View

Sorting

Companies found: 85

Abella Systems, Corp.

USA
Supplier
0
Abella Systems is managing the technology needs of the creators to deliver more consistent and affordable technology products. Startups, mid market, and enterprise customers need fast and consistent technology solutions to improve existing process or create new markets.We think that effective project management may help you produce a successful product. According to statistics, the majority of software projects fail or run over budget and schedule due to improper project management. Building a great product requires more than just development expertise; for more significant results, we also need a strong project or programme management team.We cover all phases of the application development lifecycle, from the creation of new applications to modernization, management, and maintenance. We assist you in achieving digital solutions that are created especially for your company, ready to meet your unique needs and improve workflows.Our customers:Our customer portfolio includes companies in Financial Services, Mortgage, FinTech, InsurTech, Digital Health, EduTech, Real Estate, Engineering & Construction, and Retail.Our capabilities:Our capabilities range from product strategy to design, development, and ongoing product maintenance services.Cloud ServicesUX / Design ServicesData, Analytics, and AI/ Data ScienceDigital Transformation SolutionsDevelopment ServiceseCommerce SolutionsDevOps ServicesTest Automation Services (Web, Mobile, and API)To Connect:Visit https://www.abellasys.com/ to see how Abella Systems can help you turn your vision into a winning product or you can call us at + (877) 559-6361. You can also mail us your requirements and queries at info@abellasys.com
...Read more
0
0

Abusix, Inc.

DEU ...
Supplier, Vendor
00
Abusix, Inc. is a company of Internet security, network abuse handling, antispam and fraud specialists. Their mission is to help ISPs & Internet companies solving the rapidly growing problem of outgoing spam and all kind of other network abuse or security issues in a solid, accurate and reliable way. Abusix is providing network abuse handling & reporting, customized spamfeeds, consulting and cloud-based software/services against network abuse for ISPs, ESPs, technology providers, businesses and many more.

...Read more
0
0
0
0

ANY.RUN

USA
Supplier
0
ANY.RUN is a service that allows our clients to detect, analyze, and monitor cybersecurity threats. It's the first interactive online malware analysis sandbox, where the user controls the flow of the analysis. Just imagine: you get access to the malware laboratory with a lot of different tools within a second and most of these features are free for our community. You can use it to analyze and research the latest malware samples from all over the web as if you were to launch it on your PC but absolutely safe!
...Read more
0
0

ANYSOFT

UKR ...
Supplier
0
ANYSOFT is a 100% national licensed software provider based in Kiev. Our company is created by IT professionals. Our mission: to be a link between the manufacturer and the user, removing all barriers in the purchase and use of software products from around the world. As an official partner of many popular and highly specialized manufacturers we guarantee the authenticity of the products we supply. We make software available!
...Read more
0
0

APERIO Systems

ISR
Supplier, Vendor
00
APERIO Systems is a group of multidisciplinary researchers, engineers, thinkers and hackers. They are hands-on technologists who think fast and brainstorm original solutions whenever they are needed. Each member of their team has proven accomplishments in their domain of expertise, be it software engineering, machine learning, signal processing or cybersecurity. Aperio’s mission is to build solutions ensuring sensor data integrity for critical infrastructures & large scale Industrial facilities. Our Data Integrity AI engines authenticate the data provided by physical sensors in a plant and validate that it reflects the true state of the system. This translates to a very strong and unique value proposition for both cybersecurity, productivity, and safety. For cybersecurity in particular, Aperio is the only technology with a credible capability of preventing large scale, destructive cyber attacks against critical infrastructures. There is strong evidence that these types of attacks will increase dramatically in the coming years. Aperio was conceived in 2016 by cyber-security entrepreneurs who were looking to address the growing number of cyber-security attacks on critical infrastructure and industrial facilities. They came to the conclusion that the right approach was to begin by assuming the ‘worst case scenario’ - an intruder has gained access to the operational network and aims to cause severe or catastrophic damage. Attacks involving physical damage to assets and attacks aiming to systematically destroy many devices, require the attackers to work unnoticed and therefore include subtle ‘forging’ of data that is invisible to operators. It was these types of scenarios which was the background for founding Aperio. Source: https://www.aperio-systems.com/company
...Read more
0
0

