ensun logo
Locations
Company type
Result types
Industries
Employees
Founding year
background

Top Cyber Security Companies in Italy

The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers

Close

Filter

Result configuration


Continents


Locations


Result types


Company type


Industries


Company status

Number of employees

to

Founding year

to

Clear filters

60 companies for Cyber Security in Italy

Sort by:

Relevance

CyLock's Logo

CyLock

Rome, Italy

B

1-10 Employees

2020

Key takeaway

CyLock Tech offers comprehensive cyber security services, including anti-hacker and anti-phishing solutions that utilize AI to simulate targeted attacks and test employee awareness. Their patented methods ensure rigorous penetration testing and vulnerability assessment, essential for enhancing organizational resilience against cyber threats.

Reference

Service

Cyber security services - Cylock Tech

Cylock Tech provides cyber security services: anti-hacker, anti-phishing, data breach security plans and VAPT for ISO 27001 certifications

Certego's Logo

Certego

Italy

B

11-50 Employees

2013

Key takeaway

Certego is a specialized Italian provider of Managed Detection & Response (MDR) services, focusing on Cyber Threat Intelligence and Incident Response Operations to combat Cyber Crime. Their team, equipped with advanced certifications and utilizing the PanOptikon® Security Orchestration Platform, is dedicated to automating threat detection and response processes, ensuring real-time awareness of potential threats.

Reference

Core business

About Us

Industrial Cyber Security's Logo

Industrial Cyber Security

Italy

B

11-50 Employees

2011

Key takeaway

The company specializes in providing advanced, next-generation managed threat detection and incident response services, focusing on safeguarding organizations from emerging cyber threats and ensuring regulatory compliance. With over two decades of experience in CyberSecurity, their team offers tailored strategies and effective solutions to enhance security management.

Reference

Core business

Home - ICS

In the new digital era, no more “business-as-usual” is allowed. CyberSecurity is a standard every company needs to ensure.

Looking for more accurate results?

Find the right companies for free by entering your custom query!

25M+ companies

250M+ products

Free to use

Cyberment Srl's Logo

Cyberment Srl

Milan, Italy

B

51-100 Employees

2019

Key takeaway

Cyberment is dedicated to enhancing the cybersecurity experience for businesses, offering expertise to ensure the safe use of IT technologies. Their services focus on risk management and regular monitoring of IT infrastructures, providing clients with a sense of protection and security.

Reference

Core business

Cyberment Srl - Cyber Security Company - Azienda Cybersecurity

Cyberment Srl | Soluzioni cyber security e Cyber Advising per aziende italiane. Il tuo consulente personale di sicurezza informatica.

CR1PT0's Logo

CR1PT0

Roncoferraro, Italy

B

1-10 Employees

2015

Key takeaway

The CR1PT0 project, established in 2015, is dedicated to enhancing cyber security through cryptography and advanced defense systems. With a commitment to open source, CR1PT0 positions itself as a key player in the global cyber security landscape.

Reference

Core business

COMPANY - CR1PT0 - CYBER SECURITY

Cyber Security Company. We are based in Mantua. We operate all over the world.

CY4GATE's Logo

CY4GATE

Rome, Italy

B

51-100 Employees

2014

Key takeaway

CY4GATE is a key player in cyber security and cyber intelligence, providing solutions that address the needs of law enforcement and security agencies. Their participation in events like Mid&Small | London 2024 highlights their commitment to advancing cyber resilience and electronic warfare capabilities.

Reference

Product

CYBER INTELLIGENCE | CY4GATE S.p.A.

Shielder's Logo

Shielder

Pinerolo, Italy

B

11-50 Employees

2014

Key takeaway

Shielder is an IT consulting firm that specializes in cybersecurity, offering tailored IT security services, including highly specialized Red Teaming and Network Penetration Testing. Their commitment to continuous skill growth ensures they effectively address evolving security challenges.

Reference

Service

Shielder - Network Security

Shielder provides highly specialized Red Teaming services by simulating various scenarios, starting from 0-knwoledge ones to assumed breach. The Network Security spectrum is covered by providing the Network Penetration Test service too.

Onorato Informatica Srl's Logo

Onorato Informatica Srl

Porto Mantovano, Italy

B

11-50 Employees

2006

Key takeaway

Onorato Informatica offers 24/7 SOC as a service, providing managed cybersecurity services and proactive defense for businesses. They have been protecting clients from cyber attacks since 2006, with a focus on network security, endpoint protection, and data security.

