• Home
  • Search
  • Browse Products & Services
  • Security News
  • Resources
    • Featured Companies
    • Best Practice Articles
    • Documents
    • White Papers
  • Blog
  • About Us
    • About 180FIND
    • For Buyers
    • For Suppliers
    • Careers & Opportunities
    • Contact Us
  • Login
  • Register

Cyber Security

  • All Categories
  • Blockchain Technologies
  • Actual Deployments 11
  • Educational Information 13
  • How To Implement 3
  • Security & Support 1
  • Vendor Solutions 13
  • Cryptocurrency
  • Cryptocurrency Mining 5
  • Exchanges & Trading 4
  • Introductory 2
  • Security and Support 1
  • IT Security
  • Access Control 418
  • Alarms 112
  • Audio Surveillance 6
  • Biometric Security 30
  • Biometric Systems 6
  • Cyber Security 1159
  • IP Surveillance 112
  • m2m security 70
  • Physical Security 241
  • Point of Sale 3
  • Video Surveillance 472
  • Medical Servcies
  • Dentistry 1
  • Dermatology 0
  • Family Medical Services 0
  • Ophthamology 0
  • Mobile Services
  • Advertising Platform 6
  • Analytics 44
  • Application Development 198
  • Cloud Solutions 8
  • Marketing 114
  • Search Engine Optimization 7
  • Testing Solutions 37
  • Mobile Network
  • Hardware 22
  • Network Technology 116
  • Mobile Products
  • App Management 14
  • Applications 9
  • Billing 7
  • Business Solutions 328
  • Device Management 9
  • Enterprise Solutions 53
  • Identity Solutions 9
  • Management Systems 17
  • Payment Solutions 15
  • Security 55
  1. IT Security
  2. Cyber Security





Cyber Threat Management

Our expertise in cyber security by in-house security research and investigation on real-life attacks is core to all of our products and services. Being in the field every day, seeing new refined attacks and understanding the context of individual findings makes us able to offer value on many levels. We offer professional services, managed security services and the technology to run SOC operations to improve your security posture and on which you can operate services yourself.

Network Security
Endpoint Security
Penetration Testing
Forensics
Managed Security Services
Cyber Threat Management
Company: Fox-IT
Location: Delft, The Netherlands
Contact name: Info





Voice and Data Encryption

CRIPTOTER is an end-to-end voice and data encryption system for personal use. The use of cryptography and signalling that has been standardised by NATO as the SCIP (Secure Communication Interoperability Protocol) makes the system Interoperable with other equipment, independent of the communications access network, and provides both NATO and national encryption capacity in the same machine.

Data Encryption
Voice Encryption
PDA Based Encryption
Company: Tecnobit
Location: Madrid, Spain
Contact name: Info





Secure Communication

Sectra provides security solutions for voice and data communication. Users are decision-makers and officials in governments, defense authorities and critical functions of society, such as municipalities, county councils, police, customs, rescue services and the coast guard.

Data Security
Encryption
Secure Communication
Classified Information Transmission
Company: Sectra
Location: Linköping, Sweden
Contact name: Communications





Secure Information Exchange

Since 1989 Nexor has been trusted by commercial and public sector enterprises to provide technology and services that have supported mission critical business processes.

Secure Messaging
Secure Information Exchange
Secure Services
Company: Nexor
Location: Nottingham, UK
Contact name: Info





Identity Management

As our tag-line suggests – manageID is one framework that can meet any mission-critical identity challenge and therefore can be used for many applications. As a result, it can be rapidly configured to serve as a single solution for the issuance of credentials that not only serve as pieces of identification for the credential holder, but also can be used to allow access to physical facilities and logical resources.

Identity Management
Identity Appliances
Company: CITI
Location: Falls Church, VA, USA
Contact name: Info





Electronic Key Distribution

KeySure is a software product that provides a simple, easy to use and inexpensive way to distribute wrapped electronic key to anywhere with a network connection. KeySure will accept electronic keys from EKMS, DEKMS, NEKMS, KMI and directly from fill devices. Key distribution is automated all the way to the end node using the end user's TrKEK ID. Once delivered, the electronic key can be loaded via EKMS308 into standard US fill devices for unwrapping and loading into end cryptographic units.

Electronic Key Distribution
Key Tag Inspection Security
Secure Transmission
Company: Mycroft Systems
Location: Not Listed
Contact name: Info





Security & Risk Management

BT Global Services is a leading expert in managed networked IT services.  We combine products and services with industry-specific solutions and consulting expertise to deliver more efficient, streamlined and secure systems.

DDoS Protection
Firewall
SIEM
Penetration Testing
Vulnerability Assessment
Email Security
Strong Authentication
PKI
Company: BT Global Services
Location: CM Amsterdam Zuid-Oost, Netherlands
Contact name: Info





Data Recovery

Kroll Ontrack UK offers data recovery and data management software and services to clients in a wide range of sectors and circumstances, from commercial organisations, governments, charities and the public sector, through to home users. At Kroll Ontrack, we understand how important and valuable electronic data can be and we are dedicated to providing the best solutions available for tasks including data recovery, data destruction, archiving and analysis.

Data Recovery
Data Management
Hard Drive Recovery
RAID Recovery
Apple Recovery
Information Mangement
Company: Kroll Ontrack
Location: Epsom, UK
Contact name: Info





Endpoint Security

The iSheriff Endpoint Security Service is a cloud-based endpoint security platform offering advanced anti-malware technology to protect your organization’s endpoint devices from malware. This helps to secure and control the use of endpoint applications, while protecting against threats from removable media such as USB drives.

Endpoint Security
Malware Protection
Email Security
Compliance
Data Leakage Protection
Application Controls
Company: iSheriff
Location: Redwood City, CA, USA
Contact name: Sales





Information Security Enforcer

The Information Security Enforcer is “Industry’s First and Only” solution that seamlessly addresses both Malicious and Inadvertent data/information exfiltration or theft via any channel or application.

Data Security
Visibility
Compliance
Governance
Information Security Enforcer
Company: GhangorCloud
Location: San Jose, CA, USA
Contact name: Sales
Previous12345678910..116Next
Home
Search Browse Products & Services Featured Companies Security News Resources Blog About Us Contact Us Terms and Conditions
© 180Find 2019. All rights reserved.