Home » Marketplace » Information Protection Processes and Procedures

Information Protection Processes and Procedures

Toolkit for Mir-BFT: High-throughput Consensus for Hyperledger Fabric

This toolkit introduces an efficient consensus algorithm to Hyperledger Fabric to accommodate high-throughput applications.

This toolkit was produced by IBM and is available here.

Toolkit for Post-Quantum Secure Protocols

This enables authentication and integrity protection based on hash functions which are believed to be resilient against quantum attacks. Hash function based time-stamping can also indemnify transactions authenticated with current technology against future quantum attacks.

This toolkit was produced by Guardtime and is partially available here.

Toolikit for Anonymous Authentication for Hyperledger Fabric

This toolkit allows users to anonymously authenticate their Hyperledger Fabric transactions while supporting revocation and audit functionalities.

This toolkit was produced by IBM Research and is available here.

Information Notice Tool

The Information Notice Tool is mainly focused only on Art. 13 and Art. 14 of the GDPR which enlist the elements that must be included in an Information Notice to data subjects.

The tool will help you with a very practical check-list for the components required in an Information Notice under the GDPR.

Cybersecurity Awareness Solution for Local Public Administrations

CS-AWARE is a cybersecurity situational awareness software solution for Local Public Administrations. It was designed to detect, classify and visualize cybersecurity incidents in real time, supporting the prevention or mitigation of cyber-attacks. It addresses small, medium or big size Local Public Administrations and it can be taylored to any local software set-up, any European language and any type of LPA internal workflow and specifics.

The main features are:

1) Versatile connectivity: it is capable to connect to any type of internal or external data source

IoTsTrust

In this wild IoT market, estimating cybersecurity risks, selecting the right standard to comply with and getting certified during the manufacturing process is an extremely complex task. Security Requirements, Security Controls and Security Assurance Activities must be considered by all the project stakeholders including business-lines and risk-owners.

GuardYoo

GuardYoo is an easy-to-use, agentless, yet powerful solution, that enables organizations of all sizes to proactively discover malware and persistent threats (active or dormant), that have breached existing defenses including online and real-time protection measures.

OpAudit™

OpAudit™ is a brand new kind of compliance tracking solution which gathers & manages all evidence of compliance in a single system to successfully track answers & evidence from contributors (Attestations), technical data from devices (Audit) and questionnaires from staff & supply chain (Assessments) for external and internal policies and audits.

OpView™

OpView™ is one of the most flexible security monitoring systems on the market which leverages a completely new database architecture to collect, correlate and report on all data types so you can successfully monitor security (SIEM), vulnerability, configuration & availability (SOC), performance, asset & flow (NOC) all in a single configurable system.

GDPR Temperature Tool

The GDPR Temperature Tool helps European SMEs understand just how at risk they are to sanctions or fines.

By answering a set of questions on data processing activities, the tool provides an indication, or temperature, of a company’s risk to sanctions. The higher the temperature, the higher the risk. In addition, a free a customised set of practical and actionable recommendations is provided.

Pages

News

On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.