Directory · ME
Computer and Network Security in Montenegro
A register of firms and the professionals working at them in the Computer and Network Security sector based in Montenegro. Browse the public index, then filter or export on Kipplo.
Companies
7 on file
Digit Montenegro Doo
DIGIT MONTENEGRO is an ICT company established 1996. Specialized for Data Center virtualization, Data Protection, IT security, Networking and Hardware Services, the company is partner of leading ICT vendors worldwide: Dell Technologies, HPE, HP, Cisco, Kaspersky, Fortinet, WatchGuard, Microsoft, VMware, Oracle, Veeam, Zimbra, ManageEngine and VUE.
11 to 50 staff
Acsg
Why ACSG? Trust Our team isn’t just skilled; we’re battle-hardened. With years of experience tackling real-world threats, we know how to uncover vulnerabilities and help you secure your business. Your safety is our mission, and we approach it with a deep sense of responsibility. Expansion No matter your size or industry, we design our services to meet your needs. Whether you’re building trust with partners or reassuring clients, we’ll ensure your security measures are rock solid, helping you confidently grow your business. Efficiency Industry standards like ISO-27001, PCI-DSS, GDPR, NIST, HIPPA, or SOC2 don’t have to be a headache. We make compliance a smoother process, seamlessly integrating penetration testing into your regular audits so you can focus on what you do best. Advantage Why settle for ordinary when you can lead the way? Our services, including red teaming and advanced penetration testing, give you access to cutting-edge expertise, all without the complexity or cost of managing your own security team. Excellence Our team is composed of seasoned cybersecurity experts who understand the attacker’s psyche. Unique selection process ensures that only the most talented and experienced individuals join our team. At ACSG, we take pride in our work, knowing that our expertise serves as the foundation for your security. Service We’re not just another vendor. We see ourselves as an extension of your team. By listening to your challenges and tailoring solutions to your specific needs, we aim to build lasting partnerships grounded in trust and genuine care for your success.
1 to 10 staff
Cirt.Me
CIRT.ME (eng. Computer Incident Response Team) je u skladu sa Zakonom o informacionoj bezbjednosti, zadužen za odgovor na računarsko bezbjednosne incidente u sajber prostoru Crne Gore. Osnovan 2012. godine kao dio zajedničkog projekta Vlade Crne Gore i Međunarodne telekomunikacione unije (ITU). Od svog početka do danas uspješno je riješio ili pomogao rješavanju velikog broja računarskih incidenata koji su imali nacionalni ili međunarodni karakter.
1 to 10 staff
Fosen Ikt
IKT-driftsenter for de samarbeidende kommunene i Fosen. Driftsenteret er en avdeling i Indre Fosen kommune. Leverer tjenester, drift av nettverk og klienter. FosenIKT består for tiden av 11 ansatte og 3 lærlinger innen IKT-servicefag.
11 to 50 staff
Women4cyber Montenegro
The non-governmental association “Women4Cyber Montenegro” was founded as a representative of Women4Cyber Marie Kert – Saint Aubyn Foundation (W4C) a non-profit European organization based in Brussels (Kingdom of Belgium), which was founded in 2019 by the European Cybersecurity Organization (ECSO) and Guardtime with the aim of raising awareness towards a gender inclusive cybersecurity community.
1 to 10 staff
Point Solutions
Your company is bottlenecked by manual work. Your security team blocks automation tools because they can't control them. Your auditors want answers you don't have. I'm Valery Levchenko. 15 years building security systems at NSO Group, Noname Security, Qwilt. CISSP, AWS Security Specialty. I lead Point Solutions and personally handle the complex infrastructure work that slows companies down. The bottleneck: Operations wants AI agents running payroll, processing invoices, handling employee data. Security says no because these tools can exfiltrate anything. Both sides are right. The tools aren't built for sensitive work. We built Flowpoint to solve this. It's an automation appliance you own and control. Deploy it in your cloud, on your infrastructure, or air-gapped. Your AI agents work 24/7 on the tasks eating your team's time – but they can't leak data because the security architecture won't allow it. Proxy whitelist – agents only reach approved endpoints. Network isolation – your data stays contained. Complete audit trails – you see every action. MFA, RBAC, session recording. 450+ integrations with the tools you already use. What this means for your company: Your operations team gets the automation they need. Your security team gets the controls they require. Your auditors get the evidence they want. Your business moves faster without the risk. We also handle the hard security work: AI Security Architecture – Design systems that prevent data leakage, not just detect it. RAG implementations that your security team will approve. Infrastructure Hardening – Penetration testing, cloud security, zero-trust design. We find what breaks and fix it. Compliance Implementation – SOC 2, ISO 27001, PCI DSS. We build the controls in your infrastructure, not just the paperwork. 15+ companies. Every one that implemented our recommendations passed their audits and runs faster. If your company is stuck between needing automation and maintaining security, we can help.
1 to 10 staff
Dmzcon International Cyber Security Community
Since the very beginning of our project, by design, the DMZCON is some type of Digital Demilitarized Zone between the Cybercriminal Underground and the Society. Same, by design, the DMZCON is a stateless nomad project, which holds online and offline cybersec activities in different parts of the world. For sure, DMZCON crew are not criminals and all of us respect International Laws. Through this "Demilitarized Zone" concept we are trying to make the World a safer place to live. We do not support cybercriminals and we never will. But at the same time DMZCON is a some type of buffer zone for connections with cybercriminals. Cybercriminals may use DMZCON to pass their information to society. You may use the analogy of a "spy bridge" to meet two sides that are at enmity. DMZCON is similar to such a bridge, we are acting worldwide. For sure, if there is any chance to identify criminal persons (usually it is impossible), we will pass all information to Police Authorities.
11 to 50 staff