Home » Marketplace » Protect

Protect

Simarks BestSafe

Simarks™ BestSafe™ is a tool focused on privilege management for any Microsoft Windows operating system version and edition running on any workstation, desktop, laptop or server running on any physical, portable or virtualized hardware.

The main goal of BestSafe™ is to allow administrators to assign any application/process the security context it has to be executed with, no matter which user credentials it was created with. However, BestSafe™ also offers complete support for traditional per user privilege management.

Mercury

Mercury is an all-in-one solution that defines zones and conduits, encrypts communications and provides active security and advanced threat resistance with a seamless deployment.

By encrypting communications, Mercury virtually isolates the load side from the rest of the world. Thanks to its key-management system grants secure access and enables policy access-rights.

Mercury is a unified security solution: it provides all the elements required in active security in a single product that does not require downtimes during the deployment process.

nVision 10

Axence nVision is a software consolidating all the functions required for the management of the entire IT infrastructure. It is a feature-rich system which is the perfect choice for companies focusing on network security, risk reduction and software legality.
It is integrated solution of 5 modules:

Ethical Hacking Services

SKIT Cyber security (SKIT) has more than eighteen years of experience in IT security field, assisting a multitude of companies in different sectors. SKIT team has been involved in a broad range of projects dealing with penetration testing:

•Ethical Hacking/Penetration Testing ICT systems (infrastructure, network, application, mobile iOS and Android)

•Ethical Hacking/Penetration Testing Industrial systems (Scada/ICS)  •Ethical Hacking/Penetration Testing IoT systems

Security Advisory service

The Security Adivisory Team of @Mediaservice.net provides two different categories of services:

  • Analysis & Testing: it assesses the level of safety of a defined area, both from a technological and organizational point of view.
  • Compliance & Governance: improves safety management, and ensures compliance with laws and market standards

@Mediaservice.net also provides the well-known ISECOM certification courses, plus professional training courses focused on three different IT/ICT security issues:

Consulting services

BL4CKSWAN SRL offers four kinds of services:

Libsafecrypto

SAFEcrypto provides a new generation of practical, robust, and physically secure post-quantum cryptographic functions. Work Package 6 developed a suite of software routines to implement the lattice-based constructions identified in Work Package 4 of the SAFEcrypto project, whilst providing cryptographic primitives for use in the demonstrations developed in Work Package 9.

MiCADO

COLA develops a generic set of services (called MiCADO - Microservices-based Cloud Application-level Dynamic Orchestrator ) that provide dynamic and automated resource scalability on clouds for all (or at least a very wide range of) applications. MiCADO services can be expressed with a set of well-defined (standardised) interfaces to be easily embedded into application control code without changing the original application logic.

Data Anonymization Tool

Data anonymization techniques open the possibility of releasing personal and sensitive data, while preserving individual's privacy. The data anonymization tool in this context is among others based on k-anonymity, whereby the focus is put on the irreversibility of the released data. The tool aims to calculate the best solution for the given data in terms of cost-efficiency. This is done by means of so-called cost metric calculation as well as the Optimal Lattice Anonymization (OLA) algorithm.

MUSA TOOLS

The MUSA tools is a collection of tools developed to support the integration of security in all phases of multi-cloud applications life-cycle. These tools are applicable to different phases of the applications life-cycle right from applications design to development, deployment up till runtime. The MUSA tools are listed below.

Pages

News

On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.