logo

Cyber Security Suppliers Directory


Conquest Cyber

Conquest Cyber

Our enemies are not simply amateur hackers, but highly motivated, well-funded nation states and criminal organizations. These forces covet your valuable data, want to sow chaos wherever they can, and are chartered to build a competitive advantage for our adversaries. By targeting our nation’s defense and critical infrastructure sectors, cyber attacks threaten to disrupt the way we live.

MORE INFO

Risk Based Security

Risk Based Security

Risk Based Security® (RBS) is a global leader in vulnerability intelligence, breach data and risk ratings. RBS provides actionable insight into the cybersecurity risks your organization faces, even from threat sources that are often overlooked.

MORE INFO

RSA

RSA

We empower you to embrace digital transformation and take pride in helping you manage digital risk

MORE INFO

SecurityScorecard

SecurityScorecard

SecurityScorecard is the global leader in cybersecurity ratings and the only service with millions of organizations continuously rated. 

MORE INFO

SiloBreaker

SiloBreaker

Silobreaker helps security, business and intelligence professionals make sense of the overwhelming amount of data on the web. Our mission is to build technology that tackles today’s proliferation of data. To offer products that analyse, contextualise and bring meaning to any kind of information.

MORE INFO

White Source

White Source

WhiteSource helps companies secure their software by not only detecting vulnerabilities, but also by fixing them. As the pioneer of software composition analysis (SCA), WhiteSource has been a leader in open source application security for more than 10 years, and now offers custom code security through static application security testing (SAST). 

MORE INFO

Wiz

Wiz

Wiz redefines cloud security, combining what used to be addressed by standalone CSPM and CWPP products with our innovative Cloud Risk Engine to reveal effective risk.

MORE INFO

Zenity

Zenity

Zenity is the first and only governance and security platform for low-code/no-code applications. Zenity creates a win-win environment where IT and information security can give business and pro developers the independence they want to move the business forward while retaining full visibility and control.

MORE INFO

Alyne

Alyne

At Alyne, we build the technology to help organisations navigate the complex world of cyber security, risk and regulatory compliance without slowing business down.

MORE INFO

CybelAngel

CybelAngel

Detect and resolve external threats before these wreak havoc.

MORE INFO

CyberGRX

CyberGRX

Defend Yourself Differently. With 360-degree correlated data and rich, diverse analytics to support real-time decision making, you have more insight into your third-party cyber risk surface than ever before.

MORE INFO

Cyral

Cyral

Cyral delivers enterprise data security and governance across all data services such as S3, Snowflake, Kafka, MongoDB, Oracle and more.

MORE INFO

Dataguard

Dataguard

Your company is now a data company, whether you like it or not. DataGuard helps you to process and monetise data in a way that is transparent and fully in line with the latest regulations.

MORE INFO

Digital Shadows

Digital Shadows

Digital Risk Protection Software designed to protect you from external threats, continually identifying where your assets are exposed, providing sufficient context to understand the risk, and options for remediation.

MORE INFO

Diligent Corporation

Diligent Corporation

After two decades helping boards and c-suites build strong governance practices with our market-leading board application, we are expanding our solutions to help companies connect insights from their risk, compliance and audit teams to their leaders, facilitating more purpose-driven leadership.

MORE INFO

Forgerock

Forgerock

Our mission is to create identity experiences for people at work, at home, or on the go, that are so simple and secure that two things happen

MORE INFO

Gurucul

Gurucul

Gurucul is a global cybersecurity company that is changing the way organizations protect their most valuable assets, data and information from insider threats and external cyberattacks, both on-premises and in the cloud. Gurucul’s real-time Unified Security and Risk Analytics technology delivers one platform for all cyber risks: security, identity and fraud. 

MORE INFO

Illumio

Illumio

Protect your most important data and applications with the leader in Zero Trust segmentation.

MORE INFO

Interos

Interos

Interos is the operational resilience company — reinventing how companies manage their supply chains and business relationships — through a breakthrough SaaS platform that uses artificial intelligence to model and transform the ecosystems of complex businesses into a living global map, down to any single supplier, anywhere.

MORE INFO

Intsights

Intsights

The IntSights vision is to make external intelligence instantly accessible for organizations of any type or size by synthesizing complex signals captured from across the clear, deep, and dark web into contextualized, prioritized, and actionable intelligence.

