Companies similar to ZDRESEARCH
Sign up to Download

2971-3000 of 7,199,730 results

  • www.rysk.finance
We asked Trust to audit the Rysk Beyond smart contracts, considering their experience in the cybersecurity space... Decentralized options protocol to trade volatility and directionality with leverage, build 1-click strategies earn uncorrelated..

Relevance: 9.992119
  • autosec.se
  • 2
  • 2
  • 2
AutoSec supports the FFI program Electronics, Software and Communication by dissemination and exploitation of the results of projects related to automotive cybersecurity...

Relevance: 9.991986
  • rkcybersolutions.com
  • 1
  • 2
As a Christ-focused business, RKCS is dedicated to providing our customers with robust security solutions and the assurance that they are implementing due diligence in protecting their data and systems. We equip our customers with cutting-edge cyber..

Relevance: 9.991384
  • www.cybersecuready.com
CyberSecuready Awareness Manager is a learning management system designed for cybersecurity teams. It contains built-in SCORM Compliant training modules that can be assigned to the end users with complete track and visibility...

Relevance: 9.990613
  • www.rarediscoverylabs.com
  • 1
  • 1
Unlike traditional security firms, we integrate real-time threat intelligence with advanced predictive analytics to offer bespoke solutions for local, state, and federal agencies. Our team has extensive experience in navigating government regulations..

Relevance: 9.989328
  • www.cs.fsu.edu
  • 4
  • 7
  • 19
We offer B.A., B.S., M.S., and Ph.D. degrees. Our program is ranked among the top 50 public universities... CS Department offers Masters degrees in Cybersecurity. Our program was the first in the state to receive the designation "CAEIAE and CAR-R"..

Relevance: 9.988224
  • capwil.com
  • 2
We tailor-make our cybersecurity and infosec plans to meet your specific business needs. Our goal, as always, is to keep your business secure, your data protected, and your customers safe...

Relevance: 9.987641
  • www.kodori.ch
  • 1
Since its inception in 2010, Kodori AG has invested in cybersecurity, real estate, consumer products, medical treatments and health tech... Kodori AG's early-stage venture arm, Kodori Ventures, focuses on innovation in the field of mental health.....

Relevance: 9.987502
  • www.digitaledge.net
  • 2
  • 4
  • 1
Digital Edge is a team of certified engineering professionals passionate about digital transformation.В We apply our expertise in cloud, cybersecurity and compliance delivering strategies for AWS, Asure as well as traditional environments. With two..

Relevance: 9.987435
  • u.ae
  • 153
  • 15
  • 2
The UAE's National Cybersecurity strategy aims to create a safe and strong cyber infrastructure in the UAE that enables citizens to fulfill their aspirations and empowers businesses to thrive. The updated version of the strategy was launched in 2019..

Relevance: 9.987077
  • astra.cc
  • 1
  • 1
  • 1
Astra Communicationstm can provide the strategic public relations and marketing communications to help you grow. I am an independent consultant with over 30 years experience in the cybersecurity, B2B technology, industrial, and environmental..

Relevance: 9.986951
  • www.codestar.us
  • 1
  • 1
  • 1
In collaboration with your current I.T. team, Codestar Cybersecurity helps you keep your data and systems safe... Your company's digital information - such as customer data, financial records, and business correspondence - is, quite literally, the..

Relevance: 9.986233
  • www.cyberheatmap.com
  • 1
  • 1
CYBER HEAT MAP is an innovative cybersecurity planning tool designed for higher education institutions... CYBER HEAT MAP provides higher education institutions with precise, actionable tools for benchmarking, planning, and vendor research. Developed..

Relevance: 9.985763
  • www.sentar.com
  • 2
  • 6
Sentar is a cyber intelligence company, applying advanced analytics and systems engineering expertise to protect our national security and way of life by innovating, building, and securing mission-critical assets... Sentar is uniquely positioned..

Relevance: 9.984935
  • www.strongexploits.com
Strong Exploits LLC was founded with a focus to offer penetration testing and vulnerability discovery services to small, medium and large size businesses. The consultants at Strong Exploits are trained, certified in multiple areas of cybersecurity..

