Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

CipherTooth’s unique methodology allows it to detect Man in the Middle (MItM) attacks in real time. We keep all the good stuff and get rid of the weaknesses in HTTPS. CipherTooth can even run over the top of HTTPS, works well with Multi Factor Authentication, and when a site is constructed correctly, eliminates MItM, Phishing and Spoofing attacks.

CipherTooth creates an encrypted tunnel similar to HTTPS but with none of the required Public Key Infrastructure (PKI). Current hacking techniques will not penetrate the tunnel as the technology does not have the weaknesses inherent in HTTPS. The technology can be deployed as a web service, as an appliance, or as a software. Our patented technology can be used to develop a stand alone product or it can be built into a current product as a new feature. It can also be used to develop unique solutions for a single customer's specific needs.

Contact Information

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infrascale

Infrascale

Infrascale specialise in providing cloud backup and disaster recovery services.

ManTech International

ManTech International

ManTech provides comprehensive, integrated cyber security support, which includes computer and network design, implementation, and operations.

National Intelligence Service (NIS) South Korea

National Intelligence Service (NIS) South Korea

The NIS oversees policy on cyber security in South Korea by formulating and coordinating the execution of such policy and devising necessary schemes and guidelines.

CyberTrap

CyberTrap

CyberTrap is an advanced highly-interactive deception technology allowing real-time analysis and control of security breaches.

Senseon

Senseon

Senseon’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

Cyber Academy

Cyber Academy

Cyber Academy is one of the first institutions in the SE Europe region that provides a hands-on program in cyber security, blockchain and AI.

Combis

Combis

COMBIS is a regional high-tech ICT company focused on the development of application, communication, security and system solutions and the provision of services.

Stairwell

Stairwell

Stairwell is building a new approach to cybersecurity around a vision that all security teams should be able to determine what’s good, what’s bad, and why.

Enzoic

Enzoic

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection.

Canadian Technology Accelerator (CTA)

Canadian Technology Accelerator (CTA)

The Canadian Technology Accelerator helps Canadian companies with an existing technology, product or service explore opportunities in foreign markets. Program areas include Cybersecurity.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.