Finland

Search within these results:
Add a Listing Here

Results

Aves Netsec

Aves is a deceptive security system for enterprises who want to capture, observe and mitigate bad actors in their internal network.

Helsinki Finland

BaseN

BaseN is a full stack IoT Operator. We control the full value chain in order to provide ultimate scalability, fault tolerance and security to our customers.

Helsinki Finland

Bittium

Bittium provides proven information security solutions for mobile devices and portable computers.

Oulu Finland

Comiq

Comiq provide software quality assurance, testing and project management services. Areas of expertise include cybersecurity.

Helsinki Finland

Connax

Connax's mission is to give simple and secure device integration with various IoT platforms, their applications and services.

Helsinki Finland

CySec Ice Wall

CySec Network Data Vault records a full audit trail of all network traffic to enable root cause analysis and forensic investigation.

Tampere Finland

D-Fence

D-Fence high availability security service protects corporate email communication, the company and it's employee's against cyber threats.

Helsinki Finland

Deductive Labs

Deductive Labs consulting services help customers with their technology, security and automation challenges.

Mariehamn Finland

Deltagon

Deltagon develops information security solutions to protect companies’ confidential information in e-communication and e-services.

Helsinki Finland

Efecte

Efecte is a Nordic SaaS company specialized in IT Service Management, Self-Service, Identity Management and Access Governance solutions.

Espoo Finland

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Don't rely only on CVSS to prioritize. Use machine learning to predict what is most likely to be exploited.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Thursday, August 20, 2020 - Join SANS and AWS Marketplace to learn the exercise of applying MITRE’s ATT&CK Matrix to the AWS Cloud and how to enhance threat detection and hunting in an AWS environment

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 4,000+ specialist service providers.

Qolcom

Qolcom

Qolcom is a leading UK based integrator of secure wireless network and mobile device management solutions.

Zenedge

Zenedge

Zenedge offers total security for Web applications and networks, identifying threat actors and stopping malicious traffic from reaching your servers.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

New Context

New Context

New Context provides consulting services and build tools that help customers prepare for security orchestration, building critical infrastructure that works with emerging tech.

BlueKrypt

BlueKrypt

BlueKrypt is a consulting firm for the security of IT systems and their management.

Kognos

Kognos

Kognos provides the world's first automated investigation and threat story building platform.

Cryptoloc

Cryptoloc

Cryptoloc's core business is developing solutions designed to protect businesses from all kinds of security threats using a unique patented cryptography.

Raqmiyat

Raqmiyat

Raqmiyat provides end-to-end IT Services and business solutions including consultancy, digital transformation, infrastructure and cybersecurity.