Add to favorites:
Share:
Project results are expected to contribute to some or all of the following expected outcomes:
- Development of a mature technological solution addressing EU security policy priorities in the areas addressed by the Cluster 3 work programme and in particular the destination of fighting crime and terrorism, disaster resilient societies, border management and resilient infrastructure;
- Facilitate increased and sustained collaboration between small and medium-sized enterprises (SMEs), public research partners, and academia, leading to improved knowledge transfer within the European innovative SME ecosystem;
- Mitigate difficulties in access to finance and new international markets, thereby enhancing the growth and expansion of European innovative SMEs.
Scope:
Europe’s 25 million small and medium enterprises (SMEs) are the backbone of the EU economy. SMEs can bring innovation to societal challenges, including the security of EU citizens. Innovative SMEs and high-tech start-ups can transform and modernise EU security capabilities.
However, despite the innovation capacity of EU SMEs, these often experience difficulties in finding their way to the public markets. These include red tape in public contracts, access to new customers, access to finance, industrial competition and Intellectual Property (IP) valorisation. These difficulties are exacerbated in markets that show restrictions of different kind, as it is the case of security.
Knowing that SMEs require additional support to reach the security buyers and that the collaboration opportunities offered by the projects of the Pillar II of Horizon Europe can be a catalyst for uptake, this topic aims to offer a collaborative environment for small and medium innovators to tailor their innovations to the specific needs of civil security end-users, taking into account the urge to address the diverse needs of all citizens, regardless of gender, age or ability.
Applicants are invited to submit proposals for technology development along with the following principles:
- Focus on mature technological solutions addressing EU security policy priorities in the areas addressed by the Cluster 3 Work Programme;
- Fostering collaboration between SMEs from different Member States and Associated Countries;
- Involving security end-users in the role of validator and potential first-adopter of the proposed innovations;
- Fostering collaboration schemes between small companies and research and technology organisations and/or big industrial players aimed at fostering innovative technology transfer or creating innovative business models that facilitate access to market and strengthen the innovation capacity of EU SMEs and start-ups in the domain of civil security.
Examples of activities to plan in the proposed projects include, but are not limited to: assimilating market requirements; facilitating access to additional funding; approaching potential public buyers; assess competitive landscape; supporting in innovation management (methodological and process innovation, business model innovation, market innovation); assist in IP management and exploitation; provide guidance for expansion to future markets, etc.
The participation of research and technology organisations should not focus on own technology development but on supporting the small industrial players in accelerating the technology transfer of innovative security solutions for their further development and production.
It is encouraged that one SME takes the coordinator role[1]. If the coordinator is not an SME, this should be duly justified.
The projects should have a maximum estimated duration of 2 years.
Under this topic, projects should address one of the following areas addressed by the Cluster 3 work programme: Fighting Crime and Terrorism (FCT, Option A), Disaster-Resilient Society (DRS, Option B), Resilient Infrastructure (INFRA, Option C), Border Management (BM, Option D).
Some (indicative and non-exhaustive) examples of domains that could be addressed under the FCT area are: mobile forensics; deepfake detection; detection of counterfeiting (fake items, fake currency bills) or falsified/forged documents (passports, ID cards); detection and countering of advanced forms of malware, as well as non-cash payment frauds and other cyber-scams.
Some (indicative and non-exhaustive) examples of domains that could be addressed under the DRS area are: data and satellite/remote sensing information exploitation, positioning and localisation tracking and tracing, monitoring and surveillance for disaster prevention.
Some (indicative and non-exhaustive) examples of domains that could be addressed under the INFRA area are: physical access control, autonomous systems used for infrastructure protection, positioning and localisation tracking and tracing, monitoring and surveillance of environments and activities.
Some (indicative and non-exhaustive) examples of domains that could be addressed under the BM area are: facilitated border checks; secure documents and identity management for border crossings; border surveillance; detection of drugs, explosives, Chemical, Biological, Radiological and Nuclear (CBRN), weapons and/or other dangerous materials in customs environment; detection of stolen, smuggled, illicit or illegal goods (cigarettes, art, cultural goods, wildlife) in a customs environment.
