Brussels, October 22, 2015: IPACSO announces the 2015 Winners of the EU Cyber Security & Privacy Innovation Awards
The IPACSO Consortium today announced the 2015 Champions of the European Cyber Security & Privacy Innovation Awards.
Download the presentation pack and materials.
The winners were selected out of a group of no less then 30 finalists from 11 countries! These high achievers in the cyber and privacy domains included spin- off companies resulting from academic research, new exiting start-ups, exiting security & privacy entrepreneurs with new products & services, and ICT - and telco's with innovative security offerings.
RECOGNITION FROM THE EUROPEAN COMMISSION:
The finalists and winners were congratulated personally by Mr. Jakub Boratynski, the Head of the Trust Unit, DG CONNECT, of the European Commission. A great appreciation towards the achievements of these innovators, and their hard work helping Europe to protect its networks, critical infrastrustures and citizen's privacy. But that also strengthen the competetiveness of the European Cyber Security market with their innovative ideas, approaches and technologies towards cyber and privacy; increasing employment and export opportunities while establishing exiting new businesses that have a global potential.
Mr. Boratynski stated: " It makes me humble to be in the presence of these individuals that are setting the trend in the Cyber Security & Privacy Markets. While the European Commission invests in these types of initiatives, we are aware that this is public money that is being spent. Being here today and meeting all of you in person, is an appreciation, validation and confirmation for us. We strongly recommend each and every one of you to keep investigating for possibilities to participate in these projects"
THE 2015 WINNERS OF THE EUROPEAN CYBER SECURITY & PRIVACY INNOVATION AWARDS:
|BalaBit||Luxembourg||Blindspotter||Winner in the category: Innovative Cyber Security Company
BalaBit has been active as a leading European IT security innovator since 1992. The company is widely-known for syslog-ng™, its open source log management solution, used by more than a million companies worldwide. The jury praised BalaBit for its continuous innovation in advanced monitoring technologies and adapt to changing requirements and market needs; including its latest product Blindspotter (a real-time, user behaviour analytics tool that analyses user activities and identifies suspicious events occurring throughout IT systems).
|Crypho||Norway||Crypho||Winner in the categorie: Innovative Privacy Company
Crypho is a (Software-as-a-Service) messaging and collaboration tool for organizations with high security requirements. The jury praised Crypho for combining high security and strong cryptographic requirements with the approachability and ease of use that is common in consumer applications; making it ‘end user friendly’, protecting all communications validated by law enforcement, government, financial industry, but also human rights groups and journalists around the world.
|Winner in the category: Cyber Security Product
Cyberlytic (UK). Cyberlytic was founded on the belief that security intelligence should enable security teams to be more efficient and reduce the demand on human operators. Through research originally completed for the UK Ministry of Defence, Cyberlytic is the originator and owner of intellectual property relating to real-time risk assessment and prioritization of cyber-attacks. With its solution, Cyberlytic provides security intelligence software that reduces the demand and workload of security teams and provides decision support. The Jury recognizes the need for more business driven cyber security capabilities. And - while being a relatively new player in the market - Cyberlytic has proven it’s competences in offering a solution with a management level view on cyber security challenges
|Cybernetica||Estonia||Sharemind||Winner in the category: Privacy of Cyber Security Innovator
The jury praised the application of constant innovative developments if the Estonian based, R&D intensive ICT company Cybernetica. Its Sharemind software enables sharing and processing confidential data while maintaining data owner's control. Its cryptographic guarantees allow organizations, governments and individuals to combine data to create new knowledge and not reveal it to third parties. Cybernetica is an excellent example of Estonia as leading provider of Cyber Engineers in Europe.
|Czech Republic||TURRIS project||Winner in the category: Innovative Cyber Security or Privacy Research
The TURRIS project represents a whole security environment composed from a secure by design router and a TURRIS central with cyber threat analysis, the Czech national CSIRT in the background and an up-to-date security fix on-line distribution. Each user of the service obtains a TURRIS router, which can, besides serving as a normal home router, also analyse the traffic between Internet and the home network, and identify suspicious data flows. Similarly to a watchtower, it then alerts the TURRIS central of a possible attack. At the system headquarters, it is then possible to compare data from many connected TURRIS routers and asses the security status of detected traffic. End user home networks. Unique approach on detecting and managing cyber threats at home new appliance part of core routing environment of home network. The jury praised CZ.NIC for its unique approach to protect Home Networks
|DocRAID||Germany||DocRAID®||Winner in the category: ICT Security Innovation
DocRAID® stands for secure file sharing and email encryption made easy. DocRAID® delivers maximum information protection in cloud environments while maintaining full control of data, functionality, transparency and user friendliness. DocRAID® is a highly secure enterprise file sharing solution, storage-agnostic and decentralized; that allows users to use cloud storage, email, exchange and other cloud services with confidence. The jury acknowledges the need for secure document management and transparency while utilizing Cloud technologies. The innovation combines high quality encryption and fragmenting and can be applied to multiple platforms
|EclecticIQ||Netherlands||EclecticIQ||Winner in the category: Cyber Security Service
EclecticIQ creates best-in-class cyber security technology through its engineering and cyber threat intelligence expertise. Its flagship platform product connects and interprets intelligence data from open sources, commercial suppliers and industry partnerships to help organizations manage cyber threats. Utilizing STIX and TAXII, allowing transportation of threat information among IT security and intelligence technologies. The jury recognizes EclecticIQ’s service for its capabilities in both gathering relevant intelligence, but also making it actionable by normalizing and consolidating them, enabling security staff to carry out incident response, intelligence analysis, revenue assurance, security operations and security leadership.
