Information Protection Processes and Procedures

Home » Marketplace » Information Protection Processes and Procedures

OpAudit™

OpAudit™ is a brand new kind of compliance tracking solution which gathers & manages all evidence of compliance in a single system to successfully track answers & evidence from contributors (Attestations), technical data from devices (Audit) and questionnaires from staff & supply chain (Assessments) for external and internal policies and audits.

OpView™

OpView™ is one of the most flexible security monitoring systems on the market which leverages a completely new database architecture to collect, correlate and report on all data types so you can successfully monitor security (SIEM), vulnerability, configuration & availability (SOC), performance, asset & flow (NOC) all in a single configurable system.

H-PREDICTIVE PLATFORM

H-Predictive Platform (PAR) merges digital twins and adversary simulation to anticipate attacks and manage risk in an ICT infrastructure, thru a life long continuous process of assessment and remediation

H-Time Machine

H-Time Machine (Forensics module) supports the discovery of successful, undetected attack against a previous version of the infrastructure, and forensics investigation in case of data breach

H-AI Real Time module

H-AI Real Time module (CAP), using predictive cyber attacks database generated by H-PAR, continuously monitor the infrastructure to predict, attribute and stop attacks in Real Time. H.CAP dramatically reduces the false positive, detects 0-Day exploitation and finally neutralize it

MAIA: MOBILE APPS INTELLIGENCE FOR ANDROID

How it works?
HISPASEC has created a malware analysis services for Android. We currently have more than 50 million applications of which a third of them have been listed as Malware. Once detected, malware is analyzed and cataloged within our systems.

SANA: Analysis, Notification and Alerts Service

SANA: Service Analysis, Notification and Alerts.

Our security alert system, which allows you to be aware of any incidents related to your systems or integrated into your applications.

Privacy-Preserving Statistical Analysis

This FENTEC use case addresses the privacy-preserving computation of data analytics, focusing on the computation of statistics over large usage data.

Addressing the privacy-preserving computation of data analytics

The objective is to enable WALLIX clients to perform analytics with their clients’ data guaranteeing the privacy of it.

Privacy-preserving and auditable Digital Currency

This FENTEC use-case provides a digital-based currency as a one-to-one counterpart to physical money or issued by debit and credit cards. This would remove the privacy issues but still allowing some opportunities of taxability or auditability by governments or its taxes agencies.

Pages

News

The COVID-19 pandemic has forced many SMEs to implement a quick transition to a more digitalised workflow. Cyberwatching.eu provides a number of resources which SMEs could benefit from, particularly in the current situation where cybersecurity skills are more needed than ever.

Future Events

OpenExpo Europe is the largest Congress and Professional Fair on IT Innovation in Europe. It will offer an entire day of conferences, business cases, keynote speakers, practical workshops, round tables, demos and many other activities.

04/06/2020

Infosecurity Europe is the sourcing and knowledge hub for Europe’s information and cyber security community. Featuring an interactive exhibition floor with over 400 cutting-edge suppliers, a far-reaching conference programme and a host of networking opportunities, it brings information and cyber security to life. The event aims at bringing business, tech and cyber communities together to discuss and discover how best to protect companies and individuals.

02/06/2020 to 04/06/2020