Reference

Core business

Onorato Informatica Srl | Sicurezza Informatica per aziende

Sicurezza Informatica per aziende SOC as a service attivo 24/7 Servizi cybersecurity gestiti e difesa proattiva delle aziende. Proteggiamo i nostri clienti dagli attacchi informatici dal 2006. CONTATTACI Sei sotto attacco informatico? Contattaci ORA La nostra sicurezza informatica parte da qui. Security Operations Center Un intero SOC

SecurityGen's Logo

SecurityGen

Rome, Italy

B

51-100 Employees

2022

Key takeaway

SecurityGen is dedicated to telecom cybersecurity, providing robust solutions to help network owners secure their digital transformations. With a focus on 5G network security and innovative platforms like their intrusion detection system, SecurityGen ensures comprehensive protection against evolving threats.

Reference

Core business

Telecom network security solutions - SecurityGen

Sababa Security's Logo

Sababa Security

Pero, Italy

B

11-50 Employees

2019

Key takeaway

Sababa Security is an Italian solutions integrator that offers a comprehensive approach to cybersecurity, combining various security technologies, managed services, and training to safeguard both IT and OT infrastructures from a range of threats.

Reference

Product

Sababa Virtual CISO - Sababa Security

Sababa Security is an Italian cybersecurity vendor, that provides security products, training, and managed services to protect IT/OT networks


Related searches for Cyber Security

Technologies which have been searched by others and may be interesting for you:

Products and services for Cyber Security

A selection of suitable products and services provided by verified companies according to your search.

Product: Text Anonymization Service

Product

Text Anonymization Service

Go to product

Product: Security Consultant

Service

Security Consultant

Go to product

Product: Product Security

Service

Product Security

Go to product

Product: enclaive vHSM

Product

enclaive vHSM

Go to product


Use cases around Cyber Security

A selection of suitable use cases for products or services provided by verified companies according to your search.

UseCase: Cybersecurity

Use case

Cybersecurity

All

Cybersecurity is the act of protecting your digital assets against bad actors attack. This is a vast field which starts by identifying the risk in your industry and mitigating these risks on the best of your ability. There is always the probability that a bad actor will penetrate your defense system, in that case you should have in place a response plan. Are your digital assets protected?

UseCase: Managed Firewall für ein öffentliches Unternehmen – NIS2-Compliance gewährleistet

Use case

Managed Firewall für ein öffentliches Unternehmen – NIS2-Compliance gewährleistet

Public Sector

Herausforderung: Ein öffentliches Versorgungsunternehmen steht vor der Aufgabe, seine IT-Infrastruktur gegen wachsende Cyberbedrohungen abzusichern und gleichzeitig die Vorgaben der NIS-Richtlinie (Network and Information Security) zu erfüllen. Die internen IT-Ressourcen reichen nicht aus, um die Anforderungen an kontinuierliche Überwachung, Aktualisierungen und Protokollierung zu bewältigen. Lösung: Mit der Managed Firewall von bytehaus wird die Sicherheitsinfrastruktur des Unternehmens auf den neuesten Stand gebracht. Bytehaus analysiert die Netzwerkarchitektur und implementiert eine maßgeschneiderte Firewall-Lösung, die den strengen Anforderungen der NIS-Richtlinie entspricht.

UseCase: Managed Firewall für ein Unternehmen mit 10 Mitarbeitern – Prävention nach früherem Hackerangriff

Use case

Managed Firewall für ein Unternehmen mit 10 Mitarbeitern – Prävention nach früherem Hackerangriff

Supplier

Herausforderung: Ein mittelständisches Unternehmen mit 10 Mitarbeitern wurde vor einigen Jahren Opfer eines Hackerangriffs, bei dem sensible Daten gestohlen und der Betrieb erheblich beeinträchtigt wurden. Seitdem besteht ein hohes Sicherheitsbewusstsein, jedoch fehlen die internen Ressourcen, um die IT-Sicherheit auf dem aktuellen Stand zu halten und neue Bedrohungen abzuwehren. Lösung: Mit der Managed Firewall von Bytehaus erhält das Unternehmen eine umfassende Sicherheitslösung, die speziell auf kleine Unternehmen mit begrenzten IT-Ressourcen zugeschnitten ist. Bytehaus übernimmt die Implementierung, Verwaltung und Überwachung der Firewall, sodass das Unternehmen vor zukünftigen Angriffen optimal geschützt ist.

