The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers
Close
Filter
Result configuration
Continents
Select continent
Locations
Result types
Company type
Select company type
Industries
Select industry
Company status
Select company status preset
Number of employees
Min.
Max.
Founding year
Oplon Networks
Padua, Italy
B
11-50 Employees
2010
Key takeaway
Oplon Networks focuses on developing integrated cybersecurity solutions, including their Secure Access system, which replaces traditional VPNs and ensures secure access to various services. Their Oplon MFA product enhances security by requiring multi-factor authentication for confidential services, aligning with the principles of Zero Trust by preventing unauthorized access and minimizing risks in data centers and corporate networks.
Reference
Product
Oplon Authenticator
With Oplon MFA protecting restricted areas is immediate and requires no integration. It is ready when you need it without any changes to pre-existing applications. No plugins, no integration, everything transparent and spontaneous. The Oplon MFA virtual appliance allows you to filter all requests. For your confidential and internal services it will require multi-factor authentication to continue.
Endian
Eppan an der Weinstraße - Appiano sulla Strada del Vino, Italy
B
11-50 Employees
2003
Key takeaway
Endian's solutions are designed to enhance security through continuous monitoring and instant threat detection, aligning with the principles of Zero Trust. Their Endian 4i Edge series emphasizes maximum connectivity and micro-segmentation, crucial for implementing Zero Trust in operational technology environments.
Reference
Core business
Zero Trust: 3 Fragen an ... Endian / News
Zero Trust erfreut sich in Produktionsumgebungen wachsender Beliebtheit. Endian-CEO Raphael Vallazza erläutert, was bei der Umsetzung von Zero Trust in OT-Umgebungen beachten werden sollte.
Shielder
Pinerolo, Italy
B
11-50 Employees
2014
Key takeaway
Shielder is an IT consulting firm that specializes in security services, including Red Teaming and Network Penetration Testing. Their focus on continuous skill development and a questioning approach enhances their ability to deliver tailored security solutions.
Reference
Service
Shielder - Network Security
Shielder provides highly specialized Red Teaming services by simulating various scenarios, starting from 0-knwoledge ones to assumed breach. The Network Security spectrum is covered by providing the Network Penetration Test service too.
Looking for more accurate results?
Find the right companies for free by entering your custom query!
25M+ companies
250M+ products
Free to use
WhiteJar - Powered by UNGUESS
Milan, Italy
B
51-100 Employees
2021
Key takeaway
WhiteJar is a cybersecurity service that connects companies with certified Ethical Hackers, emphasizing a collaborative approach to enhance security. This crowd-sourced model leverages the expertise of thousands of individuals to test and strengthen digital products and services, aligning with the principles of a Zero Trust security framework.
Reference
Core business
WhiteJar | Cybersecurity made in the crowd
Cybersecurity made in the crowd: the service that connects companies with certified Ethical Hackers expert in cybersecurity.
Spring Firm
Trieste, Italy
B
1-10 Employees
1994
Key takeaway
Spring Firm® S.r.l. is a consulting company that positions itself as a cloud provider and trusted advisor, aiming to promote the use of cloud services among organizations in Friuli Venezia Giulia.
Reference
Core business
Trusted Cloud – Spring Firm s.r.l.
TrueScreen - Trust as a Service
Bologna, Italy
B
11-50 Employees
2022
Key takeaway
TrueScreen Srl offers a comprehensive cybersecurity platform designed to ensure the authenticity and immutability of digital content, which aligns with the principles of a Zero Trust approach. Their focus on preventing fraud and misinformation through secure data management makes their solutions highly relevant for organizations prioritizing robust security measures.
Reference
Product
Platform - TrueScreen - Trust as a Service
The end-to-end Cybersecurity solution for your digital information The Cybersecurity solution for your digital information Capture Collect authentic and immutable information in a forensic environment. Capture Collect authentic and immutable information in a forensic environment.
