The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers
Close
Filter
Result configuration
Continents
Select continent
Locations
Result types
Company type
Select company type
Industries
Select industry
Company status
Select company status preset
Number of employees
Min.
Max.
Founding year
ESYSCO
Środa Wielkopolska, Poland
B
11-50 Employees
2013
Key takeaway
ESYSCO offers innovative cryptographic solutions, specializing in areas like e-mail encryption that ensure the highest level of security for sensitive data. Their centralized, policy-based e-mail encryption services provide robust protection for vital communications.
Reference
Product
Secure E-mail Communication - ESYSCO
The messages are fully encrypted At Esysco, we help you to protect your most vital communication channel design and implementation of centralised, easy to use and policy-based e-mail encryption solutions. Centralised E-mail Encryption
ENIGMA SYSTEMY OCHRONY INFORMACJI SP Z O O
Warsaw, Poland
B
251-500 Employees
2003
Key takeaway
ENIGMA has nearly 30 years of experience in ensuring the security of information systems critical for both government and business operations. The company focuses on designing and implementing complex IT systems, particularly in the areas of information protection, authentication, electronic signatures, biometrics, and identity management.
Reference
Core business
Enigma | SOI - Enigma
ENIGMA Systemy Ochrony Informacji | Bezpieczne państwo, bezpieczne instytucje, bezpieczny obywatel | Znajdź rozwiązanie dla swojego sektora.
PREBYTES
Leżajsk, Poland
B
11-50 Employees
2009
Key takeaway
PREBYTES specializes in cybersecurity solutions that effectively protect confidential data and prevent fraud, making it a crucial element for businesses, financial institutions, and government organizations. With over 15 years of experience, they provide powerful security measures that ensure compliance with legal regulations and offer immediate support for incident management.
Reference
Core business
PREBYTES | Cybersecurity for Business - Effective protection against hacker attacks
Since 2009, we have been providing cybersecurity to companies worldwide. Protecting confidential data, preventing fraud, managing incidents, and protecting brands.
Looking for more accurate results?
Find the right companies for free by entering your custom query!
25M+ companies
250M+ products
Free to use
Concept Data
Warsaw, Poland
B
11-50 Employees
2016
Key takeaway
Concept Data specializes in developing and implementing IT solutions that enhance enterprise management while ensuring compliance with security standards. Their experience across various sectors, including banking and telecommunications, underscores their commitment to effective security policy management.
Reference
Product
Security policy management | Concept Data
Specfile.pl
Poland
B
1-10 Employees
2015
Key takeaway
Specfile offers a user-friendly application for data encryption, allowing you to protect confidential files and documents with just one click. It ensures the security of various types of data, including invoices and medical documentation, in compliance with GDPR requirements.
Reference
Core business
Szyfrowanie danych: plików, folderów, PDF, zabezpieczanie folderów hasłem - Specfile
Podnieś poziom bezpieczeństwa plików i folderów jednym kliknięciem. Specfile to prosta aplikacja do szyfrowania Twoich dokumentów i dokumentów Twojej firmy
Up Secure
Poland
B
1-10 Employees
2016
Key takeaway
The company offers a range of privacy and data protection services, including auditing and privacy engineering, which are essential for data encryption and security. Their expertise in information security and compliance helps businesses enhance their resilience against data breaches.
Reference
Core business
Discover Why Up Secure Is a Great Choice for Your Business
We specialize in personal data protection, information security and software engineering for business.
ResQuant
Łódź, Poland
B
1-10 Employees
2020
Key takeaway
The company's FPGA-based Trusted Platform Modules and Cryptography Accelerator IP Core focus on post-quantum encryption and secure architecture for electronic devices, ensuring data security in the age of quantum computing.
Reference
Core business
ResQuant - Stay secure in the era of quantum computers
Post-quantum encryption and secure architecture for electronical devices
AVET Information and Network Security Sp. z o.o.
Warsaw, Poland
B
11-50 Employees
1997
Key takeaway
The company emphasizes its expertise in cybersecurity, risk management, and compliance, which are crucial for securing data and ensuring it meets regulatory requirements. With over 21 years of experience, they support organizations in developing and delivering secure software, thereby fostering innovation while maintaining trust with customers.
Reference
Core business
AVETINS
DCD-SEMI Sp. z o.o. Sp. k.
Bytom, Poland
B
11-50 Employees
1999
Key takeaway
DCD-SEMI specializes in innovative IP cores and has developed the DAES cryptographic co-processor, which provides FIPS 197 compliant Advanced Encryption Standard (AES) acceleration. This hardware implementation of AES enhances security and performance, making it a vital solution for various applications, from IoT devices to cloud servers.
Reference
Product
DAES - DCD-SEMI
DAES bridge to APB, AHB, AXI bus, it is a cryptographic co-processor which implements Rijndael encryption algorithm compliant with FIPS 197 Advanced Encryption Standard. AES is a widely deployed block cipher in security solutions from IoT devices to cloud servers. Its implementation in hardware brings significant benefits on fields of security and performance over software […]
Elitmind
Warsaw, Poland
B
51-100 Employees
2015
Key takeaway
Elitmind specializes in data reporting and analytics services, emphasizing the protection of sensitive company data through their expertise in Microsoft cloud technology. Their advanced specialization in analytics on Microsoft Azure highlights their capability to deliver tailored solutions that enhance data security and usage as a competitive advantage.
Reference
Service
SENSITIVE DATA LEAKAGE PREVENTION - Elitmind
Technologies which have been searched by others and may be interesting for you:
A selection of suitable products and services provided by verified companies according to your search.
Product
enclaive vHSM
Go to product
When exploring the Data Encryption industry in Poland, several key considerations are essential for informed decision-making. Poland's regulatory landscape is heavily influenced by the European Union's General Data Protection Regulation (GDPR), which mandates stringent data protection measures and impacts how companies handle encryption. Understanding compliance with these regulations is crucial for businesses operating in this field. The competitive landscape includes both local and international players, with various startups emerging in response to growing cybersecurity threats. The demand for robust encryption solutions is increasing due to the rise in data breaches and cyberattacks, presenting significant opportunities for growth and innovation. However, challenges such as the rapid pace of technological advancements and the need for continual adaptation to evolving threats must be addressed. Additionally, environmental concerns related to energy consumption in data centers and the manufacturing of encryption technologies are gaining attention. Companies focusing on sustainable practices may have a competitive edge. Poland's strategic location within Europe also enhances its relevance in the global market, allowing for collaboration and expansion opportunities across borders. Thus, a thorough understanding of regulations, competition, and market dynamics is vital for anyone interested in the Data Encryption industry in Poland.
Some interesting numbers and facts about your company results for Data Encryption
Country with most fitting companies | Poland |
Amount of fitting manufacturers | 26 |
Amount of suitable service providers | 21 |
Average amount of employees | 11-50 |
Oldest suiting company | 1997 |
Youngest suiting company | 2020 |
Some interesting questions that has been asked about the results you have just received for Data Encryption
What are related technologies to Data Encryption?
Based on our calculations related technologies to Data Encryption are Big Data, E-Health, Retail Tech, Artificial Intelligence & Machine Learning, E-Commerce
Which industries are mostly working on Data Encryption?
The most represented industries which are working in Data Encryption are IT, Software and Services, Consulting, International Affairs and Trade, Electronics and Electrical engineering, Judiciary
How does ensun find these Data Encryption Companies?
ensun uses an advanced search and ranking system capable of sifting through millions of companies and hundreds of millions of products and services to identify suitable matches. This is achieved by leveraging cutting-edge technologies, including Artificial Intelligence.