Companies similar to SYSSEC
Sign up to Download

1-30 of 7,029,348 results

  • www.syssec.kr
  • 1
  • 1
We are interested in security of emerging and current systems. Our research involves design/implementation of novel attacks, and developing countermeasures against such attacks. We currently focus on 1) security issues for Cyber Physical Systems..

Relevance: 23.746628
  • www.alphacomputer.rw
  • 1
  • 2
Alpha-Computer Ltd IT security services offers a complete range of cybersecurity solutions: from analysis of security issues to development of information security management systems and support of complex information security systems... ALPHA..

Relevance: 21.765574
  • goliathus.co.uk
  • 1
  • 1
Our security systems are able to repel more than 95% of constant attacks. We will take care of your peace of mind..

Relevance: 21.40392
  • y-security.github.io
  • 1
Y-Security performs Attack Simulations, Penetration Tests, and Security Trainings. Attack Simulations show realistic attacks against a company. In our Penetration Tests we perform security assessments against defined systems. In our Security..

Relevance: 21.219
  • www.micrologicnet.com
  • 1
  • 1
Compute Build Services Addressing needs for servers, storage, virtualization, and user devices... Data Security Build Services Systems that identify and thwart malicious software attacks on IT systems... Management Systems Build Services Building..

Relevance: 21.134037
  • indigosystemsnj.com
  • 1
  • 1
Indigo Systems Specializes in Premium Network Security, Systems Maintenance & Monitoring, to Protect again Malicious Attacks... We offer Innovative Merchant Service Solutions with 24/7/365 Support. Indigo Systems Specializes in Virtual Payment..

Relevance: 20.946417
  • www.udsconsultingusa.com
  • 1
  • 1
  • 1
There's no absolute way to prevent all violence (including active shooter attacks) from happening but the impact from those attacks can be mitigated with appropriate security planning, training and equipment. Our mission at Ultimate Defense Systems..

Relevance: 20.911238
  • www.bas-cert-val.com
centralization of requests for assistance following security incidents (attacks) on networks and information systems: reception of requests, analysis of symptoms and possible correlation of incidents;... treatment of alerts and response to computer..

Relevance: 20.83789
  • berryvilleiml.com
  • 4
At BIML, we believe that moving beyond "adversarial AI" and all-too-prevalent "attack of the day" approach to AI security is essential. In our view, the presence of an "adversary" is by no means necessary when it comes to design-level risks in..

Relevance: 20.81124
  • threatresq.com
  • 4
  • 2
  • 5
Threat ResQ is a pioneer in providing cybersecurity services and protecting businesses from cyber attacks. We provide a full range of solutions for any size team, from small businesses to Fortune 500 companies... We are a leading provider of IT..

Relevance: 20.601181
  • sisl.rites.uic.edu
  • 1
  • 1
  • 1
Web Security: We focus on vulnerability analysis and detection of web applications using static and dynamic code analysis, formal methods, and ideas from compilers and OSs... We conduct research on a wide range of topics on systems and Internet..

Relevance: 20.440266
  • www.6cure.com
  • 1
  • 1
6cure is an innovative company specialized in information systems security. Its experts are world-renowned for their R&D activities in the field of intrusion detection systems and reaction against cyber-attacks... 6cure provides solutions for active..

Relevance: 20.245121
  • alidanetworks.com
  • 1
  • 2
Alida Networks is a leading IT & Telecom solutions provider based in UAE. We provide superior consulting and solutions for Unified communications including voice and video systems, IT & infrastructure, Security systems, and support services... We at..

Relevance: 20.240702
  • www.honeynet.org
  • 1
  • 1
  • 6
The Honeynet Project is a leading international 501c3 non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools to improve Internet security. With Chapters around the world, our..

Relevance: 20.12762
  • www.tsa.gov
  • 12
  • 80
  • 36
On the morning of September 11, 2001, nearly 3,000 people were killed in a series of coordinated terrorist attacks in New York, Pennsylvania and Virginia. The attacks resulted in the creation of the Transportation Security Administration, designed to..

