Home » Cyberwatching.eu Marketplace - Cybersecurity & Privacy Services and Products

Cyberwatching.eu Marketplace - Cybersecurity & Privacy Services and Products

Easy to use:

Sharpen your search through the taxonomy filters on the right. 
Browse the providers and select one of our pre-set questions and send your enquiries straight to the provider.
Are you a user or a provider? You can register for free.

Subscribe now to our newsletter & follow cyberwatching.eu on Twitter and LinkedIn! For more information visit the About Project Page.

________________________________________________________________________________________________

 

PRODUCT PROVIDERS:

CYBERWISER.eu Platform - ADVANCED Offering Level

In the ADVANCED offering level all the features in the INTERMEDIATE level are upgraded to their full potential to guarantee adequate training materials, the provision of cyber-rage training scenarios and exercises, simulation of cyber-attacks and defence mechanisms, monitoring and measurement of user performance for those users already tasked with the defence of high-risk organisations against cyber-attacks and incidents.

CYBERWISER.eu Platform - BASIC Offering Level

The BASIC offering level targets users that are familiar with cybersecurity and want or need to test and improve their skills at a higher level.

CYBERWISER.eu Platform - INTERMEDIATE Offering Level

The INTERMEDIATE offering level enables a much more personalised experience with a larger number of features. These include the number of elements that can be used for defining a cyber-range training scenario, the possibility to create new training scenarios, a suite of available automated attacks and a first version of vulnerability assessment tools.

CYBERWISER.eu Platform - PRIMER Offering Level

The PRIMER offering level is the starting point to CYBERWISER.eu platform, it is an offering level mainly addressed to Students or Early professionals that do not have any knowledge of the cybersecurity framework. The first Learning goal of the Primer level is to give a complete understanding of the basic concepts like most common Cybersecurity threats and best practice. Another learning goal is to understand the overall process of cyber-risk analysis and its relationship with cybersecurity.

Data Anonymization Tool

Data anonymization techniques open the possibility of releasing personal and sensitive data, while preserving individual's privacy. The data anonymization tool in this context is among others based on k-anonymity, whereby the focus is put on the irreversibility of the released data. The tool aims to calculate the best solution for the given data in terms of cost-efficiency. This is done by means of so-called cost metric calculation as well as the Optimal Lattice Anonymization (OLA) algorithm.

Data Encryption

This tool provides the means for processing data in different ways, supporting different purposes with different privacy requirements. It includes several components providing the capabilities to encrypt data while preserving the format or ordering of the data. This tool enables users of legacy applications to move their databases to a public cloud, while preserving data privacy and confidentiality. Moreover, the tool provides components for data generalization as means for anonymizing bulk data using k-anonymity techniques.

DRIP - Dynamic Real-Time Infrastructure Planner

Dynamic Real-time Infrastructure Planner (DRIP) is responsible for the planning, validation and provisioning of the virtual infrastructure enlisted to support an application specified in SIDE. DRIP has formulated an acceptable proposed infrastructure, which automatically negotiates with cloud providers in real-time to provision the infrastructure with respect to an agreed set of service level agreements (SLAs) that will satisfy (in principle) all quality of service requirements.

EnCloak CONNECT

EnCloak: Unique secure hardware to make high-grade file encryption easy...

Securely share files using custom designed hardware without the need for software or services.

enRichMyData Toolbox

enRichMyData delivers its capabilities as a set of interoperable tools and services that form the enRichMyData Toolbox:

Ethical Hacking Services

SKIT Cyber security (SKIT) has more than eighteen years of experience in IT security field, assisting a multitude of companies in different sectors. SKIT team has been involved in a broad range of projects dealing with penetration testing:

•Ethical Hacking/Penetration Testing ICT systems (infrastructure, network, application, mobile iOS and Android)

•Ethical Hacking/Penetration Testing Industrial systems (Scada/ICS)  •Ethical Hacking/Penetration Testing IoT systems

Pages

News

On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.