MORE INFO

Jumpcloud

Jumpcloud

JumpCloud changes the way IT administrators manage their organizations by providing a comprehensive and flexible cloud directory platform. From one pane of glass, manage user identities and resource access, secure Mac, Windows, and Linux devices, and get a full view of your environment.

MORE INFO

JupiterOne

JupiterOne

Secure your enterprise via cyber asset management. Rapidly add context to your cloud security, compliance, IAM, vulnerability management processes and more.

MORE INFO

Kenna Security

Kenna Security

A tidal wave of vulnerabilities, but you can’t fix them all. Rely on extensive threat intel and patented prioritization to cut costs, save time, and keep your teams efficiently focused on reducing the biggest risks to your business. This is Modern Risk-Based Vulnerability Management.

MORE INFO

Lepide

Lepide

Our unique combination of detailed auditing, anomaly detection, real time alerting, and real time data discovery and classification allows you to identify, prioritize and investigate threats - fast.

MORE INFO

Lumu

Lumu

Creators of the Continuous Compromise Assessment™ model. Our vision? To measure the world’s cyber-compromise by enabling any organization to continuously and intentionally measure and understand compromise to close the breach detection gap from months to minutes.

MORE INFO

Microsoft

Microsoft

Microsoft Security helps protect people and data against cyberthreats to give you peace of mind.

MORE INFO

Mitiga Solutions

Mitiga Solutions

Mitiga was founded in 2018, but before it was anything more than a dream, our founders were making their names in the industry for over 20 years, leading international conferences and publishing research articles about their risk models.

MORE INFO

Netsparker

Netsparker

Netsparker, the web application security solution that automatically verifies identified vulnerabilities, was first released on the market in 2009. 

MORE INFO

Onapsis

Onapsis

Onapsis doesn't just provide business-critical application security. We provide confidence. By safeguarding your company at its core, the applications you depend on each and every day will be secure, compliant and available. 

MORE INFO

OneTrust

OneTrust

OneTrust is the #1 fastest-growing company on Inc. 500 and the category-defining enterprise platform to operationalize trust. 

MORE INFO

OnSpring

OnSpring

The best result of centralized visibility is faster collaboration at scale, especially for governance, risk and compliance (GRC) & IT service management (ITSM).

MORE INFO

Ordr

Ordr

Secure all connected devices --- from traditional devices like workstations, servers, PCs and tablets to newer and more vulnerable loT, IoMT and OT devices, in any industry and for a wide range of use cases.

MORE INFO

Pindrop

Pindrop

Our mission is to provide security, identity and trust on every voice interaction

MORE INFO

PKWare

PKWare

PK Protect is the most comprehensive enterprise data protection suite ever created, allowing businesses to eliminate security gaps, take control of sensitive data and meet the most stringent data compliance requirements.

MORE INFO

Proofpoint

Proofpoint

Proofpoint protects your people, data and brand against advanced threats and compliance risks.

MORE INFO

Qualiware

Qualiware

With our Enterprise Architecture and Business Management tool, QualiWare X, we are helping you evolve and transform your organization with smart management and intelligent collaboration to bridge the gap between strategy and execution, the easy way.

MORE INFO

Rapid7

Rapid7

We remove the barriers that make cybersecurity complex and overwhelming. Our expert-built technology gives protectors a smooth path to securing their business and reducing the compliance challenge. 

MORE INFO

Resilinc

Resilinc

Resilinc is where the world’s top companies connect with their suppliers to build resilience. We expose the most vulnerable geographic hotspots, the single points of failure and the “diamond shaped supply chain”.

MORE INFO

Responsum

Responsum

A key component of privacy and security programs is awareness. Creating a culture that is resilient against security threats and where privacy is upheld, will help you to meet regulatory requirements.

MORE INFO

Sailpoint

Sailpoint

As technology continues to bring more users, applications and data together, these connections also bring more vulnerability.

MORE INFO

Viclarity

Viclarity

ViClarity is an award-winning provider of governance, risk and compliance (GRC) management software solutions for highly regulated industries, such as healthcare, insurance and financial services. Organisations of all sizes utilize our GRC tools to enhance and automate their risk and compliance processes. A technology-centric organisation with a legacy focus on making GRC easier, ViClarity serves organisations in multiple industries.

MORE INFO

WSO2

WSO2

WSO2 solutions give enterprises the flexibility to deploy applications and services on-premises, on private or public clouds, or in hybrid environments and easily migrate between them as needed. 

MORE INFO