Cyber Threat Intelligence platform
MediaCentric® can detect the early signs of cyber attacks and the leak of sensitive information generating vulnerabilities for the IS.
MediaCentric®, with capacities for collecting and analyzing the surface and deep web, provides activity monitoring on all sources (social networks, forums, pastes, IRCs, etc.) and alerts
Gateway for securing network interconnections
CrossinG® makes it possible to manage data flows and to ensure the confidentiality and integrity of exchanges between two information systems.
High-level network partitioning and advanced processing of incoming and outgoing data flows prevents the risk of an attack spreading from one network to another and also provides protection against harmful content injection and data leaks.
Breaking the kill chain of a cyber attack
Growing in number, more diversified and more precisely targeted, computer attacks have become commonplace and are becoming more and more sophisticated, to the point that they can now be considered as genuine strategic offensives. Advanced Persistent Threats, or APTs, are characteristic of this new generation of threats, methodically combining several intrusion tools and vectors in order to strike slowly, but surely…
Secure exchanges between SOCs
In ECOSSIAN project, the critical infrastructures and the Security Operations Centers (SOCs) are interconnected across UE and converge towards a pan-European SOC. The aim is to enable real-time exchange of information on vulnerabilities, threats and incidents. The extreme sensitivity of the data thus transmitted calls for maximum security of interconnections…
WannaCry Cascading propagation: Isolate your networks!
The worldwide cyberattack that struck the weekend of May 12-14 has brutally thrown light on a formidable paradox: not only does it show just how utterly dependent the global economy is on digital technologies, it also reveals the shortcomings in our organisations – particularly in terms of digital risk management and security.