Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. We specialize in ERP business management systems, information security, CRM and sales support systems, electronic communications, network infrastructure management, IoT solutions, data analytics, and business intelligence.

Cyber security solutions are focused on Identity Management and Security Assessment Services.

Comarch Identity Management solutions include tPro (data transfer protection), SecureAccess (privileged user management) and IAM DRACO (application access management).

Comarch IoT Security Solution provides a proven solution for identity and access management of connected devices.

Comarch Cyber Security Professional Services offer wide range of auditing services, such as: penetration testing, security architecture analysis, security policy and procedure monitoring.

Contact Information

Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Forensic Control

Forensic Control

Forensic Control is an insider threat and risk management firm specialising in computer forensics and behavioural psychology.

CERT-UG/CC

CERT-UG/CC

CERT-UG/CC is the national Computer Emergency Response Team for Uganda, operating under the National Information Technology Authority (NITA-U)

Executive Women's Forum (EWF)

Executive Women's Forum (EWF)

The Executive Women's Forum is the largest member organization serving emerging leaders and influential female executives in the Information Security, Risk Management and Privacy industries.

Popcorn Training

Popcorn Training

Popcorn Training, a KnowBe4 company, creates security awareness training that is entertaining, effective and most importantly memorable.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

National Information & Communication Security Taskforce (NICST)

National Information & Communication Security Taskforce (NICST)

National Information & Communication Security Taskforce (NICST) is responsible for coordination and policy making of information and communication security in Taiwan.

Canadian Technology Accelerator (CTA)

Canadian Technology Accelerator (CTA)

The Canadian Technology Accelerator helps Canadian companies with an existing technology, product or service explore opportunities in foreign markets. Program areas include Cybersecurity.