Directory · IL
Computer and Network Security in Israel
A register of firms and the professionals working at them in the Computer and Network Security sector based in Israel. Browse the public index, then filter or export on Kipplo.
Companies
523 on file
Expertos By Browarnik
More than 20 years of experience in protecting firms and organizations. Thoroughly. With persistence. Innovatively. Rest assured: with us, “You’ll never walk alone”.
1 to 10 staff
Eyer Security
EyeR Security provides a unified platform and expert-led Managed Detection and Response services, designed for MSPs and modern organizations to protect what matters most. Built from real-world SOC, incident response, and threat intelligence experience, EyeR combines advanced technology with elite human expertise to connect the dots, investigate fast, and resolve threats before they disrupt your business.
11 to 50 staff
Francisco Ventures
FRANCISCO VENTURES®, develops and manufactures advanced and cutting-edge cyber security products, meeting the complex requirements of government agencies, high-end corporations and discerning professionals.
1 to 10 staff
Immue Acquired By Forter
Immue enables organizations around the world and across multiple industries, including e-commerce, travel, financial services, cryptocurrency, and more, to stop human fraudsters in their tracks, as well as the bots that no one else even knows are there. Located in the heart of Israel’s Silicon Wadi, Immue is comprised of a team of seasoned cybersecurity domain experts and is led by executives who bring extensive experience in building multidisciplinary teams and technology-driven businesses from the ground up. For more information, reach out to us at info@immue.net.
1 to 10 staff
Ironshield
IronShield redefines endpoint security by isolating web applications from endpoint devices, ensuring organizational digital assets are secure—even if devices are compromised. IronShield’s approach effectively neutralizes traditional hacker methodologies by changing the fundamental ways users authenticate and interact with web applications, neutralizing both external and insider threats. Imagine a world where your browsing activity is secure, no matter what. IronShield helps organizations like yours achieve a cyber-safe browsing experience. Our advanced endpoint security tools safeguard your data even if your systems are compromised. Are you a business owner, CISO, or IT leader facing these challenges? • Protecting sensitive data from breaches • Securing your employees' browsing activity • Enforcing data security standards across your organization • Maintaining protection even after a potential compromise IronShield can help. Our Endpoint Security Suite includes: • Secure Browser • Secure Password Management • Identity and Access Control Management • Monitoring and Alerts • Endpoint Data Loss Protection • Quick and Easy Deployment Process • And more Ready to Take Control of Your Cybersecurity? Contact us today to learn how IronShield can secure your browsing activity and safeguard your data. Why IronShield? IronShield is a comprehensive security suite with multiple features and tools, designed to secure organizational web applications and endpoints. It mitigates risks from human error, malware, and both internal and external threats, reducing the likelihood of data breaches and saving costs by consolidating various security tools into one solution. Learn more and join us in creating a safer digital environment.
11 to 50 staff
Kaymera By Tam-C
Kaymera is a data-driven secure mobility company providing SaaS and on-premise mobile security solutions for enterprises and individuals worldwide. Our understanding of mobile security landscape comes from over 10 years of experience ensuring high-end protection of sensitive business assets and individual digital privacy.
11 to 50 staff
Ktrust
KTrust is the only Kubernetes Security Posture Management (KSPM) platform that leverages end-to-end validation to dynamically emulate attacker behavior within Kubernetes environments. It proactively uncovers innovative attack paths by maneuvering through Kubernetes clusters, even around existing security defenses, to reveal critical exposures unique to each Kubernetes ecosystem. Our End-to-End platform focuses on reducing false positives and noise by validating risks, so your security team can prioritize and fix only what matters, saving time and resources. KTrust’s automated Continuous Threat Exposure Management (CTEM) operates 24/7, delivering actionable alerts and mitigation strategies without disrupting business operations. With KTrust, businesses receive precisely what they need: lean, efficient, and production-grade security tailored to their scale. We empower DevSecOps teams and CISOs to protect critical infrastructure by identifying real threats, validating them from an attacker's perspective, and mitigating risks before they impact production. Our platform simplifies Kubernetes security management, ensuring companies stay ahead of threats without unnecessary operational burden.
