Protect

Home » Marketplace » Protect

Information Notice Tool

The Information Notice Tool is mainly focused only on Art. 13 and Art. 14 of the GDPR which enlist the elements that must be included in an Information Notice to data subjects.

The tool will help you with a very practical check-list for the components required in an Information Notice under the GDPR.

Cybersecurity Awareness Solution for Local Public Administrations

CS-AWARE is a cybersecurity situational awareness software solution for Local Public Administrations. It was designed to detect, classify and visualize cybersecurity incidents in real time, supporting the prevention or mitigation of cyber-attacks. It addresses small, medium or big size Local Public Administrations and it can be taylored to any local software set-up, any European language and any type of LPA internal workflow and specifics.

The main features are:

1) Versatile connectivity: it is capable to connect to any type of internal or external data source

IoTsTrust

In this wild IoT market, estimating cybersecurity risks, selecting the right standard to comply with and getting certified during the manufacturing process is an extremely complex task. Security Requirements, Security Controls and Security Assurance Activities must be considered by all the project stakeholders including business-lines and risk-owners.

SOFIE Privacy and Data Sovereignty Component

Description

The SOFIE Privacy and Data Sovereignty component provides an OAuth2.0 authorization server that accepts verifiable credentials, and decentralized identifiers as authorization grants, and outputs JSON web tokens.

  • Keywords: Authorization Server, JSON web tokens, OAuth 2.0
  • License Type: Free or open source
  • Technology Readiness: Laboratory testing of prototype component or process

Learn more about project SOFIE. 

SOFIE Identity, Authentication and Authorisation (IAA) Component

Description

The goal of the SOFIE Identity, Authentication and Authorisation (IAA) component is to provide mechanisms that can be used for identifying communicating endpoints, as well as for authenticating and authorising users wishing to access a protected resource.

  • Keywords: Verifiable Credentials, Decentralized Identifiers
  • License Type: Free or open source
  • Technology Readiness: Laboratory testing of prototype component or process

Learn more about project SOFIE.

SOFIE Provisioning and Discovery Component

Description

The goal of the provisioning and discovery component is to enable the discovery of new IoT resources and their related metadata. Using this functionality, it is possible to decentralise the process of making new resources available to systems utilising the SOFIE framework and to automate the negotiations for the terms of use and the compensation for the use of these resources.

SOFIE Interledger Component

Description

The purpose of the SOFIE Interledger component is to enable transactions between actors and devices belonging to different (isolated) IoT silos. Each silo either utilises or is connected to one or more ledgers, and the Interledger component then enables interactions between the ledgers. Once triggered by a specific event, the Interledger passes a customisable payload from the initiating ledger to the receiving ledger.

GuardYoo

GuardYoo is an easy-to-use, agentless, yet powerful solution, that enables organizations of all sizes to proactively discover malware and persistent threats (active or dormant), that have breached existing defenses including online and real-time protection measures.

OpIndex™

OpIndex™ is one of the most accurate and comprehensive Dark Web Intelligence solutions on the market with unique Spider software custom-built to circumvent anonymisation measures and circumnavigate routing relays in order to Search and/or Index content with Reporting and Alerting to disrupt threat actors who operate in the Dark Web.

OpAudit™

OpAudit™ is a brand new kind of compliance tracking solution which gathers & manages all evidence of compliance in a single system to successfully track answers & evidence from contributors (Attestations), technical data from devices (Audit) and questionnaires from staff & supply chain (Assessments) for external and internal policies and audits.

Pages

Future Events

The third Annual Fraud & Financial Crime Europe will focus on analysing the risks to determine the solutions in combating Fraud and Financial Crime.

01/09/2020 to 02/09/2020

Information security and privacy have already been established as some of the most crucial aspects of technology especially in a world that is migrating to digital applications by the day. This has inevitably led to the emergence of technologies that support the safety and dependability of the ever-increasing sensitive data handled by these applications. Additionally, besides these technologies which target security by their design, there are other technologies, such as machine learning, which could potentially be applied to security in innovative schemes. 

17/09/2020 to 18/09/2020