Entities
LogoName Σ Employees
SKEYECODE SKEYECODE

Security technology for financial institutions, fintech companies and blockchains.

Type: Startup Activities: IT Services fintech Technologies: Blockchain/Cryptocurrency

1 1 0 0
NasOnlines data protection NasOnlines data protection

[Automatic translation follows] The NasOnlines software responds to a simple problem: how to easily secure computer data against any type of loss? What student has never had problems with their computer? What happens to the data stored on the computer: family photos, lessons, work due, etc. For a majority of students who lost their data, the value of the data was at least greater than that of the device containing it? even. Likewise, in business, what would happen if all the data stored on computers disappeared? Even for a few hours? What would be the impact on turnover? And how …

Type: Startup Activities: privacytech IT Services Technologies: Data Analytics

0 0 0 0
Hirmes Cybersécurité Hirmes Cybersécurité

[Automatic translation follows] Stay in control of your data. You help keep what is most precious to you is our leitmotif. Hirmes Cybersecurity is a company that works for digital trust. We offer consulting and audit services in the field of securing information systems. Based in Clermont-Ferrand, we are committed to securing and supporting all digital players in the Rhône Alpes Auvergne region. Our service offerings are adapted from VSEs to SMEs with several areas of expertise: - Website monitoring and security (e-commerce, business site, association site). - Security audit and intrusion test of your information systems. (GDPR compliance) - …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 0
BlackBoxSecu BlackBoxSecu

BlackBoxSecu is a company dedicated to ensuring your confidentiality by protecting the personal and business phone conversations. BlackBoxSecu provides innovative and state of the art anti-eavesdropping solutions for different telecommunication medium (mobile, fixed-line, internet, walkie-talkie, etc.). We do not develop one more mobile application, we're bringing to market a brand new companion device. With an instant and no-hassle connection to your phone, you can protect your privacy. Voice encryption and Telecommunications

Type: Startup Activities: IT Services Technologies: Wireless

2 0 2 0
SecludIT - Ahead of Security SecludIT - Ahead of Security

Founded by security experts together with EURECOM, a French research institute in telecom and network security, SecludIT has developed Elastic Security, a set of products and services specifically designed to help cloud infrastructure providers and users to safely migrate to the cloud. Since its creation in 2011, SecludIT has become a recognized industry player, one of the Cloud Security Alliance founders and active member, co-author of Security Best Practices 2.1. SecludIT is a technology partner of Amazon Web Services, HP Cloud, VMware and Eucalyptus. Cloud Computing, Security, IaaS, Monitoring, Automation, Vulnerability Assessment, Audit, Amazon Web Services (AWS EC2 & VPC), …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
VUPEN VUPEN

VUPEN is the leading provider of defensive and offensive cyber security intelligence and advanced vulnerability research. While other companies in the vulnerability intelligence industry mainly act as brokers who buy vulnerabilities from third-party researchers and then sell them to their customers, all VUPEN's vulnerability intelligence results exclusively from our internal and in-house research efforts conducted by our team of world-class researchers. VUPEN's offensive IT intrusion solutions and government grade exploits enable the Intelligence community and government agencies to achieve their offensive cyber operations and lawful intercept missions using VUPEN's industry-recognized vulnerability research and intelligence. VUPEN's defensive security research enables governments …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
NetSecure Day NetSecure Day

[Automatic translation follows] See you on December 12 for #NSD19 // #Cybersecurity day in #Normandy See you on December 12 for #NSD19 // #Cybersecurity day in #Normandy -------------------- -------------------- The #NSD event is the annual cybersecurity meeting in Normandy. Organized since 2013 by the NetSecure Day association, this annual event has already brought together more than 1,700 people around 56 conferences over the 6 previous editions. With the support of public organizations and private companies, each year the association offers technical, strategic and legal conferences as well as feedback on the field of cybersecurity to an ever-growing audience. Free and …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

11 1 11 1
Pwnie Express (now Outpost24) Pwnie Express (now Outpost24)

Detect and monitor every wireless and wired devices to mitigate the risk of rogue devices and access points Pwnie Express closes the IoT security gap exposed by the deployment of IoT in the enterprise. By continuously identifying and assessing all devices and IoT systems, our security platform prevents IoT based threats from disrupting business operations. All without the need for agents, or changes to network infrastructure. To learn more about Pwnie Express visit www.pwnieexpress.com. Network Security, Device Threat Detection, Cyber Security Research and Development, Rogue access point detection, WiFi security, Bluetooth Security, and IoT Security Assessment

Type: Startup Activities: IT Services Technologies: IoT Cybersecurity Wireless

0 0 0 1
ERPScan ERPScan

ERPScan is the most respected and credible Business Application Security provider. Founded in 2010, the company operates globally and enables large Oil and Gas, Financial and Retail organizations to secure their mission-critical processes. Named as an ‘Emerging Vendor’ in Security by CRN, listed among “TOP 100 SAP Solution providers” and distinguished by 30+ other awards, ERPScan is the leading SAP SE partner in discovering and resolving security vulnerabilities. ERPScan consultants work with SAP SE in Walldorf to assist in improving the security of their latest solutions. ERPScan’s primary mission is to bridge the gap between technical and business security, and …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 1
PixelPin PixelPin

Lock in at Login - Increase Marketing ROI - Improve customer's Digital Experience If you could remove the friction from your customer's digital journey across any digital channel, suddenly the pain and awkwardness of meaningless and insecure passwords becomes a huge opportunity. PixelPin helps you retain the loyalty of your existing customers, cost effectively attract new customers and in doing so make your customers journey simple and secure. Designed to benefit Chief Marketing Officers, Digital Innovators, Customer Experience and Security Leaders. PixelPin specialises in Retail, Entertainment, Travel & Leisure industries, helping their customers fully engage through all digital channels across …

Type: Startup Activities: IT Services Technologies: Data Analytics

11 6 8 1
Incloudio Incloudio

[Automatic translation follows] After 3 years of adventure between initial reflection, incubation and development, Incloudio ceased its activity in May 2017. A digital security technology company, Incloudio was developing an AppSec / DevSecOps consulting offering and SaaS security platforms 100% designed, operated and hosted in France: - CORE: Code review - VULNUS: Vulnerability management - CITADEL: Application protection Web application protection, Website protection, Code Review, Code Review, Vulnerability Management, Vulnerability Management, AppSec, DevSec, Digital Security, and Cloud

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
EuskalHack EuskalHack

[Automatic translation follows] EuskalHack Computer Security Association The EuskalHack Computer Security Association is a non-profit organization established in Donostia and made up of various professionals linked to computer security and computer forensics research. Our objective is to promote the community and culture regarding digital security to any type of interested public, whether public or private, through the promotion and dissemination of mainly technical knowledge. We work to promote activities such as the organization of seminars and conferences, where we disseminate and share advances and research achieved in the national and international sector. Likewise, we promote collaboration among the attending public, …

