{"id":17753,"date":"2025-03-17T15:53:20","date_gmt":"2025-03-17T14:53:20","guid":{"rendered":"https:\/\/immune.institute\/?post_type=proyecto&#038;p=17753"},"modified":"2025-10-07T10:24:19","modified_gmt":"2025-10-07T08:24:19","slug":"safenet-democratizar-ciberseguridad","status":"publish","type":"proyectos","link":"https:\/\/immune.institute\/en\/proyectos\/safenet-democratizar-ciberseguridad\/","title":{"rendered":"SafeNet: Democratising Cybersecurity"},"content":{"rendered":"<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-f72ede8d wp-block-columns-is-layout-flex\" style=\"margin-top:0;margin-bottom:0\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"wp-block-paragraph\">Cybersecurity incidents continue to increase year on year, so dealing with them as early as possible is a crucial action to defend people and businesses.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">SMEs are some of the most common targets for cybercriminals, who leak their data and manage to hide in such a way that these companies cannot easily find them. SafeNet presents itself as a solution to all their problems.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"card card-light wp-block-paragraph\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-accent-1-color\">Carried out by<\/mark><\/strong> <a href=\"https:\/\/www.linkedin.com\/in\/daniel-ruiz-alcaraz\/\" target=\"_blank\" rel=\"noopener\">Daniel Ruiz<\/a> | <a href=\"https:\/\/www.linkedin.com\/in\/alejandrogomezsierra\/\" target=\"_blank\" rel=\"noopener\">Alejandro G\u00f3mez<\/a> | <a href=\"http:\/\/www.linkedin.com\/in\/diego-alonso-hernando-906805261\" target=\"_blank\" rel=\"noopener\">Diego Alonso<\/a> | <a href=\"http:\/\/www.linkedin.com\/IN\/ALEJANDRO-NAVARRO-DLT\" target=\"_blank\" rel=\"noopener\">Alejandro Navarro<\/a><\/p>\n\n\n\n<p class=\"card card-light wp-block-paragraph\"><strong>Programme<\/strong> <a href=\"https:\/\/cybertalent.immune.institute\/\">Cybertalent: Cybersecurity Entrepreneurship Programme<\/a> | In collaboration with the National Institute for Cybersecurity (INCIBE)<\/p>\n\n\n\n<p class=\"card card-light wp-block-paragraph\"><strong>Technologies<\/strong> AI | Pentesting | Development frameworks | Databases | Cloud Infrastructure<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50)\">\n<h2 class=\"wp-block-heading\">What is the motivation? <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">SMEs are the most vulnerable businesses in every sense of the word, including cyber security. 60% of SMEs that suffer a severe cyber-attack disappear within 6 months of the incident, and the lack of accessible tools to identify and address vulnerabilities means that it takes an average of 212 days to detect attacks and another 75 days to contain them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Program aims <\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create a solution focused on SMEs, to help protect them in terms of cybersecurity and prevent their demise due to the difficulties they face in detecting and containing attacks.<\/li>\n\n\n\n<li>Make the solution simple and accessible, making the work as easy as possible.<\/li>\n\n\n\n<li>Improve analysis with the help of artificial intelligence.<\/li>\n\n\n\n<li>Achieve a nationally sourced solution, facilitating processes and communication.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"IMMUNE Project: SafeNet - CyberTalent Incubator\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/Fy-T-9K3kJo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50)\">\n<h2 class=\"wp-block-heading\">Development <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The process of solving these problems involves going through five distinct phases:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Phase 1<\/strong>In order to be able to solve incidents, it is necessary to know them, so a search of exposed information of companies is made, databases are designed, a user-friendly interface for SMEs is developed and the implementation of artificial intelligence in the process is started.<\/li>\n\n\n\n<li><strong>Phase 2<\/strong>After obtaining the exposed information from SMEs, we can move on to analyse the vulnerabilities that allow the information to be obtained. At the same time, the generation of reports must be improved to make them complete and accessible to companies, as well as all the technology behind the solution, such as natural language processing and cloud infrastructure.<\/li>\n\n\n\n<li><strong>Phase 3<\/strong>Once you have all the necessary information on the weaknesses of SMEs, you can move on to the source code analysis of projects, the development of your own language models and the implementation of customised reports to replace the more generic ones.<\/li>\n\n\n\n<li><strong>Phase 4<\/strong>The development of the application is done for both mobile and desktop, while the local network is being secured. It is at this stage that attack simulations begin to be included, so that SMEs can learn what they look like and how to deal with them.<\/li>\n\n\n\n<li><strong>Phase 5<\/strong>Once everything is ready, the desktop and mobile applications are launched, and the next step is the development of an artificial intelligence model that takes care of the attack simulation process for the training of SMEs.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Daniel-Ruiz-Alcaraz-Safenet-1024x576.png\" alt=\"\" class=\"wp-image-17779\" srcset=\"https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Daniel-Ruiz-Alcaraz-Safenet-1024x576.png 1024w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Daniel-Ruiz-Alcaraz-Safenet-256x144.png 256w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Daniel-Ruiz-Alcaraz-Safenet-512x288.png 512w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Daniel-Ruiz-Alcaraz-Safenet-768x432.png 768w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Daniel-Ruiz-Alcaraz-Safenet-1536x864.png 1536w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Daniel-Ruiz-Alcaraz-Safenet-18x10.png 18w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Daniel-Ruiz-Alcaraz-Safenet.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Results <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Esta herramienta de defensa cibern\u00e9tica aprovecha las tendencias actuales en inteligencia artificial y el mayor acceso a los datos p\u00fablicos para determinar a qu\u00e9 riesgos y problemas se enfrentan las pymes, ofreci\u00e9ndoles un informe detallado sobre el an\u00e1lisis realizado. <\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50)\">\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Entrepreneur Daniel Ruiz and his team - Safenet | CyberTalent Incubator by INCIBE\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/3lbSHwmd0iA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">SafeNet permite que cada peque\u00f1a y mediana empresa pueda conocer a qu\u00e9 riesgos se enfrentan y solucionarlos antes de que pasen a ser un gran problema que derive en su desaparici\u00f3n.<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>SafeNet brings cybersecurity to SMEs in a simple and affordable way, offering a product that improves their survival by understanding their vulnerabilities and the risks they face on a daily basis.<\/p>","protected":false},"featured_media":17779,"menu_order":0,"template":"","area":[245,247],"class_list":["post-17753","proyectos","type-proyectos","status-publish","has-post-thumbnail","hentry","area-cyber","area-emprendimiento"],"acf":[],"_links":{"self":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/proyectos\/17753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/proyectos"}],"about":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/types\/proyectos"}],"version-history":[{"count":0,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/proyectos\/17753\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media\/17779"}],"wp:attachment":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media?parent=17753"}],"wp:term":[{"taxonomy":"area","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/area?post=17753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}