View

Sorting

Companies found: 87

Abusix, Inc.

All countries
Supplier, Vendor
00
Abusix, Inc. is a company of Internet security, network abuse handling, antispam and fraud specialists. Their mission is to help ISPs & Internet companies solving the rapidly growing problem of outgoing spam and all kind of other network abuse or security issues in a solid, accurate and reliable way. Abusix is providing network abuse handling & reporting, customized spamfeeds, consulting and cloud-based software/services against network abuse for ISPs, ESPs, technology providers, businesses and many more.

...Read more
0
0
0
0

ANGARA Technologies Group

RUS
Supplier, Vendor
10
Company ANGARA is a system integrator in the field of information security, specializing in:
  • providing control and monitoring of information security;
  • analytical processing information to improve management processes and improve the stability and security of the operation of information and technological infrastructures.
The mission of the company sees it, is to help as many as possible of their customers are not distracted by the threats and challenges of the digital world. We are ready to take care of the safety of their customers, allowing them to focus on their core, the primary task.
...Read more

ANYSOFT

UKR ...
Supplier
0
ANYSOFT is a 100% national licensed software provider based in Kiev. Our company is created by IT professionals. Our mission: to be a link between the manufacturer and the user, removing all barriers in the purchase and use of software products from around the world. As an official partner of many popular and highly specialized manufacturers we guarantee the authenticity of the products we supply. We make software available!
...Read more
0
0

APERIO Systems

ISR
Supplier, Vendor
00
APERIO Systems is a group of multidisciplinary researchers, engineers, thinkers and hackers. They are hands-on technologists who think fast and brainstorm original solutions whenever they are needed. Each member of their team has proven accomplishments in their domain of expertise, be it software engineering, machine learning, signal processing or cybersecurity. Aperio’s mission is to build solutions ensuring sensor data integrity for critical infrastructures & large scale Industrial facilities. Our Data Integrity AI engines authenticate the data provided by physical sensors in a plant and validate that it reflects the true state of the system. This translates to a very strong and unique value proposition for both cybersecurity, productivity, and safety. For cybersecurity in particular, Aperio is the only technology with a credible capability of preventing large scale, destructive cyber attacks against critical infrastructures. There is strong evidence that these types of attacks will increase dramatically in the coming years. Aperio was conceived in 2016 by cyber-security entrepreneurs who were looking to address the growing number of cyber-security attacks on critical infrastructure and industrial facilities. They came to the conclusion that the right approach was to begin by assuming the ‘worst case scenario’ - an intruder has gained access to the operational network and aims to cause severe or catastrophic damage. Attacks involving physical damage to assets and attacks aiming to systematically destroy many devices, require the attackers to work unnoticed and therefore include subtle ‘forging’ of data that is invisible to operators. It was these types of scenarios which was the background for founding Aperio. Source: https://www.aperio-systems.com/company
...Read more
0
0

Aplana. Development Center

RUS
Supplier, Vendor
Компания «Аплана. Центр Разработки» (Аплана. ЦР) создана в 2011 году на базе подразделения заказной разработки компании «Аплана Софтвер», работающего для крупных и средних российских компаний. Аплана. ЦР реализует комплексные решения по заказной разработке, построению и модернизации корпоративных информационных систем, разработке и внедрению бизнес приложений, созданию интеграционных и аналитических систем. Начало деятельности компании было положено в 2001 году, когда была образована компания «Аплана Софтвер». Аплана. ЦР входит в состав Группы компаний АйТи. yle="font-weight: bold;">Приоритетные направления деятельности компании:
  • Заказная разработка уникальных программных решений;
  • Корпоративные и информационные порталы;
  • Информационно-аналитические системы;
  • Интеграция приложений;
  • Электронный документооборот;
  • Решения на свободном ПО;
  • Сопровождение информационных систем и ИТ инфраструктуры;
  • Развитие собственной линейки тиражируемых решений;
  • Поставка программного обеспечения.
...Read more
0
0

Arctic Wolf Networks

All countries
Supplier, Vendor
00
Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity. The AWN CyberSOC service is anchored by Concierge Security teams who provide custom threat hunting, alerting, and reporting. Arctic Wolf’s purpose-built, cloud-based service offers 24x7 monitoring, vulnerability assessment, threat detection, and response.
Source: https://www.linkedin.com/company/arctic-wolf-networks/about/
...Read more
0
0
0
0

Assured Enterprise

All countries
Supplier, Vendor
00
Assured Enterprises provides expert cybersecurity assessments, consulting services and products. Our expertise in Analysis, Analytics, Design and Architecture allows us to provide tailored solutions to our clients and help them achieve sustained growth while protecting their most valuable assets.
...Read more
0
0

