Sort solutions by

Find your solutions

Solution category
Pricing model
Market applications
Ideal organisation type
Deployment mode
67 results found
Secfense
solution image

Secfense User Access Security Broker (UASB) | Switch to MFA, FIDO2 or Passkeys in 5 minutes

The Secfense User Access Security Broker streamlines the adoption of multi-factor and FIDO2...

European Digital Innovation Hub Trakia

Trakia Cyber Range

Digital Innovation Hub Trakia builds and offers free-of-charge a Cyber Range as a Service solution...

Cyber Trust Services GmbH

Cyber Trust Label

The Cyber Trust Label shows that you are a secure and trustful organisation within the supply chain...

Cyberhoney Ltd.
solution image

Showcase solution #1

This is the summary of our revolutionary company. We provide affordable mobile security for Apple...
Secutec BV
solution image

Leaked Credentials & Darknet Monitoring - Secutec SecureSIGHT

Shine a light on the darknet with our 24/7 managed darknet monitoring service Our darknet scans help...
Excalibur

PAM and MFA

Privileged Access Management ( PAM ) By utilizing and expanding concepts known and used by...
Planck Security

Planck

Planck is the end-to-end encryption and decentralized identity management solution for your email...
SandGrain B.V.

A new sovereign European trust platform for secure electronic components, trusted data and circularity.

A new sovereign European trust platform for secure electronic components, trusted data and...
EGERIE
solution image

EGERIE Risk Manager

EGERIE is a collaborative platform that maps and financially quantifies cyber-origin risks and helps...
CDeX PSA
solution image

Cyber Readiness Training

The security of your organization lies in the hands of your cyber soldiers. Training for the most...
CDeX PSA
solution image

CDeX Cyber Range

A cyber range supports an organization at every step of its day-to-day operations. From finding the...
Canary Bit AB
solution image

CC Inspector

Zero-trust Cloud Security Cloud end-users are more and more keen to use Confidential Computing...

Want your solution to be listed above?

Become a vendor

Register as an investor

Get in touch with innovative and capital searching cybersecurity companies with market insights beyond the numbers!

Register now

Register as an end-user

Discover European cyber solutions in an easy and reliable manner with validated reviews and ratings from peers.

Register now