11 to 50 staff
Nitromia
We provide a world-first data security solution that allows computation on encrypted data - without the need to decrypt it. This empowers enterprises across a variety of sectors to overcome many of the business and security challenges they are facing today. Our Dynamic Privacy Suite utilizes fully homomorphic encryption to enable quantum-safe transactions to be recorded and managed, both on private and public networks, all while complying with international data-security regulations. Fully homomorphic encryption has long been the holy grail of cryptographers, and we are proud to be at the leading edge of the field, allowing enterprises to gather insights from encrypted information without ever needing to decrypt it. Among the numerous industries that would immediately benefit from fully homomorphic encryption are finance & banking, biomedical research, education, and hospitality.
1 to 10 staff
One Click
Компания One Click помогает устранять любые проблемы с компьютером, планшетом или смартфоном. Мы оказываем удалённую поддержку по всему Израилю. Это быстро, просто и удобно!
11 to 50 staff
Rstream
Our ModelFlow Financial Fraud Platform consolidates cutting edge Auto AI modelling, production deployment with 1 ms response times, 3rd party fraud systems and data into one unified hub spanning and securing the entire user interaction journey.
11 to 50 staff
Start Advanced Computing Solutions
We provide computer solutions and technological services for small and medium businesses, including computer support services, but much more. We provide our customers a variety of services, including: computer support, cloud computing, backups and much more. Among our satisfied customers: accountants, lawyers, engineers, cleaning and sanitation companies. The size of our customer's companies layes between 10 and 100 mobile and fixed computing positions. When you make a simple calculation you can see that it is not profitable to hire internal employees for these services in the company size stated above. That's why the solution is in the business computing service - outsourced to our company. Under one house we provide all the existing computing solutions including computer support and quietness when your business gets the best service and attitude. Our services include: 1. Cloud Computing - back up all office material to servers and back up your computers, share files between employees anywhere in the world quickly and easily. You can also start a smooth transition to Office 365 and other cloud services for business - IP switches and mail filtering servers. Data Security - Securing information is the main thing in the company! Data safety, avoiding file encryption and hacking. Office 365 - The perfect solution for a dynamic business. Mail services with a 50GB box size, 1 TB of cloud storage. Office On Line, Word, Excel and PowerPoint documents from anywhere and without the need for local installation, support and management services in Hebrew. Cloud computing services - We take you one step further - If you are thinking of upgrading your existing business or thinking about purchasing equipment for a new business, then stop and consider switching to cloud computing - can save you a great deal of time and money. computing solutions - Strengthening the systems in a minimum maintenance time. providing complete health maintenance system, Anti-virus.
1 to 10 staff
Viral Security Group
Viral Security Group was founded by a group of elite researchers gathered from all over the Israeli cyber industry. We specialise in advanced and complex technologies such as: OS Internals, Hypervisors, AV Mechanisms, and more. The group was established to bring deep knowledge & understanding of the cyber industry to clients in need of expert advice. The company specialises in- OS Internals & Vulnerability Research (Windows, Linux, OSX, Android, iOS, etc.)- Advanced Technologies Research (e.g. Hypervisors, AV Mechanisms)- Malware Analysis & Incident Response - ICS Security - Penetration Testings & Security Reviews
11 to 50 staff
Ariel Cyber Innovation Center
Ariel cyber innovation center constitutes a hub for theoretical and applied research activities, supports and promotes the cyber array in the academic sphere, initiates cooperation with bodies in the government, business, and public sectors, through scientific cooperation with academics and research institutes and provides training and courses based on real cyber-attack simulations in Israel and abroad. The Center focuses on developing abilities for protection and development of systems resistant to cyber-attacks: development of multi-layered systems that integrate hardware, software, and users. The systems work in a communication environment with high user volume. In the laboratory framework subjects of interest will also be developed, such as strength assessment, strength enhancement, development of the ability to analyze and identify weaknesses in systems, protocols, and human-machine interface, and programming of resistant architecture. In addition, the undergraduate students consolidate their cyber studies with the Department of Mathematics and Computer Sciences. Ariel Cyber Innovation Center operates a unique simulator (trainer) based on the technology of CyberBit, the daughter company of Elbit Systems which is associated with the Computer Sciences Department of Ariel University. The simulator constitutes practical training for cyber teams who deal with cyber warfare and defense, SOC information security experts, and network management and administrators. The participants execute hands-on training exercises in which they encounter advanced attack scenarios in a realistic and secure environment, with the guidance of our cyber experts.
