Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle.

Powerful yet easy to use, BCWipe and BestCrypt are engineered for a wide range of users: from experts at large organizations to people at home.

To protect sensitive data throughout the lifecycle, Jetico's portfolio includes:
- Painless Encryption with BestCrypt to disguise the data you need to keep
'- Forensically Clean' Wiping with BCWipe to securely erase selected files or entire hard drives

Enterprise Editions of BestCrypt and BCWipe include Jetico Central Manager to empower Administrators with control of client software on remote computers.

Contact Information

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Ascentor

Ascentor

Ascentor helps organisations stay safe through information risk management. Our customers rely on our pragmatic and business focused approach to cyber security and information assurance challenges.

Conference-Service.com

Conference-Service.com

Conference-Service.com provides a categorised calendar of conferences and events which includes Information Security.

Infocyte

Infocyte

Infocyte's unique, agentless threat hunting platform for Windows and Linux is designed to rapidly assess network endpoints for evidence of compromise.

Malta Information Technology Agency (MITA)

Malta Information Technology Agency (MITA)

MITA is the central driver of Government Information and Communications Technology (ICT) policy, programmes and initiatives in Malta.

BlueVoyant

BlueVoyant

BlueVoyant helps organizations to meet increasingly sophisticated cyber attack techniques head-on with real-time threat intelligence and managed security services.

National Cybersecurity Hub South Africa

National Cybersecurity Hub South Africa

The mission of the National Cybersecurity Hub is to be the central point of collaboration for cybersecurity incidents in South Africa.

Council for Information & Communication Technologies (CTIC)

Council for Information & Communication Technologies (CTIC)

CTIC was set up to address specific issues in the field of ICT relevant to the implementation of electronic government.

Buglab

Buglab

The Buglab contest and Vigilante Protocol help companies all over the world to discover and fix vulnerabilities on their digital solutions or assets.

SCADASUDO

SCADASUDO

SCADASUDO is a cyber solution architecture and design office, established by leading experts in the field of OT (Industrial control) and IT (information Technology).

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Broadcom

Broadcom

Broadcom is a global technology leader that designs, develops and supplies a broad range of semiconductor and infrastructure software solutions.

SoloKeys

SoloKeys

SoloKeys provides the first open-source FIDO2 security key: Protect your online accounts against unauthorized access by using the most secure login method.

Kintent

Kintent

With Kintent, compliance becomes a habit, is simple to understand and achieve, and is continuously testable so that your customers can see that you are adhering to all your trust obligations.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

Cynomi

Cynomi

Cynomi is a leading strategic cybersecurity operations platform that automates cybersecurity knowledge and expertise to empower teams with little to no in-house expertise.

Digital Silence

Digital Silence

Digital Silence is a world-class provider of information security research and consulting services.