Identity Management & Access Control

Home » Marketplace » Identity Management & Access Control

IoTsTrust

In this wild IoT market, estimating cybersecurity risks, selecting the right standard to comply with and getting certified during the manufacturing process is an extremely complex task. Security Requirements, Security Controls and Security Assurance Activities must be considered by all the project stakeholders including business-lines and risk-owners.

SOFIE Privacy and Data Sovereignty Component

Description

The SOFIE Privacy and Data Sovereignty component provides an OAuth2.0 authorization server that accepts verifiable credentials, and decentralized identifiers as authorization grants, and outputs JSON web tokens.

  • Keywords: Authorization Server, JSON web tokens, OAuth 2.0
  • License Type: Free or open source
  • Technology Readiness: Laboratory testing of prototype component or process

Learn more about project SOFIE. 

SOFIE Identity, Authentication and Authorisation (IAA) Component

Description

The goal of the SOFIE Identity, Authentication and Authorisation (IAA) component is to provide mechanisms that can be used for identifying communicating endpoints, as well as for authenticating and authorising users wishing to access a protected resource.

  • Keywords: Verifiable Credentials, Decentralized Identifiers
  • License Type: Free or open source
  • Technology Readiness: Laboratory testing of prototype component or process

Learn more about project SOFIE.

SOFIE Provisioning and Discovery Component

Description

The goal of the provisioning and discovery component is to enable the discovery of new IoT resources and their related metadata. Using this functionality, it is possible to decentralise the process of making new resources available to systems utilising the SOFIE framework and to automate the negotiations for the terms of use and the compensation for the use of these resources.

SOFIE Interledger Component

Description

The purpose of the SOFIE Interledger component is to enable transactions between actors and devices belonging to different (isolated) IoT silos. Each silo either utilises or is connected to one or more ledgers, and the Interledger component then enables interactions between the ledgers. Once triggered by a specific event, the Interledger passes a customisable payload from the initiating ledger to the receiving ledger.

GDPR Temperature Tool

The GDPR Temperature Tool helps European SMEs understand just how at risk they are to sanctions or fines.

By answering a set of questions on data processing activities, the tool provides an indication, or temperature, of a company’s risk to sanctions. The higher the temperature, the higher the risk. In addition, a free a customised set of practical and actionable recommendations is provided.

H-PREDICTIVE PLATFORM

H-Predictive Platform (PAR) merges digital twins and adversary simulation to anticipate attacks and manage risk in an ICT infrastructure, thru a life long continuous process of assessment and remediation

H-Time Machine

H-Time Machine (Forensics module) supports the discovery of successful, undetected attack against a previous version of the infrastructure, and forensics investigation in case of data breach

H-AI Real Time module

H-AI Real Time module (CAP), using predictive cyber attacks database generated by H-PAR, continuously monitor the infrastructure to predict, attribute and stop attacks in Real Time. H.CAP dramatically reduces the false positive, detects 0-Day exploitation and finally neutralize it

MAIA: MOBILE APPS INTELLIGENCE FOR ANDROID

How it works?
HISPASEC has created a malware analysis services for Android. We currently have more than 50 million applications of which a third of them have been listed as Malware. Once detected, malware is analyzed and cataloged within our systems.

Pages

News

We live in the era of the conscious consumer. People are asking more of brands and they’re aware when a brand’s behaviour breaches their sense of ethics.

Future Events

ECSO cybersecurity business matchmaking events – also known as the ECSO Cyber Investor Days – are designed to cover different investment phases, ranging from seeding to strategic investment and M&A, as well as to support companies positioned on the entire cybersecurity value chain. The initiative aims to increase the visibility of the European cybersecurity market players and to foster the consolidation of the European cybersecurity market.

30/11/2020 to 01/12/2020