Directory · CZ
Computer and Network Security in Czech Republic
A register of firms and the professionals working at them in the Computer and Network Security sector based in Czech Republic. Browse the public index, then filter or export on Kipplo.
Companies
66 on file
Satoshilabs
We are technology pioneers developing products that secure individual autonomy and privacy. Innovation drives our brand success, putting us in a unique position where we get to focus on projects that matter, without having to compromise. SatoshiLabs established the cryptocurrency hardware wallet industry in 2013 with Trezor and hasn’t stopped innovating since. Our pioneering team delivers secure solutions to real-world problems, with Tropic Square creating the first auditable secure chip, Invity bringing new ways to access crypto, and Trezor developing new secure hardware and interfaces. Trezor, the original bitcoin hardware wallet, has developed into a multi-functional device that meets the needs of advanced and beginner users alike. Its success has enabled SatoshiLabs’ rapid expansion across its three constituent companies, as part of a unified strategy to meet new global challenges with cutting-edge solutions. We champion independence, innovation and secure access to finance for everyone, everywhere. Learn more about our companies at the links below: • SatoshiLabs - https://satoshilabs.com • Trezor - https://trezor.io • Invity - https://invity.io • Tropic Square - https://tropicsquare.com • Vexl - https://vexl.it
51 to 200 staff
Citadelo - Hackers On Your Side
Citadelo was founded by ethical hackers to help companies identify vulnerabilities through simulated attacks. Backed by a team of 30 professionals, the company is a market leader in Slovakia and the Czech Republic and has offices in Zug (Switzerland), Prague and Bratislava. By engaging in cloud security testing, application testing, and more, the cybersecurity firm helps businesses achieve a higher level of security. • Perfect in-depth knowledge of web technologies and underlying technologies. • Lot of experience in ethical hacking of web applications. • Deep knowledge of OWASP Testing Guide. • Very good experience with the auditing of portable devices. • Reverse engineering of binary code of x86 (32/64) and ARM (32/64) architecture. • Deep understanding of Linux/Solaris/*BSD systems. • Deep understanding of Windows systems. • Very good knowledge of cryptography and it’s principles. • Deep understanding of networking and network protocols. • Ability to adapt to uncommon situations and technologies. • Ability to very quickly and effectively respond to security incidents. • Deep understanding of cloud security (AWS, Azure, VMware and Google Cloud) More information: https://citadelo.com/en/
11 to 50 staff
Cyber Rangers
We are Cyber Rangers – a team of professional ethical hackers helping companies and institutions prepare for cyber threats. We provide comprehensive cybersecurity services including testing, training, consulting, and education. Our mission is to raise security standards and make the digital world a safer place.(cyber-rangers.com) Our services include: Penetration Testing – We assess the resilience of your systems against real-world attacks and identify vulnerabilities. Training & Workshops – We deliver hands-on courses to help your key personnel recognize and respond to cyber threats. Consulting & Advisory – We offer independent security assessments and expert recommendations to improve your defense. We continuously monitor hacker communities to stay up to date with the latest attack strategies and tools. Our work is based on trust, objectivity, and the confidentiality of your information. We connect cybersecurity experts, IT managers, and business leaders to collectively strengthen our defenses. Through podcasts, conferences, and blog posts, we share our knowledge and experience with the community. Join us and take your organization’s security to the next level.
1 to 10 staff
Anycloud A S
As a trusted vendor, Anycloud specialize in delivering unique services to a diverse market, protecting businesses worldwide. With a commitment to innovation, reliability, and simplicity, we empower businesses to enhance the full potential of the cloud, drive efficiency and growth with scalability. We collaborate with our distributors to deliver security and data management. Our portfolio of cloud solutions each has an individual focus and expertise for data protection and digital security, delivering market leading technology. The Anycloud team joins together with passion for delivering unique services with reliability and simplicity, striving to be your trusted vendor in utilizing the full potential of the cloud. At Anycloud, we are not just a company, we are a team of people dedicated to driving your success forward.