Relevance: 20.045301
  • www.002.ca
Careful attention needs to be paid to the key or password selection. Although the AES algorithm to date is not possible to crack to date (2012) - the encrypted data is not crackable itself - you can still apply cryptanalytic attacks that attempt..

Relevance: 20.014946
  • csi-africa.org
  • 1
  • 2
We are a Leading Cyber Security Institute that promotes Cyber Resilience for individuals, organizations and governments around the world. At CSI, we apply our core skills to create, design and make your solutions real... We provide Vulnerability..

Relevance: 19.979815
  • fgicorp.yourwebsitespace.com
  • 1
Cyber Security is a set of techniques that are used to protect the internet-connected systems... It can protect computers, networks, software, and data. Cyber-attacks are performed to make unauthorized access, change or destroy data, or to extort..

Relevance: 19.945173
  • verysecurelinux.com
  • 1
Horizon Network Security specializes in inexpensive Linux-based Spam and Virus filters, Server hardening, Security Audits, Adaptive Firewalls with Intrusion Detection Systems (IDSs), and Virtual Private Networks (VPNs)..... We provide 24x7..

Relevance: 19.8203
  • www.cybersecurityvulnerabilitiesservices.com
  • 1
Cybersecurity consulting services to reduce your business risk and protect your network assets. We protect you from cyber security vulnerabilities and malicious attacks. We create customized cybersecurity systems. Call today for free system..

Relevance: 19.817308
  • clydetechnology.com
  • 1
Clyde Technology are cyber security specialists providing services to businesses to help keep their systems secure... Our team can test your existing systems to identify critical vulnerabilities that leave your business open to cyber attacks...

Relevance: 19.801254
  • thecybercell.co.uk
  • 1
  • 1
The Cybercell is dedicated to safeguarding an organization's IT infrastructure and sensitive information by maintaining constant vigilance over cyber threats and promptly responding to security incidents. Our team of experts works around the clock to..

Relevance: 19.778856
  • www.tarja.com
  • 1
  • 1
Tarja GmbH is a German IT security company based in Bonn. We develop and operate special solutions for customers of the public sector and the private sector in German-speaking countries to protect IT systems and the content stored in these systems..

Relevance: 19.728546
  • www.sauronsecurity.com
  • 4
  • 1
  • 2
Sauron Security is a team of security professionals with decades of hands on international experience in designing, developing and deploying cyber security solutions for critical business systems... Sauron Security is an intelligent, active cyber..

Relevance: 19.707075
  • www.data-knight.net
  • 1
Data Knight provides consultation to companies serious about protecting their Intellectual Property..... DataKnight focuses on the development of provably secure crypto systems for hardware, embedded systems, and applications. Our research in..

Relevance: 19.658983
  • www.zhacking.net
  • 1
Our mission is to develop, train and empower IT specialists on how to deal with cyber security challenges and to carry out the most effective mitigation practices to protect companies and devices from various type of attacks... We are a team of..

Relevance: 19.588558
  • www.dcsa.mil
  • 44
  • 31
  • 25
DCSA is the largest security agency in the federal government dedicated to protecting America's trusted workforce and trusted workspaces... At DCSA, we oversee 12,500 cleared facilities under the National Industrial Security Program (NISP). We make..

Relevance: 19.481897
  • tarsipay.com
  • 1
  • 1
A Waas equipped with top security measures such as prevention against spoofing and man-in-the-middle attacks. A Waas equipped with top security measures such as prevention against spoofing and man-in-the-middle attacks. A Waas equipped with top..

Relevance: 19.479883
  • www.ixiansolutions.com
  • 2
  • 2
Ixian provide solutions covering mobile security/data loss prevention/datacentre core and remote access security systems, key datacentre infrastructure and energy management platforms to Public and Private Sector organisations... Working with you in..

Relevance: 19.400908
  • virtualstormsecurity.com
Employing techniques such as reverse engineering, fuzzing, static and dynamic code analysis, we manage to find subtle flaws which can be used to create dangerous exploits against the target systems... We provide security training to software..

Relevance: 19.255104