View

Sorting

Companies found: 74

Abusix, Inc.

All countries
Supplier, Vendor
00
Abusix, Inc. is a company of Internet security, network abuse handling, antispam and fraud specialists. Their mission is to help ISPs & Internet companies solving the rapidly growing problem of outgoing spam and all kind of other network abuse or security issues in a solid, accurate and reliable way. Abusix is providing network abuse handling & reporting, customized spamfeeds, consulting and cloud-based software/services against network abuse for ISPs, ESPs, technology providers, businesses and many more.

...Read more
0
0
0
0

ANGARA Technologies Group

RUS
Supplier, Vendor
10
Company ANGARA is a system integrator in the field of information security, specializing in:
  • providing control and monitoring of information security;
  • analytical processing information to improve management processes and improve the stability and security of the operation of information and technological infrastructures.
The mission of the company sees it, is to help as many as possible of their customers are not distracted by the threats and challenges of the digital world. We are ready to take care of the safety of their customers, allowing them to focus on their core, the primary task.
...Read more

APCON

All countries
Vendor
0
APCON is a pioneer in the field of flexible network visibility solutions. APCON products play a key role in ensuring that data networks across the globe remain secure and fully operational – around the clock, without fail – including those that support online banking, stock trades, shopping, video streams, media downloads, and more.
APCON is based in Wilsonville, Oregon, with a regional center in Plano, Texas and employees located throughout the United States, in Europe and Asia.
Source: https://www.linkedin.com/company/apcon/about/
...Read more
0

APERIO Systems

ISR
Supplier, Vendor
00
APERIO Systems is a group of multidisciplinary researchers, engineers, thinkers and hackers. They are hands-on technologists who think fast and brainstorm original solutions whenever they are needed. Each member of their team has proven accomplishments in their domain of expertise, be it software engineering, machine learning, signal processing or cybersecurity. Aperio’s mission is to build solutions ensuring sensor data integrity for critical infrastructures & large scale Industrial facilities. Our Data Integrity AI engines authenticate the data provided by physical sensors in a plant and validate that it reflects the true state of the system. This translates to a very strong and unique value proposition for both cybersecurity, productivity, and safety. For cybersecurity in particular, Aperio is the only technology with a credible capability of preventing large scale, destructive cyber attacks against critical infrastructures. There is strong evidence that these types of attacks will increase dramatically in the coming years. Aperio was conceived in 2016 by cyber-security entrepreneurs who were looking to address the growing number of cyber-security attacks on critical infrastructure and industrial facilities. They came to the conclusion that the right approach was to begin by assuming the ‘worst case scenario’ - an intruder has gained access to the operational network and aims to cause severe or catastrophic damage. Attacks involving physical damage to assets and attacks aiming to systematically destroy many devices, require the attackers to work unnoticed and therefore include subtle ‘forging’ of data that is invisible to operators. It was these types of scenarios which was the background for founding Aperio. Source: https://www.aperio-systems.com/company
...Read more
0
0

Aplana. Development Center

RUS
Supplier, Vendor
Компания «Аплана. Центр Разработки» (Аплана. ЦР) создана в 2011 году на базе подразделения заказной разработки компании «Аплана Софтвер», работающего для крупных и средних российских компаний. Аплана. ЦР реализует комплексные решения по заказной разработке, построению и модернизации корпоративных информационных систем, разработке и внедрению бизнес приложений, созданию интеграционных и аналитических систем. Начало деятельности компании было положено в 2001 году, когда была образована компания «Аплана Софтвер». Аплана. ЦР входит в состав Группы компаний АйТи. yle="font-weight: bold;">Приоритетные направления деятельности компании:
  • Заказная разработка уникальных программных решений;
  • Корпоративные и информационные порталы;
  • Информационно-аналитические системы;
  • Интеграция приложений;
  • Электронный документооборот;
  • Решения на свободном ПО;
  • Сопровождение информационных систем и ИТ инфраструктуры;
  • Развитие собственной линейки тиражируемых решений;
  • Поставка программного обеспечения.
...Read more
0
0

Arctic Wolf Networks

All countries
Supplier, Vendor
00
Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity. The AWN CyberSOC service is anchored by Concierge Security teams who provide custom threat hunting, alerting, and reporting. Arctic Wolf’s purpose-built, cloud-based service offers 24x7 monitoring, vulnerability assessment, threat detection, and response.
Source: https://www.linkedin.com/company/arctic-wolf-networks/about/
...Read more
0
0
0
0

Assured Enterprise

All countries
Supplier, Vendor
00
Assured Enterprises provides expert cybersecurity assessments, consulting services and products. Our expertise in Analysis, Analytics, Design and Architecture allows us to provide tailored solutions to our clients and help them achieve sustained growth while protecting their most valuable assets.
...Read more
0
0

