Products

We offer highly innovative products which can be easily installed and maintained or are in SaaS mode while offering a high increase in security and compliance.

arrow
Athena
ConSienta
exeon_analytics
CybeReady
ConSienta
YazamTech
YazamTech
crusoe
anti virus
YazamTech
firewalls
cybonet
cybonet
cybonet
cybonet
kela
Cymulate
kela
electicq
xm-cyber
electicq
idrra
checkmark
viisight

Phishing Protection

CybeReady Anti-Phishing learning automation employs big data capabilities and a 3D simulation engine to optimize content for dynamic multilingual phishing scenarios, effectively personalizing training for each employee.
CybeReady offers a simple, effective deployment with advanced metrics monitoring risk and progress, and provides phishing simulations in 35 languages across 66 countries.

Download product folder

Supplier Certification

IDRRA is an AI powered platform, automating manual driven processes in the security compliance space. Goal is to enable best in class assessment and decision making for companies in every size. It enables automating the entire Vendor Risk Management Process and rapidly implementing a comprehensive VRM program across the entire supply chain in various industries while minimizing organizational friction and costs.

Download product folder

Identify risks in your logs

Are you sitting on large amounts of secure web gateway logs and do you want to understand what is hidden inside these logs? ExeonTrace provides visibility into the web traffic leaving corporate networks in order to detect and investigate hidden malware infections and data breaches.
ExeonTrace analyzes log data recorded by commodity secure web gateways and firewalls. It identifies suspicious communication patterns in millions of data points using award-winning Machine Learning and Big Data algorithms developed at ETH Zurich. Thanks to its focus on analyzing existing log data, setting up ExeonTrace is a matter of hours and it can be used productively immediately.
Web traffic is the primarily data leakage channel used by sophisticated cyber attackers, browser plugins and other software that put an organization’s privacy at risk.

Download product folder

No unauthorized files beyond this point

SelectorIT is the leader among file filtering systems on the market. State of the art protection against advanced threats within files.

Download product folder

Automated Pen-Testing

HaXM is the first APT simulation platform to simulate, validate and remediate attackers’ paths to your critical assets 24×7. HaXM’s automated purple teaming aligns red and blue teams to provide the full realistic APT experience on one hand while delivering vital prioritized remediation on the other.
xmcyber
Read more about product

Cymulate’s platform comprehensively exercises your defenses with the industry’s widest range of attack vectors, providing an Advanced Persistent Threat (APT) simulation of your security posture at all times. Test your network’s ability to cope with pre-exploitation-stage threats in Email, Browsing, and WAF. Assess and improve awareness among employees against phishing, ransomware and other attacks.
Cymulate
Read more about product

Checkmarx

Checkmarx is taking a holistic, platform-centric approach. The Software Exposure Platform builds security in from the start of the SDLC, continuously supporting all stages of the DevOps cycle, including static application security testing, open source analysis, interactive application security testing and developer AppSec Training.
checkmarx
Read more about product

Cyber Intelligence

EclecticIQ Platform is the analyst-centric threat intelligence platform based on STIX/TAXII that meets the full spectrum of intelligence needs.
eclecticiq
Read more about product

Radark, a Real time Darknet threat intelligence console automatically tracks Darknet threats, giving immediate notification of compromised company-specific information and ensures that Radark gives you only the highest quality Darknet information.
Radark
Read more about product

Crusoe

Isolation is the best solution and security measure available to mitigate hackers and virus attacks whilst providing your organization with a bulletproof network that cannot be penetrated by any malware, virus, or any other type of malicious computer program or code.
crusoesecurity
Read more about product

Background Checks

OSCAR from ATHENA is an open source collection and analysis solution for Background Checks
ATHENA
Read more about product

Endpoint Manager Platform

The Promisec Endpoint Manager (PEM) Platform delivers true Endpoint Detection and Response (EDR) through agentless inspection, threat detection, alerting, reporting and automated remediation delivering huge value for both security and IT operations.
promisec
Read more about product

AI REAL-TIME VIDEO INTELLIGENCE

Viisights wise provide automatic realtime understanding of video content captured by widespread surveillance cameras. The system processes and understands large amounts of video streams in real-time or offline (investigative mode), while providing insights and alerts for a variety of actions, events and scenes of interest.
Viisights
Read more about product