Find the best cyber services for you with Jenny

Sort by:

Since 1993, Check Point has been dedicated to providing customers with uncompromised protection against all types of threats, reducing security complexity and lowering total cost of ownership. We are committed to staying focused on customer needs and developing solutions that redefine the security landscape today and in the future.

Cycode is the first source code visibility and protection company. Cycode utilizes its unique Source Path Intelligence engine to seamlessly deliver comprehensive visibility into all of your organization’s source code and automatically detect and respond to anomalies in access, movement, and usage.

ProSoft Technology specializes in the development of industrial communication solutions for automation and control applications. Over the past 25 years, ProSoft Technology’s product lines have grown to over 400 communication interface modules supporting more than 60 different protocols. These include in-chassis interfaces compatible with the large automation suppliers'​ controllers such as Rockwell Automation and Schneider Electric, as well as protocol gateways and industrial wireless solutions. With 500 distributors in 52 countries and Regional Area Offices in Asia Pacific, Europe, the Middle East, Latin America and North America, we at ProSoft Technology are able to provide quality products with unparalleled support to customers worldwide.

We believe that great user experiences should never come with a security risk. Behaviosec has created the new model for strong, multilayered customer security. now you can stop fraud, prevent attacks, and verify your customers — all without slowing them down. We call it behavioral biometrics, uses continuous machine learning to authenticate users based, not on what they do, but how do it. Our algorithm who someone is based naturally interact their device deliver instant identity verification, along authentication. no special sensors. extra hardware. just artificial intelligence works customers’ natural behavior protect online integrity.

Avecto was founded by entrepreneurs Mark Austin and Paul Kenyon, who shared a vision of stopping cyber attacks, without stopping employee productivity. As they developed Avecto's endpoint security software, their vision quickly became a reality as the company experienced phenomenal demand across the globe. Now protecting over 8 million endpoints at some of the world's largest brands, the company has three offices and a growing network of channel partners facilitating its continued success.

The company, founded in 2002 as LSE and based in Weiterstadt, Hesse, has operated as KeyIdentity GmbH since 2016. The KeyIdentity team develops efficient solutions to protect digital identities and transactions at all levels using multi-factor authentication . With a semantically new, non-technocratic approach in the IAM segment, KeyIdentity is revolutionizing the assignment and administration of access rights in large companies. KeyIdentity is listed in the "Gartner Market Guide for User Authentication" and won the Outstanding Security Performance Award. For their IAM solution , the team received the Security Insider Readers' Choice Award at the 2018 IT Awards. Arxes-tolina GmbH took over the employees and the product know-how of the security software company KeyIdentity GmbH in Darmstadt in July 2019 .

SecureMetric is a fast growing digital security technology driven company that well recognized as one of the pioneer player in this region with full capability of producing our own security devices and solution with R&D center and production facilities in Malaysia and China. As a multinational and multi-races based company, SecureMetric’s technical team consist of top security experts from China, Indonesia, Malaysia, Philippines, Singapore, Vietnam and United Kingdom. Cross region and culture exposure made SecureMetric a company that always ahead with others with our innovative products and services that always best fit the market here.

Labris Networks was founded in 2002 and headquartered in Ankara, Turkey with offices at Warsaw and Istanbul. Labris Networks specializes in DDoS mitigation, NG Firewall, Unified Threat Management, Centralized Management, Regulatory Compliances and SOC/CERT Services. The company offers products and services to different industry verticals which include government, IT & Telecom, military, financial services, healthcare, education and others. The company has a diversified clientele across geographic regions such as Eastern Europe, MEA and Asean in 20 countries. Being one of the Common Criteria EAL4+ certified global security gateway brands; Labris products protect enterprises, brands, government entities, service providers, and mission-critical infrastructures.

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts. The company’s core invention, the YubiKey, delivers strong hardware protection, with a simple touch, across any number of IT systems and online services. The YubiHSM, Yubico’s ultra-portable hardware security module, protects sensitive data stored in servers. Yubico is a leading contributor to both the FIDO2, WebAuthn, and FIDO Universal 2nd Factor open authentication standards, and the company’s technology is deployed and loved by 9 of the top 10 internet brands and by millions of users in 160 countries.

Nok Nok Labs is backed by veterans of the security industry from PGP, Netscape, PayPal & Phoenix and have deep experience in building Internet scale security protocols and products. Based in Palo Alto, CA, the company was founded in November 2011 to unify the silos that plague current online authentication technologies. We believe that authentication is the ignition key that can enable a rich set of possibilities for the growing cloud, mobile and ecommerce markets. Authentication should scale easily and securely to meet new innovations in technology, the proliferation of mobile devices, the explosion in data and its management, as well as the rapid increase of malware and cybercrime. Authentication should be universal to meet future needs and the limitless world of the cloud. Key requirements for authentication include strong security and simplicity. However, current approaches and solutions have only been able to deliver one or the other, but not both, creating silos of legacy authentication solutions that limit both enterprises and consumers.

Decipher Cyber 2024 All Rights Reserved.

Privacy policy Cookie policy

Designed and developed by Decipher Cyber Tech Team