View

Sorting

Companies found: 89

Abusix, Inc.

All countries
Supplier, Vendor
00
Abusix, Inc. is a company of Internet security, network abuse handling, antispam and fraud specialists. Their mission is to help ISPs & Internet companies solving the rapidly growing problem of outgoing spam and all kind of other network abuse or security issues in a solid, accurate and reliable way. Abusix is providing network abuse handling & reporting, customized spamfeeds, consulting and cloud-based software/services against network abuse for ISPs, ESPs, technology providers, businesses and many more.

...Read more
0
0
0
0

ANGARA Technologies Group

RUS
Supplier, Vendor
10
Company ANGARA is a system integrator in the field of information security, specializing in:
  • providing control and monitoring of information security;
  • analytical processing information to improve management processes and improve the stability and security of the operation of information and technological infrastructures.
The mission of the company sees it, is to help as many as possible of their customers are not distracted by the threats and challenges of the digital world. We are ready to take care of the safety of their customers, allowing them to focus on their core, the primary task.
...Read more

APCON

All countries
Vendor
0
APCON is a pioneer in the field of flexible network visibility solutions. APCON products play a key role in ensuring that data networks across the globe remain secure and fully operational – around the clock, without fail – including those that support online banking, stock trades, shopping, video streams, media downloads, and more.
APCON is based in Wilsonville, Oregon, with a regional center in Plano, Texas and employees located throughout the United States, in Europe and Asia.
Source: https://www.linkedin.com/company/apcon/about/
...Read more
0

APERIO Systems

ISR
Supplier, Vendor
00
APERIO Systems is a group of multidisciplinary researchers, engineers, thinkers and hackers. They are hands-on technologists who think fast and brainstorm original solutions whenever they are needed. Each member of their team has proven accomplishments in their domain of expertise, be it software engineering, machine learning, signal processing or cybersecurity. Aperio’s mission is to build solutions ensuring sensor data integrity for critical infrastructures & large scale Industrial facilities. Our Data Integrity AI engines authenticate the data provided by physical sensors in a plant and validate that it reflects the true state of the system. This translates to a very strong and unique value proposition for both cybersecurity, productivity, and safety. For cybersecurity in particular, Aperio is the only technology with a credible capability of preventing large scale, destructive cyber attacks against critical infrastructures. There is strong evidence that these types of attacks will increase dramatically in the coming years. Aperio was conceived in 2016 by cyber-security entrepreneurs who were looking to address the growing number of cyber-security attacks on critical infrastructure and industrial facilities. They came to the conclusion that the right approach was to begin by assuming the ‘worst case scenario’ - an intruder has gained access to the operational network and aims to cause severe or catastrophic damage. Attacks involving physical damage to assets and attacks aiming to systematically destroy many devices, require the attackers to work unnoticed and therefore include subtle ‘forging’ of data that is invisible to operators. It was these types of scenarios which was the background for founding Aperio. Source: https://www.aperio-systems.com/company
...Read more
0
0

Aplana. Development Center

RUS
Supplier, Vendor
Компания «Аплана. Центр Разработки» (Аплана. ЦР) создана в 2011 году на базе подразделения заказной разработки компании «Аплана Софтвер», работающего для крупных и средних российских компаний. Аплана. ЦР реализует комплексные решения по заказной разработке, построению и модернизации корпоративных информационных систем, разработке и внедрению бизнес приложений, созданию интеграционных и аналитических систем. Начало деятельности компании было положено в 2001 году, когда была образована компания «Аплана Софтвер». Аплана. ЦР входит в состав Группы компаний АйТи. Приоритетные направления деятельности компании:
  • Заказная разработка уникальных программных решений;
  • Корпоративные и информационные порталы;
  • Информационно-аналитические системы;
  • Интеграция приложений;
  • Электронный документооборот;
  • Решения на свободном ПО;
  • Сопровождение информационных систем и ИТ инфраструктуры;
  • Развитие собственной линейки тиражируемых решений;
  • Поставка программного обеспечения.
...Read more
0
0

