Listing filters filter_list

Categories

City

 
Cyber Security Services in India
apps format_list_bulleted layers
  • Morpher Helmet

    Experience a new era of on-the-go safety with the Morpher Helmet. Its state-of-the-art materials and construction ensure reliable protection, while the foldable design makes it effortless to carry wherever your adventures take you. Whether you're cycling through the city or embarking on an outdoor excursion, the Morpher Helmet has you covered.  

    star
  • Cash App Identity Verification Made Easy: A Stepwise Guide for Users

    In the era of digital transactions and online payments, Cash App has emerged as a popular platform for peer-to-peer money transfers. Cash App implements a verification process for its users to ensure the platform's security and integrity. This comprehensive guide walks you through the process of how to verify Cash App, addressing common concerns and providing valuable insights. Understanding the Importance of Cash A

    star
  • EvolveCloud

    Enhance your small business's resilience with top-notch cybersecurity solutions in Melbourne. Safeguard sensitive data and operations with Evolve Cloud's tailored Small Business Cyber Security services. Shield your venture from online threats confidently.

    star
  • Tableau Training | Microtek Learning

    Learn the ins and outs of Tableau Desktop, a widely used data reporting, visualization, and business intelligence tool, with the help of this training. If you're in the analytics field, our Tableau training can help you advance your career and gain marketable skills. You'll learn how to use Tableau to its full potential, from cleaning and organizing data to creating dynamic dashboards and exploring data anomalies wit

    star
  • Protecting your IT infrastructure with Security Configuration Assessment

    Discover how SharkStriker STRIEGO, a unified, human led, machine accelerated unified security platform makes security assessments based on CIS based benchmarks easier.A security configuration assessment is a process used to evaluate and analyze the security settings and configurations of an organization's information technology (IT) systems, networks, and applications. The goal of this assessment is to identify poten

    star
  • GIS consulting

    We offer an interactive environment for individuals and the knowledge of different computer and network security threats is also provided by us. Our certified secure computer user program is of great help for individuals as the knowledge about information assets protection is given. For more visit- https://www.gisconsulting.in/

    star
  • IARM Cyber Security Services

    IARM is a leading cyber security company in India, offering comprehensive solutions to meet all your information security needs. They are a highly reputable company that provides enterprise-level cyber security services, delivering world-class information security solutions to organizations. Their areas of expertise include vulnerability assessment, penetration testing, security operations center, industrial cyber se

    star
  • eSec Forte® Technologies

    eSec Forte® Technologies is a CMMi Level 3 certified Global Consulting and IT Services company with expert offerings in Information Security Services, Forensic Services, Malware Detection, Security Audit, Mobile Forensics, Vulnerability Management, Penetration Testing, Password Recovery,Risk Assessment, DDOS Assessment, Data Security etc. We are certified by CERT-In for providing Information Securi

    star
  • Ethical Hat

    EthicalHat is a global cybersecurity provider with offices in Baltimore, USA and Gurgaon, India. Our state-of-the-art Network and Security Operations Centers (NOC and SOC) are equipped with the latest in threat detection and incident response tools and managed by skilled security researchers and analysts with decades of experience in cyber defense. We provide services ranging from network security and vulnerabil

    star
  • Cyber Eye

    CyberEye initiated The Things Network India and initiated this 2-day, one-of-its-kind global conference on LoRaWAN to enable CEOs, CTOs, governments, top-notch developers, industry leaders, startups and tech-enthusiasts to learn, go hands-on, share knowledge and explore future possibilities in IoT with LoRaWAN.

