Powered by OpenAIRE graph
Found an issue? Give us feedback

COSYNTH

COSYNTH GMBH & CO. KG
Country: Germany
3 Projects, page 1 of 1
  • Funder: European Commission Project Code: 318036
    more_vert
  • Funder: European Commission Project Code: 609757
    more_vert
  • Funder: European Commission Project Code: 101021911
    Overall Budget: 5,159,000 EURFunder Contribution: 4,514,410 EUR

    Data is becoming the core engine of businesses. Data allows extracting, exchanging and sharing value out of the myriad of production and service chains that are no longer under a centralised distribution. As a result, an IT and OT convergence based on the integration of multiple ICT systems will transform market dynamics that present specific security challenges in a context of ever-accelerating change in terms of the threat landscape, attack surface, ecosystems, solutions and regulation. IDUNN’s main objective will focus on adding this trust ingredient to any business by making its ICT systems resilience to cyber-attacks. To achieve that, IDUNN will create a security shield in the form of tools, methodologies, microservices and initial standards compatible with any ICT supply chain. IDUNN will demonstrate a secure Continuity Plan for ICT based organisations by creating and validating a unique Cognitive Detection System for Cybersecure Operational Technologies. Faced with a possible incident, IDUNN will know how to act quickly to alleviate it, and in turn generate a cognitive learning process, which reduces human intervention and provides forecasting capabilities. In this respect, IDUNN will be capable of learning to protect themselves from new threats since they are constantly updated. IDUNN project will develop a complete integrated solution, modular and adaptative to different scenarios. Only when ICT systems behave securely, digital trust will be achieved. The deployment of IDUNN will (i) increase trust in ICT for both IT and OT, (ii) decrease person effort to ensure cybersecurity operations, (iii) increase response and lower recovery time, and above all, (iv) will have a crucial impact in the productivity of any businesses that make use of these secured ICT chains by ensuring that all technologies, services, and tools are defined to guarantee the continuation of the business, providing reasonable effective security and trust for the daily operations.

    more_vert

Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.

Content report
No reports available
Funder report
No option selected
arrow_drop_down

Do you wish to download a CSV file? Note that this process may take a while.

There was an error in csv downloading. Please try again later.