Arctic Wolf Networks

All countries
Supplier, Vendor
00
Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity. The AWN CyberSOC service is anchored by Concierge Security teams who provide custom threat hunting, alerting, and reporting. Arctic Wolf’s purpose-built, cloud-based service offers 24x7 monitoring, vulnerability assessment, threat detection, and response.
Source: https://www.linkedin.com/company/arctic-wolf-networks/about/
...Read more
0
0
0
0

Assured Enterprise

All countries
Supplier, Vendor
00
Assured Enterprises provides expert cybersecurity assessments, consulting services and products. Our expertise in Analysis, Analytics, Design and Architecture allows us to provide tailored solutions to our clients and help them achieve sustained growth while protecting their most valuable assets.
...Read more
0
0

Astvision

MNG ...
Supplier, Vendor
00
Astvision has empowered developers to create innovative product and services.The Company’s core asset is team of young, talented and ambitious IT specialists with clear visionand capabilities of introducing latest technological developments and solutions into real-life.
...Read more
0
0
0
0

Barracuda Networks

All countries
Vendor
Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.

The company develops products for security, networking and storage based on network devices and cloud services. Security products include solutions to protect against spam, web surfing, hackers and threats from instant messaging services. The platform also successfully combats such threats as spam, spyware, Trojans and other malware. Barracuda solutions provide web traffic filtering, load balancing, message archiving, backup services, data protection, and more.

Today, more than 50,000 companies and security organizations around the world use Barracuda Networks solutions. The main product list includes solutions such as Barracuda Spam Firewall, Barracuda Web Filter, Barracuda IM Firewall.
...Read more

Bayshore Networks

USA
Supplier, Vendor
00
Bayshore Networks is the cyber protection leader for the Industrial Internet of Things (IIoT). Bayshore's policy-based Gateway enables applications for IoT platforms. Bayshore Networks provides the option of active policy enforcement through Pallaton Policy Enforcement Engine. This patented technology can actively prevent risk activities from disrupting production, incurring downtime costs, and damaging equipment. Built by Bayshore OT experts and designed for the plant environment, goal is to keep the OT environment safe and productive.

Bayshore supports a wide, growing range of OT (as well as IT) protocols, which are required to protect the production environment.
Bayshore’s powerful Learning Engine establishes baseline behaviors among the industrial assets in the OT network, creating a whitelist of normal or approved applications. The Learning Engine automatically generates policies designed to protect industrial infrastructure.
Bayshore’s Pallaton Policy Enforcement Engine enforces both whitelisting (out-of-the-box, Learning Engine generated, or manually crafted) and blacklisting (based on threat intelligence and known exploits) policies. Because the Bayshore solution can be deployed in-line, it can prevent unwanted traffic from interfering with a protected OT environment (in addition to providing alerts). Bayshore Networks offers visibility, control, and protection for industrial Operational Technology, and transforms OT data for IT applications. Incorporating threat intelligence, and filtering open, standard, and proprietary protocols at a deep level, Bayshore parses OT protocol content and context, validating every command and parameter against logic-rich policies. Addressing zero-day, internal, and rapidly evolving threats, Bayshore can allow, alert, and/or enforce policy at line speed – allowing white-listed communication while blocking or modifying unauthorized communication and commands. Bayshore has strategic partnerships with leading technology companies including Yokogawa, SAP, Splunk, Cisco Systems, AT&T, and BAE Systems. Bayshore Networks, Inc. was founded in 2012 and is headquartered in Bethesda, Maryland. Source: https://www.linkedin.com/company/bayshore-networks/about/
...Read more
0
0

Beyond Security

All countries
Supplier, Vendor
00
Beyond Security is global leader in vulnerability assessment and compliance solutions - enabling businesses and governments to accurately assess and manage security weaknesses in their networks, applications, industrial systems and networked software. Product lines include:
  • beSECURE (formerly AVDS): network vulnerability management, web application testing and PCI compliance scanning
  • beSTORM: software security testing and black box fuzzing
  • beSOURCE: static application security testing (SAST)
Beyond Security's automated, accurate and simple tools protect the networks and software development life cycle of SMEs across the globe - including industry leaders in aerial and space warfare, banking and finance, media, software development, telecommunications, transportation and more.
Source: https://www.linkedin.com/company/beyond-security/about/
...Read more
0
0
0
0

Binary Defense

All countries
Supplier, Vendor
00

Binary Defense is the global leader in attack intelligence and advanced managed security solutions.


