Data Against Data is a company based in Bucharest, Romania, that focuses on enhancing online data privacy. It has developed a platform aimed at identifying companies that hold personal data and provides users with a comprehensive list of websites and applications to help secure their online information. The platform enables users to reclaim control over their data by allowing them to request deletion from various online sources that collect and store personal information, thereby facilitating greater privacy protection.
Mellyn offers a smart, adaptive authentication service that protects applications from unauthorized access and account takeover attacks. Seamlessly integrating our API and SDK with your app evaluates each login attempt using multiple factors like location, usage patterns, and threat signals to determine a risk score. High-risk logins prompt adaptive multi-factor authentication to verify identity, while legitimate users experience a smooth login process. With just a few lines of code, developers can bolster their app’s defense against evolving threats. Mellyn's risk-based approach blocks attackers and ensures a hassle-free experience for genuine users.
Trusted Twin is a data collaboration platform that focuses on the secure development and sharing of digital twins, which are virtual representations of physical objects. The platform allows organizations to aggregate relevant business knowledge from various information technology systems, ensuring secure data extraction and aggregation. By utilizing the shared objects concept, Trusted Twin establishes trust and maintains complete control over data visibility and accessibility. The platform also supports preferred integration strategies and offers an enterprise-grade level of service, enabling companies to streamline their digital product development while reducing costs and time associated with cloud application delivery.
Mellyn offers a smart, adaptive authentication service that protects applications from unauthorized access and account takeover attacks. Seamlessly integrating our API and SDK with your app evaluates each login attempt using multiple factors like location, usage patterns, and threat signals to determine a risk score. High-risk logins prompt adaptive multi-factor authentication to verify identity, while legitimate users experience a smooth login process. With just a few lines of code, developers can bolster their app’s defense against evolving threats. Mellyn's risk-based approach blocks attackers and ensures a hassle-free experience for genuine users.
Hive.id is an identity verification platform that helps organizations of all sizes reduce fraud risk during customer onboarding and beyond. It allows businesses to verify customer identity, age, and biometrics in under ten seconds, leveraging AI and machine learning to enhance efficiency. Supporting over 200 countries and territories and accommodating nearly 8,000 government-issued documents in over 75 languages, Hive.id enables global scalability. The platform is designed for seamless integration, allowing developers to implement its services in less than 60 minutes. Hive.id also provides customizable workflows and a fully encrypted system, ensuring a secure and efficient customer experience. By aligning with data protection standards such as GDPR and CCPA, Hive.id ensures compliance while helping businesses build trust and reduce fraud.
eID Easy specializes in providing businesses with a streamlined solution for electronic signatures and digital authentication. The company focuses on integrating popular and proven signature techniques that ensure user identification is already confirmed, thus minimizing friction in the signing process while maintaining fair pricing. By offering a straightforward platform for implementing electronic identity authentication and qualified electronic signature methods, eID Easy enables organizations to efficiently verify identities and manage document signing. This approach supports businesses in adopting high-quality electronic signature solutions that enhance security and simplify workflows.
MonkPhish protects your team through gamified and social behavioural training and allows them to experience simulated spear phishing attacks in real time.
eID Easy specializes in providing businesses with a streamlined solution for electronic signatures and digital authentication. The company focuses on integrating popular and proven signature techniques that ensure user identification is already confirmed, thus minimizing friction in the signing process while maintaining fair pricing. By offering a straightforward platform for implementing electronic identity authentication and qualified electronic signature methods, eID Easy enables organizations to efficiently verify identities and manage document signing. This approach supports businesses in adopting high-quality electronic signature solutions that enhance security and simplify workflows.
Hive.id is an identity verification platform that helps organizations of all sizes reduce fraud risk during customer onboarding and beyond. It allows businesses to verify customer identity, age, and biometrics in under ten seconds, leveraging AI and machine learning to enhance efficiency. Supporting over 200 countries and territories and accommodating nearly 8,000 government-issued documents in over 75 languages, Hive.id enables global scalability. The platform is designed for seamless integration, allowing developers to implement its services in less than 60 minutes. Hive.id also provides customizable workflows and a fully encrypted system, ensuring a secure and efficient customer experience. By aligning with data protection standards such as GDPR and CCPA, Hive.id ensures compliance while helping businesses build trust and reduce fraud.
