Home » Marketplace » Information Protection Processes and Procedures

Information Protection Processes and Procedures

H-PREDICTIVE PLATFORM

H-Predictive Platform (PAR) merges digital twins and adversary simulation to anticipate attacks and manage risk in an ICT infrastructure, thru a life long continuous process of assessment and remediation

H-Time Machine

H-Time Machine (Forensics module) supports the discovery of successful, undetected attack against a previous version of the infrastructure, and forensics investigation in case of data breach

H-AI Real Time module

H-AI Real Time module (CAP), using predictive cyber attacks database generated by H-PAR, continuously monitor the infrastructure to predict, attribute and stop attacks in Real Time. H.CAP dramatically reduces the false positive, detects 0-Day exploitation and finally neutralize it

MAIA: MOBILE APPS INTELLIGENCE FOR ANDROID

How it works?
HISPASEC has created a malware analysis services for Android. We currently have more than 50 million applications of which a third of them have been listed as Malware. Once detected, malware is analyzed and cataloged within our systems.

SANA: Analysis, Notification and Alerts Service

SANA: Service Analysis, Notification and Alerts.

Our security alert system, which allows you to be aware of any incidents related to your systems or integrated into your applications.

Privacy-Preserving Statistical Analysis

This FENTEC use case addresses the privacy-preserving computation of data analytics, focusing on the computation of statistics over large usage data.

Addressing the privacy-preserving computation of data analytics

The objective is to enable WALLIX clients to perform analytics with their clients’ data guaranteeing the privacy of it.

Privacy-preserving and auditable Digital Currency

This FENTEC use-case provides a digital-based currency as a one-to-one counterpart to physical money or issued by debit and credit cards. This would remove the privacy issues but still allowing some opportunities of taxability or auditability by governments or its taxes agencies.

mF2C Agent and microagent

mF2C provides a coordinated management of traditional cloud architectures and novel fog ones, offering unique capabilities for distributed execution of applications throughout IoT, fog and cloud environments across a variety of industry verticals. At the same time, it facilitates the efficient usage of resources within the stack built from the edge upt to the cloud, taking into consideration services' requirements (e.g. immediate data collection and processing, low latency) and user demands (e.g.

Cybersecure gateway and solutions for IoT services

Usable and transparent security suite oriented for smart home systems based on Internet of Things (IoT) use, including all the features and capabilities stated in the GHOST project, as follow:

MiCADO framework

Auto-scaling Framework for Docker container orchestrated by Kubernetes [Infrastructure as Code]​

The MiCADO framework automates deployment and orchestration of applications in the cloud. The framework is generic, pluggable, technology agnostic as well as open-source and supports various public and private cloud environments, like Open Nebula, Open Stack, Azure, AWS, Cloud Sigma and CloudBroker Platform. 

Pages

News

On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.