demos-banners2

 

 

 

tdw2017-button

  LinkedIn Twitter YouTube

 

 

TDW demonstrations & exhibitors

The following demonstrations/exhibitors will be at Trust in the Digital World 2016

 

  KU Leuven
logo-n-auth n-Auth starts from the user's mobile device as a base of trust, effectively putting the user back in control of authentication and respecting his/her privacy. The user is provided with meaningful feedback around the authentication process and can log out any session from his mobile directly. Security-wise n-Auth offers continuous authentication, end-to-end private authentication, true 2-factor authentication and can be deployed on premise.
miiCard
miiCard2 DirectID is our business service that focuses on one time verifications, with a frictionless user experience, that can be embedded directly into a business’ process. DirectID combines Bank Verified Identities and live financial transaction history with bureau data and document verification to help businesses increase conversions, reduce fraud and make more accurate decisions. The DirectID platform includes both an embedded user experience and a backend Dashboard and API for reporting and insights, and is also available as a fully hosted service.
The Payment Services Directive regulations will directly impact financial organisations in Europe. The PSD2 extends the scheme to operators of ecommerce marketplaces, loyalty schemes, payment services and anyone else who operates in this area. The aim is to make these markets more open and more competitive by extending and clarifying some of the provisions of the first directive, while also fostering payment innovation, particularly in mobile, and harmonising some of the national interpretations.
Key elements of the directive include opening access across the industry to payment processing services, as well as to the customer accounts held by banks. It recognises a market demand granting third parties access to online payment services. Under the ‘Access to Accounts’ (XS2A) rule, it will force banks to facilitate access to their customer accounts and provide account information to third party apps if the account holder wishes to do so.
DirectID today allows account holders to leverage the identity and data they have with their online bank across 31 countries and through over 4500 banks to share their information with third parties. The live demonstration will show how this can be done through a frictionless user experience in just seconds and highlight how the financial data and insights can dramatically change the way consumers are onboarded for new products and services.
  NEC
small NEC logo Secure De-duplicated Multi-Cloud Storage combines the use of multiple cloud storage services, aggressive data deduplication techniques, as well as enhanced security and reliability. It is a unique solution that extends the storage range of current datacenter services, without incurring high maintenance and storage costs, and is therefore ideal for Enterprise and Government customers.
Our secure storage solution ensures that the stored data is always available, is repaired in case of any partial data loss, and is protected from the strongest of adversaries (including state adversaries), without compromising system performance or usability.

Signicat

signicat

Signed, sealed, delivered in no time!
Signicat Sign offers a flexible, secure and regulatory compliant solution for adding digital signatures to documents.
https://www.signicat.com/

  Technische Universität Darmstadt, Telecooperation Lab
Center for Advanced Security Research Darmstadt (CASED)
twitterize-logo200
 
Privacy, in particular anonymity, has been recognized as a core requirement for social media and micro-blogging platforms (MbPs). Without the protection of anonymity, MbP user face the threat of undesired profiling and even political repression. With Twitterize, we present an approach for micro-blogging in a privacy-protecting manner that integrates normal Twitter usage with anonymous micro-blogging. Twitterize does notestablishes overlay networks for hashtags over Twitters’ social network and neither depends on additional infrastructure nor peer-to-peer communication.
  Università di Napoli Federico II, Italy

 specs-logo-256

The SPECS project provides an open source framework to offer Security-as-a-Service, by relying on the notion of security parameters specified in Service Level Agreements (SLA). Providing comprehensible security assurance by Cloud Service Providers (CSP) is a critical factor to deploy trustworthy Cloud ecosystems.
The SPECS framework provides techniques and tools for: (a) enabling a user-centric negotiation of security parameters in a Security SLA, (b) monitoring in real-time the fulfilment of SLAs agreed with a CSP, (c) enforcing agreed Security SLA in order to keep a sustained security level that enables the implementation of the requested security capabilities, identified by the user and configured according to available security control frameworks (e.g. NIST security control framework, CSA Cloud Control Matrix).

The SPECS framework has been designed to empower Small and Medium-sized Enterprises with techniques and tools to improve their control and assurance over the security aspects of their Cloud services. In particular, this demo illustrates an example of cloud application that delivers web service containers, hosted by Amazon and enriched with additional security services, covered by Security SLAs negotiatiated by an end-user.

The full SPECS framework is available as a prototype and released as open source in the SPECS official repository https://bitbucket.org/specs-team/.
The SPECS web site (www.specs-project.eu) has dedicated pages that describe the portfolio and useful links to available resources, which collect all the links to repositories and tools needed to use the framework.

ZETES PASS
zetes-130 Zetes provides public authorities and supranational institutions with secure solutions to correctly authenticate their population and comply with the highest international requirements for the issuance of secure ID and travel documents and the organisation of democratic elections. We have over 10 years’ experience implementing sensitive projects for governments and supra-national organisations. Reliability is one of the key characteristics of our solutions, as well as our organisational flexibility and ability to execute. This approach allows us to give the best guarantees for citizens to prove who they are and exercise their democratic rights.
Authentication is a complex process, which requires the implementation of advanced technologies such as biometrics, smart e-documents, and cryptography. It also requires expertise in data and infrastructure security as well as knowledge of the best materials and techniques to fight against counterfeiting. Zetes combines all this expertise and provides comprehensive and efficient solutions, from enrolment to the production of e-documents and control.
www.zetes.com
This email address is being protected from spambots. You need JavaScript enabled to view it.