Directory · SK
Computer and Network Security in Slovakia
A register of firms and the professionals working at them in the Computer and Network Security sector based in Slovakia. Browse the public index, then filter or export on Kipplo.
Companies
34 on file
Excalibur
Excalibur is a European deep-tech cybersecurity vendor delivering provable, preemptive Zero Trust security. Our unified Streamed Access Management (SAM) platform is trusted to secure some of Europe's most critical infrastructure. We solve the personal liability and compliance crisis created by NIS2 and DORA. Our Platform Delivers: Architectural Isolation: We stream access to all applications, ensuring critical systems are never directly exposed. This eliminates the attack surface. Preemptive AI Governance: We analyze user intent before execution, stopping threats preemptively, not reactively. A Provable Audit Trail: We create an immutable, legally-admissible record for every user action, providing the "proof of due care" executives now legally require. Our Technology is Proven: Market-Validated: Our superior, preemptive architecture has won major public tenders against incumbent global leaders in Privileged Access Management. Battle-Tested: Deployed in high-stakes European environments with the strictest security requirements, including a national-scale government cloud and the SWIFT infrastructure of a central bank (ECB). Certified & Vetted: Our operations are ISO 27001 certified, and our deep-tech roadmap is supported by multiple competitive R&D grants from European Cybersecurity Competence Centre and regularly penetration tested by independent 3rd parties.
11 to 50 staff
Cyber Security Competence And Certification Centre
Contributory organization of the National Security Authority, responsible for awareness, training, and certification in information and cybersecurity. Member of Network of National Coordination Centres (NCCs). Acting as the cybersecurity certification body and performing conformity assessment according to special regulation, verifying compliance with information security standards. Performing scientific and research activities and development in the fields of cybersecurity, information, and communication technologies. Providing educational events and conferences. Carrying out consultancy, advisory services, and training activities in the field of cybersecurity, classified information protection, and trusted services.
11 to 50 staff
Istrosec
Less surprise, more business.
11 to 50 staff
Canex, Spol. S R.O
Obchodná spoločnosť CANEX, spol. s r.o. vznikla v roku 1994 v Bratislave. Od prvých rokov pôsobenia sa zamieravala na počítačové siete a distribúciu IP technológií. V roku 1996 po získaní distribučnej zmluvy s firmou AXIS communications AB sa rozhodla špecializovať na IP video monitorovacie systémy a vlastný vývoj programového vybavenia pre IP video monitoring pod značkou WatchSystem. Od začiatku sme na Slovensku formovali a vytvárali mladý, ale dynamicky rozvíjajúci sa trh s IP kamerami a IP security riešeniami. Dnes je tento trh jeden z najrýchlejšie rastúcich trhov na svete. V súčasnosti našim partnerom ponúkame najširšie služby na Slovenskom trhu v oblasti IP security videa, od návrhu projektov, cez zákazkový vývoj softvéru až po školenia a poradenstvo. Sme hrdí na to, že sme boli od počiatku pri zrode nového segmentu na svetovom trhu – trhu IP kamier. Na Slovensku sme ho z pozície distribútora aj aktívne vytvárali. Dnes je tento trh stále jeden z najrýchlejšie rastúcich na svete. Disponujeme potvrdením priemyselnej bezpečnosti podnikateľa od NBÚ SR na stupeň „Tajné“. Naši zamestnanci absolvujú pravidelné domáce a zahraničné školenia z oblasti IP sietí a IP videa. Vybraní zamestnanci disponujú certifikátmi NBÚ na stupne utajenia „Dôverné“ a „Tajné“ podľa § 26 ods. 1 zákona č. 215/2004 Z. z. o ochrane utajovaných skutočností.
11 to 50 staff
Emm Slovakia
EMM is one of the leading providers of complex IT solutions since 1991 in Slovakia. We deliver innovative solutions that are supported by quality and professional services. Our aim is to become the leader in cybersecurity solutions and security of manufacturing systems. At the same time, we are an innovative partner with our own business process support solutions based on mobile technologies as well as solutions for common users. Our clients include major organisations from the telecommunications, finance, industry, networking and public administration sectors.
11 to 50 staff
Binary House
We help our clients identify and fix their vulnerabilities in applications, networks, and systems. Our services include penetration testing, security audits, reverse engineering, development of PoC/Exploits, and attacks using social engineering. We believe that offensive security is the right choice to secure systems against the attacks that defence solutions/mechanisms/systems usually cannot react to.
1 to 10 staff
Cardconsult S.R.O
CARDCONSULT is a platform to bring selected solution providers into partners & projects, primarily in the fields of MFA (Multi-Factor-Authentication), FIDO U2F/FIDO2 Smart Cards & USB tokens, OTP & PKI, E-Mail Encryption & Signing solutions and Hardware Authenticators. The company is not acting as a reseller but most likely as a "mediator" by bringing vendors and partners together.
