Home » Cyberwatching.eu Marketplace - Cybersecurity & Privacy Services and Products

Cyberwatching.eu Marketplace - Cybersecurity & Privacy Services and Products

Easy to use:

Sharpen your search through the taxonomy filters on the right. 
Browse the providers and select one of our pre-set questions and send your enquiries straight to the provider.
Are you a user or a provider? You can register for free.

Subscribe now to our newsletter & follow cyberwatching.eu on Twitter and LinkedIn! For more information visit the About Project Page.

________________________________________________________________________________________________

 

PRODUCT PROVIDERS:

FDVT

The goal of this tool is to inform in real-time Internet end users regarding the economic value that the personal information associated to their browsing activity has generated. Due to the complexity of the problem we narrow down the scope of this tool to Facebook™ in this project, i.e., inform Facebook™ users in real time of the value that they are generating to Facebook™. We refer to this tool as Data Valuation Tool for Facebook™ Users (FDVT).

FISHY CYBER RESILIENT SUPPLY CHAIN SYSTEM

Easing FISHY platform usability, making the whole system user-friendly and ready to be used for different users according to their expected profile and thus permitted functionalities.

FISHY Enforcement & Dynamic Configuration

Framework leveraging a capability model instead of the traditional refinement techniques based on logic rules

FISHY Intent-based Resilience Orchestration

Solution translating high level intents into configured policies, and interact with the system response using AI techniques

FISHY Secure Infrastructure Abstraction

 

Abstract interface allowing the orchestration and connectivity of virtualized functions for monitoring and mitigation actions on different types of underlying infrastructure (IoT, IaaS, baremetal, etc) 

FISHY Trust & Incident Manager

When addressing the resilience of supply chains in their complexity, a platform that provides vulnerability forecast, risk estimation and mitigation must consider the heterogeneous nature of supply chain infrastructures as an important driver of architectural design and exposing it with an architecture designed for supply chains, instead of single network.

GuardYoo

GuardYoo is an easy-to-use, agentless, yet powerful solution, that enables organizations of all sizes to proactively discover malware and persistent threats (active or dormant), that have breached existing defenses including online and real-time protection measures.

H-AI Real Time module

H-AI Real Time module (CAP), using predictive cyber attacks database generated by H-PAR, continuously monitor the infrastructure to predict, attribute and stop attacks in Real Time. H.CAP dramatically reduces the false positive, detects 0-Day exploitation and finally neutralize it

H-PREDICTIVE PLATFORM

H-Predictive Platform (PAR) merges digital twins and adversary simulation to anticipate attacks and manage risk in an ICT infrastructure, thru a life long continuous process of assessment and remediation

H-Time Machine

H-Time Machine (Forensics module) supports the discovery of successful, undetected attack against a previous version of the infrastructure, and forensics investigation in case of data breach

Pages

News

On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.