Core Business

It integrates and develops cutting-edge proprietary and Open Source technologies to meet the needs of every business and industry, drawing strategic information from academic and research findings.

OKT promotes and develops customised solutions to realise a technology transfer to companies interested in identifying and rapidly integrating advanced solutions to improve the competitiveness of their offerings.

OKT & Relatech

OKT is responsible at Relatech for a number of specific application areas:

CYBERSECURITY:

monitoring and analysis of the network and its services with production of reports and solutions to mitigate the security problems encountered.

VULNERABILITY ASSESSMENT:

analysis of software for bugs and security problems.

MALWARE:

analysis and reverse engineering of binary and byte code

Projects

IDService

Digital Identity and Service Accountability

Sector: biomass

Transforming available blockchain technologies (Ethereum), adding the concept of certain identity, to enhance accountability in supply chain scenarios.

Protect-Id

Blockchain and digital identity

Sector: Public Administration

Protect the confidentiality of documentary assets that must be exchanged in networked organisational models (supply chains, districts, consortia, ats ….) by activating cooperation mechanisms that ensure full accountability and continuous monitoring of actions.

Secure Open Net

Blockchain Simulation

Sector: Smart, Secure and Inclusive Communities

The project intends to study new methodologies, techniques and software solutions based on Distributed Ledger to be applied to three relevant sectors in the area of Smart, Secure and Inclusive Communities:

  • Privacy, 
  • The Sharing Economy,
  • Digital Rights

Validated Question Answering

Blockchain AI

Sector: Industry

Human-in-the-loop process certification platform.

Objective: to automate tedious and repetitive tasks, so that the person can concentrate on the strategic coordination of the work project and on managing critical moments only.

Emphasis

CyberSecurity – Data Analytics

Implementation of honeypots: ‘trap’ computer systems that aim to emulate real services on the network to attract and identify malicious agents.

Hacking Range

Cyber simulation solution

Design of an innovative multi-role cyber simulation solution designed to support the modelling of IT/OT systems composed of virtual machines, containers and other technological equipment (e.g. routers, firewalls, etc.) and the execution of hyper-realistic cyber scenarios.

What is your innovation project?

Contact us