Device Authority

Device Authority

Device Authority specialises in security automation for the Internet of Things (IoT).

The KeyScaler Platform has been designed from the ground up to deliver rapid security automation and active security posture enforcement to address the new security challenges of IoT. KeyScaler allows customers to securely register, provision and update their devices through active, policy-based security controls which are designed to protect IoT applications and services.

Contact Information

Perimeter 81

Directory of Suppliers

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Omerta IT

Omerta IT

Omerta IT help you protect your organisation by helping ensure you have the best IT Security professionals working for you.

Tinfoil Security

Tinfoil Security

Tinfoil is a simple, developer friendly service that lets you scan your website for vulnerabilities and fix them quickly and easily.

AVR

AVR

AVR educate, advise, analyse and provide professional, technical consultancy and support to ensure your business is safe, compliant and protected.

Systancia

Systancia

Systancia offer solutions for the virtualization of applications and VDI, external access security, Privileged Access Management (PAM), Single Sign-On (SSO) and Identity and Access Management (IAM).

Acorus Networks

Acorus Networks

Acorus Networks provides a Cloud infrastructure service to protect against increasingly sophisticated denial of service attacks.

National Information & Communication Security Taskforce (NICST)

National Information & Communication Security Taskforce (NICST)

National Information & Communication Security Taskforce (NICST) is responsible for coordination and policy making of information and communication security in Taiwan.

Fudo Security

Fudo Security

Fudo Security is a leading provider of privileged access management and privileged session monitoring solutions.

Borsetta

Borsetta

Borsetta creates end-to-end intelligent computing solutions for edge devices by combining the highest levels of hardware security, compute density, and neural network efficiency.