Home » Marketplace » Information Protection Processes and Procedures

Information Protection Processes and Procedures

H-AI Real Time module

H-AI Real Time module (CAP), using predictive cyber attacks database generated by H-PAR, continuously monitor the infrastructure to predict, attribute and stop attacks in Real Time. H.CAP dramatically reduces the false positive, detects 0-Day exploitation and finally neutralize it

MAIA: MOBILE APPS INTELLIGENCE FOR ANDROID

How it works?
HISPASEC has created a malware analysis services for Android. We currently have more than 50 million applications of which a third of them have been listed as Malware. Once detected, malware is analyzed and cataloged within our systems.

SANA: Analysis, Notification and Alerts Service

SANA: Service Analysis, Notification and Alerts.

Our security alert system, which allows you to be aware of any incidents related to your systems or integrated into your applications.

Privacy-Preserving Statistical Analysis

This FENTEC use case addresses the privacy-preserving computation of data analytics, focusing on the computation of statistics over large usage data.

Addressing the privacy-preserving computation of data analytics

The objective is to enable WALLIX clients to perform analytics with their clients’ data guaranteeing the privacy of it.

Privacy-preserving and auditable Digital Currency

This FENTEC use-case provides a digital-based currency as a one-to-one counterpart to physical money or issued by debit and credit cards. This would remove the privacy issues but still allowing some opportunities of taxability or auditability by governments or its taxes agencies.

mF2C Agent and microagent

mF2C provides a coordinated management of traditional cloud architectures and novel fog ones, offering unique capabilities for distributed execution of applications throughout IoT, fog and cloud environments across a variety of industry verticals. At the same time, it facilitates the efficient usage of resources within the stack built from the edge upt to the cloud, taking into consideration services' requirements (e.g. immediate data collection and processing, low latency) and user demands (e.g.

Cybersecure gateway and solutions for IoT services

Usable and transparent security suite oriented for smart home systems based on Internet of Things (IoT) use, including all the features and capabilities stated in the GHOST project, as follow:

MiCADO framework

Auto-scaling Framework for Docker container orchestrated by Kubernetes [Infrastructure as Code]​

The MiCADO framework automates deployment and orchestration of applications in the cloud. The framework is generic, pluggable, technology agnostic as well as open-source and supports various public and private cloud environments, like Open Nebula, Open Stack, Azure, AWS, Cloud Sigma and CloudBroker Platform. 

Papers and publications of SPECIAL

As a research and development project, SPECIAL offers open access to its publications, which includes scientific papers and presentations, studies and essays, and other dissemination material. All of these are available trough the site linked below.

Code Repository

SPECIAL is a H2020-funded project that aims at creating a scalable policy-aware linked data architecture for privacy, transparency and compliance.

We develop technology that:

Pages

News

Wojciech Wideł, Preetam Mukherjee, and Mathias Ekstedt from our partner KTH published in IEEE Access about their work in the SOCCRATES project.

Future Events

In context of the annual Internet Festival in Pisa, the CNR Institute of Informatics and Telematics and Registro.it are organising the workshop Cybersecurity Day 2022.

The event will take place on 7 October 2022 at the Auditorium Giuseppe Moruzzi 1 in Pisa and will be attended by industry experts, researchers, representatives of the business world.

08/10/2022

SOCCRATES provides a deep dive session on the SOCCRATES platform at the ONE Conference 2022. 
 

Within the H2020 EU project SOCCRATES a security decision support platform has been developed for Security Operation Centres (SOCs) and Computer Security Incident Response Teams (CSIRTs). This, so called ‘SOCCRATES Platform’ is targeted at organisation’s inhouse SOC and at Managed Security Service Providers (MSSP) that provide SOC services.

18/10/2022