View

Sorting

Companies found: 70

2NS – Second Nature Security Oy

All countries
Supplier, Vendor
00
Second Nature Security Oy or 2NS is an independent and steadily growing Finnish cyber security enterprise. The elements of their operations are solid expertise and hacker-like know-how, which are guided by satisfied clients.
2NS operates as partners for their clients in the management of information security risks. Company's team helps clients to take care of their information security in a comprehensive manner, including both administrative and technical security.
Source: https://www.2ns.fi/en/company/
...Read more
0
0
0
0

8allocate

EST ...
Supplier, Vendor
00
Headquartered in Tallinn, Estonia, 8allocate is a company that is a software development outsourcing consultancy with an Offshore Development Center based in the heart of Kyiv, Ukraine. We provide scalable end-to-end software engineering solutions for companies around the world, from short- and mid-term fixed-price and T&M projects to extended/remote dedicated Agile teams. Regardless of your company size, project scope and budget, we treat all clients equally and guarantee that we’ll deliver on time, on budget, and with the highest possible quality of service. High-quality code is at the heart of each solution we deliver. Source: https://8allocate.com/about_us/
...Read more
0
0

A-LIGN

All countries
Supplier, Vendor
00
A-LIGN is a global cybersecurity and compliance solutions provider based out of Tampa, Florida that specializes in helping businesses across a variety of industries navigate the complexities of their specific audit and security assessment needs to prevent cyber threats and reduce risk, turning their security into a competitive edge.
Founded by former “Big 4” executives and security specialists, A-LIGN is dedicated to making the security and compliance process as seamless and efficient by offering a one-stop-shop.
...Read more
0
0
0
0

AccessData

All countries
Vendor
0
AccessData Group has pioneered digital forensics and litigation support for more than thirty years. Over that time, the company has grown to provide both stand-alone and enterprise-class solutions that can synergistically work together to enable both criminal and civil investigations, including digital forensics, incident response, legal review, compliance, auditing and information assurance. More than 130,000 customers in law enforcement, government agencies, corporations and law firms around the world rely on AccessData software solutions, and its premier digital investigations products and services.
Source: https://www.linkedin.com/company/accessdata/about/
...Read more
0

Antago GmbH

All countries
Supplier, Vendor
00
For more than 10 years, Antago has been offering its customers excellent consulting and analytics on information security.
Antago is independent of manufacturers and system manufacturers from the very beginning - they do not sell any software or hardware.
With extensive security knowledge and current market knowledge, Antago supports companies from industry and commerce, as well as banks and insurance companies, offices and authorities, as well as clinics and medical facilities. Regardless of manufacturers and solutions, objectively and at the highest level.
...Read more
0
0
0
0

Aplana. Development Center

RUS
Supplier, Vendor
Компания «Аплана. Центр Разработки» (Аплана. ЦР) создана в 2011 году на базе подразделения заказной разработки компании «Аплана Софтвер», работающего для крупных и средних российских компаний. Аплана. ЦР реализует комплексные решения по заказной разработке, построению и модернизации корпоративных информационных систем, разработке и внедрению бизнес приложений, созданию интеграционных и аналитических систем. Начало деятельности компании было положено в 2001 году, когда была образована компания «Аплана Софтвер». Аплана. ЦР входит в состав Группы компаний АйТи. Приоритетные направления деятельности компании:
  • Заказная разработка уникальных программных решений;
  • Корпоративные и информационные порталы;
  • Информационно-аналитические системы;
  • Интеграция приложений;
  • Электронный документооборот;
  • Решения на свободном ПО;
  • Сопровождение информационных систем и ИТ инфраструктуры;
  • Развитие собственной линейки тиражируемых решений;
  • Поставка программного обеспечения.
...Read more
0
0

atsec information security GmbH

All countries
Supplier, Vendor
00
atsec is an independent, information security consulting, Common Criteria and FIPS 140-2 evaluation services company that combines a business-oriented approach to information security with in-depth technical knowledge and global experience.
Since January 2000 atsec has grown into an international company with offices in the United States, Europe and Asia.
Source: https://www.atsec.com/company/company-history/index.html
...Read more
0
0
0
0

Auxilium Cyber Security GmbH

All countries
Supplier, Vendor
00
Auxilium Cyber Security GmbH is independent information security consultancy company focusing mainly on the following topics:

  • Consulting, design and implementation of information security strategies following recognized standards including ISO27000, NIST Cybersecurity Framework or PCI-DSS.
  • Vulnerability assessments and penetration testing of existing infrastructure with main focus on complete web application testing according to the OWASP Testing Guide and embedded systems testing. Company also helps you establish security coding guidelines and train your developers to follow them in order to produce more secure code.
  • Threat intelligence research on emerging threats - especially malware (including darknet malware marketplaces monitoring).
  • Design and implementation of efficient information security awareness campaigns.

