Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Software New

neuropil CyberSecurity Mesh

Product Expert

south_east

Categories

Cryptography Application security Mobile device managment Network security Web application security Big data Security Cloud (computing) security Content security Cyber-physical systems security Endpoint security Interface protection / Device management Unified threat management (UTM) / security appliances Authentication Single sign-on Access protection Admission control User (rights) management Identity and access management Network access control (NAC) Remote access (VPN) Systems management

Key Facts

  • First Open-Source Cyber-Security Mesh
  • Designed with Security and Privacy by Design
  • Unique mix of cybersecurity measures at every place in your IT-Architecture

Product Description

The neuropil cyber-scurity mesh is a open-source project that embraces modern concepts like named-data networks, self-sovereign identities, zero trust architectures and attributes based access control to increase the cybersecurity level of it’s users beyond the current state-of-technology. In effect its users will benefit from the new way of secure, scalable and souvereign data integration to easily comply with legal, organizational, operational and compliance regulations and requirements.

The reference implementation is a small c-library which by default adds two layers of encryption to communication channels. It allows you to address identities (a device, an application, a service or a person) worldwide without compromise for privacy or security requirements.

Our goal is a community driven development to enhance and develop the concept of the cyber-security mesh.

... read more

Product Expert

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.