Companies similar to SASA SOFTWARE
Sign up to Download

91-120 of 135,848 results

  • www.instant.ly
  • 1
Instant.ly provides a real-time updated shield to block various threats. We collect and analyze data from around the world to identify unwanted requests such as attacks, theft, fraud and various malicious acts. We also have tools available to prevent..

Relevance: 11.587655
  • www.ontvlab.com
  • 1
ONTV is a proprietary solution built on trusted hardware chain. Its simplified software architecture drastically reduces the surface for attacks. It is by essence a secured platform, more hermetic to external threats than any open source solution.....

Relevance: 11.575677
  • www.eck.tech
  • 1
  • 1
Ransomware attacks are getting more sophisticated and frequent. Good antivirus is not sufficient...

Relevance: 11.558828
  • arizonacomputermedic.com
  • 1
We can insure your electronic environment is free of risk from malicious attacks..

Relevance: 11.558828
  • secondaryinfektion.org
  • 2
Secondary Infektion is a series of operations run by a large-scale, persistent threat actor from Russia that worked in parallel to the Internet Research Agency and the GRU but was systematically different in its approach... Forgeries, interference,..

Relevance: 11.521794
  • www.skaion.com
  • 2
  • 1
Since 1998 Skaion has provided quality testing and support for Government security and R&D projects... Skaion has made major contributions to several noteworthy efforts: Created true zero-day attacks by injecting custom vulnerabilities into existing..

Relevance: 11.521794
  • www.liquidpurifier.com
Hello, my name is Rodney Turner. Welcome to my website about allergies and asthma. As a kid, I could not go through the spring months without suffering from back to back asthma attacks. The asthma attacks usually started when my pollen allergies..

Relevance: 11.520887
  • www.sampansecurity.com
  • 3
Sampan Security, Inc. is an American owned and operated company based in the great state of New Hampshire. The company is privately funded and dedicated to the development of comprehensive cyber security protection against Zero-day attacks... In the..

Relevance: 11.520887
  • gamifiedcyberlearning.com
  • 1
  • 1
Security depends on people, when advanced cyber attacks pose some of the most pressing threats, people make the difference... Gamified Cyber Learning - the best training for teams and individuals 24/7 on-line available... D5-IQ keeps your teams in..

Relevance: 11.514238
  • www.ccs-labs.org
  • 31
  • 3
  • 53
Attacks against computer systems are often launched over the Internet or any other computer network. Therefore, attacks or intrusion attempts can be identified by examining network traffic, which is also known as intrusion detection. Traditional..

Relevance: 11.497236
  • www.packetwall.org
  • 1
We regularly monitor trends in the field of protection against attacks and improve the quality of the applied methods of protection. This is what allows us to guarantee the highest quality of services, which provides the services with first-class..

Relevance: 11.477768
  • www.udsconsultingusa.com
  • 1
  • 1
  • 1
There's no absolute way to prevent all violence (including active shooter attacks) from happening but the impact from those attacks can be mitigated with appropriate security planning, training and equipment. Our mission at Ultimate Defense Systems..

Relevance: 11.4597025
  • www.henlinelaw.com
We found a security vulnerability on your website, please enhance security to prevent further attacks...

Relevance: 11.451989
  • www.beonform.com
  • 1
BeOnForm is one of the UK's foremost Complementary and Alternative Medicine providers and training companies... BeOnForm - specialise in treatment for panic attacks, anxiety attacks, treatment for agoraphobia & obsessions. The UK's foremost..

Relevance: 11.439627
  • www.becyberstrong.com
  • 1
Year after year, we are breaking all records when it comes to data lost in breaches and sheer numbers of cyber-attacks on companies, government, and individuals !... Cyber Risk Management for business managers, owners and professionals. Prioritize..

Relevance: 11.439627
  • outboundmagic.com
  • 1
90% of hacking attacks start with a phishing email. Advanced Threat Defense is a stronger layer of protection for your organization and users from these devastating attacks... We offer pro-rated refunds on annual subscriptions. Monthly subscriptions..

Relevance: 11.439627
  • dpiconsortium.org
  • 1
  • 9
DPI companies face attacks from PAEs seeking to monetize patents that in fact rely on well-known and widely-deployed DPI technology. To meet these attacks head on, DPI companies can avail themselves of a new approach: the DPI Consortium... The Deep..

Relevance: 11.439627
  • synsec.ai
  • 2
Threat Hunting and understanding the methods of attackers is essential for protecting critical systems. The insights provided by the Synaptic Threat Tree starting with the point of incursion and detailing every new process spawned, commands with..

Relevance: 11.432663
  • comicept.com
Comicept provide security services such as mobile phones audits to detect trojans,malware ,wifi attacks .ss7 attacks... with a wide range of capabilities . We have experience of more than 10 years in teaching and developing the client most important..

Relevance: 11.416661
  • www.digitalimpactlab.org
  • 1
  • 1
The undisputed leader in maintaining internet freedom in Iran and countering Iranian cyber attacks..

Relevance: 11.398681
  • threatresq.com
  • 4
  • 2
  • 5
Threat ResQ is a pioneer in providing cybersecurity services and protecting businesses from cyber attacks. We provide a full range of solutions for any size team, from small businesses to Fortune 500 companies... We are a leading provider of IT..

Relevance: 11.388341
  • www.interogative.com
Avoid costly attacks to your web applications. 's intelligent protection dynamically protects and prevents unauthorized access...

Relevance: 11.340721
  • www.tiwtech.com
  • 1
We don't use third party advertising or tracking cookies though, so there's that..... In 2021, according to the UK government's most recent Cyber Security Breaches Survey, four in ten businesses (39%) reported cyber security breaches or attacks...

Relevance: 11.326783
  • www.buychecklight.com
  • 1
  • 1
Never allow a breach to go undetected. CHECKLIGHT® is a powerful and proactive endpoint protection technology that detects potential threats to your network, quarantines the threat processes, and alerts you early so attacks can't take hold, reducing..

Relevance: 11.315048
  • 100up.org
  • 2
  • 1
The extra bandwidth compared to GAME helps filtering even the biggest bypasses or internal OVH attacks thanks to our stateful DDoS mitigation... DDoS protection specialized for Gaming and VPN with the best Uptime... Our new in-house developed..

Relevance: 11.315048
  • malwarewise.com
  • 1
We integrated our cyber defense platform modules into wireless router to protect your IoT devices connecting to the internet against cyber attacks. With help of artificial intelligence Malwarewise Sentry proactively guards them all: smartphones,..

Relevance: 11.315048
  • act2secure.com
  • 2
  • 2
  • 2
Minimize the risk and impact of attacks, data breaches, and incidents as well as post event hardening...

Relevance: 11.308922
  • andesiteai.com
Andesite is a Red Cell Partners incubation company whose technology utilizes AI/ML to identify patterns in network activity to predict and protect against cyber attacks that threaten day-to-day operations. Hostile cyber operations are increasingly..

Relevance: 11.307401
  • www.usec.io
  • 3
  • 1
MicroSec aims to help organizations operate safely and securely in an increasingly connected world by starting at the Edge... We aspire to empower organizations to take control over its environment through our unique approach of Security by Design..

Relevance: 11.299676
  • azgeneraler.com
Narcolepsy is a chronic disorder that affects approximately 1% of the population. Individuals with narcolepsy experience sudden and uncontrollable sleep attacks. The sleep attacks usually last between five and twenty minutes. You may experience..

Relevance: 11.299676