Services & Tools
These organisations provide various services to improve your CyberSecurity profile – from anti-virus and malware software, through the provision of Security Certificates to more bespoke physical and online services and training.
Anti-Virus & Malware Services |
---|
Avast
Lightweight and intuitive protection powered by a community over 400 million strong. |
AVG
AVG - Dedicated to your online security. We protect devices, data, and people. |
BullGuard
At BullGuard, we make it simple to protect everything in your digital life—from your data, to your identity, to your Smart Home. |
Kaspersky
A global cybersecurity company, which has been operating in the market for over 20 years. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into next generation security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. |
McAfee
McAfee solutions deliver the highest levels of threat visibility and antimalware protection, including comprehensive system and endpoint protection, network security, cloud security, database security, endpoint detection and response, and data protection. Our complete security solutions extend beyond virus software and antimalware protection to server security, SIEM, and intrusion prevention systems (IPS). |
Norton
Over the last 25 years, we’ve built a rich and widespread intelligence network, constantly gathering data on threats from over 40 million endpoints in over 150 countries. That data is what drives our protection, enabling it to stop even emerging threats that nobody’s ever seen before. |
PCProtect
The Ultimate Antivirus. It's a fast, simple & effective way to protect your digital world in just a few clicks! |
ScanGuard
The Best Antivirus & Tune-up From Scanguard. Ultimate Protection available for the whole family across multiple platforms |
TotalAV
Whatever Your Device, We Support it. |
Fighting Online Fraud |
---|
10 Steps to Cyber Security
Guidance on how organisations can protect themselves in cyberspace, including the 10 steps to cyber security. |
419 Eater
Welcome to the world of Scambaiting! So what is scambaiting? Well, put simply, you enter into a dialogue with scammers, simply to waste their time and resources. Whilst you are doing this, you will be helping to keep the scammers away from real potential victims and screwing around with the minds of deserving thieves. |
Crimes of Persuasion
Explains a number of techniques used by criminals on the internet. |
EU Disinfo Lab
A vibrant home for disinformation activists and experts. EU DisinfoLab is an independent non-profit organisation focused on tackling sophisticated disinformation campaigns targeting the EU, its member states, core institutions, and core values. |
GIACT
Helping companies eliminate payments risk and identity fraud, verify customers, and stay in compliance with KYC requirements. |
Graphika
Graphika leverages AI to reveal and study online communities. We are the best in the world at analyzing how online social networks form, evolve, and are manipulated. |
StaySafeOnline
The National Cyber Security Alliance (NCSA) builds strong public/private partnerships to create and implement broad-reaching education and awareness efforts to empower users at home, work and school with the information they need to keep themselves, their organizations, their systems and their sensitive information safe and secure online and encourage a culture of cybersecurity. |
The Merchant Risk Council
The leading global trade association for eCommerce fraud and payments professionals. |
ID Verification |
---|
Aver
Products and solutions made for you and your customers. Facial Recognition and Artificial Intelligence drive easy onboarding on the desktop or on-the-go. |
fourthline
Turn your onboarding and compliance challenges into opportunities. Fourthline’s intelligent KYC and digital identity products help banks, brokers, and fintechs grow and protect their business. |
GBG
Verify in an instant. Transact with confidence. |
IDCheck.io
"Based on three pillars: fraud prevention, compliance with the applicable regulations in your business sector and customer experience improvements. The common foundation for these three pillars is document verification using our IDCheck.io solutions." |
IDCheck.io
We base our id check solutions on three pillars: fraud prevention, compliance with regulations and customer experience. The common foundations of these pillars are document verification and identity check using our IDCheck.io solutions. |
iDenfy
Tailor-made identity verification for friendly user-on-boarding. |
identityONE
identityONE is a web-based ID card issuance solution. Seamless integration with CaptureME provides users the ability to approve or reject ID photos, issue ID cards with or without building access and barcode functionality. Intuitive data entry, comprehensive search options and batch print capabilities makes it easy to manage your card holder records. |
IDnow
The identity verification platform. Built for security. Loved by people. |
Jumio
Jumio's AI-powered Trusted Identity as a Service connects to your product, app or service to verify your customers' real-world identities. With a simple ID scan and real-time selfie, Jumio lets you accurately and seamlessly know, verify and trust your customer. |
Jumio
Automated ID and Identity Verification Solutions. Identity verification, eKYC and transaction monitoring powered by AI. |
NorthRow
Regulated businesses use NorthRow to accelerate their onboarding processes and increase effectiveness of their Client Due Diligence. Confirm individual IDs and cross-reference to company confirmation. |
passbase
Verify your user’s true identity in seconds Integrate seamless, bank-level identity verification into your website, app, or checkout with just a few lines of code. |
Refinitiv
Refinitiv Qual-ID. A powerful combination of digital identity verification, document proofing, and risk screening via API technology. |
Sum & Substance
All-in-one platform to onboard and verify your customers. Whether you are creating an e-wallet, an ICO or carsharing service, we will make it easy for users to get started with you. Reliable Know Your Customer (KYC) and Anti-money laundering (AML) procedures, personal data handled the right way, friendly UX and scalability will make you never think about ID verification again. |
Sum & Substance
ORE THAN JUST IDENTITY VERIFICATION. A verification engine tailored to your business. A powerful suite that lets you streamline your day-to-day routine while minimising risks and allowing users to access your service much faster than before. |
Trulioo
Verify Customers Online, Anywhere, in Seconds. Knowing your customer mitigates fraud, risk and financial crime. |
Trulioo
Trulioo is a RegTech company. We build and connect digital identity networks around the globe, and this framework of trust empowers businesses to assess the various risks associated with digital identities. |
