Find the best cyber services for you with Jenny

Sort by:

ThreatX is challenging the current standards of web application protection that have left many organizations exposed and at risk. ThreatX's behavior-based web application and API security solution protects web applications and APIs from cyber threats across cloud and on-prem environments. We deliver complete protection and deep threat visibility by combining behavior profiling, collective threat intelligence, and advanced analytics. Our Managed Service combines threat hunting with access to experts 24x7, significantly reducing the direct operational costs and maintenance burdens of WAFs for enterprises.

As a part of the TÜV NORD GROUP, TÜViT also offers what applies to cars, machines, systems or buildings for your IT: for hardware, application systems, infrastructures, products, processes or software. The TÜV seal and the certificates signal to your customers that they can rely on their products and services. And if you have to comply with certain standards and procedures vis-à-vis test bodies, TÜViT will show you how to best implement this. TÜViT recognizes risks even before damage occurs and leads your projects to success together with you - you can trust that.

The Cyber Resilience Centre is a joint venture between Greater Manchester Police (GMP) and Manchester Digital. We are a non-profit organisation which aims to support businesses by providing the highest standards in leadership, integration and collaboration across the cyber eco-system in Greater Manchester and exists to support, innovate, protect and help grow businesses safely. The Cyber Resilience Centre has an influential network of experienced partners at senior level across many sectors, including Banks, Financial and Professional Services, Cyber Security Providers, the North West Regional Organised Crime Unit (NWROCU), Greater Manchester Combined Authority (GMCA) and local Universities through our collaboration with the Greater Manchester Cyber Foundry. The work of the Cyber Resilience Centre is overseen by a Governance & Advisory Board which is drawn from representatives across policing and leading technology companies to help us prioritise our work.

Vonahi Security is the creator of vPenTest, an automated network penetration testing platform that replicates full attack simulations with zero configurations. By implementing more efficiency, affordability, comprehensiveness, and automation where necessary, we’re able to maximize the value and quality that traditional security assessments lack and exceed our customers’ expectations. Using vPenTest, organizations can now perform a penetration test at any time to continuously evaluate their risks to cyber attacks in nearly real-time. Vonahi Security is headquartered in Atlanta, GA.

Synopsys technology is at the heart of innovations that are changing the way we live and work. The Internet of Things. Autonomous cars. Wearables. Smart medical devices. Secure financial services. Machine learning and computer vision. These breakthroughs are ushering in the era of Smart, Secure Everything where devices are getting smarter, everything's connected, and everything must be secure.Powering this new era of technology are advanced silicon chips, which are made even smarter by the remarkable software that drives them. Synopsys is at the forefront of Smart, Secure Everything with the world's most advanced tools for silicon chip design, verification, IP integration, and application security testing. Our technology helps customers innovate from Silicon to Software, so they can deliver Smart, Secure Everything.

Whether you’re looking to test your systems with VAPT, need a robust incident response plan for when things go wrong, want to breed a culture of security awareness in your organisation, or need to meet key compliance criteria – we’ve got you covered.

ForceShield was established in 2016 by a group of security experts with the goal of changing the game rules in the cybersecurity world.

The Qualys Cloud Platform and its integrated apps help businesses simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications.

The fast evolution and constant threat of cyber attacks, our ever-growing reliance upon digital processes, and the exponential increase in online data makes cyber security one of the greatest challenges of our time. Despite this, few are equipped with the necessary skills to tackle it. Hacker House was created to close the skills gap quickly, efficiently and effectively. Taught by world-renowned ethical hackers, our students are plunged head-first into real world cyber-attack simulations and are assessed across a variety of practical assignments designed to cover every angle. In short, we teach students how to think, act and move like a hacker – and then outmanoeuvre them. Sadly, this kind of approach did not exist on the market before Hacker House; cyber security qualifications were mostly delivered by large, expensive training firms, relied heavily on theory, and were often out-of-date even before publication. What was critically required was cyber security training that moved as fast as the attackers. Thus, Hacker House was born. Our method not only equips people with the right skills and mindsets, but can train many people at scale. Hacker House initially began with training nights in East London but quickly developed into series of workshops. Soon, this evolved into a four-day, classroom based course called ‘Hands on Hacking’. The Hands on Hacking course is made up of modules around core concepts, from intelligence analysis to penetration testing. Taught by real hackers, your employees will learn the skills used by ethical hackers to conduct a variety of assessment activities, and upon completion of each lesson staff will be taught how to launch and defend against an attack.

At Threat Intelligence, everything we do is designed to make the most of your security decisions – now and into the future. The threat environment is evolving whether you are a start-up, established firm or operate in a niche part of the market. Threat Intelligence offers a proactive approach to security by expanding and enhancing its traditional security services with next era security automation services. Designed to protect the reputation and financial stability of your business these services can stop threats impacting you now and for the future. We have grown soundly since launch: today there is a specialist international group with a thriving culture, more services, a strong pedigree of international research and training, plus a strong line of tailored attack solutions, which all represent the power of the brand.

Decipher Cyber 2024 All Rights Reserved.

Privacy policy Cookie policy

Designed and developed by Decipher Cyber Tech Team