View

Sorting

Companies found: 195

77Element Technology

CHN
Supplier, Vendor
00
Being the world first security visibility solution provider, 77 Element specializes in the research and development of cybersecurity visibility products.
To improve the user experience, 77 Element is constantly innovating in traffic, asset, log, user behavior, APP security and WEB security visualization, which enables enterprises to strengthen their network management and improve the stability, efficiency and safety of their network operation, so that they could concentrate on develop without worry behind.
With the digital transformation of all industries, 77 Element has been continuing the technical research and development in terms of “AI algorithm, data storage solutions and zero copy technology”.
Source: https://www.linkedin.com/company/77element-technology/about/
...Read more
0
0
0
0

A3SEC

COL ...
Vendor
0
A3SEC is a business group based in Spain, Mexico, Colombia and the USA that provides professional solutions in the areas of cybersecurity, device monitoring, business intelligence and big data.
A3SEC specializes in converting large amounts of data into relevant information for decision-making at the right time and place.
The A3SEC team consists mainly of engineers and consultants with extensive experience in developing new ICT solutions that can adapt projects and deployments of professional cybersecurity, big data, asset monitoring, SIEM, computer threats, contactless marketing, business intelligence and training.
Source: https://www.linkedin.com/company/a3sec
...Read more
0
0

Abusix, Inc.

DEU ...
Supplier, Vendor
00
Abusix, Inc. is a company of Internet security, network abuse handling, antispam and fraud specialists. Their mission is to help ISPs & Internet companies solving the rapidly growing problem of outgoing spam and all kind of other network abuse or security issues in a solid, accurate and reliable way. Abusix is providing network abuse handling & reporting, customized spamfeeds, consulting and cloud-based software/services against network abuse for ISPs, ESPs, technology providers, businesses and many more.

...Read more
0
0
0
0

Adlumin

USA
Supplier, Vendor
00
Adlumin is the leading security and compliance automation platform built exclusively for financial institutions. Discover threats, malfunctions, and IT operations failures in real time and comply with financial regulations like FFIEC, GLBA, SEC, PCI, and more in seconds. The Adlumin team has a passion for technology and solving the most difficult problems and gaps in cybersecurity today. Adlumin uses the data on your network, analyzes it, and turns it into response actions to protect you from the adversary. We help you comply, detect, prioritize, and respond in real-time. Source: https://adlumin.com/adlumin-team/
...Read more
0
0

agileSI

DEU ...
Supplier, Vendor
00
In December 2010 agileSI was launched as a product within the security integrator SecureLink Germany GmbH. Company focuses on the development and marketing of SAP ERP security solutions.
From the very beginning, the company's goal was to incorporate the extensive experience gained in SAP, security consulting, SIEM systems/projects and the security integration business in general. In particular the know-how of more than 60 SIEM security projects, fueled the development of this new and innovative solution.
In 2011, the first release of agileSI - the world's first software solution for continuous monitoring of security-relevant events of entire SAP landscapes – was a fact. agileSI  is the international established and market-leading solution for SAP-SIEM integration. Since 2018 agileSI is a full business unit of SecureLink.
Source: https://www.linkedin.com/company/agilesi/about/
...Read more
0
0

Airlock Digital

AUS
Supplier, Vendor
00
Airlock Digital was created out of necessity, to address the modern security challenges and advanced threats customers face on a daily basis. Their proactive security solutions deliver forward thinking and proactive security in enterprises around the world.

Airlock enables you to easily create and manage secure whitelists in dynamically changing computing environments.

Unlike signature based file blocking (black listing) such as antivirus, Airlock only allows files it has been instructed to trust, to run. If the file is not in the whitelist it cannot run, regardless if a file is known good, bad or indifferent. This proactively prevents malicious code from running on your system, before any damage occurs.
Source: https://www.airlockdigital.com/airlock-application-whitelisting-features/
...Read more
0
0
0
0

Allgress Systems

USA
Supplier, Vendor
00
Allgress enables enterprise risk, security, and compliance professionals the ability to efficiently manage their risk posture. By utilizing advanced visualization, automation, streamlined workflows, and the integration of existing data feeds, Allgress reduces the complexity and cost of risk management. Unlike other risk management solutions, Allgress customers derive value in days rather than months.
...Read more
0
0

