Home » Cyberwatching.eu Marketplace - Cybersecurity & Privacy Services and Products

Cyberwatching.eu Marketplace - Cybersecurity & Privacy Services and Products

Easy to use:

Sharpen your search through the taxonomy filters on the right. 
Browse the providers and select one of our pre-set questions and send your enquiries straight to the provider.
Are you a user or a provider? You can register for free.

Subscribe now to our newsletter & follow cyberwatching.eu on Twitter and LinkedIn! For more information visit the About Project Page.

________________________________________________________________________________________________

 

PRODUCT PROVIDERS:

PIDMaaS

PRISMACLOUD Tools: A cryptographic toolbox for increasing security in cloud services. reusable toolbox encapsulating cryptographic functionality from which dependably secure cloud services can be assembled. In order to provide a tangible abstraction of the complexity involved with the construction of cryptographically secured cloud services, we introduce the fourlayer PRISMACLOUD architecture. Top down, it consists of a use cases (application) layer, a services layer, a tools layer, and a cryptographic primitives and protocols layer.

SECOSTOR

"PRISMACLOUD Tools: A cryptographic toolbox for increasing security in cloud services. reusable toolbox encapsulating cryptographic functionality from which dependably secure cloud services can be assembled. In order to provide a tangible abstraction of the complexity involved with the construction of cryptographically secured cloud services, we introduce the fourlayer PRISMACLOUD architecture. Top down, it consists of a use cases (application) layer, a services layer, a tools layer, and a cryptographic primitives and protocols layer.

TOPOCERT

The topology certification tool supports the application of graph signatures to certify and prove properties of topologies. The tool is realized as an interactive protocol framework between the roles of an issuer, a prover and a verifier. The tool assumes that the topology is provided by another entity in a standard graph format. The issuer is responsible for the certification of the encoding for the topology certification framework, as well as for issuing a topology certificate to the prover.

WITDOM Integrity and Consistency Verification

WITDOM’s Integrity and Consistency Verification component protects the integrity and consistency of data outsourced to an untrusted remote storage.

Actions for EU-US Cyber Dialogue

The “Actions for EU-US Cyber Dialogue” is part of the project’s contribution to transatlantic cybersecurity discussions. It outlines potential topics for EU-US collaboration in the health, maritime and finance sectors as well as the challenges faced in these areas. The document also provides actions to enhance EU-US cooperation in these sectors in the short-term and provides an overview of the key cybersecurity policy areas — standards and certification, data protection and privacy and public-private partnerships — that impact bilateral cybersecurity dialogues.

Advanced Persistent Threat Feed

The Fitsec Advanced Persistent Threat feed is a collection of data used to identify malware fingerprints and attacks targeted towards an organization. It is designed to be easily integrated into your existing systems and to improve your malware detection capabilities. With our APT-feed, your organization is equipped to possibly stop an advanced attack altogether, or at least minimize the damages to your operation.

ARCHISTAR

Archistar Storage Framework and Services (Archistar) is a new type of privacy preserving identity management service (IDMaaS) which is a service that is based on the PRISMACLOUD FLEXAUT cryptographic tool.

ASAP - Autonomous System Adaptation Platform

Autonomous System Adaptation Platform (ASAP) is a service responsible for monitoring and, where necessary, interceding in the execution of applications deployed by DRIP. ASAP will collect a range of measurements based on a set of metrics determined by the requirements of the developer and the intrinsic monitorability of application and underlying infrastructure.

Asset Tracker

The Asset tracker service enables you to track your organizations sensitive data and find out if your data has leaked to the internet. Tracking this information enables quick response and helps minimize damages. When we know what has leaked, we can help isolate and fix weaknesses in your security. The service also helps organizations to fulfill the requirement of notifying affected parties in the event of a data breach, as outlined in the GDPR.

CANVAS book

The book The Ethics of Cybersecurity discusses the full plethora of ethical aspects of cybersecurity and has a strong practical focus, including case studies that outline ethical dilemmas in cybersecurity and guidelines and other measures to tackle those dilemmas. The book is published open access and is freely available for everybody.

Pages

News

On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.