Sort solutions by

Find your solutions

Solution category
Pricing model
Market applications
Ideal organisation type
Deployment mode
159 results found
Binalyze

Binalyze AIR

Binalyze AIR is an investigation and response automation platform powered by forensic-level...

Threema GmbH
solution image

Threema Work. The Secure Business Messenger

Threema Work is a secure and GDPR-compliant business communication solution that facilitates mobile...

WALLIX Group
solution image

WALLIX PAM

WALLIX PAM is a Privileged Access Management solution that delivers robust security and oversight...
Modino.io
solution image

Modino.io - safe and secure digital artifacts delivery

Modino.io is an on-prem / cloud platform for performing safe and secure updates for: - IoT devices -...

Data-Warehouse GmbH
solution image

PCert - re:align trust - PQC, CBOM, SBOM, inventory

PCert can be used as a universal toolbox for various application scenarios and allows this with its...
Secfense
solution image

Secfense User Access Security Broker (UASB) | Switch to MFA, FIDO2 or Passkeys in 5 minutes

The Secfense User Access Security Broker streamlines the adoption of multi-factor and FIDO2...

European Digital Innovation Hub Trakia

Trakia Cyber Range

Digital Innovation Hub Trakia builds and offers free-of-charge a Cyber Range as a Service solution...

Cyber Trust Services GmbH

Cyber Trust Label

The Cyber Trust Label shows that you are a secure and trustful organisation within the supply chain...

CODE WHITE GmbH

Initial Assessment

The INITIAL ASSESSMENT (INI) simulates a real cyber attack in the form of a holistic Red Team...
Excalibur

PAM and MFA

Streamed Access Management (SAM) Excalibur’s solution builds upon and enhances the principles of...
Planck Security

Planck

Planck is the end-to-end encryption and decentralized identity management solution for your email...
Kerys Software

YS::Desktop

YS::Desktop is a local virtualization tool that targets the user workstation environment. It enable...

Want your solution to be listed above?

Become a vendor

Register as an investor

Get in touch with innovative and capital searching cybersecurity companies with market insights beyond the numbers!

Register now

Register as an end-user

Discover European cyber solutions in an easy and reliable manner with validated reviews and ratings from peers.

Register now