Cyberwatching.eu Marketplace - Cybersecurity & Privacy Services and Products

Innovation and trust is at the heart of how Europe is addressing the new and fast-moving creating a trusted Digital Single Market.

Browse some of the newest pre- and commercial services emerging on the market today. Use the filters on the right to get the best results.

Filter the services and products using the JRC Cybersecurity taxonomy, the NIST Cybersecurity framework categories, or both.

Clym

One platform for global privacy needs. Manage cookies, policies, procedures, terms & data subjects' requests while automatically building evidence through consent receipts.

Supplier: 

CodeMeter

Wibu-Systems flagship CodeMeter technology encrypts software, firmware, and sensitive data with top-notch cryptographic algorithms and methods; the associated licenses are bound to secure elements including industry-grade mobile hardware containers (USB dongles, secure memory cards, ASICs, TPMs), soft containers that store digital fingerprints of the endpoint device, or cloud containers.

Supplier: 

Data Anonymization Tool

Data anonymization techniques open the possibility of releasing personal and sensitive data, while preserving individual's privacy. The data anonymization tool in this context is among others based on k-anonymity, whereby the focus is put on the irreversibility of the released data. The tool aims to calculate the best solution for the given data in terms of cost-efficiency. This is done by means of so-called cost metric calculation as well as the Optimal Lattice Anonymization (OLA) algorithm.

Ethical Hacking Services

SKIT Cyber security (SKIT) has more than eighteen years of experience in IT security field, assisting a multitude of companies in different sectors. SKIT team has been involved in a broad range of projects dealing with penetration testing:

•Ethical Hacking/Penetration Testing ICT systems (infrastructure, network, application, mobile iOS and Android)

•Ethical Hacking/Penetration Testing Industrial systems (Scada/ICS)  •Ethical Hacking/Penetration Testing IoT systems

nVision 10

Axence nVision is a software consolidating all the functions required for the management of the entire IT infrastructure. It is a feature-rich system which is the perfect choice for companies focusing on network security, risk reduction and software legality.
It is integrated solution of 5 modules:

Supplier: 

PRISMACLOUD Toolbox

PRISMACLOUD provides a box of five flexible tools, fully encapsulating strong cryptographic functionality, from which secure and privacy aware cloud services can be constructed.

Supplier: 

Redborder

Redborder is a cybersecurity solution based on Open Source, Big Data, and traffic analysis accompanied by a set of active probes managed in an integrated manner. This platform unifies in real time the different data sources provided by redborder Apps and Probes or by other manufacturers, enabling easy creation of customizable dashboards and reports to support deployments like Netwok Visibility, Critical Infrastructures Security, Wifi Security, or Security Operation Centers.

Supplier: 

Security Advisory service

Security Advisory Services: Proactive Security (Corporate Protection, IT Security Check, Penetration Testing, Vulnerability Assessment and Risk Management), Process security (ISO/IEC 27001, PCI DSS, Security Governance), and Training sectors (International Training Partner for ISECOM OSSTMM methodology in Italy)

Simarks BestSafe

Simarks™ BestSafe™ is a tool focused on privilege management for any Microsoft Windows operating system version and edition running on any workstation, desktop, laptop or server running on any physical, portable or virtualized hardware.

The main goal of BestSafe™ is to allow administrators to assign any application/process the security context it has to be executed with, no matter which user credentials it was created with. However, BestSafe™ also offers complete support for traditional per user privilege management.

Supplier: 

Simarks Deployment Manager

Based on a patented technology of privilege management at process level, Simarks SDM allows to build an application corporate catalog where the end user is who installs the applications without granting him administrator permissions. This approach allows
complete implementation of the principle of least privilege without affecting the productivity.

Supplier: 

Pages