Skip to main content

cyber security

On the frontline of cyber security

Being a digital society means exposure to cyber threats. With solid investments in cyber security infrastructure, Estonia has developed extensive expertise in this area, becoming one of the most recognized and valued international cyber security experts. After Estonia’s experience with the 2007 cyber attacks, scalable blockchain technology was developed to ensure integrity of data stored in government repositories and to protect its data against insider threats. Estonia became host to the NATO Cooperative Cyber Defence Centre of Excellence and the European IT agency. KSI Blockchain KSI is a blockchain technology designed in Estonia and used globally to ensure networks, systems, and data are free of compromise, all while retaining 100% data privacy.

KSI Blockchain

With KSI Blockchain deployed in Estonian government networks, history cannot be rewritten by anybody and the authenticity of the electronic data can be mathematically proven. It means that nobody – neither hackers, nor system administrators, nor even the government itself – can manipulate the data and get away with it.

Solutions

solutions

AML Platform
  • AML Platform

  • Salv’s smart anti-money laundering technology helps financial institutions keep their customers and businesses safe from

  • by Salv Technologies
Cyber Crisis Management
  • Cyber Crisis Management

  • Cyber threats are not an issue to be merely delegated to the IT department. Top

  • by CybExer Technologies
Government Cloud
  • Government Cloud

  • Policy advice on legal and data management aspects for securing data access and maintenance.

  • by Proud Engineers
Live-Fire Exercises
  • Live-Fire Exercises

  • Our flagship trainings are large-scale live-fire, Red vs Blue exercises that are hosted on our

  • by CybExer Technologies
Capture-the-Flag
  • Capture-the-Flag

  • For the execution of CTF-type trainings, CybExer has developed a dedicated software solution called the

  • by CybExer Technologies
Sharemind
  • Sharemind

  • Sharemind is an innovative, secure data analysis platform designed by Cybernetica. Sharemind allows data owners

  • by Cybernetica
Penetration Testing and Auditing
  • Penetration Testing and Auditing

  • CybExer offers penetration testing and security audits for information security management systems. We rely on

  • by CybExer Technologies
Cyber Range
  • Cyber Range

  • CybExer develops and maintains some of the most capable cyber ranges on the market for

  • by CybExer Technologies
EOGuard
  • EOGuard

  • Guardtime and European Space Agency (ESA) have joined forces to create a security and trust

  • by Guardtime
KSI Blockchain Stack: Zero Trust Applications
  • KSI Blockchain Stack: Zero Trust Applications

  • In 2007, after facing state sponsored cyber-attacks, Estonian scientists were set a challenge: re-think data

  • by Guardtime
Election Interference
  • Election Interference

  • Elections are crucial to the functioning of representative democracy and compromising the election processes can

  • by CybExer Technologies
  • Device identity management solution

  • A device identity management solution: a crucial aspect of modern connectivity Proekspert’s secure solution establishes

  • by Proekspert
Proactive cybersecurity services
  • Proactive cybersecurity services

  • Technical security testing, assessment and advisory services for organisations who want to improve their real-world

  • by Cybernetica
Mission Critical Facility for Your IT hardware
  • Mission Critical Facility for Your IT hardware

  • Our scalable and energy efficient data center concept will serve as a growth platform for

  • by MCF Group Estonia
  • IEC 62443 compliance analysis service

  • IEC 62443: The risk management standard for industrial automation and control systems. Proekspert helps device

  • by Proekspert
The RangeForce CyberSkills Training Platform
  • The RangeForce CyberSkills Training Platform

  • Advanced cybersecurity training features include attack bots that recreate real-life targeted cyber attacks, as well

  • by RangeForce
Cyber Hygiene
  • Cyber Hygiene

  • Almost all major cyber incidents started with an unsuspecting individual opening yet another e-mail, using

  • by CybExer Technologies
Cybersecurity Trainings & Courses
  • Cybersecurity Trainings & Courses

  • Conducting cybersecurity training modules and courses at all levels is one of CybExer’s core competencies.

  • by CybExer Technologies
AML Bridge
  • AML Bridge

  • AML Bridge helps financial institutions cooperate and exchange intelligence to fight financial crime more effectively.

  • by Salv Technologies
  • A secure firmware update solution

  • Watch our live demo here Proekspert helps device manufacturers to prepare for upcoming EU Cyber Resilience

  • by Proekspert
Green and secure data center
  • Green and secure data center

  • The largest, securest and most energy-efficient data center in the Baltics. With multiple levels of

  • by MCF Group Estonia
National Cyber Security Index
  • National Cyber Security Index

  • Cyber security is a global challenge and one country alone cannot ensure cyberspace’s security. Therefore,

  • by e-Governance Academy
RangeForce Battle Fortress Cyber Range
  • RangeForce Battle Fortress Cyber Range

  • Battle Fortress recreates an entire IT environment so security teams can practice with existing security

  • by RangeForce
Consultancy on national cyber security
  • Consultancy on national cyber security

  • A nation’s cyberspace, its digital society and e-services form a complex environment that cannot safely

  • by e-Governance Academy
Penetration Testing Module
  • Penetration Testing Module

  • If the penetration testers are working on a team, or if the managers or the

  • by CybExer Technologies
Vulnerability Visualisation Tool
  • Vulnerability Visualisation Tool

  • The cybersecurity market provides a plethora of scanning tools for assessing the state and security

  • by CybExer Technologies
MIDA: Cloud Security and Compliance
  • MIDA: Cloud Security and Compliance

  • MIDA is a new Cloud Security Posture Management (CSPM) tool to manage the complexity of

  • by Guardtime

explore solutions related to

Keywords

Companies