Where relevant, proposals are invited to consider legal aspects to support the operationalization, policy integration, and institutional transformation of security solutions. This might include, for instance, the design of legal, policy, and/or standardization pathways to support the operational uptake of security solutions.
This topic contributes to the Strategic Technologies for Europe Platform (STEP[2]) and addresses civil security technologies falling under the sectors of “Digital technologies and deep-tech innovation”[3]. This topic contributes to the objectives stated in the STEP Regulation, e.g., to support the European industry and boost investment in critical technologies in Europe, and, to contribute to reducing or preventing the strategic dependencies of the Union.
Finally, proposals are expected to address all applicable considerations expressed in the Introduction of the Strengthened Security Research and Innovation Destination.
[1] If a MIDCAP is included in the proposal, it could also take the role of coordinator.
[2] OJ L, 2024/795, 29.2.2024, ELI: http://data.europa.eu/eli/reg/2024/795/oj
Expected Outcome
Project results are expected to contribute to some or all of the following expected outcomes:
- Development of a mature technological solution addressing EU security policy priorities in the areas addressed by the Cluster 3 work programme and in particular the destination of fighting crime and terrorism, disaster resilient societies, border management and resilient infrastructure;
- Facilitate increased and sustained collaboration between small and medium-sized enterprises (SMEs), public research partners, and academia, leading to improved knowledge transfer within the European innovative SME ecosystem;
- Mitigate difficulties in access to finance and new international markets, thereby enhancing the growth and expansion of European innovative SMEs.
Scope
Europe’s 25 million small and medium enterprises (SMEs) are the backbone of the EU economy. SMEs can bring innovation to societal challenges, including the security of EU citizens. Innovative SMEs and high-tech start-ups can transform and modernise EU security capabilities.
However, despite the innovation capacity of EU SMEs, these often experience difficulties in finding their way to the public markets. These include red tape in public contracts, access to new customers, access to finance, industrial competition and Intellectual Property (IP) valorisation. These difficulties are exacerbated in markets that show restrictions of different kind, as it is the case of security.
Knowing that SMEs require additional support to reach the security buyers and that the collaboration opportunities offered by the projects of the Pillar II of Horizon Europe can be a catalyst for uptake, this topic aims to offer a collaborative environment for small and medium innovators to tailor their innovations to the specific needs of civil security end-users, taking into account the urge to address the diverse needs of all citizens, regardless of gender, age or ability.
Applicants are invited to submit proposals for technology development along with the following principles:
- Focus on mature technological solutions addressing EU security policy priorities in the areas addressed by the Cluster 3 Work Programme;
- Fostering collaboration between SMEs from different Member States and Associated Countries;
- Involving security end-users in the role of validator and potential first-adopter of the proposed innovations;
- Fostering collaboration schemes between small companies and research and technology organisations and/or big industrial players aimed at fostering innovative technology transfer or creating innovative business models that facilitate access to market and strengthen the innovation capacity of EU SMEs and start-ups in the domain of civil security.
Examples of activities to plan in the proposed projects include, but are not limited to: assimilating market requirements; facilitating access to additional funding; approaching potential public buyers; assess competitive landscape; supporting in innovation management (methodological and process innovation, business model innovation, market innovation); assist in IP management and exploitation; provide guidance for expansion to future markets, etc.
The participation of research and technology organisations should not focus on own technology development but on supporting the small industrial players in accelerating the technology transfer of innovative security solutions for their further development and production.
It is encouraged that one SME takes the coordinator role[1]. If the coordinator is not an SME, this should be duly justified.
The projects should have a maximum estimated duration of 2 years.
Under this topic, projects should address one of the following areas addressed by the Cluster 3 work programme: Fighting Crime and Terrorism (FCT, Option A), Disaster-Resilient Society (DRS, Option B), Resilient Infrastructure (INFRA, Option C), Border Management (BM, Option D).
