Armor

Armor

Armor provide managed cloud security solutions for public, private, hybrid or on-premise cloud environments.

Armor’s proprietary closed-loop system of intelligence, defense and control seeks to defeat attacks and reduce the risk and complexity associated with managing cyber threats in a secure cloud environment. It’s the proven approach to driving down dwell time and keeping threat actors at bay.

You need to be proactive. Armor researches, aggregates and analyzes threat data from 50-plus global sources to identify active adversaries and their ever-changing techniques.

These learnings are continuously applied to our secure cloud defense layers and serve as early indicators of compromise — both inside and outside your environments.

Contact Information

Categories:
Cloud Security

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Nixu

Nixu

Nixu is the largest Nordic specialist company in information security consulting.

FarrPoint

FarrPoint

FarrPoint is a specialist telecoms consultancy providing a range of services including cyber security assessments and technical assurance to safeguard your data.

Vital Intelligence Group

Vital Intelligence Group

The Vital Intelligence Group Ltd is a leading Cyber Intelligence company.

Crusoe Security

Crusoe Security

Crusoe Security is a leading solution for Web Isolation. Instead of dealing with the threats, the Crusoe solution isolates them from the organization’s network to a protected environment (DMZ).

Dreamlab Technologies

Dreamlab Technologies

Dreamlab specialises in securing critical IT infrastructures. We offer qualitative support and advice for managing your infrastructure and cyber security needs.

Otlo

Otlo

Otlo delivers affordable, trustworthy solutions that identify cyber threats, improve and protect your digital security, helping you take control with our sector-specific expertise.

Avertium

Avertium

Avertium is the managed security and consulting provider that companies turn to when they want more than check-the-box cybersecurity.

AlertSec

AlertSec

AlertSec Ensure is a U.S. patented technology that allows you to educate, verify and enforce encryption compliance of third-party devices.