View
Sorting
Companies found: 102
Abatis
AlertEnterprise
Ampex
Arbit
Astvision
Bayshore Networks
Bayshore supports a wide, growing range of OT (as well as IT) protocols, which are required to protect the production environment.
Bayshore’s powerful Learning Engine establishes baseline behaviors among the industrial assets in the OT network, creating a whitelist of normal or approved applications. The Learning Engine automatically generates policies designed to protect industrial infrastructure.
Bayshore’s Pallaton Policy Enforcement Engine enforces both whitelisting (out-of-the-box, Learning Engine generated, or manually crafted) and blacklisting (based on threat intelligence and known exploits) policies. Because the Bayshore solution can be deployed in-line, it can prevent unwanted traffic from interfering with a protected OT environment (in addition to providing alerts). Bayshore Networks offers visibility, control, and protection for industrial Operational Technology, and transforms OT data for IT applications. Incorporating threat intelligence, and filtering open, standard, and proprietary protocols at a deep level, Bayshore parses OT protocol content and context, validating every command and parameter against logic-rich policies. Addressing zero-day, internal, and rapidly evolving threats, Bayshore can allow, alert, and/or enforce policy at line speed – allowing white-listed communication while blocking or modifying unauthorized communication and commands. Bayshore has strategic partnerships with leading technology companies including Yokogawa, SAP, Splunk, Cisco Systems, AT&T, and BAE Systems. Bayshore Networks, Inc. was founded in 2012 and is headquartered in Bethesda, Maryland. Source: https://www.linkedin.com/company/bayshore-networks/about/
BitLogiq
BITLOGIQ provides a diverse spectrum of services focused on software development, deployment, and management. Our tailored solutions are crafted to empower both businesses and individuals to harness the full potential of technology in achieving their strategic goals and objectives. Whether you are looking to develop a new software application, streamline your IT infrastructure, or optimize existing systems, BITLOGIQ offers comprehensive support throughout every stage of the process. Our expertise spans from initial concept and design to deployment, maintenance, and ongoing management, ensuring that your technology investments deliver maximum value and efficiency.
Botstatz
Companys aim is to streamline an automation program for conducive outcomes. Their team is highly experienced in setting up Automation Centers of Excellence (CoE) for global organizations. They have the perfect mix of strategy, leadership and domain experience that helps us carve a niche space for themselves in this highly competitive market. Botstatz has served clients and established credibility across industries. Retail, FMCG, Securities and Financial services to name a few.
Source: https://www.botstatz.com/about-us/
Centauri
Centauri offers industry-leading flexibility, performance bonuses, and a competitive 401k. It has been selected as one of the best companies to work for in America by The Great Place to Work Institute and as one of the top employers in the DC Metro area by the Washingtonian Magazine.
Source: https://www.linkedin.com/company/centauricorp/about/
CenturyLink
Source: https://www.linkedin.com/company/centurylink/about/
Cisco
Cloud Conformity Inc.
Cloud Conformity provides 500+ Rules across 50+ AWS Services with a step by step resolution instructions for each of these rules.
Out of the box integrations with popular communication channels and ticketing systems allow real-time and automated workflows to be executed and remediated.
Source: https://www.linkedin.com/company/cloud-conformity/about/
Cloud MLM Software
Compumatica
Compumatica secure networks provides high-level security solutions for the protection of highly sensitive data transmitted over public or private networks. We develop, produce and implement crypto-systems for organizations with maximum security demands in public authorities, banks, insurance companies and industrial enterprises. Source: https://www.compumatica.com/about-us/
Cordaware GmbH Informationslogistik
After initially specializing in regular instant messaging systems, the company has responded to the request of customers to develop bestinformed as a system, which is suited to distribute high-prioritized information throughout the company’s network in a matter of seconds.
Today, Cordaware bestinformed offers an attractive range of products for companywide information distribution and digital communication optimization.
Far more than 700,000 installed modules in all parts of the world show how important companywide information logistics is for our customers.
Source: https://www.cordaware.com/eng/about-us
Cyberbit
CyberSponse, Inc.
Founded in 2011 & based in Arlington VA, CyberSponse creates proven value & ROI by providing a significant increase in efficiency & accuracy over traditionally manual analysis. The CyOPs™ SOAR platform enables analysts to efficiently evaluate threats by automating data from hundreds of enterprise security tools.
Source: https://www.linkedin.com/company/cybersponse-inc-/about/
CyberX
CyberX’s proprietary, ICS-specific self-learning engine delivers accurate insights about malware, threats, assets, and vulnerabilities — in less than an hour — without relying on rules, specialized skills, or prior knowledge of the environment.
The platform supports all major ICS protocols, integrates natively with SOC tools such as SIEMs and firewalls, and has zero impact on OT.
CyberX is a member of the IBM Security App Exchange Community and has partnered with premier solution providers worldwide including Optiv Security and Deutsche-Telekom/T-Systems.
Cydarm Technologies
The value of a collaborative incident response platform increases with the number of users. Cydarm is interoperable with other vendor products. Every organization has a different cybersecurity technology stack and company knows you will want to customize your workflows. Cydarm has an open API, and is easy to integrate with your existing technology stack.
Cydarm can be deployed anywhere. Whether you prefer to maintain your security stack on-premises or in the cloud, Cydarm will meet your requirement. Cydarm is deployed using Docker containers, so all you need is a Docker host environment.
Source: https://cydarm.com/
Darktrace
The catalog of companies ROI4CIO is a database of suppliers, vendors and users of software, equipment and IT-services for business. By means of filters, find the IT vendor or the reseller by category of a product or availability of deals, the user - by branch and the sizes of the company. Add the company in the catalog, subscribe for updatings.






_1.png)