Cursor Insight, a software development company, is changing the cybersecurity market by world-class movement analysis solutions. The company develops a human motion analysis algorithm capable of processing data recorded with various movement capturing devices from electronic signature pads to computer mouse. Cursor Insight is a U.K.-based company that was founded in 2013 by Tamas Zelczer and Bence Golda.
CoDe_RTD is a startup focused on combating digital piracy through the use of artificial intelligence. The company specializes in developing advanced solutions aimed at protecting the copyrights of multimedia video content, particularly within the film industry. By creating an online multimedia content protection system, CoDe_RTD enables industry stakeholders to detect unauthorized sharing and illegal downloads of their videos. Through its innovative technology, the company seeks to enhance the security and integrity of digital media, ultimately supporting the rights of content creators and distributors.
Turing College is an online data science school that caters to individuals at various levels of expertise. The institution offers a pay-when-employed model, allowing students to learn at their own pace through a peer-driven remote learning platform. The curriculum is co-created with tech companies, ensuring that it is relevant to industry needs. This collaboration also enables companies to receive real-time updates on students' performance, facilitating quicker hiring decisions. By utilizing an income share agreement, Turing College allows students to pay for their education once they secure employment, making data science training more accessible.
Turing College is an online data science school that caters to individuals at various levels of expertise. The institution offers a pay-when-employed model, allowing students to learn at their own pace through a peer-driven remote learning platform. The curriculum is co-created with tech companies, ensuring that it is relevant to industry needs. This collaboration also enables companies to receive real-time updates on students' performance, facilitating quicker hiring decisions. By utilizing an income share agreement, Turing College allows students to pay for their education once they secure employment, making data science training more accessible.
The Secure Network Access made easy for organizations. Hackers will use every trick in the book to get into your network. Why not do the same to protect it? idBlender brings two very powerful technologies together secure WiFi and VPN. It is a cloud-based SaaS service. With enterprise-grade encryption and API built-in and Cloud RADIUS. And you don’t even have to buy new hardware. It is compatible with your infrastructure already. The beauty of this approach is that you can control and manage access in one place. You don’t have to buy different solutions for identity management, for WiFi, for VPN and try to combine them with duck tape.
Cyber Struggle, established in 2016 and headquartered in Tallinn, Estonia, specializes in cybersecurity training and certification services tailored to address the complexities of modern cyber threats. The organization adopts a holistic approach to cybersecurity, integrating disciplines such as criminology, psychological warfare, and terrorism studies into its training programs. Recognizing that the contemporary cybersecurity landscape requires more than just technical skills, Cyber Struggle emphasizes the importance of soft skills, including teamwork, leadership, and mental resilience, to prepare individuals for high-pressure situations. The company also leverages advanced technologies like artificial intelligence and simulation software to create realistic training environments that reflect real-world scenarios. By prioritizing both technical and psychological preparedness, Cyber Struggle aims to cultivate a robust cybersecurity workforce capable of navigating the ongoing challenges in the digital realm.
Idyllum Labs specializes in website security by developing cloud-based technology that assesses the integrity of web applications. The company employs algorithms to conduct a series of harmless penetration tests, identifying vulnerabilities and evaluating security features and data safety. This proactive approach allows clients to uncover potential weaknesses in their websites before malicious actors can exploit them. By providing a comprehensive security report with just a click, Idyllum Labs enables businesses to enhance their online safety effectively.
CYWETA provides cyber security solutions for manufacturing, transportation, industrial, military companies, and organizations. Their customers inquiries are addressed through online applications.