11 to 50 staff
3key Company
Information technology is everywhere. Data is everywhere. There are many different solutions for the same business objectives. We are here to help you with figuring out what is the right for you, interpret your data to streamline your business, protect critical assets from being intercepted and compromised by unauthorized parties, to support you in getting the right direction. In today’s spectrum of different technologies we are showing that it can be still easy and fun to apply it and to have it operated in convenient way. Our team of professionals can provide you with the best in class solutions and products that you will love! Once you try, you will never want to do it differently. We poses of a great ability to apply our knowledge, experience, and skills to create something unique our customers can rely on. But for us it is more than that. We are always finding a new ways how to get the most from the desired results to support your business.
11 to 50 staff
Peig Passwordless Access
Peig is the workspace browser for passwordless access that's here to revolutionize the digital security game. We strive to once and for all say goodbye to the era of forgotten passwords and security hassles. In the online world, ransomware and data breaches are constantly on the rise, when the use of stolen credentials became the most popular entry point for breaches. The problem is that many businesses still rely on passwords when it comes to protecting their data. We've identified fundamental flaws that call for fundamental innovation. Our philosophy is rooted in addressing core issues with a strategic focus on innovative technologies, paving the way for the next era of internet security. With its cutting-edge phishing-resistant capabilities, Peig stands as the shield to protect the entire organization's workspace from malicious access threats. Peig unifies access security across public and private cloud applications and infrastructures, creating a seamless and secure digital landscape for businesses. Peig ensures that any team can stay connected and productive anytime, anywhere, without compromising on security.
11 to 50 staff
Redamp.Io
Step effortlessly into a different way of handling digital safety solutions. Straightforward and understandable protection without privacy violation. No MDM.
11 to 50 staff
Axenta
At AXENTA, we help our customers identify and implement the most effective, tailored cybersecurity solutions. Since 2009, we’ve been supporting organizations across the Czech Republic and the Slovak Republic in navigating an increasingly complex digital landscape. We specialize in the implementation of IT security products and solutions, the delivery of strategic cybersecurity projects, and the operation of advanced security services through our in-house CyberSOC (Security Operations Centre). With deep expertise and a future-focused approach, we enable both private companies and government institutions to build secure, resilient, and trustworthy digital environments. AXENTA has an extensive experience with: • Implementation of Log management tools and systems. • Implementation of SIEM solutions and Incident response procedures. • Implementation and operation of performance monitoring systems. • Implementation of security devices to the network perimeter (proxy, application firewall, firewalls, VPN gateway, etc.). • Risk analysis and risk management workflows. • Datacenter design and consultations. • Investigation of security incidents.
11 to 50 staff
Insighti
We believe that true cyber security means having the best insight. We work with our clients to provide the right insight into their systems’ security so they know exactly what level of protection best fits their data. This insight overflows into all areas of our work. We ensure that each client gets individualized services that can apply to their unique needs. Our security specialists and consultants work with each client to provide efficient, professional solutions. These solutions conform to our rigorous standards of excellence, so each client can be sure that they are receiving the best that the industry can offer. From our conception in 2012, insighti has grown into an international brand. insighti is currently supporting the continents of Europe and North America with our two main offices in Prague, Czech Republic and Las Vegas, Nevada. Learn more at insighti.com Join us on our other social media channels:
11 to 50 staff
Aricoma Cybersecurity
We have been one of the leading providers of cybersecurity services for more than thirty years. We have an experienced and strong team of experts, who are able to test new technologies within our own innovation lab. Thanks to our unrivalled portfolio of services, we can cover all our clients' unique requirements. We help them to solve today's most demanding security challenges individually, promptly and as efficiently as possible.
1001 to 5000 staff
Cqre.Net Ltd
Our mission is to help small and medium businesses to secure their data so their owners can sleep better. We also provide consultations for larger enterprises in specific domains.
