Wizlynx mantains a global network with cybersecurity companies - premier technology and service providers that help us protect sensitive information and business assets of our customers. Our strategic business and technology partnerships allows us also to propose enterprise-level and industry-proven technology, best-in-class know-how, and experience that deliver the best resources and performance in the market today.
Alet is an Italian company, providing IT and TLC solutions and services since 1947.
Today Alet is a System Integrator and a Managed Service Provider, which offers value added services and advanced solutions for telecommunications, information technology and cyber security.
Information, People and the Unique Selling Proposition (USP) are the most valuable assets of a company. Therefore, it is essential that Information Security, Governance Risk and Compliance (GRC) is part of the company’s nature and business processes.
CISS is supporting you to address Information Security and GRC tailored to your company’s need. With the usage of the CISS ISMS SaaS solution and the managed control framework (covering ISO27001, ISO27002, ISO27005, SANS CSC, PCI DSS, GDPR etc.) CISS can apply a pragmatic and flexible approach to design, built or optimize your ISMS or GRC framework.
EBTCO is a market player in providing smart business solutions to fortune 500 companies in the region (Saudi Arabia, Bahrain and Egypt) where we add value and enhance productivity along with a strong reflection on improving legacy processes in different verticals and sectors. The recent shift and trend in the market helped refocus our business to embrace security within technology to a further extent with a brand new portfolio focused on Cybersecurity.
3C Informatica is part of gruppo3c, which is providing ICT solutions and services throughout Italy since 1995.
Cyber security is at the heart of 3C Informatica's activity, which aims to make even the most advanced technology easy and usable according to the needs expressed by Customer Companies with the only objective to secure their infrastructure and data.
IoT Inspector empowers manufacturers, service providers, enterprises and researchers to run automated security analyses and compliance checks of their IoT firmware before attackers get a chance to exploit them. Our platform automatically delivers instant results, is scalable and cost-effective – no source code, network connectivity or physical device access required. Our mission is to make IoT secure, and global leaders from TÜVs, Swisscom, T-Systems and more already trust in IoT Inspector.
TreeSolution's vision is to create the necessary awareness for information security in all companies. Because nowadays, it is no longer possible to rely solely on technology (e.g. firewalls, etc.). A sustainable security culture places a special emphasis on the employees of an organization. Owing to decades of experience and sound knowledge from scientific studies and practical insights, TreeSolution continually develop their product range. This way your information security is strengthened at the most important point: your employees.
Located in Hamburg, the law firm WIRTSCHAFTSRAT Recht advises corporate and municipal clients on how to comply with European and German IT laws. Its highly specialized attorneys examine the security framework of critical industries, analyze its sufficiency from a legal perspective and recommend technical and organizational measures to keep pace with the latest regulatory updates. In addition, WIRTSCHAFTSRAT Recht analyses the trends in legislation and jurisdiction on cyber security standards. Based on its careful assessment of the legal landscape, the law firm maps out legal risks and develops affordable solutions to circumvent them. If necessary, WIRTSCHAFTSRAT Recht will also accompany its clients through investigations and proceedings; however, its primary objective is to prevent legal disputes related with cyber security concerns altogether.
UNIC – WE HUMANISE THE DIGITAL
We create digital solutions that merge technology and user needs. Always having the big picture in mind: We explore opportunities, we outline scenarios, we design and develop digital solutions, we enrich them with valuable content, we measure, we reflect, continuously evolve the solutions and ensure scalable operation.
360inControl® is a new generation of an internal control system (ICS) consisting of Governance Risk & Compliance (GRC), Information Security Management (ISMS), Data Classification and Audit & Evaluation Management. Digitalization, centralization and sustainability are significantly promoted by the use of 360inControl® and silo generation is prevented. Employees are actively involved in the processing of measures/action items (CAPAs), which increases acceptance and promotes cooperation. 360inControl® is based on its own 'Control Library', which covers the requirements of international standards such as ISO27001, ISO27002, COBIT, GDPR, PCI and others. Company controls and control frameworks can easily be added as needed. In 2019 360inControl® won the "Solution Award 2019" of the CISO Alliance in Germany. You are welcome to try 360inControl free of charge.
