Companies similar to OPENPMF
Sign up to Download

1-30 of 6,035,043 results

  • www.foodsecure.eu
  • 1
  • 1
FOODSECURE aims to design effective and sustainable strategies for assessing and addressing the challenges of food and nutrition security... FOODSECURE provides a set of analytical instruments to experiment, analyse, and coordinate the effects of..

Relevance: 18.049501
  • bpcaction.org
  • 10
  • 1
  • 21
We are committed to seeing bipartisan policy solutions enacted into law, and we work closely with our 501(c)(3) partner, the Bipartisan Policy Center, to advance smart policies through the legislative process... The premier federal political..

Relevance: 17.41676
  • www.anteronconsulting.com
  • 1
  • 1
We are a Cybersecurity consulting company positioned to help organizations solve their various Cybersecurity challenges. Our main goals are to provide innovative solutions to critical organizational and business challenges, and to help our clients in..

Relevance: 17.34809
  • objectsecurity.com
  • 2
  • 3
  • 13
There are multiple challenges with enforcing security policies, rich and dynamic policies need to be applied in many industries to restrict information flows to only what is authorized. OpenPMF solves these challenges through a unique "security..

Relevance: 17.257614
  • www.ffrdc-uarc-sc.org
  • 23
  • 22
The FFRDC/UARC Security Council was formed to address the unique challenges faced in providing security services within R&D environments that serve government... The purpose of the FFRDC/UARC Security Council is to share information and best..

Relevance: 17.103289
  • forensicsp.com
  • 1
  • 1
  • 1
Forensic Security & Protection, LLC is an independent security management consulting firm. We are dedicated to providing expert solutions to your security challenges. Our services are unique in that they incorporate the latest research-based..

Relevance: 16.248203
  • secentric.com
  • 2
The Secentric team has fourty years in information security program development and consulting. We understand the diverse challenges faced by organizations of all types and sizes. We have leveraged this experience to create customizable solutions,..

Relevance: 16.237549
  • www.giacobe.us
Navigate complex cybersecurity regulations with confidence. We specialize in helping organizations align with standards like GDPR, HIPAA, and more... Protect sensitive information with cutting-edge data protection strategies. We focus on encryption,..

Relevance: 15.770984
  • outsidersecurity.nl
  • 1
Most of today's breaches are from outsider threats. They gain access to company networks, elevate their privileges, and achieve their objectives, causing financial losses and operational impact. These outsider threats do not know their target's..

Relevance: 15.696148
  • qanalyx.com
  • 1
We at Qanalyx focus on following areas: Cloud Security Consulting , Data Security and Privacy Consulting, IT Advisory and Audits including VAPT of networks ,Identifying and securing all digital and non-digital assets, Continuous monitoring, and a..

Relevance: 15.274755
  • www.itsecuritypolicies.com
  • 2
  • 2
IT Security policies are the foundation of organizational security strategy, and are considered "best practices" for IT departments of any size. They are the basis for security design, architecture, implementation, and practices. Security policies..

Relevance: 15.228401
  • www.maritimesecuritythebook.com
  • 1
  • 3
This book provides practical, experience-based, and proven knowledge - and a "how-to-guide" - on maritime security. McNicholas explains in clear language how commercial seaports and vessels function; what the multiple existing threats and challenges;..

Relevance: 15.226585
  • www.apptreesoftware.com
  • 3
  • 1
AppTree is an enterprise app platform that accelerates your business by solving common enterprise app build, deploy and support challenges. Every feature in our platform is one more problem you don't have to solve... AppTree was designed for use..

Relevance: 15.025672
  • world-border-congress.com
  • 6
  • 4
  • 24
The World Border Security Congress is a high level three day event that will once again discuss and debate current and future policies, implementation issues and challenges as well as new and developing technologies that contribute towards safe and..

Relevance: 14.927656
  • pvrsystems.com
  • 3
  • 4
  • 6
At PVR Systems, we help you grow your business with a borderless, adaptable, intelligent network. Networking comprises not only the design, construction and use of a network, but also the management, maintenance and operation of the network..

