CyberInt's Automated Cybersecurity Readiness Platform Helps Optimize your Cyber-attack Resilience by Constantly Searching for Potential Gaps in your Defenses. Every organization's ability to defend itself varies according to its unique footprint of internal processes, decision-making, technologies, employee behavior and mentality - and this picture changes dynamically over time.
Cristie has a long history in Backup & Recovery. Our Backup, Replication & Archive solutions give customers control over their evolving business by delivering total protection, recovery and availability for data centers, remote offices, applications and data.
The Company’s innovative token-less authentication system delivers strong security through a combination of keystroke dynamics, behavioral and environmental characteristics to authenticate users and minimize identity theft, web fraud and other system vulnerabilities
By partnering with us and utilising our managed security services, you have the peace of mind of knowing you’re working with a team of highly-qualified specialists with over two decades experience in all aspects of IT security. Working with a wide range of accredited partners, we can provide you with a best-of-breed, vendor-agnostic security management solutions, customised to your business and operational needs.
Automate the discovery of security flaws within your network perimeter quicker, easier and more accurately with the AppCheck NG scanning tool. AppCheck NG is a best-in-class Web Application and Infrastructure vulnerability scanner.
Like Dropbox, but behind your firewall File Sync and Share for the enterprise. Your files are never stored on AeroFS servers. AeroFS enables you to share and collaborate while keeping full control over your data, even when sharing with your customers, vendors, and partners.
Aujas helps organizations manage information security risks by protecting data, software, people and identities in alignment with best practices and compliance requirements. We also help strengthen security governance and intelligence frameworks.
CloudHASH Security was established in 2011 by U.S. Department of Defense cybersecurity experts, with the vision to provide a comprehensive solution for end-to-end incident response from a single console.
Since 2011, Deja vu Security has been a trusted provider of information security research and consulting services to some of the world’s largest and most-esteemed technology companies. Our expertise is in information security services where we provide our clients strategic insight, proactive advice, tactical assessment and outsourced development. For each client, we offer a full range of security services.
The CAT (Cellular Authentication Token) Security Token is TFA (Two Factors Authentication) OTP (One Time Password) software token that runs on Java enabled Cellulars converting them into OTP Tokens. The CAT Cellular Token is part of the CAT Identity Management / Access Control comprehensive security solution.