Home » Marketplace » Recover

Recover

FISHY Enforcement & Dynamic Configuration

Framework leveraging a capability model instead of the traditional refinement techniques based on logic rules

FISHY Intent-based Resilience Orchestration

Solution translating high level intents into configured policies, and interact with the system response using AI techniques

FISHY CYBER RESILIENT SUPPLY CHAIN SYSTEM

Easing FISHY platform usability, making the whole system user-friendly and ready to be used for different users according to their expected profile and thus permitted functionalities.

Cyber Security Program for Startups

Worldwide Startups can secure their business with Cyber Legion helps.

Every Startup Organization, regardless of its size, collects, stores, and uses important information, and can struggle to implement powerful cybersecurity practices because of limited resources such as time, money, and people.

Cyber Legion team believe that any Organizations should be help to build and maintain trust and lasting relationships with clients and beneficiaries.

Cybersecurity Awareness Solution for Local Public Administrations

CS-AWARE is a cybersecurity situational awareness software solution for Local Public Administrations. It was designed to detect, classify and visualize cybersecurity incidents in real time, supporting the prevention or mitigation of cyber-attacks. It addresses small, medium or big size Local Public Administrations and it can be taylored to any local software set-up, any European language and any type of LPA internal workflow and specifics.

The main features are:

1) Versatile connectivity: it is capable to connect to any type of internal or external data source

GuardYoo

GuardYoo is an easy-to-use, agentless, yet powerful solution, that enables organizations of all sizes to proactively discover malware and persistent threats (active or dormant), that have breached existing defenses including online and real-time protection measures.

H-PREDICTIVE PLATFORM

H-Predictive Platform (PAR) merges digital twins and adversary simulation to anticipate attacks and manage risk in an ICT infrastructure, thru a life long continuous process of assessment and remediation

H-Time Machine

H-Time Machine (Forensics module) supports the discovery of successful, undetected attack against a previous version of the infrastructure, and forensics investigation in case of data breach

H-AI Real Time module

H-AI Real Time module (CAP), using predictive cyber attacks database generated by H-PAR, continuously monitor the infrastructure to predict, attribute and stop attacks in Real Time. H.CAP dramatically reduces the false positive, detects 0-Day exploitation and finally neutralize it

MAIA: MOBILE APPS INTELLIGENCE FOR ANDROID

How it works?
HISPASEC has created a malware analysis services for Android. We currently have more than 50 million applications of which a third of them have been listed as Malware. Once detected, malware is analyzed and cataloged within our systems.

Pages

News

On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.