Relevance: 9.9838085
  • nint.in
  • 1
  • 1
NINT is an emerging Technology firm in India. We provide Custom Software Development, Information Technology & Information Security Solutions to our clients since 2017. We produce intelligent and powerful Solution which completely manoeuvres our..

Relevance: 9.98361
  • techofide.com
  • 1
  • 2
  • 3
At techofide our goal is to remove any technical or financial barriers that can prevent individuals from making their own career or future... We do not only provide you with a learning opportunity, but we also offer you to ask your queries related..

Relevance: 9.983246
  • www.dominioncyber.net
Dominion Cyber Provides a range of assessments such as Penetration Testing, Mobile Hacking, Vulnerability Assessment, Red Teaming, etc... Our team has extensive experience implementing cybersecurity solutions against internal and external threats to..

Relevance: 9.982488
  • www.lambert-associates.com
  • 2
  • 1
Lambert & Associates has experience in many industry segments, with an extensive background in the financial services industry. We also serve the e-commerce product development-manufacturing-marketing industries with competitive marketing assessment..

Relevance: 9.982226
  • ai-solutionsinc.com
  • 1
  • 1
At ai solutions, our mission is to provide top-notch IT services to small businesses. We strive to make technology work for our clients, not against them... Our team of experienced IT professionals has expertise in a variety of areas, including..

Relevance: 9.980956
  • westlygroup.com
  • 3
  • 1
  • 18
We invest in Seed, Series A, B, and C rounds where we can support teams in unlocking commercialization and growth at critical inflection points... Since our inception in 2007, The Westly Group has become one of the premier venture funds in North..

Relevance: 9.980074
  • foxguardsolutions.com
  • 1
  • 1
  • 9
For critical infrastructure, we help ensure operational safety, quality, and uptime by enhancing your cybersecurity maturity. We address your custom compute needs with end-to-end system integration of hardware and software solutions. These solutions..

Relevance: 9.980013
  • www.davintechgroup.com
  • 4
  • 3
Our team of strategists, engineers, and specialists work closely with clients to design innovative technology strategies, improve digital workflows, and manage day-to-day technology operations... Managed IT and cybersecurity services built for the..

Relevance: 9.979869
  • thebreach.report
Welcome to The Breach Report, a cybersecurity newsletter on cyber news, career insights, technology and more...

Relevance: 9.979556
  • www.invisiblelab.dev
  • 2
Your expert partner in Cybersecurity, Blockchain, and Cloud Engineering Solutions. With a decade of hands-on experience, we specialize in addressing complex challenges. Our track record of innovative projects and 30+ papers presented at top..

Relevance: 9.979196
  • www.elfglobal.in
Elf Global is a leading solution provider in technology and IT, offering innovative solutions in cloud computing, cybersecurity, data analytics, and artificial intelligence. With a team of skilled professionals, they provide end-to-end services from..

Relevance: 9.978843
  • www.pearlsoftware.com
  • 6
  • 2
  • 5
Pearl Software has been a Microsoft Certified Partner since 1996 and ensures the reliability and strength of our software solutions through alliances with leading technology companies like Microsoft, Intel and Citrix Systems... Pearl Software is the..

Relevance: 9.977869
  • arculus.services
  • 1
  • 1
We began our cybersecurity journey not knowing where to start, but we knew we needed to do something. The team at Arculus helped us develop a comprehensive data governance framework and assisted us in deploying all the controls. We now have a clear..

Relevance: 9.97648
  • seamansit.com
  • 1
Seamans IT Consulting helps DoD contractors throughout the U.S. navigate the complexities of the Cybersecurity Maturity Model Certification (CMMC). ..

Relevance: 9.976266
  • www.comet-cnes.com
  • 5
The COMET CYB (CYBersecurity) was created in 2016. Its objective is to create conditions favourable for innovation and exchange, while bringing together the communities concerned by the topics covered by cybersecurity... The OPS Community of Experts..

Relevance: 9.975395