ensun logo
Locations
Company type
Result types
Industries
Employees
Founding year
background

Top Security Companies

The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers

Close

Filter

Continents


Locations


Result types


Company type


Industries


Company status

Number of employees

to

Founding year

to

Clear filters

60 companies for Security

Borgner Service Group's Logo

Borgner Service Group

Babenhausen, Germany

A

1-10 Employees

-

Key takeaway

The Borgner Service Group offers comprehensive security solutions for effective monitoring of your property, addressing the increasing concerns about break-ins. Their professional services extend beyond industrial clients to include private households, ensuring a wide range of security and maintenance options.

Reference

Service

Securityservice

CRYPTAS Nordics AB's Logo

CRYPTAS Nordics AB

Stockholm, Sweden

A

1-10 Employees

2018

Key takeaway

The company specializes in certificate-based solutions for secure and authentic mapping of people and systems in complex IT environments, offering signature software, services, and eIDAS trust services. Their primeid PROFESSIONAL product provides a turn-key solution for certificate-based enterprise access management.

Reference

Product

CRYPTAS - primeid PROFESSIONAL

Turn-key solution for certificate-based enterprise access management.

IDpendant GmbH's Logo

IDpendant GmbH

Unterschleißheim, Germany

A

- Employees

2007

Key takeaway

IDpendant GmbH specializes in IT security solutions, focusing on strong authentication and client security. They offer a comprehensive portfolio that includes authentication technologies, encryption solutions, and security hardware, addressing the critical need to protect sensitive corporate data through robust security measures.

Reference

Product

Middleware | IDpendant - Secure your identity

MiddlewareAnpassungsfähige Middleware zur Sicherung Ihrer IT-InfrastrukturDie Welt der IT Sicherheit basiert auf drei Bausteinen: Einerseits das Sicherheitssystem selbst, andererseits die jeweiligen physischen Zugriffsgeräte (Smartcards, USB Token usw.) mit den darauf gespeicherten Passwörtern und Zertifikaten – und schließlich die Middleware. Sie sorgt für den sicheren Dialog zwischen Applikationen und den Zugriffsgeräten. Flexibilität und Unabhängigkeit sind die

Looking for more accurate results?

Find the right companies for free by entering your custom query!

25M+ companies

250M+ products

Free to use

Spriv's Logo

Spriv

New York, United States

B

11-50 Employees

2007

Key takeaway

Spriv is an Adaptive Two Factor Authentication platform designed to enhance security for both employees and customers. It offers easy integration, a user-friendly administration portal, and unique tools to quickly identify attacks, making it a comprehensive solution for protecting sensitive information.

Reference

Core business

Profile - Two factor Authentication

RCDEV's Logo

RCDEV

Bruz, France

A

1-10 Employees

-

Key takeaway

RCDevs offers a comprehensive security solution through its OpenOTP Suite, which implements Multi-Factor Authentication (MFA) to enhance user identity verification and protect access to resources. The platform also features centralized SSH key management and integrates with Active Directory/LDAP, ensuring robust identity and access management for enterprises.

Reference

Product

OpenID & SAML Identity Provider – RCDevs Security

Safewhere's Logo

Safewhere

Kongens Lyngby, Denmark

A

11-50 Employees

2012

Key takeaway

Safewhere is a Danish software provider that specializes in identity and access management (IAM) and Identity as a Service (IDaaS), focusing on secure user connections to applications. The Safewhere platform enhances security by simplifying user and identity management, making it easier for organizations to control access permissions in line with their security policies.

Reference

Product

Safewhere - Single Sign-On - SSO

Signaturit's Logo

Signaturit

Barcelona, Spain

A

251-500 Employees

-

Key takeaway

Signaturit Group ensures security by generating proof of the identity of both the sender and recipient, as well as the integrity of the transmitted text and its delivery. They comply with eIDAS and are recognized as a qualified provider of electronic trust services, highlighting their commitment to secure communications.

Reference

Product

Service Providers | Signaturit

United Security Providers's Logo

United Security Providers

Bern, Switzerland

A

51-100 Employees

1994

Key takeaway

United Security Providers is a leading Swiss IT security expert that offers tailored solutions and services to ensure secure cloud usage and protect digital futures. They provide advanced Identity and Access Management (IAM) solutions specifically designed to meet the security needs of modern enterprises, forming a comprehensive protection system for digital identities and access.

