More Fields

Filters

Profiles which have:

Recent Changes

Profiles with recent changes to:
Sign up to Download

121-150 of 6,728 results

  • soheicyber.com
  • 1
Sohei Cybersecurity is a new kind of security practitioner's network. We seek to foster the development of information security talent. Our mission is to further the advancement of humanity by seeking to secure and maintain the world's information..

Relevance: 27.901445
  • www.perfectsecurity.org
  • 1
Our business web site offering data network services to our local Mid-Nebraska area. We bring expert consulting to customers that may or may not have a large budget for information technology. Offerings include Managed security services, Network..

Relevance: 27.891424
  • www.networkingreviews.com
  • 2
UPDATE: This website was originally intended to focus only on networking field, but over time I have expanded its content to include also topics related to general technology, software, information security, technology news etc... The main purpose..

Relevance: 27.87337
  • www.miltech.ca
Crypto Logic Canada, Inc. provides security and technology consulting to organizations across the globe. Our expertise lies in Information Security, Network Security, Communications Security, Security Assessment and Authorization (SA&A), and Policy..

Relevance: 27.870878
  • www.adrnets.co.in
  • 2
  • 3
ADR NETWORK SERVICES LLP is a prominent Solutions name in the Field of Information Technology. We are involved in Sales, After Sales Service, Annual Maintenance Contracts (AMC), Networking (LAN / WAN Solutions), & Security products for all products..

Relevance: 27.863512
  • rescubes.cc
With a solid foundation in computer science theory and practical experience, I bring 17 years of relevant professional expertise in designing and implementing IT systems. At rescubes.cc, I take pride in offering assistance in the field of information..

Relevance: 27.846636
  • cyberatic.net
  • 1
  • 1
  • 2
Cyberatic is a Pakistan based cyber security testing labs private agency. We Provide Ethical Hacking Cyber Security Services all around the world... The Cyberatic® Security Services team can help you secure your people, information, and network from..

Relevance: 27.830704
  • www.rjpes-solutions.pt
  • 1
  • 2
  • 1
Our services cover a wide range of IT Services, namely Users and Devices Support , Software and Hardware resale, Network and Information Systems Management, Cyber security and Corporate Application and System Information Software Development...

Relevance: 27.828993
  • www.business-frameworks.com
  • 1
  • 2
Business Frameworks provides consulting services to manage information security and assurance programs. Our focus is on small & medium businesses. We can extend your existing IT staff with specialized security skills, or provide a completely..

Relevance: 27.820244
  • www.cryptophone.de
  • 4
  • 1
GSMK is a cyber security pioneer founded in 2003. We work at the forefront of mobile device and mobile network security. Having developed information assurance technologies integral to defending critical information for over two decades, we protect..

Relevance: 27.81503
  • network-alliance.com.my
  • 3
  • 3
As a security and network solution provider, the company is positioned to remove the burden of the customer by offering consultancy in the areas of security and network; from design to full integration of proposed solutions... We provide platforms..

Relevance: 27.791958
  • chiragnd.github.io
I'm a Certified Information Systems Auditor (CISA) and Director of Technical Services, working with companies to improve their infrastructure performance, network & security...

Relevance: 27.767044
  • www.ecrsecurity.com
  • 1
  • 1
  • 1
Your corporate information security needs are unique. You need an information security provider that can understand the unique threat environment your business operates in, whether your primary concern is corporate espionage, hacktivists, insider..

Relevance: 27.767002
  • 40plusstartup.com
  • 1
Legal obligation: we have a legal obligation to implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk of our processing of information about individuals. Recording access to our website..

Relevance: 27.760107
  • cardiff-property.com
  • 1
  • 2
  • 2
Legal obligation: we have a legal obligation to implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk of our processing of information about individuals. Recording access to our website..

Relevance: 27.760107
  • securenetdesign.com
  • 1
  • 1
Secure Net Design is a small, agile business with twenty years of experience in industry-leading work in computer, network, information security, and cloud technologies... Security is woven into everything we do. From planning, throughout design and..

Relevance: 27.755419
  • ipheights.com
  • 1
  • 2
IP-Heights is continuously investing to maintain the infrastructure of providing best work environment to our team members selected from various fields of information technology. We never compromise on the quality of services and always committed to..

Relevance: 27.73806
  • www.networkmedia.com.hk
  • 2
  • 1
Network Media was founded in 1994 as a specialist supplier of network management and security tools. Our independent status and strong technical skills allow us to tailor solutions often using equipment from more than one manufacturer to provide..

Relevance: 27.720259
  • www.ustconsulting.com
  • 1
  • 1
UST Consulting Group is an information technology firm providing Information Technology consulting, site design and hosting, hardware and software implementation and management services for our clients. We are based in Calabasas, California and..

Relevance: 27.717218
  • www.breakwater.net
Our mission is not esoteric or complicated. Breakwater Technologies was established to furnish solutions for a relatively new and complex market - network security... Breakwater Technologies, Inc. provides network security analysis and managed..

Relevance: 27.715553
  • exploitedbunker.com
I have been teaching and working in governance, risk management, compliance and information security fields over the last 20+ years and I managed projects in risk and vulnerability assessment, network security, business continuity and disaster..

Relevance: 27.713432
  • milesassociates.wordpress.com
  • 2
  • 1
  • 1
Objective:Strategic & tactical planning and execution projects in IT or Information Security... Professional Summary: Senior IT and Information Security Executive with 20 years of experience in Fortune 1000, start-up, public and private..

Relevance: 27.699903
  • deepwildcoaching.com
  • 1
  • 1
Legal obligation: we have a legal obligation to implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk of our processing of information about individuals. Recording access to our website..

Relevance: 27.696781
  • www.annabalciune.com
  • 1
Legal obligation: we have a legal obligation to implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk of our processing of information about individuals. Recording access to our website..

Relevance: 27.696781
  • www.hat-squad.com
Hat-Squad is a group of network and security enthusiasts, working in research and development of new vulnerabilities and exploitation tools. Hat-Squad has been involved in both research and implementation of information security systems since 2001,..

Relevance: 27.693537
  • www.imglab.org
We specialize in Document Analysis and Recognition, Pattern Recognition, Image Computing, Information Security, Wireless Network Roaming, Identity Federation and Cloud Services...

Relevance: 27.693043
  • www.boundlesstechnology.net
  • 1
  • 1
Boundless Information Technology Solutions is a boutique security firm that specializes in full-scale network protection and defending against advanced, targeted attacks. Our staff members have background in governmental and intelligence fields as..

Relevance: 27.691109
  • www.wellmarktechnologies.com
  • 3
  • 3
Wellmark Technologies is an Information Technology Company specialized in Network & Network Security Products, Solutions and Services. Our Services include IT Infrastructure Design, Implementation and Support. Wellmark supports enterprises and..

Relevance: 27.68397
  • hbinfotec.com
  • 1
  • 1
Located in Mumbai, India, HB Infotech was incorporated in 2007 for offering niche cyber security services globally. HB Infotech offers focused & niche services in the cyber security, information security consultancy and audit domain. HB provides..

Relevance: 27.675648
  • www.qkon.ca
  • 3
  • 1
Secure your information, network and business from potential threats and intruders with leading edge security technology & products... Protect your Data & business from potential loss or disaster. Virtualize your network online... Let us manage and..

Relevance: 27.657505