Binary Defense was spawned from the need for better monitoring and detection capabilities in companies. The founder of Binary Defense, David Kennedy, also founded TrustedSec which specializes in information security services including penetration testing. The cutting edge, white hat hackers noticed almost every organization with monitoring capabilities really struggled, especially when using an MSSP. Countless attacks went undetected, and breaches were missed which left companies wondering what to do.
As a result, Binary Defense was first put into motion in July of 2012 with the development of Managed Detection, Deception and Response software (Binary Defense Vision) based on profiling how attackers think. A number of years of development, marrying up attack intelligence with our extensive threat intelligence, has made company's product the best consolidation of technologies in the industry to predict, prevent, detect, deceive and respond to attacks.
Source: https://www.linkedin.com/company/binary-defense-systems/about/
...Read more
0
0

BlackStratus

All countries
Supplier, Vendor
00
BlackStratus is a leading provider of cloud-based security information and event management (SIEM) software solutions deployed and operated by '​'Security as a Service'​'​ (SECaaS) providers of all sizes, government agencies and individual enterprises.

Company's SIEM Storm technology is used by organizations worldwide to detect, prevent and defend against both major and minor IT security breaches from the end point to the data center, to the '​'Cloud.'​'​

The SIEM Storm technology delivers a correlated and centralized, real-time view of alerts, status messages and a variety of security events generated by disparate third-party security products (such as firewalls, anti-virus products, intrusion detection software, etc.), allowing security professionals to identify and stop potential threats in real time.

Specifically, this technology allows BlackStratus SECaaS partners to sell multiple types of cloud-based security services to their customers, including security event analysis and notifications about real-time threats to the customer's IT infrastructure, in addition to providing continuous and secure logging of all of their customer's security event data for compliance and audit purposes.
Source: https://www.linkedin.com/company/blackstratus-inc-/about/
...Read more
0
0

Bolton Labs (Bolton Secure)

All countries
Supplier, Vendor
00
Bolton Labs provides cybersecurity services, training, and tools to service providers and organizations who want to scale their security offerings. With a unique combination of best-of-breed technology and talent, Bolton Labs’ cloud-based SOC Enablement Platform delivers unrivaled flexibility, scalability, and cost savings to security teams around the world.  Bolton Labs next-generation delivery model gives complete transparency over the buildout and management of 24x7 functions that augment existing security investments and teams with highly skilled, hard to find talent.
Source: https://www.linkedin.com/company/bolton-labs/about/
...Read more
0
0
0
0

Botstatz

IND ...
Vendor
0
Botstatz  is an Enterprise Automation Platform that enables organizations to scale, optimize and efficiently manage their automation programs. Botstatz  is a team of motivated and passionate entrepreneurs with a vision is to be leaders in automation. Their hands-on experience in scaling automation programs has strengthened our capabilities in understanding and imparting in-depth solutions for practical challenges faced by organizations. Being Global Automation Catalyst and an Enterprise Automation Platform, company is built on concepts of Accuracy, Agility, Sustainability, Usability and Scalability.
Companys aim is to streamline an automation program for conducive outcomes. Their team is highly experienced in setting up Automation Centers of Excellence (CoE) for global organizations. They have the perfect mix of strategy, leadership and domain experience that helps us carve a niche space for themselves in this highly competitive market. Botstatz has served clients and established credibility across industries. Retail, FMCG, Securities and Financial services to name a few.
Source: https://www.botstatz.com/about-us/
...Read more
0
0

