Directory · SK
Computer and Network Security in Slovakia
A register of firms and the professionals working at them in the Computer and Network Security sector based in Slovakia. Browse the public index, then filter or export on Kipplo.
Companies
34 on file
Synapsa Networks
Synapsa Networks is developing a software platform with built-in intelligent tools focusing on Incident and Change management procedures automation to prevent human and technology failures, save time and provide faster response. The software platform provides an environment that automatically interconnects devices and tools in IT infrastructure to simplify and speed up the workforce in real time. Performs a continuous audit, control and enforcement over configuration and security policies rulesets.
11 to 50 staff
Inalogy
At Inalogy, we focus on delivering solutions that guarantee our customers’ confidence in the safety of their assets. To achieve this, we take advantage of the market-leading open-source solutions in identity and access management and perimeter protection. A combination of products in our portfolio can deliver uncomparable value for money when measured against commercial products. We are dedicated experts who closely listen to the needs and problems of our customers. Instead of selling products, we prefer to establish a partnership and work together to design and develop the best solution.
11 to 50 staff
Somi Systems A.S
SOMI Systems Inc. is a System Integrator with main focus on Open System and Client-Server Architecture creating the best conditions for implementation. SOMI Systems delivers complex solutions and actively cooperates with customer in the process of realization, combining the customers´ needs with the knowledge of its experts.
11 to 50 staff
Proma Technology,s.R.O
PROMA Technology provides services in the field of information technology and cyber protection and security to demanding clients who require constant operation, but also to small companies and entrepreneurs. Our solutions are individual, based on the unique needs and requirements of each customer, its industry and the current IT situation. We can design a solution that meets the needs of the customer and at the same time allows him further growth and development with minimal costs. It provides clients with support and active management of the entire IT system. Ensuring the efficient operation of IT systems is a priority for us. For a successful operation of the company, today information technologies are a necessity, but it depends on the way they are implemented and also used in the company. We are familiar with dynamically changing IT and promptly apply this knowledge to our customers so that they can focus on their business and rely on first-class quality IT support. PROMA Technology poskytuje služby v oblasti informačných technológií a kybernetickej ochrany a bezpečnosti náročným klientom, ktorý vyžadujú neustálu prevádzku, ale aj malým firmám a podnikateľom. Naše riešenia sú individuálne, založené na jedinečných potrebách a požiadavkách každého zákazníka, jeho odvetvia a súčasnej IT situácie. Dokážeme navrhnúť riešenie, ktoré splní potreby zákazníka a zároveň mu umožní ďalší rast a rozvoj s minimálnymi nákladmi. Klientom poskytuje podporu a aktívne riadenie celého IT systému. Zabezpečenie efektívnej prevádzky fungovania IT systémov je pre nás prioritou. Pre úspešné fungovanie firmy, sú dnes informačné technológie nevyhnutnosťou, avšak záleží na spôsobe ako sú vo firme implementované a tiež využívané. Dynamicky sa meniace IT dokonale poznáme a tieto vedomosti promptne aplikujeme u našich zákazníkov tak, aby sa oni mohli sústrediť na svoj biznis a mohli sa spoľahnúť na prvotriednu kvalitu IT podpory.
1 to 10 staff
Keeprivacy
Tired of vague security tips that lead nowhere? Discover how to go from ‘how-to’ to ‘done’—fast. Built for busy professionals who need clear, actionable strategies & tips to shield their digital life from hackers. Here’s what you’ll learn: Proven protection strategies that actually work — giving you the confidence that your bank, email, and social accounts are safe from identity thieves. 🟠 Advanced encryption and privacy tools that turn your personal data into unreadable noise for hackers, snoops, and trackers. Your secrets stay private, always. 🟣 Harden your device security from standard to strong with smart, built-in defenses — so you can connect anywhere, stay productive, and work with total peace of mind. Master the smartest 10% of security habits to get 90% of the protection you need — fast. No tech jargon, no wasted time. Start now and take control of your digital life — before someone else does.
1 to 10 staff
Csirt-Upjs
CSIRT-UPJS is the first academic cybersecurity team in the Slovak Republic. The members of the team are employees and students of the Center of Information and Communication Technologies, Faculty of Law and Faculty of Science. On December 14, 2016, we were included in the list of security incident teams led by the international organization TF-CSIRT (Trusted Introducer). The main goals of CSIRT-UPJS are- to create trustworthy central contact point for ICT infrastructure at the university- to prevent, detect and resolve computer security incidents related to the UPJS infrastructure- to raise security awareness (raising in the field of information security, cooperation with international counterparts and organizations and representation of Kosice in the field of information security internationally) and - research in the field of IT and cyber security.
1 to 10 staff
Spark42
Our penetration testing services identify vulnerabilities in networks, applications, employee resilience, and physical security by simulating real-world attacks. We help strengthen defenses against threats like misconfigurations, insecure coding, social engineering, and unauthorized physical access to ensure comprehensive protection.
1 to 10 staff
We Know Identity
We Know Identity is a specialist team focused on secure, efficient, and modern Identity and Access Management (IAM). We help organizations of all sizes gain control over their digital identities by designing, implementing, and maintaining reliable identity infrastructures. We primarily use open source technologies, with a strong focus on midPoint for Identity Management (IdM). Our approach enables transparency, flexibility, and long term sustainability without vendor lock in. Our core services include- Identity lifecycle automation and governance - Modernizing legacy IAM solutions and migrating to scalable, cloud native platforms - Designing identity processes, access policies, and approval workflows - Building strong identity security postures aligned with business and compliance goals - Developing custom connectors to integrate virtually any system: on-prem, cloud, or legacy What sets us apart is our use of AI and automation to reduce manual overhead, accelerate provisioning, and identify identity risks proactively. We integrate IAM with HR, AD, cloud apps, and various internal systems. We deliver solutions using modern DevOps practices like GitOps, CI/CD, and containerization — but we are equally capable of deploying and operating IAM platforms on traditional virtual machines. Our solutions run in public, private, or hybrid cloud environments, depending on your infrastructure and compliance requirements. Whether you're building a new IAM foundation or transforming a complex enterprise identity landscape, we deliver expert guidance and practical implementation. We know our identity, do you know yours?
1 to 10 staff
Binturonix
Binturonix is a Slovak-based Managed IT and Cybersecurity Provider that helps organisations run stable, efficient, and secure IT environments—without distractions. We act as a single, trusted technology partner, combining Managed IT services, cybersecurity, and business-critical systems into one coherent solution. Customer-driven by design, we focus on what actually keeps your operations running and your risks under control. The result? Resilient infrastructure, fewer surprises, and IT that supports the business instead of slowing it down.
1 to 10 staff
Consumer Finance Holding A.S
1 to 10 staff