Home » Marketplace » Identity Management & Access Control

Identity Management & Access Control

SecureCloud Platform

Ecosystem of cloud facilities characterized by superior security guarantees, providing protection from attacks by privileged users (e.g. the cloud provider or the system administrator) and software (e.g. the hypervisor). SecureCloud is flexible, since it can satisfy a wide range of customers-specific requirements including big data processing, secure intra-cloud communication, precise microservice scheduling and reliable data storage. SecureCloud is interoperable, in that its facilities can be seamlessly integrated with best of breed offerings from the Open Source community.

SWITCH Workbench

Workbench to support the development, deployment and runtime adaptation of time-critical applications within cloud environments. The SWITCH workbench is constructed from several different independent components, each of which is concerned with a different part of the application lifecycle and which has its own information requirements.

MUSA Framework

The MUSA framework is the main result of the MUSA project and integrates a number of solutions to seamlessly tackle security in the life-cycle of (multi-) cloud applications.

PRISMACLOUD Toolbox

PRISMACLOUD Tools: A cryptographic toolbox for increasing security in cloud services. reusable toolbox encapsulating cryptographic functionality from which dependably secure cloud services can be assembled. In order to provide a tangible abstraction of the complexity involved with the construction
of cryptographically secured cloud services, we introduce the fourlayer PRISMACLOUD architecture. Top down, it consists of a use cases (application) layer, a services layer, a tools layer, and a

CREDENTIAL Wallet Platform

All server-side and client-side components and apps needed for secure and privacy-friendly data sharing and identity management in the cloud. It is an open and flexible cloud identity wallet architecture to easily connect to other identity management systems.

Clym

Clym offers to you one platform for global privacy needs to make your website fully compliant for the CCPA and GDPR regulation. It helps to manage cookies, policies, procedures, terms & data subjects' requests while automatically building evidence through consent receipts.

Redborder

Redborder is a cybersecurity solution based on Open Source, Big Data, and traffic analysis accompanied by a set of active probes managed in an integrated manner. This platform unifies in real time the different data sources provided by redborder Apps and Probes or by other manufacturers, enabling easy creation of customizable dashboards and reports to support deployments like Netwok Visibility, Critical Infrastructures Security, Wifi Security, or Security Operation Centers.

Simarks Deployment Manager

Based on a patented technology of privilege management at process level, Simarks SDM allows to build an application corporate catalog where the end user is who installs the applications without granting him administrator permissions. This approach allows
complete implementation of the principle of least privilege without affecting the productivity.

Simarks BestSafe

Simarks™ BestSafe™ is a tool focused on privilege management for any Microsoft Windows operating system version and edition running on any workstation, desktop, laptop or server running on any physical, portable or virtualized hardware.

The main goal of BestSafe™ is to allow administrators to assign any application/process the security context it has to be executed with, no matter which user credentials it was created with. However, BestSafe™ also offers complete support for traditional per user privilege management.

Data Anonymization Tool

Data anonymization techniques open the possibility of releasing personal and sensitive data, while preserving individual's privacy. The data anonymization tool in this context is among others based on k-anonymity, whereby the focus is put on the irreversibility of the released data. The tool aims to calculate the best solution for the given data in terms of cost-efficiency. This is done by means of so-called cost metric calculation as well as the Optimal Lattice Anonymization (OLA) algorithm.

Pages

News

On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.