Directory · CY
Computer and Network Security in Cyprus
A register of firms and the professionals working at them in the Computer and Network Security sector based in Cyprus. Browse the public index, then filter or export on Kipplo.
Companies
26 on file
Black Hat Ethical Hacking
At Black Hat Ethical Hacking, our mission is to provide Offensive Security services that help organizations identify and address potential vulnerabilities before they can be exploited by malicious actors globally. Our approach is focused on helping the Information Security industry understand how important the presence of Offensive Security is in today's era. Our solutions include Penetration Testing and Red Teaming, which simulate real-world attacks to identify and exploit vulnerabilities in clients’ networks, applications, and systems. We also provide vulnerability assessment services that identify weaknesses and prioritize them based on risk level. Our phishing simulation tests help educate employees about the dangers of phishing attacks, and our digital forensics services help identify and mitigate security incidents. In addition to our services, we offer offensive security courses designed to help individuals become ethical hackers. Our courses cover a range of topics, including ethical hacking and penetration testing.
11 to 50 staff
Shelt Global Ltd
SHELT protects your business by providing a 24/7 Security Operations Center (SOC) with centralized dedicated security consultants. We offer online and cloud based security services to trusted global clients through a cybersecurity-as-a-service partnership model that is designed to sustainably and effectively shelter your company from data theft and cyber threats. With a comprehensive offering of solutions, and an excellent on-the-ground network across Europe and Africa, Shelt is looking to become the preferred choice for cybersecurity-as-a-service provider in the entire region.
11 to 50 staff
Logstail
Logstail is a next-generation cybersecurity platform that unifies SIEM, log management, threat detection, observability, and compliance into one powerful solution. Designed for both public and private sector organizations, Logstail centralizes logs, metrics, traces, and security events — helping teams detect faster, respond smarter, and build operational resilience. Our platform is trusted across critical infrastructure, defense, manufacturing, healthcare, and retail, delivering real-time visibility, powerful analytics, and actionable alerts. With native support for DevSecOps, MITRE ATT & CK mappings, and advanced correlation rules, Logstail empowers both SOC teams and IT departments to stay ahead of evolving threats. We also invest in the human side of security: Through the Logstail Academy, we train and certify professionals in hands-on cybersecurity — from SOC analysts to IT engineers — with practical learning paths focused on detection, forensics, and digital defense. NIS2-ready & ISO 27001-aligned Hosted in secure European data centers or deployable on-prem Full-stack observability: logs, traces, metrics, endpoints Ideal for mid-sized organizations needing enterprise-grade tools Our mission is simple: To help organizations turn raw data into real-time intelligence, and people into defenders. Equip. Detect. Defend. Based in Athens, Brussels & Cyprus Learn more: logstail.com #SIEM #Cybersecurity #LogManagement #SOC #NIS2 #Observability #SecurityAnalytics #LogstailAcademy #DevSecOps #DigitalResilience #cybersecurity #cyberdefense #observability
1 to 10 staff
Vulners Vulnerability Intelligence
Prioritize like an attacker, not a spreadsheet! Vulners is a trusted source for comprehensive, continuously updated vulnerability data. We take fragmented information and transform it into consolidated vulnerability and threat intelligence, designed for both human and machine consumption. Enterprises can rely on Vulners to enhance their security posture, providing a robust defense for their infrastructure. Cloud platforms, security service providers, and application developers utilize Vulners to generate additional revenue, using our data feed to power value-added features. Established in 2015 by a dedicated team of information security professionals, Vulners was created to meet specific needs in vulnerability management. Our commitment to continuous improvement and evolution has seen us add new features and data sources regularly. Today, Vulners links over 200 varied data sources, presenting them in a normalized, machine-readable format. All entries are interconnected, ensuring each vulnerability context provides the necessary information - from the point of discovery to the remediation process, inclusive of exploit data. Our proprietary AI algorithms dynamically rank vulnerabilities, taking into account real-time data, CVSS, EPSS scores, and insights from cross-referenced data sources.
