Home » Marketplace » Information Protection Processes and Procedures

Information Protection Processes and Procedures

CodeMeter Cloud Lite

CodeMeter Cloud Lite offers a simple, but powerful means for licensing via a cloud server. It was designed with SaaS, server, and mobile applications in mind. CodeMeter Cloud Lite is fully compatible with CodeMeter License Central and includes a dedicated set of the established CodeMeter capabilities.

CodeMeter MicroEmbedded

CodeMeter µEmbedded is the CodeMeter variant especially made for field programmable gate arrays (FPGAs) and microcontrollers. With CodeMeter µEmbedded, software developers can protect application code and intellectual property against reverse engineering also on FPGAs and microcontrollers, as well as implement a license control system.

CodeMeter Runtime

CodeMeter Runtime is an out-of-the-box package that you deliver along with your software. It contains all the components that you need to create CodeMeter-based licenses. CodeMeter Runtime is available as a stand-alone installer and a merge module.

CodeMeter Runtime includes:

CodeMeter Embedded

CodeMeter Embedded is a static library that provides licensing and cryptographic capabilities for embedded operating systems.

Actions for EU-US Cyber Dialogue

The “Actions for EU-US Cyber Dialogue” is part of the project’s contribution to transatlantic cybersecurity discussions. It outlines potential topics for EU-US collaboration in the health, maritime and finance sectors as well as the challenges faced in these areas. The document also provides actions to enhance EU-US cooperation in these sectors in the short-term and provides an overview of the key cybersecurity policy areas — standards and certification, data protection and privacy and public-private partnerships — that impact bilateral cybersecurity dialogues.

WITDOM Protection Orchestrator

The Protection Orchestrator (PO) coordinates several protection components and services in order to effectively protect data before they leave a trusted environment for processing or storing reasons. The PO is in charge of parsing the protection configuration of an application and applying it. This is done by building requests to Protection Components deployed in the trusted domain and calling them for protecting the input data that a service in the untrusted domain will need, or for unprotecting the results after a service in the untrusted domain has processed them.

WITDOM Identity Access Management

The WITDOM Identity and Access Management (IAM) component ensures that sensitive data in WITDOM is only accessible to individuals who are granted explicit entitlements to specific services, and has the ability to monitor / audit access to data and operations.

CREDENTIAL Cryptographic Components

All server-side and client-side components and apps needed for secure and privacy-friendly data sharing and identity management in the cloud. It is an open and flexible cloud identity wallet architecture to easily connect to other identity management systems

TREDISEC Security Primitives

"Piece of software that facilitates the Cloud Security technology providers to manage the entire lifecycle of the TREDISEC Primitives and Recipes. The framework also supports consumers of such technologies in locating and identifying them in a simple and effective manner, as well as in testing and deploying those in a specific cloud-based environment, in order to fulfil consumers’ own requirements. "

UNICORN CI Monitoring

A H2020 research and innovation project which facilitate the design and deployment of cloud applications and services and improve developers’ productivity by reducing cloud application design time via code annotations and blueprints for security.

Pages

News

The pandemic has shown the importance of international supply chains and how dependent we are. Attacks in the virtual space may have an increasing impact on supplies in our analogue world.