Governikus

Governikus

Founded in 1999 as bremen online services, Governikus KG began by developing solutions for secure and legally binding online transactions based on the Online Services Computer Interface (OSCI) standard for public administration.

The breakthrough for the company came in 2001 with the security middleware Governikus, the first standardized application to implement OSCI. Governikus is evaluated according to Common Criteria EAL 3+ and SigG-certified.

Among other things, the portfolio now includes solutions for secure data transport, authentication with the ID card or electronic residence permit, the use of electronic signatures and cryptography as well as for long-term storage in accordance with TR-ESOR (03125).

Governikus is one of five applications of the IT Planning Council and is constantly evolving according to current legislation.

Contact Information

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Nextgov

Nextgov

Nextgov is an information resource for federal technology decision makers. Topic areas include cybersecurity.

CYBERPOL

CYBERPOL

CYBERPOL's mission is to facilitate the widest possible mutual assistance between all cyber crime law enforcement authorities to help mitigate global cyber threats.

BeOne Development

BeOne Development

BeOne Development provide innovative training and learning solutions for information security and compliance.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

Ahope

Ahope

Ahope is a mobile security solution provider in Korea with a long history of security solution development.

AnubisNetworks

AnubisNetworks

AnubisNetworks is one of Europe’s leading threat intelligence and email security suppliers.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

Stay Smart Online

Stay Smart Online

Stay Smart Online provides topical, relevant and timely information on how home internet users and small businesses can protect themselves from, and reduce the risk of, cyber security threats.