Logo | Name | Σ | Employees |
---|---|---|---|
![]() | ![]() Votre guichet unique pour vos besoins en Cybersécurité. For 10 years we have supported our clients in protecting their information assets: SIEM / SOC / SOAR; Threat Intelligence / UBA / IAM / API Security SOC Managé, Cyber Threat Intelligence, Surveillance du Deep & Dark Web, Test d'intrusion, Sécurité des API, SIEM / SOAR, NIS-2, Formation Cyber, and Microsoft MXDR 269 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 56 |
![]() | ![]() Email & amp; Security as a service Managed services publisher (SaaS mode), security of emails and household, collaborative, mobile, unified and secure. Supported messaging service provider in France and everywhere abroad. We guarantee you 24/7 availability, control of your expenses and high quality support. Messaging, Mail Service Providers, SaaS, MAAS (Messaging As A Service), Cloud Computing, Anti-Spam, Anti-Virus, Unified Communication, Mail Forwarding Service, Mail to Fax, Fax to Mail, Mail to SMS, and Legal Archiving ... 59 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 18 | 34 |
![]() | ![]() The European Choice in Cybersecurity All around the world, companies, governmental institutions and defence organisations need to guarantee cybersecurity for their critical infrastructure, their sensitive data and their operational environments. Certified and qualified at the highest European levels, Stormshield’s technological solutions meet the challenges faced by IT and OT to protect their activities. Our mission: to provide cyber-serenity for our clients so they can concentrate on their core activities, something which is vital to the satisfactory operation of our institutions, our economy and the services provided to our populations. When you choose Stormshield, you are choosing a trusted European cybersecurity … 60 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 31 | 394 |
![]() | ![]() Empowering organizations to effectively manage risk in every send, share, receive and save of sensitive content. Kiteworks' mission is to empower organizations to effectively manage risk in every send, share, receive, and save of sensitive data. To this end, we created a platform that delivers data governance, compliance, and protection to customers. The platform unifies, tracks, controls and secures sensitive data moving within, into, and out of their organization, significantly improving risk management and ensuring regulatory compliance on all sensitive data communications. Secure File Sharing, Enterprise Data Security, Regulatory Compliance, Secure BYOD, Private Cloud, Integration with Security Infrastructure, Encryption, Integration … 58 similar entities Type: SMB Activities: it services regtech Technologies: Cybersecurity | 4 | 299 |
![]() | ![]() Modern Authentication for Your Workforce: Secure, Seamless, and Password-Free. Secret Double Octopus provides the only passwordless MFA solution for all enterprise authentication needs. From workstations & SSOs to on-premises infrastructure & legacy applications – with zero employee-managed passwords and a highly secure yet user-friendly interface. 59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 7 | 39 |
![]() | ![]() Securing connected, autonomous mobility Began in 2007 as the automotive security division of Penta Security Systems Inc., AUTOCRYPT spun off in 2019 as it became a global leader in autonomous and connected mobility security technologies, paving the way for the new age of automobile and mobility through a multi-layered, holistic approach, with security solutions for V2X/C-V2X, V2G (including PnC security), in-vehicle system, and fleet management (including MaaS and DRT development). Recognized by Forbes Asia in its 100 to Watch list and by TU-Automotive as the Best Auto Cybersecurity Product/Solution, AUTOCRYPT ensures that security is prioritized before vehicles hit the road. … 59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 177 |
![]() | ![]() Support companies and institutions in the informed and secure implementation of digital solutions. Passionate about technology and Cybersecurity, we offer high value-added services, from cyber governance to cyber managed services, including integration and training on cybersecurity technologies and solutions. IAM, PAM, Data Governance, Office 365 Security, SSO, MFA, ISO 27001, SIEM, EDR, ESET, MIM, BeyondTrust, Microsoft, SOC, Sensibilisation Cybersécurité, Scan de vulnérabilité, SOAR, Infogérance, and Infrastructure IT 647 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 6 |
![]() | ![]() Improving the security, the integrity and the availability needs of connected industries and critical infrastructures. As France's leading provider of cyber protection for critical systems, Seclab secures exchanges by simplifying interconnection architectures and eliminating the risks associated with software flaws in cybersecurity equipment. Its patented technology for electronically breaking all network and USB communication protocols enables the deployment of highly secure network architectures and remote control of cyber-physical systems. ANSSI-certified, our products are designed to secure the country's most critical infrastructures. Our customers address the cybersecurity of their most sensitive assets with solutions that are simpler to implement and maintain … 79 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 19 | 29 |
![]() | ![]() securing data in motion totemo’s leading security solutions for companies and authorities of all sizes are categorized in the product families totemomail® for email encryption, totemodata® for secure managed file transfer and totemomobile® for secure mobile communication. Our innovative products ensure secure information exchanges via the Internet, and cover the functional areas of secure email, mobile security, secure managed file transfer, and data loss prevention (DLP). Our business success is founded on more than ten years of research and development, several international patents and the FIPS 140-2 validation of our cryptography module. Our security solutions are based on the same … 60 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 2 | 15 |
![]() | ![]() An ESN made up of consultants, engineers specializing in computer project management, network architecture and information systems management. Cybersecurity, IT networks, compliance, high debt, servers, firewall, wifi, IT parks management, intranet, extranet, backup, GDPR, software supports, MOA/MOE, and Multi Factors Authentication 352 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 0 | 5 |
![]() | ![]() Managed IT and consultancy services with added protection. Thank you for considering Atlas Cloud. We offer reassuringly secure IT solutions through consultancy and managed services. We specialise in Microsoft 365 and Citrix-based virtualisation technologies, with a key focus on security. Our unique approach takes a more holistic approach to managing customer cyber risks, helping those who work with us feel more secure. As an APSCo Trusted Partner, we’re proudly a leading supplier to recruitment agencies and law firms. But we have a broad range of valued clients. If you’re reviewing your IT partners, give us a try today by claiming … 75 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 6 | 22 |
![]() | ![]() Cybersecurity accessible to everyone! We offer specialized support for businesses and communities to strengthen the security of their digital infrastructure. Thus our offer includes a full range of services, ISO 27001 support, different audits (organizational, intrusion, compliance ...), advice as well as integration and security. In addition, we have developed Cybersmartlearn, easy to use and deployment software allowing you to do without Cyber experts, referenced to UGAP. This software allows the security condition of your equipment and the management of your certificates. Industrial and safety cybersecurity 65 similar entities Type: Startup Activities: it services smart city Technologies: Cybersecurity | 15 | 19 |
