View
Sorting
Companies found: 70
2NS – Second Nature Security Oy
2NS operates as partners for their clients in the management of information security risks. Company's team helps clients to take care of their information security in a comprehensive manner, including both administrative and technical security.
Source: https://www.2ns.fi/en/company/
9elements Agency GmbH
9elements Cyber Security creates security solutions which are robust and easy to use, leveraging leading open source technology.
Proprietary firmware often leads to problems during board bring-up and frustrating debug circles. Instead, 9elements Cyber Security utilizes existing open source solution which offer faster development, lower maintenance costs and more flexibility to fit your needs.
Company provides consulting for Trusted Computing technology like Intel TXT, ARM TrustZone and TPMs. They have experience in implementation and verification of cryptographic algorithms and protocols. 9elements Cyber Security evaluates software and systems, develop security targets and verify implementations fulfill these. Also company provides trainings and consultings.
Source: https://9esec.io/
AMZ One Step Ltd.
Aries Security, LLC
Aries Security, LLC. is a company dedicated to security research, education and awareness worldwide.
Services:
- security awareness campaigns
- custom tailored threat briefings
- white papers
- security architecture and design, research & development
- intelligence gathering, security event coordination
- custom training and skills assessments
Products:
- Capture The Packet – Cyber Range - Training Simulator & Skills Assessment Suite
- Packet Detective – Designed to teach introduction to network forensics Wall of Lambs – Information Security Education for Kids
Auxilium Cyber Security GmbH
- Consulting, design and implementation of information security strategies following recognized standards including ISO27000, NIST Cybersecurity Framework or PCI-DSS.
- Vulnerability assessments and penetration testing of existing infrastructure with main focus on complete web application testing according to the OWASP Testing Guide and embedded systems testing. Company also helps you establish security coding guidelines and train your developers to follow them in order to produce more secure code.
- Threat intelligence research on emerging threats - especially malware (including darknet malware marketplaces monitoring).
- Design and implementation of efficient information security awareness campaigns.
Source: https://www.linkedin.com/company/auxilium-cyber-security/about/
Baltimore Cyber Range
Corporate cyber awareness / compliance training has become very important across the corporate spectrum. As business use of technology has expanded so have the technology threats. BCR offers corporate cyber awareness training optimized for the skills and experience of the audience.
BCR provides access to a world class training and simulation Cyber Range. The Cyber Range is utilized to provide hands-on SOC operational training and threat training. Range scenarios stress threat detection, compromise mitigation and system remediation. Source: https://www.baltimorecyberange.com/
BEAM Technology
Source: https://www.beamteknoloji.com/en/about-us/
Bilberrry
Bob’s Business
Companys award-winning training is engaging, it's entertaining, it's informative. The goal to improve security culture by simplifying Cyber. This isn't about training users for compliance, it is about achieving true behavioural change.
Bob's Business has ready-made solutions for SME's and fully tailored solutions for the FTSE 500, UK Central government and beyond. Company recognises how important it is for their customers to maintain a sustainable awareness campaign, throughout the training programme. This is why Bob's Business has developed an employee engagement toolkits and offer integrated e-learning and policy management to support your implementation of our training. Source: https://www.linkedin.com/company/bobsbusinessuk/about/
Bridgewater Learning
Brigantia
- Brigantia Distribution. Providing innovative and best-of-breed IT managed services enabling Brigantia partners to offer their end-user clients comprehensive, cost-effective IT solutions with key focuses being on the security and availability of systems, data and communications.
- Brigantia Consulting. Offering GDPR and InfoSec consultancy services providing a three-stage process toward GDPR compliance as well as assistance with Cyber Essentials, Cyber Essentials Plus and ISO27001.
- Brigantia Enhance. Comprising “Business Enhance” which delivers regular events, training, cost savings and rebates and “Personal Enhance” which delivers discounts and savings to clients partners’ owners, management and staff.
CBA Benelux
CBA works in a collaborative way with partners and their customers to produce the best results for all.
They select products which are complementary to each other and bring these together as a IT tooling distributor or reseller, depending on the contract. By promotion online en offline via google, webinars, workshops, tradeshows, competence meetings for and/or resellers customers, etc. CBA offers training and no nonsense support.
CBA offers IT infrastructure, applications, Servers, desktop/Smartphone (cyber,secuirty) Management Tooling en services, like GDPR / AVG advise and Analitics, helpdesks/faciltyDesk setup.
Source: https://www.cbabenelux.com/pagina+18/about-us.html
CIOneer
IT Governance, Project Management, Process Optimization, Infrastructure, Applications, Information Security, Risk Management
In our team we have certified professionals in CGEIT (governance of enterprise IT), PRINCE2, and winners of the national Best CIO contest. Our core business is to help our customers to:
- Make money
- Save money
- Gain strategic advantage using technologies
- Manage IT risks
- Optimize future IT costs
Circadence
Circadence powered by a culture of innovation and the demands of an evolving cyber market.
Source: https://www.circadence.com/company/about/
Cloud MLM Software
CMMI Institute
Cofense
Compass Security AG
Compass Security AG is one of the most renowned penetration testing, forensics and ethical hacking companies in Switzerland and Germany. Their work and research gained international recognition. With Hacking-Lab, the flagship project of Compass Security, they provide the comprehensive attack/defense CTF system used by the European Cyber Security Challenge and others, for finding young cyber talents and for encouraging them to pursue a career in cyber security. Hands-on security trainings and experience is a key factor of their success. Compass Security means trust and confidence.
Source: https://www.compass-security.com/en/profile/company/
CompTIA
Context
Context is independently operated with FTSE250 backing.
Many of the world’s most successful organisations turn to company for advice, technical assurance, incident response and investigation services, because they believe Context sets the standards that others within the industry strive to follow. Context helped to establish CREST, helped to shape the development of the Bank of England's CBEST scheme and was one of the first companies to be certified as an approved supplier of the UK Government's Cyber Incident Response (CIR) Scheme.
Context is a leading cyber security consultancy with a comprehensive portfolio of cyber advisory and advanced technical services, including:
- Cyber strategy and cyber risk management
- Security architecture and design
- Threat assessment and management
- Penetration testing and assurance
- Red teaming
- Incident management and response
- Training and user awareness
- Product security evaluation
- Bespoke security research
The catalog of companies ROI4CIO is a database of suppliers, vendors and users of software, equipment and IT-services for business. By means of filters, find the IT vendor or the reseller by category of a product or availability of deals, the user - by branch and the sizes of the company. Add the company in the catalog, subscribe for updatings.