Home » Marketplace » Identify

Identify

FISHY Secure Infrastructure Abstraction

 

Abstract interface allowing the orchestration and connectivity of virtualized functions for monitoring and mitigation actions on different types of underlying infrastructure (IoT, IaaS, baremetal, etc) 

FISHY Enforcement & Dynamic Configuration

Framework leveraging a capability model instead of the traditional refinement techniques based on logic rules

FISHY Intent-based Resilience Orchestration

Solution translating high level intents into configured policies, and interact with the system response using AI techniques

FISHY Trust & Incident Manager

When addressing the resilience of supply chains in their complexity, a platform that provides vulnerability forecast, risk estimation and mitigation must consider the heterogeneous nature of supply chain infrastructures as an important driver of architectural design and exposing it with an architecture designed for supply chains, instead of single network.

FISHY CYBER RESILIENT SUPPLY CHAIN SYSTEM

Easing FISHY platform usability, making the whole system user-friendly and ready to be used for different users according to their expected profile and thus permitted functionalities.

Cyber Security Program for Startups

Worldwide Startups can secure their business with Cyber Legion helps.

Every Startup Organization, regardless of its size, collects, stores, and uses important information, and can struggle to implement powerful cybersecurity practices because of limited resources such as time, money, and people.

Cyber Legion team believe that any Organizations should be help to build and maintain trust and lasting relationships with clients and beneficiaries.

Asset Tracker

The Asset tracker service enables you to track your organizations sensitive data and find out if your data has leaked to the internet. Tracking this information enables quick response and helps minimize damages. When we know what has leaked, we can help isolate and fix weaknesses in your security. The service also helps organizations to fulfill the requirement of notifying affected parties in the event of a data breach, as outlined in the GDPR.

Catalog of TRINITY Demonstrators and Modules

TRINITY Robitcs DIHs Demonstrators and Modules

Catalogue available here.

 

Use case 1: Collaborative assembly with vision-based safety system

LEARN MORE

Secure Marketplace for Access to Ubiquitous Goods (SMAUG)

Description

SMAUG is a decentralised and open marketplace developed as a reference implementation for SOFIE framework component usage. SMAUG demonstrates how smart locker owners can put their smart lockers for rent, and potential smart locker renters can place bids, for those smart lockers to get the authorisation to use them. Smart locker owners publish smart lockers on the marketplace by creating a request, i.e., a request for offers. The bids that smart locker renters place for those requests are called offers. 

Pages

News

On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.