51 to 200 staff
Cirotta
We are a mobile cybersecurity company. Our technology provides mobile safety and privacy for organizations and individuals. We safeguard individuals of an organization from all smartphone hardware hacks with our state-of-the-art security layer, ensuring that organizations and private individuals are no longer susceptible to corporate espionage, ransomware, identity and data theft. Our mission is to set a new standard in mobile privacy.
1 to 10 staff
Code Blue Cyber
Code Blue specializes in helping organizations prepare for and efficiently manage cyber crises. We assess your ability to recover from cyber crises and provide a tailored action plan to strengthen resilience and reduce impact. Unlike traditional incident response providers, we cover the full spectrum of crisis management- from operations and regulation to incident response, communication, and negotiation. Led by Refael Franco, former Deputy Director General and Head of the Defense Arm at the Israel National Cyber Directorate, our team brings national-level expertise to the private sector. Franco was responsible for defending and restoring Israel’s critical infrastructure- today, he leads our efforts to strengthen yours. With proven experience supporting hundreds of organizations under attack, we minimize disruption, reduce financial and regulatory risk, and safeguard your reputation when it matters most. When a cyber crisis hits, Code Blue is ready. Are you?
51 to 200 staff
Dooks It Experts
Dooks computing services is a leading provider of advanced IT infrastructure solutions and services. Our team enjoys vast experiense in delivering & supporting comprehensive projects specializing in Virtualization, Networking, Information Management, Data Protection, Storage & Cloud services. Dooks has developed long term relationship & well known reputation among its Enterprise and Mid-size class customers.
11 to 50 staff
Firmitas Cyber Solutions
Firmitas provides a next-generation Adaptable Operational-Security solution. A new approach for cyber-defense based on process-oriented security rather than information or data security. Instead of creating antidotes to specific threats it works by enforcing a system's predefined design. Thus, making unexpected attacks infeasible and ensuring system up-time. Firmitas’ ValidiGate is a disruptive attack-prevention solution providing operational assurance and security for industrial and mission-critical systems. Thus, enabling the protected systems to operate deterministically under any condition, from Smart-Meters to Nuclear Reactors. Firmitas’ technology enforces each systems’ pre-defined operational-envelop, thereby reducing the attack-surface. The security originates by ensuring only pre-approved states and functionality which are necessary for the specific operation.
11 to 50 staff
Isaca Israel Chapter
As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves
201 to 500 staff
Nation-E
Nation-E is revolutionizing cyber protection for Critical Infrastructure and the Industrial Internet of Things (IIoT). We offer innovative security solutions for industrial installations, critical infrastructure and smart grids. In a global environment where cyber-attacks are on the rise, Nation-E is committed to protecting vulnerable critical assets. Our cutting-edge solution is designed to provide maximum protection for OT, where most assets are connected via serial ports. Our platform combines cyber security, risk management, big-data analytics, and enables full control of infrastructure that was previously unprotected. The company was founded in 2012 by Daniel Jammer, a renowned entrepreneur, industrialist and philanthropist. Nation-E has a very strong international presence, with offices in Herzliya, Israel, Silicon Valley and New York City
11 to 50 staff
Reblaze Part Of Link11
Link11 and Reblaze have united to provide comprehensive, enterprise-grade cybersecurity solutions, making the Internet safer for businesses of all sizes. Our portfolio includes advanced products in Network Security, Web Protection, and Web Performance, offering robust security and proactive defense strategies. Integrated with leading cloud providers and deployable in any environment, our services ensure flexibility, privacy, optimal performance, and compliance, protecting critical infrastructures and enterprises from global digital threats. We join forces against constantly evolving threats, striving to lead in cybersecurity and mitigate digital risks effectively.
