network security > providers from switzerland

back to overview
filter list +
  • A
  • ANONAAS: Surf the internet without being detected or identified

    ANONAAS has all the essentials to keep your browsing activity completely untraceable and anonymous on any network. Thanks to its military-grade encryption, zero-logging policy and a multi-hop network of international servers, ANONAAS is everything you need to surf the internet without being detected or identified.

    Price
    On request
    Technology
    ANONAAS is a worldwide, cross-continental multi-hop VPN solution, routing your Internet traffic through multiple servers (3+) in separate jurisdictions, ensuring anonymity, privacy, and data confidentiality. It protects your organisation against various threats such as network sniffing, tracking and surveillance without sacrificing the speed of your connection.
    Hosting
    in Switzerland
    Company
    Dreamlab Technologies AG More about the provider
  • C
  • Consulting

    n der heutigen vernetzten Welt ist der Schutz Ihrer digitalen Infrastruktur von entscheidender Bedeutung. Unsere Experten unterstützen Sie dabei, die Integrität Ihrer Systeme zu gewährleisten und potenzielle Bedrohungen abzuwehren. Mit massgeschneiderten Lösungen und bewährten Strategien begleiten wir Sie auf dem Weg zu einer umfassenden IT-Sicherheit, die das Vertrauen Ihrer Kunden stärkt und Ihr Unternehmen nachhaltig voranbringt. Schliessen Sie sich uns an und machen Sie den ersten Schritt in eine sicherere digitale Zukunft.

    Price
    On request
    Hosting
    no data
    Company
    cybrius GmbH More about the provider
  • Cybersecurity

    We take care of our customers' safety as our own

    We offer innovative and high-performance, solutions to manage your security efficiently. As experts, we not only support you in setting up and using these solutions, but also in training your staff and helping you to adopt best practices.

    We can guide you to:

    • Implement security best practices

    • manage compliance and governance

    • audit your information systems

    • Assess risks

    • Detect threats and vulnerabilities

    • Design remediation plans

    • Respond to attacks

    • And much more...

    Price
    On request
    Hosting
    in Switzerland
    Company
    Globaz SA More about the provider
  • CySOC: A 360-Degree View of your Cyber Dimension

    CySOC’s comprehensive cyber SOC (security operations center) solution provides a holistic view into an organisation, offering a 360-degree view of the cyber dimension. Designed for critical infrastructure providers, private enterprises, and government entities, CySOC enables users to proactively detect, identify, analyse, and investigate anomalies within their IP-based infrastructures. By continuously monitoring network traffic and generating customisable dashboards, CySOC empowers organisations to defend against cybersecurity threats effectively. It strengthens their ability to monitor, prevent, detect, respond to, and manage cybersecurity incidents while providing valuable advice and support. With CySOC, users can enhance their cybersecurity efficiency, reduce personnel and incident resolution costs, and improve compliance with IT principles through streamlined reporting.

    Price
    On request
    Technology
    CySOC utilises advanced technology to improve security incident detection by constantly monitoring and analysing data activity. By continuously gathering and analysing real data like network packets and log files, CySOC accurately assesses the impact of potential threats and identifies the most suitable countermeasures. CySOC leverages optimisation and economies of scale to enhance its effectiveness and efficiency, not only saving valuable time and effort but also reducing costs.
    Hosting
    in Switzerland
    Company
    Dreamlab Technologies AG More about the provider
  • H
  • HOPR network

    HOPR keeps any exchange of data, private & secure.

    If you use a Cloud service in Switzerland, HOPR can take care of your data to be up- & downloaded:

    (1) with Authenticity (of sender & recipient)

    (2) absolute Anonymity (external third parties cannot observe who does what & when)

    (3) improved Reliability (decentralized communication protocol)

    of all your data.

    Price
    On request
    Technology
    Blockchain Encryption
    Hosting
    available in Switzerland
    Company
    HOPR More about the provider
  • I
  • IT solutions for all areas of IT

    DIGITALIZATION

    We support you in the conception, development and implementation of innovative technology solutions to successfully advance your company in digitalization.

