Directory · EE
Computer and Network Security in Estonia
A register of firms and the professionals working at them in the Computer and Network Security sector based in Estonia. Browse the public index, then filter or export on Kipplo.
Companies
54 on file
Rangeforce, A Cyberbit Company
Achieve true cyber readiness with the leading blue team training for SOC teams. Assess, refine, and validate skills needed to defend your organization against current cybersecurity threats.
51 to 200 staff
Cybexer Technologies
CybExer is the leading European Cyber Range provider with a focus on AI warfare and advanced digital twin environments. Trusted by NATO, the British Army, the Army of Ukraine, Fortune 500 companies, and leading banks, CybExer operates in over 60 countries, delivering the most flexible and customizable training solutions in the market. Our AI-driven simulations and autonomous defense exercises enable military organizations, critical infrastructure, and financial institutions to achieve cyber preparedness.
51 to 200 staff
Bugbounter
Bugbounter is a crowdsourced security platform that networks the crowd of freelance security researchers and security organizations with corporations and institutions. Our out-of-box approach to cybersecurity (Bug Bounty) allows organizations to test their software in a more creative way through our community of freelance researchers. We aim to set up a secure ecosystem where dedicated dreamers of a hack-free world willingly gather their talent and resources to outsmart and outperform the darkside. For Companies: The Bugbounter platform runs on blockchain so it is transparent, democtratic, secure and agile- thus trustworthy! We provide continuous testing opportunities within the ecosystem, therefore companies discover vulnerabilities that current penetration testing methods would hardly uncover-in a much faster way. Since Bugbounter rewards only the verified successful exploits, the service is highly cost-effective. For Researchers: Our platform gives all the security researchers the same opportunity to challenge their talent, earn rewards and fame. In order to be invited to special bounty programs, researchers would have to go through various levels of vetting processes.
1 to 10 staff
Cyber Struggle
In Cyber Struggle, We bring the mindset and doctrine of the special forces to the cyber world! We develop technologies, methodologies, and simulations where we help cybersecurity frontliners to remain extremely functional, resilient, and primed; technically and psychologically, no matter the conditions. We blend hybrid technical skills with human-centric skills in a dynamically changing environment by using our unique methodology inspired by the special forces mindset and training.
11 to 50 staff
Eid Easy
eID Easy is a fast growing company, highly skilled and specialized in international secure electronic signature methods. We have a strong focus in qualified electronic signatures under the EU eIDAS framework, but also cover other popular methods. We are integrating all possible ID methods and are building the nicest possible API to make you forget about the hassle it once was to offer such functionalities to your clients and partners. We will significantly reduce your project cost and deployment time, open up a wide range of new opportunities and give you a competitive advantage. eID Easy team
1 to 10 staff
Resilientx Security
ResilientX Security is a fast-growing Cyber Security company that helps organizations of all sizes identify, quantify and manage their cyber risks and cyber exposure. At ResilientX, we are committed to delivering state-of-the-art security solutions to help organizations safeguard their digital assets and maintain compliance. Our First-Party and Third-Party Risk and Exposure Management platform is designed for those who take security and compliance seriously. Our Solutions: Unified Exposure Management (UEM): ResilientX UEM provides a holistic approach to proactive security. Our platform is engineered to automatically identify assets, perform in-depth security testing, and reduce risks across your entire attack surface. We cover a broad spectrum of potential vulnerabilities, including IPs and domains, web applications, cloud environments, network devices and services, APIs, and dark web threats. Third-Party Risk Management (TPRM): Our TPRM solution offers a comprehensive 360-degree approach to managing risks posed by suppliers, vendors, and strategic business partners. ResilientX TPRM enables you to assess, monitor, and mitigate these risks effectively, automating and streamlining your assessment and monitoring activities. Our solution can save up to 6 hours of cyber due-diligence per vendor each month. Interested to see ResilientX in action? https://resilientx.com/demo
11 to 50 staff
Silent Breach
At Silent Breach, we think like a hacker and defend like a pro. We fuse world-class offensive security expertise with state-of-the-art defensive capabilities, helping organizations uncover hidden vulnerabilities before attackers do. Our team of elite penetration testers, threat hunters, and red team operatives delivers intelligence-driven security designed to outthink, outpace, and outmaneuver modern threats. With offices in New York, Florida, Paris, Singapore, and Chennai, we operate across multiple time zones to provide continuous coverage for our clients. Silent Breach is ISO 27001 certified, ensuring the highest standards of information security in everything we do. Our expertise has earned us global recognition, including: • Top PenTest Provider • Bug Bounty Hall of Fame • Top 10 Cybersecurity Solutions Provider • Top 10 Vulnerability Management Provider Quantum Armor: Our flagship platform, Quantum Armor, brings 24/7 attack surface monitoring and proactive defense to the modern enterprise. Powered by AI-driven reconnaissance, continuous vulnerability tracking, and actionable threat intelligence, Quantum Armor enables you to spot—and stop—emerging threats before they become breaches.