Surrounding the award ceremonies the consortium set up an agenda with inspiring presentations and panel discussions on innovative new research, ideas, approaches, methods and methodologies in the domains of cyber security and privacy:
I. CYBER SECURITY KEYNOTE: MAJOR BREACHES, 3 MACRO TRENDS, CHALLENGES & OPPORTUNITIES FOR INNOVATION
Jason Kravitz (US) is a highly recognized Cyber Security Expert and contributing author and editor for the Global IBM X-Force Trend & Risk Report from IBM. During his presenation, Jason shared his experience to cut through the deluge of constant data breaches. He identified three macro level themes to help the audience better understand the challenges and innovation needed to disrupt the cycle.
2. CYBER SECURITY & PRIVACY INNOVATION DEVELOPMENT: STATE OF AFFAIRS, BOTTLENECKS, SUPPPORT NETWORKS & OPPORTUNITIES
In the panel discussion on Innovation Development, the current state of cyber & privacy innovation in Europe, the bottlenecks and opportunities ahead were evaluated. The panel represented the perspectives from seasoned cyber security entrepreneurs, academia, and innovation support organizations, including: Dr Adrian Burden, Co - founder of the UK Cyber Security Forum, Mr. Luc Dooms, Cyber Security Entrepreneur & Technology Evangelist, Prof dr. Paul De Hert , Vrije Universiteit Brussels - Tilburg University. Co-Director Brussels Privacy Hub, Head of the Department Interdisciplinary Legal Studies, and Jason Kravitz from IBM.
3. TWO INNOVATION CASES FROM THE IPACSO PROJECT: VASCO & ESPION
Bart Renard, Director Business Development, Vasco Data Security and Seamus Galvin, Senior Market Analyst and Product Innovation Manager of Espion presented their companies' innovation cases that derived from the IPACSO Project, and how the IPACSO Framework helped them to manage innovation within their organizations and projects.
4. TOUR LIVING TOMORROW INNOVATIONS LAB - HOUSE OF THE FUTURE- AND MEETING THE FINALISTS IN THE EXHIBITION AREA:
Living Tomorrow is a unique concept in the world and is situated in Brussels. It’s a meeting place for innovative companies, where they can show the visitors their products and services which will improve our quality of living and working in a near future. Bill Gates said at the opening of Living Tomorrow on March 16th, 1995 : “The way we live will be different in the future. The advances in pc technology and low-cost communications are changing our lives dramatically. I think a project like Living Tomorrow - where you are brainstorming about what is possible and you’re getting people to come, look, and talk about what this all means – is really fantastic… I am certainly impressed with what I’ve seen…”.
The conference attendees toured through the House of the Future where they visited the IPACSO Award Finalists in the Exhibition Area
5. IPACSO PROJECT: HIGHLIGHTS, IDENTIFIED INNOVATION GAPS, IPACSO ACTIVITIES 2016 AND ONWARDS
Closing the conference program as well as the official IPACSO Program after 2 years, the IPACSO Project Partners evaluated the main highlights, and presented the audience some of the outcomes, deliverables and tools that derived from the project, and are available to support security experts, researchers, entrepreneurs, policy makers, investors and clusters in their innovation efforts. The project has resulted in a Decision Making Framework and Market Database that helps innovators to identify, assess and exploit market opportunities in the Cyber Security & Privacy Markets. The project formally ends in October 2015. Ulrich Seldeslachts mentioned that LSEC will continue the IPACSO- activities, supporting entrepreneurs, researchers but also investors and policy makers with practical advice and thought leadership. LSEC will also continue to deliver the Innovation Bootcamp Trainings throughout Europe, and help Cyber Security Clusters, incubators and other stakeholders in their efforts to create a favourable ecosystem for innovation and growth
6. Mr. Boratynski of the European Commission congratulating finalists and handing out awards to the 2015 Champions
THE CONFERENCE ENDED WITH A SHORT PRESENTATION AND APPRECIATION OF MR BORATYNSKI OF THE EUROPEAN COMMISSION, DIRECTLY FOLLOWED BY THE AWARD CEREMONY
Ulrich Seldeslachts stated: "There are only so many prizes we can give away. But even for the finalists that did not win in their category we want to make it very clear that you are all winners! This years edition of the awards was very competetive. With state-of-the-art technologies and solutions in each of the 7 categories, it took the jury quite some elaboration and discussions to select the winning business cases. The IPACSO Team is also delighted about the increasing interest in PRIVACY SOLUTIONS, both in research and technology. This proves that there can be a succesful business model for privacy innovations, and that social involvement can be combined with a profitable company"
