Find the best cyber services for you with Jenny

Sort by:

V-Key is a global leader in software based digital security, and is the inventor of V-OS, the world's first virtual secure element. FIPS 140-2 Validated and accredited by IMDA, V-Key's Security, Authorization, and Verification solutions are used widely across banking and government mobile and digital platforms across the region.

Ipsidy Inc. (www.ipsidy.com), formerly known as ID Global Solutions Corporation [OTC: IDGS], (“Ipsidy” or the “Company”) a provider of secure, biometric identification, identity management and electronic transaction processing services, is pleased to announce the following changes as part of a reorganization of the Company.

Cisco enables people to make powerful connections providing easy access to information anywhere, at any time. Cisco was founded in 1984 by a small group of computer scientists from Stanford University. Since the company's inception , Cisco engineers have been leaders in the development of Internet Protocol (IP)-based networking technologies. Today, with more than 71,000 employees worldwide, this tradition of innovation continues with industry-leading products and solutions in the company's core development areas of routing and switching, as well as in advanced technologies such as home networking, IP telephony, optical networking, security, storage area networking, and wireless technology. In addition to its products, Cisco provides a broad range of service offerings, including technical support and advanced services. Cisco sells its products and services, both directly through its own sales force as well as through its channel partners, to large enterprises, commercial businesses, service providers, and consumers.

ImageWare Systems stands out as a leader in cutting-edge, identity management solutions driven by biometric technology. We deliver next-gen biometrics as an interactive and scalable cloud-based solution. We combine cloud and mobile technology to offer multi-factor authentication for smartphone, tablet, and desktop users. Our solutions provide multi-modal biometric authentication, using voice, fingerprint, facial recognition, our own patented software algorithms, and partnerships with leading multi-factor identification proofing providers.

TrueCyber has been formed to help customers navigate the increasingly complex world of cyber security. With over 1200 vendors in the market today it is becoming harder to determine which solutions provide the most value for your business. This is where TrueCyber can help.

At Terbium Labs, we know that sensitive data will always be at risk. That’s why we developed Matchlight, the world’s first fully private, fully automated Dark Web Data Intelligence System. We monitor the dark web for your private data fingerprints and notify you immediately if even a trace of your information shows up where it shouldn’t. With fingerprint monitoring and automated tracking for key terms and patterns, such as email addresses or payment card numbers, we can monitor your sensitive assets like customer and employee information and financial data without you having to reveal any information to us. Let us help reduce the risk of inevitable data exposure.

iovation protects online businesses and their end users against fraud and abuse, and identifies trustworthy customers through a combination of advanced device identification, shared device reputation, device-based authentication and real-time risk evaluation.

Guardian Analytics are the first fraud prevention solution to use behaviour-based anomaly detection. To complement our expertise in behavioural analytics, we actively study fraudsters techniques to make sure we're always one step ahead. We are also the only solution that automatically and immediately protects 100 percent of users and account holders against all types of threats and schemes, and dynamically adapts to new attacks and changes in legitimate user behaviour. In addition to fraudulent payments, we detect account takeover, reconnaissance, and fraud set-up activity that indicate possible criminal activity in the early stages of an attack so our customers can proactively intervene before there's any money movement. And we do it all without rules and without disrupting users normal activity or process.

Sepio Systems’ mission is to protect critical infrastructure against threats on their supply chains. Malicious groups are poisoning the chain between the vendors and the end customers with infected components, modules and systems. The available physical and cyber security solutions against threats coming through the conventional interfaces of organizations to the world became better, stronger and more resilient; thus pushing these criminals to look for new attack vectors such as attacks on supply chains.

And this is no small feat. Our ambition is to enable a secure and trusted environment for citizens and consumers alike to perform their daily critical activities (such as pay, connect, travel or access public or private spaces), in the real as well as digital worlds. Today, information travels rapidly around the digitized space, defying boundaries and breaking the traditional codes of security. Our goal is to provide end-to-end solutions enabling convenience and a frictionless experience whenever and wherever security matters. Being a leader means staying on top of the disruptive innovations that impact our security landscape. We understand the need to secure people in both their physical and digital worlds, especially as connectivity growth will keep fostering more and more digital services. We know that in our globalized society, the number of peer-to-peer exchanges, travel and border crossings are exploding. We are aware that the digitalization of the economy brings about a wave of new business models and opportunities to reinvent the customer journey where data, security and privacy have an essential role to play. We are also mindful of the consumerization of technology and how it impacts our identity and private life.

Decipher Cyber 2024 All Rights Reserved.

Privacy policy Cookie policy

Designed and developed by Decipher Cyber Tech Team