Tags: H2020 Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

2 1 2 1
Aitivity Inc Aitivity Inc

A cybersecurity company, developing a more secure, faster and scalable blockchain solution for enterprises. A cybersecurity company, developing a more secure, faster and scalable blockchain solution for enterprises. blockchain, iot, hardware, and cybersecurity

Type: Startup Activities: IT Services Technologies: Cybersecurity Blockchain/Cryptocurrency IoT

2 2 0 1
ArcanSecurity ArcanSecurity

[Automatic translation follows] ArcanSecurity is developing an innovative password-free authentication solution to simplify a user's connection process while improving the level of security. Security, Authentication, Cryptography, Software Development, and Cloud

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 0 1
Cybelius Cybelius

Industrial Cyber Solutions Cybelius is the first industrial cybersecurity solutions provider, designed to ensure the operational continuity of SCADA and ICS networks for Critical Infrastructure (energy, water, transport...), Manufacturers and all the industry. Cybelius development team, made of experienced SCADA and Cybersecurity experts, can meet all your cybersecurity issues. Our 3 major strategic fields of activity: - risk analysis & operational security - IS diagnosis - cybersecurity solutions. Cybelius's passive solutions are: CyPRES (a cyber attack detection probe) and CyFENCE (a secure interface between IT and OT). They are designed to avoid downtime, process manipulation or theft of sensitive proprietary …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
GreenLock Advisory GreenLock Advisory

Offensive security & Threat Intelligence GreenLock Advisory is an independant consulting firm created in 2015. We are offering several expertises on cyber-security: - Penetration testing - Architecture review - Threat intelligence/hunting - Automation of Security Operations - Vulnerability management cybersecurity, audit, security, threat intelligence, vulnerability management, and Automation

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
MaadixZone S.L. MaadixZone S.L.

MaadixZone S.L is a company based in Barcelona and dedicated to the development of IT solutions for companies and professionals focusing on the protection of their privacy and digital autonomy. Every time we use "free"​ services provided by large companies, we are providing them with extremely valuable information. In order to access these services, we must subscribe to certain terms of use, which oblige us to accept practices that undermine our privacy. We lose control over our data, which is caged in closed platforms controlled by companies whose business is, in most cases, based on the marketing of our personal …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity

1 1 0 1
WEBGAP WEBGAP

Remote Browser Isolation | Between You & The Malware WEBGAP is a proprietary browser isolation platform designed to physically isolate its users from web based cyberattacks. Put a WEBGAP between your users and malware using our fully hosted remote browsing service for complete internet peace of mind. #BrowserIsolation #Cybersecurity #RemoteBrowsing Browser Isolation, Remote Browsing, Cybersecurity, Infosec, and Information Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 3 1
LOCKCODE LOCKCODE

...empowering and protecting the C-Suite in cyber space About Lockcode Lockcode is a niche technology risk, information and cyber security consultancy, originally established in 2004 to provide certified professional security services to the HMG defence and intelligence community, now we both buy businesses and help business owners grow their businesses. About Our Founder Lockcode's female founder has worked in HMG Infosec, Information Assurance and Cyber Security for over 22 years, certified by the Authority at the highest level, and science, technology, engineering for over 40 years. Are You a Business Owner looking to sell? We are currently looking to purchase …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 1 0 1
SMESEC SMESEC

SMESEC is a project, consortium, and framework of tools and advice for turning cyber security into an opportunity for small and medium-sized enterprises. This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 740787 (SMESEC). This work is supported by the Swiss State Secretariat for Education‚ Research and Innovation (SERI) under contract number 17.00067. The opinions expressed and arguments employed herein reflect the author’s view. The European Commission and SERI are not responsible for any use that may be made of the information it contains. Cybersecurity, SME, IoT, SmartCities, E-.Voting, and …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

1 0 1 1
Smart Cybersecurity Network Smart Cybersecurity Network

[Automatic translation follows] SERENE-RISC is... an integrated cybersecurity network that connects those who generate knowledge with those who put it into practice. SERENE-RISC supports collaboration between universities, industry, government and non-profit organizations across many sectors and disciplines. The network develops tools that facilitate the uptake and application of world-class research results. It's also... a network including more than 40 academics across 10 disciplines at 24 post-secondary institutions around Canada and more than 24 public and private sector members, and 6 NPO. Our key values: →Inclusive →Impartial →Empowering →Evidence-based ----- SERENE-RISC is... an integrated cybersecurity network that connects those who generate …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 1
Cuckoo Sandbox Cuckoo Sandbox

Cuckoo Sandbox is the leading open source automated malware analysis system. We specialize in sandboxing and making these resources available to anyone in need of such - being it malware researches, CERTs & SOCs, banks, or governments.

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

1 1 0 1
Graphus Inc. Graphus Inc.

Simple, Powerful, Automated Phishing and Spam Defense Platform Graphus, a Kaseya company, provides an automated, AI-based email security solution for Microsoft 365 and Google Workspace that combines ironclad anti-phishing defense with personalized anti-spam protection -- with no manual IT admin intervention necessary. Using a powerful AI algorithm and machine learning, Graphus stops both known and zero-day email-borne threats, including phishing, business email compromise (BEC), account takeover (ATO) and ransomware attacks. Graphus takes just minutes to deploy via an API -- with no MX record changes, email rerouting or agent installation needed. Cybersecurity, Phishing, Social Engineering, Spear Phishing, Machine Learning, Email …

Type: Startup Activities: IT Services Technologies: Data Analytics Cybersecurity A.I. A.I. - Machine Learning

1 0 1 1
Uplevel Security Uplevel Security

Uplevel has been acquired by McAfee. Please follow McAfee for future updates from us. Uplevel Security, acquired by McAfee, provides an adaptive system of intelligence that uses graph theory and machine learning to dynamically inform the handling of cyber threats. Uplevel ingests and contextualizes current and historical security alerts, threat intelligence and incident data to uncover hidden threats and track patterns that can predict how attacks may manifest in the future. Enterprises rely on Uplevel to extract insights from the overwhelming amount of data generated by security stacks and provide the context and analysis needed to resolve threats faster and …

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics A.I. A.I. - Machine Learning

4 2 2 1
ReFirm Labs, Inc. ReFirm Labs, Inc.

