KEYW offers a proactive, multi-disciplined approach to cybersecurity. We are experts in cyber defense, vulnerability analysis, and digital forensics. Our solutions help Government and commercial enterprises defeat threats against sensitive data and critical infrastructure.
Sypris Electronics offers you Cyber Resiliency, a peace of mind, that our proven and tested Cyber Security Solutions group will discover, neutralize, repair and defend your network with an integrated, multi-layer approach. Sypris Electronics' Cyber Security Solutions (CSS) group has earned a reputation for being the go-to team for the U.S. Army for technical expertise in security architecture analysis, cryptography, digital forensics, and ethical hacking.
ASD's information security solutions protect and defend our customer's information systems against malicious attack and reduce the threat to system security by proactively managing risk. We provide security policy and procedure formulation, threat identification and risk assessment, vulnerability analysis, system security engineering, network defense, secure document processing, applications, database and web security, information security evaluation, and accreditation and training.
Fraunhofer SIT is focused on fortifying the foundations of the Internet, and on developing easy to deploy defences, ensuring security and availability of the Internet. To that end, we study vulnerabilities in the standards and in the design of the deployed systems and services in the Internet, we research challenges and obstacles towards adoption of cryptographic schemes for defences of systems and networks and study incorrect deployments of cryptography.
Atos High Performance Security (AHPS), which is derived from our experience securing the Olympic Games, scans your business environment for malicious activity and alerts your enterprise in real-time if it discovers suspicious activity including those generated by APTs (Advanced Persistent Threats).
Most penetration testers use the “Smash and Grab” method: rushing into your network, attempting to break, steal, dismantle, and generally wreak havoc. We don’t do that. Our team assists you in evaluating your IT security infrastructure by providing you with network vulnerability analysis, actionable results, and recommended remediation efforts for discovered issues.