Find the best cyber services for you with Jenny

Sort by:

An award-winning, agile, technology consultancy and provider, specialising in cyber security and business technology transformation. Operating across industry sectors with multiple success stories and reference clients, Seric are well-placed to support organisations of every description.

HCL Technologies is a next-generation global technology company that helps enterprises reimagine their businesses for the digital age. Our technology products, services and engineering are built on four decades of innovation, with a world-renowned management philosophy, a strong culture of invention and risk-taking, and a relentless focus on customer relationships. With a worldwide network of R&D, innovation labs and delivery centers, and 150,000+ ‘Ideapreneurs’ working in 49 countries, HCL serves leading enterprises across key industries, including 250 of the Fortune 500 and 650 of the Global 2000. HCL generated consolidated revenues of US$ 9.93 bn for for 12 Months Ended 30thJune, 2020 We offer an integrated portfolio of products, solutions, services, and IP through our Mode 1-2-3 strategy built around Digital, IoT, Cloud, Automation, Cybersecurity, Analytics, Infrastructure Management and Engineering Services, amongst others, to help enterprises reimagine their businesses for the digital age.

Redscan is a UK-based and award-winning provider of cyber security services. By thinking like the adversary, leveraging leading threat detection technology and offering clear advice, our friendly experts help organisations of all sizes to successfully mitigate information security risk. From custom vulnerability assessments and penetration testing, to managed detection and response, Redscan can be trusted to deliver managed security solutions for wide-ranging business needs.

OneLogin, Inc.?is a cloud-based?identity and access management?(IAM) provider focused on selling to businesses and other organizations. The company's goals are to use IAM to secure user access to applications and devices, reduce IT time on user onboarding and offboarding, and increase end user productivity through?single sign-on?(SSO).

At Delap, our depth and breadth of knowledge, combined with our low professional staff attrition, give us a distinct competitive advantage over other firms. Our clients consistently praise our ability to return the same client service professionals to their account year after year. We understand that quality client service begins with a genuine care for your people.

Core Security, formerly Courion, provides enterprises with market-leading, threat-aware, identity, access and vulnerability management solutions that enable actionable intelligence and context needed to manage security risks across the enterprise. Core Security's analytics-driven approach to security enables customers to manage access and identify vulnerabilities, in order to minimize risks and maintain continuous compliance.

Fishtech Group is a data-driven cybersecurity services provider for any computing platform. Combining a group of holistic, data-driven cybersecurity solutions, we identify gaps and solutions to help organizations minimize risk, maintain compliance, and increase efficiency. Our six-phase approach provides organizations a comprehensive approach to solving challenges. Information Technology departments must tightly align with the business in order to efficiently meet business objectives. Our approach is designed to accelerate technology decisions and ensure they are aligned with the strategy of the business, aligned with regulatory compliance requirements, provide due diligence, and increase operational efficiencies. This approach ensures the right solution, the first time.

Guardtime is a real-time integrity platform for data, systems and networks. Every aspect of society today depends on data, from business and transportation to government and education, yet we have no way of assuring its integrity. Today’s perimeter-based attempts to protect data and systems are failing, and it’s just the tip of the iceberg. Guardtime is the first solution to this most pressing challenge of our time. Based on proprietary KSI (Keyless Signature Infrastructure) enabled by blockchain technology, Guardtime tags and verifies each and every data transaction. The result is a scalable system that can cryptographically assure time, integrity and authenticity at any moment.

Cavirin began its life at Bell Labs as a network change and configuration tool. At its core was a powerful discovery tool that supported the broadest range of hardware we’d ever seen. It worked in the datacenter, in the cloud, and across multivendor environments. It was the perfect raw material to shape into a market-leading product.

3Sixty IT Services was founded to allow businesses of all sizes to leverage the same level of technology, security and solutions. Our team works with the latest technologies and keeps up to date on the emerging security landscape. This enables us to deliver solutions that are future proofed. Our engineers and consultants cover off all areas of infrastructure allowing us to provide end to end solutions to our customers that protect, deliver and allow growth for each of our customers. All our engineers are certified in their respective fields.

Decipher Cyber 2024 All Rights Reserved.

Privacy policy Cookie policy

Designed and developed by Decipher Cyber Tech Team