The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers
Close
Filter
Result configuration
Continents
Select continent
Locations
Result types
Company type
Select company type
Industries
Select industry
Company status
Select company status preset
Number of employees
Min.
Max.
Founding year
Secfense
Krakow, Poland
B
1-10 Employees
2018
Key takeaway
Secfense offers robust security solutions by enabling organizations to implement multi-factor authentication (MFA) and transition to passwordless, phishing-proof access for their applications. Their User Access Security Broker acts as a protective layer between users and applications, enhancing security for both in-office and remote work.
Reference
Core business
Fast Track to Passwordless Authentication | Secfense
Secfense is the fast track to passwordless authentication. We help companies implement strong MFA in a no-code way and at large scale.
ESYSCO
Środa Wielkopolska, Poland
B
11-50 Employees
2013
Key takeaway
ESYSCO provides innovative cryptography-based solutions focused on high-quality technology and security. They specialize in areas such as Digital Transformation, eIDAS Electronic Signatures, and Identity and Access Management, ensuring the protection of sensitive data for companies and public organizations.
Reference
Product
Nexus CM - ESYSCO
Flexible multitenant public key infrastructure (PKI) platform from Nexus Group. Complete and smooth implementation and service.
Guardanet
Łódź, Poland
B
1-10 Employees
2017
Key takeaway
Guardanet specializes in defining secure architectures for both cloud-based and on-premise workloads, ensuring adherence to security best practices while aligning with business objectives. With a focus on large-scale technical projects, the company leverages the expertise of its founder, a Certified Information Security Architect, to offer services in areas such as AWS Cloud Security and Kubernetes Security.
Reference
Service
Services – Guardanet | Security Architecture | Public Cloud Security | Kubernetes Security
Looking for more accurate results?
Find the right companies for free by entering your custom query!
25M+ companies
250M+ products
Free to use
Securing
Krakow, Poland
B
11-50 Employees
2003
Key takeaway
The company specializes in IT security, offering expert services in areas like Single Sign-On (SSO) security. They provide dedicated training, custom workshops, and penetration testing services to ensure secure implementation and integration of SSO solutions.
Reference
Service
Single Sign-On penetration testing - Securing
Secure Identity and Access Management through SSO solutions (such as OpenID Connect, OAuth, or SAML) requires proper implementation and integration. We offer penetration test focused specifically on your organization's Single Sign-On.
Microsoft Dynamics NAV HR & Payroll for PL
Wrocław, Poland
B
- Employees
-
Key takeaway
getsix Services provides expert staff to advise and assist with IT security, including surveillance and update management of computer systems. Their specialized employees install and configure necessary software, ensuring comprehensive support for your company's IT security needs.
Reference
Core business
Information Security Policy - NAV 365 cloud
Simployer Tech Polska
Poland
B
11-50 Employees
2016
Key takeaway
Simployer emphasizes security through its staff register, which ensures secure storage and role-controlled access, contributing to high data quality and a clear overview for HR. Their HRM system is built on a secure and modern data model, prioritizing the safe management of personal information.
Reference
Core business
HR software and in-house personal HR knowledge | Simployer
Simployer helps you make the employee journey a success – by managing, developing and inspiring your employees. We support and simplify the workday for over 1.3 M users in Norway and Sweden.
SecurityAlliance
Warsaw, Poland
B
1-10 Employees
2018
Key takeaway
CyCommSec is committed to providing continuous and integrated security support, engaging experts in IT security and compliance to offer comprehensive services. Their approach ensures effective protection for organizations, emphasizing the importance of information security and business continuity.
Reference
Product
Products – Security Alliance
NETWORK-SECURITY-SOLUTIONS
Poland
B
1-10 Employees
2010
Key takeaway
Network Security Solutions emphasizes its commitment to providing high-quality server and network infrastructure management, addressing the critical need for secure and stable networking environments. Their 24/7 monitoring and specialized IT outsourcing services further enhance their ability to meet clients' security needs effectively.
Reference
Core business
[ N-SECURITY.COM ] - [ Network Security Solutions ]
ID Karma
Poland
B
1-10 Employees
2020
Key takeaway
The company emphasizes ultimate security and privacy for users through decentralized profiles and verifiable credentials, ensuring data is stored on the user's side. Their expertise in IT and e-commerce, combined with a focus on Web 3.0 technologies, positions them as a strong ally for organizations seeking to enhance their security measures.
Reference
Service
OwlMeans Credentials | Professional Support
The page provides information about OwlMeans Credentials Core Libraries, an open-source JavaScript library for implementing Self-Sovereign Identity and Verifiable Credentials. This library allows data storage on the user's side, enhancing privacy by not requiring the service to securely store user data. Free consultation and custom services are also available for software development professionals.
ENIGMA SYSTEMY OCHRONY INFORMACJI SP Z O O
Warsaw, Poland
B
251-500 Employees
2003
Key takeaway
ENIGMA has been committed to the security of individuals, institutions, and citizens for nearly 30 years. The company specializes in designing and implementing complex IT systems focused on information protection, authentication, electronic signatures, biometrics, and identity management.
Reference
Core business
Enigma | SOI - Enigma
ENIGMA Systemy Ochrony Informacji | Bezpieczne państwo, bezpieczne instytucje, bezpieczny obywatel | Znajdź rozwiązanie dla swojego sektora.
Technologies which have been searched by others and may be interesting for you:
When exploring the security industry in Poland, several key considerations come into play. The regulatory framework is crucial, as the sector is governed by national laws aligned with European Union directives, emphasizing data protection and privacy, particularly with the General Data Protection Regulation (GDPR). Companies must navigate compliance with these regulations while also staying updated on evolving cybersecurity standards. Challenges include the increasing sophistication of cyber threats, necessitating advanced security solutions and a skilled workforce. However, there are significant opportunities in the market, driven by the rising demand for cybersecurity services and the digital transformation of businesses. The competitive landscape features a mix of established players and innovative startups, fostering a dynamic environment where collaboration and technological advancement are vital. Additionally, environmental concerns are gaining traction, with a focus on integrating sustainable practices in security operations. The global relevance of the Polish security industry is underscored by its strategic location in Europe, making it a hub for international security collaborations and investments. Investors and companies should also consider Poland's growing economy and its commitment to enhancing national security, which can lead to further growth in the sector. Understanding these factors can provide valuable insights for anyone interested in entering or expanding within Poland's security industry.
Some interesting numbers and facts about your company results for Security
Country with most fitting companies | Poland |
Amount of fitting manufacturers | 22 |
Amount of suitable service providers | 19 |
Average amount of employees | 11-50 |
Oldest suiting company | 2003 |
Youngest suiting company | 2020 |
Some interesting questions that has been asked about the results you have just received for Security
What are related technologies to Security?
Based on our calculations related technologies to Security are Big Data, E-Health, Retail Tech, Artificial Intelligence & Machine Learning, E-Commerce
Which industries are mostly working on Security?
The most represented industries which are working in Security are IT, Software and Services, Other, Defense, International Affairs and Trade, Telecommunications
How does ensun find these Security Companies?
ensun uses an advanced search and ranking system capable of sifting through millions of companies and hundreds of millions of products and services to identify suitable matches. This is achieved by leveraging cutting-edge technologies, including Artificial Intelligence.