1 to 10 staff
Comguard A.S
COMGUARD is a Value Added Distributor (B2B) focusing on Security products, Expert services, and training (ATC). We operate in Central and Eastern Europe, principally in the Czech and Slovak Republics. Solutions offered by our company fully meet the needs of large enterprises (Data Centers) on top of small and medium businesses. We represent Trellix, SOPHOS, Barracuda, Skyhigh Security, Rapid7, Wallix, Gytpol, LogRhythm, SCADAfence, Acalvio, Ekran, SecurEnvoy, Whalebone, DataLocker, ManageEngine. COMGUARD is certified to ISO 9001 (QMS), ISO 27001 (ISMS), SDS (Trellix professional services), ATC (Authorized Training Center), MSP distributor, Competence Center, and technical knowledge following the requirements of manufacturers.
11 to 50 staff
Data Network
DATA Network is an IT Hardware Consulting group providing a flexible, creative solutions in a hardware procurement and the support and a maintenance of a multivendor hardware systems. We can buy your old IT equipment: servers, storages, switches, routers, access points, firewalls, pdu, processors, RAM and etc. We can sell new equipment from factory Cisco, HPE, Dell, Juniper, Huawei, Extreme Networks, IBM, Lenovo, XFusion anв others. We are working with Europe, China, USA, CIS and Ukraine and other country. We have warehouse in Slovakia, Ukraine, Armenia. We works with IT Liquidation, IT recycling, IT asset recovery and disposal.
11 to 50 staff
Secom
SECOM Security na ochranu súkromia Vám umožní kompletne zabezpečiť Vašu komunikáciu na počítači a mobilných zariadeniach pred odpočúvaním treťou stranou. K tomuto zabezpečeniu používame najmodernejšie technológie a overené techníky.
51 to 200 staff
D.V.O
Pomáhame spoločnostiam predísť najhoršej nočnej more v IT – strate dát. Vytvárame virtuálne firmy bez toho, aby museli vlastniť drahú infraštruktúru. Prevádzkujeme korporátne web stránky bezpečne, na kľúč a bez starostí. Riešime dostupnosť a pohodlný prístup k e-mailu bez zbytočného spamu.
1 to 10 staff
Qubit Conference
Qubit Conference®, The Universe of Cyber Security and Digital Forensic Continuing success with our partners on Cyber Security Summit conferences since 2010, the Qubit Conference® provides a unique way to connect with leading practitioners and debate about topics of cyber security, cloud, and new era technologies, data breaches, privacy – perhaps a new green movement in the information era, mobile devices challenges, social networks, and digital forensics. We provide our trademark – digital security and forensics sessions – real everyday cyber warzone experience across various industries delivered by a stellar area of established industry professionals, visionaries, and luminaries. Our Mission is to bring knowledge to others who are looking for information based on best practices, real implementation stories, academical research, explore the latest innovations, and what is carving tomorrow’s industry landscape. Every attendee will find an opportunity for collaboration and open discussions, or new potential career ideas and professional opportunities for themselves. Our internal goal is to provide you with an excellent experience by lecturing about IT security’s most important issues and case studies that will enrich running your business and keep it safe transparently. Establishing the basis for professional discussions and knowledge sharing is the highest expectation of our attendees. Don’t push, the door is open, looking forward to seeing you at the next Qubit Conference® edition!
1 to 10 staff
Remediata
Remediata: Redefining Security Testing with Penetration Testing as a Service (PTaaS) Remediata is dedicated to delivering top-tier cybersecurity services, making the power of Penetration Testing as a Service (PTaaS) accessible to our clients. Our innovative approach combines the expertise of consultant-led penetration testing with continuous vulnerability assurance, powered by our advanced Platform. This creates a "living" threat detection system that supports our clients throughout the life of their contract—not just at a single point in time. At Remediata, our mission is to empower businesses of all sizes with best-in-class PTaaS, enhancing cybersecurity and protecting critical assets to foster a safer digital landscape. Our expert, dedicated team collaborates closely with clients to deliver customized solutions that meet unique needs and exceed expectations. Driven by a commitment to innovation and client success, Remediata aspires to be a leader in the penetration testing industry. By leveraging frontline cybersecurity expertise and staying attuned to the challenges our clients face, we deliver world-class, integrated risk management solutions. Our services transform raw security data into actionable insights, simplify regulatory compliance, and give network managers the peace of mind that their IT environment is safeguarded at every level.
