Companies similar to ICCAD
Sign up to Download

1-30 of 6,924,045 results

  • zerotrustworkshopiccad.github.io
  • 1
  • 18
In recent times, there has been a major push and urgency to adopt the zero-trust model for cybersecurity. The zero trust model is based on the principle of "never trust, always verify" and is aimed at eliminating all implicit trust in a system. While..

Relevance: 20.10092
  • cvcloudin.computervault.com
ComputerVault is a Single Platform Solution that includes Virtual Desktops & Servers, Hyper-converged Infrastructure, Virtual Networking and a Software-Defined WAN. Built-in Cybersecurity provides a Software Defined Perimeter with a Zero Trust..

Relevance: 19.013065
  • www.kralcon.com
  • 1
  • 1
TMW Gov IT is a strategic partner to the world's most recognized IT brands. Our lasting relationships with leading technology providers enable our clients to access the most effective solutions to meet their needs... TMW Gov IT provides professional..

Relevance: 18.947187
  • kumori.systems
  • 1
  • 1
Kumori PaaS is a platform that is committed to security and quality, including mechanisms to offer a zero trust networking model and tools to easily integrate with any CI/CD flow... Kumori Systems a cloud computing technology provider. Simplify and..

Relevance: 18.663157
  • www.apftechnologies.com
  • 2
  • 5
APF Technologies is located in 1871 Chicago, one of country's greatest start-up incubators. If you are visiting Chicago and find yourself in the neighborhood, stop by and have a chat... The National Security Agency (NSA), with its eyes, ears, and..

Relevance: 18.436382
  • zerosuicide.edc.org
  • 14
  • 13
A vital next step was to better define the model by creating a robust online Zero Suicide Toolkit SM with guidance through readings, tools, and multimedia. Since 2014, ZeroSuicide.com has been an evolving source of free implementation resources and..

Relevance: 18.136345
  • option3.com
  • 10
The rise of the cloud, mobility and remote working (especially post-COVID) combined with heightened attacks by nation states, bad actors getting access inside the network perimeter has rendered the model of cybersecurity based around networks and..

Relevance: 18.135769
  • openziti.github.io
OpenZiti is a free and open source project focused on bringing zero trust networking principles directly into any application. The project provides all the pieces required to implement a zero trust overlay network and provides all the tools necessary..

Relevance: 18.085886
  • zerosuicide.edc.org
  • 14
  • 1
  • 13
Zero Suicide is a quality improvement model that transforms system-wide suicide prevention and care to save lives... Implementation of the Zero Suicide model requires transformative change that cannot be borne solely by the practitioners providing..

Relevance: 18.07429
  • www.logisticazed.it
Zed is a new logistics model at zero emission (CO2). Zero impact solution for FMCG distribution in LTZ areas of Rome...

Relevance: 18.027945
  • www.ztalab.xyz
ZTALAB is a research and open source organization for zero trust architecture. We will gradually open source the projects we have incubated and ongoing projects to make our contribution to the zero-trust ecosystem. If you are also interested, or have..

Relevance: 17.815243
  • www.hackbunker.com
The magic of Zero Trust is most obvious when applied to API's. Rather than providing direct access to the API over the public internet, we provide a zero trust network overlay which makes it invisible to hackers and accessible to authenticated..

Relevance: 17.685379
  • payfai.com
The Zero Trust security model enables a mobile and remote workforce to securely connect to company resources from virtually anywhere. Devices are vetted before being granted access to company resources. Companies can use tight, granular controls to..

Relevance: 17.498205
  • www.cyberopsalliance.com
With the growing presence and sophistication of online threats like viruses, ransomware, and phishing scams, it's important to have the right protection. Cyber Ops Alliance - is a consortium (or alliance) of companies to solve today's problems with..

Relevance: 17.207607
  • www.typingdna.com
  • 4
  • 27
Continuous Authentication is a security shift from the old model of "Periodic Authentication" where users were only authenticated once to access the network, to a "Zero Trust" model where users are continuously authenticated during their entire..