    MODERN WORKPLACE

    Consulting, installation, service and operation for both cloud services and your local IT from a single source.

    CYBER SECURITY

    Fully comprehensive cyber security and data protection. We offer full cyber defense for your complete IT infrastructure.

    BUSINESS APPLICATIONS

    Optimal business software for more success. We work closely with you to develop your digitized IT system with the right applications for you.

    CLOUD NATIVE DEVOPS

    Deliver innovative applications faster. We accompany you in the transition to true cloud native solutions, operate your applications and provide you with full service.

    CLOUD COMPUTING

    Whether public, private, hybrid or multi-cloud, MTF supports your company in the transition to operating modern cloud platforms.

    IT INFRASTRUCTURE

    Whether on-premise, cloud or hybrid IT infrastructures, MTF, as one of the largest system houses in Switzerland, offers a full range of infrastructure services.

    Price
    On request
    Hosting
    in Switzerland
    Company
    MTF Solutions AG More about the provider
  • IT security services

    The security products from Safe Swiss Cloud support information security managers in protecting against security breaches caused by ransomware and other types of malware. They help to continuously improve IT security and strengthen the defense against malware and ransomware.

    The Safe Swiss Cloud security services offer a modular toolkit that can be used independently to improve the security of the IT infrastructure. These tools can be used both in the cloud and in the IT infrastructure on site.

    Security monitoring: Receive early warnings and alerts about relevant security events in your IT environment.

    Price
    Siehe Webseite.
    Technology
    Multiple
    Hosting
    in Switzerland
    Company
    Safe Swiss Cloud AG More about the provider
  • M
  • Managed Monitoring, Network & Security

    Use of multi-level and intelligent mechanisms to protect against internal and external threats.

    Price
    On request
    Hosting
    no data
    Company
    netWolk GmbH More about the provider
  • N
  • narrowin endpoint segmentation

    Easy to hack, hard to patch: Protect vulnerable endpoints plug & play.

    Our solution for micro-segmentation makes it possible to secure vulnerable devices and systems (e.g. legacy/unpatchable devices or devices without embedded security) with comparatively low costs and minimal effort. It offers direct protection against ransomware attacks. Typical use cases are medical devices, OT systems, research devices, Facility IoT etc.

    Price
    On request
    Hosting
    in Switzerland
    Company
    narrowin More about the provider
  • narrowin lightweight SDN

    State-of-the-art network designs at minimal cost.

    Our "lightweight SDN" approach offers the possibility to build secure and efficient networks without high costs and complexity. The proprietary platform for network management includes modern security concepts (zoning, NAC, etc.) out-of-the-box, as well as self-service features, automation and standard integrations. These advantages are combined with the unique price/performance ratio of Mikrotik hardware. The solution significantly simplifies network operation and relieves the strain on network and security personnel - without compromising on security and performance requirements.

    Price
    On request
    Hosting
    no data
    Company
    narrowin More about the provider
  • Network Segmentation

    Analysis, design and implementation of a secure network architecture. Central design aspects are usually:

    – Segmentation / zoning according to security levels

    – Strong focus on endpoint security

    – Use and build on the existing system landscape and tool chain

    – Build automation & self-service to ensure efficient network operations

    Price
    On request
    Hosting
    no data
    Company
    narrowin More about the provider
  • O
  • OT-Cyber Security IEC-62443

    Digitization provides industrial companies with previously unimagined potential - but also confronts them with new challenges.

    This also applies to cyber security. Gritec AG supports companies in making their production and products fit for cyber risks.

    To do this, it relies on decades of industry expertise, existing standards (IEC-62443) and established strategies.