Source: https://www.linkedin.com/company/auxilium-cyber-security/about/
...Read more
0
0
0
0

BEAM Technology

All countries
Supplier, Vendor
00
BEAM Technology has been founded with Ministry of Industry’s Tech-Entrepreneurship Fund stated as “Software Quality and Security Testing Center” on April 2011 in Turkey With its expert staff participated in many National and International projects successfully, BEAM Technology is now devoting its know-how and experience to an independent testing center that IT sector is lacking. With the vendor-independent nature it has; BEAM Technology’s main focus is to provide quality and security needs of its customers. BEAM Technology, according to its vision and mission, is aiming to build partnerships with the development companies to improve their ability to compete in both national and international market with qualified products developed with lower costs.
Source: https://www.beamteknoloji.com/en/about-us/
...Read more
0
0
0
0

borwell ltd

All countries
Supplier, Vendor
00
The borwell team delivers software and IT solutions to the UK MoD and to UK Government departments, which are secure by design.  The team also works for NATO, the EDA and other similar organisations.

Established in 2003, the business has a wealth of experience delivering high quality, reliable and secure software solutions.  Team has become a trusted software and cyber security delivery partner for a number of organisations, and recently won an MoD award for a software project that supported the London 2012 Olympic Games.

The team also supports UK corporations and mainly medium sized SMEs.  Well designed custom software and database solutions, coupled with cyber security advice and consulting and data diode product, help keep valuable data and systems secure for these important clients.

Source: https://www.linkedin.com/company/borwell/about/
...Read more
0
0
0
0

CIOneer

All countries
Supplier, Vendor
00
We are a group of 7 CIOs (Chief Information Officer), IT directors and business advisors working in Europe, the UK and Asia with solid experience in:
IT Governance, Project Management, Process Optimization, Infrastructure, Applications, Information Security, Risk Management
In our team we have certified professionals in CGEIT (governance of enterprise IT), PRINCE2, and winners of the national Best CIO contest. Our core business is to help our customers to:
  • Make money
  • Save money
  • Gain strategic advantage using technologies
  • Manage IT risks
  • Optimize future IT costs
...Read more
0
0

Cloud MLM Software

IND ...
Supplier, Vendor
00
Cloud MLM Software is one of the best Multilevel marketing software with unlimited customizations. Cloud MLM Software comes with an application programming interface (API) that enables companies to integrate the system with third-party E-Commerce sites, such as OpenCart, Magento and more. pricing is available on request and technical support is extended via phone, email, live chat and other online steps. Features of cloud MLM software E-commerce Integration SMS Integration Commission Management Genealogy Tree Order Management Reports & Analytics Replicated Website Ticket Management Distributor Management Multi-Currency Payment Processing Shipping Management
...Read more
0
0
0
0

Coalfire

All countries
Supplier, Vendor
00
Coalfire is the cybersecurity advisor that helps private and public sector organizations avert threats, close gaps, and effectively manage risk. By providing independent and tailored advice, assessments, technical testing, and cyber engineering services, we help clients develop scalable programs that improve their security posture, achieve their business objectives, and fuel their continued success. Coalfire has been a cybersecurity thought leader for more than 16 years and has offices throughout the United States and Europe.
Source: https://www.linkedin.com/company/coalfire-systems-inc-/about/
...Read more
0
0
0
0

Compass Security AG

All countries
Supplier, Vendor
00
Ethical Hacking and Penetration Testing, Forensics, provider of Hacking-Lab with strong research capabilities, based in Switzerland and Germany.
Compass Security AG
is one of the most renowned penetration testing, forensics and ethical hacking companies in Switzerland and Germany. Their work and research gained international recognition. With Hacking-Lab, the flagship project of Compass Security, they provide the comprehensive attack/defense CTF system used by the European Cyber Security Challenge and others, for finding young cyber talents and for encouraging them to pursue a career in cyber security. Hands-on security trainings and experience is a key factor of their success. Compass Security means trust and confidence.
Source: https://www.compass-security.com/en/profile/company/
...Read more
0
0
0
0

