Summary
Techniques and methods of illegally gaining access to digital information have reached new heights and are not expected to slow down. So far, existing solutions showed they are not able to keep data secure. Companies and other organisations are struggling with this issue and fail to keep up with legal regulations and face potential backlash from the public. With our breakthrough solution we will tackle all existing issues concerning data protection. These include: encryption, performance, scalability and key storage issues. Our unique end-to-end encryption technology is based on proprietary code and encryption algorithm (patent pending). The technology has been successfully tested on over 500 million data sets in multi-user environments as well as against existing encryption techniques. For the first time, there will be a tailored end-to-end encryption solution for every type of organisation without any compromises in performance, scalability and data security.
Unfold all
/
Fold all
More information & hyperlinks
| Web resources: | https://cordis.europa.eu/project/id/190121563 |
| Start date: | 01-03-2023 |
| End date: | 28-02-2025 |
| Total budget - Public funding: | 3 545 125,00 Euro - 2 465 750,00 Euro |
Cordis data
Original description
Techniques and methods of illegally gaining access to digital information have reached new heights and are not expected to slow down. So far, existing solutions showed they are not able to keep data secure. Companies and other organisations are struggling with this issue and fail to keep up with legal regulations and face potential backlash from the public. With our breakthrough solution we will tackle all existing issues concerning data protection. These include: encryption, performance, scalability and key storage issues. Our unique end-to-end encryption technology is based on proprietary code and encryption algorithm (patent pending). The technology has been successfully tested on over 500 million data sets in multi-user environments as well as against existing encryption techniques. For the first time, there will be a tailored end-to-end encryption solution for every type of organisation without any compromises in performance, scalability and data security.Status
CLOSEDCall topic
HORIZON-EIC-2022-ACCELERATORCHALLENGES-01Update Date
31-07-2023
Geographical location(s)
Structured mapping
Unfold all
/
Fold all