Barracuda Networks, Inc. offers industry-leading, cloud-connected solutions designed to solve mainstream IT problems – efficiently and cost effectively – while maintaining a level of customer support and satisfaction second to none. Barracuda’s products span three distinct markets, including: 1) content security, 2) networking and application delivery, as well as 3) data storage, protection and disaster recovery, and increased productivity solutions. While Barracuda maintain a strong heritage in email and web security appliances, their award-winning portfolio includes more than a dozen purpose-built solutions that support literally every aspect of the network. Beyond traditional security measures, Barracuda’s best-of-breed security portfolio is designed to protect all threat vectors—email, web, network perimeters, mobile, remote access, and your users; this is known as Total Threat Protection. Barracuda provides organizations of all sizes with true end-to-end protection that can be deployed as physical, virtual, cloud, and hybrid form factors.
CodeNotary is a young software company founded by a team of very experienced and passionate engineers and entrepreneurs, with headquarters in Houston, Texas, and a team of engineers, researchers, marketers, managers, and customer satisfaction heroes spread out across the globe.
Specialized in restoring trust and integrity in digital solutions by making it possible for organizations to keep tamper-proof, indelible, and immutable ledgers of transactions and data transitions.
ESET offers security solutions for home users and corporate customers worldwide. It provides endpoint security solutions that integrates antimalware scanner that detects and disables known and unknown viruses, trojans, worms, adware, spyware, rootkits, and other Internet threats, as well as those present on flash drives, CDs, and DVDs. ESET's endpoint security solution also integrate a two-way firewall, antispam, and web access protection to eliminate various security threats.
ESET is available on a wide variety of Operating Systems such as Linux, Microsoft Windows, MacOS X, and Android.
F5 Networks, Inc., is a developer and provider of software defined application services. F5 Networks is engaged in the development, marketing and sale of application delivery networking products that optimize the security, performance and availability of network applications, servers and storage systems. F5's Traffic Management Operating System (TMOS) based offerings include software products for local and global traffic management, network and application security, access management, Web acceleration and various network and application services. These products are available as modules that can run individually or as part of an integrated solution on the Company's purpose-built BIG-IP appliances and VIPRION chassis-based hardware, or as software-only Virtual Editions. F5 Networks also offers distributed denial-of-service (DDoS) protection, application security and other application services by subscription on its cloud-based Silverline platform.
Palo Alto Networks is the leading company in a new era of cybersecurity. Palo Alto Networks solutions protect the networks of thousands of large companies, government agencies and service providers against risks. In contrast to fragmented legacy solutions, the Palo Alto Networks security platform is capable of secure business operations. The solutions protect systems based on what is most important in today's dynamic IT environments: applications, users, and content.
The Palo Alto Networks security platform brings network, cloud and endpoint security to a common architecture. It integrates all major network security features, including advanced firewall, IDS / IPS, and URL filtering. Since these functions were integrated into the platform and shared important information across disciplines, Palo Alto Networks’ system ensures a much higher level of security than company-specific firewalls, UTMs, or targeted threat detection systems.
Qualys’ solutions help organizations with globally distributed data centers and IT infrastructures to identify their IT assets, collect and analyze large amounts of IT security data, discover and prioritize vulnerabilities, recommend remediation actions and verify the implementation of such actions. By deploying Qualys’ solutions, organizations can gain actionable security intelligence into potential vulnerabilities and malware in their IT infrastructures and enable their compliance with internal policies and external regulations. Delivered as a multi-tenant cloud platform, the QualysGuard integrated suite of solutions incorporates Qualys’ industry leading vulnerability management service, with a robust IT compliance solution, comprehensive web application scanning and malware detection services.
SyferLock offers an innovative software-based alternative to hard tokens, smart cards and other authentication solutions. SyferLock delivers two-factor and multi-factor authentication utilizing patented software-based grids to convert static passwords/PINs into device-less one-time passwords/PINs (OTPs), without the need for hardware tokens and without any dependency on a cell phone like SMS-based solutions.