Sort solutions by

Find your solutions

Solution category
Pricing model
Market applications
Ideal organisation type
Deployment mode
136 results found
SolutionLab
solution image

GRC

Our experienced and fully qualified Risk Management and Governance team will assist you in reaching...
Wedos

WGP - Anycast DNS, DDoS protection, CDN

First-class protection against cyberattacks on multiple layers, and ultra-fast website content...
European Digital Innovation Hub Trakia

Trakia Cyber Range

Digital Innovation Hub Trakia builds and offers free-of-charge a Cyber Range as a Service solution...

Secfense
solution image

Secfense User Access Security Broker (UASB) | Switch to MFA, FIDO2 or Passkeys in 5 minutes

The Secfense User Access Security Broker streamlines the adoption of multi-factor and FIDO2...

Malizen

Malizen

Experience streamlined security data analytics with Malizen, a no-code interface that connects all...
Cryptomage
solution image

Cryptomage Cyber Eye

Cryptomage Cyber Eye™ Network Detection and Response-class network probe is much more than a simple...
Binalyze

Binalyze AIR

Binalyze AIR is an investigation and response automation platform powered by forensic-level...

Threema GmbH
solution image

Threema Work. The Secure Business Messenger

Threema Work is a secure and GDPR-compliant business communication solution that facilitates mobile...

CyberDesk

Identity-Centric Data Security

CyberDesk helps you to adaptively control who can perform what actions with what data. Covering both...
Transparent Edge

Anti DDoS Perimetrical

A strong and effective defense. Our state-of-the-art technology cleans up malicious traffic at the...
Secfense
solution image

Secfense IdP (Identity Provider) | Secure, flexible and simplified identity management

Secfense IdP marks a significant advancement in cybersecurity, delivering unparalleled flexibility...

Safetech Innovations
solution image

iSAM - Information Security Automation Manager

iSAM is a product developed by Safetech Innovations, in order to ensure automation in the...

Want your solution to be listed above?

Become a vendor

Register as an investor

Get in touch with innovative and capital searching cybersecurity companies with market insights beyond the numbers!

Register now

Register as an end-user

Discover European cyber solutions in an easy and reliable manner with validated reviews and ratings from peers.

Register now