Blu5 takes pride in supporting digitisation teams in the challenge to reduce surface of attack, while securing core critical operations. We engineer hardware and software to address the needs of Critical Infrastructures, IoT, FinTech, BioMedical, Space & Defence. Since foundation in 2007, the Blu5 R&D team, rich of 40+ patents, has been the key enabler for generating innovative solutions.
Consortium X is comprised of a group of subject matter experts who share information about the technologies they have deployed to solve complex business security problems. Participants share intelligence on established companies and new start-ups and the emerging risks and problems they solve. As a result, the Consortium X platform maintains up-to-date lists of technologies and solution providers that can help companies quickly and effectively address a security breach or incident.
Cosive is a specialist in incident response and threat intelligence. We have expert knowledge of CSIRTs and SOCs, and we understand your pain points. We will help you optimise your processes and tools and to find the best solution for your needs.
CyberKnight Technologies is a cybersecurity focused value-added-distributor (VAD) covering the Middle East with on-the-ground presence in all key regional markets. Our ZTX (Zero Trust Security) methodology, based on the Forrester framework, incorporates emerging and market-leading cybersecurity solutions that protect the entire attack surface, by leveraging AI, threat intelligence and collective defense. CyberKnight helps security and risk teams at enterprise and government customers simplify breach detection, prevention and incident response, while addressing regulatory compliance. CyberKnight's Art of Cybersecurity Distribution methodology enables strategic partners to achieve greater market penetration, return-on-investment and time-to-value.
DeepCyber supports its customers, with an “intelligence-driven” approach, to improve their proactive detection and response "capability" of cyber threats. It is specialized in Advanced Intelligence (surface, deep and dark web), Protection and Antifraud, using a methodology oriented to "data fusion".
Deloitte’s Cyber Intelligence Centre (CIC) has been established to be your go to resource for cyber support. We offer a broad range of cyber and managed services to help you tackle the ever changing risk landscape. Whether it’s threat monitoring, threat intelligence, data protection, incident response and more, our team of specialists can help.
Devoteam delivers Innovative Technology Consulting for Business, with a unique Transformation DNA. The 7 core offers are cybersecurity, data as a service,transformation management, agile IT, digital workplace, customer experience, and business process excellence.
GRF builds, develops and connects security information sharing communities. GRF is a provider and hub for cyber, supply chain, physical and geopolitical threat intelligence exchange between information sharing and analysis centers (ISACs), organizations (ISAOs) and computer emergency readiness/response teams (CERTs) from many different sectors and regions around the world.
Ixtel is among the GCC leading information security service providers offering a wide variety of cyber security services including: managed detection and response, identity & access management, governance risk & compliance, data protection & privacy and infrastructure and cloud security. Ixtel is changing the way organizations defend against advanced threats and prevent security breaches. #ixtel CSOC service provides 24×7 security monitoring and alerting and advanced threat detection. Ixtel protects the networks, data, and applications of some of the world’s leading enterprise customers.
New Context is the security innovator for highly regulated industries. Our products and consulting services enable global leaders in energy, government and across the enterprise to prepare for security orchestration, building critical infrastructure that works with emerging technologies. New Context consultants work as high-value partners of customer security operations, building tools for CTI, security automation & orchestration and data governance.
Red River serves organizations well beyond traditional technology integration, bringing more than 20 years of experience and mission-critical expertise in security, networking, analytics, collaboration, mobility and cloud solutions.
The Financial Services Information Sharing and Analysis Center is the global financial industry's go to resource for cyber and physical threat intelligence analysis and sharing. FS-ISAC operates as a member-owned non profit entity. EclecticIQ is an affiliate member.
The Hague Security Delta (HSD) is the largest security cluster in Europe. In this Dutch cluster businesses, governments, and knowledge institutions work together on innovation and knowledge in the field of safety and security.