The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers
Close
Filter
Result configuration
Continents
Select continent
Locations
Result types
Company type
Select company type
Industries
Select industry
Company status
Select company status preset
Number of employees
Min.
Max.
Founding year
Axonex
Cheltenham, United Kingdom
A
51-100 Employees
2005
Key takeaway
VCG specializes in the design, implementation, and management of cyber-secure enterprise networks and data centers, emphasizing their expertise in Zero Trust access to enable secure connections across applications and networks. Their focus on cyber security and technology transformation supports organizations in achieving resilience and agility in their digital operations.
Reference
Product
Zero Trust Access, Enable Secure Access Across Applications & Networks
false
ControlPlane
Blackpool, United Kingdom
A
1-10 Employees
2017
Key takeaway
The company specializes in building and securing zero trust systems, with industry-leading expertise in the architecture and implementation of zero trust infrastructure for regulated industries. Their focus on cloud-native security and hands-on training reinforces their commitment to advanced security practices.
Reference
Core business
ControlPlane: Kubernetes and Cloud Native Consulting
Delivering world-leading consulting solutions. Secure-by-design and secure-by-default are in our DNA. Our cloud, Kubernetes, and supply chain security engineering is of the highest standard.
SecureArm
Yeovil, United Kingdom
A
11-50 Employees
2016
Key takeaway
SecureArm emphasizes its commitment to security through its focus on Zero Trust Networks, which provide users with limited access to only the applications and services they need. This approach is crucial for supporting secure remote work in today's complex digital landscape.
Reference
Service
Zero Trust Networks - SecureArm
Zero Trust Networks Zero Trust Network Access is designed to give users access over the internet to just the applications and services they need to have access to. View Services Get In Touch What is a Zero Trust Network? Network and security support for “work from anywhere” is rapidly becoming a business essential. It’s no […]
Looking for more accurate results?
Find the right companies for free by entering your custom query!
25M+ companies
250M+ products
Free to use
Cloudsmith
Belfast, United Kingdom
A
11-50 Employees
2016
Key takeaway
Cloudsmith emphasizes its commitment to zero trust security by providing a flexible permissions system that allows complete control over software access. This approach ensures fine-grained access management and integrates with identity providers to enhance authentication and user lifecycle management.
Reference
Product
Zero Trust Security | Cloudsmith
Learn how Cloudsmith puts you in complete control of your software assets with ISO27001 accredited, zero trust security
My1Login
London, United Kingdom
A
11-50 Employees
2007
Key takeaway
The company emphasizes the importance of adopting a Zero Trust Security Model to enhance data protection and prevent breaches. By implementing strategies like Single Sign-On and Multi-Factor Authentication, organizations can ensure that only authorized users have access to critical resources, thereby increasing security and productivity.
Reference
Product
How to securely move to a Zero Trust Security Model
Move towards a Zero Trust security model to ensure that the right people at your organisation have access to the right resources, when they need them.
Titania Ltd
Worcester, United Kingdom
A
51-100 Employees
2009
Key takeaway
Titania emphasizes its commitment to enhancing network security through its Nipper solutions, which align with Zero Trust principles by providing automated security checks and compliance evidence. With over a decade of experience supporting Critical National Infrastructure, Nipper helps organizations identify and remediate vulnerabilities, thereby strengthening their defenses in line with Zero Trust strategies.
Reference
Product
Zero Trust - Titania
TechShire
United Kingdom
A
1-10 Employees
1994
Key takeaway
TechShire Limited emphasizes its commitment to implementing a Zero Trust Security model as a continuous approach to cyber security, highlighting the importance of this framework in protecting information assets. Their managed IT services and advanced security solutions are designed to support small to medium businesses in enhancing their security posture.
Reference
Product
Zero Trust - TechShire Limited
Our solution to introduce the Zero Trust Security model in an organisation is not a one-off but an ongoing approach to cyber security.
Northdoor
London, United Kingdom
A
51-100 Employees
1989
Key takeaway
Northdoor emphasizes a zero-trust approach to cybersecurity, which is essential in today's landscape of unprecedented threats. Their solutions focus on wrapping security around every element of the network, ensuring that organizations can effectively manage and protect their data throughout its lifecycle.
Reference
Product
Zero Trust | Comprehensive cyber security from Northdoor
Unprecedented threat levels demand a new approach to cyber security: a zero-trust approach wraps security around every element in your network.
Cyber Control
London, United Kingdom
A
1-10 Employees
2020
Key takeaway
Cyber Control emphasizes the importance of maintaining high security standards, especially in a remote work environment, by offering solutions that enhance authentication and secure access to applications and data. Their approach aligns with the principles of Zero Trust by ensuring that security measures are in place for all remote access, regardless of the existing identity platforms.
Reference
Core business
Cybr Ctrl
Keep your existing Identity Provider and add a secure multi-factor authentication to improve your application and infrastructure security in no time and at a low entry cost.
Unsung Limited
London, United Kingdom
A
11-50 Employees
2009
Key takeaway
The company, Unsung, is a specialist in zero trust solutions, emphasizing the principle of "never trust, always verify." They provide a range of PKI (Public Key Infrastructure) solutions designed to secure systems against current and future cyber threats.