![]() | ![]() Security-first Compliance At Bastion, we're changing the way modern companies secure their software. We enable fast-moving tech teams to build secure, compliant applications from day one—without sacrificing speed. By combining automated compliance, built-in security tooling, and expert guidance, Bastion delivers an all-in-one solution tailored for startups and scale-ups. Designed by security engineers for today’s engineering teams, Bastion is trusted by some of the fastest-growing companies to stay secure and audit-ready—without slowing down. Build fast. Stay secure. Security, Cybersecurity, Technology, and SaaS 122 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 8 | 17 |
![]() | ![]() Security to communicate freely Ceerus is a distributed secure communications platform that provides frictionless security for every sensitive conversation with your staff and customers, regardless of where they are or what apps they use. Cybersecurity, Secure Communications, Enterprise Apps, FinTech, and API 113 similar entities Type: Startup Activities: regtech deeptech it services fintech Technologies: Cybersecurity | 22 | 4 |
![]() | ![]() Cybersecurity for and by humans. Eternilab offers advice, expertise and training in the security of networks and information systems. IT security, computer networks, and reliable and secure software development 449 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 7 |
![]() | inWebo The Simple Key to High Security - our strong authentication solution protects B2B or B2C applications from phishing Founded in 2008, inWebo is a major international player in the cybersecurity industry that offers an Identity & Access Management solution including: - inWebo adaptive & passwordless MFA that secures access to B2B and B2C applications by combining the highest level of security on the market with a seamless user experience, freeing them from equipment constraints, thanks to its SaaS mode and multiple tokens. - A CIAM orchestrator to create frictionless, personalized and secure access journeys using a graphical interface or low … 62 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 57 |
![]() | ![]() the cyber defense mobile carrier Dust Mobile offers secure and resilient mobile communications locally and worldwide to protect privacy, mission critical transmissions and out-of-band network connectivity. mobile operator, resilient communications, mobile device management, secure communications, international network, roaming data, cybersecurity, and cyberdefense 71 similar entities Type: Startup Activities: it services telecommunications Technologies: Cybersecurity | 3 | 8 |
![]() | ![]() Cyberfort is an all-encompassing Cyber Security services provider. At Cyberfort we are passionate about the cyber security services we deliver for our customers which keeps their people, data, systems and technology infrastructure secure, resilient and compliant. Our business offers National Cyber Security Centre assured Consultancy services, Identification and Protection against cyber-attacks, proactive Detection and Response to security incidents through our security operations centre and a Secure and Recover set of Cloud solutions which keeps data safely stored, managed and available 24/7/365. Over the past 20 years we have combined our market leading accreditations, peerless cyber security expertise, strong technology partnerships, … 226 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity IoT Robotics | 1 | 155 |
![]() | ![]() Specialists in Rail Cyber Security Solutions RazorSecure offers products and services to enhance railway cyber security by protecting networks and monitoring key systems. We deliver this through our flexible approach to cyber security, designed specifically for rolling stock, signalling and infrastructure systems. We’ve learned from working with industry leading companies that everyone has a unique set of requirements and challenges to overcome, so we have tailored our solution to provide the flexibility to address even the most difficult environments. Railway, Cyber Security, Asset Discovery, Intrusion Detection, Anomaly Detection, Rail Cyber Security Compliance, and Rail Cyber Security 140 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 15 | 26 |
![]() | ![]() Helping fleet operators gain visibility, cybersecurity and cyber compliance of systems onboard vessels CyberOwl helps asset operators in the maritime and critical national infrastructure sectors gain visibility, cyber security and cyber compliance of systems on their distributed, remote assets. We provide technologies, a managed service and specific cyber security advisory services to support the asset operator. Our technologies provide near-real-time visibility of the behaviours of assets and their communication patterns. They are deployed to identify and inventory assets on the IT and OT networks of these operational platforms. They detect and raise early warning of cyber attack tactics, techniques and … 76 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 3 | 58 |
![]() | ![]() Data Protection & Security Engineering Cyberens is a technology firm with a very strong focus on (cyber) security. We provide cybersecurity consulting services in IT sectors relating to defense and space, banking, industrial control systems and IoT and also develop software for customers who care for their (cyber)security. We perform risk analyses with EBIOS, the ANSSI sponsored risk assessment methodology, audit IT and OT systems, define security strategies and implementation plans. We have developed a multi-platform cryptographic library with strong and efficient algorithms for smartphones and connected objects (Windows 32/64, OS X, iOS 32/64, Android, Unix, Linux). The library is … 28 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity IoT | 0 | 1 |
![]() | ![]() Supports you in your cybersecurity projects Sec-Cure is the commercial brand of DC Communication. Labelized Expert Cyber, she offers an innovative awareness approach, expertise in safety solutions integrations and a service center allowing 24/7 surveillance and intervention. Present in Paris, Lille and Brussels, our regional proximity team is made up of fifteen people in Mérignies (59710). With a varied, multi-constructive and multi-editor experience, and thanks to a portfolio of complete technological partners, we meet the needs of business in all areas of the information system. Since 2008, we have supported our public and private customers in the advice, integration, deployment … 323 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 9 | 15 |
![]() | ![]() Arcansecurity develops an innovative authentication solution without passwords to simplify the connection path of a user while improving the level of security. Security, Authentication, Cryptography, Software Development, and Cloud 243 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 4 | 1 |
![]() | ![]() We are specialists in protecting sensitive information More than a technological solution, we are a strategic decision for organizations. Our mission is to redefine the relationship between enterprises and cyber-security and the user experience in the process of authentication and access to technology assets. We deliver robust, multi-layered solutions, with advanced technology and focus on preventing security issues, protecting government and corporate information. We ensure secure communication between people (H2H), between machines (M2M), and between people and machines (H2M) with end-to-end encryption. We prevent: - Data breaches - Financial losses - Impact on productivity - Intrusion in IoT devices - … 129 similar entities Type: Startup Activities: it services privacytech Technologies: IoT Cybersecurity | 2 | 22 |
![]() | ![]() The Eternal Protection Simply protect all terminals, the main entry point for modern attacks. A sovereign and easy to use solution (zero-expertise) meeting modern issues of mobility and intensive use of the Internet and Cloud. We allow small and medium -sized structures, public or private, to operationalize standard recommendations (ANSSI/CYBERMALVERATION/NIST etc.) 56 similar entities Type: Startup Activities: it services transporttech Technologies: Cybersecurity | 21 | 6 |
![]() | ![]() We are a Deeptech Cybersecurity Enabler Embedded security systems will pave the way for data privacy and application protection in an ever-evolving connected world. In a world where technological progress is increasing and connectivity possibilities are infinite, the associated cyberattacks are increasing in number and intensity. Managing threats to data privacy and application protection has never been so critical or strategic. We believe that vulnerabilities can be reduced by adopting a security-by-design approach, with embedded security solutions. We endeavor to provide silicon/ASIC providers with world-class innovative embedded security solutions, in the form of certified Secure Enclaves & IP, to create … 88 similar entities Type: Startup Activities: it services Technologies: Cybersecurity Semiconductors IoT | 11 | 7 |
