L7 Defense

L7 Defense

L7 Defense have developed an AI platform to protect web systems from application-layer DDoS attacks.

L7's Ammune platform is an always-on virtual shield adapting itself automatically to application changes while protecting continuously from unseen application DDoS threats

Contact Information

Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database (EDB) is an ultimate archive of exploits and vulnerable software. A great resource for penetration testers and vulnerability researchers.

AdNovum Informatik

AdNovum Informatik

AdNovum Informatik provides a full set of IT services, ranging from consulting, the conception and implementation of customized business and security solutions to maintenance and support.

Online Business Systems

Online Business Systems

Online Business Systems is an information technology and business consultancy. We design improved business processes enabled with robust and secure information systems.

Inspirria Cloudtech

Inspirria Cloudtech

Inspirria Cloudtech is a specialized Cloud Technologies Services provider and Cloud Aggregator focused on executing cloud models for clients.

Expanse

Expanse

Expanse SaaS-delivered products plus service expertise reduce your internet edge risk to prevent breaches and successful attacks.

Sphonic

Sphonic

Sphonic provides regulated institutions of any size a powerful compliance & risk platform to quickly and securely onboard new customers and manage ongoing AML and Fraud & Risk trends.

Digital Law

Digital Law

Digital Law is the only UK law firm to specialise solely in online, data and cyber law.

Wynyard Group

Wynyard Group

Wynyard Group is a leader in high consequence Crime Fighting and Security Software, used by Law Enforcement and National Security Agencies, Critical Infrastructure Operations and major Corporations.

Women4Cyber

Women4Cyber

Women4Cyber is a non-profit European private foundation, with the objective to promote, encourage and support the participation of women in the field of cybersecurity.

Spectrami

Spectrami

SPECTRAMI is a global value-added distributor offering comprehensive solutions in the realm of information security, data center infrastructure and data communication networks across EMEA.

CyFrica

CyFrica

CyFrica conference gathers IT and cyber security leaders from across the African sub-continent with a focus on ‘creating a cyber safe Africa’.