Germany | Bayern

Zurück zur Suche

Internationale Partnersuche

Innovation & Technologie Angebot

An innovative emergency reset procedure through a single recovery button to manage computer risks

Country of Origin: Italy
Reference Number: TOIT20170720001
Publication Date: 6 November 2017

Summary

An Italian inventor patented and developed an IT solution that is able to manage computer risks such as ransomware, malware, denial of services (Dos) attacks by means of a network device associated with the user's IT resources.  The solution is for users with limited IT experience. After a computer attack or a major incident, a simple push of a "recovery button" on the device allows to restore the operating state and preserve all the data. The inventor is interested in a license agreement.

Description

An Italian cybersecurity engineer, who worked as a consultant for important Italian IT and security companies, invented a new hardware and software device to help non-expert users to face the new daily challenges in cybersecurity. The solution is designed to meet the real needs of freelancers, self-employed workers, SMEs and public administrations. 

The solution allows any user to set up the actions necessary to manage the information assets through a patented new device that greatly simplifies the management process with reduction in risks as well as costs. The new device (a physical IoT box) is integrated into the user's local network and connected with a Cloud platform to provide incident response, backup, and quick operational recovery.

The device automates the processes required to manage IT incidents, allowing the user to activate emergency procedures by simply pressing a button in case of problems encountered. The device is programmed to recovery from different types of incident, such as DistributedDoS attack malware, data loss, partial or total block of systems, by autonomously trigger recovery procedures to return to normal working conditions in a timely manner, recovering data and restarting activities at the point of interruption.

The inventor is looking for international partners, such as security companies or manufacturers of network devices, interested in the integration of the patented solution into their own products under a licence agreement.

Advantages and Innovations

Management of IT security involves growing costs, in terms of human and economic resources, in all kinds of business activities that are increasingly exposed to attacks and IT incidents. 

The key advantage of the patented solution is to allow non-expert users - including non-professional IT users, small companies, etc. - to setup and manage autonomously and with great simplicity a "security plan" to protect their business activities.

Users, with a simple and user-friendly procedure, are able to provide the information needed to setup a security plan for their business case, to respond to different types of incident, such as DistributedDoS attack malware, data loss, partial or total block of systems.

The device is activated by a simple "push button" that autonomously triggers recovery procedures to restore a proper working environment (data and procedures).

The solution is highly innovative for the market for its simplicity and reliability. The solution combines local algorithms and networking and cloud functionalities. The working model of the device is the subject of a patent application.

Stage Of Development

Under development/lab tested

Stage Of Development Comment

For the development of the innovative product (in this case the device being installed at the office of the user), a minimal viable product was created that allowed the inventor to have a first interaction with the market and validate the idea. The next step was to make a first prototype, based on the knowledge and information acquired in the previous activity, equipped with basic  hardware and software components, tested in laboratory conditions.

Requested partner

The inventor is looking for small and medium companies as well as multinational enterprises (SME/MNE) that are manufacturers of information technology devices or security companies who are interested in using/ integrating the solution into their products under a license agreement.

Cooperation offer ist closed for requests