11 to 50 staff
S4e
Welcome to S4E – where we believe cybersecurity is a fundamental human right. At S4E, our mission is to democratize digital security, making it accessible, simple, and effective for individuals and businesses of all sizes. Who We Are: S4E is a cutting-edge SaaS cybersecurity platform designed with the user in mind. We understand that in today's digital world, security should not be a luxury but a necessity that is within everyone's reach. Our platform provides comprehensive security solutions that are easy to use, ensuring that you can protect your digital assets with just a few clicks. 4 E's of S4E: Everyone Plan: Free basic security scans for your website and digital assets. Ideal for those just getting started. Expert Plan: Single manual in-depth security scan for detailed analysis. Perfect for professionals needing targeted insights. Elite Plan: Automated security scans for up to 10 digital assets. Designed for growing businesses looking for proactive protection. Enterprise Plan: Unlimited asset scans with tailored security solutions and support. The ultimate choice for large organizations with extensive security needs. Why Choose S4E User-Friendly: Our platform is designed for simplicity and efficiency, requiring no prior expertise. Comprehensive Tools: Access the world's largest set of online and free security tools. Trusted by Thousands: Join over satisfied users who trust S4E to safeguard their digital presence. Our Philosophy: At S4E, we are driven by the belief that everyone deserves top-notch cybersecurity. We strive to empower our users with the tools and knowledge they need to stay secure in an ever-evolving digital landscape. Our commitment to accessibility and effectiveness ensures that no one is left vulnerable. Join Us: Protect your digital future with a platform that combines advanced security measures with unparalleled ease of use. Discover the power of secure simplicity today. Visit S4E
11 to 50 staff
Phishbite
Phishbite is an easy-to-use, AI-powered phishing simulation platform designed to reduce cybersecurity risks by increasing employee awareness. Phishing attacks are the most common form of cybercrime. The use of large language models (LLMs) and text generation algorithms has made phishing attacks much more effective. The Phishbite service is easy to start, and we offer a 14-day free trial.
1 to 10 staff
Oddeye
OddEye is all in one monitoring and anomaly detection platform. It uses machine learning to detect anomalies and generated alerts with minimal human intervention. OddEye provides full insight into what happens inside your systems, intelligently detects and alerts about anomalies. Canvas powered light but powerful dashboards visualizes your data with line, pie, gauge, funnel, bar, treemap and infrastructure charts.
1 to 10 staff
Guardtime
Guardtime is a deep-tech company founded in Estonia in 2007. Guardtime has been solving complex data management and data security challenges to the most demanding clients globally. At the heart of Guardtime has been R&D and innovation of hash-based cryptography and development of blockchain technologies to meet various industry challenges. Important notice: We would like to inform you that in recent days, fake recruitment campaigns have appeared, which are taking place under our company name on LinkedIn. This is not an activity initiated by Guardtime and we have not published any official job advertisements or are currently recruiting new employees. We ask you to be attentive and- Do not share your personal data with suspicious profiles or contacts- Check official information only on our website or official LinkedIn page.
11 to 50 staff
59 Degrees North
At 59 Degrees North, we are dedicated to being your trusted partner in securing digital assets and building resilience against cyber threats. 59 degrees north of Sydney in Estonia - home to the NATO Cooperative Cyber Defence Centre of Excellence - our team draws on deep expertise in cybersecurity. We excel in delivering tailored solutions in security governance, risk management, security testing, and compliance, collaborating with industry leaders to provide top-tier services. With a client-focused approach, we ensure our solutions are aligned with your unique needs, empowering you to operate confidently. Discover more about our services and partnerships on our website.