51 to 200 staff
Safemind Cybersecurity
Powered by AI, we address the weakest link in the cyber security chain - the Human Factor. SAFEMIND Provides pre-breach prediction & and prevention. Which Individual/s (Employees, or groups) will be most susceptible to specific type of cyber attacks (Ransomware, Phishing, Data Loss etc) and applies adaptive controls accordingly. SAFEMIND achieves higher security, and higher security awareness without interrupting the user.
1 to 10 staff
Tetrisponse
Tetrisponse is a global consulting platform in the field of cyber and information security, providing a variety of services focusing on Incident Response and Security as a Service
11 to 50 staff
Z4 Security
Securing Blockchain transactions and building community trust.
1 to 10 staff
Aironworks
AironWorks is an AI-driven Human Cybersecurity platform, featuring an Agentic AI Dashboard that empowers users to defend against evolving threats. Our solutions include AI-powered awareness training, real-time email scanning and reporting, and biometric verification to combat deepfakes and BEC. We combine intelligence and usability to protect the human layer of cybersecurity.
11 to 50 staff
Comsec Distribution By Hub Security Group
קומסק הפצה הינה חברה מובילה והוותיקה בישראל בתחום הפצת פתרונות אבטחת מידע של היצרנים המובילים בתחום וקיימת מזה כ- 30 שנים. קומסק הפצה מייצגת ומפיצה יצרני ופתרונות אבטחת מידע של היצרנים המובילים בתחום. קומסק הפצה היא חלק מ: HUB Security group. החברה מעניקה שירותים למאות שותפים עסקיים בישראל וכוללת שירותים של Pre-sale, POC's, Sizing, Post-sale, First level support, הדרכות וכולי. אנו דוגלים בהעמקת הידע המכירתי והטכנולוגי באופן שותף ומוסמכים ע"י היצרנים השונים בכל הסמכות ברמה הגבוהה ביותר. הקשר עם כלל השותפים מבוסס על כיסוי מלא אשר מתחיל באפיון הדרישות של הלקוח הסופי, התאמת הפתרון המצאים ביותר ועד לאספקת הציוד עד לחצר הלקוח הסופי. כחלק מרמת השירות ללקוחות ולשותפים השונים קומסק הפצה רוכשת ציוד רב למלאי שותף של אספקות ושירות. חברת קומסק הפצה הינה Value Added Distributor אשר משלב 3 עקרונות: מקצועיות, שירות ללא פשרות ואיכות חברת קומסק הפצה הינה חלק מקבוצת קומסק בע"מ. קבוצת קומסק קיימת יותר מ-30 שנה והינה מהחברת המובילות והוותיקות בשוק הישראלי והעולמי כאחד. לקוחותינו הנאמנים איתנו במשך עשרות שנים וזוכים לשירות בסטנדרטים הגבוהים ביותר הקיימים בשוק. קומסק הפצה מספקת שירותי הפצה מתקדמים של מגוון פתרונות בתחום אבטחת המידע בישראל. פתרונות אבטחת המידע של היצרנים המובילים ביותר בתחום הסייבר.
11 to 50 staff
Cyberhub Defensive Cybersecurity Services
CyberHub is a boutique consultancy firm offering a complete set of defensive Cyber Security Consultancy and Toolsets. Our services include: GAP ANALYSIS and ASSESSMENT, PLANNING and ARCHITECTURE, IMPLEMENTATION and TESTING, OPERATIONS and SUPPORT, COMPLIANCE and REGULATION, SECURING IN-HOUSE SOFTWARE LIFECYCLE CYBER INCIDENT MANAGEMENT and PREPARATION While being a Global Company with customer facing offices in Europe and North America our Center of Excellence is based in Israel and comprised of a cybersecurity experts with experience in securing High Stakes Environments On Scale in multi-discipliner environments, which include: CUSTOMER JOURNEY SUPPORTING SYSTEMS, OPERATION TECHNOLOGY (OT) and SCADA, IOT, DEFENSE SYSTEMS and VERY HIGH SECURITY NETWORKS, SW DEVELOPMENT ENVIRONMENTS. Our team rages from Top Executives and National Security Agency Veterans that lead incident response in a ransomware attack and provide: CISO-AS-A-SERVICE, GAP ANALYSIS, RISK ASSESSMENT, PEN TESTING, BLUE TEAM, RED TEAM, SOLUTIONS PLANNING AND IMPLEMENTATION, OPERATIONS AND MSSP, REGULATION AND COMPLIANCE (SOC2, ISO, TISAX, DATA PRIVACY SUCH AS GDPR AND HIPAA), SECURITY AWARENESS, CYBER-SECURITY TRAINING. We also specialize in securing SW - we have extensive experience in: DEVSECOPS, CLOUD DEFENSE, SSDLC, CI/CD OPTIMIZATION, VISIBILITY ENHANCEMENT (SECURING A MULTI-SW VENDOR AND OPEN-SOURCE ENVIRONMENT). Our consultancy is provided in a fully modular engagement model, which can support work on a: PROJECT BASIS, TIME BASIS, FULL OUTSTAFFING MODEL. Products and Solutions are priced based on the OEM licensing model.