1 to 10 staff
Ellio
ELLIO is a research lab focusing on real-time detection and analysis of mass exploitation and network reconnaissance. We uncover attack patterns, anomalies, and emerging threats - delivering actionable threat intelligence and tailored solutions to optimize existing resources, mitigate risks, and prevent losses from mass exploitation and network recon. ELLIO Threat Intelligence Platform: https://platform.ellio.tech/- Massive threat data repository on mass exploitation and recon - Advanced Threat Researches - Blocklist Management & Automation - Ultimate IP Blocking - Cyber Deception as-a-service - Custom Threat Feeds to superchange automation, hunting, response, triage.
1 to 10 staff
Goodaccess
GoodAccess is the world's most usable cybersecurity SaaS for enabling secure remote access to digital resources. Deployable in just 10 minutes. Delivers SMEs the benefits of zero trust network access (ZTNA) without the complexities. Any company can mitigate the risks introduced by remote workforce, BYOD and distributed IT resources with no hassle. GoodAccess is recognized by TechRadar as one of the best ZTNA solutions and acclaimed by leading review platforms such as G2 and Capterra for its excellence in customer support, simplicity, and ease of use. As part of our mission, in 2022 we brought companies all around the world the first forever-free business VPN named GoodAccess Starter that helps them achieve secure remote access essentials with no constraints. Companies in more than 120 countries use GoodAccess to secure access to their business systems, applications, clouds, and data. Anytime, anywhere. Start your 14-day full-featured free trial at
11 to 50 staff
Greycortex
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable. GREYCORTEX Mendel is a network detection and response tool that combines advanced artificial intelligence, machine learning, and data mining methods with unique network visibility to visualize network communication, detect risks and threats, and respond quickly and effectively to threats from misconfigurations, performance problems, or policy violations, as well as new advanced threats and hacker activities that are able to bypass existing security tools.
11 to 50 staff
Avast
Avast is a leader in Cyber Safety and part of Gen™ (NASDAQ: GEN), a global company dedicated to powering Digital Freedom with a family of trusted consumer brands.
1001 to 5000 staff
Logmanager
Logmanager is a log management platform enhanced with SIEM capabilities that radically simplifies responses to cyberthreats, legal compliance, and troubleshooting. By transforming diverse logs, events, metrics, and traces into actionable insights, it helps security and operations teams respond swiftly to any incident. Experience effortless self-management and customization, peerless functionality, and the flexibility to take control of your entire technology stack.
11 to 50 staff
Amenit Software Solutions
Antivirus and Security Software sales and distribution (ESET, AVG, Kaspersky, Norton, Symantec, BitDefender, Panda, Norman, F-Secure, Avira, Microsoft etc. more on and Custom software developping (.NET, MS SQL, PDA), network and computer maintenance, Microsoft SharePoint programming.
11 to 50 staff
Noibit
Who we are? We are privately owned, Czech Republic based Cloud and Cyber Security company. We are proudly independent and agnostic – not linked to any vendor or product. We have many years of cloud and security experience from various sectors (research, development, banking, retail, telco, gaming.). We benefit by our extensive background in various IT and business areas.
11 to 50 staff
Next Generation Security Solutions
Chraňte své podnikání. Pomáháme klientům najít správnou cestu v labyrintu bezpečnostních řešení. Jsme česká společnost poskytující služby specialistů v oblastech informační a kybernetické bezpečnosti- Řízení rizik v oblasti bezpečnosti informací - Analýzy IT rizik - Penetrační testování - Bezpečnostní audity a srovnávací analýzy - Design a implementace systémů řízení bezpečnosti informací - Návrh bezpečnostní architektury - Hodnocení zranitelností IT systémů a zavedení systému jejich řízení - Školení a zavedení systému bezpečnostního vzdělávání Naše certifikace - Lead auditor ISMS (ISO/IEC 27001)- Lead auditor SMS (ISO/IEC CEH (Certified Ethical Hacker)- CISM - CRISC - Manažer systému bezpečnosti informací - ISO/IEC 27001:2014
11 to 50 staff
Penterep
Penterep je platforma usnadňující penetrační testování vhodná nejen pro začínající (méně zkušené) testery, ale i pro zkušené profesionální týmy. Cílem platformy je poskytovat řešení, které penetrační testování zefektivní do takové míry, že časová náročnost, složitost a práce nutná k úspěšnému dokončení bezpečnostního testu bude značně nižší než při použití aktuálně dostupných nástrojů. Platforma podporuje také teamovou spolupráci propojením penetračních testerů s manažery a vývojáři.
