Home » Marketplace » Mitigation

Mitigation

Sentry

The Sentry is a service that is designed to detect targeted attacks. When a targeted attack successfully breaches an organization, it is extremely important to be able to detect it is quickly as possible and thus prevent greater damage. The service includes the Sentry software installed on workstations, which finds targeted attacks and more traditional bulk malware.

CYBERWISER.eu Platform - ADVANCED Offering Level

In the ADVANCED offering level all the features in the INTERMEDIATE level are upgraded to their full potential to guarantee adequate training materials, the provision of cyber-rage training scenarios and exercises, simulation of cyber-attacks and defence mechanisms, monitoring and measurement of user performance for those users already tasked with the defence of high-risk organisations against cyber-attacks and incidents.

Cybersecurity Awareness Solution for Local Public Administrations

CS-AWARE is a cybersecurity situational awareness software solution for Local Public Administrations. It was designed to detect, classify and visualize cybersecurity incidents in real time, supporting the prevention or mitigation of cyber-attacks. It addresses small, medium or big size Local Public Administrations and it can be taylored to any local software set-up, any European language and any type of LPA internal workflow and specifics.

The main features are:

1) Versatile connectivity: it is capable to connect to any type of internal or external data source

IoTsTrust

In this wild IoT market, estimating cybersecurity risks, selecting the right standard to comply with and getting certified during the manufacturing process is an extremely complex task. Security Requirements, Security Controls and Security Assurance Activities must be considered by all the project stakeholders including business-lines and risk-owners.

GuardYoo

GuardYoo is an easy-to-use, agentless, yet powerful solution, that enables organizations of all sizes to proactively discover malware and persistent threats (active or dormant), that have breached existing defenses including online and real-time protection measures.

OpIndex™

OpIndex™ is one of the most accurate and comprehensive Dark Web Intelligence solutions on the market with unique Spider software custom-built to circumvent anonymisation measures and circumnavigate routing relays in order to Search and/or Index content with Reporting and Alerting to disrupt threat actors who operate in the Dark Web.

OpAudit™

OpAudit™ is a brand new kind of compliance tracking solution which gathers & manages all evidence of compliance in a single system to successfully track answers & evidence from contributors (Attestations), technical data from devices (Audit) and questionnaires from staff & supply chain (Assessments) for external and internal policies and audits.

H-PREDICTIVE PLATFORM

H-Predictive Platform (PAR) merges digital twins and adversary simulation to anticipate attacks and manage risk in an ICT infrastructure, thru a life long continuous process of assessment and remediation

H-Time Machine

H-Time Machine (Forensics module) supports the discovery of successful, undetected attack against a previous version of the infrastructure, and forensics investigation in case of data breach

H-AI Real Time module

H-AI Real Time module (CAP), using predictive cyber attacks database generated by H-PAR, continuously monitor the infrastructure to predict, attribute and stop attacks in Real Time. H.CAP dramatically reduces the false positive, detects 0-Day exploitation and finally neutralize it

Pages

News

The pandemic has shown the importance of international supply chains and how dependent we are. Attacks in the virtual space may have an increasing impact on supplies in our analogue world.