11 to 50 staff
Enqode
As quantum computing looms, Traditional encryption layers are becoming useless, leaving organizations vulnerable to Q-day’s catastrophic data breaches, and significant quantum-safe scalability limitations. Our Quantum Security Posture Management (QSPM) empowers CISOs, CIOs & CTOs to stay ahead of the curve with a future-proof quantum-safe data security without limits. Our hybrid, agile, zero-trust platform: • Shatters scalability limitations • Outperforms quantum-safe protection • Protects against both Ransomware & HNDL attacks. • Reduces compute costs by 70% Organizations can become Quantum-Safe instantly by integrating their ETL/ELT workflows and CI/CD pipelines seamlessly, Securing data in transit and at rest ensuring compliance and protection against current and quantum threats, regardless of workload, scheme, scale, infrastructure, or hardware. Don’t wait until it’s too late. Upgrade now, and become quantum-safe with us!
1 to 10 staff
Kernelios
KERNELiOS is a cyber command knowledge center located in Israel. KERNELiOS has vowed to train the future generation of cyber security experts in the industry by offering them to learn from Israel’s leading experts in the field, placing maximum emphasis on hands-on training in the various topics. The Cyber Command Knowledge Center’s curriculum includes a wide range of topics which are necessary for any cyber security expert. The founders’ vision is to train students who will later serve as a cyber leader in their respective organizations.
11 to 50 staff
Qshark
Offer the best solutions for Recruitment & Selection of IT professionals, providing technological solutions, adding value and agility to your business. Contributing in a sustainable way to the growth of all our customers.
1 to 10 staff
T Dot Com - Computing Solutions
IT for Business | Consulting & Constructing of Wired & Wifi Networks | Consulting & Assimilating of Cyber & Data Security, Cloud Backup | Providing VOIP Services
1 to 10 staff
Viollete
Viollete is a technology research and development company founded by graduates from IDF 8200 unit with niche expertise and a focus on the latest technologies. We are helping companies achieve their goals with impactful specific software solutions.
1 to 10 staff
Ace Labs
ACE Labs is a cutting edge innovation center, delivering sophisticated security and intelligence solutions designed to enable a safer world. We focus on the prevention and neutralization of crime and terror threats using the most advanced technology. We are constantly learning and never stop pushing our technology to new heights and beyond. We operate in a multi-platform world (mobile, PC, cloud), covering different environments and layers of the system: from low level and kernel space research, through application and online services, to network protocols analysis. We created a platform for innovation, thinking outside the box and leading change. This enables us to hire extraordinary people and give them the best conditions in order to not only grow, but thrive.
51 to 200 staff
Avalon Security
Avalon Cyber Security is a leading ‘One Stop Shop’ provider of consulting services in cyber and information security and with deep expertise of information security standards ISO 27001/27799 and PCI DSS, GDPR, HIPAA and much more. In Avalon Cyber Security you will find a business enabler approach that significantly reduces the risks and builds a comprehensive cybersecurity management system, tailored to your goals and business needs. Avalon Cyber Security consulting division provides experts for risk management, penetration tests, Awareness training, CISO as a service, Policies & Procedures kit, Data Security laws and regulations overview and more. Cyber security requires access to information about the core business of the client. We are extremely aware and responsible for the sensitive and confidential information of each customer. Trust is a must. It is our principle. Avalon Cyber Security is committed to make our clients more secure, protecting them in increasingly sophisticated cyber-attacks and continuously strengthening their defenses.
