Cyberwatching.eu Marketplace - Cybersecurity & Privacy Services and Products

Easy to use:

Sharpen your search through the taxonomy filters on the right. 
Browse the providers and select one of our pre-set questions and send your enquiries straight to the provider.
Are you a user or a provider? You can register for free.

Subscribe now to our newsletter & follow cyberwatching.eu on Twitter and LinkedIn! For more information visit the About Project Page.

________________________________________________________________________________________________

 

PRODUCT PROVIDERS:

CyberWiser Light

CyberWISER Light is a free, new online self-assessment service that helps organisations to build resilience against growing cyber risks, within and outside the company.
CyberWISER Light significantly lowers the entry barrier to effective risk management especially for the many small firms that don’t have time, money or IT savvy staff.
It is composed of two parts, an online questionnaire and an online vulnerability test, and it can be performed in less than 30'.

CyberWiser Plus

CyberWISER Plus is the most complex and advanced mode of operation designed for the WISER Platform.

Data Anonymization Tool

Data anonymization techniques open the possibility of releasing personal and sensitive data, while preserving individual's privacy. The data anonymization tool in this context is among others based on k-anonymity, whereby the focus is put on the irreversibility of the released data. The tool aims to calculate the best solution for the given data in terms of cost-efficiency. This is done by means of so-called cost metric calculation as well as the Optimal Lattice Anonymization (OLA) algorithm.

Data Valuation Portal

The Data Valuation Portal informs users on how advertisers target users, the kinds of personal information available on the ad-market, and the financial value of it. For this purpose, the back-end crawlers collect bidding data from four major advertising platforms using a combination of targeting options provided by the platforms. Interested user can select one of the advertising platforms and choose a combination of demographic and behavioral data that describe a given online user, then the portal displays the monetary value of that profile and its evolution over time.

Ethical Hacking Services

SKIT Cyber security (SKIT) has more than eighteen years of experience in IT security field, assisting a multitude of companies in different sectors. SKIT team has been involved in a broad range of projects dealing with penetration testing:

•Ethical Hacking/Penetration Testing ICT systems (infrastructure, network, application, mobile iOS and Android)

•Ethical Hacking/Penetration Testing Industrial systems (Scada/ICS)  •Ethical Hacking/Penetration Testing IoT systems

eyeWnder

eyeWnder is an experimental browser addon for detecting Online Behavioural Advertising and shedding light to some of its underlying workings. The software relies on the participation of users like you to achieve its goal which is to increase transparency in online advertising.

eyeWnder is following a crowdsourced approach:

FDVT

The goal of this tool is to inform in real-time Internet end users regarding the economic value that the personal information associated to their browsing activity has generated. Due to the complexity of the problem we narrow down the scope of this tool to Facebook™ in this project, i.e., inform Facebook™ users in real time of the value that they are generating to Facebook™. We refer to this tool as Data Valuation Tool for Facebook™ Users (FDVT).

Information security and cybersecurity consulting services, including compliance, training and certification

Specialized security consulting on ISO/IEC 27001, PCI DSS and data protection schemes, relevant cybersecurity frameworks, risk management methodologies and techniques, all parties audit activities and vulnerability assessments. Training services on all the aforementioned topics and dedicated software products.

Supplier: 

Libsafecrypto

SAFEcrypto will provide a new generation of practical, robust, and physically secure post-quantum cryptographic functions. Work Package 6 will develop a suite of software routines to implement the lattice-based constructions identified in Work Package 4 of the SAFEcrypto project, whilst providing cryptographic primitives for use in the demonstrations developed in Work Package 9.

Supplier: 

Mercury

Mercury is an all-in-one solution that defines zones and conduits, encrypts communications and provides active security and advanced threat resistance with a seamless deployment.

By encrypting communications, Mercury virtually isolates the load side from the rest of the world. Thanks to its key-management system grants secure access and enables policy access-rights.

Mercury is a unified security solution: it provides all the elements required in active security in a single product that does not require downtimes during the deployment process.

Supplier: 

Pages