Security tools for AI Investments platform

Coordinated by

Secured AI Investments platform using the outcome of the BIECO project.


Describe the innovation content of the result:
The key innovation products will be:
Security tools for AI Investments platform using the outcome of the BIECO project.
Who will be the customer?
The customers are hedge funds, proprietary trading companies, mutual funds.
What benefit will it bring to the customers?
The AI Investments platform will be secured using the outcome of the BIECO project.
When is the expected date of achievement in the project (Mth/yr)?
At the end of the project.
When is the time to market (Mth/yr)?
At the end of the project.
What are the costs to be incurred after the project and before exploitation?
It is estimated at 10 – 20 kEUR.
What is the approximate price range of this result/price of licences?
AI Investments it depends on AuM of the investments fund, it is 1% of management fee of AuM and 10% of success fee.
What are the market size in Millions € for this result and relevant trend?
It is assumed that in the 1st year of implementation the value of funds will amount to EUR 20M and within 5 years – EUR 100M.
How will this result rank against competing products in terms of price/performance?
To our knowledge, there is no similar platform on the European market. Almost all of the successful quant funds are based outside of Europe, so our solution will be very innovative in Europe.
Who are the competitors for this result?
Advanced quant funds that use complex investing methods.
How fast and in what ways will the competition respond to this result?
Unknown at the moment
Who are the partners involved in the result?

AI Investments platform – partnership with AI Investments company.

Who are the industrial partners interested in the result (partners, sponsors, etc.)?
Hedge funds, investments funds, mutual funds, proprietary trading companies.
Have you protected or will you protect this result? How? When?
IP rights for source code are reserved. The AI Investments source code will not be available publically.

Other results


This exploitation result consists in cybersecurity consultancy services supported by ResilBlockly (former Blockly4SoS), a Model-Driven Engineering tool that has been developed in the context of BIECO.

Security evaluation methodology

Security evaluation methodology to evaluate the security of an ICT system. The methodology is based on standards such as ISO 31000 standard for Risk Management, the ISO 29119 standard for Security Testing or the MUD standard…

Extended MUD file

The extended Manufacturer Usage Description (MUD) file is an extension of the MUD Internet Engineering Task Force (IETF) standard…

Monitoring Tool

The monitoring tool is an infrastructure in charge of setting up and managing a monitoring component. It is based on event messages and enables the collection of complex events.

Security Testing Tool

GdpR-based cOmbinatOrial Testing (GROOT) is a general combinatorial strategy for testing systems managing GDPR’s concepts (e.g., Data Subject, Personal Data or Controller).

BIECO Project

SUBSCRIBE and become part of the BIECO community!

We don’t spam!

Share This