1 to 10 staff
C-Yber
C-YBER works with organizations to understand real cyber risk and exposure. Our work focuses on identifying weaknesses through vulnerability assessments and penetration testing, including API security. The goal is to help decision-makers see what is actually at risk and what assumptions may not hold. We work closely with technical teams and developers, translating findings into clear priorities that support informed decisions and accountability.
1 to 10 staff
Kordon - The Straightforward Grc Platform
Follow us for regular tips on smarter ways to manage information security 🧠
1 to 10 staff
Security For Everyone
We are offering all critical vulnerability and information collection scanning free for everyone. We are explaining vulnerabilities simply and effectively, and provide actionable solution recommendations. We are regularly conducting all vulnerability scanning for an affordable fee and we enable you to monitor instantaneously.
1 to 10 staff
Xcrypt
xCrypt is the first innovative crypto ecosystem with its heart in ist exchange: hybrid, compliant with the securities and attentive to the erc721’s future, designed to be simple, comfortable and innovative. We believe that, in the near future, many changes in the cryptocurrencies field will occur, as well as in the trading field and in how this world is conceived. This is the reason why, after carefully developing its concept, since its host country allows it, xCrypt decided that its priorities are those of listing security tokens, having an appropriate and strategic marketplace for the erc721 and carrying out innovative dynamics in the relationships with the ICO. These decisions were taken so that xCrypt can reward its community with a zero fee exchange, relating it to the other members through the social media platform and monthly compensating its holders via airdrop through a ranking system. XCT token is the one that allows to benefit from the xCrypt ecosystem’s services and it rewards its exchange users and holders following an innovative method through important airdrops. Features - Fully compliant trading operations - Centralized & Decentralized Exchange Platform - Withdraw FIAT from cryptocurrencies | Store FIAT and cryptocurrencies - Custom built Bot Trading | Airdrop Ranking System - Erc 20 | Erc 721 | Memberships - ZERO fees | Securities token - Dependable digital wallets | 100% encrypted platform - Multi Language Platform | Fast deposits and withdrawals - Exchange FIAT and Cryptocurrencies - Make payments with FIAT and cryptocurrencies - Providing tutorials and webinars from expert traders - User friendly website interface and mobile app
11 to 50 staff
Cybertech.Global
CYBERTECH lahendustega tagad enda inimeste küberhügieeni ja teadlikkuse ning taristu turvalisuse nii, et ühel heal päeval ei saa küberpätid Sinu elutööd minutitega hävitada. Miks valida meid? Küberkaitse, mida tavaliselt ainult suurkorporatsioonidele võimaldatakse. Meie paindlikud ja taskukohased paketid võimaldavad igal ettevõttel saada kõrgema taseme turvalisust ilma keerukuse ja liigsete kuludeta. Lisaks tõstab meie koolitusteenus teadlikkust ja annab praktilisi oskusi, et iga töötaja oleks tugev kaitseliin küberrünnakute vastu. Lisaks meie tehnilistele oskustele oleme ka usaldusväärsed partnerid, kes hoolivad Teie edust. Meie ekspert Timo - kogenud IT-konsultant ja lektor – toob oma teadmised ja kogemused otse Teie ettevõtte teenistusse, aidates luua lahendusi, mis kaitsevad. Kirjuta, helista, joonista! reio@cybertech.global Esimene konsultatsioon ja hinnapakkumine TASUTA!
1 to 10 staff
Asicvault
AsicVault makes physically secure cryptocurrency vaults and high performance hard disk encryption devices. AsicVault Bitcoin hardware wallet provides significantly higher security compared to BIP-39 wallets. It also leverages both active and passive anti-tamper technologies.
1 to 10 staff
Ctf Tech
We are generating future cyber talents through educational CTF platform, academy trainings and high adrenaline Capture the Flag (CTF) events.
11 to 50 staff
Cyberoon
We are a team that has advanced engineering disciplines in each field for 10 years, has left permanent works in the information sector, closely follows the visionary and developing world, and offers solutions beyond the time of the domestic and foreign sectors-The passion to leave time and lasting works is a major source of energy for every project we conduct as a team -We invest all our gains into our future.
