Companies similar to DIVERSE TEAM
Sign up to Download

31-60 of 6,304,368 results

  • www.knoxsecurity.tech
  • 1
  • 1
Knox Security founded to provide cybersecurity solutions and services to enterprise organizations. We have been recognized as one of the world's most innovative cybersecurity operations leaders, and excel in complex, multi-technology environments. We..

Relevance: 21.119009
  • www.dragoncy.com
  • 2
DragonCY provides cybersecurity services using behavioral modeling to anticipate attacks by processing large amounts of data, identify anomalies behavior and use incident response automation... Vulnerability Management: We can provide this service..

Relevance: 21.10465
  • composable-security.com
  • 1
  • 2
From the very beginning, we have made sure to share knowledge and what we have researched ourselves. We have been speakers at conferences such as ETHcc, AppSec Global, ETHWarsaw, Web3 Security Conference, and more. This is an integral part of the..

Relevance: 21.036253
  • www.osqueryatscale.com
  • 2
Threat actors quantify the time and expense required to attack your organization. Security Operations teams ought to be able to do the same through threat modeling and appropriate controls. This session will explain how SEI quantified the value of..

Relevance: 20.956066
  • www.misp-standard.org
The MISP standard is a collaborative intelligence standard, powering intelligence and information exchange, sharing and modeling. The misp-standard.org is a standards body developing free and open standards through sane open-source collaboration.....

Relevance: 20.911139
  • www.nrj-security.be
  • 1
  • 1
At NRJ Security we are dedicated to collaborate with you and your security team to make security work... NRJ Security has a proven track record for building security into a development lifecycle. We provide maturity assessments, consulting, and..

Relevance: 20.905499
  • unifieditservices.com
  • 1
  • 2
Welcome to Unified IT Services. We are an Information Technologies consulting and services company offering hardware and software solutions, cloud based services, managed support and help desk, and comprehensive security and compliance solutions.....

Relevance: 20.771626
  • www.kuzeyinc.com
  • 1
Kuzey Global is a provider of software development to enterprise customers. We also offer cyber security system integration, and managed security services. We are administrating all the Kuzey Global Software Consulting and R&D company. We develop..

Relevance: 20.760422
  • www.maldun.com
  • 3
  • 3
Maldun Security is dedicated to comprehensive content security and advanced threat intelligence driven by deep threat behavior analysis, interactive threat analysis platform, big data, and machine learning. We cover Email security, Web security, as..

Relevance: 20.711882
  • www.solultima.com
SolUltima is a technology-enabled global business services company specializing in customer engagement and improving business performance. We partner with ambitious, progressive executives around the world to future-proof their business and stay..

Relevance: 20.638239
  • www.ar-t.co.uk
At GSG Systems we specialise in providing state of the art integrated security systems, based around advanced IP CCTV network technologies and powerful digital enhancement and analysis software... Our systems bring all essential aspects of visual..

Relevance: 20.566322
  • srinivasvaddadi.com
  • 1
Spanning an experience stream of over 7+ years, I have worked at numerous corporations and have enabled countless clients. These are some of my most recent endeavors... About: As part of an enterprise-level security program for digital products..

Relevance: 20.456459
  • rotundasecurity.com
  • 1
Rotunda Security integrates "DevSecOps" (building security into application development from end to end) process into the pipeline that requires a new organizational mindset as much as it does new tools. With that in mind, we as DevSecOps automate..

Relevance: 20.450449
  • www.ciscoblogs.com
In future episodes we will explore the individual security components of Cisco Firepower Threat Defense even deeper; things like outbreak controls and behavioral Indications of Compromise, network, file and device trajectory, as well as threat..

Relevance: 20.432358
  • andy.tinkham.org
  • 1
  • 1
[/vc_column][/vc_row][vc_row][vc_column width="2/3"][vc_column_text]I'm a former software tester turned AppSec architect who has been building software for over 25 years. I started out in test automation and have branched out to work in all areas of..