Astvision

MNG ...
Supplier, Vendor
00
Astvision has empowered developers to create innovative product and services.The Company’s core asset is team of young, talented and ambitious IT specialists with clear visionand capabilities of introducing latest technological developments and solutions into real-life.
...Read more
0
0
0
0

Barracuda Networks

All countries
Vendor
Barracuda Networks, Inc. is a company providing security, networking and storage products based on network appliances and cloud services. The company's security products include products for protection against email, web surfing, web hackers and instant messaging threats such as spam, spyware, trojans, and viruses. The company's networking and storage products include web filtering, load balancing, application delivery controllers, message archiving, NG firewalls, backup services and data protection.
...Read more

Beyond Security

All countries
Supplier, Vendor
00
Beyond Security is global leader in vulnerability assessment and compliance solutions - enabling businesses and governments to accurately assess and manage security weaknesses in their networks, applications, industrial systems and networked software. Product lines include:
  • beSECURE (formerly AVDS): network vulnerability management, web application testing and PCI compliance scanning
  • beSTORM: software security testing and black box fuzzing
  • beSOURCE: static application security testing (SAST)
Beyond Security's automated, accurate and simple tools protect the networks and software development life cycle of SMEs across the globe - including industry leaders in aerial and space warfare, banking and finance, media, software development, telecommunications, transportation and more.
Source: https://www.linkedin.com/company/beyond-security/about/
...Read more
0
0
0
0

Binary Defense

All countries
Supplier, Vendor
00

Binary Defense is the global leader in attack intelligence and advanced managed security solutions.


Binary Defense was spawned from the need for better monitoring and detection capabilities in companies. The founder of Binary Defense, David Kennedy, also founded TrustedSec which specializes in information security services including penetration testing. The cutting edge, white hat hackers noticed almost every organization with monitoring capabilities really struggled, especially when using an MSSP. Countless attacks went undetected, and breaches were missed which left companies wondering what to do.
As a result, Binary Defense was first put into motion in July of 2012 with the development of Managed Detection, Deception and Response software (Binary Defense Vision) based on profiling how attackers think. A number of years of development, marrying up attack intelligence with our extensive threat intelligence, has made company's product the best consolidation of technologies in the industry to predict, prevent, detect, deceive and respond to attacks.
Source: https://www.linkedin.com/company/binary-defense-systems/about/
...Read more
0
0

BlackStratus

All countries
Supplier, Vendor
00
BlackStratus is a leading provider of cloud-based security information and event management (SIEM) software solutions deployed and operated by '​'Security as a Service'​'​ (SECaaS) providers of all sizes, government agencies and individual enterprises.

Company's SIEM Storm technology is used by organizations worldwide to detect, prevent and defend against both major and minor IT security breaches from the end point to the data center, to the '​'Cloud.'​'​

The SIEM Storm technology delivers a correlated and centralized, real-time view of alerts, status messages and a variety of security events generated by disparate third-party security products (such as firewalls, anti-virus products, intrusion detection software, etc.), allowing security professionals to identify and stop potential threats in real time.

Specifically, this technology allows BlackStratus SECaaS partners to sell multiple types of cloud-based security services to their customers, including security event analysis and notifications about real-time threats to the customer's IT infrastructure, in addition to providing continuous and secure logging of all of their customer's security event data for compliance and audit purposes.
Source: https://www.linkedin.com/company/blackstratus-inc-/about/
...Read more
0
0

Botstatz

IND ...
Vendor
0
Botstatz  is an Enterprise Automation Platform that enables organizations to scale, optimize and efficiently manage their automation programs. Botstatz  is a team of motivated and passionate entrepreneurs with a vision is to be leaders in automation. Their hands-on experience in scaling automation programs has strengthened our capabilities in understanding and imparting in-depth solutions for practical challenges faced by organizations. Being Global Automation Catalyst and an Enterprise Automation Platform, company is built on concepts of Accuracy, Agility, Sustainability, Usability and Scalability.
Companys aim is to streamline an automation program for conducive outcomes. Their team is highly experienced in setting up Automation Centers of Excellence (CoE) for global organizations. They have the perfect mix of strategy, leadership and domain experience that helps us carve a niche space for themselves in this highly competitive market. Botstatz has served clients and established credibility across industries. Retail, FMCG, Securities and Financial services to name a few.
Source: https://www.botstatz.com/about-us/
...Read more
0
0

Bulletproof

All countries
Supplier, Vendor
00
Bulletproof information and cyber security services are the best way to stay ahead of the hackers, take control of your infrastructure and protect your business-critical data.