1 to 10 staff
Shards Cybersecurity
Most Small and Medium Businesses face rising cyber threats, new NIS2/GDPR obligations, and a shortage of in-house expertise. At Shards Cybersecurity, we turn Microsoft 365 Business Premium into a fully managed security & compliance solution that closes that gap. With 30+ years of combined experience protecting enterprise data in Slovakia, the UK, and Europe, we bring enterprise-grade protection to SMBs — affordably, predictably, and with a clear understanding of local business and regulatory realities. Why choose Shards? Microsoft 365 specialists – certified partner leveraging Defender, Intune, Entra, and Purview Predictable per-user pricing – scalable protection without enterprise overhead Compliance by design – audit-ready outputs aligned to GDPR, NIS2, and CRA every month Managed Security Packages Secure Essentials – harden identity, email, and devices; raise Secure Score; provide GDPR evidence for supplier security checks Secure Pro – add EDR, Conditional Access, managed patching, phishing simulations, and NIS2/GDPR documentation with faster incident triage Specialised Services Risk assessment & gap analysis – identify weaknesses and prioritise remediation Implementation & configuration – deploy and optimise Microsoft 365 security features Compliance advisory & training – GDPR/NIS2/CRA documentation, audits, and user awareness Virtual CISO (vCISO) – strategic security leadership without the full-time cost We help SMBs stay ahead of EU compliance demands and growing cyber threats — before fines or incidents hit. Book your free Microsoft Secure Score & Risk Snapshot today to see exactly where you stand.
1 to 10 staff
Cybrainz
IT Security infrastructure engineering blog and collectible artworks. High-quality and hand-made.
1 to 10 staff
Gordias
Dedicated to information security.
1 to 10 staff
Hacktrophy
Nová cesta k internetovej bezpečnosti Tradičná ochrana pred inteligentnými online hrozbami už nestačí. Preto pomáhame firmám využiť schopnosti etických hackerov s cieľom posilniť ich IT bezpečnosť. New approach to Internet security Conventional protection can no longer keep up with advanced online threats. That’s why we help companies take advantage of a skilled community of ethical hackers in purpose to strengthen their IT security.
1 to 10 staff
Ip Security Consulting
Our main focus is software development, cybersecurity, UNIX, and networking. Within these domains, we provide wide range of services, products, and tailor-made solutions. Our solutions include- Isurus - multi-purpose server - Tarsius - digital signage solution - Callcentre - multi-channel callcentre Our services include- network design - server deployment and support - IT consulting - software development - remote monitoring and administration, security monitoring
11 to 50 staff
Securcom S.R.O
securCom is the leading encrypted messaging and video communication business solution that provides a world-class secure, unified communication infrastructure for corporations of any size and in any industry. securCom can and will protect your communication privacy whilst allowing you easy access to messaging, audio and video communication in addition to a secure encrypted file transfer service. Based in the heart of central Europe, securCom is the culmination of several years of work. We are a team with vast accomplishments and more than 20 years of experience in the IT security, data management and web hosting business. The expertise we possess allows us to deliver unrivalled quality and accentuate the finesse of a tailor-made product. securCom has been developed by an experienced team of programmers with expertise working on all aspects of security solutions both in the public sector and the private sector; for businesses, banks and governments alike. securCom is all about providing our clients with the best encrypted platform, using our unique technology in order to deliver audio, video, file transfer, enclosed chat and safe storage services. We are doing this to enable you to communicate and store your private, and company, information in the safest and securest way. We are using our experience to bring you the very best cutting edge solutions possible.
11 to 50 staff
Protoway Ltd
ProtoWay Ltd. is a software development company with strong experience in IT security and high performance computing algorithms.
11 to 50 staff
Sicurio
S našimi riešeniami v kybernetickej bezpečnosti ochránite svoje podnikanie jednoducho a účinne.
1 to 10 staff
Smartkeeper Cee
SmartKeeper Locks are a physical element in IT security that can serve as a complement to software protection to protect your data. SmartKeeper offers mechanical locks for USB ports, network ports, and other I / O ports for laptops, computers, servers, network devices, and printers. SmartKeeper is an innovative physical hardware security system. Mechanical locks are locked after insertion into ports, and a special key is needed to unlock them. This key with an individual pattern is unique to every customer, so breaking into the port is extremely challenging. After unlocking using key, the SmartKeeper lock can be reused. This makes SmartKeeper a very flexible and effective solution with an extraordinarily high level of protection against outside threats as well as data theft protection.
1 to 10 staff
Aethersecurity
AetherSecurity Ltd. was founded in 2012. Our firm is an expert in offensive security solutions and includes services such as penetration testing, vulnerability assessments, bug bounty management and consulting. Our company also specializes in testing web and mobile applications, infrastructure and wireless networks, and IoT devices. AetherSecurity follows the recommendations of the German Information Technology and Security Agency (BSI) and uses the OWASP testing methodology. In all cases, the test is conducted by an ethical hacker with renowned professional certifications (OSCP, CEH). Our company deals exclusively with information security-related activities.
1 to 10 staff
Whateversecure
Problems with Cyber-Security? We offer tailor-made Cyber-Security solutions! Whether you need a cyber-security assessment, help with deployment of cyber-security critical components, active defense against a cyber attack, forensic investigation after leak of classified data, or post-incident reporting and "lessons-learned", we got you!
1 to 10 staff