1 to 10 staff
Connect Everywhere Israel
Connect Everywhere Israel is part of the Connect Everywhere group with offices in USA, Mexico and Israel. The group was founded 20 years ago to provide with high quality Professional Solutions for its clients on the Software Development, technology and Security Arena. Our Services: • Information Security Consultancy • ISO 27001/2 • Information Security Projects - Products and Integration • Monitoring Solutions • Cryptography Services חברת CEI.co.il - Connect Everywhere Israel היא שלוחה של חברה בינלאומית הממוקמת במקסיקו ומעניקה פתרונות מחשוב לחברות מובילות בשוק האמריקאי, המקסיקני והישראלי. בישראל חברת CEI.co.il הינה חברת ייעוץ ואסטרטגיה בתחום אבטחת מידע. אנו מלווים את מנהל ה-IT והמנמ"ר לאורך כל התהליך החל משלב החשיבה, דרך אפיון צרכים, בחינת פתרונות ישראלים ובינלאומיים ועד ליישום האסטרטגיה בארגון. בעזרת הקשרים הבינלאומיים שלנו, ביכולתנו להציע פתרונות אבטחת מידע המשלבים בפתרונות בינלאומיים וסטארט-אפים ישראלים ולשלבם באסטרטגית אבטחת המידע בארגון. בין שירותינו נתן למצוא - ביצוע סקרי סיכונים והמלצות לפתרונות - סקרי חדירה לארגון- Penetration Test – SQL/ IIS תשתיתי ואפליקטיבי - ייעוץ, ליווי והסמכה לתקן אבטחת המידע ISO 27001/02 - מוצרי כספת להעברת קבצים - מערכת הלבנה - מוצרי McAfee - מערכות ניטור ובקרה ל IT - Cryptology Solutions - מערכות להצפנת שיחות טלפון ניסיון עתיר השנים במתן פתרונות וייעוץ לגופים השונים, ראייה עסקית רחבה, שיתוף פעולה עם חברות ופתרונות בינלאומיים מהמובילות בעולם וכן הכרת תקני הרגולציה, מציב את חברת CEI.co.il כמובילה בתחום. אנו סמוכים ובטוחים כי הניסיון הרב של חברתנו והיכולת הבינלאומית שצברנו תעניק לך ולארגון ערך מוסף גבוה בתחום אבטחת המידע בארגון.
1 to 10 staff
Cyberiom
Cybersecurity - It's all about people, process, technology
1 to 10 staff
Cypure
CYPURE is a leading provider of high-quality cybersecurity services, that specializes in providing services in the areas of penetration testing, red teaming, and offensive cybersecurity. Our primary goal is to help businesses stay protected against potential threats and vulnerabilities. We understand that every business has unique security needs, and therefore, we offer customized solutions that are tailored to meet our client's specific requirements. Our team comprises highly skilled professionals who have extensive experience in the cybersecurity industry. We believe in building long-term partnerships with our clients by providing exceptional services and being trusted advisors. Our approach is centered on collaboration, transparency, and knowledge sharing, which allows us to develop effective solutions that deliver tangible results. At CYPURE, we are committed to creating a safer world by ensuring that businesses are equipped with the necessary tools and resources to mitigate security risks. With our cutting-edge solutions and state-of-the-art technology, we can help businesses stay ahead of the curve and safeguard their valuable assets from potential cyber threats.
1 to 10 staff
Ged-I Ltd
GED-i Ltd develops and markets 1) For the Cloud Storage and for Local Storage- Data Encryption based on set of appliances used as Encryption Engine (GSA and Key Server (GKS 2) For IP public and Private networks - IP network Encryption based on High-End, High-Speed set of appliances used as IP to IPSEC encryptors(G4Crypt ). For the Storage encryption, the company unique technology based on the combination of standard encryption (AES 256) and three additional layers used to segment and scramble the data. The company was founded on 2005, located in Israel and has active sales in Europe, Middle East and Asia.