Arctic Wolf Networks

DEU ...
Supplier, Vendor
00
Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity. The AWN CyberSOC service is anchored by Concierge Security teams who provide custom threat hunting, alerting, and reporting. Arctic Wolf’s purpose-built, cloud-based service offers 24x7 monitoring, vulnerability assessment, threat detection, and response.
Source: https://www.linkedin.com/company/arctic-wolf-networks/about/
...Read more
0
0
0
0

Assured Enterprise

USA
Supplier, Vendor
00
Assured Enterprises provides expert cybersecurity assessments, consulting services and products. Our expertise in Analysis, Analytics, Design and Architecture allows us to provide tailored solutions to our clients and help them achieve sustained growth while protecting their most valuable assets.
...Read more
0
0

Astvision

MNG ...
Supplier, Vendor
00
Astvision has empowered developers to create innovative product and services.The Company’s core asset is team of young, talented and ambitious IT specialists with clear visionand capabilities of introducing latest technological developments and solutions into real-life.
...Read more
0
0
0
0

Bayshore Networks

USA
Supplier, Vendor
00
Bayshore Networks is the cyber protection leader for the Industrial Internet of Things (IIoT). Bayshore's policy-based Gateway enables applications for IoT platforms. Bayshore Networks provides the option of active policy enforcement through Pallaton Policy Enforcement Engine. This patented technology can actively prevent risk activities from disrupting production, incurring downtime costs, and damaging equipment. Built by Bayshore OT experts and designed for the plant environment, goal is to keep the OT environment safe and productive.

Bayshore supports a wide, growing range of OT (as well as IT) protocols, which are required to protect the production environment.
Bayshore’s powerful Learning Engine establishes baseline behaviors among the industrial assets in the OT network, creating a whitelist of normal or approved applications. The Learning Engine automatically generates policies designed to protect industrial infrastructure.
Bayshore’s Pallaton Policy Enforcement Engine enforces both whitelisting (out-of-the-box, Learning Engine generated, or manually crafted) and blacklisting (based on threat intelligence and known exploits) policies. Because the Bayshore solution can be deployed in-line, it can prevent unwanted traffic from interfering with a protected OT environment (in addition to providing alerts). Bayshore Networks offers visibility, control, and protection for industrial Operational Technology, and transforms OT data for IT applications. Incorporating threat intelligence, and filtering open, standard, and proprietary protocols at a deep level, Bayshore parses OT protocol content and context, validating every command and parameter against logic-rich policies. Addressing zero-day, internal, and rapidly evolving threats, Bayshore can allow, alert, and/or enforce policy at line speed – allowing white-listed communication while blocking or modifying unauthorized communication and commands. Bayshore has strategic partnerships with leading technology companies including Yokogawa, SAP, Splunk, Cisco Systems, AT&T, and BAE Systems. Bayshore Networks, Inc. was founded in 2012 and is headquartered in Bethesda, Maryland. Source: https://www.linkedin.com/company/bayshore-networks/about/
...Read more
0
0

Beyond Security

ARG ...
Supplier, Vendor
00
Beyond Security is global leader in vulnerability assessment and compliance solutions - enabling businesses and governments to accurately assess and manage security weaknesses in their networks, applications, industrial systems and networked software. Product lines include:
  • beSECURE (formerly AVDS): network vulnerability management, web application testing and PCI compliance scanning
  • beSTORM: software security testing and black box fuzzing
  • beSOURCE: static application security testing (SAST)
Beyond Security's automated, accurate and simple tools protect the networks and software development life cycle of SMEs across the globe - including industry leaders in aerial and space warfare, banking and finance, media, software development, telecommunications, transportation and more.
Source: https://www.linkedin.com/company/beyond-security/about/
...Read more
0
0
0
0

Binary Defense

USA
Supplier, Vendor
00

Binary Defense is the global leader in attack intelligence and advanced managed security solutions.