![]() | ![]() Security for Good With the advent of low cost – high bandwidth- low latency connectivity, the increased use of digitization techniques to deliver end-to-end intelligence, many industrial sectors are combining microelectronics and embedded software to deliver real time interactions between the physical and the digital worlds leveraging on complex IT infrastructures of interconnected devices, systems, systems-of-systems, edge and cloud services. This creates attractive business opportunities for hackers that could exploit the large attack surface exposed by those complex infrastructures to extort money, potentially threatening to remotely cause physical damage to users or surrounding equipment. ProvenRun’s mission is to provide customers … 73 similar entities Type: Startup Activities: it services Technologies: IoT Semiconductors Embedded Systems Cybersecurity | 16 | 57 |
![]() | ![]() Finally, IT assistance without obligation! 🙋🏻♂️ Cyber security partner of large accounts since 2011, we have positioned ourselves as cyber-security, networks, cloud, infrastructure. We design digital technology as a tool at the service of humans and not the other way around. One of the keys to cyber-security progress Cybersecurity, managed services, networks, and audit cybersecurity 463 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 4 |
![]() | ![]() Controlled data exchange IT & Amp; Ot -& gt; Protection of material and intangible assets -& gt; Forted electronic hardware partitions, therefore no zerodays without flaws possible. Permanently and sustainably protect your critical assets and your ultimate backups from ransomware -type protocol attacks. Ot, networks, cybersecurity, appliances, and security if 96 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 8 | 5 |
![]() | ![]() #SecurityRiskmanagement #Cybersecurity #EbiosRisqueManager #OligoRiskManager #DORA #NIS2 Reciproc-it is an Information Security System Consulting Firm. Our main activities are based on giving guidance to protect the data and information, by ensuring their integrity, confidentiality, availability and auditability It’s also a matter of helping our customers in managing and processing their IT projects in well framed way by using the adequate methodology Information System Security, IT Projects management, Cybersecurity, risk management, consulting, and Compliance 422 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 5 | 9 |
![]() | ![]() Helping companies of all sizes to thrive by protecting them against cyberattacks We help companies of all sizes to thrive by protecting their information system against future cyber-attacks. We offer different formats of IT security audits in order to adapt to the complexity of the system audited and the scope of the security checks needed. Contact us and make sure that your company network, website, application or IoT product is complying with all security standards! 64 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 2 | 8 |
![]() | ![]() Highlight cyber threats before they darken your business European leader in intrusion detection and advanced threat detection, Gatewatcher has been protecting the critical networks of large companies as well as public institutions since 2015. Its model combines multiple technologies with A.I. to provide consistent, optimal protection and meet the current and future cybersecurity challenges of organizations. cybersecurity, sécurité informatique, cyberdéfense, cyberdefense, cyberattacks, IT, advanced persistent threats, networks security, exploits, malware, intrusion detection system, threat protection, IDS, APT, Trackwatch technology, NDR, CTI, Threat hunting, and Threat forensics 422 similar entities Tags: FrenchTech2030 Type: Startup Activities: it services Technologies: Cybersecurity | 62 | 128 |
![]() | ![]() We provide mobile and application security solutions. Improve security, enhance productivity, stay compliant. Appurity is a team of consultants who assess environments and business requirements to deliver specialised, best-in-class security solutions – endpoint to cloud. Built for the modern and dispersed workforce, Appurity’s solutions adhere to data protection and cybersecurity schemes and regulations such as Cyber Essentials and ISO. We work with businesses to develop and implement impenetrable security strategies that utilise the latest technologies and security frameworks including ZTNA, SSE, CASB, MTD, continuously validating security risks. Working with our technology partners that include Lookout, Pentera, Absolute, BlackBerry, Ivanti and … 100 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 4 | 8 |
![]() | ![]() Born SAFE solutions for hyper-confidential data www.SeeZam.com The solution is an electronic safe, providing you a virtual secured and inviolable storage space and guaranteeing that the sensitive information deposited is restored to you intact. The professional solution SeeZam is an innovative online service: the e-Vault. A first in its field, this service for businesses and organizations meets the growing security requirements for preserving and sharing secret content. Security, Secrecy, Financial services, and Confidentiality 73 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 2 |
![]() | ![]() The embedded protection for documents Empathy. Honesty. Playfulness. Craftsmanship. Solidarity — these are some of the values we live by, as a company. We work by them too: we’re building a product we believe in — we bring security and control over your company's data, wherever it's sent or stored. See https://www.seald.io cybersecurity, encryption, data security, end-to-end encryption, and data protection 105 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 19 | 8 |
![]() | SCOPUS "Designer of your secure digital identifier" Scopus is a specialist in the identification of people and goods through the RFID. Today we offer solutions allowing the identification and securing of people through their badge; On LF, HF and UHF technologies; as well as their traceability thanks to the Ble. We also secure your goods with real -time management or through passive tags (labels or hardened tags) We support you throughout your project, from technical development to deployment. Evènementiel, identification, access card, badge printer, printing, encoding, RFID, Security, RTLS, SSO, PKI, and identification badges 29 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 25 |
![]() | ![]() A comprehensive portfolio of end-to-end video security products and services. Avigilon was acquired by Motorola Solutions in 2018 and is now part of its ecosystem of safety and security technologies. Avigilon's security suite provides a comprehensive portfolio of end-to-end video security products and services that is part of Motorola Solutions’ technology ecosystem. It provides flexible, modular layers of security, through fixed video, advanced analytics and smart access control systems with deployment options for both cloud and on-premise security. About Motorola Solutions: Motorola Solutions is solving for safer. We build and connect technologies to help protect people, property and places. Our … 44 similar entities Type: SMB Activities: it services Technologies: A.I. Cybersecurity | 12 | 387 |
![]() | ![]() Imagine it - Let’s imagine your information system together With more than 135 experts, Abicom is the IT partner of companies and organizations regardless of their size or sector of activity. Anchored on the Auvergne-Rhône-Alpes territory for over 30 years, we meet all IT needs by organizing our expertise by skills centers: Modern IT - Numerical transformation - Infrastructure advice and engineering: hyperconvergence, storage, virtualization, cloud, .... We are intervening the expression of need until the integration and maintenance of your solutions. - Data accommodation, with a health data host certification (HDS) attesting to our commitment to security. - IT … 130 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 23 | 129 |
