Directory · EE
Computer and Network Security in Estonia
A register of firms and the professionals working at them in the Computer and Network Security sector based in Estonia. Browse the public index, then filter or export on Kipplo.
Companies
54 on file
Rangeforce, A Cyberbit Company
Achieve true cyber readiness with the leading blue team training for SOC teams. Assess, refine, and validate skills needed to defend your organization against current cybersecurity threats.
51 to 200 staff
Cybexer Technologies
CybExer is the leading European Cyber Range provider with a focus on AI warfare and advanced digital twin environments. Trusted by NATO, the British Army, the Army of Ukraine, Fortune 500 companies, and leading banks, CybExer operates in over 60 countries, delivering the most flexible and customizable training solutions in the market. Our AI-driven simulations and autonomous defense exercises enable military organizations, critical infrastructure, and financial institutions to achieve cyber preparedness.
51 to 200 staff
Bugbounter
Bugbounter is a crowdsourced security platform that networks the crowd of freelance security researchers and security organizations with corporations and institutions. Our out-of-box approach to cybersecurity (Bug Bounty) allows organizations to test their software in a more creative way through our community of freelance researchers. We aim to set up a secure ecosystem where dedicated dreamers of a hack-free world willingly gather their talent and resources to outsmart and outperform the darkside. For Companies: The Bugbounter platform runs on blockchain so it is transparent, democtratic, secure and agile- thus trustworthy! We provide continuous testing opportunities within the ecosystem, therefore companies discover vulnerabilities that current penetration testing methods would hardly uncover-in a much faster way. Since Bugbounter rewards only the verified successful exploits, the service is highly cost-effective. For Researchers: Our platform gives all the security researchers the same opportunity to challenge their talent, earn rewards and fame. In order to be invited to special bounty programs, researchers would have to go through various levels of vetting processes.
1 to 10 staff
Cyber Struggle
In Cyber Struggle, We bring the mindset and doctrine of the special forces to the cyber world! We develop technologies, methodologies, and simulations where we help cybersecurity frontliners to remain extremely functional, resilient, and primed; technically and psychologically, no matter the conditions. We blend hybrid technical skills with human-centric skills in a dynamically changing environment by using our unique methodology inspired by the special forces mindset and training.
11 to 50 staff
Eid Easy
eID Easy is a fast growing company, highly skilled and specialized in international secure electronic signature methods. We have a strong focus in qualified electronic signatures under the EU eIDAS framework, but also cover other popular methods. We are integrating all possible ID methods and are building the nicest possible API to make you forget about the hassle it once was to offer such functionalities to your clients and partners. We will significantly reduce your project cost and deployment time, open up a wide range of new opportunities and give you a competitive advantage. eID Easy team
1 to 10 staff
Resilientx Security
ResilientX Security is a fast-growing Cyber Security company that helps organizations of all sizes identify, quantify and manage their cyber risks and cyber exposure. At ResilientX, we are committed to delivering state-of-the-art security solutions to help organizations safeguard their digital assets and maintain compliance. Our First-Party and Third-Party Risk and Exposure Management platform is designed for those who take security and compliance seriously. Our Solutions: Unified Exposure Management (UEM): ResilientX UEM provides a holistic approach to proactive security. Our platform is engineered to automatically identify assets, perform in-depth security testing, and reduce risks across your entire attack surface. We cover a broad spectrum of potential vulnerabilities, including IPs and domains, web applications, cloud environments, network devices and services, APIs, and dark web threats. Third-Party Risk Management (TPRM): Our TPRM solution offers a comprehensive 360-degree approach to managing risks posed by suppliers, vendors, and strategic business partners. ResilientX TPRM enables you to assess, monitor, and mitigate these risks effectively, automating and streamlining your assessment and monitoring activities. Our solution can save up to 6 hours of cyber due-diligence per vendor each month. Interested to see ResilientX in action? https://resilientx.com/demo
11 to 50 staff
Silent Breach
At Silent Breach, we think like a hacker and defend like a pro. We fuse world-class offensive security expertise with state-of-the-art defensive capabilities, helping organizations uncover hidden vulnerabilities before attackers do. Our team of elite penetration testers, threat hunters, and red team operatives delivers intelligence-driven security designed to outthink, outpace, and outmaneuver modern threats. With offices in New York, Florida, Paris, Singapore, and Chennai, we operate across multiple time zones to provide continuous coverage for our clients. Silent Breach is ISO 27001 certified, ensuring the highest standards of information security in everything we do. Our expertise has earned us global recognition, including: • Top PenTest Provider • Bug Bounty Hall of Fame • Top 10 Cybersecurity Solutions Provider • Top 10 Vulnerability Management Provider Quantum Armor: Our flagship platform, Quantum Armor, brings 24/7 attack surface monitoring and proactive defense to the modern enterprise. Powered by AI-driven reconnaissance, continuous vulnerability tracking, and actionable threat intelligence, Quantum Armor enables you to spot—and stop—emerging threats before they become breaches.
