Cyberwatching.eu Marketplace - Cybersecurity & Privacy Services and Products

Easy to use:

Sharpen your search through the taxonomy filters on the right. 
Browse the providers and select one of our pre-set questions and send your enquiries straight to the provider.
Are you a user or a provider? You can register for free.

Subscribe now to our newsletter & follow cyberwatching.eu on Twitter and LinkedIn! For more information visit the About Project Page.

________________________________________________________________________________________________

 

PRODUCT PROVIDERS:

MiCADO

COLA develops a generic set of services (called MiCADO - Microservices-based Cloud Application-level Dynamic Orchestrator ) that provide dynamic and automated resource scalability on clouds for all (or at least a very wide range of) applications. MiCADO services can be expressed with a set of well-defined (standardised) interfaces to be easily embedded into application control code without changing the original application logic. Moreover, MiCADO services can connect to multiple cloud middleware (e.g. EC2, CloudSigma etc.) or generic cloud access layer (e.g.

MIKELANGELO technology stack

MIKELANGELO consists of a set of technologies and approaches, all aiming to improve IO performance or to help with integration of MIKELANGELO components into larger systems.

MUSA TOOLS

The MUSA tools is a collection of tools developed to support the integration of security in all phases of multi-cloud applications life-cycle. These tools are applicable to different phases of the applications life-cycle right from applications design to development, deployment up till runtime. The MUSA tools are listed below.

nVision 10

Axence nVision is a software consolidating all the functions required for the management of the entire IT infrastructure. It is a feature-rich system which is the perfect choice for companies focusing on network security, risk reduction and software legality.
It is integrated solution of 5 modules:

Supplier: 

PlusPrivacy

PlusPrivacy provides you with a unified dashboard for protecting yourself from a variety of threats to your privacy. It will enable you to control the privacy settings in your social network accounts, hide your email identity, block ads, trackers and malware and prevent unwanted apps and browser extensions from tracking you and collecting your private data.

There  are four main functions for your benefit:

PRISMACLOUD Toolbox

PRISMACLOUD provides a box of five flexible tools, fully encapsulating strong cryptographic functionality, from which secure and privacy aware cloud services can be constructed.

Supplier: 

Redborder

Redborder is a cybersecurity solution based on Open Source, Big Data, and traffic analysis accompanied by a set of active probes managed in an integrated manner. This platform unifies in real time the different data sources provided by redborder Apps and Probes or by other manufacturers, enabling easy creation of customizable dashboards and reports to support deployments like Netwok Visibility, Critical Infrastructures Security, Wifi Security, or Security Operation Centers.

Supplier: 

SecureCloud

SecureCloud aims to remove technical impediments to dependable cloud computing. SecureCloud will ensure the confidentiality, integrity, availability and security of applications and their data.

Supplier: 

Security Advisory service

Security Advisory Services: Proactive Security (Corporate Protection, IT Security Check, Penetration Testing, Vulnerability Assessment and Risk Management), Process security (ISO/IEC 27001, PCI DSS, Security Governance), and Training sectors (International Training Partner for ISECOM OSSTMM methodology in Italy)

Simarks BestSafe

Simarks™ BestSafe™ is a tool focused on privilege management for any Microsoft Windows operating system version and edition running on any workstation, desktop, laptop or server running on any physical, portable or virtualized hardware.

The main goal of BestSafe™ is to allow administrators to assign any application/process the security context it has to be executed with, no matter which user credentials it was created with. However, BestSafe™ also offers complete support for traditional per user privilege management.

Supplier: 

Pages