Home » Marketplace » Detect

Detect

IoTsTrust

In this wild IoT market, estimating cybersecurity risks, selecting the right standard to comply with and getting certified during the manufacturing process is an extremely complex task. Security Requirements, Security Controls and Security Assurance Activities must be considered by all the project stakeholders including business-lines and risk-owners.

SOFIE Energy Data Exchange Business Vertical

Description

This project SOFIE business vertical furthers the liberation of energy sector data, by providing currently missing building blocks for a future where the energy service providers and consumers have more control, freedom and flexibility over their data. This vertical establishes seamless access to the data with a few clicks done by the data owner  (the citizen), regardless of where the person lives or what existing energy networks are in place.

Benefits for targeted end-users:

GuardYoo

GuardYoo is an easy-to-use, agentless, yet powerful solution, that enables organizations of all sizes to proactively discover malware and persistent threats (active or dormant), that have breached existing defenses including online and real-time protection measures.

OpIndex™

OpIndex™ is one of the most accurate and comprehensive Dark Web Intelligence solutions on the market with unique Spider software custom-built to circumvent anonymisation measures and circumnavigate routing relays in order to Search and/or Index content with Reporting and Alerting to disrupt threat actors who operate in the Dark Web.

OpView™

OpView™ is one of the most flexible security monitoring systems on the market which leverages a completely new database architecture to collect, correlate and report on all data types so you can successfully monitor security (SIEM), vulnerability, configuration & availability (SOC), performance, asset & flow (NOC) all in a single configurable system.

H-PREDICTIVE PLATFORM

H-Predictive Platform (PAR) merges digital twins and adversary simulation to anticipate attacks and manage risk in an ICT infrastructure, thru a life long continuous process of assessment and remediation

H-Time Machine

H-Time Machine (Forensics module) supports the discovery of successful, undetected attack against a previous version of the infrastructure, and forensics investigation in case of data breach

H-AI Real Time module

H-AI Real Time module (CAP), using predictive cyber attacks database generated by H-PAR, continuously monitor the infrastructure to predict, attribute and stop attacks in Real Time. H.CAP dramatically reduces the false positive, detects 0-Day exploitation and finally neutralize it

MAIA: MOBILE APPS INTELLIGENCE FOR ANDROID

How it works?
HISPASEC has created a malware analysis services for Android. We currently have more than 50 million applications of which a third of them have been listed as Malware. Once detected, malware is analyzed and cataloged within our systems.

SANA: Analysis, Notification and Alerts Service

SANA: Service Analysis, Notification and Alerts.

Our security alert system, which allows you to be aware of any incidents related to your systems or integrated into your applications.

Pages

News

The pandemic has shown the importance of international supply chains and how dependent we are. Attacks in the virtual space may have an increasing impact on supplies in our analogue world.