, of Personal Data Protection and guarantee of digital rights (LOPDPGDD).

Redborder

Redborder is a cybersecurity solution based on Open Source, Big Data, and traffic analysis accompanied by a set of active probes managed in an integrated manner. This platform unifies in real time the different data sources provided by redborder Apps and Probes or by other manufacturers, enabling easy creation of customizable dashboards and reports to support deployments like Netwok Visibility, Critical Infrastructures Security, Wifi Security, or Security Operation Centers.

Simarks BestSafe

Simarks™ BestSafe™ is a tool focused on privilege management for any Microsoft Windows operating system version and edition running on any workstation, desktop, laptop or server running on any physical, portable or virtualized hardware.

The main goal of BestSafe™ is to allow administrators to assign any application/process the security context it has to be executed with, no matter which user credentials it was created with. However, BestSafe™ also offers complete support for traditional per user privilege management.

Cyberwiser Essential

CyberWISER Essential is a complete service that incorporates a decisive feature brought by WISER: the real-time monitoring and assessment of cyber risk.

CyberWiser Light

CyberWISER Light is a free, new online self-assessment service that helps organisations to build resilience against growing cyber risks, within and outside the company.
CyberWISER Light significantly lowers the entry barrier to effective risk management especially for the many small firms that don’t have time, money or IT savvy staff.
It is composed of two parts, an online questionnaire and an online vulnerability test, and it can be performed in less than 30'.

Pages

News

CyberSolace, has added a new niche capability to its portfolio of cybersecurity consulting services in the form of Crypto-Currency traceability services in Cybercrime cases.  Especially in relation to ransomware attacks and extorted funds tracing and recoverability.

Future Events

As Europe’s largest legal technology conference and exhibition, The British Legal Technology Forum 2020 will bring together the most respected professionals from both the legal and commercial technology sectors to examine and explore the systems, strategies, processes and platforms that will drive law firms and legal businesses into the next decade and beyond.

10/03/2020

This webinar gives key advice to improve your project market readiness by sharing tips and best practices from three H2020 projects that are an example of advanced market preparation. SMESEC is going to be one of them.

11/03/2020