DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

As a pioneer in this challenging  field, we have worked with the industry’s leading vendors, data recovery experts and certification organizations to develop products and processes for every scenario. The ability to offer the entire gamut of solutions is why our customers view us as a partner rather than a vendor.

Our certified data erasure solutions are compatible with all platforms and protocols, handling loose drives, storage enclosures and in-system storage media, to assure compliance with NIST 800-88, DoD 5220.22M and other key standards or guidelines.

Contact Information

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Sapphire

Sapphire

Sapphire provides solutions designed to protect your infrastructure, assets, data and users against current and emerging threats. We are founders of the National Information Security Conference (NISC)

European Internet Forum (EIF)

European Internet Forum (EIF)

EIF’s mission is to help provide European political leadership for the political, economic and social challenges of the worldwide digital transformation.

mnemonic

mnemonic

mnemonic helps businesses manage their security risks, protect their data and defend against cyber threats.

ARC Advisory Group

ARC Advisory Group

ARC is a leading technology research and advisory firm with expertise in both information technologies (IT) and operational technologies (OT)

techUK

techUK

techUK represents companies operating in the tech sector in the UK. Focus areas cover all aspects of ICT including cyber security.

Somansa

Somansa

Somansa is a global leader in Data Security and Compliance solutions designed to protect valuable company information from leakage and help meet regulatory compliance requirements.

MINSEG-CSIRT

MINSEG-CSIRT

MINSEG-CSIRT is the Computer Security Incident Response Team of the Argentine Ministry of Security.

The ai Corporation

The ai Corporation

The ai Enterprise Fraud Solution is an on-prem or cloud-based self-service, machine learning fraud detection and prevention tool set.

SBD Automotive

SBD Automotive

SBD Automotive are specialists in automotive technology providing independent research and consultancy to help create smarter, more secure, better connected, and increasingly autonomous cars.

MSPAlliance

MSPAlliance

MSPAlliance is the world’s largest industry association and certification body for cloud computing and managed service professionals.

Cyber Defense by Q

Cyber Defense by Q

Cyber Defense by Q provides specialist consulting services in the areas of Information Security, Technical Security, Security Information and Event Management (SIEM), and Cloud Security.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

Airnow Cybersecurity

Airnow Cybersecurity

Airnow Cybersecurity provide digital cybersecurity services and solutions for organizations and app publishers.

In Fidem

In Fidem

In Fidem specializes in information security management, with a bold approach that views cybersecurity as a springboard to organizational transformation rather than a barrier to innovation.

Curity

Curity

The Curity Identity Server brings identity and API security together, enabling highly scalable and secure user access to digital services.