Skip to main content
cyber security

solutions

  • Live-Fire Exercises

  • Our flagship trainings are large-scale live-fire, Red vs Blue exercises that are hosted on our

  • by CybExer Technologies
  • RangeForce Battle Fortress Cyber Range

  • Battle Fortress recreates an entire IT environment so security teams can practice with existing security

  • by RangeForce
  • Penetration Testing and Auditing

  • CybExer offers penetration testing and security audits for information security management systems. We rely on

  • by CybExer Technologies
  • AML Bridge

  • AML Bridge helps financial institutions cooperate and exchange intelligence to fight financial crime more effectively.

  • by Salv Technologies
  • Cybersecurity Trainings & Courses

  • Conducting cybersecurity training modules and courses at all levels is one of CybExer’s core competencies.

  • by CybExer Technologies
  • Cyber Range

  • CybExer develops and maintains some of the most capable cyber ranges on the market for

  • by CybExer Technologies
  • Mission Critical Facility for Your IT hardware

  • Our scalable and energy efficient data center concept will serve as a growth platform for

  • by MCF Group Estonia
  • Election Interference

  • Elections are crucial to the functioning of representative democracy and compromising the election processes can

  • by CybExer Technologies
  • Cyber Crisis Management

  • Cyber threats are not an issue to be merely delegated to the IT department. Top

  • by CybExer Technologies
  • Proactive cybersecurity services

  • Technical security testing, assessment and advisory services for organisations who want to improve their real-world

  • by Cybernetica
  • Penetration Testing Module

  • If the penetration testers are working on a team, or if the managers or the

  • by CybExer Technologies
  • AML Platform

  • Salv’s smart anti-money laundering technology helps financial institutions keep their customers and businesses safe from

  • by Salv Technologies
  • MIDA: Cloud Security and Compliance

  • MIDA is a new Cloud Security Posture Management (CSPM) tool to manage the complexity of

  • by Guardtime
  • Consultancy on national cyber security

  • A nation’s cyberspace, its digital society and e-services form a complex environment that cannot safely

  • by e-Governance Academy
  • Cyber Hygiene

  • Almost all major cyber incidents started with an unsuspecting individual opening yet another e-mail, using

  • by CybExer Technologies
  • National Cyber Security Index

  • Cyber security is a global challenge and one country alone cannot ensure cyberspace’s security. Therefore,

  • by e-Governance Academy
  • Government Cloud

  • Policy advice on legal and data management aspects for securing data access and maintenance.

  • by Proud Engineers
  • Green and secure data center

  • The largest, securest and most energy-efficient data center in the Baltics. With multiple levels of

  • by MCF Group Estonia
  • Capture-the-Flag

  • For the execution of CTF-type trainings, CybExer has developed a dedicated software solution called the

  • by CybExer Technologies
  • Vulnerability Visualisation Tool

  • The cybersecurity market provides a plethora of scanning tools for assessing the state and security

  • by CybExer Technologies
  • Sharemind

  • Sharemind is an innovative, secure data analysis platform designed by Cybernetica. Sharemind allows data owners

  • by Cybernetica
  • KSI Blockchain Stack: Zero Trust Applications

  • In 2007, after facing state sponsored cyber-attacks, Estonian scientists were set a challenge: re-think data

  • by Guardtime
  • EOGuard

  • Guardtime and European Space Agency (ESA) have joined forces to create a security and trust

  • by Guardtime
  • The RangeForce CyberSkills Training Platform

  • Advanced cybersecurity training features include attack bots that recreate real-life targeted cyber attacks, as well

  • by RangeForce