Reference
Core business
Home | Trusted IT security consultant | PKI specialists | Unsung Ltd
Digital trust and identity solutions – all things PKI Learn more about PKI Securing your systems against current and future cyber threats Whether you are a multinational corporation, government agency or private sector client, we can help you to safeguard your digital assets against the ever-evolving threats within the cyber landscape and to assist in ... Read more
Technologies which have been searched by others and may be interesting for you:
A selection of suitable products and services provided by verified companies according to your search.
Product
SparkView ZTNA
Go to product
A selection of suitable use cases for products or services provided by verified companies according to your search.
Use case
Access any app on your Chromebook—even if it's not ChromeOS-native
Education, Gov, All Industries
SparkView lets you get even more out of your Chromebooks! SparkView is easy to use via the browser or as an app (PWA) and gives your Chromebook superpowers: you get secure and fast access to internal company apps, desktops, and servers directly in your browser. With SparkView, you can also seamlessly access non-ChromeOS-native apps—whether they’re specially developed applications, legacy systems, Windows apps, macOS apps, and more—ensuring you have the right tools at your fingertips, no matter the platform. And best of all: no data leaves the company!
Use case
Secure Remote Access to Your Virtualization Environment with Proxmox
all
The Perfect Combination: SparkView and Proxmox for Secure and Efficient IT Infrastructures. With Zero Trust and virtualization, you can eliminate VPN security risks, reduce administrative complexity, and minimize the cost pressures of traditional solutions. Maximum security through Zero Trust > SparkView grants access to Proxmox resources only after strict authentication. >Each access package is checked individually, which prevents lateral movement. Simple administration >Proxmox offers centralized management for VMs and containers. >SparkView enables administrators to easily control access rights for Proxmox services - without separate client software. Cost efficiency >Proxmox and SparkView offer excellent value. >No need for expensive VPN licenses or additional hardware.
Use case
Clientless ZTNA-compliant Remote Access - without VPN
all
Traditional VPNs are no longer sufficient for securing remote access. SparkView offers a clientless Zero Trust Network Access (ZTNA) solution, enabling secure, browser-based access to internal applications and desktops—without the complexity of VPNs. Users can connect seamlessly from any device while organizations maintain granular access control and zero trust security principles, ensuring that only authorized users gain entry to corporate resources. SparkView enhances security, flexibility, and user experience, making remote work efficient and risk-free.
Use case
Access any app on your Chromebook—even if it's not ChromeOS-native
Education, Gov, All Industries
SparkView lets you get even more out of your Chromebooks! SparkView is easy to use via the browser or as an app (PWA) and gives your Chromebook superpowers: you get secure and fast access to internal company apps, desktops, and servers directly in your browser. With SparkView, you can also seamlessly access non-ChromeOS-native apps—whether they’re specially developed applications, legacy systems, Windows apps, macOS apps, and more—ensuring you have the right tools at your fingertips, no matter the platform. And best of all: no data leaves the company!
When exploring the Zero Trust industry in the United Kingdom, several key considerations come into play. Firstly, understanding the regulatory landscape is crucial, as the UK adheres to the General Data Protection Regulation (GDPR) and other data protection laws that impact how companies implement Zero Trust security models. Organizations must also navigate challenges such as the complexity of integrating Zero Trust architectures into existing systems and the potential resistance from employees accustomed to traditional security models. Opportunities abound in the UK market, particularly as businesses increasingly move to cloud-based solutions and remote work environments, necessitating robust security measures that Zero Trust provides. The competitive landscape is dynamic, with numerous startups and established players innovating in this space, making it essential for potential investors or partners to evaluate technology capabilities and market positioning. Furthermore, global market relevance is significant as the shift towards Zero Trust is a worldwide phenomenon, driven by rising cyber threats and the need for enhanced security postures. Environmental concerns are becoming more prominent, with organizations seeking energy-efficient solutions that align with sustainability goals. As such, understanding these dimensions will equip individuals with the knowledge necessary to make informed decisions in this evolving industry.
Some interesting numbers and facts about your company results for Zero Trust
Country with most fitting companies | United Kingdom |
Amount of fitting manufacturers | 1136 |
Amount of suitable service providers | 1484 |
Average amount of employees | 11-50 |
Oldest suiting company | 1989 |
Youngest suiting company | 2020 |
Some interesting questions that has been asked about the results you have just received for Zero Trust
What are related technologies to Zero Trust?
Based on our calculations related technologies to Zero Trust are Big Data, E-Health, Retail Tech, Artificial Intelligence & Machine Learning, E-Commerce
Which industries are mostly working on Zero Trust?
The most represented industries which are working in Zero Trust are IT, Software and Services, Other, Defense, Consulting, Telecommunications
How does ensun find these Zero Trust Companies?
ensun uses an advanced search and ranking system capable of sifting through millions of companies and hundreds of millions of products and services to identify suitable matches. This is achieved by leveraging cutting-edge technologies, including Artificial Intelligence.