veri-das
Veridas is a technological company specialized in digital ID and biometrics authentication solutions that ensure the digital transactions carried out by customers from banks and insurance entities. Veridas’ solutions validate thousands of identities daily in the cloud. |
ZignSec
All the identification and compliance features you need, in one platform. We have aggregated the best-known data and verification providers from 100+ countries. So you don’t have to. Combine local and global identification methods to identify and onboard you customers. |
Secure Certificate Providers |
---|
CACert
CAcert.org is a community-driven Certificate Authority that issues certificates to the public at large for free. |
DigiCert
DigiCert is the go-to provider of identity, authentication, and encryption solutions for the web and IoT devices. We help enterprises of every size deploy PKI security that aligns with industry standards and best practices. Our SSL tools and enterprise-grade platform simplify management, automate certificate tasks, and give organizations the power to customize workflows to best fit their needs. |
Thawte
As a leading global certificate authority, Thawte provides online security trusted by millions around the world. Expert support, robust authentication practices, and easy online management make Thawte the best value for SSL certificates and code signing certificates. |
VeriSign
Verisign, a global leader in domain names and internet security, enables internet navigation for many of the world’s most recognized domain names and provides protection for websites and enterprises around the world. |
Security Service Associations & Standards |
---|
Chamber of Digital Commerce
Our mission is to promote the acceptance and use of digital assets and blockchain-based technologies. Through education, advocacy and working closely with policymakers, regulatory agencies and industry, our goal is to develop an environment that fosters innovation, jobs and investment. |
Cloud Security Alliance
To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. |
Distributed Management Task Force
The DMTF creates open manageability standards spanning diverse emerging and traditional IT infrastructures including cloud, virtualization, network, servers and storage. |
European Union Agency for Network and Information Security
A centre of expertise for cyber security in Europe. |
ISACA
ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. |
ISO 27001
ISO 27000 Standards Information Security |
Oasis
Advancing Open Standards for the Information Society. A nonprofit consortium that drives the development, convergence and adoption of open standards for the global information society. |
OAuth
An open protocol to allow secure authorization in a simple and standard method from web, mobile and desktop applications. |
OWASP
OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted. All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in improving application security. |
Security Standards Council
A global forum for the ongoing development, enhancement, storage, dissemination and implementation of security standards for account data protection. |
The EU General Data Protection Regulation
The GDPR is the most important change in data privacy regulation in 20 years - we're here to make sure you're prepared. |
Security Service Providers |
---|
Atos
60% of enterprises will be victims of major breaches by 2020. What if you could leverage trust for business advantage? As the Trusted Partner for Digital Transformation, Atos is ready to help. |
Bitdefender
Bitdefender is a global cybersecurity leader protecting over 500 million systems in more than 150 countries. Recognized by industry, respected by vendors and evangelized by our customers, Bitdefender is the cybersecurity company you can trust and rely on. |
Cyber Essentials
We are one of a network of certification bodies who provide Cyber Essentials certification. A trusted supplier of the Scottish Business Resilience Center, the Cyber Resilience Center and the Ministry of Defence. Cyber Essentials is provided by IASME the official delivery partner with the NCSC and is responsible for all the Cyber Essentials Certification Bodies. |
DarkTrace
Like an immune system, DarkTrace's worl- leading Cyber AI protects against unpredictable threats. Cloud-native, DarkTrace covers the entire enterprise, from workforce devices and IoT, to Saas and email. |
Drooms
Drooms is an award winning data room provider that grants secure access to confidential documents across company boundaries and specialises in customised solutions across the entire value-added chain. In addition to securely handling confidential business processes such as commercial real estate sales via Drooms TRANSACTION, Drooms PORTFOLIO maps all stages across the entire Lifecycle Asset Management process on a single platform. |
FireEye
FireEye understands cyber attacks and the threat actors responsible for them better than anyone else. Our solution takes a three-pronged approach that combines innovative security technologies, world-renowned expertise, and deep threat intelligence capabilities. Unlike other solutions, we address the entire security operations lifecycle — every critical issue before, during and after an attack. |
IASME Consortium
IASME is a cyber security business dedicated to keeping everyone safer online both at home and at work. Through our products and services, we help individuals and organisations of all sizes to protect themselves against cyber-attack. |
Infosequre
Infosequre equips you with the best tools to safely play your part in today’s digital landscape. |
it governance
IT Governance is a leading global provider of cyber risk and privacy management solutions, with a special focus on cyber resilience, data protection, PCI DSS, ISO 27001 and cyber security. In an increasingly punitive and privacy-focused business environment, we are committed to helping businesses protect themselves and their customers from the perpetually evolving range of cyber threats. Our deep industry expertise and pragmatic approach help our clients improve their defences and make key strategic decisions that benefit the entire business. |
Signicat
Signicat is the leading provider of trusted digital identity services across Europe. By providing the most comprehensive digital identity platform on the market, we drive innovation, accelerate digital business and support the complete digital identity lifecycle. |
WiseKey
WISeKey is a leading global cybersecurity company headquartered in Geneva, Switzerland currently deploying large scale digital identity ecosystems with a patented process. WISeKey’s Swiss-based cryptographic Root of Trust (“RoT”) provides secure authentication and identification in both physical and virtual environments for the Internet of Things, Blockchain and Artificial Intelligence. |