Astvision

MNG ...
Supplier, Vendor
00
Astvision has empowered developers to create innovative product and services.The Company’s core asset is team of young, talented and ambitious IT specialists with clear visionand capabilities of introducing latest technological developments and solutions into real-life.
...Read more
0
0
0
0

Bayshore Networks

USA
Supplier
0
Bayshore Networks is the cyber protection leader for the Industrial Internet of Things (IIoT). Bayshore Networks offers visibility, control, and protection for industrial Operational Technology, and transforms OT data for IT applications. Incorporating threat intelligence, and filtering open, standard, and proprietary protocols at a deep level, Bayshore parses OT protocol content and context, validating every command and parameter against logic-rich policies. Addressing zero-day, internal, and rapidly evolving threats, Bayshore can allow, alert, and/or enforce policy at line speed – allowing white-listed communication while blocking or modifying unauthorized communication and commands. Bayshore has strategic partnerships with leading technology companies including Yokogawa, SAP, Splunk, Cisco Systems, AT&T, and BAE Systems. Bayshore Networks, Inc. was founded in 2012 and is headquartered in Bethesda, Maryland. Source: https://www.linkedin.com/company/bayshore-networks/about/
...Read more
0

Beyond Security

All countries
Supplier, Vendor
00
Beyond Security is global leader in vulnerability assessment and compliance solutions - enabling businesses and governments to accurately assess and manage security weaknesses in their networks, applications, industrial systems and networked software. Product lines include:
  • beSECURE (formerly AVDS): network vulnerability management, web application testing and PCI compliance scanning
  • beSTORM: software security testing and black box fuzzing
  • beSOURCE: static application security testing (SAST)
Beyond Security's automated, accurate and simple tools protect the networks and software development life cycle of SMEs across the globe - including industry leaders in aerial and space warfare, banking and finance, media, software development, telecommunications, transportation and more.
Source: https://www.linkedin.com/company/beyond-security/about/
...Read more
0
0
0
0

Binary Defense

All countries
Supplier, Vendor
00

Binary Defense is the global leader in attack intelligence and advanced managed security solutions.


Binary Defense was spawned from the need for better monitoring and detection capabilities in companies. The founder of Binary Defense, David Kennedy, also founded TrustedSec which specializes in information security services including penetration testing. The cutting edge, white hat hackers noticed almost every organization with monitoring capabilities really struggled, especially when using an MSSP. Countless attacks went undetected, and breaches were missed which left companies wondering what to do.
As a result, Binary Defense was first put into motion in July of 2012 with the development of Managed Detection, Deception and Response software (Binary Defense Vision) based on profiling how attackers think. A number of years of development, marrying up attack intelligence with our extensive threat intelligence, has made company's product the best consolidation of technologies in the industry to predict, prevent, detect, deceive and respond to attacks.
Source: https://www.linkedin.com/company/binary-defense-systems/about/
...Read more
0
0

BlackStratus

All countries
Supplier, Vendor
00
BlackStratus is a leading provider of cloud-based security information and event management (SIEM) software solutions deployed and operated by '​'Security as a Service'​'​ (SECaaS) providers of all sizes, government agencies and individual enterprises.

Company's SIEM Storm technology is used by organizations worldwide to detect, prevent and defend against both major and minor IT security breaches from the end point to the data center, to the '​'Cloud.'​'​

The SIEM Storm technology delivers a correlated and centralized, real-time view of alerts, status messages and a variety of security events generated by disparate third-party security products (such as firewalls, anti-virus products, intrusion detection software, etc.), allowing security professionals to identify and stop potential threats in real time.

Specifically, this technology allows BlackStratus SECaaS partners to sell multiple types of cloud-based security services to their customers, including security event analysis and notifications about real-time threats to the customer's IT infrastructure, in addition to providing continuous and secure logging of all of their customer's security event data for compliance and audit purposes.
Source: https://www.linkedin.com/company/blackstratus-inc-/about/
...Read more
0
0

Bolton Labs (Bolton Secure)

All countries
Supplier, Vendor
00
Bolton Labs provides cybersecurity services, training, and tools to service providers and organizations who want to scale their security offerings. With a unique combination of best-of-breed technology and talent, Bolton Labs’ cloud-based SOC Enablement Platform delivers unrivaled flexibility, scalability, and cost savings to security teams around the world.  Bolton Labs next-generation delivery model gives complete transparency over the buildout and management of 24x7 functions that augment existing security investments and teams with highly skilled, hard to find talent.
Source: https://www.linkedin.com/company/bolton-labs/about/
...Read more
0
0
0
0

