VIBE Cybersecurity International

VIBE Cybersecurity International

VIBE’s certificate-less authenticated encryption enables scalable, flexible key exchange, and other advanced cryptographic functions using identity-based elliptic curve cryptosystems (ECC). VIBE is perfectly suited to secure the Internet of Things (IoTs), the blockchain, other fintech systems, email, and virtually every other connected solution that is in need of ironclad security. By design, VIBE eliminates the need for costly, cumbersome PKI.

VIBE is not a solution. It is a cryptographic ingredient that can be embedded in your connected products, services and solutions, with applicability in virtually every industry.

Contact Information

Directory of Suppliers

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Need to Evolve to a Risk-Based Vulnerability Management Strategy but Don’t Know How? This Guide Will Show You.

DigitalCrazyTown

DigitalCrazyTown

Technology, policy and business analysis covering the media, Internet, broadband, mobile and smart grid and cybersecurity arenas.

Eden Legal

Eden Legal

Eden Legal provides legal services on commercial and regulatory issues affecting digital businesses.

Romanian Asociation for Critical Infrastructures and Services Protection (ARPIC)

Romanian Asociation for Critical Infrastructures and Services Protection (ARPIC)

ARPIC brings together specialists and expertise in Romania for the protection of critical infrastructures including ICT networks and cybersecurity.

Giesecke & Devrient (G&D)

Giesecke & Devrient (G&D)

G&D develops, produces, and markets products and solutions for payment, secure communication, and identity management.

Credocom

Credocom

At Credocom, we possess deep competencies in the areas of network, security and data centers.

EY Advisory

EY Advisory

EY is a multinational professional services firm headquartered in the UK. EY Advisory service areas include Cybersecurity.

United Security Providers

United Security Providers

United Security Providers is a leading specialist in information security, protecting IT infrastructures and applications for companies with high demands on security.

Virtru

Virtru

Virtru's Data Protection platform protects and controls sensitive information regardless of where it's been created, stored or shared.

HumanFirewall

HumanFirewall

Your secuirty is dorectly proportional to the awareness of your employees. Use Phishing simulation across your organization to train & profile user behavior.

FirstPoint Mobile Guard

FirstPoint Mobile Guard

FirstPoint Mobile Guard has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.