Type: Startup Activities: IT Services transporttech regtech

4 0 1 1
Crypho (part of Techstep) Crypho (part of Techstep)

Crypho is group chat and file sharing with end-to-end encryption. What sets it apart from similar systems is the uncompromising focus on security. All messages and files are encrypted before they are transferred over the network. They can only be decrypted when they reach their intended recipient. Since only the users themselves hold the encryption keys, no-one else can access the data, not even Crypho's staff. To offer the highest possible security, Crypho uses a combination of proven encryption schemes and key management techniques, all hidden from the end-user. This allows for an application that is user-friendly while still maintaining …

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 1 6 1
Threatcare Threatcare

The leader in proactive attack simulations. Recently acquired by ReliaQuest. Threatcare is the leader in proactive attack simulations, helping companies measure the effectiveness of their cybersecurity programs through their software. Their real-time insights and actionable recommendations enable companies to secure more faster, while having greater confidence in their current security controls. ReliaQuest’s recent acquisition of Threatcare will enhance the power of the ReliaQuest GreyMatter platform by enabling enterprise customers to vastly increase the quality and efficacy of their detection and response capabilities. Breach and Attack Simulation, Penetration Testing, Incident Response, Vulnerability Scans, BAS Technology, Cybersecurity, and Information Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 0 1
Liquidity Network Liquidity Network

Decentralized Trustless Finance LiquidChain builds the Liquidity.Network (http://liquidity.network), a practical global blockchain micropayment system, built on top of Ethereum, supporting millions of users securely, reducing transaction costs significantly and enabling the mainstream adoption of blockchain. As a global settlement system, the Liquidity.Network offers an API to developers to build their applications on top of and allowing payment processors to benefit from the secure and fast transmission of digital cash. The Liquidity.Network has no access to the assets of the participants/users, those funds are secured by the underlying blockchain. The secret sauce of the Liquidity.Network are novel hubs, which are significantly …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

1 0 0 1
Cryptium Labs Cryptium Labs

Swiss-made Security-Oriented Staking Services Cryptium Labs offers secure and highly available digital signatures for Proof-of-Stake networks, such as Tezos, Cøsmos, and Polkadot from the Swiss Alps We publish educational, research-oriented, and data-driven analysis on Blockchain and all the disciplines the underlying technology requires, such as Cryptography, Computer Science, Hardware, or Security. We also wish to bring down the barriers to entry for people who struggle with technical jargon by writing easy-to-read and highly comprehensive content, suitable for audience with diverse backgrounds. Our aim is to make it as simple and secure as possible for all the stakeholders to participate and …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

2 0 1 1
Entrust Data Protection Solutions Entrust Data Protection Solutions

Whether deployed physically on-premises or as-a-Service, Entrust nShield HSMs are among the highest-performing, most secure and easy-to-integrate HSM solutions available, facilitating regulatory compliance and delivering the highest levels of data and application security for enterprise, financial and government organizations. Entrust keeps the world moving safely by enabling trusted identities, payments and data protection around the globe. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, or accessing corporate networks. With our unmatched breadth of digital security and credential issuance solutions, it’s no wonder the world’s most entrusted organizations trust us.

Type: SMB Activities: privacytech IT Services Technologies: Blockchain/Cryptocurrency Cybersecurity

3 1 2 1
cironet cloud data security gmbh.co.kg cironet cloud data security gmbh.co.kg

Cybersecurity . Information Security . Data Protection Audits, Expert Opinion, Webinars und Research cironet offers services in the area of cloud data security (data protection, / cybersecurity) and blockchain technologies. Our focus is on analyses, expert opinions and audits (pentest / ISO27001 / DSGVO) in complex infrastructure, decentralized blockchain and cloud environments. and use of agile methods and data science models. Our team consists of certified lecturers, analysts and auditors in the area of ISO 27001, DSGVO, ISO20000, ITIL 4 and agile methods (SCRUM). and technology expertise in Microsoft Cloud OS - (Azure OS, Azure DevOps, MS365 platform), Open Source …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity Blockchain/Cryptocurrency Data Analytics

0 0 0 1
Seguru Seguru

Our mission is to provide everyone with a safer digital experience. Founded by experienced cybersecurity experts in response to increasing online threats against consumers. Your private information is out in the open, prey for anyone with a mind to get their hands on it; a virtual sheep in a world of wolves. You’re smart. You know protecting it is of vital importance. Data security is about more than simply keeping an unwelcome hand off of your private information; it’s about knowing where your data is traveling, and having the power to do something about it. Seguru is the vessel with …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 1 1
Infosecure Infosecure

[Automatic translation follows] Protect data and network with Infosecure solutions Protect your company data! Your data produced and stored is vital to the operation of your business. Every day this digital heritage is exposed. A suitable backup policy is essential to cover your entire IT fleet and ensure the continuity of your business. data backup, computer network protection, cyber resilience, cyber security, and VPN

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
The Authoriti Network, Inc. The Authoriti Network, Inc.

... So long and thanks for all of the fish.

Type: Startup Activities: fintech healthtech insurtech IT Services

1 0 1 1
Agarri Agarri

[Automatic translation follows] Advice, training and services in offensive IT security: intrusion testing, Burp Suite Pro training, code audit, black-box testing, awareness, risk analysis, fuzzing, vulnerability search, application audit, etc. From the magnificent setting of the Luberon, Agarri satisfies its customers located all over the world. security, hacking, pentest, exploit, testing, and risk

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 0 1
EXPINFO EXPINFO

[Automatic translation follows] Expinfo, cybersecurity expert, aims to provide you with the best IT security. At Expinfo we are working to create a safer and more secure digital world. We believe in prevention to protect SMEs and mid-sized companies in our region. To this end, we provide quality cybersecurity services. We intervene on different levels of protection: proactive security with optimal and personalized protection, employee training, and crisis management in the event of a problem. For example, we offer: 24/7 emergency intervention (on site or remotely), search for evidence, vulnerability scans, intrusion tests (Pentest), GDPR - DPO compliance, false phishing …

Type: SMB Activities: legaltech Technologies: Cybersecurity

0 0 0 1
AFI Business Consulting AFI Business Consulting

Be Better AFI Business Consulting provides a wide range of professional and a better consulting services approach to all size businesses. Areas of focus include : - CIO/CSO/VP department turn-around, - Information Security Audit & Management, - IS Risk Management, - Incident Management, - Business Continuity Management, - Professional training, Information Security Training; - IT Service Management Consulting; - Project & Proof of Concept Management; - IoT Security Consulting; - RFI/RFP management. We will be happy to offer you our services with results oriented commitment and a high quality standards. Our credo : Be Better. IS Security Consulting, IS Management, …

Type: SMB Activities: Consulting IT Services Technologies: Cybersecurity IoT

0 0 0 1
Moix Security Moix Security

Security is consulting firm specialising in application and software security. We help organisations design, build, and maintain secure software. software security, penetration testing, and vulnerability assessment

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 1
Dune Network Foundation Dune Network Foundation

Dune Network is a blockchain platform for enterprises, with a focus on security and safety. The Dune Foundation manages the Dune Network platform, a blockchain for distributed applications focusing on security and safety.