![]() | ![]() Expert in mobile cybersecurity and secure collaborative solutions Ercom, a Thales company, is a reference company with 30 years of combined expertise in two key areas: cybersecurity and communication networks. Being a reference company means providing clients with cutting edge solutions for their industry, combining certified security and simplicity in order to accelerate end-user adoption over a large range of devices. Ercom presents : - Cryptosmart, the only “Restricted” French, EU & NATO certified solution, jointly developed with Samsung, to secure devices and end-to-end mobile communications (voice, SMS and data) on consumer smartphones and tablets. - Cryptobox, the first sharing … Type: SMB Activities: it services Technologies: Cybersecurity | 19 | 166 |
![]() | ![]() We are a 100% French cloud, network and telecom operator that hosts in France and provides all of its services from France A subsidiary of the Fiducial group, we share its values: security, confidentiality, expertise and compliance with commitments. We are ISO 27001 certified. Partner of our customers, we help them design and implement solutions adapted to their needs to integrate / migrate their information system into the cloud and thus get the side of them. We put our infrastructure, services and expertise at the service of your digital strategy. Fiducial Cloud has the highest quality standard and organization for … 90 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 47 |
![]() | ![]() The solutions to grow digital ESMS and SMEs Widip has developed since 2005 expertise in the secure accommodation of servers - ISO 27001 and HDS certification (health data accommodation) - and digital processing projects. Our offer is based on three main axes: - Security, backup and integrity of data with a dedicated audit and expertise offer - The availability of data carried by our Cloud, Network and Over -site solutions (12 employees with our customers) - user satisfaction with a team of 15 people in the service and user support center (remote supervision, hot-line and telemainne) at the service of … 194 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 12 | 30 |
![]() | ![]() Cloud & amp; IT mobility Annexiti is the IT Cloud and Mobile specialist. Our job is to connect employees to the company's data in an efficient and secure manner. In terms of users, we offer solutions allowing them to be effective in their working environment, in office or mobility. On the business side, we deploy solutions to make their IT infrastructure meet the new challenges of performance, security, and activity recovery. Virtualization, Nutanix, Hyper-Congence, VMware, Backup, Audit, IT project management, System, Cloud, Managed Services, Resumption of activity, Google Workspace, Microsoft 365, Infogerance, Architecture, Desktop AS A Service, Mobility, IT security, … 312 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 2 | 2 |
![]() | ![]() Strong authentication and secure transactions NEOWAVE is an innovative company specializing in strong authentication and secure transactions. Our main mission is to protect companies’ and individuals’ digital assets through strong authentication technologies based on secure components and digital certificates. Our solutions address the cybersecurity, digital trust and identity management markets. NEOWAVE products combine the high level of security offered by smart cards with the advantages of storage and connectivity technologies: USB, RFID/NFC and Bluetooth Low Energy (BLE). Designed and manufactured in France, they meet the security requirements of European agencies. Clefs USB / Tokens USB, RFID / NFC, Chiffrement de … 46 similar entities Type: SMB Activities: it services Technologies: Cybersecurity NFC Wireless | 7 | 8 |
![]() | ![]() Part of Citrix, a business unit of Cloud Software Group. deviceTRUST Contextual Security is the layer to protect a company's data and resources and reduces the costs associated with managing and securing digital workspaces while keeping productivity high. 59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 6 | 1 |
![]() | ![]() Cutting Edge Biometric Solutions Iriscan is a biometric security system that works with iris — the most secure biometric modality. Biometrics is used for access control and identity verification. It is safe and reliable when adequately protected. Our advantage is taking care of required security infrastructure and data protection out of the box, so organizations can concentrate on their goals instead. The system is flexible, and we provide on-demand integrations and customizations. biometric, security, identification, and authorization 71 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 4 |
![]() | ![]() Your Unique Proof of Authenticity! Prooftag designs, develops and integrates security and track & trace solutions for brands and governments. Prooftag is an end-to-end player in the field of brand protection and document security. We develop a complete ecosystem to guarantee an efficient functional implementation. We develop and patent our own security technologies. Our production team develops and produces on our site in Montauban our range of products (seals, labels, foils...). Our IT engineers develop in-house our software and hosted services. We ensure the design and the deployment of our solutions on site thanks to our project engineers Our technical … Type: SMB Activities: it services Technologies: Cybersecurity | 8 | 48 |
![]() | ![]() Your cyber-secondary trusted partner Our collaboration allows you to defend yourself in the face of the various complex and structured cyber attacks to protect your assets, hosted internally or in the cloud, and thus secure the sustainability of your activities. To secure your business (SMEs, organization, etc.), our team of cybersecurity experts acts in confidentiality and transparency. We implement solutions adapted to your need, and preserve exchanges in a trusted environment that facilitates our long -term approach, and the creation of a real partnership for the sustainability of your activity. 65 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 9 | 15 |
![]() | ![]() Smarter Security Answers STid is one of the leading developers of contactless identification solutions using RFID, NFC and Bluetooth® technologies, and the Internet of Things (IoT). For over 20 years, we have been inventing smart solutions designed to secure access and provide traceability for assets in testing environments such as the aeronautical, energy or defense sectors. As experts in our field, we are constantly striving for excellence, giving us an unrivalled command of cutting-edge technologies to safeguard digital identity. We give companies, industries and governments the means to identify, protect and supervise their assets to make their daily operations easier … 74 similar entities Type: SMB Activities: it services Technologies: Wireless IoT NFC | 26 | 166 |
![]() | ![]() Adeya has merged with RealTyme to provide you with the best solution for your secure communication platform needs. Adeya has merged with RealTyme to provide you with the best solution for your secure communication platform needs in the workplace. Try RealTyme right away. RealTyme offers a multi-platform, data compliant end-to-end encrypted collaboration solution for team messaging, file-sharing, voice and video calls, and conferencing across devices. Whether using a desktop computer or on the go, users can work securely, safe in the knowledge that the product they use does not compromise their privacy by monetizing their data. IT departments are taking … Type: Startup Activities: it services military privacytech Technologies: Cybersecurity | 5 | 6 |
![]() | ![]() Shaping the future through cyber security Nixu, a DNV company, is a trusted cyber security services partner. We help our customers ensure business resilience with peace of mind across multiple industries, enabled by some of the best cyber security professionals in Europe. Information Security Consulting, Application Security, Secure Software Development, Penetration Testing, Identity & Access Management, Situational awareness (GRC+SIEM), IT risk management, Business continuity planning, Vulnerability management, Incident response, Computer forensics, Privacy & Data protection, Security Operations Center (SOC), XDR, and Cyber security 439 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 14 | 206 |
