ACID Technologies

ACID Technologies

ACID implements a proactive approach to cyber security: it provides a supplementary layer of protection by initiating widespread searches to detect potential threats and risks long before actual attacks commence, as opposed to responding to hostile action once it takes place, after damage has been done.

ACID provides real-time detection of cyberattacks as early as in their initial planning stage, allowing organizations to foil them or mitigate their consequences.

ACID’s multiple designated robots perform comprehensive, optimized, round-the-clock website monitoring of a large number of targeted sources, including:

• Social networks
• Criminal sites
• IRC chats
• Deep Web
• Dark Net

Searches are based on client-defined keyword identifiers that potentially place the organization at risk. Alerts are displayed in real-time on the smart, user-friendly ACID dashboard, and are also automatically sent to the client via e-mail

Contact Information

Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Paessler

Paessler

Paessler is a leading worldwide provider of network monitoring software.

TNO Cyber Security Lab

TNO Cyber Security Lab

TNO Cyber Security Lab is a dedicated facility for innovative and experimental research with the goal of a safe and resilient cyberspace.

Sword GRC

Sword GRC

Sword GRC provides an award-winning platform for Governance, Risk and Compliance, made up of best-of-breed solutions that address the requirements of all enterprise market sectors.

Ministry of Defence Georgia - Cyber Security Bureau

Ministry of Defence Georgia - Cyber Security Bureau

The aim of the Cyber Security Bureau is to establish and develop stable, effective and secure Information and Communication Technology systems for the Civil Office of MoD of Georgia.

Janrain

Janrain

Janrain's Customer Identity and Access Management Platform helps companies build a unified view of their customers across all devices.

Digi International

Digi International

Digi is a leading global provider of mission-critical and business-critical machine-to-machine (M2M) and Internet of Things (IoT) connectivity products and services.

Asia ICS Cyber Security Conference

Asia ICS Cyber Security Conference

Asia ICS Cyber Security Conference is a day of intense presentations and panel discussions on the latest Cyber Security threats and solutions targeted at industrial control systems.

Keyavi Data

Keyavi Data

With Keyavi’s evolutionary data protection technology, your data stays within the bounds of your control in perpetuity.

BLUECYFORCE

BLUECYFORCE

BLUECYFORCE is the leading professional training and cyber defense training organization in France.

Parameter Security

Parameter Security

Parameter Security is a provider of ethical hacking and information security services.

SECFORCE

SECFORCE

SECFORCE is a leading information security consultancy specialising in bespoke penetration testing and red team engagements.