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 1
Foreseeti (now part of Google Cloud) Foreseeti (now part of Google Cloud)

Empowering you to act on cyber risks instead of incidents foreseeti is now part of Google Cloud

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 1 1
WeavAir WeavAir

ESG digital twin| Global We're recruiting - please apply at https://bit.ly/applytoweavair WeavAir built the first solution that harnesses satellite data, advanced IoT sensors as well as predictive software to optimize ESG investment and operation of assets like buildings and fleets while improving safety and reducing emissions and carbon footprint. The company is a winner of over 20 awards including the Clean50 Top Project, Le Monde Smart City Award, IoT/WT Innovation World Cup and WeGo Smart City Secretary General's award. AI, Blockchain, IoT, Air Quality, Analytics, Security, and Energy-saving

Type: Startup Activities: Smart City cleantech greentech Technologies: Blockchain/Cryptocurrency Decarbonization IoT Sensors

8 6 2 1
LogSentinel LogSentinel

Simplify security and ease compliance with LogSentinel SIEM We, at LogSentinel, deliver robust and reliable cybersecurity solutions designed to protect against data breaches and insider attacks, as well as ensure a higher level of compliance with legal standards and regulations. The average enterprise has 75 different security tools, and yet is still losing the battle with cybercriminals. Are you? Instead of having to deploy and manage dozens of point security and compliance tools, now all you need to stay safe and be compliant is LogSentinel Next-Generation Security Information and Event Management system. Log management, behavior analytics, advanced AI-driven threat detection …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Blockchain/Cryptocurrency Cybersecurity

2 0 2 1
SecurityCurve SecurityCurve

Get Ahead of the Curve - Independent Consulting, Research, and Education for IT Security Success SecurityCurve helps companies succeed by providing strategic cybersecurity advisory services to large and small enterprises. And we provide competitive advantage to vendors that want to know what customers are really looking for in a product solution set. History The company was founded in April 2003 to formalize the business model our clients found most valuable: as-needed access to security experts who work as trusted advisors, understand the clients’ needs, the underlying application architecture and know how to bridge the gap between business and technology. There …

Type: SMB Activities: IT Services Technologies: Cybersecurity IoT

10 1 5 1
Firmalyzer Firmalyzer

Automated, proactive and effective OT/IoT/connected device discovery and vulnerability assessment Firmalyzer brings in-depth visibility of OT/IoT/connected device assets and their vulnerabilities into your vulnerability management program. It can be deployed as a standalone solution or integrated with your existing IT asset management and vulnerability assessment solution, providing continuous risk monitoring of IoT assets in enterprise networks without requiring network traffic collection or installation of software agents on IoT devices. Firmalyzer analysis dashboard will present security posture of all IoT devices across different departments of your organization that includes devices with critical and high risk vulnerabilities, devices with outdated firmware and …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT Sensors

1 1 0 1
     Umbra Umbra

Secure all electronic devices, so the real meeting can start. Store your electronic devices in Umbra. Now the real meeting can start. Umbra is a new kind of privacy device that prevents spyware-compromised smartphones (e.g, Pegasus, Predator) from recording or transmitting during your sensitive meetings, without ever leaving their owner's sight. It is advanced confidentiality protection made accessible through a trustworthy and convenient experience.

Type: Startup Activities: IT Services Technologies: IoT

0 0 0 1
BitLogiK BitLogiK

Specific infosec : Access, Payments, Blockchain, Privacy Specific infosec : Access, Payments, Blockchain, Privacy. Security systems design and review. Analysis and improving cryptographic implementations. Secret keys and data protection. infosec, blockchain, payments, access systems, cryptography, cloud, and privacy

Type: Startup Activities: privacytech IT Services Technologies: Blockchain/Cryptocurrency

1 0 0 1
Face-Alive Face-Alive

Startup specialized in biometric security enhancement which gather industrial experts and academic partner. FACE-ALIVE is a startup specialized in biometric security enhancement which gather experts coming from industries and academic partner. FACE-ALIVE’s liveness detection system performs instantly a 3D capture with a 2D Camera detecting any presentation attack. Our technology is reliable, portable and certified. FACE-ALIVE est une startup spécialisée dans l'amélioration de la sécurité biométrique qui rassemble des experts de l'industrie et de la recherche. Le système de détection du vivant de FACE-ALIVE effectue instantanément une capture 3D avec une caméra 2D détectant toute attaque de présentation. Notre technologie …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 4 1
SecurIT Innosup SecurIT Innosup

Goal: identify security needs and usecases and support 63 best-in-class projects developped by 126 SMEs across Europe SecurIT is a European project (H2020-Innosup-01) aiming at supporting and co-financing the development of collaborative projects allowing prototyping and experimentation of top-notch technological solutions in the field of Security, with respect of the nowadays ethics, legal, and social challenges. The project is structured in three major axes: - Demand analyses (new use cases identification) on the Security market, with integrators and final users (including industrial players, public authorities, managers of critical infrastructures...) - Identification of technological solutions in Europe (solutions and services for …

Type: Public Activities: IT Services

10 4 9 1
FIRST France FIRST France

Resilience, Security and Trust first To build a safer Europe and seize digital opportunities with trust, we decided to work together

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
CyberTour CyberTour

[Automatic translation follows] Cybersecurity near you. Explore, Learn, Discover. The CyberTour is: 📣 Conferences At the heart of our mission, our conferences aim to acculturate and raise awareness among public and private actors about digital issues. Each event is an opportunity to dive into the latest trends, challenges and innovations presented by experts in the field. 📜 The Cyber ​​Journal The Cyber ​​Journal is our voice in the world of cybersecurity, a periodic publication that complements our conferences and training. Each edition is rich in analyses, feedback, case studies, portraits, and tips offering our readers valuable insights into practices and …

Type: Event

20 5 17 1
ATHENE Digital Hub Cybersecurity ATHENE Digital Hub Cybersecurity

Located in Germany's cyber hot-spot, we are Germany’s leading innovation community of cybersecurity start-ups, founders, coders, investors and scientists. The hub is a project of ATHENE, the National Research Center for Applied Cybersecurity. It is also part of the German Federal Ministry of Economic Affairs and Energy's Digital Hub Initiative to promote digital innovation in Germany. If you are interested to learn more about how we can support you, don't hesitate to reach out or check out our homepage: https://www.athene-center.de/gruenden. Imprint: https://www.athene-center.de/impressum Privacy Statement: https://www.athene-center.de/en/privacy-statement

Type: Public Activities: IT Services

4 2 1 1
MalCrawler MalCrawler

We protect computers in the ICS/SCADA world from malware. We Prevent, Analyze, and Destroy malware! MalCrawler is a next generation cyber security product that detects, analyzes, and destroys malware targeting critical infrastructure such as Power, Oil & Gas, Manufacturing, and more. MalCrawler also detects, analyzes, and destroys malware for the IT enterprise. Malware, SCADA, and Industrial Control System