11 to 50 staff
Bad Rabbit Security Limited
Bad Rabbit Security Limited offers a wide range of consulting services in cyber security, risk management, compliance and resilience across multiple industry sectors, catering to all sizes of business from start-ups to global multinationals. We partner with our clients from start to finish, focusing on their needs whilst producing new ideas, developing effective strategies and designing high quality and scalable solutions right sized for you business for maximum cost benefit and risk reduction. Our portfolio of services includes: vCISO services backed by over 20 year's C Level and Board experience Penetration testing Risk assessment Incident Response Disaster recovery Digital forensics Training
51 to 200 staff
Cybervelia Cyber Security
Cybervelia offers comprehensive penetration testing services to help organizations assess and strengthen their security posture. Our team of skilled and certified security professionals conducts thorough assessments to identify vulnerabilities and potential security weaknesses in your systems, networks, and applications. Also, Cybervelia is a premier platform designed to provide software developers and security professionals with the resources and tools they need to stay ahead in the ever-evolving worlds of software and cybersecurity. With a focus on community and education, Cybervelia offers a wide range of labs and training programs to help people grow and develop their skills.
1 to 10 staff
Ibscy Ltd
IBSCY Ltd is a leading provider of total IT solutions and services in Cyprus and specialises in the areas of cloud services and applications, systems integration, IT infrastructure, collaboration, management and security solutions. IBSCY was founded in 2004 from a team of young IT professionals and it has been escalating since then by serving clients locally and throughout Europe. We’re constantly working to improve our portfolio and provide our clients with new technology solutions and services. IBSCY does not only provide the right hardware but also the right expertise for the client tin order to utilise the technology in the most efficient way. For more information, visit and follow us on Instagram (@ibs_cy), Facebook (@ibscy) and LinkedIn.
11 to 50 staff
Qrator Labs
Qrator Labs is a team of tech experts focused on ensuring continuous network availability of clients’ resources 24/7 worldwide. With headquarters in Prague, our mission is to provide a competitive advantage to our clients by building loyalty among their customers with the help of reliable network security solutions. We offer a bunch of cloud-based security solutions fully tailored to meet our clients’ needs: DDoS Mitigation: Our geo-distributed filtering network can detect and mitigate DDoS attacks of any size and complexity in real-time at all OSI levels (including L7). Bot Protection: We offer Bot Protection to safeguard our clients' web resources from malicious bot activity, e.g. scraping, account takeover, identity theft, and brute-force hacking. Web Application Firewall (WAF): WAF provides comprehensive protection for the most high-load web applications with minimum delays and guaranteed service availability, including protection against OWASP Top 10 vulnerabilities and beyond. DNS Protection: Qrator.DNS SecondName service helps mitigate DNS-based attacks and improve resilience and availability of our clients' DNS infrastructure. CDN: We provide scaled-up, flexible, and cost-effective content delivery for customers around the world with low latency and high transfer speed. Qrator.Radar: It is a global BGP monitoring system designed to detect network anomalies and monitor changes in network connectivity in real time. Qrator Labs also offers a partner program for companies looking to expand their portfolio with professional security solutions. The program is designed to help partners boost revenue, enhance customer loyalty, and stay ahead of competitors. Contact us today to find out how we can increase your customers’ loyalty, by ensuring 24/7 network availability and protection against attacks of any scale. Learn more: https://qrator.net/ Email us: mail@qrator.net Request for partnership: partner@qrator.net Call us:+420 602 558 144
51 to 200 staff
Runesec
RUNESEC is a Cypriot InfoSec startup providing Information Security Assessment Services. Our focus is on conducting Penetration Testing and Vulnerability Assessment engagements to demonstrate the full impact of business risks, and deliver practical mitigation strategies. We believe this approach offers maximum value for clients looking to secure their infrastructure.
1 to 10 staff
Circl3.Tech
A fast growing specialised firm focused on providing deep virtual CISO and cybersecurity management experience.
