The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers
Close
Filter
Continents
Select continent
Locations
Result types
Company type
Select company type
Industries
Select industry
Company status
Select company status preset
Number of employees
Min.
Max.
Founding year
Borgner Service Group
Babenhausen, Germany
A
1-10 Employees
-
Key takeaway
The Borgner Service Group offers comprehensive security solutions for effective monitoring of your property, addressing the increasing concerns about break-ins. Their professional services extend beyond industrial clients to include private households, ensuring a wide range of security and maintenance options.
Reference
Service
Securityservice
CRYPTAS Nordics AB
Stockholm, Sweden
A
1-10 Employees
2018
Key takeaway
The company specializes in certificate-based solutions for secure and authentic mapping of people and systems in complex IT environments, offering signature software, services, and eIDAS trust services. Their primeid PROFESSIONAL product provides a turn-key solution for certificate-based enterprise access management.
Reference
Product
CRYPTAS - primeid PROFESSIONAL
Turn-key solution for certificate-based enterprise access management.
IDpendant GmbH
Unterschleißheim, Germany
A
- Employees
2007
Key takeaway
IDpendant GmbH specializes in IT security solutions, focusing on strong authentication and client security. They offer a comprehensive portfolio that includes authentication technologies, encryption solutions, and security hardware, addressing the critical need to protect sensitive corporate data through robust security measures.
Reference
Product
Middleware | IDpendant - Secure your identity
MiddlewareAnpassungsfähige Middleware zur Sicherung Ihrer IT-InfrastrukturDie Welt der IT Sicherheit basiert auf drei Bausteinen: Einerseits das Sicherheitssystem selbst, andererseits die jeweiligen physischen Zugriffsgeräte (Smartcards, USB Token usw.) mit den darauf gespeicherten Passwörtern und Zertifikaten – und schließlich die Middleware. Sie sorgt für den sicheren Dialog zwischen Applikationen und den Zugriffsgeräten. Flexibilität und Unabhängigkeit sind die
Looking for more accurate results?
Find the right companies for free by entering your custom query!
25M+ companies
250M+ products
Free to use
Spriv
New York, United States
B
11-50 Employees
2007
Key takeaway
Spriv is an Adaptive Two Factor Authentication platform designed to enhance security for both employees and customers. It offers easy integration, a user-friendly administration portal, and unique tools to quickly identify attacks, making it a comprehensive solution for protecting sensitive information.
Reference
Core business
Profile - Two factor Authentication
RCDEV
Bruz, France
A
1-10 Employees
-
Key takeaway
RCDevs offers a comprehensive security solution through its OpenOTP Suite, which implements Multi-Factor Authentication (MFA) to enhance user identity verification and protect access to resources. The platform also features centralized SSH key management and integrates with Active Directory/LDAP, ensuring robust identity and access management for enterprises.
Reference
Product
OpenID & SAML Identity Provider – RCDevs Security
Safewhere
Kongens Lyngby, Denmark
A
11-50 Employees
2012
Key takeaway
Safewhere is a Danish software provider that specializes in identity and access management (IAM) and Identity as a Service (IDaaS), focusing on secure user connections to applications. The Safewhere platform enhances security by simplifying user and identity management, making it easier for organizations to control access permissions in line with their security policies.
Reference
Product
Safewhere - Single Sign-On - SSO
Signaturit
Barcelona, Spain
A
251-500 Employees
-
Key takeaway
Signaturit Group ensures security by generating proof of the identity of both the sender and recipient, as well as the integrity of the transmitted text and its delivery. They comply with eIDAS and are recognized as a qualified provider of electronic trust services, highlighting their commitment to secure communications.
Reference
Product
Service Providers | Signaturit
United Security Providers
Bern, Switzerland
A
51-100 Employees
1994
Key takeaway
United Security Providers is a leading Swiss IT security expert that offers tailored solutions and services to ensure secure cloud usage and protect digital futures. They provide advanced Identity and Access Management (IAM) solutions specifically designed to meet the security needs of modern enterprises, forming a comprehensive protection system for digital identities and access.