Relevance: 20.427397
  • www.collierjam.com
I work as a Senior Threat Intelligence Advisor at Mandiant where I help security leaders to better understand their threat landscape and utilise threat intelligence in their decision-making. I am passionate about building a dialogue between technical..

Relevance: 20.346539
  • www.nowsecure.com
  • 2
  • 2
  • 11
Cover your bases with your choice of rapid, targeted and full-scope mobile app penetration testing executed by the NowSecure all-star, mobile pen testing experts. Our thorough approach includes threat modeling, deep assessments, rich reports,..

Relevance: 20.314976
  • linddun.org
  • 1
LINDDUN is a recognized privacy threat modeling framework, developed by privacy experts at KU Leuven. It offers mature support to identify and mitigate privacy threats early in the development lifecycle. Adopting LINDDUN can therefore help build..

Relevance: 20.302666
  • www.spyhunter.com
  • 2
SpyHunter includes the SpyHunter HelpDesk at no extra cost, which offers interactive one-on-one access to our customer support team for users of paid versions of SpyHunter or when included in a promotion. If SpyHunter is not able to automatically..

Relevance: 20.22774
  • www.stratovan.com
  • 1
  • 1
  • 4
Stratovan is a leading developer of interactive visual analysis software for 3D imaging for the medical, life science and threat detection markets. Our next generation surgical planning and diagnostic software offer the ability to easily view,..

Relevance: 20.203398
  • www.two-knights-defense.com
  • 3
Two Knights Defense (2KD) is an OCI free small business joint venture combining System High's advanced capabilities in Proactive Protection with Cintel's nimble, unique, value-focused solutions in cybersecurity, software engineering, modeling &..

Relevance: 20.168655
  • www.imwsoftware.com
  • 1
IMWSoftware LLC is set-up to work with government contracts. We are a small business (WOSB) with 20 years experience in designing and developing software products. We cover full life cycle product development from cybersecurity software to generic..

Relevance: 20.164625
  • solutionlab.com
  • 1
  • 1
  • 1
SolutionLab is a US Based software and professional services company specializing in healthcare information security... Presently, SolutionLab is providing several States with Information Security & Privacy compliance services related to the..

Relevance: 20.009844
  • www.bitlogix.com
  • 4
Bitlogix is a software and IT security company. We provide to our clients software engineering services, IoT network management solutions, cloud, DevOps and cybersecurity services. We serve clients in the corporate, industrial, government, utility,..

Relevance: 19.952528
  • www.1totaltech.com
  • 3
  • 2
Total Tech provides IT Services with a strong emphasis in Cyber Security. We are committed to equip our clients with the best in market solutions while delivering expertise in the field of IT Services, Cyber Security, and Vulnerability Management.....

Relevance: 19.872139
  • www.teamccs.co.za
  • 1
  • 1
  • 4
At Complete Computer Services we specialise in on-site technical support and sales of all IT related Hardware, Software, Network Infrastructure Installations as well as Network Security and Threat Management... We are Gold Certified Solution..

Relevance: 19.85723
  • www.wattletech.com
  • 2
  • 1
Founded in 2010 and headquartered in Sydney, Wattle Tech is a globally renowned Cloud Service Provider Consulting firm dedicated to leveraging technology to design scalable, secure and resilient IT infrastructure for businesses... Wattle Tech offers..

Relevance: 19.824116
  • international-softwarepartners.com
  • 1
  • 2
International Software Partners provides you with the Industry-Leading Software to Enhance Interactions Across Your Digital Workplace... International Software Partners provides IT and security with complete control over your users' interactions. By..

Relevance: 19.800547
  • www.wedgenetworks.com
  • 8
  • 5
  • 12
With numerous patents and industry awards, its products are distributed through MSSP, OEM, VAR and SI partners to end customers worldwide. Wedge is an international company with offices in the North America, Asia Pacific, and the Middle East and..

Relevance: 19.774363
  • www.webappsec.org
  • 1
  • 17
The WASC Threat Classification is a cooperative effort to clarify and organize the threats to the security of a web site. The members of the Web Application Security Consortium have created this project to develop and promote industry standard..

Relevance: 19.769672