![]() | ![]() Cybersecurity - Qualified Passi - Security of information systems: Auditer | Protect | Monitor | React A French company founded by a team specializing in the field of networks and the security of information systems, Algosecure aims to support you in the implementation of security and network architecture. We provide advisory and implementation services in safety, network, integration and outsourcing of security systems. Our desire is to establish a trusted partnership with you. Our goal is to guarantee you an adequacy between the proposed architectures and your needs. IT security, Intrusion test, CERT, SOC, cybersecurity, cybersecurity, Pentest, Forensic, Security Audit, … 357 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 16 | 51 |
![]() | ![]() Groupe Protec offers a global security offer that meets quality certification standards Groupe Protec is 8 agencies and nearly 600 agents deployed in the territory, 7 activities dedicated to safety, safety, training or at the reception of your business, an interlocutor, a global offer in order to offer the greatest reactivity and fluidity in your services. We offer security and safety solutions to companies, from training to security, television and video surveillance, APSAD P3 Certified Risks Certified as well as reception in business, events and concierge Protec Security - Protec Téléturvence - Protec Service - Horus Training www.protecsecurité.com www.protec-telesurveillance.fr www.protec-services.fr … 128 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 44 |
![]() | ![]() Business Risk & Performance Management Our powerful solutions suite streamlines onboarding, compliance, monitoring and insights to mitigate risk and secure growth at every stage of the digital business lifecycle. fintech security, SaaS, PCI-DSS, VISA, MasterCard, Payment Card Industry, I.T. Security, Fintech, Merchant Risk Management, Risk Management, Fraud, Risk Prediction, and Merchant Security 604 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 25 |
![]() | ![]() Cyber security specialists Logiq provide a full range of Cyber Security, Information Assurance and System Engineering services. We specialise in delivering excellence, whether it is a bespoke system development, system design, compliance audit or cyber strategy. Our combination of technical expertise and business understanding means we are able to provide our clients with a complete cyber solution, enabling them to conduct their business securely. Information Security, Cyber Security, Security Risk Assessment, Security Architecture, System Testing, Compliance Management, Tender Support, Requirments Management, Security Consultancy, Cyber Strategy, Secure System Design, Software Security, and Security Development 322 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 144 |
![]() | ![]() Trusted providers of advisory, assessment, testing, and certification services for highly-regulated industries. Drummond is a leading and trusted compliance, conformance, and standards certification, testing, and validation services provider. With over 25 years of experience, we have established ourselves as a reliable and impartial partner for organizations in highly regulated industries. Our comprehensive suite of services is tailored to meet our clients' specific needs, helping them navigate complex regulatory landscapes, adopt standards, and strengthen their security posture. Our services support the following mandates, standards, and best practices: ONC Health IT, DEA EPCS and CSOS, FHIR, PCI DSS, HIPAA, B2B EDI, AS2, … 56 similar entities Type: SMB Activities: healthtech it services Technologies: Cybersecurity | 7 | 54 |
![]() | ![]() Keep Your Company Cyber Secure & Compliant Comsec is a leading global cybersecurity consultancy. With more than three decades of experience, the company adopts a proactive stance in combating cyberattacks. Its services include Security Testing & Assessments, Governance, Risk & Compliance, Education and Training & Awareness. Comsec employs a mix of automated tools, industry best practices, and expert human intervention to safeguard its customers' business continuity. Since 2021, Comsec Global has been a part of the HUB Security Group (Nasdaq: HUBC). Information Security, IT Security, Application Security, Operational Risk Management, Fraud Detection and Prevention, Cyber Security, Cyber Intelligence, Automation, DDoS, … 215 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 4 | 258 |
![]() | ![]() We provide mobile, multi-factor authentication-as-a-service to a wide range of industries that depend on strong customer authentication: banks, payment networks, credit card companies, eID providers, IoT companies and mobile carriers. Our user-friendly solution is built on a modern, patent-pending architecture originating from Nordic bank security. COVR is available as a native mobile app ready for a quick roll-out, and as a powerful SDK for trouble-free, white-label integration into existing mobile applications. Multi Factor Authentication, gdpr, psd2, user centric authentication, mobile first, cyber security, regulatory compliant, secure log-in, and password free 34 similar entities Type: Startup Activities: fintech it services privacytech Technologies: Cybersecurity IoT | 4 | 17 |
![]() | ![]() Self assessment, protection & healing tools for a trustworthy and resilient CCAM SELFY’s strategic vision is to become the main European provider of an agnostic toolbox for the self management of security and resilience of the CCAM ecosystem, which can be easily deployed over the CCAM environment to extend the current Operational Design Domain (ODD), providing self-awareness, self-resilience and self-healing mechanisms and end-user trust. CCAM, Cybersecurity, and Autonomous Vehicles 91 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 4 | 4 |
![]() | ![]() Leading experts within cybersecurity At Vambrace Cybersecurity we love to solve problems with simplicity & innovation. It’s our mission to make compliance & cyber security services accessible to all. We take pride in building and nurturing teams of exceptional talent, so we’re confident that our cyber security & compliance services are the best way to stay one step ahead of the hackers and protect your business. With our own in-house UK Security Operations Centre (SOC) and years of industry experience, we're ideally placed to help you stay ahead of current and emerging security threats. Gambling Compliance, Cyber Security, Startup Support, … 433 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 23 |
![]() | ![]() We're a team of security professionals, who want to help industry of smart devices (IoT, IIoT, Automotive, ...). We can help in improving security of your devices and inspiring confidence of people in the future and safe hyper-connected world. We offer products with unique technologies, a full range of security consulting and Threat Detection service for devices. IoT and Cybersecurity 162 similar entities Type: Startup Activities: it services Technologies: Sensors IoT Cybersecurity | 0 | 0 |
![]() | ![]() M3 Security Systems Ltd supply and install Intruder Alarms, CCTV, Access Control and Fire Detection Systems. M3 Security Systems have been protecting homes and businesses for over 15 years. We offer tailor-made, Security Systems, using the latest technology. We have established an enviable reputation for superior customer service across the South of England. Intruder alarms, CCTV Systems, Access control, Fire Detection Systems 44 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 2 |
![]() | ![]() Intelligent Cybersecurity | Follow us on X @KudelskiSec Kudelski Security is a premier cybersecurity solutions provider, working with the most security-conscious organizations in Europe and across the United States. Our long-term approach to client partnerships enables us to continuously evaluate their security posture to design and deliver solutions to reduce business risk, maintain compliance and increase overall security effectiveness. For more information about capabilities including consulting, technology, managed security services or custom innovation, visit: www.kudelskisecurity.com Managed security services and solutions, security incident response, threat monitoring, risk assessment and compliance, penetration testing, device security evaluation, identity and access management, security compliance … 453 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 21 | 434 |
