The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers
Close
Filter
Continents
Select continent
Locations
Result types
Company type
Select company type
Industries
Select industry
Company status
Select company status preset
Number of employees
Min.
Max.
Founding year
Unsung Limited
London, United Kingdom
A
11-50 Employees
2009
Key takeaway
The company, Unsung, is a specialist in zero trust solutions, emphasizing the principle of "never trust, always verify." They provide a range of PKI (Public Key Infrastructure) solutions designed to secure systems against current and future cyber threats.
Highlighted product
Core business
Home | Trusted IT security consultant | PKI specialists | Unsung Ltd
Digital trust and identity solutions – all things PKI Learn more about PKI Securing your systems against current and future cyber threats Whether you are a multinational corporation, government agency or private sector client, we can help you to safeguard your digital assets against the ever-evolving threats within the cyber landscape and to assist in ... Read more
Device Authority
Reading, United Kingdom
A
11-50 Employees
2014
Key takeaway
Device Authority's approach emphasizes device trust throughout its lifecycle as a cornerstone of a zero trust strategy. Their KSaaS solution enhances zero trust security by offering a comprehensive platform for managing device permissions, securing data privacy, and automating security policies.
Highlighted product
Product
Technology - Device Authority Ltd
IoT security calls for a new paradigm in which IoT service providers and manufacturers must inspire trust in order to attract customers
Enclave Networks
Newport, United Kingdom
A
1-10 Employees
2020
Key takeaway
Enclave's solution simplifies the journey to Zero Trust by providing a cloud-based management platform that enables secure, private access to applications through one-to-one connections that activate only when trust standards are met. This approach enhances security while eliminating the complexities of traditional VPNs, making it easier for organizations to implement effective Zero Trust Network Access.
Highlighted product
Product
Enclave for Managed Security Service Providers | Enclave
Zero-trust network access, the right way.
Looking for more accurate results?
Find the right companies for free by entering your custom query!
25M+ companies
250M+ products
Free to use
My1Login
London, United Kingdom
A
11-50 Employees
2007
Key takeaway
The company emphasizes the importance of adopting a Zero Trust Security Model to enhance data protection and prevent breaches. By implementing strategies like Single Sign-On and Multi-Factor Authentication, organizations can ensure that only authorized users have access to critical resources, thereby increasing security and productivity.
Highlighted product
Product
How to securely move to a Zero Trust Security Model
Move towards a Zero Trust security model to ensure that the right people at your organisation have access to the right resources, when they need them.
CyberCyte
Reading, United Kingdom
A
- Employees
2019
Key takeaway
CloudCyte emphasizes its commitment to a "Zero Trust" approach by offering advanced asset attack surface management and threat hunting solutions that proactively identify and neutralize hidden cyber threats before they can compromise infrastructure.
Highlighted product
Core business
About Us | The Circle of Zero Trust
Titania Ltd
Worcester, United Kingdom
A
51-100 Employees
2009
Key takeaway
Titania emphasizes its commitment to enhancing network security through its Nipper solutions, which align with Zero Trust principles by providing automated security checks and compliance evidence. With over a decade of experience supporting Critical National Infrastructure, Nipper helps organizations identify and remediate vulnerabilities, thereby strengthening their defenses in line with Zero Trust strategies.
Highlighted product
Product
Zero Trust - Titania
Cyber Control
London, United Kingdom
A
1-10 Employees
2020
Key takeaway
Cyber Control emphasizes the importance of maintaining high security standards, especially in a remote work environment, by offering solutions that enhance authentication and secure access to applications and data. Their approach aligns with the principles of Zero Trust by ensuring that security measures are in place for all remote access, regardless of the existing identity platforms.
Highlighted product
Core business
Cybr Ctrl
Keep your existing Identity Provider and add a secure multi-factor authentication to improve your application and infrastructure security in no time and at a low entry cost.
ControlPlane
Blackpool, United Kingdom
A
1-10 Employees
2017
Key takeaway
The company specializes in building and securing zero trust systems, with industry-leading expertise in the architecture and implementation of zero trust infrastructure for regulated industries. Their focus on cloud-native security and hands-on training reinforces their commitment to advanced security practices.
Highlighted product
Core business
ControlPlane: Kubernetes and Cloud Native Consulting
Delivering world-leading consulting solutions. Secure-by-design and secure-by-default are in our DNA. Our cloud, Kubernetes, and supply chain security engineering is of the highest standard.
SecurEnvoy
City of London, United Kingdom
A
11-50 Employees
2003
Key takeaway
SecurEnvoy offers a robust Zero Trust Access Solution designed to protect users, devices, and data, regardless of their location. Their approach integrates multi-factor authentication and data discovery, addressing modern security challenges effectively.
Highlighted product
Core business
Zero Trust Access Solution | MFA and Data Discovery
Zero trust access solution protecting users, devices & data, wherever the location, including multi-factor authentication and data discovery
TechShire
Derby, United Kingdom
A
1-10 Employees
1994
Key takeaway
TechShire Limited emphasizes its commitment to implementing a Zero Trust Security model as a continuous approach to cyber security, highlighting the importance of this framework in protecting information assets. Their managed IT services and advanced security solutions are designed to support small to medium businesses in enhancing their security posture.
Highlighted product
Product
Zero Trust - TechShire Limited
Our solution to introduce the Zero Trust Security model in an organisation is not a one-off but an ongoing approach to cyber security.
Technologies which have been searched by others and may be interesting for you:
When exploring the Zero Trust industry in the United Kingdom, several key considerations come into play. Firstly, understanding the regulatory landscape is crucial, as the UK adheres to the General Data Protection Regulation (GDPR) and other data protection laws that impact how companies implement Zero Trust security models. Organizations must also navigate challenges such as the complexity of integrating Zero Trust architectures into existing systems and the potential resistance from employees accustomed to traditional security models. Opportunities abound in the UK market, particularly as businesses increasingly move to cloud-based solutions and remote work environments, necessitating robust security measures that Zero Trust provides. The competitive landscape is dynamic, with numerous startups and established players innovating in this space, making it essential for potential investors or partners to evaluate technology capabilities and market positioning. Furthermore, global market relevance is significant as the shift towards Zero Trust is a worldwide phenomenon, driven by rising cyber threats and the need for enhanced security postures. Environmental concerns are becoming more prominent, with organizations seeking energy-efficient solutions that align with sustainability goals. As such, understanding these dimensions will equip individuals with the knowledge necessary to make informed decisions in this evolving industry.
Some interesting numbers and facts about your company results for Zero Trust
Country with most fitting companies | United Kingdom |
Amount of fitting manufacturers | 659 |
Amount of suitable service providers | 731 |
Average amount of employees | 11-50 |
Oldest suiting company | 1994 |
Youngest suiting company | 2020 |
Some interesting questions that has been asked about the results you have just received for Zero Trust
What are related technologies to Zero Trust?
Based on our calculations related technologies to Zero Trust are Big Data, E-Health, Retail Tech, Artificial Intelligence & Machine Learning, E-Commerce
Who are Start-Ups in the field of Zero Trust?
Start-Ups who are working in Zero Trust are Enclave Networks, Cyber Control
Which industries are mostly working on Zero Trust?
The most represented industries which are working in Zero Trust are IT, Software and Services, Defense, Other, Finance and Insurance, Consulting
How does ensun find these Zero Trust Companies?
ensun uses an advanced search and ranking system capable of sifting through millions of companies and hundreds of millions of products and services to identify suitable matches. This is achieved by leveraging cutting-edge technologies, including Artificial Intelligence.