11 to 50 staff
Hackstack
HackStack delivers complete cybersecurity program orchestration, from asset discovery to penetration testing, with customized continuous protection for critical assets.
11 to 50 staff
Highteach
מכללת אבטחת מידע וסייבר אונליין אצלנו תוכלו למצוא קורסי אבטחת מידע וסייבר הגנתיים והתקפיים אונליין עם חומרים טכניים בלי דיבורים מיותרים ובמחירים שפויים שיכניסו אתכם לעבודה בתחום עם ניסיון מעשי ופרקטי.
1 to 10 staff
Illuminant
Armed with decades of experience in the defense and corporate worlds, we carefully navigate our era’s distinctive challenges, and are committed to the needs of our customers as they address one of the most significant security challenges of our time - protecting digital value. It is for that reason that we founded ILLUMINANT.
11 to 50 staff
Incert Intelligence
Vulnerability research, exploit development and advanced cyber intelligence solutions are at the core of what we do at Incert Intelligence. Our mission is finding smart ways of using technology that will help build a better tomorrow for everyone, everywhere.
1 to 10 staff
Jed Security
Jed Security is a continuous, agentic penetration testing platform that provides POC exploit code to validate threats. We build complete network topology maps that show how your applications are wired and how all components and assets are connected. Jed automatically detects changes in your applications and infrastructure, and proactively sends a new pen test to reflect each change, keeping you continuously protected, and continuously compliant.
1 to 10 staff
Lcs
Our cybersecurity services company provides comprehensive and customized solutions to protect business from cyber threats. Our experienced team offers a range of services, including Risk Assessment, generation of cybersecurity processes and policies, Network Security, Compliance Management, CISO as a Service, Security Awareness and Incident Response. Our goal is to help business minimize their risks and maximize their cybersecurity resilience.
1 to 10 staff
Penchuk Cyber
GenAI Driven Cybersecurity Consultancy | Over Two Decades of Excellence in IT & Cybersecurity | SOC2 & ISO27001 Founded on the pillars of Integrity, Innovation, and Partnership, we are a premier cybersecurity consultancy dedicated to fortifying your digital assets. With over 20 years of hands-on expertise in IT and cybersecurity management, our commitment is to provide the highest caliber of services tailored to your needs. Our Expertise Includes: Cyber Resiliency Cyber Readiness and Certification Product Security Cloud Security Key Services: SOC2 and ISO 27001 readiness and certification Penetration Testing Red and Purple teams Risk Assessment Comprehensive Ongoing Consultancy Guided by a legacy of excellence and a passion for safeguarding digital domains enhanced with GenAI capabilities, we stand ready to partner with you in fortifying your cyber landscape. Connect with us today!
1 to 10 staff
Securetech Cyber Security
SecureTech is a company specialized in cybersecurity services and data protection. We offer a wide range of services such as Design and construction of SOC & G-SOC centers and specialization in SCADA, IoT, Physical Security, CCTV environments. SecureTech’s comprehensive solutions protect customers from external and internal cyber threats through expert planning and implementation of communication networks and information security infrastructures.
1 to 10 staff
Secureteck
SecureTeck propose to guide his costumers into 3 main services as security experts in the embedded, mobile and DRM area: Secure Development: From Architecture to production to reach a secure product! Certification: Boost the whole preparation and complex guideline to receive the certification Secure Product: Test, Review and propose countermeasure to existing product
11 to 50 staff
Security In Motion
Understanding the different vulnerabilities that exist within the connected car system and the risks associated with these vulnerabilities being exploited – is the key to addressing the needs of car manufacturers today when introducing more functions to the current offerings.
1 to 10 staff
Shards
Welcome to SHARDS, your go-to partner for top-level cybersecurity since 2023. We look at cybersecurity like a math problem, breaking it down into smaller, easier parts. This way, we tackle big security challenges with clear and simple solutions. Our team works hard to really understand your organization's systems. We find weak spots and strengthen them before any attacker can take advantage. By combining the careful attention to detail found in math and the high standards of military protection, we make sure your cybersecurity covers everything, leaving no gaps.
1 to 10 staff