![]() | Gudens Cybersecurity Guden Cybersecurity is currently operating in a private development phase. Security Architecture, Data Loss Prevention, Penetration Testing, Incident Response, Identity Management, Access Management, Secure DevOps, Cloud Security, Network Security, Data Security, Endpoint Security, Vulnerability Management, Secure DevOps, and Digital Forensic 446 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 142 |
![]() | ![]() We provide 360 Cyber Security Services We provide End to End Cyber Security Services Breach Investigations, Incident Handling, Forensics, Risk Assessment, End point security, WAPT, Incident Response, Mobile (Android, iOS), Source Code Review, Training, SOC, and VAPT 329 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 14 |
![]() | ![]() We enable and secure access to business data by managing your digital identities. Founded in 1991, GCA Technology Services (GCA) is a security provider specializing in Identity and Access Management (IAM) solutions. We help enterprises enable and secure access to business data by managing their digital identities, and offer a best of breed portfolio of leading IAM vendor partners. Our team’s expertise, experience, and tenacity equip us with the tools to design, deploy and manage complex IAM projects that solve business challenges for our clients and enhance their profitability and competitiveness. Visit us at https://gca.net. Security Information & Event Management … 67 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 11 | 43 |
![]() | ![]() Technology Integration Experts GBS is a Technology Integrator that elevates every project with a holistic approach while providing industry-leading expertise to handle the details that make the difference in our clients' experience. We Design, Deploy, Secure and Maintain across a suite of technologies that includes Managed Services, IT & IoT Solutions, Unified Communications, Design & Consulting Solutions, Audio/Video, Physical Security & Cabling Solutions. Network Design & Installation, VoIP Telephony, Network Security, AV Automation, Disaster Recovery, IT Outsourcing, PC & Apple Support, Website Development & SEO, Virtualization, Data Center Design & Build, NOC Solutions, Physical Security, Managed Services, 24/7 Service … 958 similar entities Type: SMB Activities: it services Technologies: Cybersecurity IoT | 3 | 52 |
![]() | ![]() Driving Trust Verimatrix (Euronext Paris: VMX) helps power the modern connected world with security made for people. We protect digital content, applications, and devices with intuitive, people-centered and frictionless security. Leading brands turn to Verimatrix to secure everything from premium movies and live streaming sports, to sensitive financial and healthcare data, to mission-critical mobile applications. We enable the trusted connections our customers depend on to deliver compelling content and experiences to millions of consumers around the world. Verimatrix helps partners to get to market faster, scale easily, protect valuable revenue streams, and win new business. Broadcast & Hybrid video security, … Type: SMB Activities: it services Technologies: Cybersecurity | 23 | 254 |
![]() | ![]() Modern Endpoint Management Platform for SME. Dead Easy To Use. #CyberSecurity #MobileDeviceManagement #UEM #BYOD Embrace the power of mobility to grow your business as a mobile-first enterprise. The comprehensive Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more. The SaaS enterprise mobile security platform is built on the elastic cloud stack for flexible, scalable, secure and productive mobility operations. The Codeproof cloud console enables centralized Mobile Application Management, Mobile Content Management and Mobile Device Management. The platform boasts Geofencing and time-based policy enforcement to manage your … 11 similar entities Type: Startup Activities: it services Technologies: IoT Cybersecurity | 11 | 17 |
![]() | kyron solutions informatiques Advise, support, defend and protect the assets of companies www.kyron.fr Audits & amp; Advice, governance, risks, compliance, IS optimization, PMO, AMOA, AMOE, Engineering - Architecture, Integration, Operation, Physical Security, Training, Infrastructure Systems and Networks, Bastion, Data Protection, Anti -Phising, Cybersecurity, and ISA62443 489 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 5 | 29 |
![]() | ![]() Australia's cybersecurity experts Australia's phishing and cybersecurity experts. We offer a comprehensive range of cybersecurity services that protect your business from cyber criminals and digital threats. Cloud Security, Application Security, Infrastructure Security, PCI DSS, Phishing, and Email Security 542 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 3 |
![]() | ![]() Provider of tools and services to protect your networks and critical assets. Montimage provides tools and services to protect your networks and critical assets. It offers a security and performance monitoring and management framework adapted to your needs. Services of the company: MMT network monitoring framework. Cyber Threat Intelligence services. Secure portable 4G/5G mobile network platform. Added value : We offer highly innovative solutions that have been built in-house resulting from more than 10 years of research. They integrate advanced AI techniques and multi-source Cyber Threat Intelligence that allow preventing zero-day security breaches. Our solutions have been certified for protecting … 56 similar entities Type: SMB Activities: it services Technologies: Cybersecurity A.I. | 2 | 14 |
![]() | ![]() The fast and efficient way to get and stay compliant with ISO 27001, SOC 2, TISAX, NIS 2 and more. Compliance made easy and fast. We are on a mission to automate up to 90% of security compliance for small and medium-sized businesses. We help SMEs to build their own ISMS and automate security standards such as ISO 27001, TISAX, GDPR, SOC2, ISO 27701, ISO 27017, ISO 27018 and more. ISO 27001, TISAX, GDPR, ISMS, Information Security, SOC2, DiGA, HIPAA, Compliance, NIS2, ISO 27701, DORA, Startups, SMBs, DACH, and Europe 57 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 6 | 27 |
![]() | ![]() EMPOWERING TRUST Our technology solutions empower Government Agencies and Businesses to achieve ‘trust in transactions’ in both the physical and digital worlds. Identity Solutions, Multi-Modal Biometrics, Document Verification, Identity Verification, Mobile Network Solutions, IoT Network Solutions, 5G, LTE, 3G, NB-IoT, LTE-M, Private Networking, Biometric Jumpkits, Biometric Handhelds, Biometric Kiosks, Defense, Intelligence, Law Enforcement, Security, and Border Control 297 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 0 | 3 |
![]() | ![]() Easy to use, multi-OS Data Loss Prevention Endpoint Protector by CoSoSys (now part of Netwrix) is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks, protects from malicious data theft and offers seamless control of portable storage devices. Its content inspection capabilities for both data at rest and in motion range from predefined content based on dictionaries, regular expressions, and machine learning to profiles for data protection regulations such as GDPR, HIPAA, CCPA, PCI DSS, etc. network-endpoint-protection-solutions, applications-for-portable-storage-devices, data-loss-prevention, DLP, IT-Security, security, endpoints, device-control, Enterprise-Mobility-Management, Content-Aware-DLP, and eDiscovery Type: SMB Activities: it services privacytech Technologies: A.I. A.I. - Machine Learning Cybersecurity | 3 | 114 |
![]() | ![]() The industry’s most comprehensive product suite for security operations. The industry’s most comprehensive product suite for security operations empowering enterprises with the best-in-class detection, investigation, automation and response capabilities. Incident Response, Computer Security, Security Orchestration, Security Automation, Threat Hunting, SOAR, and Security Orchestration Automation and Response 241 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 5 | 64 |
