Companies similar to SASA SOFTWARE
Sign up to Download

91-120 of 135,728 results

  • arizonacomputermedic.com
  • 1
We can insure your electronic environment is free of risk from malicious attacks..

Relevance: 11.593425
  • fgicorp.yourwebsitespace.com
  • 1
Cyber Security is a set of techniques that are used to protect the internet-connected systems... It can protect computers, networks, software, and data. Cyber-attacks are performed to make unauthorized access, change or destroy data, or to extort..

Relevance: 11.589274
  • www.instant.ly
  • 1
Instant.ly provides a real-time updated shield to block various threats. We collect and analyze data from around the world to identify unwanted requests such as attacks, theft, fraud and various malicious acts. We also have tools available to prevent..

Relevance: 11.589274
  • www.ictsapps.com
  • 1
  • 1
Public places such as transportation hubs, shopping areas and buildings are becoming increasingly vulnerable to terrorist attacks. To limit the risk of such potential attacks, ICTS has developed Aware... Our expertise, stemming from the early..

Relevance: 11.5783
  • www.endpointsecurityworks.com.au
  • 1
  • 1
  • 1
EndpointSecurityWorks.com.au is a division of Virtual Graffiti Australia Pty Limited, an authorised VMware Carbon Black reseller... The VMware Carbon Black Cloud analyzes attackers' behavior patterns to detect and stop never-seen-before attacks...

Relevance: 11.5783
  • secondaryinfektion.org
  • 2
Secondary Infektion is a series of operations run by a large-scale, persistent threat actor from Russia that worked in parallel to the Internet Research Agency and the GRU but was systematically different in its approach... Forgeries, interference,..

Relevance: 11.557509
  • www.skaion.com
  • 2
  • 1
Since 1998 Skaion has provided quality testing and support for Government security and R&D projects... Skaion has made major contributions to several noteworthy efforts: Created true zero-day attacks by injecting custom vulnerabilities into existing..

Relevance: 11.557509
  • www.ccs-labs.org
  • 31
  • 3
  • 53
Attacks against computer systems are often launched over the Internet or any other computer network. Therefore, attacks or intrusion attempts can be identified by examining network traffic, which is also known as intrusion detection. Traditional..

Relevance: 11.5336895
  • gamifiedcyberlearning.com
  • 1
  • 1
Security depends on people, when advanced cyber attacks pose some of the most pressing threats, people make the difference... Gamified Cyber Learning - the best training for teams and individuals 24/7 on-line available... D5-IQ keeps your teams in..

Relevance: 11.498068
  • www.sampansecurity.com
  • 3
Sampan Security, Inc. is an American owned and operated company based in the great state of New Hampshire. The company is privately funded and dedicated to the development of comprehensive cyber security protection against Zero-day attacks... In the..

Relevance: 11.490864
  • www.liquidpurifier.com
Hello, my name is Rodney Turner. Welcome to my website about allergies and asthma. As a kid, I could not go through the spring months without suffering from back to back asthma attacks. The asthma attacks usually started when my pollen allergies..

Relevance: 11.490864
  • www.packetwall.org
  • 1
We regularly monitor trends in the field of protection against attacks and improve the quality of the applied methods of protection. This is what allows us to guarantee the highest quality of services, which provides the services with first-class..

Relevance: 11.44764
  • www.beonform.com
  • 1
BeOnForm is one of the UK's foremost Complementary and Alternative Medicine providers and training companies... BeOnForm - specialise in treatment for panic attacks, anxiety attacks, treatment for agoraphobia & obsessions. The UK's foremost..

Relevance: 11.441156
  • www.becyberstrong.com
  • 1
Year after year, we are breaking all records when it comes to data lost in breaches and sheer numbers of cyber-attacks on companies, government, and individuals !... Cyber Risk Management for business managers, owners and professionals. Prioritize..

Relevance: 11.441156
  • outboundmagic.com
  • 1
90% of hacking attacks start with a phishing email. Advanced Threat Defense is a stronger layer of protection for your organization and users from these devastating attacks... We offer pro-rated refunds on annual subscriptions. Monthly subscriptions..

Relevance: 11.441156
  • dpiconsortium.org
  • 1
  • 9
DPI companies face attacks from PAEs seeking to monetize patents that in fact rely on well-known and widely-deployed DPI technology. To meet these attacks head on, DPI companies can avail themselves of a new approach: the DPI Consortium... The Deep..

Relevance: 11.441156
  • www.henlinelaw.com
We found a security vulnerability on your website, please enhance security to prevent further attacks...

Relevance: 11.436344
  • synsec.ai
  • 2
Threat Hunting and understanding the methods of attackers is essential for protecting critical systems. The insights provided by the Synaptic Threat Tree starting with the point of incursion and detailing every new process spawned, commands with..

Relevance: 11.433766
  • www.udsconsultingusa.com
  • 1
  • 1
  • 1
There's no absolute way to prevent all violence (including active shooter attacks) from happening but the impact from those attacks can be mitigated with appropriate security planning, training and equipment. Our mission at Ultimate Defense Systems..

Relevance: 11.430168
  • threatresq.com
  • 4
  • 2
  • 5
Threat ResQ is a pioneer in providing cybersecurity services and protecting businesses from cyber attacks. We provide a full range of solutions for any size team, from small businesses to Fortune 500 companies... We are a leading provider of IT..

Relevance: 11.424138
  • comicept.com
Comicept provide security services such as mobile phones audits to detect trojans,malware ,wifi attacks .ss7 attacks... with a wide range of capabilities . We have experience of more than 10 years in teaching and developing the client most important..

Relevance: 11.400346
  • www.digitalimpactlab.org
  • 1
  • 1
The undisputed leader in maintaining internet freedom in Iran and countering Iranian cyber attacks..

Relevance: 11.396784
  • www.interogative.com
Avoid costly attacks to your web applications. 's intelligent protection dynamically protects and prevents unauthorized access...

Relevance: 11.374857
  • andesiteai.com
Andesite is a Red Cell Partners incubation company whose technology utilizes AI/ML to identify patterns in network activity to predict and protect against cyber attacks that threaten day-to-day operations. Hostile cyber operations are increasingly..

Relevance: 11.30862
  • www.lovelacemarketplace.com
  • 1
We have worked with industry leaders for more than 15 years to prevent ransomware and malware attacks..

Relevance: 11.303821
  • azgeneraler.com
Narcolepsy is a chronic disorder that affects approximately 1% of the population. Individuals with narcolepsy experience sudden and uncontrollable sleep attacks. The sleep attacks usually last between five and twenty minutes. You may experience..

Relevance: 11.2979965
  • www.usec.io
  • 3
  • 1
MicroSec aims to help organizations operate safely and securely in an increasingly connected world by starting at the Edge... We aspire to empower organizations to take control over its environment through our unique approach of Security by Design..

Relevance: 11.2979965
  • www.tiwtech.com
  • 1
We don't use third party advertising or tracking cookies though, so there's that..... In 2021, according to the UK government's most recent Cyber Security Breaches Survey, four in ten businesses (39%) reported cyber security breaches or attacks...

Relevance: 11.29713
  • act2secure.com
  • 2
  • 2
  • 2
Minimize the risk and impact of attacks, data breaches, and incidents as well as post event hardening...

Relevance: 11.293399
  • www.redwolfsecurity.com
  • 1
  • 1
  • 1
We have been using RedWolf Security since 2016, and I have to say they have transformed the way we approach our mandatory security control testing. Testing with RedWolf Security provides us with the assurance that our technology, controls and..

Relevance: 11.287767