BugSec

All countries
Supplier, Vendor
00
BugSec is the strongest Israeli cyber consultancy and red-team services firm. Established in 2005 by noted Israeli ethical hacker Eyal Gruner, BugSec has assembled the best and brightest minds in Israeli cyberspace, including offensive and defensive cyber specialists.  Nowadays, BugSec group numbers over 70 experts, with hybrid capabilities in red teaming, hardware and application security, threat hunting and incident response. Its professionals have authored tools, challenges, testing methodologies and training programs. An important pillar of BugSec activity is research and development – its talented security researchers are engaged in the most complex nation-level projects for leading defense agencies in Israel and abroad. They have developed in-house security tools, researched vulnerabilities and detected zero-day exploits. BugSec customers span across 4 continents, including the most significant bodies in modern industry – financial institutes, critical infrastructure, hi-tech, defense, retail & e-commerce, telecom, etc.
...Read more
0
0
0
0

Bulletproof

All countries
Supplier, Vendor
00
Bulletproof information and cyber security services are the best way to stay ahead of the hackers, take control of your infrastructure and protect your business-critical data.

Bulletproofs staff are passionate and experienced in all areas of information security – and certified by the likes of CREST and Tigerscheme. Company also have a world-class infrastructure, with two PCI v3.2 compliant data centres and powerful SIEM software that was designed in-house.
One of the major factors to Bulletproofs success is their UK Security Operations Centre (SOC). This is an in-house facility, staffed every hour day and night by Bulletproofs cyber security gurus. The SOC acts as a command station for all companys security operations and, in the case of our Managed SIEM and Threat Protection services, are always geared up to deploy full incident management procedures, according to pre-defined runbooks, within moments of a security event being detected.
Source:https://www.bulletproof.co.uk/about
...Read more
0
0
0
0

CCVOSSEL GmbH

DEU
Supplier, Vendor
00
The name CCVOSSEL has stood for IT services of proven quality since 1996. With its experienced Berlin team and its high standards, CCVOSSEL looks after numerous customers from a wide variety of industries. Its offer ranges from software development and IT consulting to support and individual all-round solutions.
CCVOSSEL started small - as a sole proprietorship with a small team and small orders. But these soon expanded to include more extensive projects. In close cooperation with its customers, projects have turned into IT products and products into new possibilities. CCVOSSEL has grown from this as a team and as a company: At the beginning of 2013, it changed its name to CCVOSSEL GmbH.
...Read more
0
0
0
0

Claroty

All countries
Supplier, Vendor
Claroty is the industrial cybersecurity company. Trusted by the world’s largest enterprises, Claroty helps customers reveal, protect, and manage their OT, IoT, and IIoT assets. The company’s comprehensive platform connects seamlessly with customers’ existing infrastructure and programs while providing a full range of industrial cybersecurity controls for visibility, threat detection, risk and vulnerability management, and secure remote access — all with a significantly reduced total cost of ownership.

Claroty is backed and adopted by leading industrial automation vendors, with an expansive partner ecosystem and award-winning research team. The company is headquartered in New York City and has a presence in Europe, Asia-Pacific, and Latin America, and deployments on all seven continents.

The Claroty Platform delivers the range of industrial cybersecurity controls in a single solution that deploys painlessly and integrates seamlessly with your existing infrastructure.

The foundation of the Claroty platform, Continuous Threat Detection (CTD) delivers asset discovery, risk and vulnerability management, and threat detection coverage for industrial networks. These capabilities will empower to reveal and protect OT, IoT, and IIoT assets and identify and respond to the earliest indicators of known and emerging threats to those assets and the critical processes they underpin.
...Read more
0
0

Cloud MLM Software

IND ...
Supplier, Vendor
00
Cloud MLM Software is one of the best Multilevel marketing software with unlimited customizations. Cloud MLM Software comes with an application programming interface (API) that enables companies to integrate the system with third-party E-Commerce sites, such as OpenCart, Magento and more. pricing is available on request and technical support is extended via phone, email, live chat and other online steps. Features of cloud MLM software E-commerce Integration SMS Integration Commission Management Genealogy Tree Order Management Reports & Analytics Replicated Website Ticket Management Distributor Management Multi-Currency Payment Processing Shipping Management
...Read more
0
0
0
0

The catalog of companies ROI4CIO is a database of suppliers, vendors and users of software, equipment and IT-services for business. By means of filters, find the IT vendor or the reseller by category of a product or availability of deals, the user - by branch and the sizes of the company. Add the company in the catalog, subscribe for updatings.