THE COMPLETE LIST OF FINALISTS (IN ALPABETHICAL ORDER):
|01.||BalaBit||Belgium||Blindspotter||Real-time, user behaviour analytics tool||Here|
|02.||Coblue Cybersecurity B.V.||Netherlands||STORRO||Securely share, adapt and save your files anytime, anywhere||Here|
|03.||ContentPro AG (DocRAID)||Germany||DocRAID®||Secure file sharing and email encryption made easy||Here|
|04.||Continuum Security||Spain||IriusRisk||Automated architectural risk analysis and threat modeling||Here|
|05.||Crypho||Norway||Crypho||Messaging and collaboration tool for organizations with high security requirements||Here|
|06.||CSI Tools||Belgium||CSI-Tools||Access Governance of SAP environments||Here|
|07.||Cyberlytic||UK||Cyber Threat Profiler||Real-time risk assessment of cyber attacks||Here|
|08.||Cybernetica||Estonia||Sharemind||Sharing and processing confidential data while remaining data owners control||Here|
|09.||Cyberwatch||France||Cyberwatch||Automated detection and fixing of IT- vulnerabilities||Here|
|10.||CZ.NIC Association||Czech Republic||TURRIS project||Unique project protecting user home networks||Here|
|11.||Digitronic computer systems||Germany||HiCrypt™ 2.0||
Tailored encryption taking the security of your data in your own hands!
|12.||Enigmedia||Spain||Enigmedia Secure Communications||New encryption technology able to encrypt kind of data 20 times faster than current worldwide standard||Here|
|13.||Guardsquare||Belgium||ProGuard & DexGuard||Mobile Application Protection||Here|
|15.||EclecticIQ||Netherlands||EclecticIQ||Connecting and interpreting intelligence from a diversity of sources, supporting cyber intelligence experts||Here|
|16.||Inwebo||France||Inwebo Security Beyond Passwords||A Single Place For Web, Mobile & Cloud Authentication||Here|
|17.||KU Leuven (1)||Belgium||n-Auth||Forget about authentication tokens, transferring digits and complex user interactions. With n-Auth you can authenticate at the snap of a single n-Auth code.||Here|
|18.||KU Leuven (2)||Belgium||Opacity||Privacy by Design Technology, enhancing both privacy and transparancy for end users||Here|
|19.||Liopa||UK||Liopa||A NEW BIOMETRIC VERIFICATION SOLUTION||Here|
|20.||Lumeta||UK||Cybersecurity Analytics Plugin||Zombie Hunting - Determining whether or not any enterprise assets are malware infrastructure||Here|
|21.||Nviso||Belgium||NVISO ApkScan||Free of charge Android malware scanner, containing static and dynamic analysis components||Here|
|22.||RedSocks||Netherlands||RedSocks Malware Threat Defender||Intelligence-based egress monitoring: Translating intelligence into state-of-the-art malware detection||Here|
|23.||Saxion-Trijntje van Dijk||Netherlands||BYOD Decision Support System||Mobile devices - A decision support system for policy, roles, responsibilities & risk mitigation instructions||Here|
|24.||SecurIT||Belgium||TrustBuilder Identity Hub||Smart Bridging of the Identity Cloud: Managing User Identities in today's distributed world||Here|
|25.||Sedicii||Ireland||Zero Knowledge Proof Authentication||A new, disruptive way to authenticate & verify identity using Zero Knowledge Proof authentication technology||Here|
|26.||Sentryo||France||ICS Cybervision||Cyber Awareness for the Industrial Internet - New solution to protect industrial networks.||Here|
|27.||Tanker||France||TANKER||Data encryption for SaaS & Cloud applications||Here|
|28.||Threadstone||Netherlands||ThreadScan||Cloud - and subscription based malware scanner||Here|
|29.||UM-Labs||UK||UM-Labs||Cloud Based security solution for VoIP and UC applications||Here|
|30.||Votiro||Israel||VOTIRO SECURED||Spear-Phishing Protection Service that sanitizes files attached to email messages coming into your network||Here|
The presentation pack including the :
- introduction by Ulrich Seldeslachts, CEO of LSEC and IPACSO partner
- keynote presentation by Jason Kravitz, IBM
- panel debate with entrepreneurs and innovators
- presentation by Seamus Galvin, Espion and IPACSO partner on the use case of the IPACSO Framework for innovation management by Espion,
- presentation by Bart Renard, Vasco Data Security and IPACSO partner on the use case of the IPACSO Framework for innovation management by Vasco Data Security and the Vasco Digipass Bluetooth Dongle
- panel debate by the IPACSO partners
- presentation of the IPACSO 2015 Awards finalists and winners, by Ulrich Seldeslachts and Jakub Boratinsky, Head of Unit, DG Connect, European Commission