Binary Defense was spawned from the need for better monitoring and detection capabilities in companies. The founder of Binary Defense, David Kennedy, also founded TrustedSec which specializes in information security services including penetration testing. The cutting edge, white hat hackers noticed almost every organization with monitoring capabilities really struggled, especially when using an MSSP. Countless attacks went undetected, and breaches were missed which left companies wondering what to do.
As a result, Binary Defense was first put into motion in July of 2012 with the development of Managed Detection, Deception and Response software (Binary Defense Vision) based on profiling how attackers think. A number of years of development, marrying up attack intelligence with our extensive threat intelligence, has made company's product the best consolidation of technologies in the industry to predict, prevent, detect, deceive and respond to attacks.
Source: https://www.linkedin.com/company/binary-defense-systems/about/
...Read more
0
0

BlackStratus

USA
Supplier, Vendor
00
BlackStratus is a leading provider of cloud-based security information and event management (SIEM) software solutions deployed and operated by '​'Security as a Service'​'​ (SECaaS) providers of all sizes, government agencies and individual enterprises.

Company's SIEM Storm technology is used by organizations worldwide to detect, prevent and defend against both major and minor IT security breaches from the end point to the data center, to the '​'Cloud.'​'​

The SIEM Storm technology delivers a correlated and centralized, real-time view of alerts, status messages and a variety of security events generated by disparate third-party security products (such as firewalls, anti-virus products, intrusion detection software, etc.), allowing security professionals to identify and stop potential threats in real time.

Specifically, this technology allows BlackStratus SECaaS partners to sell multiple types of cloud-based security services to their customers, including security event analysis and notifications about real-time threats to the customer's IT infrastructure, in addition to providing continuous and secure logging of all of their customer's security event data for compliance and audit purposes.
Source: https://www.linkedin.com/company/blackstratus-inc-/about/
...Read more
0
0

Bolton Labs (Bolton Secure)

USA
Supplier, Vendor
00
Bolton Labs provides cybersecurity services, training, and tools to service providers and organizations who want to scale their security offerings. With a unique combination of best-of-breed technology and talent, Bolton Labs’ cloud-based SOC Enablement Platform delivers unrivaled flexibility, scalability, and cost savings to security teams around the world.  Bolton Labs next-generation delivery model gives complete transparency over the buildout and management of 24x7 functions that augment existing security investments and teams with highly skilled, hard to find talent.
Source: https://www.linkedin.com/company/bolton-labs/about/
...Read more
0
0
0
0

BugSec

ISR
Supplier, Vendor
00
BugSec is the strongest Israeli cyber consultancy and red-team services firm. Established in 2005 by noted Israeli ethical hacker Eyal Gruner, BugSec has assembled the best and brightest minds in Israeli cyberspace, including offensive and defensive cyber specialists.  Nowadays, BugSec group numbers over 70 experts, with hybrid capabilities in red teaming, hardware and application security, threat hunting and incident response. Its professionals have authored tools, challenges, testing methodologies and training programs. An important pillar of BugSec activity is research and development – its talented security researchers are engaged in the most complex nation-level projects for leading defense agencies in Israel and abroad. They have developed in-house security tools, researched vulnerabilities and detected zero-day exploits. BugSec customers span across 4 continents, including the most significant bodies in modern industry – financial institutes, critical infrastructure, hi-tech, defense, retail & e-commerce, telecom, etc.
...Read more
0
0
0
0

Bulletproof

GBR
Supplier, Vendor
00
Bulletproof information and cyber security services are the best way to stay ahead of the hackers, take control of your infrastructure and protect your business-critical data.

