Dermalog Identification Systems

Dermalog Identification Systems

Dermalog Identification Systems is a pioneer in biometry and the largest German manufacturer of biometric devices and systems.

We develop solutions for access and data security or authorization and authentication services as well as mobile security. Governmental organizations, public and private businesses all over the world trust Dermalog’s expertise and state of the art biometric products.

A team of scientists is constantly developing our 'Automated Biometric Identification Systems' (ABIS) and 'Automated Fingerprint Identification Systems' (AFIS), including cutting-edge fingerprint scanning devices. The product portfolio is complemented by biometric Border Control systems and biometric ID Cards and passports as well as biometric voting systems.

Contact Information

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Ascentor

Ascentor

Ascentor helps organisations stay safe through information risk management. Our customers rely on our pragmatic and business focused approach to cyber security and information assurance challenges.

Amazon Web Services (AWS)

Amazon Web Services (AWS)

AWS offers cloud web hosting solutions that provide clients with a flexible, highly scalable, and secure way to deliver their websites and web applications.

ServiceNow

ServiceNow

ServiceNow is the enterprise IT cloud company. We transform IT by automating and managing IT service relationships across the global enterprise.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

CybelAngel

CybelAngel

CybelAngel is a leading digital risk protection platform that detects and resolves external threats before these wreak havoc.

Beazley

Beazley

Beazley are a specialist insurer with three decades of experience in providing clients with the highest standards of underwriting and claims service worldwide.

CYRISMA

CYRISMA

CYRISMA is a revolutionary cybersecurity platform that helps organizations manage risk without the usual headaches associated with enterprise cybersecurity tools.

Phy-Cy.X Security Group

Phy-Cy.X Security Group

Phy-Cy.X specialize in the “Physics” of Information Security through both physical and cyber domains. We are not an IT company, we ARE an Information Security company.

Gula Tech Adventures

Gula Tech Adventures

Gula Tech Adventures invests in companies and nonprofits that help close the gap in needed technology and workforce to defend the country in cyberspace.

KeyData Associates

KeyData Associates

KeyData is a recognized leader in cybersecurity services specializing in Identity and Access Management (IAM), Customer Identity & Access Management (CIAM) and Privileged Access Management (PAM).

NordLayer

NordLayer

NordLayer is a dynamic secure network access solution tailored to evolving business needs. Your team members can safely access company resources from anywhere, while keeping your network safe.