Category: Cyber Security

Agilysis
Agilisys, an employee owned organisation, is one of the UK’s most innovative and fast growing IT business software and services ...
READ MORE +
Torrid
Torrid Networks is a leading cyber security company with its focus in the area of high-end research, development, consulting, education and managed ...
READ MORE +
Summit
Summit Technologies rich history of delivering complex technology solutions span multiple industries, including banking, healthcare, gaming, ...
READ MORE +
ISON
We provide IT services across verticals namely: Service Providers, Tower Infrastructure Providers, Banking and Financial Services, Government, and ...
READ MORE +
Atos
With a global team of over 4,500 security specialists and a worldwide network of Security Operation Centers (SOCs), Atos offers ...
READ MORE +
Megasoft
In today’s data-centric environment, security experts are of the view that malicious cyber-attacks are possible on all ...
READ MORE +
NetEnrich
NetEnrich Cyber-Security Services enable end-clients to have peace of mind while NetEnrich manages and thwarts threats and ...
READ MORE +
Penetration Testing
Penetration Testing is a goal-oriented process of identifying how a system can be exploited or compromised. A penetration test ...
READ MORE +
Vulnerability Assessment
Vulnerability Assessment is the process of identifying vulnerabilities in a system without exploiting them.We conduct ...
READ MORE +