Relevance: 14.916214
  • www.visitoutside.com
  • 1
  • 2
Policies are written by security industry professionals. Trusted for day-to-day security management by companies that require top-level security expertise. We understand the real world of endless priorities and apeasing auditors... Founded in 2008..

Relevance: 14.903731
  • www.itsa-india.com
  • 5
  • 7
  • 5
Cyber Security landscape in India has witnessed major evolution in last 5 years due to emerging technologies such as Cloud computing, big data analytics, social media, mobile computing, digitization and Internet of things. With this change in cyber..

Relevance: 14.870362
  • defense.info
  • 4
  • 5
Defense.Info is a website that provides cutting-edge analyses of global strategic challenges and developments as well as of defense platforms and systems... The defense.info team is a group of globally based analysts and strategists who work closely..

Relevance: 14.8488455
  • sacsconsulting.com
  • 17
  • 1
  • 24
We offer services for Human Resources Policies & Procedures, Investigative, Security, or Training... Our team members are required to maintain continual training and certifications in security and investigation protocol in order to provide our..

Relevance: 14.761226
  • www.itsecuritypolicy.com
  • 2
  • 2
We have been providing custom cyber security security policies and solutions since 2001; helping companies from 5 to 50,000 employees address their IT security needs. The management of InstantSecurityPolicy.com has over 30 years of successful..

Relevance: 14.734949
  • www.instantaup.com
  • 2
  • 2
We are located in the Research Triangle Park area of North Carolina, a world-renowned technology center known for innovation... We have been providing custom cyber security security policies and solutions since 2001; helping companies from 5 to..

Relevance: 14.734949
  • cybsecwatch.com
  • 1
At CybSecWatch, our mission is to build a safer digital future for businesses by providing innovative cybersecurity solutions that prioritize people-first security... Our solutions are tailored to the specific needs of your industry, with..

Relevance: 14.646477
  • www.secshields.com
In Secshields we are working on our security awareness program which is a formal program with the goal of training users of the potential threats to an organization's information and how to avoid situations that might put the organization's data at..

Relevance: 14.617092
  • www.endnuclearweapons.org.uk
Nuclear weapons are by their nature indiscriminate in their effect. Any use of nuclear weapons would have devastating humanitarian consequences, be incompatible with International Humanitarian Law and violate the principle of dignity for every human..

Relevance: 14.592048
  • www.beowulfdefense.com
  • 10
  • 1
  • 4
Beowulf Defense and Security is an international defense and security firm offering innovative concepts in national defense and private security solutions and policies, with analytical expertise in a wide range of weapon systems for air, sea, and..

Relevance: 14.577552
  • www.incyteis.com
  • 2
  • 1
Our goal is to train leadership, staff, congregants, and students to have the tools to make good decisions when potentially being in a negative event at work or home... We provide the assessment, training, policies, and communications needed to make..

Relevance: 14.558395
  • cyber0defense.com
  • 1
Detecting stored endpoint events and malware injections, creating blacklists and whitelist, and integration with other technologies... Collecting and aggregating data from endpoints and other sources be enriched by additional cloud analysis.....

Relevance: 14.467596
  • www.jcinfosec.co.uk
  • 1
  • 1
  • 1
John Courtney Information Security Consultancy can assist you at any level from preliminary assessment or security audit to major projects to implement Information Security policies, procedures or programmes...

Relevance: 14.444861
  • www.endpointclinical.com
  • 3
  • 62
  • 8
endpoint Clinical is the leading, global interactive response technology (IRT®) company. We have one focus: creating easy-to-use IRT systems that accommodate every trial, regardless of the complexity... Our customers inform the Endpoint Clinical..

Relevance: 14.432427
  • www.haka-security.org
Haka is an open source security oriented language which allows to describe protocols and apply security policies on (live) captured traffic...

Relevance: 14.421182