11 to 50 staff
S4e
Welcome to S4E – where we believe cybersecurity is a fundamental human right. At S4E, our mission is to democratize digital security, making it accessible, simple, and effective for individuals and businesses of all sizes. Who We Are: S4E is a cutting-edge SaaS cybersecurity platform designed with the user in mind. We understand that in today's digital world, security should not be a luxury but a necessity that is within everyone's reach. Our platform provides comprehensive security solutions that are easy to use, ensuring that you can protect your digital assets with just a few clicks. 4 E's of S4E: Everyone Plan: Free basic security scans for your website and digital assets. Ideal for those just getting started. Expert Plan: Single manual in-depth security scan for detailed analysis. Perfect for professionals needing targeted insights. Elite Plan: Automated security scans for up to 10 digital assets. Designed for growing businesses looking for proactive protection. Enterprise Plan: Unlimited asset scans with tailored security solutions and support. The ultimate choice for large organizations with extensive security needs. Why Choose S4E User-Friendly: Our platform is designed for simplicity and efficiency, requiring no prior expertise. Comprehensive Tools: Access the world's largest set of online and free security tools. Trusted by Thousands: Join over satisfied users who trust S4E to safeguard their digital presence. Our Philosophy: At S4E, we are driven by the belief that everyone deserves top-notch cybersecurity. We strive to empower our users with the tools and knowledge they need to stay secure in an ever-evolving digital landscape. Our commitment to accessibility and effectiveness ensures that no one is left vulnerable. Join Us: Protect your digital future with a platform that combines advanced security measures with unparalleled ease of use. Discover the power of secure simplicity today. Visit S4E
11 to 50 staff
Phishbite
Phishbite is an easy-to-use, AI-powered phishing simulation platform designed to reduce cybersecurity risks by increasing employee awareness. Phishing attacks are the most common form of cybercrime. The use of large language models (LLMs) and text generation algorithms has made phishing attacks much more effective. The Phishbite service is easy to start, and we offer a 14-day free trial.
1 to 10 staff
Oddeye
OddEye is all in one monitoring and anomaly detection platform. It uses machine learning to detect anomalies and generated alerts with minimal human intervention. OddEye provides full insight into what happens inside your systems, intelligently detects and alerts about anomalies. Canvas powered light but powerful dashboards visualizes your data with line, pie, gauge, funnel, bar, treemap and infrastructure charts.
1 to 10 staff
Guardtime
Guardtime is a deep-tech company founded in Estonia in 2007. Guardtime has been solving complex data management and data security challenges to the most demanding clients globally. At the heart of Guardtime has been R&D and innovation of hash-based cryptography and development of blockchain technologies to meet various industry challenges. Important notice: We would like to inform you that in recent days, fake recruitment campaigns have appeared, which are taking place under our company name on LinkedIn. This is not an activity initiated by Guardtime and we have not published any official job advertisements or are currently recruiting new employees. We ask you to be attentive and- Do not share your personal data with suspicious profiles or contacts- Check official information only on our website or official LinkedIn page.
11 to 50 staff
59 Degrees North
At 59 Degrees North, we are dedicated to being your trusted partner in securing digital assets and building resilience against cyber threats. 59 degrees north of Sydney in Estonia - home to the NATO Cooperative Cyber Defence Centre of Excellence - our team draws on deep expertise in cybersecurity. We excel in delivering tailored solutions in security governance, risk management, security testing, and compliance, collaborating with industry leaders to provide top-tier services. With a client-focused approach, we ensure our solutions are aligned with your unique needs, empowering you to operate confidently. Discover more about our services and partnerships on our website.
1 to 10 staff
C-Yber
C-YBER works with organizations to understand real cyber risk and exposure. Our work focuses on identifying weaknesses through vulnerability assessments and penetration testing, including API security. The goal is to help decision-makers see what is actually at risk and what assumptions may not hold. We work closely with technical teams and developers, translating findings into clear priorities that support informed decisions and accountability.
1 to 10 staff
Kordon - The Straightforward Grc Platform
Follow us for regular tips on smarter ways to manage information security 🧠
1 to 10 staff
Security For Everyone
We are offering all critical vulnerability and information collection scanning free for everyone. We are explaining vulnerabilities simply and effectively, and provide actionable solution recommendations. We are regularly conducting all vulnerability scanning for an affordable fee and we enable you to monitor instantaneously.
