itWatch

itWatch

itWatch is focused on data loss prevention (DLP), endpoint security, mobile security, encryption, cost-reducing and easy-to-use security solutions for IT operations.

With the patented itWatch security solutions your data is easily and reliably protected against theft and unauthorized access. Compliance, Security Awareness in real time and efficient tools for system management all come from a single source with central management.

Contact Information

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

New Horizons CLC

New Horizons CLC

New Horizons offers training and certifications in areas, including Cybersecurity, Applications, Cloud Computing, Networking, Project & IT Service Management.

RAND Corporation

RAND Corporation

The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. Topic areas include cyber security.

Covenco

Covenco

Covenco specialises in delivering data recovery and business continuity solutions and services.

KZ-CERT

KZ-CERT

KZ-CERT is the national Computer Emergency Response Team for Kazakhstan.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

Global Health Care Anti-Fraud Network (GHCAN)

Global Health Care Anti-Fraud Network (GHCAN)

The mission of GHCAN is to promote partnerships and communications between international organizations in order to reduce and eliminate health care fraud around the world.

Soffid

Soffid

Soffid provides full Single-Sign-On experience and full Identity and Access Management features by policy-based centralised orchestration of user identities.

Cider Security

Cider Security

Cider Security - It’s time to revolutionize the way Security, Dev and DevOps teams work together to supercharge security at the speed of engineering.