Context

All countries
Supplier, Vendor
00
Since 1998, Context has been supporting businesses and organisations to meet their ever evolving information security challenges and deal with cyber threats.
Context is independently operated with FTSE250 backing.
Many of the world’s most successful organisations turn to company for advice, technical assurance, incident response and investigation services, because they believe Context sets the standards that others within the industry strive to follow. Context helped to establish CREST, helped to shape the development of the Bank of England's CBEST scheme and was one of the first companies to be certified as an approved supplier of the UK Government's Cyber Incident Response (CIR) Scheme.
Context is a leading cyber security consultancy with a comprehensive portfolio of cyber advisory and advanced technical services, including:
  • Cyber strategy and cyber risk management
  • Security architecture and design
  • Threat assessment and management
  • Penetration testing and assurance
  • Red teaming
  • Incident management and response
  • Training and user awareness
  • Product security evaluation
  • Bespoke security research
Source: https://www.contextis.com/en/about-us
...Read more
0
0
0
0

ControlScan

All countries
Supplier, Vendor
00
Securing businesses since 2005, ControlScan is constantly innovating to offer cost-effective solutions that successfully meet the challenges of an evolving threat landscape.

ControlScan mission is to let nothing block your path to a strong security posture. Not budgetary restrictions, not a lack of expertise, and not human resource constraints.

They are managed security and compliance service provider with highly-credentialed experts; 24x7 managed detection and response; advanced endpoint protection; managed UTM firewall services; ASV vulnerability scanning; security penetration testing; PCI compliance programs; QSA, P2PE, PIN and HIPAA assessments.

Source: https://www.linkedin.com/company/controlscan/about/
...Read more
0
0

Cronus Cyber Technologies

All countries
Supplier, Vendor
00
Cronus Cyber Technologies is a global provider of Automated Penetration Testing solutions called CyBot. CyBot provides a live map of validated Attack Path Scenarios on a global scale so you can efficiently focus on the vulnerabilities that threaten your core business process.

Visualize your entire network, both local and global in one map and see your vulnerabilities with your own eyes. Gain business insights and save millions by preventing the next attack.

By deploying Cronus technology, enterprises can accurately evaluate their resiliency against cyber threats; and proactively adjust their security protection strategies to mitigate the risks. When deployed in global, multi-site enterprises, information can even be shared across sites to depict global attack path scenarios.

Source: https://www.linkedin.com/company/cronus-cyber-technologies/about/
...Read more
0
0

Cyberhaven

All countries
Supplier, Vendor
00
Founded in 2016 by a group of accomplished security researchers, Cyberhaven is based in Palo Alto, CA with offices in Boston, MA and Lausanne, Switzerland.
Cyberhaven provides data tracing technology that reconstructs data flows in order to automatically identify and secure all critical assets within an enterprise. The company is driven by a mission to bring radical simplicity to enterprise security.

...Read more
0
0
0
0

CyDIS Cyber Defense and Information Security GmbH

All countries
Supplier, Vendor
00
Founded in 2017 as a joint venture between Corporate Trust Business Risk & Crisis Management GmbH and IS4IT GmbH, CyDIS is a young, innovative startup company based in Oberhaching, right in the Munich high-tech environment. Thanks to this strong foundation, CyDIS is growing quickly and solidly, implementing new product ideas quickly and offering a modern working environment with attractive prospects for its employees.
CyDIS offer you high-quality cyber security services at unbeatable conditions - as a service, pay per use.
CyDIS provides cyber scorings. These scorings are refering to an Outside-In analysis of a company based on public information. This involves collecting and consolidating information about the IT security of the target company that is publically accessible through the Internet and transforming the ndings into a risk presentation.

...Read more
0
0
0
0

Digital Business

RUS ...
Supplier, Vendor
00

Внедреям и дорабатываем CRM-системы, такие как Bitrix24, AmoCRM, Reatail CRM, Terrasoft.

  • Адаптируем систему под бизнес-процессы компании
  • Подключаем сайт, IP телефонию, соц.сети, мессенджеры
  • Интегрируем облачные сервисы между собой
  • Подключаем сервисы рекламной аналитики, RoiStat и Comagic
  • Выгружем данные и создаем отчеты в PowerBI
  • Разрабатываем виджеты, при отсутствии стандартных решений
  • Создаем продукты:
    • Готовим бизнес требования, функциональные требования-
    • Проектируем UX/UI дизайн
    • Разрабатываем архитектуру решения
    • Кодируем
...Read more
0
0
0
0

The catalog of companies ROI4CIO is a database of suppliers, vendors and users of software, equipment and IT-services for business. By means of filters, find the IT vendor or the reseller by category of a product or availability of deals, the user - by branch and the sizes of the company. Add the company in the catalog, subscribe for updatings.