Find the best cyber services for you with Jenny

Sort by:

RiskXchange is an information security technology company that helps companies of all sizes fight the threat of cyber threats by providing instant risk ratings for any company across the globe. RiskXchange was founded and is led by recognised experts within the security industry, who have held leading roles within companies such as IBM Security.

CyberProof is a security services company that intelligently manages your incident detection and response. Our advanced cyber defense platform enables operational efficiency with complete transparency to dramatically reduce the cost and time needed to respond to security threats and minimize business impact. We collaborate with our global clients, academia and the tech ecosystem to continuously advance the art of cyber defense. CyberProof is part of the UST Global family. Some of the world’s largest enterprises trust us to create and maintain secure digital ecosystems using our comprehensive cyber security platform and mitigation services.

Nuix ( understands the DNA of data at enormous scale. Our software pinpoints the critical information organizations need to anticipate, detect, and act on cybersecurity, risk, and compliance threats. Our intuitive platform identifies hidden connections between people, objects, locations, and events—providing real-time clarity, control, and efficiency to uncover the key facts and their context. Nuix and our partners deliver solutions that incorporate our global expertise in cybersecurity, law enforcement, digital forensics, investigation, intelligence, legal discovery, and information governance. We continually innovate to solve the complex challenges our customers face today and build their capacity to anticipate what’s next.

• Minimise cybersecurity risk • Maximise cybersecurity resilience • The Security Company helps you establish the security behaviours your employees need to minimise cybersecurity risk and maximise cybersecurity resilience across your organisation. We support you to: • identify your organisation’s current cybersecurity maturity • set achievable cybersecurity goals • deploy the most effective range of interventions to drive success. You can choose from individual components through to precisely-tailored and comprehensive solutions that form core elements of your cybersecurity programme. These include: • a baseline survey that provides unique data and analysis on your cybersecurity start point (critical to demonstrate the successful impact of your programme) • dynamic and stimulating communication materials to raise awareness: o eLearning o micro-learning o interactive virtual training to improve knowledge and skills. And because we know training alone will not change behaviour, we support you in developing the strategic approaches that help embed secure behaviour in your organisation’s cybersecurity culture. These include management masterclasses and ambassador programmes. Putting your people at the heart of security.’s product, called Cyberspace Identity System or CIS, enhances privacy and cybersecurity protection through mutual inclusive connectivity. CIS works in tandem to uniquely provide end-to-end cybersecurity solutions. Based on PKI technology standard, CIS applies self-sign X.509 Certificate to create unique network-based user identity called Cyberspace Identity User or CIU, build trusted communities of networks based on mutually agreed connectivity, while working together to exclude inappropriate membership and intruders, continuously monitor, take immediate remediation actions and report real-time security status of the access and transport of the sensitive information of each CIU.

OneVisage is a Swiss cyber-security company founded in 2013 with the vision to bring secure and convenient authentication services to mass-markets using standard mobile devices (BYOD).

StealthMail makes your emails secure and invisible to email relays, hackers, or Public Internet threats - making email relationships with clients a trusted one via StealthMail’s best-in-class Secure Email Channel. Moreover, StealthMail gives you full and exclusive control over your encryption keys, data, and access rights - so that your email communication is fully protected. To start using StealthMail no integration is needed. There are no risks for existing IT infrastructure. The whole deployment takes less than 4 hours. Users get Outlook Add-Ins and the server is deployed to Microsoft’s Azure Cloud.

WireWheel is revolutionizing the area of privacy and data protection for companies. As companies collect and use more of your personal information, they need better tools to find and monitor where they are storing that information, and who and what has access to it. By leveraging innovations in cloud infrastructure, machine learning, data science, and user experience, WireWheel provides a software-as-a-service solution for companies to safeguard and steward their most important asset: customer data. Backed by some of the top investors in the country, including PSP Growth, New Enterprise Associates, and the Rise of the Rest Fund, WireWheel has built cutting-edge products in a collaborative environment, and with an expert team.

Experian unlocks the power of data to create opportunities for consumers, businesses and society. At life’s big moments – from buying a home or car, to sending a child to college, to growing a business exponentially by connecting it with new customers – we empower consumers and our clients to manage their data with confidence so they can maximize every opportunity. We gather, analyze and process data in ways others can’t. We help individuals take financial control and access financial services, businesses make smarter decision and thrive, lenders lend more responsibly, and organizations prevent identity fraud and crime. For more than 125 years, we’ve helped consumers and clients prosper, and economies and communities flourish – and we’re not done. Our 17,000 people in 37 countries believe the possibilities for you, and our world, are growing. We’re investing in new technologies, talented people and innovation so we can help create a better tomorrow.

The Tor Project, Inc, became a 501(c)3 nonprofit in 2006, but the idea of "onion routing" began in the mid 1990s. Just like Tor users, the developers, researchers, and founders who've made Tor possible are a diverse group of people. But all of the people who have been involved in Tor are united by a common belief: internet users should have private access to an uncensored web. In the 1990s, the lack of security on the internet and its ability to be used for tracking and surveillance was becoming clear, and in 1995, David Goldschlag, Mike Reed, and Paul Syverson at the U.S. Naval Research Lab (NRL) asked themselves if there was a way to create internet connections that don't reveal who is talking to whom, even to someone monitoring the network. Their answer was to create and deploy the first research designs and prototypes of onion routing.

Decipher Cyber 2023 All Rights Reserved.

Privacy policy Cookie policy

Designed and developed by Decipher Cyber Tech Team