BIECO Integrated Platform
BIECO Integrated Platform will integrate the tools in a loosely coupled way.
Describe the innovation content of the result:
A loosely coupled platform which can connect various tools and can design and run a flow of these tools. The tools and the flows can be created, added and managed dynamically.
Who will be the customer?
Mainly software developers who want to test their software for security issues, and also developers, penetration testers and cybersecurity companies who want to test their tools.
What benefit will it bring to the customers?
The tools and the run flow can be designed and managed dynamically.
When is the expected date of achievement in the project (Mth/yr)?
When is the time to market (Mth/yr)?
What are the costs to be incurred after the project and before exploitation?
Hosting costs and probably further developments and maintenance.
What is the approximate price range of this result/price of licences?
Unknown at the moment.
What are the market size in Millions € for this result and relevant trend?
2.5 billion EUR.
How will this result rank against competing products in terms of price/performance?
To our best knowledge, there is no similar platform on the market.
Who are the competitors for this result?
No known competitors.
How fast and in what ways will the competition respond to this result?
Unknown at the moment.
Who are the partners involved in the result?
Who are the industrial partners interested in the result (partners, sponsors, etc.)?
HOLISUN, 7Bulls, RESILTECH, TTTech, I-FEVS.
Have you protected or will you protect this result? How? When?
Software tools will be licensed by their respective owners. Joint ownership will be regulated by agreements before the end of the project.
Secured AI Investments platform using the outcome of the BIECO project.
Log Forgery Blocker – a brand new product on the market.
Security evaluation methodology to evaluate the security of an ICT system. The methodology is based on standards such as ISO 31000 standard for Risk Management, the ISO 29119 standard for Security Testing or the MUD standard…
The extended Manufacturer Usage Description (MUD) file is an extension of the MUD Internet Engineering Task Force (IETF) standard…
The monitoring tool is an infrastructure in charge of setting up and managing a monitoring component. It is based on event messages and enables the collection of complex events.
GdpR-based cOmbinatOrial Testing (GROOT) is a general combinatorial strategy for testing systems managing GDPR’s concepts (e.g., Data Subject, Personal Data or Controller).