BugSec

All countries
Supplier, Vendor
00
BugSec is the strongest Israeli cyber consultancy and red-team services firm. Established in 2005 by noted Israeli ethical hacker Eyal Gruner, BugSec has assembled the best and brightest minds in Israeli cyberspace, including offensive and defensive cyber specialists.  Nowadays, BugSec group numbers over 70 experts, with hybrid capabilities in red teaming, hardware and application security, threat hunting and incident response. Its professionals have authored tools, challenges, testing methodologies and training programs. An important pillar of BugSec activity is research and development – its talented security researchers are engaged in the most complex nation-level projects for leading defense agencies in Israel and abroad. They have developed in-house security tools, researched vulnerabilities and detected zero-day exploits. BugSec customers span across 4 continents, including the most significant bodies in modern industry – financial institutes, critical infrastructure, hi-tech, defense, retail & e-commerce, telecom, etc.
...Read more
0
0
0
0

Bulletproof

All countries
Supplier, Vendor
00
Bulletproof information and cyber security services are the best way to stay ahead of the hackers, take control of your infrastructure and protect your business-critical data.

Bulletproofs staff are passionate and experienced in all areas of information security – and certified by the likes of CREST and Tigerscheme. Company also have a world-class infrastructure, with two PCI v3.2 compliant data centres and powerful SIEM software that was designed in-house.
One of the major factors to Bulletproofs success is their UK Security Operations Centre (SOC). This is an in-house facility, staffed every hour day and night by Bulletproofs cyber security gurus. The SOC acts as a command station for all companys security operations and, in the case of our Managed SIEM and Threat Protection services, are always geared up to deploy full incident management procedures, according to pre-defined runbooks, within moments of a security event being detected.
Source:https://www.bulletproof.co.uk/about
...Read more
0
0
0
0

CCVOSSEL GmbH

DEU
Supplier, Vendor
00
The name CCVOSSEL has stood for IT services of proven quality since 1996. With its experienced Berlin team and its high standards, CCVOSSEL looks after numerous customers from a wide variety of industries. Its offer ranges from software development and IT consulting to support and individual all-round solutions.
CCVOSSEL started small - as a sole proprietorship with a small team and small orders. But these soon expanded to include more extensive projects. In close cooperation with its customers, projects have turned into IT products and products into new possibilities. CCVOSSEL has grown from this as a team and as a company: At the beginning of 2013, it changed its name to CCVOSSEL GmbH.
...Read more
0
0
0
0

Claroty

All countries
Supplier, Vendor
Claroty’s mission is to protect industrial control networks from cyber-attacks; ensuring the safe and reliable operation of the world’s most critical infrastructures. Claroty enables customers to enjoy the substantial benefits of increasingly networked-control systems without compromising operational resiliency, personnel safety, or the security of core assets. Your result with Claroty: your cybersecurity and engineering teams are armed with a solution that gives them visibility and tells them exactly what is happening across your complex industrial control network. This means better security and reduced downtime, for your critical OT environments.
...Read more
0
0

CLLAX

USA
Supplier
0
Cllax - Advice, resources and tools for starting a small business. Information on getting finance, business planning, hiring, IT, marketing and much more.
...Read more
0
0

Cloud4Y

RUS
Supplier
0
Cloud4Y основана в 2009 году, мы пионеры облачных услуг среди российских провайдеров. Мы одни из лидеров отрасли — входим в ТОПы лучших поставщиков услуг IaaS и SaaS в России по версии Cnews и Tadvister. Предоставляем широкий спектр облачных услуг - IaaS (аренда облачной ИТ-инфраструктуры), SaaS (аренда ПО Microsoft, 1C и другое), BaaS (резервное копирование как услуга), DaaS (удаленный рабочий стол), Облако ФЗ-152 и Объектное хранилище S3. Наши преимущества: бесплатное резервное копирование во второй ЦОД, оптическое кольцо высокой доступности, SLA 99,982%, 10 лет экспертизы облачных решений, время ответа техподдержки - 10 минут.
...Read more

ColocationIX

DEU
Supplier, Vendor
00
ColocationIX GmbH is the operator of an innovative, ISO 27001-certified high-security data center in the "Medium data center" category. There is space for up to 50,000 servers on 2,500 square meters.
ColocationIX is a partner company of Consultix GmbH, Bremen. The owner-managed company is ISO 27001, ISO 9001, ISO 14001 and OHSAS 18001 Ecostep certified and has developed into a technology leader in the field of administration and management of personal data.
...Read more
0
0
0
0

The catalog of companies ROI4CIO is a database of suppliers, vendors and users of software, equipment and IT-services for business. By means of filters, find the IT vendor or the reseller by category of a product or availability of deals, the user - by branch and the sizes of the company. Add the company in the catalog, subscribe for updatings.