    star
  • Proman Securitech

    Proman Securitech, a leading Security Service provider in Delhi NCR, was established some 10 years ago with a vision of providing specialized security and intelligence services to not only corporate but also individuals. It was founded and backed by those people who has served India in the field of Securityand Intelligence. Our Motto is “Saksham Suraksha Sewa” (Efficient protection and service). We are a

    star
  • Absolute Security & Facility Management Pvt. Ltd

    Absolute Security & Facility Management Pvt. Ltd. has been rated SME 1 by CRISIL, the most respected credit rating agency in the Globe. SME 1 is the highest rating possible for a SME and less than 5% companies get it. Rating is based on operational and financial parameters besides company stability. It is always advantageous for the client to deal with companies rated high due their higher stability.

    star
  • Cyber Intelligent Security Pvt. Ltd

    CIS has grown in experience over the years and offers consultancy services and exclusive solutions to assist clients in creating and maintaining safe and secure environments for their stakeholders, property and profits. Therefore CIS can be objective when assessing requirements and budgets on behalf of their clients, providing them with impartial unbiased advice that allows them to make the unerring decision for thei

    star
  • ARISTI NINJA PVT. LTD

    Aristi Ninja is a global Information Security company headquartered in Gurgaon, India. We are a team of passionate and highly experienced practitioners in Information Security & Risk management. With unmatched expertise and skills on multiple technologies, we are committed to strengthen your digital security and achieve desired compliance level in line with your business and/or regulatory requireme

    star
  • MK Cyber Services

    With a 67% increase in security breaches from 2014, organizations irrespective of their size and industry, are facing this universal threat. A cybersecurity incident can not only bring in huge financial losses for organizations but also can put their customers at risk while tampering their hard-earned reputation. It has been observed that with the looming internal and external threats, most of the organization

    star
  • Why is physical security important? A cybersecurity POV

    Modern day attackers are orchestrating hybrid attacks that target physical assets. It calls for improved awareness and prioritization of physical security.Physical security is important for several reasons, as it plays a crucial role in safeguarding people, assets, and information from various threats. Here are some key reasons why physical security is essential: Asset Protection: Physical security measures are desig

    star
  • Phronesis Corporate Intelligence Services Pvt Ltd

    Phronesis Corporate Intelligence Services Pvt Ltd specializes in tailor-made solutions to complex business challenges, based on high-quality intelligence, strategic consultancy and guidance, creativity and out-of-the-box thinking. Behind Phronesis is a select group of veterans of the Intelligence community, whose diverse experience in information gathering, analysis, research and field operations

    star
  • Ana cyber

    Ana cyber is providing the iso consultants services in Mumbai. Contact us for Fastest, Easiest & best ISO implementation.

    star
  • Azure Skynet

    Azure Skynet is an ISO 9001:2015 certified training and service provider company which deals in imparting superior quality of training on various technologies from different domains of IT industry.The summer training program on Ethical Hacking conducted by Azure Skynet was really worth. Though the time was not enough but the ‘hacks’ and kind of learning they provided really helped a lot in doing the pr

    star
  • Attackers exploit critical CVE-2024-21762 Fortinet based vulnerabilities.

    Over 133,000 Fortinet devices exposed to critical security vulnerability (CVE-2024-21762) that attackers are exploiting at large due to easily available proof of concept(PoC).CVE-2024-21762 is a vulnerability affecting Fortinet products, potentially allowing unauthorized access to sensitive information. This vulnerability arises from improper handling of user authentication tokens. Attackers could exploit this flaw t

    star
  • Managed Security vs In-house Security: Which of the two is the best?

    Let us take a look at the difference between establishing your own team for security - in-house security vs letting dedicated team of experts handle all your security needs - managed security.Managed Security and In-house Security are two different approaches to handling cybersecurity within an organization. Here are the key differences between them:1. Ownership and Responsibility:Managed Security: In this model, a t

    star
  • Compliance management services for ADHICS | SharkStriker

    End to end service for the implementation of recommended guidelines for ADHICS for all the healthcare entities based in UAE.ADHICS is a comprehensive data compliance framework designed for secure and efficient information management. It ensures robust data protection, legal adherence, and streamlined processes, promoting trust, reliability, and innovation in various industries.Key Features:Advanced encryption for dat

    star
  • cybersecurity & compliance services in Australia

    SharkStriker assists businesses in Australia in solving all of their cybersecurity and compliance challenges through holistic services.In Australia, cybersecurity and compliance services offer comprehensive solutions to safeguard digital assets and ensure adherence to regulatory standards. These services encompass risk assessments, threat detection, and regulatory compliance strategies, helping organizations mitigate

    star
  • PT. Akamai Teknologi Indonesia

    Akamai powers and protects life online. With the most distributed compute platform — cloud to edge — customers can build modern apps while keeping experiences closer to users and threats farther away.