Some (indicative and non-exhaustive) examples of domains that could be addressed under the FCT area are: mobile forensics; deepfake detection; detection of counterfeiting (fake items, fake currency bills) or falsified/forged documents (passports, ID cards); detection and countering of advanced forms of malware, as well as non-cash payment frauds and other cyber-scams.
Some (indicative and non-exhaustive) examples of domains that could be addressed under the DRS area are: data and satellite/remote sensing information exploitation, positioning and localisation tracking and tracing, monitoring and surveillance for disaster prevention.
Some (indicative and non-exhaustive) examples of domains that could be addressed under the INFRA area are: physical access control, autonomous systems used for infrastructure protection, positioning and localisation tracking and tracing, monitoring and surveillance of environments and activities.
Some (indicative and non-exhaustive) examples of domains that could be addressed under the BM area are: facilitated border checks; secure documents and identity management for border crossings; border surveillance; detection of drugs, explosives, Chemical, Biological, Radiological and Nuclear (CBRN), weapons and/or other dangerous materials in customs environment; detection of stolen, smuggled, illicit or illegal goods (cigarettes, art, cultural goods, wildlife) in a customs environment.
Where relevant, proposals are invited to consider legal aspects to support the operationalization, policy integration, and institutional transformation of security solutions. This might include, for instance, the design of legal, policy, and/or standardization pathways to support the operational uptake of security solutions.
This topic contributes to the Strategic Technologies for Europe Platform (STEP[2]) and addresses civil security technologies falling under the sectors of “Digital technologies and deep-tech innovation”[3]. This topic contributes to the objectives stated in the STEP Regulation, e.g., to support the European industry and boost investment in critical technologies in Europe, and, to contribute to reducing or preventing the strategic dependencies of the Union.
Finally, proposals are expected to address all applicable considerations expressed in the Introduction of the Strengthened Security Research and Innovation Destination.
[1] If a MIDCAP is included in the proposal, it could also take the role of coordinator.
[2] OJ L, 2024/795, 29.2.2024, ELI: http://data.europa.eu/eli/reg/2024/795/oj
Partner Requests
Explore Real Collaboration Opportunities
🔍 As a logged-in member, you now have exclusive access to all active Partner Requests for this Funding Call.
See who’s looking for collaborators, explore exciting project ideas, and discover how others are planning to make an impact.
💡 Use these insights to get inspired—or take the next step and start a request of your own (first 3 entries for free).
Log in or registrate here for free.
Ask our experts about this call
Connect with the Listing Owner!
💬 Please log in now to send a direct message to our experts and ask your questions. Not a member yet? Sign up for free and start connecting today!
Related Funding and Finance Opportunities
Unlock Exclusive Funding Opportunities!
🔑 Get instant access to tailored funding opportunities that perfectly match your needs. This powerful feature is exclusively available to our professional members—helping you save time, stay ahead of the competition, and secure the right funding faster.
Upgrade to Professional now and never miss an important opportunity again! Already a member? Log in here to explore your matches.
Related Innovation Offers
Discover Tailored Innovation Offers!
🚀 Gain access to technology solutions that match your specific needs and interests—carefully selected to support your innovation goals. These offers are exclusively available to our professional members, helping you identify relevant technologies faster and start the right conversations with potential partners.
Upgrade to Professional now and explore your personalized technology matches today! Already a member? Log in here to view your tailored offers.
Related Knowledgeable Resources
Discover More with Professional: Related Knowledge Resources
🔒 You’re missing out on expert-curated knowledge specifically matched to this topic. As a professional member, you gain exclusive access to in-depth articles, guides, and insights that help you make smarter decisions, faster.
Whether you’re preparing a funding proposal, researching a new market, or just need reliable information—our professional knowledge matches save you hours of research and point you directly to what matters.
Upgrade to Professional now and instantly unlock relevant knowledge tailored to your needs! Already a member? Log in here to view your personalized content.