Security Trust
Cellatica, Italy
B
51-100 Employees
2000
Key takeaway
Security Trust is a key player in the security sector, offering specialized services that enhance both physical and logical security. Their focus on Cyber Security and integrated monitoring platforms positions them as a strategic partner for organizations seeking to implement a Zero Trust approach to safeguard their operations.
Reference
Service
Cyber Security | Security Trust
.
CyLock
Rome, Italy
B
1-10 Employees
2020
Key takeaway
CyLock Tech offers robust cybersecurity services, including anti-phishing and penetration testing, to enhance organizational resilience against cyber threats. Their AI-driven platform simulates targeted attacks, enabling companies to assess and strengthen their defenses through effective training and vulnerability testing.
Reference
Service
Cyber security services - Cylock Tech
Cylock Tech provides cyber security services: anti-hacker, anti-phishing, data breach security plans and VAPT for ISO 27001 certifications
SecurityGen
Rome, Italy
B
51-100 Employees
2022
Key takeaway
SecurityGen is dedicated to telecom cybersecurity, emphasizing the importance of maintaining network security and trust while implementing new technologies. Their Inspection, Detection, Protection (IDP) platform and intrusion detection system provide real-time visibility and proactive security measures, aligning with the principles of a Zero Trust approach.
Reference
Core business
Telecom network security solutions - SecurityGen
Exein
Rome, Italy
B
11-50 Employees
2018
Key takeaway
Exein offers a comprehensive security solution that implements runtime security specifically designed for IoT devices and edge computing, addressing the risks of unauthorized code injection. Their eBPF-based threat detection engine is trusted by major corporations, ensuring the protection of over 1 million IoT devices in critical environments.
Reference
Product
Runtime security to protect IoT devices | Exein
Runtime security to protect IoT devices and containers. Find out our runtime threat detection and response engine. Designed for IoT and edge computing.
Technologies which have been searched by others and may be interesting for you:
In Italy, individuals interested in the Zero Trust industry should consider several critical factors. First, regulatory compliance is essential, as the General Data Protection Regulation (GDPR) significantly impacts data security practices. Companies must implement rigorous data protection measures to ensure compliance. The Italian cybersecurity framework also emphasizes the importance of a Zero Trust architecture, which helps organizations mitigate risks associated with increasingly sophisticated cyber threats. Challenges in the market include a lack of awareness about Zero Trust principles among small and medium-sized enterprises (SMEs), which can hinder adoption. However, opportunities exist as businesses recognize the need for enhanced security strategies in response to rising cyberattacks. The competitive landscape features a mix of local startups and established international players, creating a dynamic environment for innovation and collaboration. Environmental concerns are becoming more relevant, with businesses seeking to adopt sustainable practices alongside security measures. Global market relevance is also evident, as Zero Trust is gaining traction worldwide, and Italian companies can benefit from adopting these principles to compete on an international scale. Overall, a comprehensive understanding of regulations, market dynamics, and emerging trends is vital for anyone looking to navigate the Zero Trust industry effectively in Italy.
Some interesting numbers and facts about your company results for Zero Trust
Country with most fitting companies | Italy |
Amount of fitting manufacturers | 52 |
Amount of suitable service providers | 44 |
Average amount of employees | 11-50 |
Oldest suiting company | 1994 |
Youngest suiting company | 2022 |
Some interesting questions that has been asked about the results you have just received for Zero Trust
What are related technologies to Zero Trust?
Based on our calculations related technologies to Zero Trust are Big Data, E-Health, Retail Tech, Artificial Intelligence & Machine Learning, E-Commerce
Who are Start-Ups in the field of Zero Trust?
Start-Ups who are working in Zero Trust are TrueScreen - Trust as a Service
Which industries are mostly working on Zero Trust?
The most represented industries which are working in Zero Trust are IT, Software and Services, Other, Telecommunications, Aviation and Aerospace, Business Services
How does ensun find these Zero Trust Companies?
ensun uses an advanced search and ranking system capable of sifting through millions of companies and hundreds of millions of products and services to identify suitable matches. This is achieved by leveraging cutting-edge technologies, including Artificial Intelligence.