1 to 10 staff
Cyberx Networks
Security Experts you can trust Our security experts keep the lights on—and design them, too. The X-Team is here to protect your data and address your concerns.
11 to 50 staff
Incion
Our vCISO service delivers top CISOs and cyber analysts with expertise across a spectrum of public and private industries, available on request or long-term to support your requirements.
1 to 10 staff
Fedeus
Our experience allows us to offer solutions, resources and knowledge on: Complex Case Investigations Data Recovery, Extraction and Analysis Mapping Complex Data Blockchain and Cryptocurrencies Mechanical repair of damaged electronic devices Mechanical reconstruction of destroyed or water damaged electronic devices
1 to 10 staff
Hubit Services Ltd
The Company’s vast experience in data and information management, infrastructure development, web development, cloud and security services as well as its efficient and personalised customer support system, attests its commitment in providing a hub for all services related to information technology.
1 to 10 staff
Intellectra Technologies
We build the first truly embeddable wireless firewall designed for the next generation of connected and autonomous systems. From CAVs and CAMs to connected mobility infrastructure, EV chargers, BVLOS drones, ships, and critical logistics gateways—our solution protects what matters most by stopping wireless attacks at the source: the wireless layer itself. Unlike traditional security tools, we cover the most neglected and misunderstood aspects of modern connectivity: Mobile Cellular (4G/5G), V2X, Wi-Fi, BLE, and other wireless protocols—the weak links in many critical and safety systems. Our team brings over 30 years of combined offensive wireless security expertise. Today, our mission is simple: To defend the wireless edge, once and for all.
1 to 10 staff
Systecom Ltd
Expert Security Solutions Provider. SysteCom is a leading cyber security solution provider in Cyprus, focused on providing solutions to companies based on our unique Holistic 360 approach.
11 to 50 staff
Sphynx
SPHYNX offers products and solutions, and consulting services, in the areas of cyber intelligence, analytics, incident response, assurance, and certification. We provide customised and continuous security and privacy assessment solutions, covering the full range of socio-technical aspects of a modern enterprise, for internal risk management and/or external security audit and certification. Our solutions are based on our novel security assurance and certification platform and its advanced analytics and cyber intelligence. In addition, its consulting services, SPHYNX has expertise in providing customized solutions depending on client needs as well as more general training on analytics, security assessment and certification and cyber intelligence.
11 to 50 staff
Data Ally
Data Ally is a premier provider of comprehensive cybersecurity solutions tailored to protect businesses and organisations from evolving cyber threats. With a strong focus on proactive defence strategies and cutting-edge technologies, Data Ally helps clients safeguard their digital assets and maintain operational resilience in today's complex threat landscape.
11 to 50 staff
A.C. Slashopt Ltd
We design and deliver technology-enabled business solutions to businesses of any size. We utilize strategic alliances with other leading technology providers to fulfill customer demand and leverage their infrastructure’s standards. A.C. Slashopt has an island wide footprint with a growing presence in the region.
1 to 10 staff
Cl Dataflow Technology Ltd
CL Dataflow Technology Ltd is one of the most trusted IT companies. Since its establishment in 1993, it represents and imports into the Cyprus market branded technology products and offers its customers reliable, professional and modern computerization, security and protection solutions. Priority is always the satisfaction of the customer / partner and therefore it is of particular importance to pre- and post-sale service. It is always given great importance on people and clients / partners so there is a strong relationship of trust between them.
1 to 10 staff
A.C. Prime Factor Eeme Ltd
Η αποστολή μας είναι η διανομή προϊόντων τεχνολογίας και πληροφορικής με έμφαση στις λύσεις που θα αυξήσουν την ανταγωνιστικότητα των συνεργατών μας. Οι συνεργασίες της Prime Factor έχουν ως στόχο να δώσουν στους συνεργάτες μας αξιόπιστες λύσεις σε προϊόντα και τεχνολογίες αιχμής, με απώτερο σκοπό την ικανοποίηση των τελικών πελατών.