![]() | ![]() Security Professionals - Gold Standard - Technology Led FTL Secure Solutions specialise in the design, installation, integration and maintenance of security systems including (but not limited to): - Access Control - CCTV - Intruder Alarms - Biometrics - Intercom Systems We are NSI Nacoss Gold, Constructionline, Safe Contractor and SSIP approved. This means the standard of our work, in terms of service, installation and health & safety is regularly audited to ensure we work to the highest standards. We work with a broad range of clients including within the Public Sector, SME's and Large Corporate Enterprises including Jaguar Land Rover … 87 similar entities Type: SMB Activities: regtech Technologies: Cybersecurity | 0 | 6 |
![]() | ![]() Becrypt is a leading provider of high assurance cyber security products and services. With a heritage of creating National Cyber Security Centre certified products, Becrypt is a trusted provider of endpoint cybersecurity software solutions. We help the most security conscious organisations to protect their customer, employee and intellectual property data. Our client base includes governments (central and defence), public sector, critical national infrastructure organisations and SMEs. Learn more at www.becrypt.com. Please contact HR@becrypt.com, 0845 838 2050 if you are interested in joining a great team with competitive salary and benefits. IT security, Data protection, Encryption software, Secure remote access, Thin … 136 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 4 | 70 |
![]() | ![]() Zero Trust Secure Access for Hybrid IT and Multi-Cloud Pulse Secure provides easy, comprehensive software-driven Secure Access solutions that provide visibility and seamless, protected connectivity between users, devices, things, and services. Our suites uniquely integrate cloud, mobile, application, and network access to enable hybrid IT in a Zero Trust world. Today, more than 80% of the Fortune 500 and over 20,000 enterprises (and 18M end-points) and service providers across every vertical entrust Pulse Secure to empower their mobile workforce to securely access applications and information in the data center and cloud while ensuring business compliance. SSLVPN, NAC, Mobile, Security, BYOD, … 72 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 11 | 133 |
![]() | ![]() Take Control of Connected Device Risk. We enable product security teams – the guardians of the connected world – to protect the devices we rely on every day through market-leading software threat, vulnerability, and risk management. Finite State is the leading provider of product cyber security solutions for connected devices and embedded systems, including IoT, medical devices, and OT/ICS. cybersecurity, iot, vulnerability research, risk management, ICS, Supply Chain Security, and OT 61 similar entities Type: Startup Activities: deeptech it services Technologies: IoT Cybersecurity | 2 | 64 |
![]() | ![]() Corrata provides advanced detection and response for mobile endpoints Corrata is an award-winning provider advanced detection and response for mobile endpoints. Founded in 2016, we continue to lead the market in finding the best ways to protect iOS and Android devices. Today our technology is transforming how hundreds of organizations protect their employees’ smartphones and tablets. Corrata's software detects and disables malware, blocks phishing attacks, reduces vulnerabilities and ensures compromised devices cannot access sensitive data. And all while fully respecting employees’ privacy. Corrata is a member of the Microsoft Intelligent Security Association and is verified for use with FirstNet, the … 16 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 7 | 9 |
![]() | ![]() Dedicated platform and services for everything product security, designed for device manufacturers. Cybellum is where teams do product security. Device manufacturers such as Jaguar Land Rover, Supermicro, Danaher, Rolls Royce and Faurecia use Cybellum's Product Security Platform and services to manage the main aspects of their cybersecurity operations across business units and lifecycle stages. From SBOM to Vulnerability Management, Compliance Validation, and Incident Response, teams ensure their connected products are fundamentally secure and compliant – and stay that way. Powered by Cyber Digital TwinsTM technology, Cybellum creates a live digital replica of every software component inside the devices, allowing product … 57 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 11 | 70 |
![]() | ![]() In December 2020, NortonLifeLock announced it would acquire the Avira and BullGuard brands, products and services which are now part of NortonLifeLock Inc. NortonLifeLock (NASDAQ: NLOK) is a global leader in consumer Cyber Safety. internet security, antivirus, mobile security, mobile protection, identity protection, vpn, small office security, endpoint security, and antimalware 200 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 8 | 24 |
![]() | ![]() Guaranteed IT Solutions At NexTReT we are specialized in optimizing the ICT area of our clients and we help them acquire a high level of security with specialized solutions and services in: Infrastructure, Cloud, Application Development, Big Data, Artificial Intelligence, Quality of Service and Cybersecurity. How do we do it? Reducing and making costs more flexible, improving the quality of its service, making the ICT area more agile and adaptable and with commitment and vocation for service. Since 1993, more than 6,000 successful projects, more than 300 professionals, certifications from the market's leading manufacturers and offices in Barcelona and Madrid. … 727 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 4 | 244 |
![]() | ![]() Über 30 Jahre Excellence in Digital Security. Made in Germany. genua ist ein Unternehmen der Bundesdruckerei-Gruppe. The more connected we become, the greater the importance of IT security: Your IT systems and communication paths have to function flawlessly, and at the same time your data must be reliably protected. We strive to help you achieve this goal. genua is a German specialist for IT security and a member of Bundesdruckerei Group. Our goal is clearly defined: developing top-quality solutions that provide our customers with reliable IT security. Our business activities range from securing sensitive interfaces in public authorities and industry … 55 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 10 | 251 |
![]() | ![]() Your trusted partner for enhanced security, providing the ideal combination of security access and digital solutions that empower our customers to deliver tailored guest experiences while maintaining efficient operations. Electronic Access Control, In-room Safes, RFID Locks, Online Systems, Minibars, Mobile Access, Mobile Keys, Staff Safety, Location Solutions, and BLE 173 similar entities Type: Startup Activities: it services Technologies: Geolocation Cybersecurity | 2 | 741 |
![]() | ![]() Protect Your Business CyberForces is an integrator specializing in IT security. Thanks to the expertise of our consultants but also to the ecosystem established with our partners, we are able to support and orient our customers in their security needs. 418 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 3 | 25 |
![]() | ![]() Cybersecurity service provider specializing in Security Assessments,ISO27001,PCI DSS,MSS, ICS Security & Cloud Security Leading provider of digital security services to clients across the globe. Our service portfolio covers Managed Detection and Response, Vulnerability Management, Risk Management, Privacy and Compliance, as well as an expansive portfolio of training programs. Information Rights Management, Penetration Testing, Vulnerability Assessment, Web application security, DLP, PCI DSS, ISO 27001, SCADA Assessment, Risk Assessment, Breach Response, Compliance, CoBIT, PA DSS, Sharepoint Security, DDos, MDM, 2FA, WAF, DAM, SOC, Managed Security Services (MSS), SWIFT CSP Audit, Cloud Security, and ICS security 271 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 2 | 669 |
![]() | ![]() IT Built Around You TechMD is an award-winning IT services firm dedicated to bringing enterprise-level productivity, scalability and cybersecurity readiness to small to medium size companies nationwide. With an emphasis on clarity, transparency and care that makes us unlike any other IT partner. IT Consulting, Project Implementation, Helpdesk, Network Security/Design, Printing/Toner, Telephony, Cameras, Managed Services, and Managed Services Provider 358 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 85 |