Bulletproofs staff are passionate and experienced in all areas of information security – and certified by the likes of CREST and Tigerscheme. Company also have a world-class infrastructure, with two PCI v3.2 compliant data centres and powerful SIEM software that was designed in-house.
One of the major factors to Bulletproofs success is their UK Security Operations Centre (SOC). This is an in-house facility, staffed every hour day and night by Bulletproofs cyber security gurus. The SOC acts as a command station for all companys security operations and, in the case of our Managed SIEM and Threat Protection services, are always geared up to deploy full incident management procedures, according to pre-defined runbooks, within moments of a security event being detected.
Source:https://www.bulletproof.co.uk/about
...Read more
0
0
0
0

CCVOSSEL GmbH

DEU
Supplier, Vendor
00
The name CCVOSSEL has stood for IT services of proven quality since 1996. With its experienced Berlin team and its high standards, CCVOSSEL looks after numerous customers from a wide variety of industries. Its offer ranges from software development and IT consulting to support and individual all-round solutions.
CCVOSSEL started small - as a sole proprietorship with a small team and small orders. But these soon expanded to include more extensive projects. In close cooperation with its customers, projects have turned into IT products and products into new possibilities. CCVOSSEL has grown from this as a team and as a company: At the beginning of 2013, it changed its name to CCVOSSEL GmbH.
...Read more
0
0
0
0

Claroty

AUS ...
Supplier, Vendor
Claroty is the industrial cybersecurity company. Trusted by the world’s largest enterprises, Claroty helps customers reveal, protect, and manage their OT, IoT, and IIoT assets. The company’s comprehensive platform connects seamlessly with customers’ existing infrastructure and programs while providing a full range of industrial cybersecurity controls for visibility, threat detection, risk and vulnerability management, and secure remote access — all with a significantly reduced total cost of ownership.

Claroty is backed and adopted by leading industrial automation vendors, with an expansive partner ecosystem and award-winning research team. The company is headquartered in New York City and has a presence in Europe, Asia-Pacific, and Latin America, and deployments on all seven continents.

The Claroty Platform delivers the range of industrial cybersecurity controls in a single solution that deploys painlessly and integrates seamlessly with your existing infrastructure.

The foundation of the Claroty platform, Continuous Threat Detection (CTD) delivers asset discovery, risk and vulnerability management, and threat detection coverage for industrial networks. These capabilities will empower to reveal and protect OT, IoT, and IIoT assets and identify and respond to the earliest indicators of known and emerging threats to those assets and the critical processes they underpin.
...Read more
0
0

CLLAX

USA
Supplier
0
Cllax - Advice, resources and tools for starting a small business. Information on getting finance, business planning, hiring, IT, marketing and much more.
...Read more
0
0

Cloud MLM Software

IND ...
Supplier, Vendor
00
Cloud MLM Software is one of the best Multilevel marketing software with unlimited customizations. Cloud MLM Software comes with an application programming interface (API) that enables companies to integrate the system with third-party E-Commerce sites, such as OpenCart, Magento and more. pricing is available on request and technical support is extended via phone, email, live chat and other online steps. Features of cloud MLM software E-commerce Integration SMS Integration Commission Management Genealogy Tree Order Management Reports & Analytics Replicated Website Ticket Management Distributor Management Multi-Currency Payment Processing Shipping Management
...Read more
0
0
0
0

ColocationIX

DEU
Supplier, Vendor
00
ColocationIX GmbH is the operator of an innovative, ISO 27001-certified high-security data center in the "Medium data center" category. There is space for up to 50,000 servers on 2,500 square meters.
ColocationIX is a partner company of Consultix GmbH, Bremen. The owner-managed company is ISO 27001, ISO 9001, ISO 14001 and OHSAS 18001 Ecostep certified and has developed into a technology leader in the field of administration and management of personal data.
...Read more
0
0
0
0

The catalog of companies ROI4CIO is a database of suppliers, vendors and users of software, equipment and IT-services for business. By means of filters, find the IT vendor or the reseller by category of a product or availability of deals, the user - by branch and the sizes of the company. Add the company in the catalog, subscribe for updatings.