Companies similar to INSTILLERY
Sign up to Download

1-30 of 6,714,062 results

  • sechard.com
  • 13
  • 1
  • 8
In 2019, SecHard established by cyber security veterans with academic backgrounds to provide security hardening solutions. In 2020, the first information security company of Turkey, Nebula acquired SecHard and created a new vision about Zero Trust.....

Relevance: 20.196589
  • colortokens.com
  • 2
  • 3
  • 12
ColorTokens simplifies, accelerates and automates your security operations with our award- winning Xtended Zero Trust Platform. Our ColorTokens unique Zero Trust approach gives you 360ยบ visualization, micro-segmentation and complete enforcement of..

Relevance: 19.979113
  • portsys.com
  • 1
  • 2
  • 1
PortSys is a global innovator in information security and zero trust access control, transforming today's hybrid enterprises by delivering simpler, stronger and unified security... PortSys has developed zero-trust access (ZTA) technology, a term..

Relevance: 18.892746
  • asteriondb.com
  • 1
  • 6
AsterionDB makes it easy to build applications and architectures that exhibit a high degree of alignment with the goals outlined by the U.S. Zero Trust Initiative: U.S. DoD Zero Trust Execution Roadmap... Next, we make it easy to incorporate all of..

Relevance: 17.598715
  • theinstillery.com
  • 10
  • 2
  • 10
The Instillery is New Zealand's leading Zscaler partner and provider of Zero Trust solutions. We believe that zero trust extends beyond users connecting to applications and identifying and controlling how applications communicate with each other, and..

Relevance: 17.38468
  • www.kralcon.com
  • 1
  • 1
TMW Gov IT is a strategic partner to the world's most recognized IT brands. Our lasting relationships with leading technology providers enable our clients to access the most effective solutions to meet their needs... TMW Gov IT provides professional..

Relevance: 16.800165
  • www.ockam.io
Ockam is a team of doers, builders, shippers, and finishers. We created an environment where every individual is empowered to act, and trusted to be world-class in their role... Software cannot be secured from the outside. Ockam provides powerful..

Relevance: 16.668863
  • openziti.github.io
OpenZiti is a free and open source project focused on bringing zero trust networking principles directly into any application. The project provides all the pieces required to implement a zero trust overlay network and provides all the tools necessary..

Relevance: 16.611792
  • www.l2iterative.com
  • 1
  • 8
We support inventions in blockchain infrastructure, private computing, and zero-knowledge proof applications... We support infrastructure projects in modular, multi-chain projects and inventions in zero-knowledge proof applications...

Relevance: 16.480997
  • diode.cloud
What We Offer We enable secure Zero-Trust API access and billing for enterprises and companies who want to benefit from the Cloud speed and security... Zero Trust enables enterprise delivery without the pain of clients or servers or appliances...

Relevance: 16.373112
  • diode.cloud
Zero Trust enables enterprise delivery without the pain of clients or servers or appliances. Cloud Diodes leverages partners' Zero Trust solutions for API access... What We Offer We enable secure Zero-Trust API access and billing for enterprises and..

Relevance: 16.373112
  • www.ztalab.xyz
ZTALAB is a research and open source organization for zero trust architecture. We will gradually open source the projects we have incubated and ongoing projects to make our contribution to the zero-trust ecosystem. If you are also interested, or have..

Relevance: 16.350143
  • zero-max.de
  • 2
  • 4
  • 1
Zero-Max - Shaft couplings, drives and gearboxes - our high performance motion control products. We have the solution you need!... Zero-Max' product portfolio covers a wide range of applications, from high performance applications in the packaging..

Relevance: 16.237185
  • www.hackbunker.com
The magic of Zero Trust is most obvious when applied to API's. Rather than providing direct access to the API over the public internet, we provide a zero trust network overlay which makes it invisible to hackers and accessible to authenticated..

Relevance: 16.175646
  • www.eversafe-recovery.com
EverSafe's Zero Trust Backup and Disaster Recovery Services integrate your on-premise Veeam environment with EverSafe's Secure Cloud Infrastructure providing zero trust connectivity with fully supported robust replication and failover capabilities..