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
PyGuard PyGuard

[Automatic translation follows] PyGuard offers the latest technology in protecting personal data from connected objects. PyGuard, innovation in the service of personal data PyGuard offers the latest technology in protecting personal data from connected objects. The solution ensures control, security and protection of personal data to guarantee privacy. Personal data security, Data protection, Connected objects, and IoT

Type: Startup Activities: privacytech IT Services Technologies: IoT Cybersecurity

0 0 0 1
IA_AUT_ECO IA_AUT_ECO

Push back the possible, the impossible, is not on the agenda JDiscover our revolutionary AI solution: the ultimate defense against current and future attacks. In an era of cyber hacking and offensive artificial intelligence, traditional APT methods are proving insufficient. Preserve the integrity of your vital business data with our unparalleled AI solution. A standard bearer for visionary companies, we are building a secure future hand in hand with our innovation. AI, deeptech, open source, cybersecurité, and AI ethics

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning A.I. - Deep Learning

20 1 19 1
abuse.ch abuse.ch

Cyber Security - figthing malware and botnets abuse.ch is providing community driven threat intelligence on cyber threats. It is the home of a couple of projects that are helping internet service providers and network operators protecting their infrastructure from malware. IT-Security researchers, vendors and law enforcement agencies rely on data from abuse.ch, trying to make the internet a safer place. cybersicherheit, cybersecurity, and threat intelligence

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 1
ThreatsHub ThreatsHub

Threat Analysis & Cloud Security, a tailored architecture to help your security teams fight against cyber-threats ThreatsHub provides reliable and actionable Threat Intelligence and Cloud Security Services. Combines Machine Learning and Cybersecurity techniques in a custom built platform to scan, acquire and classify public Internet data. Our innovation and research make it possible to tackle escalating cyber risks through exceptional network visibility, threat detection and operational insight. Learn more at threatshub.org. Get security news, trends and insights at threatshub.org/blog or follow us on Twitter @ThreatsHub.

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I. - Machine Learning

0 0 0 1
CybSec CybSec

[Automatic translation follows] French Threat Intelligence, Investigation and Analysis Agency specializing in Cyber ​​Risk Intelligence. First French Threat Intelligence, Investigation and Analysis Agency specializing in Cyber ​​Risk Intelligence. Targeted CTI provider. Specialist in Cyber ​​Intelligence and CyberProfiling. #infosec #ThreatIntel #cybersecurity A non-profit association, CybSec TIA is made up of experts in Cyber ​​Threat Intelligence. https://www.reddit.com/r/CybSecTIA/ | https://twitter.com/CybsecTIA Cyber ​​Threat Intelligence, Cyber ​​Risk, Cybersecurity, CyberProfiling, Threat Intelligence, and Cyber ​​Psychology

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
CHACK - Protection informatique CHACK - Protection informatique

[Automatic translation follows] Cybersecurity solutions, services and training for SMEs/ETIs Chack is a service company offering IT security support solutions through time-sharing or à la carte CISO time, security audits, intrusion tests (pentest), training, development business recovery plans, support and management for GDPR compliance as well as cyber tools (EDR, XDR, SIEM, SOC, SOAR) in managed service.

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 1 1
CLUSIR Nord de France CLUSIR Nord de France

[Automatic translation follows] CLUB FOR REFLECTIONS AND EXCHANGES ON GOOD PRACTICES FOR IMPROVING BUSINESS SECURITY in HAUTS-DE-FRANCE CLUSIR Nord de France is a club for reflection, exchanges on good practices, awareness-raising, meetings and contributions to the improvement of digital security. To keep in touch : - Website: https://www.clusir-ndf.fr/ - Twitter: https://twitter.com/ClusirNdf - Youtube: https://www.youtube.com/channel/UCSl0HqWoPqXaWthn7yh6QwA

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

6 3 3 1
allpriv allpriv

Edge cybersecurity solutions based in Zero-trust endpoints managed by A.I. & Blockchain Next-gen cybersecurity Easier & Safer than ever before. Allpriv designs "Zero-trust Endpoints managed by A.I. secured by Blockchain" tackling all legacy pains, lacks & gaps! - "Medical Cyber-Brick" Mitigates dramatically cyberthreats on Hospitals, building a cyber-shield on each Medical Devices - "Telework Easier & Safer than ever before" increases as well security than Efficiency to remote workforce, IT & CISO

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency Cybersecurity

8 3 6 1
Amn Brains Amn Brains

[Automatic translation follows] Software suite to manage cybersecurity with rigor, in a fine-grained manner and focused on the logic of the attacker Are you a cybersecurity auditor...and you want to speed up the writing of your compliance audit reports? Amn Auditor software allows you to write the majority of your audit report during your audit interviews. Concretely, ... you take notes on the software, ... you get help from auto-completion/suggestion, ...based on keywords ...and then at the exit, in two clicks, ... you generate your report, ...in different formats, ... with your graphic charter, or that of your client. Interested …

Type: Startup Activities: IT Services Technologies: SaaS

1 1 0 1
SecBI - Universal XDR (Acquired by LogPoint) SecBI - Universal XDR (Acquired by LogPoint)

eXtended Detection and Response SecBI has evolved the traditional siloed approach in cybersecurity to an XDR Platform for a cross-product integration of network, endpoints, and cloud security tools to deliver automated smart threat detection and response. Without the need for agents, SecBI’s XDR maximizes organizations’ investment in their existing security tools and provides end-to-end protection, including against stealthy, low and slow attacks that cost organizations dearly. SecBI is currently used by financial institutions, telecoms, retailers, and manufacturing enterprises worldwide. For more information, visit: www.secbi.com or write: info@secbi.com Security Operations Centre SOC, Investigation, Cyber Security, start up, Advanced Threat, Threat Detection, …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

0 0 0 2
APrivacy APrivacy

Securing the digital world. Combining seamless data security with convenience for the financial services industry. APrivacy provides the banking and finance industry with an information security and tracking service anywhere, any time and on any device. APrivacy’s enabling technology allows banks to drive new revenues, reduce risk and support compliance efforts. APrivacy’s patented solution empowers bankers to communicate and share information with their clients using the devices they prefer (iPhone, Android, etc.) via the channels they prefer (Gmail, Outlook, Dropbox, etc. ) and the medium they prefer (Email, PDF, PPT, Word, Excel, etc. ). With APrivacy financial institutions achieve a …