    Services System Assess:

    - System Testing/ Scanning

    - OT-Infrastructure Check according to IEC 62443

    - Consulting OT-Security IEC 62443

    - Identification of technical vulnerabilities

    Services Protect & Prevent:

    - System architecture review

    - Risk Assessment, Asset Values definition

    - Assessment of processes and procedures

    - Consulting for Security by Design

    - Definition of effective measures

    - Production network security (zoning, firewall, IDS, IPS, DPI)

    Price
    On request
    Technology
    Security IoT, Network Security, Security Consulting, Software for Engineering
    Hosting
    no data
    Company
    GRITEC AG More about the provider
  • P
  • Penetration Testing

    Cyber Attack Simulation

    Through the use of proactive methods, we identify and target security vulnerabilities before they result in a malicious cybersecurity attack, preventing significant damage to your business.

    Our comprehensive analysis identifies threat potentials, provides specific security recommendations, and ensures compliance with legal requirements to avoid reputational damage. Our security experts simulate realistic attacks on your systems, web applications, applications, IT infrastructures, mobile devices, IoT and OT, as well as cloud systems, to uncover weaknesses.

    Price
    On request
    Technology
    Blackbox-Tests, Whitebox-Tests, Greybox-Tests
    Hosting
    in Switzerland
    Company
    United Security Providers AG More about the provider
  • S
  • SEC-CHECK®

    Services for auditing IT-Infrastructure with the objective to improve the technical security settings in the existing environment.

    Price
    depending on project size
    Technology
    Proprietary
    Hosting
    no data
    Company
    SUA Telenet GmbH More about the provider
  • Secure Access as a Service

    WAAP (Web Application + API Protection):

    With Airlock Gateway, we offer a unique combination of protection mechanisms for business-critical, web-based applications and APIs. We thus fulfil the requirements of PCI DSS, ISAE 3000, ISO 27001 and FINMA RS 08/7, RS 08/21 and RS 18/3.

    Airlock WAF systematically controls and filters all access at all levels before it reaches the customer application.

    IAM - Identity & Access Management:

    In combination with Airlock WAF, Airlock IAM enforces the upstream authentication and authorisation of users. This enables a secure, standardised and centralised single sign-on infrastructure.

    We offer both WAF and IAM as a dedicated application or as a service.

    As one of the few integrators at the Platinum level of the Airlock partner programme, aspectra meets the highest requirements in terms of know-how, industry and project experience and is able to implement and support even complex Airlock projects and installations.

    Price
    On request
    Technology
    Airlock Secure Access Hub
    Hosting
    in Switzerland
    Company
    aspectra AG More about the provider
  • Sedion Secure Box

    The Sedion Secure Box is located in your company. It is up to you to define data that is particularly worthy of protection, which is then automatically freed from malware via Sedion Secure Box, encrypted and backed up externally as a replica in a former military bunker. In the event of a cyber attack, e.g. by a crypto-Trojan, the raw data can be quickly and purposefully restored. The Sedion Secure Box protects the company from expensive system failures and subsequent economic costs in the event of a cyber event.

    Price
    On request
    Hosting
    in Switzerland
    Company
    Sedion AG More about the provider
  • Swiss SafeLab M.ID Server

    Many two-factor authentication solutions are based on additional devices/tokens. However, with these it is always cumbersome to carry them along. M. ID solves this problem in an elegant way: The OTP (one time password) is sent as text message to user's cell phone. Alternatively it can be generated with an app on smartphones or similar devices.

    Price
    On request
    Version
    4.8.2 (10/7/2015)
    Technology
    Swiss SafeLab M.ID Server is a software security solution purely based on Java technology. Swiss SafeLab M.ID Server fits seamlessly in existing infrastructures as no additional hardware (Server, Appliances) have to be aquired.
    Hosting
    no data
    Company
    Swiss SafeLab GmbH More about the provider
  • U
  • USP Network Authentication System®

    The network access control (NAC) solution from United Security Providers blocks the path to malware and unauthorized access by screening all end devices that attempt to connect to a corporate network.

    Price
    On request
    Technology
    USP Network Authentication System®
    Hosting
    in Switzerland
    Company
    United Security Providers AG More about the provider