Cyberlytic

Cyberlytic

Commissioned in 2013 by GCHQ and the UK Ministry of Defence, Cyberlytic applied artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data. The company developed a unique risk-based approach and owns patents that relate to detection through real-time risk assessment and prioritisation of cyber-attacks.

Cyberlytic works closely with the Centre for Secure IT (CSIT), part of Queen's University Belfast and is recognised as a GCHQ Cyber Academic Centre of Excellence.

Contact Information

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Don't rely only on CVSS to prioritize. Use machine learning to predict what is most likely to be exploited.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Internet Crime Complaint Center (IC3)

Internet Crime Complaint Center (IC3)

IC3 provides the public with a reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity.

Security for Cloud Computing Guide

Security for Cloud Computing Guide

The aim of this guide is to help enterprise IT and business decision makers analyze the security implications of cloud computing on their business.

CERTuy

CERTuy

CERTuy is the national Computer Emergency Response Team for Uruguay.

International Telecommunication Union (ITU)

International Telecommunication Union (ITU)

ITU is the United Nations specialized agency for information and communication technologies – ICTs. Areas of activity include cybersecurity.

AppViewX

AppViewX

AppViewX is a global leader in the management, automation and orchestration of network services in data centers.

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU-ARCC acts as ITU’s cybersecurity hub in the Arab Region localizing and coordinating cybersecurity initiatives.

Wipe-Global

Wipe-Global

Wipe-Global is specialized in data erasure with an international established service partner network.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.