Sort solutions by

Find your solutions

Solution category
Pricing model
Market applications
Ideal organisation type
Deployment mode
122 results found
Secure Practice

Secure Practice

Change how your company teaches and practices cyber security. Secure Practice blends immersive...
Smart Global Governance

Answer Writer

Stop wasting hours on cybersecurity questionnaires (ISO 27001, SOC 2, NIS2, DORA, etc.). With Answer...
CyberDesk

Identity-Centric Data Security

CyberDesk helps you to adaptively control who can perform what actions with what data. Covering both...
Safetech Innovations
solution image

iSAM - Information Security Automation Manager

iSAM is a product developed by Safetech Innovations, in order to ensure automation in the...

Binalyze

Binalyze AIR

Binalyze AIR is an investigation and response automation platform powered by forensic-level...

Threema GmbH

Threema Work. The Secure Business Messenger

Threema Work is a secure and GDPR-compliant business messenger that facilitates mobile communication...

CODE WHITE GmbH

Initial Assessment

The INITIAL ASSESSMENT (INI) simulates a real cyber attack in the form of a holistic Red Team...
Modino.io
solution image

Modino.io - safe and secure digital artifacts delivery

Modino.io is an on-prem / cloud platform for performing safe and secure updates for: - IoT devices -...

Secfense
solution image

Secfense IdP (Identity Provider) | Secure, flexible and simplified identity management

Secfense IdP marks a significant advancement in cybersecurity, delivering unparalleled flexibility...

Secfense
solution image

Secfense User Access Security Broker (UASB) | Switch to MFA, FIDO2 or Passkeys in 5 minutes

The Secfense User Access Security Broker streamlines the adoption of multi-factor and FIDO2...

European Digital Innovation Hub Trakia

Trakia Cyber Range

Digital Innovation Hub Trakia builds and offers free-of-charge a Cyber Range as a Service solution...

Cyber Trust Services GmbH

Cyber Trust Label

The Cyber Trust Label shows that you are a secure and trustful organisation within the supply chain...

Want your solution to be listed above?

Become a vendor

Register as an investor

Get in touch with innovative and capital searching cybersecurity companies with market insights beyond the numbers!

Register now

Register as an end-user

Discover European cyber solutions in an easy and reliable manner with validated reviews and ratings from peers.

Register now