Search results: 12 vendors matching your search criteria.
Worldwide Leader in Securing the Future. Since 1993, Check Point has been dedicated to providing customers with uncompromised protection against all types of threats, reducing security complexity and lowering total cost of ownership. We are committed to staying focused on customer needs and developing solutions that redefine the security landscape today and in the future.Read More
VMGroup is a global firm, operating since 2014, providing extensive knowledge and expertise in the area of Digital forensics, eDiscovery, Data Recovery, Information Security consulting, IT Audit, Risk assurance services, and all related areas to their clients. VMGroup provide services to clients from all spectrum of industries from large multinationals, financial institutions, FTSE100 clients to SMEs.Read More
Phone: 01 524 1630
Intercept Technologies is a Managed Security Service provider, offering clients a unique darkweb intelligence offering not seen before. Intercept have four main pillars of our business: Managed IT, Security Services, Governance Risk & Compliance (PCI DSS, ISO27001:2022, ISAe3402, ISO27701, NIST) & Penetration Testing.Read More
Phone: 01 5543807
The Fortanix Data Security Manager is a unified data security platform powered by confidential computing that delivers a suite of data security services, including encryption and multi-cloud key management, tokenization, TDE and multiple other capabilities— from one single console.Read More
CrowdStrike is a leading cybersecurity company protecting customers from all cyber threats by leveraging its Security Cloud to stop breaches. From its inception in 2011, driven by George Kurtz’s vision, CrowdStrike was created as a different kind of cybersecurity company. Cloud-native, CrowdStrike immediately brought a threat perspective, effectiveness, scalability, and flexibility never seen before in the industry seamlessly aligning People, Technology, and Processes. The CrowdStrike Falcon platform has revolutionized enterprise security for the cloud era. Its single lightweight-agent architecture leverages artificial intelligence (AI) and offers real-time protection and visibility across the enterprise, preventing attacks on endpoints and workloads on or off the network.Read More
Z IT SECURITY t/a zSecurity is a leading provider of ethical hacking and cyber security training, we teach hacking and security to help people become ethical hackers so they can test and secure systems from black-hat hackers. zSecurity's goal is to educate people and increase awareness by exposing methods used by real black-hat hackers and show how to secure systems from these bad actors.Read More
Phone: (01) 437 0921
Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud-first world. Its flagship services create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100 percent cloud-delivered and offer simplicity, enhanced security, and improved user experience that traditional appliances are unable to match. Used in more than 185 countries, Zscaler protects thousands of customers from cyberattacks and data loss. Michael Scott Regional Sales Manager - Large Enterprise & Major AccountsRead More
The Evervault encryption platform allows our customers to collect, process and share sensitive data without handling it in plaintext. Our Trusted Execution Environment (TEE) based platform helps companies to protect their customers’ sensitive data (credit cards, PII or health data) supporting compliance efforts such as PCI DSS, GDPR & HIPAA as well as significantly improving cyber security posture, by leveraging state-of-the-art cryptography and critically separating encrypted data from decryption keys. There are three core products, Relay - Network Encryption Proxy, Functions - secure serverless compute environment and Cages, a Confidential Computing environment, running on Trusted Execution Environments - TEEs (Cages). The combination of products means that customers can not only encrypt, but also process encrypted data securely. You can try it out for yourself, by registering for free at app.evervault.com/register.
Phone: +1 (415) 423-1888
Symantec Corporation (NASDAQ: SYMC) is the global leader in cybersecurity. Operating one of the world’s largest cyber intelligence networks, we see more threats, and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives.Read More
Phone: 01 9075400
Egress's Intelligent Cloud Email Security suite uses patented self-learning technology to detect sophisticated inbound and outbound threats, protect against data loss, resulting in the reduction of human activated risk.Read More
Phone: (800) 732-0746 +16178556055
Sponsors are featured prominently throughout the IISF.IE website, social media channels as well as enjoying other benefits Read more
Great opportunity to list your Cybersecurity Products /IS business, plus a premium profile page on the IISF website to enhance your online marketing campaigns.