Home » Providers

Providers

CTRL + click for multiple selections and unselections
CTRL + click for multiple selections and unselections
CTRL + click for multiple selections and unselections

Davos Networks

Davos Networks is a Swiss based start-up company offering comprehensive cyber security solutions. We provide Suisse Bounty, a cutting edge crowdsourced security platform that utilizes augmented intelligence to discover and secure vulnerable applications.

Cybersecurity Awareness - Ethical Hacking - Ethical Phishing - Cybersecurity Consulting - Hacking Alarm - Cybersecurity Starter Kits

Sectricity provides high-impact cybersecurity services by ethical hackers. Since 2017, we have been a reliable partner for numerous companies. Our clients come from all possible sectors. Most of them are local companies, with or without foreign branches.

As an independent party, we train the cybersecurity skills of your staff and offer cybersecurity services to efficiently repel hackers.

Linux Application Firewall

A Linux Application Firewall (LAF) is a personal host-based firewall for everyday desktop Linux users. It will allow users to block or allow, specific programs from accessing the network.

e.g. The calculator application should not be allowed access to the network. However, you might want to allow it access once to get the latest currency exchange rates.

The project’s primary outcome is the development and release of a usable application firewall for use by the community.

Red Alert Labs

Red Alert Labs is an IoT security provider helping organizations trust IoT solutions. We created automated security by design & certification tools and services and an independent security lab with a disruptive business offer to solve the technical and commercial challenges in IoT.

Our framework covers the whole IoT solution from Chip to Cloud, is business context driven and offers a proper security dimensioning with respect to the customer's maturity.

ECSEC GMBH

ecsec GmbH

GuardYoo

GuardYoo is an online Platform delivering fully automated Compromise Assessment audits with Forensic Analysis.

You can check out a video here that gives a good overview: www.guardyoo.com

GuardYoo uses context to identify any anomalies that occur within a network, which means it identifies if something has slipped past existing security solutions and is hiding without the knowledge of the client.

Suite5 Data Intelligence Solutions Limited

Suite5 is an Information Technology Solutions and Services SME with the mission to deliver innovative data-driven intelligence solutions through state-of-the art technologies. Combining strong technology know-how and hands-on approach in managing and implementing projects commissioned by the public and the private sector, Suite5 provides research-inspired solutions and practical support for its clients.

Sacumen

Sacumen specializes in working with Security Product Companies. We are working with 50+ Security Product Companies such as Symantec, Palo Alto Networks, Varonis, AlienVault, IBM, CA Technologies, ThreatConnect, SecurityScorecard, ForgeRock, Code42, BigID, Flashpoint etc in the areas of Connector Development, Connector Support, and Product Engineering. 

Pages

News

The Tech.eu Summit gathered over a thousand tech enthousiasts to Brussels, Belgium, on 17 May 2022. GEIGER was present at the expo hall, introducing the solution to the visitors at its booth, and giving them a sneak peak to the alpha version of the GEIGER app.

Future Events

We have achieved many exciting and interesting results during the SOCCRATES project, highlighted in many dissemination activities. At this point in time, however, the project will soon be finalized. That is why in this final SOCCRATES webinar, we want to focus on how we have exploited or plan to exploit these results, to ensure a continuous impact also after the project has ended. As a starting point, we will provide a short demonstration of the SOCCRATES pilot platform, following one of the SOCCRATES use cases.

07/06/2022