1 to 10 staff
Xcrypt
xCrypt is the first innovative crypto ecosystem with its heart in ist exchange: hybrid, compliant with the securities and attentive to the erc721’s future, designed to be simple, comfortable and innovative. We believe that, in the near future, many changes in the cryptocurrencies field will occur, as well as in the trading field and in how this world is conceived. This is the reason why, after carefully developing its concept, since its host country allows it, xCrypt decided that its priorities are those of listing security tokens, having an appropriate and strategic marketplace for the erc721 and carrying out innovative dynamics in the relationships with the ICO. These decisions were taken so that xCrypt can reward its community with a zero fee exchange, relating it to the other members through the social media platform and monthly compensating its holders via airdrop through a ranking system. XCT token is the one that allows to benefit from the xCrypt ecosystem’s services and it rewards its exchange users and holders following an innovative method through important airdrops. Features - Fully compliant trading operations - Centralized & Decentralized Exchange Platform - Withdraw FIAT from cryptocurrencies | Store FIAT and cryptocurrencies - Custom built Bot Trading | Airdrop Ranking System - Erc 20 | Erc 721 | Memberships - ZERO fees | Securities token - Dependable digital wallets | 100% encrypted platform - Multi Language Platform | Fast deposits and withdrawals - Exchange FIAT and Cryptocurrencies - Make payments with FIAT and cryptocurrencies - Providing tutorials and webinars from expert traders - User friendly website interface and mobile app
11 to 50 staff
Cybertech.Global
CYBERTECH lahendustega tagad enda inimeste küberhügieeni ja teadlikkuse ning taristu turvalisuse nii, et ühel heal päeval ei saa küberpätid Sinu elutööd minutitega hävitada. Miks valida meid? Küberkaitse, mida tavaliselt ainult suurkorporatsioonidele võimaldatakse. Meie paindlikud ja taskukohased paketid võimaldavad igal ettevõttel saada kõrgema taseme turvalisust ilma keerukuse ja liigsete kuludeta. Lisaks tõstab meie koolitusteenus teadlikkust ja annab praktilisi oskusi, et iga töötaja oleks tugev kaitseliin küberrünnakute vastu. Lisaks meie tehnilistele oskustele oleme ka usaldusväärsed partnerid, kes hoolivad Teie edust. Meie ekspert Timo - kogenud IT-konsultant ja lektor – toob oma teadmised ja kogemused otse Teie ettevõtte teenistusse, aidates luua lahendusi, mis kaitsevad. Kirjuta, helista, joonista! reio@cybertech.global Esimene konsultatsioon ja hinnapakkumine TASUTA!
1 to 10 staff
Asicvault
AsicVault makes physically secure cryptocurrency vaults and high performance hard disk encryption devices. AsicVault Bitcoin hardware wallet provides significantly higher security compared to BIP-39 wallets. It also leverages both active and passive anti-tamper technologies.
1 to 10 staff
Ctf Tech
We are generating future cyber talents through educational CTF platform, academy trainings and high adrenaline Capture the Flag (CTF) events.
11 to 50 staff
Cyberoon
We are a team that has advanced engineering disciplines in each field for 10 years, has left permanent works in the information sector, closely follows the visionary and developing world, and offers solutions beyond the time of the domestic and foreign sectors-The passion to leave time and lasting works is a major source of energy for every project we conduct as a team -We invest all our gains into our future.
11 to 50 staff
Idyllum Labs
We believe that website security testing and enhancements can be painless and accessible to every website owner on the world wide web. That's why we've taken industry-standard penetration testing tools and deployed them as part of our SaaS software platform that can generate a full security report for your site in literally one click.
1 to 10 staff
The Security Company
Cybersecurity, but easy. No BS. Just results. We’re on a mission to secure your mission. No fluff, no corporate jargon—just real security that works. Offensive Security – We go beyond classic pentesting with continuous, all-year-round testing and real-world attack simulations. We find the holes so you can sleep at night. Defensive Security – 24/7 monitoring, incident response, SSDLC, Cloud Security, full asset protection—you name it. You pick the tools, we do the work, you take the credit. Security Management – Compliance from 0 to 100. ISO 27001, SOC 2, NIS2, DORA, GDPR? We handle it. You focus on making money, so you can afford us. Cybersecurity Academy – We don’t just hire cybersecurity talent, we create it. 300+ trained experts and counting. We sell peace of mind—with transparency, quality, and integrity at our core. Our clients vouch for us. Our results speak for themselves. 35+ Cyber Experts | 250+ Clients | 450+ Projects | 180+ People Trained
1 to 10 staff
Crip.To
CRIP.TO OÜ is an Estonia-based technology company focused on the manufacturing of hardware and software products to provide users with the highest possible level of end-to-end encryption of any communication. The CRIP.TO encryption solution consists of products and services that provide the highest level of encryption available on the market. The solution consists of CRIP.TO Shield, a smartphone app, CRIP.TO Black (Black), a standalone hardware device, and the CRIP.TO Network that is blockchain-enabled and decentralized for the highest level of user privacy and anonymity. Join us on Telegram http://bit.ly/tg-crip_to
1 to 10 staff
Cybersift
At Cybersift, we believe cybersecurity should be intelligent, accessible, and built to empower everyone. Born from a fusion of research and real-world expertise, we transform advanced AI into clear, strategic protection - enabling every organization to stay secure and resilient. Guided by our vision to make cybersecurity accessible to everyone and to serve as a protector for the unprepared, we stand as a trusted partner in a world where digital threats evolve faster than awareness. We don’t just protect systems - we protect confidence, continuity, and growth. Protection, at its core, is not about standing alone - it’s about standing together. Like in nature, where every instinct contributes to survival, our technology learns, adapts, and protects as one. Talk to Our Team info@cybersift.io +356 7949 8471 (MT)+44 20 8638 0550 (UK)
11 to 50 staff