![]() | Integrity360 Italy We take care of your #CyberResilience so you can concentrate on growing your business. Advantio, was acquired by Integrity360 in July 2023. Integrity360 is one of Europe’s leading cyber security specialists operating from office locations in the UK, Ireland, Bulgaria and Sweden. The group provides a comprehensive range of professional, support and managed cyber security services that identify and assess, protect and prevent, detect and analyse and respond and recover cyber risks and threats. Working either independently or as an extension of a organisations own team Integrity360 strengthen security postures for both mid market and enterprise organisations across a wide … Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 56 |
![]() | ![]() Trusted Connectivity Alliance is a global industry association working to enable trust in a connected future Trusted Connectivity Alliance (TCA) is a global industry association working to enable trust in a connected future. The organisation’s vision is to drive the sustained growth of a connected society through trusted connectivity, which protects assets, end user privacy and networks. TCA members are participants within the SIM ecosystem, which is the most widely distributed, secure application delivery platform in the world. Members have an interest in SIM, embedded SIM (eSIM), embedded SE (eSE), integrated SE and SIM (iSIM, iSE), hardware and software IP … 2 similar entities Type: SMB Activities: it services Technologies: NFC | 11 | 10 |
![]() | ![]() Trusted to deliver safety systems, Prime provides risk and safety management software bespoke to your business needs. Easy to use online safety management solutions including compliance monitoring, risk assessments, accident and incident reporting, claims management, policies & procedures, crisis management and customer feedback. Our solutions have proven cost savings, are customisable and flexible protecting your people, assets and reputation. Our solutions are fully hosted and just require an internet connection. They can also be used on handheld mobile devices. All solutions are supported and backed by experts in IT and Risk Management. Online safety management solutions, top class customer service, … 39 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 6 | 18 |
![]() | ![]() We offer solutions that combine experience, agility and a personal approach. Your cybersecurity, in the best hands. We are a regional company, with presence in Argentina, Chile, Mexico and Uruguay, with an exclusive focus on information security solutions. We have been operating since 2000 and serve more than 400 private and public companies, institutions and governments in 17 Latin American countries. We protect our clients' assets based on technology, consulting and with our security operations center with 7×24 threat and incident attention. We have the technical certifications and the ISO necessary for the compliance of the regional company that we … 143 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 8 | 87 |
![]() | ![]() We help SMB’s prove they are secure and compliant so they can grow their business Most of our clients need to prove they are secure and compliant to key stakeholders like their clients, regulators or their board. Simply put, we help them provide that proof. Knowing they are secure and compliant, and being able to prove so, allows our clients to focus on more important things like growing their business. More specifically, we offer a number of inter-related services that help clients become “provably” secure & compliant: -We help clients get certified to trusted information security frameworks like ISO 27001, … 63 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 3 | 30 |
![]() | ![]() Delivering Trust for your Critical Business e-BO Enterprises develops smart content distribution platforms and delivers network operation services, secure cloud computing solutions and network infrastructure. We aim to deliver any content to any device in a secured way. Therefore, e-BO Enterprises focuses on user-centric design to innovate in a society where sharing information has become an integral part of the way that business gets done and users become more mobile every day. e-BO Enterprises has a highly qualified engineering team and an experienced customer service department with a fundamental knowledge of network design and –architecture, advanced security, remote control, virtualisation … 66 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 3 | 147 |
![]() | ![]() Elite Security Products Fire and Security Products For more than 20 years ESP have been developing and supplying security related products to the UK electrical industry. As a leading safety and security product specialist, the company offers a comprehensive range of electronic security and fire detection solutions including: CCTV, Access Control, Video Door Entry, Essentials, a growing collection of conventional and addressable Fire Protection products, and the newly launched Duceri Emergency Lighting collection. As well as having an unrivalled range of security solutions, we offer a free training and advice facility to ensure our customers get the very best from … 62 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 24 |
![]() | ![]() Rohde & Schwarz Cybersecurity is a leading IT security company that protects companies and public institutions around the world against cyberattacks. The company develops and produces technologically leading solutions for information and network security, including highly secure encryption solutions, next-generation firewalls and firewalls for business-critical web applications, innovative approaches for working in the cloud securely as well as desktop and mobile security. The award-winning and certified IT security solutions range from compact, all-in-one products to customized solutions for critical infrastructures. To prevent cyberattacks proactively, rather than reactively, the trusted IT solutions are developed following the security-by-design approach. More than 500 … 163 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 140 |
![]() | ![]() We provide easy and secure access to information anywhere, anytime. Our services: - Managed Services - Engineering - Consulting Our Focus: - Cybersecurity - End User - Modern Workplace Management Our uniques: - Cybersecurity at its best - Outstanding User Experience - Operational Excellence Security, Mobility, Mobile Security, Integration, Managed Services, Enterprise Mobility Management, App Management, Training & Education, Mobile Device Management, Unified Endpoint Management, Mobile Operations Center, iOS/Android/macOS/Windows10, Mobile Threat Defense, Cloud Security, Modern Workplace, Zero Trust, Microsoft M365, Device as a Service (DaaS), and End User Services 423 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 3 | 12 |
![]() | ![]() Keeping Clients Safe, Secure & Successful for over 20 years. We specialize in helping busines owners and executives takes control of their IT systems to improve utilization, maximize efficiency and help the bottom line. By providing a complete suite of IT services, including 24x7 monitoring from our OpsCenter, technical help desk and onsite support, we can be the IT department for a fraction of the cost. IT services, computing, telephony, consulting, virtualization, security, cybersecurity, cloud computing, risk assessments, CMMC, HIPAA, VoIP, compliance, and deep sentinel 369 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 27 |
![]() | Moix Security Security is consulting firm specialising in application and software security. We help organisations design, build, and maintain secure software. software security, penetration testing, and vulnerability assessment 485 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 1 |
![]() | ![]() Powerfully Connected We are IT, telecoms and cyber-security specialists, keeping over 500 businesses and 50,000 users connected and secure across the UK. Telephones, IT Support, Networks, Managed Services, Hosted Services, Web Development, Cyber Security, SIEM, Hardware, Software, Internet, and Call Management 635 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 34 |