LOKI Inc. specializes in developing a cybersecurity smart home device designed to help users manage and secure their networks against cyber threats. Founded in 2017 and based in Izmir, Turkey, the company offers a cloud-based secure network platform that operates on a software-defined wide-area network (SD-WAN) infrastructure. This platform is user-friendly, allowing individuals and small to medium enterprises to manage their cybersecurity without requiring technical expertise. LOKI's services include a comprehensive range of features such as firewall protection, antivirus capabilities, web filtering, intrusion prevention, and logging systems. By integrating these functions into a unified threat management system, LOKI enables clients to safely and securely navigate the internet while effectively protecting their digital environments.
Cyex develops an AI-driven platform that creates personalized cybersecurity exercises tailored to the specific needs and threats faced by its clients. By focusing on various industries and their unique cyber risks, Cyex employs a learning-by-doing approach to enhance user engagement and motivation. This method helps clients better understand potential vulnerabilities and equips them with the knowledge to prevent cyber attacks. The company's innovative system aims to foster greater awareness of cybersecurity risks, ultimately strengthening defenses against potential threats.
AI Powered SAST integrated into SDLC
Cyber Struggle, established in 2016 and headquartered in Tallinn, Estonia, specializes in cybersecurity training and certification services tailored to address the complexities of modern cyber threats. The organization adopts a holistic approach to cybersecurity, integrating disciplines such as criminology, psychological warfare, and terrorism studies into its training programs. Recognizing that the contemporary cybersecurity landscape requires more than just technical skills, Cyber Struggle emphasizes the importance of soft skills, including teamwork, leadership, and mental resilience, to prepare individuals for high-pressure situations. The company also leverages advanced technologies like artificial intelligence and simulation software to create realistic training environments that reflect real-world scenarios. By prioritizing both technical and psychological preparedness, Cyber Struggle aims to cultivate a robust cybersecurity workforce capable of navigating the ongoing challenges in the digital realm.
WebTotem is a cybersecurity company based in Tallinn, Estonia, founded in 2016. It specializes in website security monitoring and defense, offering a platform that provides automated incident response services to a wide range of clients, including startups and e-commerce businesses. The company addresses the critical issue of website vulnerabilities, as a significant percentage of organizations are at risk of cyber attacks. WebTotem's software offers essential protection against various threats, including malware, and provides users with step-by-step security recommendations. Its services enable clients to monitor website activities and proactively manage cyber risks without requiring specialized knowledge. Currently, WebTotem monitors nearly 140,000 websites for one of its clients, utilizing this data to enhance its cyber attack prevention strategies.
Hive.id is an identity verification platform that helps organizations of all sizes reduce fraud risk during customer onboarding and beyond. It allows businesses to verify customer identity, age, and biometrics in under ten seconds, leveraging AI and machine learning to enhance efficiency. Supporting over 200 countries and territories and accommodating nearly 8,000 government-issued documents in over 75 languages, Hive.id enables global scalability. The platform is designed for seamless integration, allowing developers to implement its services in less than 60 minutes. Hive.id also provides customizable workflows and a fully encrypted system, ensuring a secure and efficient customer experience. By aligning with data protection standards such as GDPR and CCPA, Hive.id ensures compliance while helping businesses build trust and reduce fraud.
Firstline App a secure digital courier to move confidential data where both ends are verified and only intended receiver can access information.
TRAPMINE is a cybersecurity software developer that focuses on providing robust protection against various cyber threats, including malware, ransomware, and exploit attempts. Its Endpoint Protection Platform utilizes a combination of advanced technologies such as machine learning, behavior monitoring, and endpoint deception to effectively neutralize attacks before they can cause harm. Unlike traditional antivirus solutions, which are often inadequate against modern cyber threats, TRAPMINE offers an innovative approach that emphasizes proactive defense. The platform is designed for ease of deployment and use, featuring a built-in security console and remote forensics capabilities, making it accessible for organizations of all sizes. TRAPMINE aims to address the growing malware problem with a cost-effective solution that meets the security needs of diverse industries.
Spot something off? Help us improve by flagging any incorrect or outdated information. Just email us at
support@teaserclub.com. Your feedback is most welcome.