    star
  • Best Cybersecurity Training Institutes in Gurgaon

    In a rapidly changing digital landscape, cyber security training services in Gurgaon are no longer optional; they are essential. Whether it's the Reload Digital India training portal with its versatile courses, including Reload Digital India firewall training for beginners, or the comprehensive Kaspersky training and certification, investing in these training services is investing in your future. Understand

    star
  • Global IS Consulting

    Global IS Consulting has been rated as one of the Top Ten Most Promising Cyber Security Companies in India by Silicon India Magazine in Sep 2017.

    star
  • CertCube

    CertCube is an ISO 27001:2013 certified company. As a prominent IT Security company, we provide intensive, immersion ethical hacking & cybersecurity training designed to help students the practical steps necessary for defending systems, networks, web, mobile, Servers in an organization against the most dangerous threats – the ones actively exploited.

    star
  • Critical CVIS 10-rated Zero-day Webp vulnerability wildly exploited. Reassigned to CVE-2023-5129.

    Google’s libwebp based zero-day vulnerability is now reassigned to CVE 2023-5129. It is wildly exploited. Attackers are using webp images to transmit malicious codes to extract sensitive information from their victims. Google released a security fix for a critical vulnerability that affected Google Chrome for Windows, macOS, and Linux. The vulnerability was given the CVE ID as CVE-2023-4863 and has been given

    star
  • International Institute of Cyber Security

    International Institute of Cyber Security is a pioneer in the field of information security. We are the leader in developing, implementing and delivering information security courses, services, trainings and solutions for professionals and enterprises. We provide cyber security courses, services, and solutions for a wide range of industries.

    star
  • Innobuzz - Ethical Hacking Training

    We at Innobuzz believe that knowledge can be instrumental for success when combined with talent. With years of experience in the industry as our guiding light, we aim to bring this knwoledge and training to everyone.

    star
  • ASL IT Security

    Our goal is to provide highest levels of technical excellence, combined with the equally important qualities of trustworthiness, responsiveness and excellent customer service. Nowhere else will you find such a highly targeted combination of resources specifically dedicated to the success of today's IT-security professional.trustworthiness, responsiveness and excellent customer service. Nowhere else will you find such

    star
  • Institute of information security (IIS)

    The blog post covers different active techniques of subdomain enumeration. These techniques provide information regarding all the domains/subdomains of the target organization. The information contains all those subdomains that currently may or may not be in use by the organization.

    star
  • Delhi Network Security

     Delhi Network Security secures the largest Enterprise, Small Enterprise and Mid-Size Enterprise, service provider around the globe. Delhi Network Security empower its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirement of the border-less network Today and the future. Only the Delhi Network Security Expert can delive

    star
  • Pyramid Cyber Security and Forensic Pvt. Ltd.

