Find the best cyber services for you with Jenny

Sort by:

Lanner Electronics Inc (TAIEX 6245) is a leading provider of design, engineering and manufacturing services for advanced network appliances and rugged applied computing platforms for system integrator, service providers and application developers.Lanner provides reliable and customizable computing platforms with high quality and performance. Today, Lanner has a large and dynamic manpower of over 800 well-experienced employees worldwide with the headquarter in Taipei, Taiwan and subsidiaries in the US, Canada, and China.

GE (NYSE: GE) is the world’s Digital Industrial Company, transforming industry with software-defined machines and solutions that are connected, responsive and predictive. GE is organized around a global exchange of knowledge, the “GE Store,” through which each business shares and accesses the same technology, markets, structure and intellect. Each invention further fuels innovation and application across our industrial sectors. With people, services, technology and scale, GE delivers better outcomes for customers by speaking the language of industry. www.ge.com

Untangle is an innovator in cybersecurity products designed specifically for the below-enterprise market, safeguarding businesses, home offices, nonprofits, schools and governmental organisations. Untangle's integrated suite of software and appliances provides enterprise-grade capabilities and consumer-oriented simplicity to organizations with limited IT resources. Untangle's award-winning network security solutions are trusted by over 40,000 customers around the world. Untangle is headquartered in San Jose, California

Cybeats is a complete solution to orchestrate security, monitoring, and firmware lifecycle management of smart buildings, enterprise, medical and critical infrastructure IoT devices, protecting from both previously known and completely new cybersecurity threats. Our team consists of experienced professionals with more than 15 years of experience each in various positions requiring the highest cybersecurity standards both for cloud systems and embedded software. Our team was one of the pioneers building end to end serverless solutions in 2015 when this capability was just announced. Join one of our guilds and you will always be at the bleeding edge of the technology while fighting IoT threats.

Bastille is the first company to enable enterprise security teams to assess and mitigate the risk associated with the growing Internet of Radios. Bastille's patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, cellular, wireless dongles and other IoT communications) in your organization's airspace. Bastille's technology scans the entire radio spectrum, identifying devices on frequencies from 60 MHz to 6 GHz. This data is then gathered and stored, and mapped so that you can understand what devices are transmitting data, and from where in your corporate airspace. This provides improved situational awareness of potential cyber threats and post-event forensic analysis.

Tripwire is the trusted leader for establishing a strong cybersecurity foundation. Partnering with Fortune 500 enterprises, industrial organizations and government agencies, Tripwire protects the integrity of mission-critical systems spanning physical, virtual, cloud and DevOps environments. Tripwire’s award-winning portfolio delivers top critical security controls, including asset discovery, secure configuration management, vulnerability management and log management. As the pioneers of file integrity monitoring (FIM), Tripwire’s expertise is built on a 20+ year history of innovation helping organizations discover, minimize and monitor their attack surfaces.

Beezz was founded in 2013 by a team of cyber security experts, with over 60 years of combined experience managing cyber security and intelligence for the Israeli military. The founding team was responsible for building the army’s closed garden environment, protecting the military’s most sensitive information from international hackers.

XTN is a provider of Behavioural-based Threat and Omnichannel Fraud Protection solutions designed to defend digital businesses avoiding any impact on user experience. Our security solutions are Cognitive using proprietary AI algorithms. We also employ Behavioural Biometric Analysis, both to guarantee complete user profiling, and to evaluate and block anomalies and threats in real-time. Our award-winning Cognitive Security Platform®, specialized in In-App Protection, Fraud Protection, and Digital Identity areas, provides our customers with the highest level of security and a fast return on investment. The XTN team, young, eclectic and highly qualified, is constantly developing our solutions to remain one step ahead of adversaries. XTN is based in Milan, Padua, Rovereto, London, and Boston.

Founded in 2007, Portnox is a market leader for network access control and management solutions that scale from small to medium businesses through to large-scale government and enterprise organizations. By spanning the diversity of network technologies and devices in-use today, Portnox platforms allow companies to grow, optimize and evolve their infrastructure while ensuring security and compliance.

Nok Nok Labs is backed by veterans of the security industry from PGP, Netscape, PayPal & Phoenix and have deep experience in building Internet scale security protocols and products. Based in Palo Alto, CA, the company was founded in November 2011 to unify the silos that plague current online authentication technologies. We believe that authentication is the ignition key that can enable a rich set of possibilities for the growing cloud, mobile and ecommerce markets. Authentication should scale easily and securely to meet new innovations in technology, the proliferation of mobile devices, the explosion in data and its management, as well as the rapid increase of malware and cybercrime. Authentication should be universal to meet future needs and the limitless world of the cloud. Key requirements for authentication include strong security and simplicity. However, current approaches and solutions have only been able to deliver one or the other, but not both, creating silos of legacy authentication solutions that limit both enterprises and consumers.

Decipher Cyber 2024 All Rights Reserved.

Privacy policy Cookie policy

Designed and developed by Decipher Cyber Tech Team