AlphaSOC

POL ...
Supplier, Vendor
00
Hundreds of security teams use the AlphaSOC Analytics Engine to uncover infected hosts and emerging threats. AlphaSOC processes network telemetry and performs deep analysis and alerting of suspicious events, identifying new and unknown threats without signatures. We take security very seriously at AlphaSOC and understand how important the responsibility of safeguarding data is to our customers. As such, we are proud to exceed industry standards. Source: https://alphasoc.com/
...Read more
0
0

Amgine Securus

KOR
Supplier, Vendor
00
Amgine Securus establishes cyber intelligence and investigation systems for major public institutions and governmental agencies. In particular, Amgine has accumulated its core competencies through a great deal of
experiences in the development of innovative materialization for interrelationship of threat resources and has the ownership of pertinent solutions in the fields of cybercrime investigation, threat response, and digital forensics.
Source: https://www.amgine.co.kr/company
...Read more
0
0

AMPEG GmbH

DEU
Supplier, Vendor
00
Since its founding in 1994, AMPEG has developed from a system integrator for IT security solutions into a software manufactory specialising in the analysis of the security level for corporate networks.

From the knowledge that has accumulated in more than a decade in IT security, the software Security Lighthouse has been developed in the years 2004 to 2006 - also with the support of some long-time customers.
Security Lighthouse is a central component in the tool box of the IT security. The status of the achieved security level will be visible in almost real-time. This trans­forms IT security into a measurable and manageable factor. To be aware of the companywide security status serves one goal: to minimise the attack surface and keep it as small as possible.
Source: https://www.ampeg.de/en/company/about-us
...Read more
0
0
0
0

Anomali

ARE ...
Supplier, Vendor
Anomali detects adversaries and tells you who they are. Anomali arms security teams with machine learning optimized threat intelligence and identifies hidden threats targeting their environments. Organizations rely on the Anomali Threat Platform to detect threats, understand adversaries, and respond effectively.  The platform enables organizations to collaborate and share threat information among trusted communities and is the most widely adopted platform for ISACs and leading enterprises worldwide.
Source: https://www.linkedin.com/company/anomali/about/
...Read more
0
0

Arctic Wolf Networks

DEU ...
Supplier, Vendor
00
Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity. The AWN CyberSOC service is anchored by Concierge Security teams who provide custom threat hunting, alerting, and reporting. Arctic Wolf’s purpose-built, cloud-based service offers 24x7 monitoring, vulnerability assessment, threat detection, and response.
Source: https://www.linkedin.com/company/arctic-wolf-networks/about/
...Read more
0
0
0
0

Argus Cyber Security Ltd.

ISR
Supplier, Vendor
00
Argus, the global leader in automotive cyber security, provides comprehensive and proven solutions and services to protect connected cars and commercial vehicles against cyber-attacks.

With decades of experience in both cyber security and the automotive industry, Argus offers innovative security methods and proven computer networking know-how with a deep understanding of automotive best practices. Customers include car manufacturers, their Tier 1 suppliers, fleet operators and aftermarket connectivity providers.
Founded in 2013, Argus is headquartered in Tel Aviv, Israel, with offices in Michigan, Silicon Valley, Stuttgart and Tokyo.
Source: https://www.linkedin.com/company/argus-cyber-security/about/
...Read more
0
0

Astvision

MNG ...
Supplier, Vendor
00
Astvision has empowered developers to create innovative product and services.The Company’s core asset is team of young, talented and ambitious IT specialists with clear visionand capabilities of introducing latest technological developments and solutions into real-life.
...Read more
0
0
0
0

Aurionpro

ARE ...
Supplier, Vendor
00
Aurionpro is a global technology solutions leader that helps clients accelerate their digital innovation, secure their enterprises and optimize business operations. We combine core domain expertise, thought leadership in innovation, security and leverage industry leading IP to deliver tangible business results for global corporations. Employing more than 1,300 domain and technology experts across North America, Asia and Europe, Aurionpro has been consistently recognized amongst the top 100 technology solutions providers for Financial Services companies.

...Read more
0
0
0
0

Auxilium Cyber Security GmbH

CZE ...
Supplier, Vendor
00
Auxilium Cyber Security GmbH is independent information security consultancy company focusing mainly on the following topics:

  • Consulting, design and implementation of information security strategies following recognized standards including ISO27000, NIST Cybersecurity Framework or PCI-DSS.
  • Vulnerability assessments and penetration testing of existing infrastructure with main focus on complete web application testing according to the OWASP Testing Guide and embedded systems testing. Company also helps you establish security coding guidelines and train your developers to follow them in order to produce more secure code.
  • Threat intelligence research on emerging threats - especially malware (including darknet malware marketplaces monitoring).
  • Design and implementation of efficient information security awareness campaigns.

