security assessment > providers from switzerland

back to overview
filter list +
  • C
  • CuriX

    With CuriX® you know if your anomaly is important or if it is part of the background noise. CuriX® tells you when the anomaly becomes critical and when the defined thresholds are exceeded. The anomaly analysis is cause-independent; i.e. the anomaly may have been caused by misconfiguration, cyber attacks or other irregularities in the IT infrastructure.

    Price
    On request
    Hosting
    in Switzerland
    Company
    CuriX AG More about the provider
  • Cybersecurity

    We take care of our customers' safety as our own We offer innovative and high-performance, solutions to manage your security efficiently. As experts, we not only support you in setting up and using these solutions, but also in training your staff and helping you to adopt best practices. We can guide you to: • Implement security best practices • manage compliance and governance • audit your information systems • Assess risks • Detect threats and vulnerabilities • Design remediation plans • Respond to attacks • And much more...

    Price
    On request
    Hosting
    in Switzerland
    Company
    Globaz SA More about the provider
  • CyObs: High-Precision Cyber Radar System

    CyObs is a groundbreaking high-precision cyber radar system that revolutionises the way nations and organizations perceive and safeguard their digital landscape. With unmatched accuracy and speed, CyObs empowers users to meticulously measure, visualise, and analyse the vast realm of cyberspace. By providing a comprehensive understanding of their digital infrastructure, CyObs enables organisations to reduce their attack surface and fortify the security of their online assets. Undeniably, CyObs stands as the cornerstone of any robust national cyber defense strategy.

    Price
    On request
    Technology
    CyObs utilises state-of-the-art technology to offer comprehensive protection against malicious attacks. By employing proactive threat identification, advanced analytics, and a systematic approach to risk mitigation, CyObs ensures comprehensive security. Powered by cutting-edge algorithms and advanced data processing, CyObs provides unparalleled accuracy and clarity in assessing and comprehending the cyberspace. Its exceptional precision, speed, and visualisation capabilities make it a valuable tool for implementing proactive cyber defense strategies in an ever-changing digital landscape.
    Hosting
    in Switzerland
    Company
    Dreamlab Technologies AG More about the provider
  • F
  • FraudGuardian

    FraudGuardian enables financial institutions to address fraud challenges (e.g. mobile banking, payment fraud, e-banking, account takeover, identity theft) with out-of-the-box controls packaged in bundles. These controls ensure continuous auditing of human behavior across channels, IT layers and financial transactions. FraudGuardian is backed by NG|Screener, an innovative enterprise software platform that uses Big Data technology, predictive analytics, and user behavior analytics to combine and standardize data from across the entire banking system. FraudGuardian prevents fraud before it happens. Its real-time auditing interface allows you to easily view all detected activities anytime.

    Price
    On request
    Version
    6.0
    Technology
    Big Data
    Hosting
    no data
    Company
    NetGuardians More about the provider
  • E
  • ELCA Advisory

    ELCA’s consulting team includes more than 35 experienced consultants, who advise organizations in every sector on implementing their business strategies and reaching their objectives efficiently with the help of the most up-to-date technologies. We define future-proof, coherent IT strategies and business architectures and implement them sustainably in the organization. Our core competencies include strategic IT consulting, digital transformation, business and operational process analysis, business architecture, requirements engineering, change management, programm and project management as well as user experience, quality assurance and test management.

    Price
    On request
    Technology
    Own and partner technologies: https://www.elca.ch/en/partners
    Hosting
    in Switzerland
    Company
    ELCA Informatik AG More about the provider
  • N
  • narrowin endpoint segmentation

    Easy to hack, hard to patch: Protect vulnerable endpoints plug & play. Our solution for micro-segmentation makes it possible to secure vulnerable devices and systems (e.g. legacy/unpatchable devices or devices without embedded security) with comparatively low costs and minimal effort. It offers direct protection against ransomware attacks. Typical use cases are medical devices, OT systems, research devices, Facility IoT etc.