UseCase: Protecting Critical Infrastructure from Cyber Threats

Use case

Protecting Critical Infrastructure from Cyber Threats

KRITIS, Critical Infrastructure, Industries with Sensitive Data, Healthcare, Energy, Gov, Supplier

Operators of critical infrastructure such as energy, water, transportation, and healthcare are prime targets for cyberattacks. Many industrial control systems (ICS) and SCADA environments sometimes rely software that is difficult to patch, while strict regulatory requirements like NIS2 and BSI-KritisV demand enhanced security measures. Labyrinth uses specialized SCADA and OT decoys to simulate real industrial control systems, misleading attackers and capturing their activity without impacting operational performance. This ensures early threat detection, supports regulatory compliance with detailed forensic reporting, and protects against APTs and ransomware targeting critical systems.

UseCase: Protecting SMEs Against Targeted Cyber Attacks

Use case

Protecting SMEs Against Targeted Cyber Attacks

SME, all

Small and medium-sized enterprises (SMEs) often have limited IT resources and no dedicated Security Operations Center (SOC). They are particularly vulnerable to ransomware, phishing attacks, and data theft as traditional security systems like firewalls or antivirus software fail to counter modern threats. Labyrinth provides an easy-to-implement and cost-efficient deception technology that lures attackers into simulated IT environments, enabling threat detection up to 12 times faster before real damage occurs. This proactive approach reduces false positives, minimizes downtime, and ensures effective cybersecurity without requiring additional IT staff or high costs.

UseCase: Reducing SOC Workload in Large Enterprises

Use case

Reducing SOC Workload in Large Enterprises

Enterprise, all

Security teams in large enterprises face an overwhelming number of security alerts, including many false positives, making it difficult to detect and respond to advanced persistent threats (APTs). Labyrinth deploys highly realistic decoys within corporate networks, attracting and identifying attackers before they can infiltrate critical systems. By providing detailed forensic insights and attack timelines, Labyrinth helps SOC teams focus on real threats, reduces alert fatigue, and seamlessly integrates with existing SIEM, EDR, and firewall solutions for automated defense.

UseCase: Cybersecurity

Use case

Cybersecurity

All

Cybersecurity is the act of protecting your digital assets against bad actors attack. This is a vast field which starts by identifying the risk in your industry and mitigating these risks on the best of your ability. There is always the probability that a bad actor will penetrate your defense system, in that case you should have in place a response plan. Are your digital assets protected?

Information about Cyber Security in Italy

When exploring the Cyber Security industry in Italy, several key considerations emerge. A significant factor is the regulatory landscape, which is influenced by both European Union directives, such as the General Data Protection Regulation (GDPR), and national laws that mandate data protection and breach notification. Companies must navigate these regulations to ensure compliance and avoid substantial fines. The competitive landscape in Italy is growing, with a mix of established firms and emerging startups focusing on various aspects of cybersecurity, including threat detection, incident response, and vulnerability management. The demand for skilled professionals is high, and there is a notable skills gap that presents opportunities for training and development within the sector. Challenges include the increasing sophistication of cyber threats and the necessity for continuous innovation to stay ahead of potential attacks. Environmental concerns are also relevant, as companies must consider the sustainability of their operations in an era where energy consumption is scrutinized. Finally, the global market relevance cannot be overlooked; Italy's position within the EU allows companies to tap into broader markets while addressing local needs. This combination of regulatory awareness, competitive dynamics, and skill development offers a comprehensive foundation for those interested in pursuing a career or investment in Italy's cybersecurity sector.


Insights about the Cyber Security results above

Some interesting numbers and facts about your company results for Cyber Security

Country with most fitting companiesItaly
Amount of fitting manufacturers79
Amount of suitable service providers75
Average amount of employees11-50
Oldest suiting company2006
Youngest suiting company2022

Frequently asked questions (FAQ) about Cyber Security Companies

Some interesting questions that has been asked about the results you have just received for Cyber Security

Based on our calculations related technologies to Cyber Security are Space Technologies, Military, Commercial Aviation, Airport Security

The most represented industries which are working in Cyber Security are IT, Software and Services, Other, Telecommunications, Consulting, Defense

ensun uses an advanced search and ranking system capable of sifting through millions of companies and hundreds of millions of products and services to identify suitable matches. This is achieved by leveraging cutting-edge technologies, including Artificial Intelligence.

Cyber Security results by various countries

Related categories of Cyber Security