D2.1 – SecurIT challenges definition linked to Open call 1

This document details the process that had let to the compilation of the challenges of the 1st SecurIT Open Call to be launched in January 2022. The challenges definition was led by L3CE Cluster. A needs analysis and expression of security solutions integrators and end-users was led by SAFE Cluster, which allowed SecurIT to obtain a clear definition of the challenges to be adressed. The work was carried out through an extensive process of consultations of +35 end-users and integrators, who expressed in thematic workshops their challenges and expectations for innovative solutions to be developped by SMEs.

21/12/2021

D2.1 – SecurIT challenges definition linked to Open call 1

D2.3 – Cybersecurity and security sector offers analysis 1

This document is a mapping of solutions offers in the security sector, in the shape of a catalogue of products & services proposed by 87 European companies (mainly SMEs), belonging to the ecosystems of the SecurIT consortium.

It will be used to identify potential matching with the needs and applications during the open calls of SecurIT, especially for the matchmaking among potential applicants.

31/01/2022

D2.3 – Cybersecurity and security sector offers analysis 1

D2.2 SecurIT challenges definition linked to Open call 2

This document details the second process that was conducted in the second cycle of the project, in order to update the list of challenges that were showcased in the 1st Open Call launched in January 2022. These challenges are defined through the work carried out in WP2, related to SecurIT Challenges definition, via the lead of partner L3CE – WP Leader.

31/01/2022

D2.2 SecurIT challenges definition linked to Open call 2

D2.4 Cybersecurity and security sector offers analysis 2

This document has been developed as part of WP2 “SecurIT Challenges definition”, Task 2.2 “Mapping of security solutions offers”. This is the second release of this task, focusing on the products / services / solutions available in the domain of security. This first release, delivered in January 2022, had the shape of a .pdf catalogue of solutions proposed by European companies (mainly SMEs), belonging to the ecosystems of the SecurIT consortium.

31/01/2022

D2.4 Cybersecurity and security sector offers analysis 2

D4.1 Follow up report (final review) open call 1

This document firstly gives an introduction to the methodology that the SecurIT consortium has developed in order to monitor project development on each of the 21 funded project both on an ad hoc and more formal basis. Secondly, the document provides an overview of the funded Open Call 1 projects including information about the consortium partners, scope and objective of the projects and TRL levels at the start and end. In addition, for the demonstration projects, the overview shows if the demonstration took place in a real or near-real environment. Lastly, some quantitative data will be displayed about the satisfaction of the FSTP projects to enter the SecurIT projects.

15/12/2023

D4.1 – Follow up report (final review) open call 1

D2.5 Synergy analysis with ESIF

The deliverable analyses synergies between the ESIF and various other regional funding mechanisms operating within the partner regions of SecurIT consortium. The overarching objective is to identify opportunities for securing supplementary funding that can be allocated towards enhancing the SMEs portfolio and supporting other initiatives arising from the SecureIT project. This task required the development and presentation of a robust methodology for effectively mapping the diverse funding instruments available to specific projects The aim is to ensure that SMEs operating in Secure IT ecosystem can obtain concrete benefits from these funding instruments.

29/02/2024

D2.5 – Synergy analysis with ESIF

D4.2 Follow up report (final review) open call 2

This document will firstly give an introduction to the methodology that the SecurIT consortium has developed in order to monitor project development on each of the 21 funded project both on an ad hoc and more formal basis. Secondly, the document will provide an overview of the funded Open Call 2 projects including information about the consortium partners, scope and objective of the projects and TRL levels at the start and end. In addition, for the demonstration projects, the overview will show if the demonstrations took place in a real or near-real environment. Lastly, some quantitative data will be displayed about the satisfaction of the FSTP projects to enter the SecurIT projects.

12/07/2024

D4.2 – Follow up report (final review) open call 2

D5.5 Report on final event : report on event and major outcomes

The present document provides an overview of the project final event organized in Paris on 21 May 2024, its main goals and objectives, the types of participants, the planned content and the main results observed and created.

31/08/2024

D5.5 Report on final event : report on event and major outcomes

D4.3 Sustainability & exploitation plan

This report outlines the Sustainability and Exploitation Plan for SecurIT, a comprehensive framework designed to ensure the long-term viability and impactful utilization of the SecurIT project’s outcomes. The SecurIT project has significantly advanced innovation and developed robust security solutions across Europe. Supporting over 95 SMEs, the project achieved notable success in 42 projects.

13/09/2024

D4.3 Sustainability & exploitation plan

D4.4 Gap Analysis & Repository Reference Document of Security and Cybersecurity Requirements

This document has been performing a Gap Analysis & Repository Reference Document of Security and Cybersecurity Requirements. It is one of the concluding documents and future-forward looking document of the SecurIT project. It was planned for to be delivered on M36 of the project, the very last month – aiming to collect and report about the overall results of the analysis and open calls and to further provide the right context on the positioning of these applications and the developing demands.

13/09/2024

D4.4 Gap Analysis & Repository Reference Document of Security and Cybersecurity Requirements