Source: https://www.linkedin.com/company/auxilium-cyber-security/about/
...Read more
0
0
0
0

Barracuda Networks

AUT ...
Vendor
Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.

The company develops products for security, networking and storage based on network devices and cloud services. Security products include solutions to protect against spam, web surfing, hackers and threats from instant messaging services. The platform also successfully combats such threats as spam, spyware, Trojans and other malware. Barracuda solutions provide web traffic filtering, load balancing, message archiving, backup services, data protection, and more.

Today, more than 50,000 companies and security organizations around the world use Barracuda Networks solutions. The main product list includes solutions such as Barracuda Spam Firewall, Barracuda Web Filter, Barracuda IM Firewall.
...Read more

Bayshore Networks

USA
Supplier, Vendor
00
Bayshore Networks is the cyber protection leader for the Industrial Internet of Things (IIoT). Bayshore's policy-based Gateway enables applications for IoT platforms. Bayshore Networks provides the option of active policy enforcement through Pallaton Policy Enforcement Engine. This patented technology can actively prevent risk activities from disrupting production, incurring downtime costs, and damaging equipment. Built by Bayshore OT experts and designed for the plant environment, goal is to keep the OT environment safe and productive.

Bayshore supports a wide, growing range of OT (as well as IT) protocols, which are required to protect the production environment.
Bayshore’s powerful Learning Engine establishes baseline behaviors among the industrial assets in the OT network, creating a whitelist of normal or approved applications. The Learning Engine automatically generates policies designed to protect industrial infrastructure.
Bayshore’s Pallaton Policy Enforcement Engine enforces both whitelisting (out-of-the-box, Learning Engine generated, or manually crafted) and blacklisting (based on threat intelligence and known exploits) policies. Because the Bayshore solution can be deployed in-line, it can prevent unwanted traffic from interfering with a protected OT environment (in addition to providing alerts). Bayshore Networks offers visibility, control, and protection for industrial Operational Technology, and transforms OT data for IT applications. Incorporating threat intelligence, and filtering open, standard, and proprietary protocols at a deep level, Bayshore parses OT protocol content and context, validating every command and parameter against logic-rich policies. Addressing zero-day, internal, and rapidly evolving threats, Bayshore can allow, alert, and/or enforce policy at line speed – allowing white-listed communication while blocking or modifying unauthorized communication and commands. Bayshore has strategic partnerships with leading technology companies including Yokogawa, SAP, Splunk, Cisco Systems, AT&T, and BAE Systems. Bayshore Networks, Inc. was founded in 2012 and is headquartered in Bethesda, Maryland. Source: https://www.linkedin.com/company/bayshore-networks/about/
...Read more
0
0

Binary Defense

USA
Supplier, Vendor
00

Binary Defense is the global leader in attack intelligence and advanced managed security solutions.


Binary Defense was spawned from the need for better monitoring and detection capabilities in companies. The founder of Binary Defense, David Kennedy, also founded TrustedSec which specializes in information security services including penetration testing. The cutting edge, white hat hackers noticed almost every organization with monitoring capabilities really struggled, especially when using an MSSP. Countless attacks went undetected, and breaches were missed which left companies wondering what to do.
As a result, Binary Defense was first put into motion in July of 2012 with the development of Managed Detection, Deception and Response software (Binary Defense Vision) based on profiling how attackers think. A number of years of development, marrying up attack intelligence with our extensive threat intelligence, has made company's product the best consolidation of technologies in the industry to predict, prevent, detect, deceive and respond to attacks.
Source: https://www.linkedin.com/company/binary-defense-systems/about/
...Read more
0
0

BitDam

ISR
Supplier, Vendor
00
BitDam cyber security blocks advanced content-borne attacks across all enterprise communication channels, empowering organizations to collaborate safely. Founded by elite intelligence professionals, BitDam proactively stops malware from running, pre-delivery, preventing hardware and logical exploits, ransomware, phishing, N-Day and Zero-Day attacks contained in any type of attachment or URL.
BitDam ensures the highest attack detection rates and delivers the fastest protection from today’s email borne attacks making enterprise communications safe to click.
Source: https://www.linkedin.com/company/bitdam/about/
...Read more
0
0

The catalog of companies ROI4CIO is a database of suppliers, vendors and users of software, equipment and IT-services for business. By means of filters, find the IT vendor or the reseller by category of a product or availability of deals, the user - by branch and the sizes of the company. Add the company in the catalog, subscribe for updatings.