HudsonAnalytix - Cyber

HudsonAnalytix - Cyber

HudsonAnalytix provides leading global risk management services supporting government and commercial companies in understanding, managing and mitigating their enterprise cyber risk.

From assessments and training solutions, to the design and implementation of practical, sustainable cyber risk management solutions and technologies, we support clients spanning the global maritime transportation industry, which includes ports, vessel owner/operators, oil/gas companies (both national and commercial), flag states, insurance companies, and national and regional government bodies. Building on 30 years of global maritime risk management expertise, HA-Cyber resides at the forefront of managing cyber risk for our maritime clients by identifying and implementing innovative approaches and relevant technologies that deliver tangible, cost-effective and sustainable results.

Contact Information

Categories:
Consulting Services

Directory of Suppliers

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Need to Evolve to a Risk-Based Vulnerability Management Strategy but Don’t Know How? This Guide Will Show You.

F-Secure

F-Secure

F-Secure defends enterprises and consumers against everything from opportunistic ransomware infections to advanced cyber attacks.

JSCAPE

JSCAPE

JSCAPE is a provider of managed file transfer, and secure FTP server software providing safe, seamless and reliable systems for data delivery worldwide.

Ayehu Software Technologies

Ayehu Software Technologies

Ayehu provides IT Process Automation & Orchestration solutions for IT and Security professionals.to identify and resolve critical incidents.

IDnow

IDnow

IDnow is the world’s fastest, most flexible and most secure identity verification platform, delivering instant verification of the identity documents used by 7 billion people.

Advanced Technology Business Services (ATBS)

Advanced Technology Business Services (ATBS)

Advanced Technology Business Services offers smart Cyber-security and IT solutions and professional services for all sectors in Saudi Arabia.

Provise Consulting

Provise Consulting

ProVise is an independent, product agnostic, research-driven advisory firm specializing in GRC and Cyber Security professional services.

Dell Technologies

Dell Technologies

Dell Technologies Consulting Services enables a highly resilient business amidst the proliferation of cloud-based IT services and constant threats to your most critical information.

th4ts3cur1ty.company

th4ts3cur1ty.company

th4ts3cur1ty.company specialize in delivering intelligence lead adversary emulation purple teaming & the bespoke building of Security Operation Centers.