Cel Over the last years, the world has seen an unprecedented escalation in the number and size of data breaches. In 2013, a total of 550 million identities were breached; a 62% increase over 2012. In addition, the cost of breaches is rising, with a worldwide average of over $3 million per breach. Hacking is the primary causes of data breaches, and today’s existing solutions are simply not sufficient to meet the threat.The objective of Dyadic Security is to provide high security to organizations, and to protect digital assets, even in the event of a network breach. Dyadic’s Distributed Security Module (DSM) is a unique software-only offering that provides the highest level of security while being affordable and easy to deploy. At the core of the DSM lies cutting-edge technology based on decades of cryptographic research on secure multiparty computation (MPC). Dyadic’s DSM solves the inherent single point of failure in all of today’s security systems. Strong cryptographic solutions exist for protecting data, securing web traffic, authenticating users, and so on. However, they all rely on the secret key and authentication credentials (e.g. passwords) remaining secret. In today’s reality where hackers get past firewalls and penetrate deep into networks, these keys and credentials are stolen thereby rendering all cryptographic protection useless. Dyadic’s DSM randomly splits keys and credentials across servers so that they are never in any single place to be stolen. The advanced protocols used in the DSM ensure that even if some of the servers are breached and completely controlled by an attacker, the secrets and credentials cannot be stolen. The result is that digital assets remain safe, even when all else has failed and attackers are inside the network. Dyadic has a disruptive and innovative product range which, in contrast to existing solutions, provides protection in the event of a breach, and not just detection. Dziedzina nauki medical and health sciencesbasic medicinepharmacology and pharmacypharmaceutical drugsnatural sciencescomputer and information sciencescomputer securitycryptographysocial scienceseconomics and businessbusiness and managementcommercee-commercenatural sciencescomputer and information sciencescomputer securitynetwork securitysocial scienceseconomics and businessbusiness and managementemployment Program(-y) H2020-EU.2.1.1. - INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (ICT) Main Programme H2020-EU.2.3.1. - Mainstreaming SME support, especially through a dedicated instrument Temat(-y) ICT-37-2014 - Open Disruptive Innovation Scheme (implemented through the SME instrument) Zaproszenie do składania wniosków H2020-SMEInst-2014-2015 Zobacz inne projekty w ramach tego zaproszenia Szczegółowe działanie H2020-SMEINST-2-2014 System finansowania SME-2 - SME instrument phase 2 Koordynator UNBOUND TECH LTD Wkład UE netto € 2 017 750,00 Adres 25 EFAL STREET 4951125 PETAH TIKVA Izrael Zobacz na mapie MŚP Organizacja określiła się jako MŚP (firma z sektora małych i średnich przedsiębiorstw) w czasie podpisania umowy o grant. Tak Rodzaj działalności Private for-profit entities (excluding Higher or Secondary Education Establishments) Linki Kontakt z organizacją Opens in new window Uczestnictwo w unijnych programach w zakresie badań i innowacji Opens in new window sieć współpracy HORIZON Opens in new window Koszt całkowity € 2 882 500,00