Bulletproofs staff are passionate and experienced in all areas of information security – and certified by the likes of CREST and Tigerscheme. Company also have a world-class infrastructure, with two PCI v3.2 compliant data centres and powerful SIEM software that was designed in-house.
One of the major factors to Bulletproofs success is their UK Security Operations Centre (SOC). This is an in-house facility, staffed every hour day and night by Bulletproofs cyber security gurus. The SOC acts as a command station for all companys security operations and, in the case of our Managed SIEM and Threat Protection services, are always geared up to deploy full incident management procedures, according to pre-defined runbooks, within moments of a security event being detected.
Source:https://www.bulletproof.co.uk/about
...Read more
0
0
0
0

Claroty

All countries
Supplier, Vendor
Claroty’s mission is to protect industrial control networks from cyber-attacks; ensuring the safe and reliable operation of the world’s most critical infrastructures. Claroty enables customers to enjoy the substantial benefits of increasingly networked-control systems without compromising operational resiliency, personnel safety, or the security of core assets. Your result with Claroty: your cybersecurity and engineering teams are armed with a solution that gives them visibility and tells them exactly what is happening across your complex industrial control network. This means better security and reduced downtime, for your critical OT environments.
...Read more
0
0

Compass Security AG

All countries
Supplier, Vendor
00
Ethical Hacking and Penetration Testing, Forensics, provider of Hacking-Lab with strong research capabilities, based in Switzerland and Germany.
Compass Security AG
is one of the most renowned penetration testing, forensics and ethical hacking companies in Switzerland and Germany. Their work and research gained international recognition. With Hacking-Lab, the flagship project of Compass Security, they provide the comprehensive attack/defense CTF system used by the European Cyber Security Challenge and others, for finding young cyber talents and for encouraging them to pursue a career in cyber security. Hands-on security trainings and experience is a key factor of their success. Compass Security means trust and confidence.
Source: https://www.compass-security.com/en/profile/company/
...Read more
0
0
0
0

Corero Network Security

All countries
Supplier, Vendor
00
Corero Network Security is a leader in real-time, high-performance DDoS defense solutions. Service providers, hosting providers and digital enterprises rely on Corero’s award winning technology to eliminate the DDoS threat to their environment through automatic attack detection and mitigation, with comprehensive visibility, analytics and reporting. This industry leading technology delivers flexible protection that scales to tens of terabits, with a dramatically lower cost of ownership than previously possible.
Source: https://www.linkedin.com/company/corero/about/
...Read more
0
0

CorreLog, Inc.

All countries
Supplier, Vendor
00
Since 2007, CorreLog, Inc. has been committed to delivering software solutions for Security and Compliance auditing professionals who need more advanced network/system security and improved adherence to PCI DSS, HIPAA, SOX, FISMA, GDPR, ISO 27001, IRS Pub. 1075, NERC and other industry standards for protecting data. Their solutions are designed to be complementary to clients’ existing IT investments.

CorreLog specializes in providing the most comprehensive Security & Compliance software at the industry’s lowest Total Cost of Ownership.

Company's solutions help secure data across both mainframe and distributed operating systems, and provide alerts with notifications in real-time to security and network operations resources.

CorreLog's software agent monitoring technology spans from Windows, Linux, UNIX, Mac, SAP, and databases all the way up to the largest mainframes with running IBM® z/OS®, Linux on z Systems, IBM® Db2, IBM® IMS™, and IBM® z/VM.

Source: https://correlog.com/about-our-company/
...Read more
0
0

Cybanetix

All countries
Supplier, Vendor
00
Cybanetix helps secure  business through the application of technology, knowhow and services. Working with leading technology partners company is able to provide customers with an innovative security eco-system, with natural integrations existing between all technologies. These technologies, combined with our next-generation Security Information and Event Management (SIEM) platform, and with integrated threat intelligence and breach detection engines, allow to continuously monitor and alert you to any breaches and threats which occur within your IT infrastructure. Cybanetix has extensive experience working with customers to plan, assist and manage large-scale migrations from their legacy security implementations, to new solutions and technologies. Source: https://www.linkedin.com/company/cybanetix/about/



...Read more
0
0
0
0

CyberHat

All countries
Supplier, Vendor
00
CyberHat is a leading cyber security solutions company, specializing in cyber defense, Security Operations Centers, Security Assessment, Advanced Hacking Simulations, Intelligence and a wide range of professional solutions.
CyberHat provides professional cybersecurity solutions that enable practical and active defenses, allowing our clients to grow their business while keeping a secure working environment.
Company's experience comes from hands-on deep cybersecurity forensic and postmortem investigations, advanced hacking simulations and cyber assessments for companies of all sizes from the fortune 500 to small and medium-sized businesses.

Source: https://www.cyberhat.com/cybarhat-home-page/about-cyberhat/

...Read more
0
0

The catalog of companies ROI4CIO is a database of suppliers, vendors and users of software, equipment and IT-services for business. By means of filters, find the IT vendor or the reseller by category of a product or availability of deals, the user - by branch and the sizes of the company. Add the company in the catalog, subscribe for updatings.