Find the best cyber services for you with Jenny

Sort by:

Applied Risk was founded with one core mission: to secure critical assets in the industrial domain against emergent cyber threats. As a major cyber security player within the Industrial Automation and Process Control field, our primary objective is to offer the most advanced Industrial Control Systems (ICS) security services and technology solutions. We provide firms from Fortune 500 enterprises to small and medium-sized businesses with the services and solutions that they need to transform the way they procure, build, integrate and manage their critical infrastructures. Industrial Control Systems are now prime targets for cyber attacks, due in large part to the complexity of these environments and the Industrial Internet of Things (IIoT). As such, ICS security requires specific skills and experience beyond traditional IT security. We recognise the need for a sharp focus on critical infrastructure security at a global level and provide this by delivering proven system security benefits without adversely impacting on production. We actively participate in a number of major control system security standards committees. The guidance provided by these committees is designed to increase the integrity and confidentiality of all system functions and to help prevent unauthorised control system access.

Fraugster is an anti-fraud company with the goal of eliminating fraud and increasing our customers’ profits. To achieve this they’ve invented an artificial intelligence technology that combines human-like accuracy with machine scalability. This ability lets us foresee fraudulent transactions before they actually happen and gives us a distinct competitive advantage over every other player in the anti-fraud space.

cPacket Networks offers customers that operate large complex networks an innovative Distributed Monitoring Architecture, which delivers higher operational efficiency and more integrated intelligence than legacy “bottleneck by design” centralized solutions. cPacket’s distributed intelligence enables operators to proactively pinpoint imminent issues before they become problems that negatively impact end-users, and also to reduce troubleshooting time-to-resolution by over 80 percent. cPacket’s advanced Intelligence overcomes scalability issues by leveraging the company’s unique algorithmic chip that performs complete packet inspection “immediately at the wire” on the fly. The company’s unique next generation network performance monitoring solution combines: dynamic maps visualization, granular key performance indicators, proactive alerting, interactive search (L2-L7), and forensic packet-based analysis on-demand for unmatched integrated operational intelligence. Improving operational efficiency and being proactive enables customers to achieve substantial OPEX and CAPEX savings.

We mean all the time. Ziften provides continuously-streamed visibility into endpoint activity.The other guys give you ?point-in-time? snapshots.Ziften stores that visibility data for as long as you need ? giving you visibility far beyond ?right now?.

MixMode is the first to bring a third-wave, context-aware AI approach that automatically learns and adapts to dynamically changing environments. MixMode’s platform PacketSled, better understands network behavior as it adapts to baseline changes and enables both misuse detection and anomaly detection, as well as predictive maintenance. Used by enterprises and MSSPs for real-time network analysis, threat hunting and incident response, the platform leverages continuous stream monitoring and retrospection to provide network forensics and security analytics. Security teams can integrate PacketSled into their orchestration engine, SIEM, or use PacketSled independently to dramatically reduce false positive alerts and the resources required to respond to persistent threats, malware, insider attacks and nation state espionage efforts.

With our patented new breed of fingerprint sensors, VKANSEE is ushering in a new era of device security. Our fingerprint capture and matching technology enables mobile security for payment applications, data storage, access control and more. We're headquartered in Beijing, with support offices in Shenzhen and global sales / support offices in New York City.

Our mission is to create transformational technology that accelerates secure societal and financial inclusion. Truststamp.ai creates proprietary artificial intelligence solutions; researching and leveraging facial biometric science and wide-scale data mining to deliver insightful identity & trust predictions while identifying and defending against fraudulent identity attacks. We utilize the cutting-edge power and agility of GPU processing and neural-networks to process data faster and more effectively than has ever previously been possible, as well as deliver results at a disruptively low cost that allows usage across multiple industries.

Founded in 1990, ElcomSoft Co. Ltd. is a leading developer of digital forensics tools. The company offers state-of-the-art solutions for businesses, forensic and law enforcement specialists, provides training and consulting services on mobile and computer forensics. ElcomSoft forensic products and tools are used for criminal investigations by the law enforcement. Today, the company offers the complete range of mobile and computer forensic tools, corporate security solutions and tools for IT security audits. ElcomSoft tools are used by most of the Fortune 500 corporations, multiple branches of the military all over the world, foreign governments, and all major accounting firms. ElcomSoft is a Microsoft Partner (Gold Application Development), Intel Premier Elite Partner and member of NVIDIA’s CUDA/GPU Computing Registered Developer Program.

Gurucul is transforming enterprise security with user behavior based machine learning and predictive analytics. Using identity to monitor for threats, Gurucul provides Actionable Risk Intelligence™ to protect against targeted and under-the-radar attacks. Gurucul is able to proactively detect, prevent, and deter advanced insider threats, fraud and external threats to system accounts and devices using self-learning, behavioral anomaly detection algorithms. Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world renowned-experts in government intelligence and cyber security. The company was founded by seasoned entrepreneurs with a proven track record of introducing industry changing enterprise security solutions. Our mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.

Everything we do is lead by consultancy. We do not employ commissioned sales people who are inevitably pushing for big-ticket sales. You should expect your account manager to be an experienced security professional who will become familiar with your business and will be an advisor to your company for years to come. The solutions we devise and recommend are based on sound technical evaluation of your environment and working together to understand you, your team and the needs of your enterprise. There is no standard approach or a "cookie cutter" tick sheet. Whist we have favoured technologies, no one vendor dominates our solution design and we expect each solution to be bespoke. Our solutions are requirements based rather than vendor-lead because we will not shoe-horn inappropriate technology into your network to hit a 3rd-party metric (e.g. to support a sales campaign). In any of the project types below, our engagement begins with a consultation, dsicussion of the short and long term aims of the organisation and a proposal on how best to move forward.

Decipher Cyber 2024 All Rights Reserved.

Privacy policy Cookie policy

Designed and developed by Decipher Cyber Tech Team