CYBER THREAT INTELLIGENCE PLATFORM
MediaCentric® can detect the early signs of cyber attacks and the leak of sensitive information generating vulnerabilities for the IS.
MediaCentric®, with capacities for collecting and analyzing the surface and deep web, provides activity monitoring on all sources (social networks, forums, pastes, IRCs, etc.) and alerts
CrossinG® makes it possible to manage data flows and to ensure the confidentiality and integrity of exchanges between two information systems.
High-level network partitioning and advanced processing of incoming and outgoing data flows prevents the risk of an attack spreading from one network to another and also provides protection against harmful content injection and data leaks.
Breaking the kill chain of a cyber attack
Growing in number, more diversified and more precisely targeted, computer attacks have become commonplace and are becoming more and more sophisticated, to the point that they can now be considered as genuine strategic offensives. Advanced Persistent Threats, or APTs, are characteristic of this new generation of threats, methodically combining several intrusion tools and vectors in order to strike slowly, but surely…
Secure exchanges between SOCs
In ECOSSIAN project, the critical infrastructures and the Security Operations Centers (SOCs) are interconnected across UE and converge towards a pan-European SOC. The aim is to enable real-time exchange of information on vulnerabilities, threats and incidents. The extreme sensitivity of the data thus transmitted calls for maximum security of interconnections…