Find the best cyber services for you with Jenny
Sort by:
Sasa Software is a privately owned provider of Content Disarm and Reconstruction (CDR) cyber-security solutions, protecting over 250 organizations worldwide. Located in Kibbutz Sasa, Upper Galilee, Israel, Sasa Software was founded in 2013 as on offshoot of the technology division of Plasan industries, a US-Army military contractor of military vehicles. Sasa Software’s GateScanner® suite of solutions has been recognized by independent market analyst Frost & Sullivan as the Asia Pacific ICT (Critical Infrastructures) security vendor of the year for 2017.
Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments. Our network security solutions are used by a wide range of organizations throughout the world, including mobile and network security solutions for large enterprises, cloud service providers and telecom operators. Our product portfolio demonstrates world-class performance, flexibility and robustness.
Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.
Mission To enable DevOps, Security and Operations to team up and utilize our identity-based workload protection for continuous security of their cloud-native applications. We help our customers to secure their Kubernetes microservices from development to runtime. We live and breathe DevOps and security providing automated workload level runtime network security and simplify policies creation. Our Team Portshift was founded by serial entrepreneurs Ran Ilany and Zohar Kaufman, who, after experiencing firsthand the limitations of traditional network security in the cloud, identified and decided to take on the next big problem in cloud security using a groundbreaking approach. Portshift was built on the idea that security and operations must be intertwined. Only when the two disciplines work in conjunction can environments be fully secure without compromising efficiency.
We are an industry leader. Our customers are also leaders in their industry segments in the enterprise, government, and communications service provider sectors around the globe. Our products help them navigate today’s most vexing technology challenges such as cloud computing services, a globally outsourced workforce, distributed infrastructure, and increased mobility and collaboration. We also help service providers meet the service demands and expectations of bandwidth-intensive subscribers, while supporting next-generation mobile devices and enabling new revenue-enhancing subscriber services and applications. NETSCOUT stands ready to help your business succeed.
The purpose of these tests were to determine security vulnerabilities in the STTarx application in two applied environments. Server configurations and web applications running on the servers were specified as part of the scope. The tests assumed the identity of an attacker or a user with malicious intent. No due care was attempted to prevent damage to the clients and the servers — the threat assessment included thorough, rigorous efforts to compromise traffic, clients and servers, employing a wide variety of techniques.
Fenror7 lowers the TTD (Time To Detection) of hackers, malwares and APTs in enterprises and organizations by 90% from 300 days on average (by current reports) to 24 hours or less. Fenror7 closes the detection gap the market is facing today using our Lateral Movement Detection (LMD) engine. We use lateral movement detection technology to provide the fastest and most accurate detection of cyber attacks within enterprises and organizations.
Telesoft is a dynamic fast moving business seeking talented professionals. We design high performance data communications technologies and systems to allow communications service providers, network security organisations and large enterprises to monitor, analyse and protect their networks. Excelling in packet technologies Telesoft accelerates IDS/IPS (Intrusion Detection/Prevention Systems) platforms including Bro, Snort & Suricata and penetration testing frameworks (including Kali Linux, MetaSploit and PytBull) using hardware acceleration of core features to achieve multiples of 10Gbps throughput in Commercially available Off The Shelf (COTS) compute platforms.
AS is a trusted analytics powerhouse for organizations seeking immediate value from their data. A deep bench of analytics solutions and broad industry knowledge keep our customers coming back and feeling confident. With SAS®, you can discover insights from your data and make sense of it all. Identify what’s working and fix what isn’t. Make more intelligent decisions. And drive relevant change.
Securing the web applications of today's businesses is perhaps the most overlooked aspect of securing the enterprise. Web application hacking is on the rise with as many as 75% of cyber attacks done at web application level or via the web. Most corporations have secured their data at the network level, but have overlooked the crucial step of checking whether their web applications are vulnerable to attack. Web applications, which often have a direct line into the company's most valuable data assets are online 24/7, completely unprotected by a firewall and therefore easy prey for attackers.