    Pyramid helps customers in Government, Law Enforcement, and Enterprises to identify,prevent, detect, resolve and protect from threats, crimes, breaches & frauds arising due to misuse of digital & communication devices, applications and technologies.

    star
  • Compliance management services for HIPAA compliance | SharkStriker

    SharkStriker provides businesses with an end-to-end compliance management service for HIPAA that holistically assists them in the implementation of measures to achieve and keep up with the changes in compliance."Patient Privacy: HIPAA compliance ensures that patients' personal and health information is kept confidential, promoting trust between healthcare providers and patients.Security Safeguards: Implementation of

    star
  • IDE Cyber Security

    Today we’re proud to boast a strong team of IT engineers who thrive on rolling up their sleeves and solving your IT problems and meeting your business needs. We are on a mission to exceed your expectations and form a long-term, mutually beneficial relationship with you.

    star
  • DOISS

    We are the one and only firm providing Private Investigator and Cyber Security Analysts services with a global outreach. Our multilingual professionals can solve any of your security issues as soon as possible. Each member of our team knows how to handle the requirements of the clients. Our team would never rush a call and would allow you to determine the pace of the conversation. After having briefed our team about

    star
  • Detox Technologies - Cyber Security Company

    Detox Technologies is one of the leading cyber security consulting services & cyber security services firm. Focused oh high quality security service. Detox Technologies is an ISO 27001-2013 certified Global Consultation and Implementation company, Headquartered in derbyshire UK & R&D Center in Delhi. We believe in precision and quality above everything else. We are the trusted standard for compan

    star
  • Cybersecurity & Compliance Firm, Cybersecurity Certification | A-LIGN

    A-LIGN is a cybersecurity and compliance firm that specializes in helping you navigate the scope and complexity of your specific security needs. We provide a variety of compliance services, including SOC, ISO, FedRAMP, HITRUST, PCI DSS & more.

    star
  • SOC 1 Assessments Services, SOC 1 Compliance | A-LIGN

    Elevate your customers confidence with a SOC 1 report. Request a consultation. Gain a competitive advantage against similar service organizations with the help of a SOC 1 Report.

    star
  • SOC 2 Assessments & Reports, Compliance & Certification Services

    Simplify and accelerate the complex, time-consuming, and tedious process of a SOC 2 assessment. Undergo SOC 2 compliance assessment with confidence. Learn how to simplify SOC 2 with A-LIGN.

    star
  • 45k Jenkins servers exposed globally due to CVE-2024-23897 (CVSS 9.8) vulnerability

    The security vulnerability has affected around 45000 Jenkins servers across the globe. By exploiting the vulnerability, the attacker can gain access to sensitive data such as source codes, SSH Keys, Credentials, Build Artifacts, and Binary Secrets. Learn more on how SharkStriker helps its clients and partners be secured from the impact of CVE-2024-23897 vulnerability.OverviewMore than 45000 Jenkins servers are expose

    star
  • Securado

    Securado is a leading cybersecurity company that keeps organizations safe in a digitally connected world. We combine threat intelligence from multiple sources, to prevent security breaches, detect malicious activity in real time, respond rapidly, and predict emerging threats. We offer our clients multiple cyber defense technologies including physical security , cyber security & a secured infrastructure.

    star
  • CYTROM - The Best Cyber Security service company

    CYTROM “Cyber The Resolution of Mind ” We offer network safety administrations and we have a gathering of experts with certificates, graduate degrees, and endeavor insight ahead of time digital protection arrangements. Our goal is to give digital protection administrations, for example, data security review, inside outer IT security review, hazard and weaknesses evaluation, pen-testing administrations. Cy

    star
  • VAPT services in USA by SharkStriker

    Vulnerability and Pen-testing services to help US-based businesses augment their cybersecurity posture for GRC achievement.Vulnerability Assessment and Penetration Testing (VAPT) is human-led technologically-driven testing used to measure the level of security of an organization’s IT infrastructure and its applications. Vulnerability Assessment is an information security process that is performed by a team of e

    star
  • Get 360 degree test of your internal and external network with pen-testing