11 to 50 staff
Idyllum Labs
We believe that website security testing and enhancements can be painless and accessible to every website owner on the world wide web. That's why we've taken industry-standard penetration testing tools and deployed them as part of our SaaS software platform that can generate a full security report for your site in literally one click.
1 to 10 staff
The Security Company
Cybersecurity, but easy. No BS. Just results. We’re on a mission to secure your mission. No fluff, no corporate jargon—just real security that works. Offensive Security – We go beyond classic pentesting with continuous, all-year-round testing and real-world attack simulations. We find the holes so you can sleep at night. Defensive Security – 24/7 monitoring, incident response, SSDLC, Cloud Security, full asset protection—you name it. You pick the tools, we do the work, you take the credit. Security Management – Compliance from 0 to 100. ISO 27001, SOC 2, NIS2, DORA, GDPR? We handle it. You focus on making money, so you can afford us. Cybersecurity Academy – We don’t just hire cybersecurity talent, we create it. 300+ trained experts and counting. We sell peace of mind—with transparency, quality, and integrity at our core. Our clients vouch for us. Our results speak for themselves. 35+ Cyber Experts | 250+ Clients | 450+ Projects | 180+ People Trained
1 to 10 staff
Crip.To
CRIP.TO OÜ is an Estonia-based technology company focused on the manufacturing of hardware and software products to provide users with the highest possible level of end-to-end encryption of any communication. The CRIP.TO encryption solution consists of products and services that provide the highest level of encryption available on the market. The solution consists of CRIP.TO Shield, a smartphone app, CRIP.TO Black (Black), a standalone hardware device, and the CRIP.TO Network that is blockchain-enabled and decentralized for the highest level of user privacy and anonymity. Join us on Telegram http://bit.ly/tg-crip_to
1 to 10 staff
Cybersift
At Cybersift, we believe cybersecurity should be intelligent, accessible, and built to empower everyone. Born from a fusion of research and real-world expertise, we transform advanced AI into clear, strategic protection - enabling every organization to stay secure and resilient. Guided by our vision to make cybersecurity accessible to everyone and to serve as a protector for the unprepared, we stand as a trusted partner in a world where digital threats evolve faster than awareness. We don’t just protect systems - we protect confidence, continuity, and growth. Protection, at its core, is not about standing alone - it’s about standing together. Like in nature, where every instinct contributes to survival, our technology learns, adapts, and protects as one. Talk to Our Team info@cybersift.io +356 7949 8471 (MT)+44 20 8638 0550 (UK)
11 to 50 staff
Fixpark
Cyber security at your convenience without the hassle. In the fall of 2020, the Estonian technology startup Fixpark was founded. After some time spent working in cybersecurity, the company's founders Rando and Allan realized there was no practical, cost-effective way for small- and medium-sized businesses to manage cyber risks. Together we have helped over a thousand businesses with their security needs. By offering a tool that streamlines the procedure, we enable anyone to scale their website security testing and find vulnerabilities on your website without the assistance of a security expert.
1 to 10 staff
Wheelvpn
Say goodbye to internet restrictions and hello to secure browsing. Stay tuned for updates on our launch and be one of the first to experience the ultimate VPN solution.
11 to 50 staff
Catalitza
CATALITZA is an innovation ecosystem based on talent, technology and people centered. A group of individuals that provide specialized services and have a corporate social responsability caring on citizenship rights on digital era
1 to 10 staff
Digiport Ou
More than one million people are using our network to secure their DNS traffic. We're experts in secure internet traffic and DNS technologies.
11 to 50 staff
Digiflak
We help users and companies to protect computer-held data against damaging breaches by securing workers’ digital keys, passwords and certificates in a safe, separate hardware environment. We manufacture Flak security USB dongles, licence our technologies (OEM) and offer subscriptions to premuim services and 3rd party applications. Dongles are based on a dedicated Flak chipset hardware and Se(curit)OS firmware.
11 to 50 staff
Ocean Secure
Ocean Secure specializes in cyber security services in the yachting industry. With our cutting edge tech and forward thinking team we stay ahead of the game, ensuring your loved ones and valuables are protected at all times.