1 to 10 staff
Teskalabs
TeskaLabs is a software vendor of cybersecurity and data privacy products. We builds and delivers products for: · Real-time security monitoring - SIEM and Log Management · Safe communication for smart transport systems (C-ITS)- Public Key Infrastructure (PKI) · Advanced cybersecurity technologies for mobile, PC, web and IoT applications Our mission is to build a safer world and to help others through creativity and hard work. TeskaLabs is an award-winning company committing to creating advanced software technologies. We are a proud member of Microsoft BizSpark Plus, a strategic partner of O2 Czech Republic, and a Cisco Preferred Solution Partner. TeskaLabs operates from our headquarters in London, United Kingdom, with an additional office in Prague, Czech Republic. More information is available at StartupYard '15 | Techstars '15 | IDEALondon '16
11 to 50 staff
Trustport
TrustPort is a security solutions developing company from the heart of Europe. Our mission is to secure and protect the data and the communications of our customers all around the globe. We provide tools to protect against known and unknown threats, for both home users and large enterprises. Our security solutions are comprehensive products which include continuously developed antivirus and encryption technologies, anti-spam methods and anomaly behavior monitoring AI techniques. We develop them with the outstanding know how of our experienced analysts and the newest cutting edge technologies and methods. With our products, your computer, or your whole company network, will be secured and protected against all modern cyber threats. With the roots dating back to 1991, with more than 1 users worldwide, with multiple successes at various testings by many independent labs, and being a part of Cleverlance Group, a leading CEE company that provides IT solutions and services in the corporate, financial and TELCO sectors, TrustPort belongs amongst the most experienced and the most trend-setting security companies in the world. Since the beginnings, TrustPort has continued developing own data and network security monitoring technologies, resulting in a product which incorporates unique AI intelligence technologies, which achieved multiple successes at NIST challenges. We continually strive to provide our clients with cutting edge comprehensive solutions bringing them the best protection wherever they are and whatever they do.
11 to 50 staff
Ackee Blockchain Security
Cybersecurity experts. We audit Ethereum and Solana. Educational partners of Solana Foundation. We build community tools: Wake, Tools for Solidity.
11 to 50 staff
Besecured
Našim dlouhodobým záměrem je zvyšovat povědomí organizací a lidí o nutnosti ochrany jejich dat, informací a soukromí. Těšíme se, až vám budeme moct předat naše zkušenosti, které jsme za více než 15 let nasbírali a pomoct vám tak ochránit vaše data. S čím vám můžeme pomoci? • Ochrana dat a informací • Ochráníme vaše data a informace před hrozbami po celou dobu jejich životního cyklu. • Vše kolem ISO 27001 • Zavedeme vám ISMS, vytvoříme bezpečnostní strategii na míru a připravíme vás na certifikaci. • Zabezpečení IT prostředí • Zabezpečíme vaše IT prostředí, aby odolalo bezpečnostním hrozbám. • Bezpečnostní audity • Důkladně prověříme vaše zabezpečení a navrhneme vhodné kroky, jak ho vylepšit. • Řízení bezpečnostních rizik • Odhalíme a vyřešíme vaše bezpečnostní rizika. • Řízení bezpečnostních incidentů • Vyřešíme vaše bezpečnostní incidenty tak, aby se již víckrát neopakovaly. • Bezpečnostní strategie • Nastavíme a vyladíme vaší bezpečnostní strategii tak, aby přesně odrážela potřeby vaší společnosti. • Vzdělávání v bezpečnosti • Uděláme z vás odborníky na ochranu dat a informací. Stanete se specialisty v tomto oboru. • Business Continuity • Provedeme Business Impact Analýzu, vyhodnotíme ji a navrhneme Disaster Recovery Plány.#security #onlinesecurity #bezpečnost #onlinebezpečnost
1 to 10 staff