Explore 11,078 companies in Cyber Security
0 followers
Trick Dog Technology. a My Computer Works company has been in business since 2005. We have IT talent readily available for work. We have technical engineers for Projects, Staffing and Offshore. Our project resources are available for both short- and long-term work. We also have an engineering tea
0 followers
4A Consulting is a leading business & IT solutions provider, offers project & program management, big data, analytics, cybersecurity, etc.
0 followers
Bytoa (\ ˈbī-tōə \ ) is a provider of advanced cyber capabilities to the U.S. Government. Bytoa is a portmanteau, coined from the combination of 'byte' and 'Toa', a Polynesian warrior. Our name represents our unwavering devotion to the defense of our Nation and the freedoms and liberties it affords
0 followers
Deerwood Technologies offers unified communications, cloud computing solutions, cybersecurity, IT consulting and managed IT services.
0 followers
ACDS is a team of experts assembled from some of the largest public and private sector organisations in the world, committed to the idea that we can make the digital economy safer. We are investing in the science of cyber security, building tools to help organisations understand and make informed de
0 followers
Golden Tech Systems Inc. is a systems integrator firm that solves complex problems for our customers. We build digital solutions in the cloud, cyber and DevSecOps domains. With headquarters in Charlotte, North Carolina, Golden Tech Systems, Inc. serves a wide array of clients that including DoD ag
0 followers
Peris.ai is a cybersecurity startup that protects businesses and organizations from online threats. Our team of experienced security professionals is dedicated to providing innovative and practical solutions to help keep our clients safe in the constantly evolving world of cyber threats. We offer v
0 followers
Innovators of Blockchain Security Technology, Trusted by Design. We are scientists and engineers creating new security solutions for today’s complex and decentralised world. We are inspired by the integrity of blockchain and the need to integrate it with privacy and regulation. We believe in the p
0 followers
DBB is an iT company that provides document management, cybersecurity, cloud solutions, disaster recovery and printing services.
0 followers
Sourcecom är din strategiska partner i säkerhetsfrågor och erbjuder specialiserade informationssäkerhetstjänster inom allt från riskhantering, revisioner och rådgivning till teknisk design och införande av it-säkerhetslösningar. Det som gör Sourcecom unika på marknaden är att vi står med ena benet
0 followers
Over 50% of global internet traffic is generated by bots and fake users. This invalid traffic pollutes your analytics data, eats up your marketing budgets or fills your pipeline with invalid leads and it affects all verticals (eCommerce, Travel, FinTech etc.). fraud0 helps you to detect and mitigate
0 followers
We’re an independent, service driven recruitment agency that sources high quality, talented individuals to fill permanent and contract roles across the Technology, Clean Technology & Cyber Security sectors. Since we were established in March 2008 we’ve achieved outstanding success with clients and
0 followers
Hammer IT Consulting, an information technology (IT) consulting company that provides some very unique services designed to reduce data breaches and improve overall corporate security. We provide social media security, privacy and risk management advice through education and training for all sectors
0 followers
nexus – redefining the world of recruitment. Nexus are an award winning hiring partner with over two decades’ experience in bringing top talent and clients together - we’re confident in our people and our approach. Our goal is to deliver effective, flexible hiring solutions at speed, without ever
0 followers
Predict and Prevent Attacks with Science. SaaS-based Cybersecurity platform hunts adversaries in the wild, protects you before they strike.
0 followers
Cybrix Group provides cyber security, software development and IT services.
0 followers
TECHSO GROUP est une entreprise spécialisée en cybersécurité dont les convictions sont fortement liées à ses expériences, à l'expertise et le savoir-faire de son équipe.
0 followers
Il Centro Alti Studi per la Difesa (CASD) - Scuola Superiore Universitaria, è la prima Istituzione militare di livello universitario presente in Italia completamente aperta al mondo civile e militare. La nostra missione, l’Alta Formazione – ha una spiccata declinazione innovativa rivolta a dirigen
0 followers
Cross Net is an IT firm that provides cybersecurity, VoIP, IT consulting, data backup and recovery services to SMEs.
0 followers
ICS Data provides computer repair, IT consulting, home and business networking, database, and software development services.
0 followers
We make world's top security practices available even to startups. SoftSeq provides innovative cyber-security services to ensure your product is hacker-proof, and in compliance with the most rigorous international standards. We lower the cost of securing your product end-to-end to only 1-2% of RnD
0 followers
Auraya is a world leader in voice biometric technology with the mission of empowering people and organisations to interact and engage with convenience and security in all channels and languages. ArmorVox™ is Auraya’s next-generation voice biometric engine designed for telephony and digital channel i
0 followers
Covington & Associates offers business resiliency, business continuity, disaster recovery, cybersecurity, HIPAA, and software solutions.
0 followers
The DarkStar Group engages in data science, cyber security, software engineering and cloud computing services.
0 followers
360 Digital Transformation is a digitalization accelerator and information security consultancy specializing in Mittelstand (SMEs). Our core competencies: * Process Optimization: Our experience with BPM goes far beyond what the market offers. We have been working with BPM systems for decades and a
0 followers
Say goodbye to generic comments like “Good post!”, “Thanks for sharing” and “Love your content!”. Engage AI creates comments for you to engage prospects on LinkedIn at scale. Save hours writing comments to attract your prospects and achieve faster conversions with every added touchpoint. Engage AI
0 followers
Our aim is to help businesses prepare for security audits and maintain ongoing compliance efficiently and effectively. Adoptech's automated platform combined with our expertise helps our clients to build and maintain trust with their customers. We help hundreds of companies streamline compliance f
0 followers
IT security news and information site
0 followers
Trusted Knight provides cloud-based security and fraud solutions for financial institutions, retailers and other enterprises worldwide.
