Sort solutions by

Find your solutions

Solution category
Pricing model
Market applications
Ideal organisation type
Deployment mode
110 results found
CyberDesk

Identity-Centric Data Security

CyberDesk helps you to adaptively control who can perform what actions with what data. Covering both...
Safetech Innovations
solution image

iSAM - Information Security Automation Manager

iSAM is a product developed by Safetech Innovations, in order to ensure automation in the...

Binalyze

Binalyze AIR

Binalyze AIR is an investigation and response automation platform powered by forensic-level...

HarfangLab

Endpoint Security HarfangLab

HarfangLab endpoint security solutions are made in Europe. Designed to detect and respond to...
Sekoia.io

Sekoia Defend

Sekoia Defend (Next-Gen SIEM) is an eXtended Detection and Response (XDR) SOC platform available in...

Modino.io
solution image

Modino.io - safe and secure digital artifacts delivery

Modino.io is an on-prem / cloud platform for performing safe and secure updates for: - IoT devices -...

Secfense
solution image

Secfense IdP (Identity Provider) | Secure, flexible and simplified identity management

Secfense IdP marks a significant advancement in cybersecurity, delivering unparalleled flexibility...

Secfense
solution image

Secfense User Access Security Broker (UASB) | Switch to MFA, FIDO2 or Passkeys in 5 minutes

The Secfense User Access Security Broker streamlines the adoption of multi-factor and FIDO2...

European Digital Innovation Hub Trakia

Trakia Cyber Range

Digital Innovation Hub Trakia builds and offers free-of-charge a Cyber Range as a Service solution...

Cyber Trust Services GmbH

Cyber Trust Label

The Cyber Trust Label shows that you are a secure and trustful organisation within the supply chain...

Cyberhoney Ltd.
solution image

Showcase solution #1

This is the summary of our revolutionary company. We provide affordable mobile security for Apple...
Data-Warehouse GmbH
solution image

PCert - re:align trust - PQC, CBOM, SBOM, inventory

PCert can be used as a universal toolbox for various application scenarios and allows this with its...

Want your solution to be listed above?

Become a vendor

Register as an investor

Get in touch with innovative and capital searching cybersecurity companies with market insights beyond the numbers!

Register now

Register as an end-user

Discover European cyber solutions in an easy and reliable manner with validated reviews and ratings from peers.

Register now