Deep Secure

Deep Secure

Deep Secure is a specialist cyber security product provider, offering high security for those that care about valuable data and are looking for a better approach

Deep Secure’s pioneering Content Threat Removal platform delivers total protection of high value data for your business. It works by extracting the useful business information from the data and re-constructing new, clean data to carry the information to its destination; our content transformation protects, without the need for detection.

Our Content Threat Removal capability will revolutionise cyber security in a paradigm shift that obviates the need to even detect a sophisticated attack. Our Ring Architecture allows us to deliver this without complicating administration or exposing it to the threat.

Contact Information

Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

WEBINAR: How to build an effective Cloud Threat Intelligence program in the AWS Cloud

WEBINAR: How to build an effective Cloud Threat Intelligence program in the AWS Cloud

Thursday, Jan 28, 2021 - Join this webinar to learn how to improve your Cloud Threat Intelligence (CTI) program by gathering critical cloud-specific event data in the AWS Cloud.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Council of European Professional Informatics Societies (CEPIS)

Council of European Professional Informatics Societies (CEPIS)

CEPIS is the representative body of national informatics associations throughout Europe and represent over 450,000 ICT and informatics professionals in 32 countries.

Web Security News

Web Security News

Web Security News is a digest of important security announcements and events about web application security techniques and strategies.

ElevenPaths

ElevenPaths

ElevenPaths offer a portfolio of comprehensive cybersecurity solutions including IoT security, Identity & Access, Mobile Security, Antifraud, Industrial Cybersecurity, Risk & Security management

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

Cosan

Cosan

Cosan is a cybersec solutions & services provider that assists organisations to identify vulnerabilities, protect sensitive data and remain compliant.

Sense of Security

Sense of Security

Sense of Security is a specialist IT security and risk management consulting practice delivering industry leading services and research to our clientele throughout Australia and abroad.

TROOPERS

TROOPERS

TROOPERS InfoSec event consists of two days of high-end training, followed by a two-day, three-track conference, culminating in Roundtables on the final day.

Maine Cyber Range (MCR)

Maine Cyber Range (MCR)

The Maine Cyber Range is a training and simulation center for professionals and students, providing realistic and cutting-edge techniques for defending against malicious cyber-attacks.