    Price
    On request
    Hosting
    in Switzerland
    Company
    narrowin More about the provider
  • narrowin lightweight SDN

    State-of-the-art network designs at minimal cost. Our "lightweight SDN" approach offers the possibility to build secure and efficient networks without high costs and complexity. The proprietary platform for network management includes modern security concepts (zoning, NAC, etc.) out-of-the-box, as well as self-service features, automation and standard integrations. These advantages are combined with the unique price/performance ratio of Mikrotik hardware. The solution significantly simplifies network operation and relieves the strain on network and security personnel - without compromising on security and performance requirements.

    Price
    On request
    Hosting
    no data
    Company
    narrowin More about the provider
  • Network Segmentation

    Analysis, design and implementation of a secure network architecture. Central design aspects are usually: – Segmentation / zoning according to security levels – Strong focus on endpoint security – Use and build on the existing system landscape and tool chain – Build automation & self-service to ensure efficient network operations

    Price
    On request
    Hosting
    no data
    Company
    narrowin More about the provider
  • P
  • Penetration Tests

    What is the best way to test the security of your IT infrastructure, systems and organization? Exactly, with a hacker attack! During a penetration test, our Cyber Seurity experts perform a real attack. This shows whether the infrastructure is sufficiently protected against attacks from outside and inside and whether it is in line with the accepted residual risks. Our approach is based on the recognized methods OWASP, OSSTMM and ISO 27001.

    Price
    On request
    Hosting
    no data
    Company
    Brielmayer Consulting GmbH More about the provider
  • S
  • SEC-CHECK®

    Software for auditing IT-Infrastructure with the objective to improve the technical security settings in the existing environment.

    Price
    SME from CHF 480
    Technology
    Proprietary
    Hosting
    no data
    Company
    SUA Telenet GmbH More about the provider
  • SEC-CHECK®

    Services for auditing IT-Infrastructure with the objective to improve the technical security settings in the existing environment.

    Price
    depending on project size
    Technology
    Proprietary
    Hosting
    no data
    Company
    SUA Telenet GmbH More about the provider
  • Security Consulting

    Ergonomics, a leading Consulting Company in areas of Integrated Security, can support you in recognizing and resolving enterprise wide IT risks, dangers, and weak spots. Over the years, Ergonomics Security Consultants have gained immense knowhow – valuable in tackling the most challenging Organisational and Technical IT Security issues. On a daily basis, we deal with issues surrounding Secure IT Systems and Networks, Information Security Management, Data Protection, Crisis Management, Social Engineering, Security Concepts, and Security Audits. Our Consultants have a plethora of skills covering technical and business areas, and are therefore able to support you in defining your strategy and implementing it to a future state, or being your professional coach in close collaboration with you. International Credit Card organisations issue stringent security requirements to their contractual partners based on PCI Data Security Standard. Our Certified Security Auditors/Certified Security Assessors accompany you from analysis right up to implementation, and ensure that the highest security standards can be satisfied.

    Price
    On request
    Technology
    Compliance (ISO 27001, PCI DSS), Schwachstellenanalysen, SCADA Security
    Hosting
    no data
    Company
    Ergonomics AG More about the provider
  • U
  • USP Network Authentication System®

    The network access control (NAC) solution from United Security Providers blocks the path to malware and unauthorized access by screening all end devices that attempt to connect to a corporate network.

    Price
    On request
    Hosting
    no data
    Company
    United Security Providers AG More about the provider
  • W
  • Web Application Operations in the Cloud

    Infrastructure-as-a-Service (IaaS) means you don’t have to buy server capacity in advance, but can instead lease it flexibly and according to your needs. We maintain your servers in a public cloud or in your private cloud and take care of system administration.

    Price
    ab Fr. 100.-/Mt, je nach benötigter Computing-Ressourcen
    Technology
    Amazon, Azure, Rackspace, Cloudscale, Cloudsigma, Exoscale, Innofield, Safeswisscloud, Swisscom Cloud, Puppet, Ansible, MySQL, PostgreSQL, MongoDB, Redis, Memcached, Varnish, Apache, Nginx, Java, Tomcat, PHP, HHVM, Symfony, Drupal, Python, Django, Ruby, Rails, Node.js, Docker
    Hosting
    no data
    Company
    VSHN AG More about the provider