Cranfield University

Cranfield University

As a specialist postgraduate university, Cranfield’s world-class expertise, large-scale facilities and unrivalled industry partnerships are creating leaders in technology and management globally.

Cranfield Defence and Security’s staff and secure facilities are at the forefront of their fields, offering diverse capabilities across defence and security science, engineering and technology. These range from cyber security and digital warfare to robotics, forensic sciences and simulation and analytics.

We are a postgraduate academic provider to the UK’s Ministry of Defence while we also provide specialist knowledge to global industry, security and emergency services, military, governments and NGOs. It means Cranfield Defence and Security is underpinning defence and security sector development and reform around the world.

Contact Information

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ANIS

ANIS

ANIS represents the interests of Romanian IT companies and supports the development of the software and services industry.

ngCERT

ngCERT

ngCERT is the National Computer Emergency Response Team for Nigeria.

Aptible

Aptible

Security Management and Compliance for Developers. Aptible helps teams pass information security audits and deploy audit-ready apps and databases.

Simility

Simility

Simility's multi-layered fraud detection solution uses superior machine learning & device intelligence technology to safeguard your online businesses.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

Workz Group

Workz Group

Workz connects and protects mobile subscribers of today and tomorrow by providing secure removable or embedded SIMs and remote provisioning solutions for consumer, M2M and IOT devices.

Bl4ckswan

Bl4ckswan

Bl4ckswan is a Management Consulting firm specialized in the delivery of information security and compliance services.

CyberSwarm

CyberSwarm

CyberSwarm is developing a neuromorphic System-on-a-Chip dedicated to cybersecurity which helps organizations secure communication between connected devices and protect critical business assets.

Datacentrix

Datacentrix

Datacentrix provides end-to-end cybersecurity services for the operational technology (OT) and IT environments to monitor, assess and defend our customers' information assets.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

Allied Telesis

Allied Telesis

Allied Telesis delivers the secure, flexible, and agile solutions needed to meet the expectations of any industry’s critical mission.

CloudCover

CloudCover

CloudCover is a software-defined cybersecurity risk solution that provides risk awareness, risk analytics, and data security in real time.

MyCISO

MyCISO

MyCISO is the World’s first SaaS application that will vastly simplify security management for all.

A76

A76

A76 offers a range of highly specialized services to protect your business.

Aquia

Aquia

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges.

coc00n

coc00n

coc00n secures the devices of high-value and high-interest individuals against cyber attacks.