Home » Cyberwatching.eu Marketplace - Cybersecurity & Privacy Services and Products

Cyberwatching.eu Marketplace - Cybersecurity & Privacy Services and Products

Easy to use:

Sharpen your search through the taxonomy filters on the right. 
Browse the providers and select one of our pre-set questions and send your enquiries straight to the provider.
Are you a user or a provider? You can register for free.

Subscribe now to our newsletter & follow cyberwatching.eu on Twitter and LinkedIn! For more information visit the About Project Page.

________________________________________________________________________________________________

 

PRODUCT PROVIDERS:

Ontologies and Vocabularies

As a EU H2020-funded project, SPECIAL aims at making its research and development work publicly accessible. Here, you will find our work publications related to ontologies and vocabularies developed within the project..

OpAudit™

OpAudit™ is a brand new kind of compliance tracking solution which gathers & manages all evidence of compliance in a single system to successfully track answers & evidence from contributors (Attestations), technical data from devices (Audit) and questionnaires from staff & supply chain (Assessments) for external and internal policies and audits.

OpIndex™

OpIndex™ is one of the most accurate and comprehensive Dark Web Intelligence solutions on the market with unique Spider software custom-built to circumvent anonymisation measures and circumnavigate routing relays in order to Search and/or Index content with Reporting and Alerting to disrupt threat actors who operate in the Dark Web.

OpView™

OpView™ is one of the most flexible security monitoring systems on the market which leverages a completely new database architecture to collect, correlate and report on all data types so you can successfully monitor security (SIEM), vulnerability, configuration & availability (SOC), performance, asset & flow (NOC) all in a single configurable system.

Papers and publications of SPECIAL

As a research and development project, SPECIAL offers open access to its publications, which includes scientific papers and presentations, studies and essays, and other dissemination material. All of these are available trough the site linked below.

PlusPrivacy

PlusPrivacy provides you with a unified dashboard for protecting yourself from a variety of threats to your privacy. It will enable you to control the privacy settings in your social network accounts, hide your email identity, block ads, trackers and malware and prevent unwanted apps and browser extensions from tracking you and collecting your private data.

There  are four main functions for your benefit:

PRISMACLOUD Toolbox

PRISMACLOUD Tools: A cryptographic toolbox for increasing security in cloud services. reusable toolbox encapsulating cryptographic functionality from which dependably secure cloud services can be assembled. In order to provide a tangible abstraction of the complexity involved with the construction
of cryptographically secured cloud services, we introduce the fourlayer PRISMACLOUD architecture. Top down, it consists of a use cases (application) layer, a services layer, a tools layer, and a

Privacy-preserving and auditable Digital Currency

This FENTEC use-case provides a digital-based currency as a one-to-one counterpart to physical money or issued by debit and credit cards. This would remove the privacy issues but still allowing some opportunities of taxability or auditability by governments or its taxes agencies.

Privacy-Preserving Statistical Analysis

This FENTEC use case addresses the privacy-preserving computation of data analytics, focusing on the computation of statistics over large usage data.

Addressing the privacy-preserving computation of data analytics

The objective is to enable WALLIX clients to perform analytics with their clients’ data guaranteeing the privacy of it.

QualityGate

QualityGate is software that continuously measures and monitors the quality of the source code of your systems as-well-as the performance of the development team. Source code is analyzed onsite, by our static analyzer tools, without ever getting out of your infrastructure. Only the final results of the analysis (metrics, list of coding issues and duplications, etc.) are uploaded to our servers for having them evaluated against our benchmarks by using sophisticated quality models. You can browse and further analyze the results at any time on our dashboards.

Pages

News

On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.