Type: Startup Activities: IT Services Technologies: Data Analytics

0 0 0 2
Kleverware by WALLIX Kleverware by WALLIX

The Key solution to Governance Kleverware provides solutions where helps companies answer questions from auditors. Help the Business to reduce the time for compliance. Mitigate Identity & Access risks. Kleverware IAG his flexible solutions. Kleverware has been a pioneer in IAG (Identity & Access Governance) since 2005, constantly focusing on innovation and its return on investments. Our goal is to help businesses mitigates the risks associated with managing their permissions. Kleverware solutions lets you see who has access to what and why. IAM - IAG, Role Management, Access review, access governance, gestion des habilitations, gouvernance des identités, and audit des …

Type: SMB Activities: IT Services

1 0 1 2
CISO COUNCIL CISO COUNCIL

A Global Platform for Security, Risk & Assurance Leaders. Connect - Collaborate -Contribute - Learn CISO COUNCIL is an initiative connecting global Cyber Security, Risk & Assurance Leaders as a community. This community allows them to network, discuss and deliberate certain matters related to business, Information and digital technology risks. CISO Council provides members with a trusted platform to share & learn their domain knowledge and experience with other members through a structured approach of Events and Thought Leadership Series, Guidance and implementation documents, Research reports & Tool-kits. CISO COUNCIL is Hosted on CISOCONNECTTM (Technology Platform connecting the Cyber-security community …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

1 0 0 2
Lokly Lokly

We developed Lokly, a secure and connected flash drive for mobile professionals. Control, access, share data anywhere. The Lokly makes possible the transportation and share of your confidential data everywhere, safely and easily. It looks like a crypted USB key controlled (driven) by a smartphone.

Type: Startup Activities: IT Services Technologies: Data Analytics

3 2 1 2
Chainspace Chainspace

Sharded smart contracts. Decentralised infrastructure on a planetary scale. The Chainspace platform is powering a community of makers. Makers committed to building decentralised services that allow us all to have greater ownership and control of how we interact with the digital world. We don't care about being the first, we care about being outstanding. Blockchain, Sharding, S-BAC, Atomicity, Decentralisation, User-Centred Design, and Open Source

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

0 0 0 2
LICENS3D LICENS3D

Barcelona based startup that is focused on resolving the challenges that exist in protecting intellectual property thoughts the entire product design and manufacturing process. Current team members are Viktor Nordstrom, founder of CL3VER, Josep Lluis de la Rosa, professor of the University of Girona and David Belgoff, entrepreneur and business developer. The company has its origins in “The Collider”, an innovative venture builder program that combines best of breed from the Spanish scientific and entrepreneurial communities in order to launch highly innovative technological startups. The program was created by Mobile World Capital, consortium backed by the Spanish Ministry of Industry, …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

2 1 0 2
Threatpost Threatpost

Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world. Follow Threatpost to stay up to date on the latest cybersecurity news: Twitter: @Threatpost Facebook: https://www.facebook.com/Threatpost/ Cybersecurity, Privacy, Vulnerabilities, and Breaches

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

11 2 4 2
Mohatra Mohatra

[Automatic translation follows] Mohatra at the service of professionals: IT, GDPR, Consulting, ERP and Project management MOHATRA has been Qualiopi certified since January 2022 to guarantee you the greatest professionalism for your training. All our training can be covered by your OPCO. Do not hesitate to contact us for further information. GDPR, CyberSecurity, our team supports you in your efforts to protect personal data. In 2024, become a business provider!! Mohatra is recruiting to expand its intervention network nationally. Find out more about the offer: https://mohatra.fr/devenir-apporteur-daffaires/ Business Development, Real Estate, Renewable Energy, GDPR, and GDPR Audit

Type: Startup Activities: proptech cleantech greentech IT Services privacytech Technologies: Solar Technologies Decarbonization

4 0 4 2
Lazarus Lazarus

Through its software platforms, deployed by leading home security companies and service providers, and the Lazarus Home Security devices for consumers, Lazarus Cloud is defining the connected home marketplace.

Type: Startup Activities: IT Services Technologies: IoT

1 1 1 2
IPGenius IPGenius

[Automatic translation follows] IPGenius is an IT services company that offers solutions adapted to all the needs encountered by VSEs/SMEs and liberal professions. ◾Have you just created your business and need to set up a computer network? ◾Do you have an existing network and you have a specific IT need? ◾Do you need to host your server or site? We suggest that we study your needs together to provide you with a concrete response in line with your expectations, the size of your company and your activity. This can range from a simple recommendation for the purchase of computer equipment, …

Type: Startup Activities: IT Services

1 0 1 2
Fortinet Fortinet

Fortinet makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the world’s largest enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey. Network Security, Enterprise Firewall, Firewall, Intrusion Prevention System (IPS), VPN, Antivirus, Email security, Web filtering and Web Security Gateway, Antispam, Application Control and Visibility, Next Generation Firewall (NGFW), network firewall, threat research, threat intelligence, artificial intelligence, cloud security, SASE, SIEM, SD-WAN, Zero Trust Access, Cybersecurity Training, Cybersecurity Certification, Switching, Wireless, Endpoint security, SOAR, Deception Security, Sandboxing, EDR, XDR, UEBA, …

Type: Large company

9 8 1 2
Alertra Alertra

Established April, 2000, Alertra has become a leading provider of Internet server monitoring and alerting services. Our U.S. headquarters is located in the historic W.E. Going (Town Center) building in downtown Stillwater, Oklahoma. Stillwater is 50 miles northeast of Oklahoma City and is the home of Oklahoma State University. Yahoo! Internet Life Magazine named Stillwater "One of America's Most Wired Cities." Our building is also home to a local Internet service provider and some other technology companies. Our monitoring servers are located around the world in Equinix, Telehouse and similar carrier-class data centers. Alertra monitors the availability, performance and security …

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 0 0 2
Rubicon Labs, Inc Rubicon Labs, Inc

Rubicon Labs is a cybersecurity startup founded by veterans of Apple and Broadcom with offices in San Francisco, California and Austin, Texas. Cyberwarfare is widespread in the cloud and now going kinetic. A quarter of a billion cars and some 25 billion devices will join the IoT by 2020. That means that cars, homes, and public spaces will join credit cards and PCs on the list of things that speak the same language. It also means they’ll join the list of things that can be hacked. Rubicon Labs is solving that problem with an IoT identity platform. Zero-knowledge keys are …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

1 0 1 2
Lybero Lybero

Stocker et partager des données chiffrées de bout en bout ! Le chiffrement des données facile à utiliser et à manager ! Lybero.net is a cybersecurity software editor specialised in cryptography. We provide easy to use, easy to deploy and easy to manage cryptography, with a very high level of security. We have 3 products : CryptNDrive a web encrypted file sharing server software, a LybCrypt SDK and LEMS a fully digital escrow system. CryptNDrive allows anybody in an organisation to share encrypted files inside or outside of the organisation without any sotware. Only a web browser is required. CryptNDrive …

