Fischer Identity

Fischer Identity

Fischer Identity simplifies, accelerates, and automates the complex task of managing identities for on- and off-premise resources with no limits to scalability or reach. The solution’s flexibility enables organizations to drive their identity management solutions – not vice versa.

Our interoperability platform enables rapid deployment of full suite IAM whether on premise, cloud, private cloud or hybrid solution. We eliminated programming and customizations to drastically reduce the time and skill needed to administer and extend the solution, plus provide no-cost upgrades. Fischer Identity is the Last IAM Solution You’ll Ever Need.

Contact Information

Directory of Suppliers

Tenable Network Security

Tenable Network Security

Tenable Network Security - Need to Evolve to a Risk-Based Vulnerability Management Strategy but Don’t Know How? This Guide Will Show You.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Georgia Tech Research Institute (GTRI)

Georgia Tech Research Institute (GTRI)

GTRI's Cybersecurity, Information Protection, and Hardware Evaluation Research Laboratory (CIPHER Lab) is a leader in developing the technologies that secure, defend, and respond to cyber threats.

ECESM

ECESM

The ECESM project has been designed to enhance overall cyber security posture of Montenegro by accelerating the availability of educational and training resources.

Center for Cyber Safety and Education

Center for Cyber Safety and Education

The Center for Cyber Safety and Education works to ensure that people across the globe have a positive and safe experience online through our educational programs, scholarships, and research.

Advanced Technology Business Services (ATBS)

Advanced Technology Business Services (ATBS)

Advanced Technology Business Services offers smart Cyber-security and IT solutions and professional services for all sectors in Saudi Arabia.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

Invensity

Invensity

INVENSITY is an interdisciplinary technology and innovation consulting company. Centres of excellence include Cyber Security and Data Privacy.

Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC)

Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC)

C-MRiC collaborates on initiatives, ranging from national cyber security, enterprise security, information assurance, protection strategy, climate control to health and life sciences.

The Hive

The Hive

The Hive is a fund and co-creation studio that collaborates with entrepreneurs and corporations to create and launch AI based startups.

SyncDog

SyncDog

SyncDog is a leader in enterprise security and the preeminent vendor for containerized mobile application security across cloud & on-premise computing environments.