MIDA is a new Cloud Security Posture Management (CSPM) tool to manage the complexity of
Guardtime and European Space Agency (ESA) have joined forces to create a security and trust
Conducting cybersecurity training modules and courses at all levels is one of CybExer’s core competencies.
Sharemind is an innovative, secure data analysis platform designed by Cybernetica. Sharemind allows data owners
Our scalable and energy efficient data center concept will serve as a growth platform for
The largest, securest and most energy-efficient data center in the Baltics. With multiple levels of
A nation’s cyberspace, its digital society and e-services form a complex environment that cannot safely
Almost all major cyber incidents started with an unsuspecting individual opening yet another e-mail, using
For the execution of CTF-type trainings, CybExer has developed a dedicated software solution called the
CybExer offers penetration testing and security audits for information security management systems. We rely on
Policy advice on legal and data management aspects for securing data access and maintenance.
The cybersecurity market provides a plethora of scanning tools for assessing the state and security
Cyber threats are not an issue to be merely delegated to the IT department. Top
Our flagship trainings are large-scale live-fire, Red vs Blue exercises that are hosted on our
Salv’s smart anti-money laundering technology helps financial institutions keep their customers and businesses safe from
Technical security testing, assessment and advisory services for organisations who want to improve their real-world
Advanced cybersecurity training features include attack bots that recreate real-life targeted cyber attacks, as well
In 2007, after facing state sponsored cyber-attacks, Estonian scientists were set a challenge: re-think data
Cyber security is a global challenge and one country alone cannot ensure cyberspace’s security. Therefore,
CybExer develops and maintains some of the most capable cyber ranges on the market for
If the penetration testers are working on a team, or if the managers or the
Elections are crucial to the functioning of representative democracy and compromising the election processes can
Battle Fortress recreates an entire IT environment so security teams can practice with existing security
AML Bridge helps financial institutions cooperate and exchange intelligence to fight financial crime more effectively.