Type: Startup Activities: IT Services Technologies: Cybersecurity

15 6 12 2
IDKA AB IDKA AB

Idka enables simple, private communication and collaboration across modern teams and organizations. Idka means productivity and simplicity. Idka is a clean, uncluttered, noise free and easy-to-implement, yet very functional collaboration tool. On Idka you can communicate, share and work undisturbed with colleagues and friends. There is no advertising, no trolling, no fake news, and you own your data. Period. Idka provides functionality that is otherwise spread across several services, all integrated in a super simple and effective user experience. Set up a free account today for effective, secure, simple and ad-free communication and collaboration.­­ Your privacy is our business. For …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 2 2
SPARTA SPARTA

Cybersecurity Competence Network pilot to ensure Security Union and Strategic Autonomy of the EU. H2020 SPARTA is a novel Cybersecurity Competence Network, supported by the EU’s H2020 program, with the objective to develop and implement top-tier research and innovation collaborative actions to ensure digital security and strategic autonomy of the EU. The SPARTA consortium, led by CEA, assembles a balanced set of 44 actors from 14 EU Member States at the intersection of scientific excellence, technological innovation, and societal sciences in cybersecurity. With one of the greatest and most multicultural research ecosystem in the world we are ready to make …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 2
Cybersprint Cybersprint

Cybersprint offers automated discovery of the assets in your attack surface, and detect and monitor the risks within. Cybersprint maps the attack surface of organisations and brands, offering full visibility using continuous and automated digital asset discovery. Cybersprint’s zero-scope AI-driven approach to Attack Surface Management provides an outside-in perspective, eliminating blind spots and detecting and preventing threats including data leaks, brand abuse, supply chain risk, phishing. Darktrace completed the acquisition of Cybersprint in March 2022. Darktrace (DARK:L), a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I.

0 0 0 2
AimBrain AimBrain

Award-winning fraud detection & user authentication platform, based on Deep Learning. AimBrain is a #BIDaaS (Biometric Identity as-a-Service) platform. Connectivity to the platform is via open-source SDKs and an API; businesses and developers can go trial-to-deployment with 1,000 free API calls a month, on our free platform AimBrain On Demand. Our approach combines 100% proprietary passive (anomaly detection and behavioural) and active (voice, facial and combined face/audio/lip movement) authentication modules to verify the user, not the device. The cloud model lets companies authenticate their users across any channel and any device, to reduce fraud and improve the security experience. Biometrics, …

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity A.I. A.I. - Deep Learning

0 0 0 2
Zerado Limited Zerado Limited

Zerado is a process consultancy. We provide expert advice to a wide range of organisations on the latest technologies, including Blockchain, cryptography and cloud computing. We deliver tailor-made solutions that utilise these technologies to meet diverse business needs. The founders of Zerado have over 15 years of experience working in finance, regulation and software development for major banks. They have been developing solutions with Blockchain since 2009, including for a major European Clearing House and international organisations, such as the World Health Organisation. The latter included implementation and issuance of medical certificates as part of the Ebola response. Zerado’s latest …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

0 0 0 2
Be ys Research International Be ys Research International

#Research_and_Innovation be ys Research International is a group of researchers, engineers, data experts and business specialists sharing the same vision: innovation as competitive advantage and business accelerator. First of all, we are specialized in the edition of sensitive data protection software. We support businesses in their digital transformation by deploying a set of solutions in their infrastructure or remotely to address sensitive data issues. Building on its strong expertise and skills in the area, be-ys Research International masters the state of the art in the field. Thus, we have developed innovative products, protecting millions of people in Europe and covering …

Type: Startup Activities: healthtech IT Services Technologies: A.I. Blockchain/Cryptocurrency

12 1 10 2
Cosipé Cosipé

[Automatic translation follows] 🍀Ready to turn all the lights green?🍀 Cosipé is an independent consulting firm in Auvergne Rhône-Alpes offering support missions towards GDPR compliance and providing an external DPO service to public, private and associative organizations of all sizes. DPO-Cosipé offers regulatory compliance using a very pragmatic approach adapted to its clients. Cosipé benefits from extensive experience in the medico-social sector and in communities. Cosipé also specializes in #GDPR compliance for ski resorts that are members of the Domaines Skiables de France. GDPR, GDPR compliance, Cybersecurity, Personal data, Website audit, DPO, Data Protection Officer, CNIL, AMOA, Data protection, AFCDP, …

Type: SMB Activities: privacytech Consulting legaltech Technologies: Cybersecurity

0 0 0 2
ONYL Rocks ONYL Rocks

[Automatic translation follows] Cybersecurity & Data protection Firm specializing in IT security and compliance. We offer advice and auditing on IT security and ISO 27001 or GDPR compliance, and also provide awareness raising and training on these subjects. Since 2019, we have also been an external DPO under the GDPR. Partner of Qorum Secur'Num, the 1st collective force of SMEs and cybersecurity entrepreneurs in France.

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity

5 0 5 2
Aurian Security Aurian Security

We assess your most critical information assets and determine the risk to your business before the bad guys do. Aurian is a cutting-edge Australian provider of information security services. We assess your most critical information assets, determine the risk to your business, and find the vulnerabilities before the bad guys do. Specialising only in information security, we assist organisations from small and medium business through to enterprise and Australian government clients, in ensuring that their information assets are well protected. cybersecurity, information security, and security consulting

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 2
Red Goat Cyber Security LLP Red Goat Cyber Security LLP

Training, Crisis Exercises and Consultancy Services Red Goat Cyber Security provides cyber crisis exercises and consultancy services along with awareness training and insider threat program development for organisations around the world. social engineering, Cyber Security, Training, Keynote Speaker, Exercising, Wargaming, cyber crisis exercising, and cyber security training

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 0 2
HACK-IT-N HACK-IT-N

[Automatic translation follows] Cybersecurity Conference #FrenchTech #Bordeaux #Aquitaine The HACK-IT-N conference is organized by the company TEHTRIS, an expert in Cybersecurity, in partnership with the ENSEIRB-MATMECA engineering school and its RSR option [cybeR-security, Systems & Networks] of the IT sector. The themes of cyberdefense and cyberattack are at the heart of concerns, to stick to technical reality and current threats: hacking, cyber-espionage, cyber-surveillance, etc. Every year, come and discover the new challenges of cybersecurity, as well as the offensive and defensive techniques of the moment! cyberdefense, cyberattack, IT security, CISO, SSI, Information Systems, Endpoints, SAAS, On Premise, Cloud, IT Engineering, …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

7 1 6 2
7 Minute Security 7 Minute Security

7 Minute Security, LLC is a Minneapolis-based information security consulting company focusing on: * Security assessments * Vulnerability scanning * Penetration testing * Training 7 Minute Security also offers a weekly podcast at https://7ms.us, covering information security topics such as pentesting, networking, virtualization and career advice. Security assessments, Vulnerability scanning, Penetration testing, Training, and Public speaking

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 2
Beware Cyberlabs Beware Cyberlabs

Si Vis Cyber Pacem Para Cyber Bellum Cyber Range, Traffic Simulator, Cyber Deception Solution, Cyber Training cyber training, cyber range, traffic simulator, and cyber deception

Type: Startup Activities: IT Services

0 0 0 2
SocialProof Security SocialProof Security

Defend against cyber criminals with engaging security awareness videos, training, talks, and pentesting. Defend against cyber criminals with engaging security awareness and social engineering prevention videos, training, talks and penetration testing.