Reference

Product

Identity & Access Management - United Security Providers AG

Identity & ACCESSManagement Fortschrittliches IAM für moderne Sicherheitsbedürfnisse Challenge Solution More Contact Home United Security Providers bietet fortschrittliche Identity und Access Management (IAM) Lösungen, die auf die Sicherheitsbedürfnisse moderner Unternehmen zugeschnitten sind und so ein umfassendes Schutzsystem für digitale Identitäten und Zugänge bilden. SES IDENTITY SES IDENTITY ist ein kostengünstiges, schlüsselfertiges Identitätsverwaltungssystem mit einer integrierten

ProviderSoft's Logo

ProviderSoft

Warminster Township, United States

B

11-50 Employees

2007

Key takeaway

ProviderSoft focuses on enhancing usability and performance to meet health and education regulations, which indirectly supports security by improving tracking and monitoring processes. Their commitment to continuous upgrades and feature enhancements ensures a robust solution for managing service delivery and compliance, ultimately fostering a secure environment for sensitive data.

Reference

Service

header - ProviderSoft

IT_Security's Logo

IT_Security

Brussels, Belgium

A

11-50 Employees

2006

Key takeaway

Expertware is a Managed Security Service Provider that focuses on enhancing customers' IT infrastructure and solutions through innovative asset management and integration. Their team of qualified engineers is dedicated to ensuring successful project outcomes, particularly in the realm of security.

Reference

Product

Managed Security Service Provider | Expertware


Related searches for Security

Technologies which have been searched by others and may be interesting for you:

Things to know about Security

What is Security?

Security refers to the measures and systems put in place to protect individuals, organizations, and assets from potential threats and risks. This can encompass various aspects such as physical security, cybersecurity, and information security. Physical security involves protecting facilities and personnel from unauthorized access and harm, while cybersecurity focuses on safeguarding digital information from cyber threats. Information security ensures the confidentiality, integrity, and availability of data, making it critical in today’s digital landscape. Effective security providers employ a combination of technology, policies, and training to mitigate risks and enhance safety.


How does Security protect data?

Security measures protect data through various methods, including encryption, access controls, and regular audits. Encryption transforms data into a secure format that can only be accessed by authorized users, making it nearly impossible for unauthorized individuals to decipher sensitive information. Access controls limit who can view or manipulate data based on user roles and permissions. This ensures that only individuals with the necessary clearance can access critical information. Additionally, regular audits help identify vulnerabilities and ensure compliance with security policies, further safeguarding data integrity.


What are the common Security threats?

1. Malware
Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to systems. It includes viruses, worms, and ransomware that can compromise sensitive data and system integrity.

2. Phishing
Phishing involves deceptive communications, often via email, aimed at tricking individuals into revealing personal information. This can lead to identity theft and unauthorized access to accounts.

3. Distributed Denial of Service (DDoS) Attacks
DDoS attacks overwhelm a target's resources, making services unavailable to users. Attackers flood the network with traffic, causing slowdowns or complete shutdowns.

4. Insider Threats
Insider threats emerge from employees or contractors who misuse their access to sensitive information. This can be intentional or accidental, leading to data breaches and financial loss.

5. Unpatched Software
Using outdated software creates vulnerabilities that attackers can exploit. Regular updates and patches are crucial to securing systems against known threats.


Why is Security important for businesses?

Security is crucial for businesses as it protects sensitive information, assets, and personnel from threats such as cyberattacks, theft, and vandalism. Implementing robust security measures helps to ensure the integrity of data and maintain customer trust, which is vital for business reputation and operational continuity. Moreover, a strong security posture can prevent financial losses associated with breaches and compliance violations. Businesses that prioritize security are better positioned to navigate risks, maintain regulatory compliance, and foster a safe environment for employees and clients alike.


How can Security be improved in an organization?

1. Employee Training
Regular training sessions for employees on security protocols can significantly enhance organizational security. Educating staff about the importance of cybersecurity, recognizing phishing attempts, and following best practices helps create a vigilant workforce.

2. Implementing Access Controls
Restricting access to sensitive information ensures that only authorized personnel can view or manipulate critical data. Utilizing role-based access controls and regularly reviewing user permissions can prevent unauthorized access and minimize potential security breaches.


Insights about the Security results above

Some interesting numbers and facts about your company results for Security

Country with most fitting companiesGermany
Amount of fitting manufacturers3670
Amount of suitable service providers4739
Average amount of employees11-50
Oldest suiting company1994
Youngest suiting company2018

Geographic distribution of results





20%

40%

60%

80%

Frequently asked questions (FAQ) about Security Companies

Some interesting questions that has been asked about the results you have just received for Security

Based on our calculations related technologies to Security are Big Data, E-Health, Retail Tech, Artificial Intelligence & Machine Learning, E-Commerce

The most represented industries which are working in Security are IT, Software and Services, Defense, Other, Consulting, Finance and Insurance

ensun uses an advanced search and ranking system capable of sifting through millions of companies and hundreds of millions of products and services to identify suitable matches. This is achieved by leveraging cutting-edge technologies, including Artificial Intelligence.

Security results by various countries

Related categories of Security