Control and Protection are safeguards or countermeasures to avoid, detect, counteract, or minimize security and safety risks to physical property, information, computer systems, or other assets. These mechanisms can be classified in preventive, detective and corrective.


Identity and Access Management

User authentication using arbitrary end-point devices to access one or multiple applications, systems or services, as well as governance to manage identity and access information across systems.

Trustworthiness and Resilience

Trust models and adaptive mechanisms which help transform, renew and recover systems/services in timely response to events.

Data and Cloud Security

Data protection techniques, privacy-aware data management, data encryption, security on cloud-based technologies and services.

Network and Mobile Security

Secure and trustworthy controls into network (e.g. IoT) devices and nodes like gateways, routers, connectors, actuators, sensors, mobile and end nodes.