Objective
Over the last years, the world has seen an unprecedented escalation in the number and size of data breaches. In 2013, a total of 550 million identities were breached; a 62% increase over 2012. In addition, the cost of breaches is rising, with a worldwide average of over $3 million per breach. Hacking is the primary causes of data breaches, and today’s existing solutions are simply not sufficient to meet the threat.
The objective of Dyadic Security is to provide high security to organizations, and to protect digital assets, even in the event of a network breach. Dyadic’s Distributed Security Module (DSM) is a unique software-only offering that provides the highest level of security while being affordable and easy to deploy. At the core of the DSM lies cutting-edge technology based on decades of cryptographic research on secure multiparty computation (MPC). Dyadic’s DSM solves the inherent single point of failure in all of today’s security systems. Strong cryptographic solutions exist for protecting data, securing web traffic, authenticating users, and so on. However, they all rely on the secret key and authentication credentials (e.g. passwords) remaining secret. In today’s reality where hackers get past firewalls and penetrate deep into networks, these keys and credentials are stolen thereby rendering all cryptographic protection useless. Dyadic’s DSM randomly splits keys and credentials across servers so that they are never in any single place to be stolen. The advanced protocols used in the DSM ensure that even if some of the servers are breached and completely controlled by an attacker, the secrets and credentials cannot be stolen. The result is that digital assets remain safe, even when all else has failed and attackers are inside the network.
Dyadic has a disruptive and innovative product range which, in contrast to existing solutions, provides protection in the event of a breach, and not just detection.
Fields of science (EuroSciVoc)
CORDIS classifies projects with EuroSciVoc, a multilingual taxonomy of fields of science, through a semi-automatic process based on NLP techniques. See: The European Science Vocabulary.
CORDIS classifies projects with EuroSciVoc, a multilingual taxonomy of fields of science, through a semi-automatic process based on NLP techniques. See: The European Science Vocabulary.
- medical and health sciences basic medicine pharmacology and pharmacy pharmaceutical drugs
- natural sciences computer and information sciences computer security cryptography
- social sciences economics and business business and management commerce e-commerce
- natural sciences computer and information sciences computer security network security
- social sciences economics and business business and management employment
You need to log in or register to use this function
We are sorry... an unexpected error occurred during execution.
You need to be authenticated. Your session might have expired.
Thank you for your feedback. You will soon receive an email to confirm the submission. If you have selected to be notified about the reporting status, you will also be contacted when the reporting status will change.
Programme(s)
Multi-annual funding programmes that define the EU’s priorities for research and innovation.
Multi-annual funding programmes that define the EU’s priorities for research and innovation.
-
H2020-EU.2.1.1. - INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (ICT)
MAIN PROGRAMME
See all projects funded under this programme -
H2020-EU.2.3.1. - Mainstreaming SME support, especially through a dedicated instrument
See all projects funded under this programme
Topic(s)
Calls for proposals are divided into topics. A topic defines a specific subject or area for which applicants can submit proposals. The description of a topic comprises its specific scope and the expected impact of the funded project.
Calls for proposals are divided into topics. A topic defines a specific subject or area for which applicants can submit proposals. The description of a topic comprises its specific scope and the expected impact of the funded project.
Funding Scheme
Funding scheme (or “Type of Action”) inside a programme with common features. It specifies: the scope of what is funded; the reimbursement rate; specific evaluation criteria to qualify for funding; and the use of simplified forms of costs like lump sums.
Funding scheme (or “Type of Action”) inside a programme with common features. It specifies: the scope of what is funded; the reimbursement rate; specific evaluation criteria to qualify for funding; and the use of simplified forms of costs like lump sums.
SME-2 - SME instrument phase 2
See all projects funded under this funding scheme
Call for proposal
Procedure for inviting applicants to submit project proposals, with the aim of receiving EU funding.
Procedure for inviting applicants to submit project proposals, with the aim of receiving EU funding.
(opens in new window) H2020-SMEInst-2014-2015
See all projects funded under this callCoordinator
Net EU financial contribution. The sum of money that the participant receives, deducted by the EU contribution to its linked third party. It considers the distribution of the EU financial contribution between direct beneficiaries of the project and other types of participants, like third-party participants.
4951125 PETAH TIKVA
Israel
The organization defined itself as SME (small and medium-sized enterprise) at the time the Grant Agreement was signed.
The total costs incurred by this organisation to participate in the project, including direct and indirect costs. This amount is a subset of the overall project budget.