Find the best cyber services for you with Jenny

Sort by:

Nozomi Networks has been delivering innovative cybersecurity and operational visibility solutions for industrial control systems (ICS) since 2013. The company was founded by Andrea Carcano, an authority in industrial network security and Moreno Carullo an expert in artificial intelligence. By applying network behavioral analytics to ICS environments, Nozomi Networks' flagship product, SCADAguardian delivers real-time visibility into process network communications and configurations. Its ICS network mapping and automated process analysis detects cyber-attacks and operational missteps for immediate remediation.

Many people love risk, risk produces adrenaline, it makes you feel alive, produces emotions and is attractive. But when risk affects your business or company, it cannot be allowed. That leads us to look for ways to ensure our goods and business, that's where peacefulness becomes a must, specially when we are unable to see the risks that threaten us. It is precisely there where Camel Secure is born. It was born because there are people like you, because your business exists and we help you take care of it.

Nanotego is a pro-active fluid platform that organically modulates it’s security posture in real-time regardless of geographic location, technology or number of nodes.

AppViewX is revolutionizing the manner in which NetOps and SecOps teams deliver services to the rest of Enterprise IT. The AppViewX Platform is a modular, low-code software application that enables the automation and orchestration of network infrastructure using an intuitive, context-aware, visual workflow. Leveraging a vast library of pre-built tasks and workflows, the platform enables Ops teams to quickly and easily translate business requirements into automation workflows that improve agility, enforce compliance, eliminate errors, and reduce cost.

RAVENii provides companies world-class cyber security protection that expands and changes with their data and infrastructure needs. Our proactive solutions pinpoint vulnerabilities and target where, when, and how to apply customized solutions so we can stop threats before it reaches your network.

Fort Net’s pragmatic approach guides customers through the cyber security journey. We provide our clients with the knowledge they need to operate their business securely at an affordable price. Fort Net works with all types of organisations to ensure they have the right security processes, education and choice of products to provide the appropriate level of security.

The advances in network and enterprise security made in recent years are critically important to critical infrastructure, from power grid networks to industrial control systems. Next-generation security technologies, such as application aware firewalls, intrusion prevention and detection systems, whitelisting, security event monitoring, and correlation of multiple sources of information can provide near real-time detection and response to cyber attacks occurring anywhere across critical infrastructure. Today’s threat landscape requires a fully-deployed, layered security strategy with integrated security products, management, and intelligence to enable stronger countermeasures and enhanced situational awareness to make security actionable for operators. Critical infrastructure vulnerability is why, with our affiliates McAfee and Wind River, we are taking a “security connected” approach. Across every platform and every connection: from chip to cloud, smartphones and tablets, sensors to data centers, and beyond. We are moving security from discrete solutions to an integrated approach as pervasive as computing itself.

Nok Nok Labs is backed by veterans of the security industry from PGP, Netscape, PayPal & Phoenix and have deep experience in building Internet scale security protocols and products. Based in Palo Alto, CA, the company was founded in November 2011 to unify the silos that plague current online authentication technologies. We believe that authentication is the ignition key that can enable a rich set of possibilities for the growing cloud, mobile and ecommerce markets. Authentication should scale easily and securely to meet new innovations in technology, the proliferation of mobile devices, the explosion in data and its management, as well as the rapid increase of malware and cybercrime. Authentication should be universal to meet future needs and the limitless world of the cloud. Key requirements for authentication include strong security and simplicity. However, current approaches and solutions have only been able to deliver one or the other, but not both, creating silos of legacy authentication solutions that limit both enterprises and consumers.

n 2016 Trustonic launched a major expansion of its solution line, Trustonic Application Protection (TAP). TAP empowers developers to protect apps to the highest application security available, using the Trustonic Secured Platform wherever present on a device and market-leading software protection where not. The launch of TAP fundamentally shifted Trustonic from a leader in advanced hardware protection to the most advanced application protection provider in the world. Trustonic is an ecosystem company. We don’t build applications or services, but we do provide a platform upon which our partners can deliver innovative, trusted devices and compelling, immersive services that help us in our everyday lives.

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

Decipher Cyber 2024 All Rights Reserved.

Privacy policy Cookie policy

Designed and developed by Decipher Cyber Tech Team