Solutions

Sort solutions by

Find your solutions

Solution category
Pricing model
Market applications
Ideal organisation type
Deployment mode
30 results found
Secfense
solution image

Secfense User Access Security Broker (UASB) | Switch to MFA, FIDO2 or Passkeys in 5 minutes

The Secfense User Access Security Broker streamlines the adoption of multi-factor and FIDO2...

EGERIE
solution image

EGERIE Risk Manager

EGERIE is a collaborative platform that maps and financially quantifies cyber-origin risks and helps...
SandGrain B.V.

A new sovereign European trust platform for secure electronic components, trusted data and circularity.

A new sovereign European trust platform for secure electronic components, trusted data and...
Planck Security

Planck

Planck is the end-to-end encryption and decentralized identity management solution for your email...
Excalibur

PAM and MFA

Privileged Access Management ( PAM ) By utilizing and expanding concepts known and used by...
Secutec BV
solution image

Leaked Credentials & Darknet Monitoring - Secutec SecureSIGHT

Shine a light on the darknet with our 24/7 managed darknet monitoring service Our darknet scans help...
Cyber Trust Services GmbH

Cyber Trust Label

The Cyber Trust Label shows that you are a secure and trustful organisation within the supply chain...

European Digital Innovation Hub Trakia

Trakia Cyber Range

Digital Innovation Hub Trakia builds and offers free-of-charge a Cyber Range as a Service solution...

Binalyze

Binalyze AIR

Binalyze AIR is an investigation and response automation platform powered by forensic-level...

Threema GmbH

Threema Work. The Secure Business Messenger

Threema Work is a secure and GDPR-compliant business messenger that facilitates mobile communication...

Sekoia.io

Sekoia Defend

Sekoia Defend (Next-Gen SIEM) is an eXtended Detection and Response (XDR) SOC platform available in...

Safetech Innovations
solution image

iSAM - Information Security Automation Manager

iSAM is a product developed by Safetech Innovations, in order to ensure automation in the...

Want your solution to be listed above?

Become a vendor

Register as an investor

Get in touch with innovative and capital searching cybersecurity companies with market insights beyond the numbers!

Register now

Register as an end-user

Discover European cyber solutions in an easy and reliable manner with validated reviews and ratings from peers.

Register now