Find the best cyber services for you with Jenny

Sort by:

Maya offers you a true partnership and shared focus and effort to minimize your organization’s cyber-risk levels and increase its resilience. Our mission is to help the business successfully manage its cyber-risk using best-of-breed cybersecurity solutions that fit the organization’s strategy, budget, technical expertise and business environment. Our solutions are project-based and seek positive ROI. We leverage comprehensive knowledge of cybersecurity solutions, the changing threat landscape and business processes to help your company create and implement a cybersecurity program that will keep business owners and decision makers in control over their cyber-risk.

A consultative reseller of Cyber Security solutions that SIMPLIFY and AUTOMATE the management of this forever evolving risk vector. Typical early engagements occur at Board or C suite level where we help ensure that senior decision makers are properly equipped for both fiduciary and operational risk purposes. Observer Solutions are proud of our uniquely close links with Israelis and US companies both mature and emergent who present best in class software and services that genuinely move the risk dial downward whilst respecting budgetary constraints / ROI thresholds.

Hitachi Security business group is a leading provider of Biometric and Identity management solutions. Using Hitachi proprietary finger vein technology VeinID, we can identify an individual from there vein pattern with in their finger. More secure and accurate than finger print scanners. With the introduction is 2020 of VeinID Five we can now also use a laptop camera to scan Vein patterns, no need for infrared and confirm the identity of who is using the laptop or web based application. This will be extended to mobile devices in 2021.

• Minimise cybersecurity risk • Maximise cybersecurity resilience • The Security Company helps you establish the security behaviours your employees need to minimise cybersecurity risk and maximise cybersecurity resilience across your organisation. We support you to: • identify your organisation’s current cybersecurity maturity • set achievable cybersecurity goals • deploy the most effective range of interventions to drive success. You can choose from individual components through to precisely-tailored and comprehensive solutions that form core elements of your cybersecurity programme. These include: • a baseline survey that provides unique data and analysis on your cybersecurity start point (critical to demonstrate the successful impact of your programme) • dynamic and stimulating communication materials to raise awareness: o eLearning o micro-learning o interactive virtual training to improve knowledge and skills. And because we know training alone will not change behaviour, we support you in developing the strategic approaches that help embed secure behaviour in your organisation’s cybersecurity culture. These include management masterclasses and ambassador programmes. Putting your people at the heart of security.

Bridewell is a leading cyber security services company that specialises in protecting and transforming critical business functions for some of the world’s most trusted organisations. Its teams of security experts work alongside clients to deliver end-to-end services that solve key business challenges. Bridewell's specialists are highly accredited by major industry bodies and have extensive experience delivering services across cyber security, managed security, penetration testing, and data privacy.  Bridewell is headquartered in the UK where they run a 24/7 Security Operations Centre (SOC) and has expanded into the US to further support global clients. Since being founded in 2013, Bridewell has grown rapidly and is now one of the largest cyber security providers. For more information, visit www.bridewell.com. 

We are an optimistic cyber security consultancy of experts in security, data, technology and design that want to build a safer, more secure world where more things go right. We believe that good cyber security: • starts with a deep and thorough understanding of how your organisation works • provides the strongest protection for the most important things • responds and adapts to people's needs Rather than comparing your setup against checklists of known threats and common solutions, we work hard to properly understand your business. We always start with the question "What do you need to protect?" and work our way forward from there. Read more about our approach to positive security: https://cydea.com/blog/positive-security/

At Talion, we’re changing the way organisations interact with their Managed Security Service Provider.  Born out of BAE Systems, our service is built on first-hand knowledge of military engineering and defence-grade security, together with an in-depth understanding of the threat landscape facing the commercial world today.   When it comes to cyber security, we believe every organisation deserves full visibility and complete control over how threats are monitored, how decisions are made, and how their business is protected. That’s why we prioritise transparency and collaboration across our service lines, implementing security programs that give businesses the control and freedom to pursue ambitions and realise goals, safe in the knowledge that we’ve got their back, 24 hours a day, 7 days a week. 

The Risk Ledger platform is an easy to use, secure social network that enables organisations of all sizes to conduct security risk assurance across their entire supply chain in a highly efficient way, moving from the traditional point in time assessment model to a continuous monitoring model that allows organisations to identify and mitigate security risks in their supply chain. Organisations who manage supply chain security with Risk Ledger simply connect with their suppliers on our platform in a matter of seconds with a connection request (like LinkedIn) or invite them to join and complete our standardised supplier assessment. Suppliers on the platform are able to share their regularly maintained security assessment at the click of a button with any other client who runs security due diligence against them in a 'do once, use many model', eliminating the work of completing 10s or 100s of assessments per year. An organization managing their supply chain security on our platform can start their assurance programme in minutes with just a list of their suppliers and contact email addresses and the platform is priced so that organisations can review over 90% of their supply chain affordably. By continuously monitoring the implementation of security controls in the supply chain, the Risk Ledger platform acts as a Security Operations Centre (SOC) for the supply chain network, actively detecting, responding, and preventing attacks across a network of suppliers. This is a new paradigm in supply chain security, moving it away from risk management and towards an active cyber defence product.

Vonahi Security is the creator of vPenTest, an automated network penetration testing platform that replicates full attack simulations with zero configurations. By implementing more efficiency, affordability, comprehensiveness, and automation where necessary, we’re able to maximize the value and quality that traditional security assessments lack and exceed our customers’ expectations. Using vPenTest, organizations can now perform a penetration test at any time to continuously evaluate their risks to cyber attacks in nearly real-time. Vonahi Security is headquartered in Atlanta, GA.

We at CyberOff are all about security awareness content that engages the end consumers and drives positive behavioural changes. Our messaging resonates by tapping into the fun emotions of those who are receiving it. This content works alongside or stands apart from you current campaigns, to be useful not only in the workplace but in the home environment too. The equation for many businesses is to "train" a user to act as their first (or mostly) last line of defence. This thinking is counterintuitive and only serves the business. We contend that if you arm your staff with the tools that keep them and their wider families safe online, then you begin to generate a knowledgable workforce that by default protects the business without you even having to ask them, or worse, mandate it in the annual awareness training provided.

Decipher Cyber 2024 All Rights Reserved.

Privacy policy Cookie policy

Designed and developed by Decipher Cyber Tech Team