Home » Providers

Providers

CTRL + click for multiple selections and unselections
CTRL + click for multiple selections and unselections
CTRL + click for multiple selections and unselections

GuardYoo

GuardYoo is an online Platform delivering fully automated Compromise Assessment audits with Forensic Analysis.

You can check out a video here that gives a good overview: www.guardyoo.com

GuardYoo uses context to identify any anomalies that occur within a network, which means it identifies if something has slipped past existing security solutions and is hiding without the knowledge of the client.

Suite5 Data Intelligence Solutions Limited

Suite5 is an Information Technology Solutions and Services SME with the mission to deliver innovative data-driven intelligence solutions through state-of-the art technologies. Combining strong technology know-how and hands-on approach in managing and implementing projects commissioned by the public and the private sector, Suite5 provides research-inspired solutions and practical support for its clients.

Sacumen

Sacumen specializes in working with Security Product Companies. We are working with 77+ Security Product Companies such as Symantec, Palo Alto Networks, Varonis, AlienVault, IBM, CA Technologies, ThreatConnect, SecurityScorecard, ForgeRock, Code42, BigID, Flashpoint etc in the areas of Connector Development, Connector Support, and Product Engineering. 

Pervade Software

Pervade Software is an independent software vendor with strong roots in the capital of Wales and three award-winning products.

OpView™  is the most flexible security monitoring system on the market which leverages a completely new database architecture to collect, correlate and report on all data types so you can successfully monitor security (SIEM), vulnerability, configuration & availability (SOC), performance, asset & flow (NOC) all in a single configurable system.

Haruspex

Haruspex helps to predict, according to the desired level of confidence, how an ICT infrastructure could be attacked, before the cyber attacks occur in reality, thus providing solutions to neutralize the attackers, making it the perfect match for securing the IT/OT systems.

The prediction can be performed both before the attacks occurs or in real time, under attack, allowing an unmatched level of Cyber Resilience of IT/OT infrastructure.

 

How it works, operationally

FrontEndART Limited

FrontEndART Ltd. was founded by researchers of the Software Engineering Department of the University of Szeged. FrontEndART Ltd. specializes in software quality assurance through automated source code analysis. The wide range of developed products revolves around accomplishing better software for a better, safer and less wasteful world. 

HISPASEC SISTEMAS

Our team of experts has been working more than 20 years of experience providing cyber-security services to international companies.

Our goal is to offer the best service to our customers, always offering the solution that best suits their needs with a 24x7 service the 365 days. We provide  Ethical Hacking services, cybersecurity, anti-fraud, antiphishing, antimalware and early threat detection services, guaranteeing the correct maintenance of your computer systems with constant monitoring.

Your systems will be protected and ready when you need them.

ECORP

The Mobile OS that respects personal data

/e/ is a unique privacy by design ecosystem that combines a mobile OS, carefully selected apps, and online associated services, offering full privacy while matching consumers’ expectations of ease of use and convenience. With its emphasis on design and experience, /e/ is meant for everyone.

Pages

News

On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.