Home » Marketplace » Maintenance

Maintenance

Toolikit for Anonymous Authentication for Hyperledger Fabric

This toolkit allows users to anonymously authenticate their Hyperledger Fabric transactions while supporting revocation and audit functionalities.

This toolkit was produced by IBM Research and is available here.

IoTsTrust

In this wild IoT market, estimating cybersecurity risks, selecting the right standard to comply with and getting certified during the manufacturing process is an extremely complex task. Security Requirements, Security Controls and Security Assurance Activities must be considered by all the project stakeholders including business-lines and risk-owners.

GuardYoo

GuardYoo is an easy-to-use, agentless, yet powerful solution, that enables organizations of all sizes to proactively discover malware and persistent threats (active or dormant), that have breached existing defenses including online and real-time protection measures.

QualityGate

QualityGate is software that continuously measures and monitors the quality of the source code of your systems as-well-as the performance of the development team. Source code is analyzed onsite, by our static analyzer tools, without ever getting out of your infrastructure. Only the final results of the analysis (metrics, list of coding issues and duplications, etc.) are uploaded to our servers for having them evaluated against our benchmarks by using sophisticated quality models. You can browse and further analyze the results at any time on our dashboards.

H-PREDICTIVE PLATFORM

H-Predictive Platform (PAR) merges digital twins and adversary simulation to anticipate attacks and manage risk in an ICT infrastructure, thru a life long continuous process of assessment and remediation

H-Time Machine

H-Time Machine (Forensics module) supports the discovery of successful, undetected attack against a previous version of the infrastructure, and forensics investigation in case of data breach

H-AI Real Time module

H-AI Real Time module (CAP), using predictive cyber attacks database generated by H-PAR, continuously monitor the infrastructure to predict, attribute and stop attacks in Real Time. H.CAP dramatically reduces the false positive, detects 0-Day exploitation and finally neutralize it

MAIA: MOBILE APPS INTELLIGENCE FOR ANDROID

How it works?
HISPASEC has created a malware analysis services for Android. We currently have more than 50 million applications of which a third of them have been listed as Malware. Once detected, malware is analyzed and cataloged within our systems.

SANA: Analysis, Notification and Alerts Service

SANA: Service Analysis, Notification and Alerts.

Our security alert system, which allows you to be aware of any incidents related to your systems or integrated into your applications.

Malware & PCAP Feed

LastInfoSec’s "Malware & PCAP Feed" is an access to a set of tests allowing evaluation of the effectiveness of the intrusion and threat detection solution. It contains malicious files and pcaps of current or past attacks, which can be used to simulate those attacks for the sole purpose of testing the intrusion-detection solutions. 

Pages

News

The Workshop will respond to important questions to address one of the most important challenges to improve Cybersecurity in the Organizations: “Threat Intelligence and Information Sharing”.

Future Events

ECSO is proud to announce that the call is now open for startups to attend the 10th Cyber Investor Days and compete for the European Cybersecurity STARtup Award. Selected startups will win the chance to pitch their innovative cybersecurity solutions and hold B2B meetings with leading investors and corporations from Europe and beyond at ECSO’s Cyber Investor Days, taking place on 1 and 2 December 2021 in Helsinki, Finland.

01/12/2021 to 02/12/2021