Relevance: 17.18817
  • sechard.com
  • 13
  • 1
  • 8
In 2019, SecHard established by cyber security veterans with academic backgrounds to provide security hardening solutions. In 2020, the first information security company of Turkey, Nebula acquired SecHard and created a new vision about Zero Trust.....

Relevance: 17.10698
  • www.modelsteel.com
  • 2
  • 2
  • 1
Model Steel is the 1st re-rolling mills in Pakistan, which provide production visit opportunity. Model Steel the re-rolling steel mill is a total customer care company therefore we have the strongest customer awareness program about Steel bars. Our..

Relevance: 17.017952
  • www.igel.com
  • 6
  • 17
  • 13
IGEL is a transformative, secure enterprise endpoint OS designed for SaaS, DaaS and VDI environments. Seamless to manage and a great user experience, IGEL OS dramatically reduces endpoint cost of ownership and helps organizations achieve..

Relevance: 16.954845
  • criticalinfrastructuredefense.org
  • 1
To address this threat, leading Zero Trust cyber security providers have partnered to launch the Critical Infrastructure Defense Project. Our goal is to quickly improve the cyber readiness of vulnerable infrastructure in US critical industries-..

Relevance: 16.730742
  • zerotrustroadmap.org
  • 1
Open inbound network ports can be found using scanning technology and are a common attack vector. Zero Trust Reverse Proxies allow you to securely expose a web application without opening any inbound ports. The DNS record of the application is the..

Relevance: 16.6694
  • zerotrustroadmap.org
  • 1
This roadmap was built by security experts to provide a vendor agnostic Zero Trust architecture and example implementation timeline. The timeline assumes that an organization is beginning their Zero Trust journey from scratch, but is meant to be..

Relevance: 16.646137
  • diode.cloud
What We Offer We enable secure Zero-Trust API access and billing for enterprises and companies who want to benefit from the Cloud speed and security... Zero Trust enables enterprise delivery without the pain of clients or servers or appliances...

Relevance: 16.631878
  • diode.cloud
Zero Trust enables enterprise delivery without the pain of clients or servers or appliances. Cloud Diodes leverages partners' Zero Trust solutions for API access... What We Offer We enable secure Zero-Trust API access and billing for enterprises and..

Relevance: 16.631878
  • www.eversafe-recovery.com
EverSafe's Zero Trust Backup and Disaster Recovery Services integrate your on-premise Veeam environment with EverSafe's Secure Cloud Infrastructure providing zero trust connectivity with fully supported robust replication and failover capabilities..

Relevance: 16.540846
  • www.ditno.com
  • 1
In as little as four weeks, ditno can help you gain total visibility while building a fully governed zero trust network... Combining real-time network governance and micro-segmentation is a huge step towards a secure environment. With the right..

Relevance: 16.478962
  • www.illumio.com
  • 6
  • 6
  • 16
Illumio, the Zero Trust Segmentation company, stops breaches and ransomware from spreading across the hybrid attack surface... In this time of increasing ransomware and cybercrime, Illumio provides the only proven segmentation product suite purpose-..

Relevance: 16.286655
  • procella.tech
  • 1
  • 2
The team at Procella are Zero Trust experts. We help enterprises develop Zero Trust and SASE strategies to bring their cyber security up to date... Follow <a href="https://micro.blog/procella">@procella on Micro.blog</a>...

Relevance: 16.242994
  • sub-zero-appliance-repair-company.com
  • 1
  • 2
  • 1
Sub Zero Appliance Repair Company is the best choice when it comes to the most reliable experts for your Sub-Zero appliance repair needs. Whatever the issue is, no matter the model and type, we can fix it!... We aim to provide the highest standard..

Relevance: 16.188526
  • www.zerotrustmaturity.com
  • 1
Zero Trust is a relatively new security paradigm which goes beyond the traditional defense-in-depth perimeter-based strategy and treats all communications and resource requests as initially untrusted and requiring continuous verification before..

Relevance: 16.089882
  • cybercyte.com
  • 9
CyberCyte is a UK-based cybersecurity company offering an innovative SaaS platform, CloudCyte, to empower organizations and MSSP's for providing solutions to the emerging challenges in cybersecurity... CloudCyte is an MDR platform for threat-hunting..

Relevance: 16.017355