Sort solutions by

Find your solutions

Solution category
Pricing model
Market applications
Ideal organisation type
Deployment mode
151 results found
NRD Cyber Security
solution image

CyberSet

CyberSet is a services automation toolkit for CSIRTs or SOCs. It works as a set of technologies and...
CyberDesk

Identity-Centric Data Security

CyberDesk helps you to adaptively control who can perform what actions with what data. Covering both...
Secfense
solution image

Secfense User Access Security Broker (UASB) | Switch to MFA, FIDO2 or Passkeys in 5 minutes

The Secfense User Access Security Broker streamlines the adoption of multi-factor and FIDO2...

Sagenso
solution image

Telescope

Telescope, is an automated cybersecurity audit tool that evaluates a company's existing security...
Malizen

Malizen

Experience streamlined security data analytics with Malizen, a no-code interface that connects all...
Cryptomage
solution image

Cryptomage Cyber Eye

Cryptomage Cyber Eye™ Network Detection and Response-class network probe is much more than a simple...
Safetech Innovations
solution image

iSAM - Information Security Automation Manager

iSAM is a product developed by Safetech Innovations, in order to ensure automation in the...

Modino.io
solution image

Modino.io - safe and secure digital artifacts delivery

Modino.io is an on-prem / cloud platform for performing safe and secure updates for: - IoT devices -...

Wedos

WGP - Anycast DNS, DDoS protection, CDN

First-class protection against cyberattacks on multiple layers, and ultra-fast website content...
Corrata

Corrata MTD

Corrata provides endpoint threat detection and response for mobile. Our pioneering architecture...
Secfense
solution image

Secfense IdP (Identity Provider) | Secure, flexible and simplified identity management

Secfense IdP marks a significant advancement in cybersecurity, delivering unparalleled flexibility...

Threema GmbH
solution image

Threema Work. The Secure Business Messenger

Threema Work is a secure and GDPR-compliant business communication solution that facilitates mobile...

Want your solution to be listed above?

Become a vendor

Register as an investor

Get in touch with innovative and capital searching cybersecurity companies with market insights beyond the numbers!

Register now

Register as an end-user

Discover European cyber solutions in an easy and reliable manner with validated reviews and ratings from peers.

Register now