11 to 50 staff
Potato Networks
Potato Networks is an Estonian company founded by three young but ambitious Greeks passionate about technology. Our team is mobile and focuses on the Southern Europe, North Africa, and the Middle East regions. We specialize in providing innovative solutions in the fields of cloud computing and cybersecurity, with an emphasis on medium and large enterprises. We are proud partners of Google, Akamai, Zoho, Netgate, Deciso, Vanta, and other leading high-tech companies. These partnerships allow us to offer you access to cutting-edge technologies and solutions. We focus on medium and large enterprises. We believe in building long-term relationships with our customers and want to "grow" with them, offering personalized services and individual care.
1 to 10 staff
Quansec
QuanSec OÜ - Innovation and Reliability in Cybersecurity QuanSec OÜ is a pioneering cybersecurity entity born in 2023 within Estonia's dynamic tech landscape. Our mission is to tackle the intricate security challenges of the digital world through cutting-edge blockchain security and AI-powered cybersecurity solutions. Our Services: Blockchain Security: Safeguarding our clients' digital assets by maximizing the opportunities presented by blockchain technology. We offer innovative and scalable security solutions leveraging the security potential of distributed ledger technology. AI and Machine Learning Supported Security Systems: Developing effective solutions for detecting and preempting cutting-edge cyber threats using deep learning and machine learning algorithms. Our robust AI-based systems are designed to ensure our clients' security in the ever-evolving threat landscape. Why QuanSec OÜ? With our industry experience and passion for technology, we provide tailored, innovative, and scalable cybersecurity solutions to our clients. As a team, we are committed to crafting customized solutions for every client and securing their digital assets. As your solution partner against the intricate security challenges of the cyber world, at QuanSec OÜ, our goal is to build a secure future through technology. Join us and meet the vanguards of this new era in security!
11 to 50 staff
Protect Remote
https://protectremote.com
1 to 10 staff
As Stallion
AS Stallion is a cyber security solutions company in the Baltics established in 1994. Stallion is representing the best of breed security vendors as a value added reseller and we provide data security consulting, support and system integration services as well. We have customers from nearly every sector, including government, banking and finance, telecommunication, retail, manufacturing and many more.
1 to 10 staff
Cybersecpatrol
CyberSecPatrol is a B2B security as a service platform that offers cost-effective and qualified step by step security services to help SMBs reach security maturity and comply with protocols.
11 to 50 staff
Lakeforest Consulting
LakeForest Consulting is a high-performing consultancy company specializing in modern workplace and hybrid cloud management. Relying on our commitment to Microsoft only services and solutions products, we combine knowledge and skills with up-to-date technological advancements to ensure innovative security solutions for protection across users, Devices Apps Data Based in Tallinn, Estonia, our team works locally and internationally. Being small, flexible, and responsive facilitates our ability to achieve our two primary goals: Create a positive user experience Ensure data security Our target market is primarily Medium to large corporations Schools, universities, academies Public sector branches We also work with other types of organizations and hybrid customers, offering services and solutions for the Modern Workplace and Hybrid Cloud Management. Check out our website to learn more about our services: http://kaidojarvemets.com/services
1 to 10 staff
Defenz
1 to 10 staff
Strikt.Tech
How many smart devices are in your home? Do you know where they're all connected? Curious to find out? Introducing our upcoming network monitoring tool! Stay tuned for a game-changer!
1 to 10 staff
Velirs
Velirs provides innovative Information Technology Solution, Distribution and Managed Services, enabling solutions and services to meet the demands arising from social transformation, shaping new life styles for individuals and creating values for the society.
51 to 200 staff
Patchstack
Patchstack is the leader in open source software vulnerability intelligence, covering the entire lifecycle from detection to mitigation.
11 to 50 staff
Tehnokratt
Consulting, training and production for paper, electronic and online media. And. as LinkedIN wants this text to be at least 250 characters - while most of us have learned to edit everything down to less than 140 (including @replies and #tags) here is just some dummy text.
