Home » Cyberwatching.eu Marketplace - Cybersecurity & Privacy Services and Products

Cyberwatching.eu Marketplace - Cybersecurity & Privacy Services and Products

Easy to use:

Sharpen your search through the taxonomy filters on the right. 
Browse the providers and select one of our pre-set questions and send your enquiries straight to the provider.
Are you a user or a provider? You can register for free.

Subscribe now to our newsletter & follow cyberwatching.eu on Twitter and LinkedIn! For more information visit the About Project Page.

________________________________________________________________________________________________

 

PRODUCT PROVIDERS:

Toolkit for Zero-knowledge Proofs for Ledgers

This toolkit, with the nickname SNARKY, is a Rust implementation of the Snarky Ceremonies protocol over the BLS12- 381 elliptic curve. It is the first experimental version of a production-grade library for running the protocol in real-life applications. 

This toolkit was produced by National Infrastructures for Research and Technology for Greece and The University of Edinburgh and is available here.

Training on LSSICE (in Spanish)

Specialized training to learn about the new Organic Law on Personal Data Protection and Digital Rights Guarantee (LOPDPGDD).
Throught this course you will learn, in a very simple and understandable language, all the requirements and new obligations established the new Organic Law 3/2018, of 5 December, of Personal Data Protection and guarantee of digital rights (LOPDPGDD).

Training on the GDPR (in Spanish)

Through this course you will learn, in a very simple and understandable language, all the requirements and new obligations established by the new General Regulation of Data Protection of Europe (GDPR), which replaces the LOPD.

You will be assigned a personal tutor, who will be a certified teacher of Data Protection Delegate with professional experience in the regulations.

 

Training to become a Data Protection Delegate (in Spanish)

This is the essential training to practice as a DPD.
The aim of this course is to train new professionals who will become Data Protection Delegates, either within the company itself or as a service provided to other entities. A sector in full growth.

This course is based on the Official Schema developed by the AEPD for the Certification of Data Protection Delegates.

You can choose between the 100h course or the extended 180h course which includes the final project of complete adaptation and simulation of the certification examination.

TREDISEC Security Primitives

"Piece of software that facilitates the Cloud Security technology providers to manage the entire lifecycle of the TREDISEC Primitives and Recipes. The framework also supports consumers of such technologies in locating and identifying them in a simple and effective manner, as well as in testing and deploying those in a specific cloud-based environment, in order to fulfil consumers’ own requirements. "

UNICORN CI Monitoring

A H2020 research and innovation project which facilitate the design and deployment of cloud applications and services and improve developers’ productivity by reducing cloud application design time via code annotations and blueprints for security.

UNICORN Integrated Platform

A H2020 research and innovation project which facilitate the design and deployment of cloud applications and services and improve developers’ productivity by reducing cloud application design time via code annotations and blueprints for security.

USBguard

The USBguard is a service designed to protect against threats related to USB storage devices. The service provides you with USBguard devices that have four main functions for interacting with USB storage devices: file listing, scanning (Antivirus and BadUSB), file copying and secure formatting.

USBguard devices automatically fetch antivirus updates and software updates when they are connected to the internet.

The USBguard service is based on a yearly license that includes:

VERIDAP

This tool supports the delegation of processing authenticated data in a way that the result can be efficiently verified for correctness. It comprises three different components, being a data originator component, a data processing component, and a verification component. The data originator component provides the input data (and potentially some additional metadata). The data processing component is given a set of input data and a description of the processing rules, and outputs the result of the computation, as well as a proof certifying the correctness of the delegated computation.

WITDOM Anonymization

Protection component that allows to anonymize data stored in a relational database. It selects automatically the anonymization algorithm that is more suitable for the data and the users' privacy requirements, and applies it seamlessly to the data, in order to protect privacy.

Pages

News

On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.