Explore the words cloud of the DSTB project. It provides you a very rough idea of what is the project "DSTB" about.
The following table provides information about the project.
Coordinator |
UNBOUND TECH LTD
Organization address contact info |
Coordinator Country | Israel [IL] |
Project website | https://www.dyadicsec.com |
Total cost | 2˙882˙500 € |
EC max contribution | 2˙017˙750 € (70%) |
Programme |
1. H2020-EU.2.1.1. (INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (ICT)) 2. H2020-EU.2.3.1. (Mainstreaming SME support, especially through a dedicated instrument) |
Code Call | H2020-SMEINST-2-2014 |
Funding Scheme | SME-2 |
Starting year | 2015 |
Duration (year-month-day) | from 2015-04-01 to 2017-03-31 |
Take a look of project's partnership.
# | ||||
---|---|---|---|---|
1 | UNBOUND TECH LTD | IL (PETAH TIKVA) | coordinator | 2˙017˙750.00 |
Over the last years, the world has seen an unprecedented escalation in the number and size of data breaches. In 2013, a total of 550 million identities were breached; a 62% increase over 2012. In addition, the cost of breaches is rising, with a worldwide average of over $3 million per breach. Hacking is the primary causes of data breaches, and today’s existing solutions are simply not sufficient to meet the threat.
The objective of Dyadic Security is to provide high security to organizations, and to protect digital assets, even in the event of a network breach. Dyadic’s Distributed Security Module (DSM) is a unique software-only offering that provides the highest level of security while being affordable and easy to deploy. At the core of the DSM lies cutting-edge technology based on decades of cryptographic research on secure multiparty computation (MPC). Dyadic’s DSM solves the inherent single point of failure in all of today’s security systems. Strong cryptographic solutions exist for protecting data, securing web traffic, authenticating users, and so on. However, they all rely on the secret key and authentication credentials (e.g., passwords) remaining secret. In today’s reality where hackers get past firewalls and penetrate deep into networks, these keys and credentials are stolen thereby rendering all cryptographic protection useless. Dyadic’s DSM randomly splits keys and credentials across servers so that they are never in any single place to be stolen. The advanced protocols used in the DSM ensure that even if some of the servers are breached and completely controlled by an attacker, the secrets and credentials cannot be stolen. The result is that digital assets remain safe, even when all else has failed and attackers are inside the network.
Dyadic has a disruptive and innovative product range which, in contrast to existing solutions, provides protection in the event of a breach, and not just detection.
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "DSTB" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "DSTB" are provided by the European Opendata Portal: CORDIS opendata.
PsstMenu allows customers to place orders directly from home or restaurant tables using only a smartphone.
Read MoreTelocate ASSIST – Development and marketing of an acoustic solution for localization and navigation of people in buildings using the smartphone
Read MoreSOFT, the first camera-based colorectal cancer screening test to detect occult blood in faeces immediately and with no lab analysis.
Read More