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 2
Protect4S (a SecurityBridge company) Protect4S (a SecurityBridge company)

SAP Security Automation and Continuous Protection | Now a part of SecurityBridge Protect4S has joined forces with SecurityBridge to provide greater SAP Security. Join us on our new journey by following SecurityBridge! https://www.linkedin.com/company/securitybridge/ ​ Press Release: https://securitybridge.com/press/securitybridge-and-protect4s-are-joining-forces/ ​ SecurityBridge Website: https://securitybridge.com/ Protect4S builds SAP Platform Security software that enables SAP customers to continuously improve their SAP cybersecurity through automation and simplicity of use. Our mission is to make our SAP cybersecurity solutions accessible and affordable to everyone because we want to make the world a bit safer. To achieve this, we work closely with SAP service partners around the world …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 3 2
Specter Solutions Specter Solutions

Secure Bitcoin Solutions ● 1 of 21 Most Influential Bitcoin Companies Of 2020 Secure Bitcoin Solutions ● 1 of 21 Most Influential Bitcoin Projects And Companies Of 2020 Specter Desktop emerged as the easiest way to use your own bitcoin wallets directly with Bitcoin Core in 2020. ● This enabled a much more private and sovereign method than using hosted applications. ● While also providing much easier set up and use than previous Electrum-based alternatives. Source Link: https://lnkd.in/dp3AsmX Source: Bitcoin Magazine -21 Most Influential Bitcoin Projects And Companies Of 2020 ● We are building Secure Bitcoin Solutions. Why Bitcoin-Only? Because …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

0 0 0 2
PwnDefend PwnDefend

cyber - eat - sleep - repeat! PwnDefend is a cyber security awareness, advisory and educational organisation with a mission to spread cyber security knowledge throughout the world. PwnDefends does this to empower people and organisations to protect, detect and respond to current and emerging cyber threats in the modern technology driven age. With a unique approach of using offensive capabilities as a learning mechanism such as Capture the Flag games! Ultimately our aim is to help current and future generations live in a world not ruled by digital fear, uncertainty and doubt.

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 2
FilingBox FilingBox

Ransomware In-Advance Prevention Storage FilingBox protects your data against ransomware and data breach malware from the storage standpoint. FilingBox uses the storage protection technology that protects data in a network drive against ransomware and data breach malware attacks while using data. The technology of FilingBox is part of the international technology standardization process in ITU-T. Website: FilingBox: http://www.filingbox.com Contact Us Boston Office Tel: +1-813-445-7472 Email: sales@filingbox.com Seoul Office Tel: +82-2-6925-0290 Email: sales@filingbox.com Ransomware prevention, ransomware protection, cybersecurity, Data breach prevention, storage protection, and storage security

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 1 0 2
UBIWIZZ UBIWIZZ

[Automatic translation follows] Solution for housing & connected buildings A complete ecosystem from building infrastructure to connected objects. Solutions for connected living Collective housing – Residential housing – Individual house Maritime – hotel industry Smart building solutions Teaching – Industrial construction – Civil construction Tertiary office sector – Architecture project

Type: Startup Activities: smart home Smart City constructiontech Technologies: IoT

2 1 0 2
IT and Cybersecurity Meetings IT and Cybersecurity Meetings

The One to One Meetings for networks, cloud, mobility and cybersecurity IT & Cybersecurity Meetings: your business meeting place on 20 and 21 March 2024 in Cannes! IT & Cybersecurity Meetings, the business meeting place for IT and cybersecurity, is a business exhibition dedicated to IT professionals (manufacturers, publishers, telecoms operators), infrastructure suppliers, mobility professionals and IT security experts. The aim is to encourage direct face-to-face meetings between top decision-makers and exhibitors, through pre-organised, highly-qualified meetings ahead of the event, in a relaxed, friendly atmosphere. IT & Cybersecurity Meetings is a privileged forum for exchange and an instant business platform, …

Type: Event

4 2 2 2
ZORB Security ZORB Security

Stop data loss BEFORE it becomes a breach ZORB Security is an information risk and data breach specialist. We eliminate business data theft for businesses whose reputation is their differentiator. Our approach is simple - we don't allow outbound data to be sent from your business unless it meets THREE criteria: - the data has come from a known 'trusted' application - the data is destined to a 'trusted' destination - the data is being transmitted over a 'trusted' comms channel Only if the answer is YES to all the above is the data sent - otherwise, we immediately stop …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 2
Cryptonite Cryptonite

At Cryptonite, our goal is to help enterprises regain the upper hand against attackers, by providing a platform that addresses fundamental weaknesses in today’s networks. After five years of research and development, Cryptonite was founded in 2015 with a focus on next-generation solutions that defend networks proactively—protecting enterprise networks and giving security professionals time to investigate and respond to cyber threats before it’s too late. Cryptonite’s security platform "CryptoniteNXT"​ establishes a Zero Trust protected environment by implementing an active defense that eliminates full categories of the most common tactics used by adversaries and malicious code.

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 2
Tilo cybersecurity services Tilo cybersecurity services

[Automatic translation follows] Cybersecurity Services TILO is a company dedicated to providing consulting services in cybersecurity management with a focus on risk management. We understand that cybersecurity includes various aspects in addition to technical solutions and must be addressed holistically by organizations to achieve an adequate understanding of their current posture. From that knowledge, we help organizations plan their target cybersecurity posture. cybersecurity, information security, risk management, security management, AGESIC Cybersecurity Framework, NIST CSF, ISO/IEC 27001:2013, and COBIT

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 2
CyWeTa DNS - Dark Net Solutions CyWeTa DNS - Dark Net Solutions

Utilizing our knowledge of the Dark Net ecosystem, we search for compromised devices in our client's networks. CyWeTa DNS is a Czech threat intelligence company. We focus on collection and analysis of leaked credentials and confidential data, originating from devices compromised by various threat-actors. We maintain a huge database with data sourced from public, semi-public and private communication channels and we alert our customers if their data are detected. This way we can help you prevent a potentially devastating cyber attack which would utilize leaked credentials as an initial access vector.

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 2