1 to 10 staff
Neverhack Estonia
NEVERHACK is a French group specialized in cybersecurity for over 40 years, and NEVERHACK Estonia (previously CYBERS) is proud part of it! Founded in 2021 and operating in 10 countries, the group now has over 1200 collaborators worldwide. Our ambition is to expand internationally to build a secure digital world for all. What do we believe in? Creating a safer digital world by offering innovative and ethical cybersecurity solutions, and empowering businesses with the keys to project success. 🧐 How do we do this? We support companies and individuals in protecting their data through a unique offering of consulting, training, cyber risk assessment, and AI-driven innovations. What are our strengths? Expertise, proximity, and trust! Our expertise is demonstrated through our collaborators' certifications and rigorous recruitment process. We select top talent and offer ambitious career paths, with over certifications earned annually. We maintain close relationships with our partners, both in terms of client relations and geographically, both in Estonia and abroad. We designate single points of contact (both commercial and technical) for increased responsiveness and availability to meet our clients' needs.> Co-founder of Cyber On Board!
51 to 200 staff
Cybers
Welcome to CYBERS, the forefront of Nordic cybersecurity. As a premier cybersecurity company, we empower both private and public enterprises to diminish cyber risks and elevate the efficacy of their cyber defense capabilities. Established in 2010, CYBERS boasts an international team dedicated to delivering highly effective Managed Security Services, cutting-edge technology implementation and integration, red teaming and penetration testing, comprehensive training, certification programs, and expert strategy and governance consulting services. In an era where the complexity, frequency, and scale of cyber threats are escalating, organizations recognize the significance of cybersecurity in their day-to-day operations. However, many grapple with the challenge of implementing essential controls and assembling a proficient team to sustain a secure environment. At CYBERS, we understand this struggle and offer a suite of services designed to fortify your business against both internal and external cyber threats. Our commitment extends beyond safeguarding your digital assets. We go above and beyond by assisting you in managing compliance needs, thereby reducing regulatory risks. In the face of the ever-evolving threat landscape, CYBERS is your ally, providing world-class defense in security solutions. Let us handle the cybersecurity, so you can focus on your core business!
51 to 200 staff
Bastion Information Security
With a foundation built on securing governments and large enterprises, we bring the precision, rigor, and scalability of enterprise-grade cybersecurity to businesses of all sizes. Our boutique approach ensures that you benefit from the same strategic insights and tailored solutions that protect the world’s most critical systems. At the core of our mission is a steadfast commitment to client satisfaction and trust. We prioritize open communication, transparency, and collaboration, working closely with each client to understand their unique security needs and objectives. Whether safeguarding sensitive data, defending against cyber attacks, or ensuring compliance with regulatory standards, Bastion Information Security is dedicated to delivering superior cybersecurity solutions that instill confidence and peace of mind. With Bastion Information Security as your trusted cybersecurity partner, you can navigate the complexities of the digital landscape with confidence, knowing that your organization is protected by the industry's foremost experts and cutting-edge technologies.
1 to 10 staff
Stakin By The Tie
Stakin is a Web3 infrastructure and non-custodial staking service provider. The company offers non-custodial staking services to institutional customers and individuals. It operates highly available blockchain validator nodes (99.5%+ uptime) across 40+ networks: Ethereum, Solana, Cosmos, Polygon, Polkadot, Sui, Aptos, Celestia, and more. Stakin offers slashing guarantees, custom API services, dedicated support, integrations with leading custodians, whitelabel nodes, dedicated nodes and more. Beyond validation, the company operates network infrastructure for decentralized Oracle projects such as Chainlink, and cross-chain connectivity services including IBC relayers for the Cosmos ecosystem, and dedicated bridge infrastructure for projects such as DeBridge. For more information about our company and enterprise-grade blockchain infrastructure services, please contact us.
11 to 50 staff
Auditmos
Our expert team reviews your smart contracts to ensure they are secure and reliable. With years of experience building blockchain solutions, we know exactly what makes contracts safe and efficient. We give you peace of mind knowing your code is protected. We help your development team write better, safer code through clear guidance and best practices. Our security-focused approach helps catch issues early, speeds up development, and ensures your software is both reliable and secure. We help protect your business by finding and fixing potential risks in your blockchain project. Our team carefully checks your system to make sure it's safe, tells you what's working well and what needs improvement, and guides you on making it more secure. This gives you and your users peace of mind.
1 to 10 staff
Orionrnd
Protect your business from cyber threats with our powerful cybersecurity program management platform. Our user-friendly tools make it easy to assess risks, develop a customized security plan, and manage your program with ease. Say goodbye to cybersecurity headaches and hello to peace of mind. Learn more today!
1 to 10 staff
Ransomleak
Interactive security awareness training
1 to 10 staff