Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA is the executive IT arm of the Ministry of Communications and Information Technology.

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector locally and globally.

We are primarily concerned with building the capacities of the local IT companies, attracting and servicing multi-national IT companies, and growing a qualified, sustainable, and deployable talent pool.

ITIDA plays a fundamental role as a one-stop-shop for foreign direct investors seeking to enhance their global offering using what Egypt has to offer and the competitive advantages of the country.

Contact Information

Categories:
Industry Associations

Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyberis

Cyberis

Cyberis is an independent information security consultancy delivering coherent security, risk management and assurance through a unified range of innovative services and solutions.

International Cyber Security Protection Alliance (ICSPA)

International Cyber Security Protection Alliance (ICSPA)

The International Cyber Security Protection Alliance is a not-for-profit org supporting law enforcement units globally in their fight against cybercrime.

CloudHesive

CloudHesive

CloudHesive provides cloud solutions through consulting and managed services with a focus on security, reliability, availability and scalability.

Cryptus Cyber Security

Cryptus Cyber Security

Cryptus Cyber Security is an Information Security Training company providing advanced training and services to IT Professionals.

SecBI

SecBI

SecBI provides an advanced threat detection system that uncovers the full scope of cyber attacks, including all affected users, domains, assets, and more.

Altitude Networks

Altitude Networks

Altitude Networks is at the forefront of enterprise cloud security and data loss protection, protecting your company’s data against unauthorized access, accidental or malicious sharing, and theft.

Capy

Capy

Capy's SaaS-based security solutions will protect your website from bots, spam, humans and more.

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

SecondWrite

SecondWrite

SecondWrite’s next-generation malware detection engine delivers a combination of automatic deep code inspection and accurate scoring of zero-day malware.