Relevance: 16.047184
  • www.libellux.com
  • 2
Libellux: Up & Running provides documentation on how-to install open-source software from source. The focus is Zero Trust Network to enhance the security for existing applications or install tools to detect and prevent threats... Graylog Centralized..

Relevance: 15.931098
  • wwuzerotrust.com
The idea of trust in the technical landscape is rapidly changing with cloud infrastructure and increased reliance on interdependent applications. Causing system designers to re-evaluate a means to approach security. Often in the past networks were..

Relevance: 15.79332
  • procella.tech
  • 1
  • 2
The team at Procella are Zero Trust experts. We help enterprises develop Zero Trust and SASE strategies to bring their cyber security up to date... Follow <a href="https://micro.blog/procella">@procella on Micro.blog</a>...

Relevance: 15.583137
  • www.illumio.com
  • 6
  • 6
  • 16
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface... In this time of increasing ransomware and cybercrime, Illumio provides the only proven segmentation product suite purpose-..

Relevance: 15.409881
  • criticalinfrastructuredefense.org
  • 1
To address this threat, leading Zero Trust cyber security providers have partnered to launch the Critical Infrastructure Defense Project. Our goal is to quickly improve the cyber readiness of vulnerable infrastructure in US critical industries-..

Relevance: 15.379963
  • zerotrustroadmap.org
  • 1
Open inbound network ports can be found using scanning technology and are a common attack vector. Zero Trust Reverse Proxies allow you to securely expose a web application without opening any inbound ports. The DNS record of the application is the..

Relevance: 15.322625
  • zerotrustroadmap.org
  • 1
This roadmap was built by security experts to provide a vendor agnostic Zero Trust architecture and example implementation timeline. The timeline assumes that an organization is beginning their Zero Trust journey from scratch, but is meant to be..

Relevance: 15.3091955
  • exertis-events.com
  • 1
How do you manage risk as an organisation? Are you prepared for a Cyber Attack? How can your organisation manage a Cyber Crisis? Have you considered the impact of a Cyber Breach?... Learn also how establishing a Zero Trust approach can help prevent..

Relevance: 15.234309
  • www.ockam.io
  • 25
Ockam is a team of doers, builders, shippers, and finishers. We celebrate things that are complete and intentional. Ideas are the easy part. We win by turning ideas into action... At Ockam, it's essential to embrace a growth mindset. High..

Relevance: 15.042561
  • www.ditno.com
  • 1
In as little as four weeks, ditno can help you gain total visibility while building a fully governed zero trust network... Combining real-time network governance and micro-segmentation is a huge step towards a secure environment. With the right..

Relevance: 14.986877
  • subzerofs.com
  • 1
These are factory certified Sub-Zero, Wolf, and Cove service and repair partners. Only trust factory certified service and repair partners when it comes to taking care of your Sub-Zero, Wolf, and Cove products... Sub-Zero Directory listing..

Relevance: 14.983957
  • www.beyondcorp.com
BeyondCorp is a Zero Trust security framework modeled by Google that shifts access controls from the perimeter to individual devices and users. The end result allows employees to work securely from any location without the need for a traditional..

Relevance: 14.744071
  • www.risczero.com
RISC Zero is a startup building the RISC Zero (zkVM) as a major step towards improving the security and trustworthiness of distributed applications. RISC Zero zkVM bridges the gap between zero-knowledge proof (ZKP) research and widely-supported..

Relevance: 14.723139
  • www.zksecurity.xyz
  • 1
That's where zkSecurity comes in! Our goal is to ensure that the transition to a zero-knowledge world comes with minimal issues. We produce tooling, best practices, and audit zero-knowledge systems and applications. That's what we do!... As part of..

Relevance: 14.716079
  • streamlineavionics.com
  • 5
  • 4
  • 3
Streamline Avionics, Inc. manufactures specialized EMI filters and capacitors for aerospace and industrial applications... Streamline specializes in low volume, custom applications with zero defects and 100% on time delivery...

Relevance: 14.710393