Crypto Quantique

Crypto Quantique

Crypto Quantique are building the most secure end-to-end IoT security platform. Our quantum driven cybersecurity solution enables vertically integrated, highly secure IoT deployments based on unforgeable hardware trust anchors generated by the device.

Crypto Quantique is a deep technology company that has developed a transformational cybersecurity technology, using the most advanced techniques in cryptography and quantum physics, designed to ensure that device security becomes foundational and end-to-end IoT security becomes standard practice.

Our ground-breaking technology radically simplifies the process of generating a hardware root of trust in an IoT device, solves the issue of secure onboarding an IoT device in an untrusted environment and plugs the gaping device security hole that currently exists in the IoT ecosystem.

Contact Information

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Need to Evolve to a Risk-Based Vulnerability Management Strategy but Don’t Know How? This Guide Will Show You.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Australian Strategic Policy Institute (ASPI)

Australian Strategic Policy Institute (ASPI)

ASPI's International Cyber Policy Centre (ICPC) focuses on the growing importance of cyber-related issues for broader strategic policy.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

ISMG Summits are must-attend events for any executive tasked with protecting an organization from today's evolving information security threats.

ARM

ARM

ARM provides a range of IP and software technologies to enable secure solutions using ARM Cortex processors. Applications include IoT devices.

Freshfields

Freshfields

Freshfields are a global law firm. Practice areas include Data Protection and Privacy

Socama Group

Socama Group

Socama Group is an innovative firm providing high-value electronic payment and security solutions for enterprises and individuals.

Terbium Labs

Terbium Labs

By offering continuous, proactive monitoring of critical data and rapid breach detection, we enable companies to better manage risk and keep high-value data safe.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

Adeya

Adeya

Adeya is a leading provider of secure, end-to-end encrypted calls, instant messaging, and collaboration tools.