0 followers
Our mission at Resilience Co. to build and develops the cybersecurity frameworks that enhance our clients to be more resilient since we believe that there is no system or information technology secure 100 %, and that’s the story behind our brand “Resilience.SA”
0 followers
Since 1990, security-conscious companies have turned to Aurora professionals for support of their business critical applications. Our experienced team of security experts helps our clients to conquer the complex challenges of data security. Aurora’s Services, Sales and Software teams combine to uniq
0 followers
Powering your Vision MicrotechDPS is a vibrant and progressive business technology partner. We partner with our customers and technology to provide a customer-centred approach to business technology and IT solutions. We believe that all good partnerships are built on trust, dependability, and conne
0 followers
Through our industry expertise and partnership approach, Enso builds high-performing teams and rewarding, fulfilling IT careers across the island of Ireland. We specialise in recruitment for all IT disciplines, including Software Development, Cyber Security, Cloud Infrastructure, IT Support, Projec
0 followers
BlockTrace, established in 2018, was founded with the mission to assist both government bodies and private enterprises in tackling issues related to the investigation of financial crimes involving cryptocurrencies, such as money laundering, asset recovery, and fraud. Utilizing a multidisciplinary te
0 followers
Fundada em 1998, a netconn possui um portfólio sob medida para reduzir riscos que podem afetar diretamente nos seus negócios, bem como proteger os ativos de informações das empresas contra novas ameaças cibernéticas e ajudá-las a alcançar conformidade em leis de proteção de dados. A NETCONN permane
0 followers
FEITIAN Technologies US is a leading provider of cutting-edge identity solutions, specializing in advanced authentication and secure transaction technologies. With a commitment to innovation and security, FEITIAN offers a range of products, including FIDO security keys, smart cards, contactless card
0 followers
Copper River Cyber Solutions, LLC, enables our Federal clients to create secure, modern IT infrastructures. As a Federally recognized, Alaskan Tribal-Owned, 8(a) Certified Entity, agencies benefit from our unique, cost-effective procurement advantages which enable timely fulfillment of cyber defense
0 followers
Knock Knock fournit des solutions d'intelligence artificielle et d'automatisation pour les équipes de cybersécurité offensive Notre Plateforme d'Orchestration et d'Automatisation de Pentest permet aux pentesters d'industrialiser leur savoir-faire, transmettre leurs compétences et gagner en disponib
0 followers
3SGplus addresses your organization's technology needs from all angles, standing apart by combining a broad spectrum of products and certified services with industry experience stretching back to the mid 90's. We resell and fully implement Accela and Hyland OnBase platforms, customized to fit your
0 followers
Nullafi’s proprietary data security software sits between applications and endpoints, tying in with existing network technology in order to redact data across applications. Because our software runs in your environment, you don’t have to worry about latency, third-party data risk, or downtime. Nulla
0 followers
ITHealth provides proven and trusted cybersecurity and access management solutions to NHS organisations. Our aim is threefold: to protect the availability, confidentiality and integrity of vital NHS systems and data, to protect staff, and to protect an NHS organisation’s reputation. By doing so, we
0 followers
Big Idea Technology manages IT for small businesses headquartered in the New York City metropolitan area. Our focus is helping businesses navigate the digital transformation journey of migrating their workloads to the Microsoft cloud. We specialize in the Microsoft 365 application stack, Azure and h
0 followers
Flying Cloud Technology delivers real-time enterprise data posture management. Its CrowsNest DSPM data surveillance platform assesses, monitors, continuously analyzes, and preemptively defends any—and all—data supporting organizational processes. Backed by 10 years of development and 13 patents, Fly
0 followers
Your Expert Gateway to the Lloyd's and London Market. Devoted Specialists In The Following Insurance Areas: • Property Owners • Commercial • Financial and Professional Lines • Intellectual Property • Cyber • Aviation • Medical Malpractice • Niche and Unusual Placements
0 followers
Managed Detection & Response #MDR provider serving gov't, enterprise and critical infrastructure
0 followers
Malleum isn’t your everyday, run-of-the-mill security firm. We’ve been successfully doing penetration tests and application assessments for over 15 years, with a focus on delivering high quality results to our clients. Our security assessments are more than just plugging in a scanner, running the la
0 followers
Digital Transformation experts in securing Identities, devices, and services by applying industry best practices, solution patterns, and best of breed solutions. Our customers tell us that the "how we do it" distinguishes us from our competitors.
0 followers
Avec l’humain en son centre, okam. propose aux PME présentes sur le marché suisse romand - quelle que soit leur taille ou leur domaine d’activité - une externalisation de services IT de qualité premium, tant sur le plan technique que relationnel Le cœur d’activité d’okam. s’articule autour des serv
0 followers
At Applied Technology Academy we have been helping active duty military, Veterans, corporate clients, and career changers upskill & achieve their IT, cybersecurity and project mgmt. training and certification goals since 2004. Leading edge & award winning training! Our programs are designed to pro
0 followers
Veecle provides software that runs on vehicles to program all vehicles functions, making car development faster and cheaper. It's a clean-slate approach with easiness of use and scalability in mind that is not limited by legacy software. Car functions can programmed like a smartphone app - with secu