Cytenna

Cytenna

Cytenna employs natural language processing and other AI techniques to extract, integrate, and analyze information collected from the Web. We continuously harvest data from numerous sources that publish vulnerabilities and related cybersecurity issues.

Signal is a suite of SaaS (Software-as-a-Service) products that use AI and machine learning to automatically aggregate the latest information about software vulnerabilities. As experienced security analysts know, it can be challenging to do this because of the large number of sources reporting data and because of the variety of formats involved. Signal automates this tedious task and allows your team to instead focus on addressing the issues.

Originally conceived in the research laboratories of InferLink Corporation, we are constantly innovating to provide our clients with better ways to connect the dots in an ever-rising sea of information.

Contact Information

Categories:
Software Security

Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

WEBINAR: How to build an effective Cloud Threat Intelligence program in the AWS Cloud

WEBINAR: How to build an effective Cloud Threat Intelligence program in the AWS Cloud

Thursday, Jan 28, 2021 - Join this webinar to learn how to improve your Cloud Threat Intelligence (CTI) program by gathering critical cloud-specific event data in the AWS Cloud.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Accellion

Accellion

Accellion provides enterprise mobile file sharing solutions that enable anytime, anywhere access to information while ensuring security and compliance.

ISO Quality Services Ltd

ISO Quality Services Ltd

ISO Quality Services is an independent organisation that specialises in the implementation, certification and continued auditing of ISO and BS EN Management Standards including ISO 27001..

Global Velocity

Global Velocity

Global Velocity’s Securio platform is a powerful Information-Centric Security solution to monitor and manage sensitive data in the cloud & enterprise.

Sparta Consulting

Sparta Consulting

Sparta Consulting is an information management and business development full service provider.

Woz U

Woz U

Woz U provides best-in-class technology training for Learners, Higher-Ed and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber Security.

NESECO

NESECO

NESECO is an IT security integration and consulting firm.

BlueFiles

BlueFiles

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing.

SEKOIA

SEKOIA

We are SEKOIA, we give ourselves carte blanche to rethink cybersecurity, to make it ever more relevant, effective and accessible.