    Assess the vulnerabilities of your internal and external network with SharkStriker’s network pen testing services that are carried out by certified pen-testers and cybersecurity experts.Network Penetration Testing, often referred to as "pen testing" or "ethical hacking," is a simulated cyberattack on a computer network, system, or application to identify vulnerabilities and weaknesses that could be exploited by

    star
  • Sattrix Information Security (P) Limited

    Sattrix Information Security (P) Limited is a professionally driven & value based, quality-oriented organization. We are pivoted around providing our customers and partners the best of Cybersecurity services.  We have collaborated and worked with a diverse range of industries such as BFSI, Retail, TELCO, Government, Oil and Gas, and ITIS worldwide. Sattrix Informa

    star
  • A-LIGN | Compliance, Cybersecurity, Cyber Risk & Privacy

    A-LIGN is a technology-enabled security and compliance partner that helps global organizations take a strategic approach to confidently mitigate cybersecurity risks. We bring the people, process and platform you need to secure your summit.

    star
  • Digital transformation services | IT infrastructure services

    Skylark is a leading global IT services provider, transforming clients businesses through innovative and advanced technology solutions. We provide services like Network Infrastructure Solution Server And Storage Solution Cloud Solutions Security Solution and IT Services. We have made our remarkable presence almost all over the country covering metro cities. We have varied with a great strength in terms of technology

    star
  • Advanced Persistent Threats (APT): 5 Ways to Identify an APT Attack

    APT or Advanced Persistent Threat is a type of cyber-attack where an attacker or group of attackers target highly specific targets with an intent to steal sensitive data without being detected for a long timeAPT stands for Advanced Persistent Threat. An APT attack is a sophisticated and targeted cyberattack where an unauthorized user gains access to a network and remains undetected for an extended period. The term "p

    star
  • How we help you become ISO 27001 compliant?

    SharkStriker offer comprehensive support to help you achieve ISO 27001 compliance, employing a structured approach and tailored solutions to meet your organization's specific needs. Here's how we assist you:Initial Assessment: We conduct a thorough evaluation of your current information security practices and identify gaps compared to ISO 27001 requirements.Customized Roadmap: Based on the assessment results, we deve

    star
  • Ethical Hacker

    We provide Ethical Hacking Services, Mobile Tracking, Professional Hacker, Cyber Investigator In Mumbai etc.

    star
  • Gartner’s cybersecurity predictions for 2024 | SharkStriker

    Discover insightful research-based predictions for the world of cybersecurity in 2024 by Gartner.Gartner’s cybersecurity predictions for 2024Trend 1: Generative AI offers a long-term promise but is skeptical in the short-runTrend 2: Increased reliance on Outcome Driven Metrics (ODM)Trend 3: Organizations boost behavior and culture programs to reduce human risksTrend 4: Increased focus on resilience-oriented inv

    star
  • Mobile application pen-testing services in UK.

    SharkStriker helps UK-based businesses in improving their mobile application security posture with the help of automated and manual techniques.The Mobile Application Penetration testing process is conducted to test mobile applications to find vulnerabilities, malicious activities, or other privacy threats before they are exploited by cyber attackers to gain and mishandle sensitive and crucial data. The mobile app sec

    star
  • Best VAPT Provider | Cybersecurity Company | Cyber Suraksa

    "Cyber Suraksa" is a cybersecurity company that provides security solutions against cybercrime and threats. Our objective is to reduce the susceptibility of digital enterprises and enhance overall security administration. Cyber Suraksa is a VAPT service provider to startups, Small - medium-sized enterprises across the globe. Our VAPT solutions work to eliminate data privacy risks to ensure secure and effective busin

    star
  • Cybersecurity Expert

    Lumiverse solutions are the top Cyber Security company in Nashik, India. Lumiversesolutions company provides the best services in cyber security, cyber audit, cyber compliance, cyber forensics, VAPT services, digital investigations, data recovery, social media fraud, bank finance. Utilizing cutting-edge technology and industry best practices to guarantee the security of your data, networks, and systems, our team of e

    star
Rate the information on this page • Average Rating star_border star_border star_border star_border star_border 0.00 (0 Reviews)

#1 Free Business Listings in India

Get Leads, Enquiry & make your Brand Visible.

Copyright © 2024 Digital Marketing Deal. All rights reserved.