1 to 10 staff
Bricat Host
Who We Are BriCat SOLUTIONS started working in 2012, a complete web solutions firm based in Paphos, Cyprus. Our service includes Web application development, Website designing, E-commerce solutions, MLM portal development, maintenance, Web hosting solutions and Advertising. We are also growing our wings in Internet marketing and Search Engine Optimization. Every Project whether big or small is important for us. We provide many different packages for SEO and SMO to our clients on internet search term, which is effective in promoting to your business and expand your online business globally. OUR TEAM We have a polite support staffs that give technical support over phone and email. Moreover as we are a small firm we provide personalized service to customers as you may get fed up with big companies where you talk to a new guy each time you make a support query. OUR MISSION BriCat SOLUTIONS mission is to offer the best possible value in website designing, web application, web hosting and search engine optimization for web development and deployment of your critical business information systems. We strive to make your business processes visible and your firm more agile. OUR VISION Our vision is to provide the best possible quality and value in the development and maintenance of business driven information systems. We are committed to our clients and partners for new technologies. Our motto is ” Provide the big values on time and under budget “. We convey what we promise.
1 to 10 staff
Towernetwworks
Tower Networks one of the best internet service provider located in North Cyprus. Tower Networks provide the fastest internet in north cyprus. Tower networks provide software development services with up to date technology
11 to 50 staff
Cyber Shields
CyberShields is a Cyprus-based cybersecurity company delivering advanced digital protection for businesses operating in an increasingly connected world. We specialize in safeguarding critical systems, networks, and data against modern cyber threats through proactive security strategies, continuous monitoring, and intelligent defense solutions. Our mission is simple: to help businesses operate securely, confidently, and without disruption in the digital age. Services include: Endpoint Protection Cloud & Drive Protection Email Security Browser Protection Mobile Protection Tailored Security Solutions Contact our experts today for a personalized security consultation and ensure your company’s long-term protection.
1 to 10 staff
Clevcode Ltd
We have never advertised, and pretty much everything we do is confidential. Our clients tends to find us, and they tend to stay. We are primarily working with long-term research contracts, and we are very selective with regards to the clients we would be open to work with. We do vulnerability research, exploit development and reverse-engineering, focusing mostly on mobile, browser and kernel vulnerability research and exploitation.
1 to 10 staff
1pro Solutions, Cyber Security And Regulation Professional Services
1Pro Solutions, where innovation meets security. 1Pro Solutions empowers businesses in regulated industries to navigate the complexities of cybersecurity, regulatory compliance, and risk management. As a boutique consultancy, we deliver tailored solutions that protect your organization while driving growth and innovation in today’s dynamic digital environment. Our Offerings Regulatory Compliance: Achieve certifications like ISO 27001, 27799, 27017, 27018, and SOC 2 with our guidance, simplifying the path to compliance through readiness assessments and process optimization. Governance, Risk, and Compliance (GRC): Build integrated frameworks that align regulatory requirements with risk management and business objectives, enabling proactive risk mitigation. Business Impact and Risk Assessments: Identify critical risks, evaluate their impact, and implement strategies to enhance resilience and operational continuity. Operational Resilience for Finance: Ensure compliance with DORA and EBA requirements by strengthening cybersecurity and operational continuity in financial institutions. Comprehensive Expertise Our dual expertise in cybersecurity for medical devices and Quality Management Systems (QMS) makes us unique. We integrate secure design, risk management, and robust QMS processes, ensuring FDA and CE compliance while safeguarding device integrity, patient safety, and operational excellence throughout the product lifecycle. Medical Device Cybersecurity and QMS: Combine advanced cybersecurity strategies with QMS frameworks to meet FDA and CE standards while supporting secure development and lifecycle management. At 1Pro Solutions, we don’t just secure your business, we enable it to thrive. Our unique expertise ensures comprehensive protection and compliance, empowering your organization to succeed in an increasingly regulated and interconnected world.
11 to 50 staff