Reference
Product
Identity & Access Management - United Security Providers AG
Identity & ACCESSManagement Fortschrittliches IAM für moderne Sicherheitsbedürfnisse Challenge Solution More Contact Home United Security Providers bietet fortschrittliche Identity und Access Management (IAM) Lösungen, die auf die Sicherheitsbedürfnisse moderner Unternehmen zugeschnitten sind und so ein umfassendes Schutzsystem für digitale Identitäten und Zugänge bilden. SES IDENTITY SES IDENTITY ist ein kostengünstiges, schlüsselfertiges Identitätsverwaltungssystem mit einer integrierten
ProviderSoft
Warminster Township, United States
B
11-50 Employees
2007
Key takeaway
ProviderSoft focuses on enhancing usability and performance to meet health and education regulations, which indirectly supports security by improving tracking and monitoring processes. Their commitment to continuous upgrades and feature enhancements ensures a robust solution for managing service delivery and compliance, ultimately fostering a secure environment for sensitive data.
Reference
Service
header - ProviderSoft
IT_Security
Brussels, Belgium
A
11-50 Employees
2006
Key takeaway
Expertware is a Managed Security Service Provider that focuses on enhancing customers' IT infrastructure and solutions through innovative asset management and integration. Their team of qualified engineers is dedicated to ensuring successful project outcomes, particularly in the realm of security.
Reference
Product
Managed Security Service Provider | Expertware
Technologies which have been searched by others and may be interesting for you:
Security refers to the measures and systems put in place to protect individuals, organizations, and assets from potential threats and risks. This can encompass various aspects such as physical security, cybersecurity, and information security. Physical security involves protecting facilities and personnel from unauthorized access and harm, while cybersecurity focuses on safeguarding digital information from cyber threats. Information security ensures the confidentiality, integrity, and availability of data, making it critical in today’s digital landscape. Effective security providers employ a combination of technology, policies, and training to mitigate risks and enhance safety.
Security measures protect data through various methods, including encryption, access controls, and regular audits. Encryption transforms data into a secure format that can only be accessed by authorized users, making it nearly impossible for unauthorized individuals to decipher sensitive information. Access controls limit who can view or manipulate data based on user roles and permissions. This ensures that only individuals with the necessary clearance can access critical information. Additionally, regular audits help identify vulnerabilities and ensure compliance with security policies, further safeguarding data integrity.
1. Malware
Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to systems. It includes viruses, worms, and ransomware that can compromise sensitive data and system integrity.
2. Phishing
Phishing involves deceptive communications, often via email, aimed at tricking individuals into revealing personal information. This can lead to identity theft and unauthorized access to accounts.
3. Distributed Denial of Service (DDoS) Attacks
DDoS attacks overwhelm a target's resources, making services unavailable to users. Attackers flood the network with traffic, causing slowdowns or complete shutdowns.
4. Insider Threats
Insider threats emerge from employees or contractors who misuse their access to sensitive information. This can be intentional or accidental, leading to data breaches and financial loss.
5. Unpatched Software
Using outdated software creates vulnerabilities that attackers can exploit. Regular updates and patches are crucial to securing systems against known threats.
Security is crucial for businesses as it protects sensitive information, assets, and personnel from threats such as cyberattacks, theft, and vandalism. Implementing robust security measures helps to ensure the integrity of data and maintain customer trust, which is vital for business reputation and operational continuity. Moreover, a strong security posture can prevent financial losses associated with breaches and compliance violations. Businesses that prioritize security are better positioned to navigate risks, maintain regulatory compliance, and foster a safe environment for employees and clients alike.
1. Employee Training
Regular training sessions for employees on security protocols can significantly enhance organizational security. Educating staff about the importance of cybersecurity, recognizing phishing attempts, and following best practices helps create a vigilant workforce.
2. Implementing Access Controls
Restricting access to sensitive information ensures that only authorized personnel can view or manipulate critical data. Utilizing role-based access controls and regularly reviewing user permissions can prevent unauthorized access and minimize potential security breaches.
Some interesting numbers and facts about your company results for Security
Country with most fitting companies | Germany |
Amount of fitting manufacturers | 3670 |
Amount of suitable service providers | 4739 |
Average amount of employees | 11-50 |
Oldest suiting company | 1994 |
Youngest suiting company | 2018 |
20%
40%
60%
80%
Some interesting questions that has been asked about the results you have just received for Security
What are related technologies to Security?
Based on our calculations related technologies to Security are Big Data, E-Health, Retail Tech, Artificial Intelligence & Machine Learning, E-Commerce
Which industries are mostly working on Security?
The most represented industries which are working in Security are IT, Software and Services, Defense, Other, Consulting, Finance and Insurance
How does ensun find these Security Companies?
ensun uses an advanced search and ranking system capable of sifting through millions of companies and hundreds of millions of products and services to identify suitable matches. This is achieved by leveraging cutting-edge technologies, including Artificial Intelligence.