Vendors

Explore our trusted partnerships and collaborations with leading vendors in the cybersecurity industry.

Cyfirma

External Threat Landscape Management

  • External Attack Surface Management
  • Brand Protection
  • Dark Web Monitoring
  • Vulnerability Intelligence
  • Cyber Threat Intelligence
  • 3rd Party Threat Intelligence
positive-tech-logo

Advanced Security Infrastructure & Response

  • Next Generation Firewall (NGFW)
  • SIEM
  • Application Security Testing
  • Sandboxing
  • Vulnerability Management
  • Application Firewall
  • Incident Response
  • Network Detection and Response (NDR)
privasapien

Data Privacy

  • Comply with Personal Data Protection Law (PDPL) of SDAIA
  • Experts in Data Privacy laws, standards, and regulations
  • Tools and systems to identify and secure personal data
  • Applying AI in protection PII

Governance, Risk Management, and Compliance

  • Integrated Risk & Compliance Management Platform
  • Cyber Security Testing Aggregation Platform
  • Next Generation Cyber Security Operation Center Platform
  • Next Generation Threat Intelligence & Orchestration Platform
  • Live Risk Tracking & Management Platform
  • Integrated Risk Management Ticketing System
GTB Technologies

Data Protection

  • Data Loss Prevention (DLP)
  • Data Classification
  • Watermarking
  • Network DLP
  • File Share & Cloud DLP
  • Email DLP & Classification

Anxinsec Offerings

  • Mobile Device Management (MDM)
  • Security Operations Center (SOC)
  • Advanced Threat Protection (ATP)
  • Memory Detection and Protection System
  • Managed Security Services (MSS)
  • Risk assessment for AI system

S3M Security

  • Hybrid NAC
  • Agent and Agentless Architecture
  • AAA Server
  • Endpoint Protection (EPP)
  • Network Access Control (NAC)
maxbit

Maxbit

  • Software and hardware implementation
  • Advisory services
  • IT support
  • Data services
  • Security services

Database Access Manager (DAM)

  • Database Policy and Access Management
  • Sensitive Data Discovery
  • Wide Range of Database Support
  • Full Visibility with Database Access and Session Logging
  • Full Compliance with Regulations
  • Data masking
  • AAA Server
dphish-logo

Awareness & Phishing Simulation

  • Focused Training
  • Immediate Feedback
  • Customizable Content
  • Run Custom Phishing Campaigns
  • Multinational Support (Arabic + English)
  • Integrate Threat Feeds Into Inbox Scanning

Mobile Application Security Testing

  • Static Application Security Testing (SAST)
  • Dynamic Application Security Testing (DAST)
  • API Scans
  • Vulnerability Assessment
  • On-prem options

Security Hardening

  • Scan all devices in the network and find weaknesses and non-compliance
  • Mitigate weaknesses without needing to connect to every device (agentless)
  • Detailed security auditing and scoring
  • Wide support for devices and systems (endpoints, network, security, etc.)
  • Create your own company policy to enforce or follow pre-built best practices

DNS, DHCP, and IPAM (DDI) Solutions

  • DNS Management
  • DHCP and IP Address Management
  • DNS Security
  • Integrated Threat Intelligence Feeds
  • Prevent DNS DDoS Attacks

Penetration Testing As A Service

  • Conduct Penetration Testing All Year Long
  • Automate Pentesting process
  • Access to Over 800+ Security Researchers
  • Get Critical Vulnerability Reports With Proof of Concepts
  • Launch Tests Within Days, Not Weeks
frontier-zero

SaaS Management

  • SaaS Management
  • Compliance Monitoring
  • SaaS Security
  • License Optimization
  • Third-Party Application Risk Management

Sandboxing

  • Fully On-prem file scanning
  • Integrations with Email and security tools
  • Highest detection rates
  • Lowest false-positive rates
  • Machine-Learning-based detection

USB Decontamination Stations

  • Offline USB scanning that supports air gapped networks
  • 7+ Antivirus engines
  • Clear USBs to be used inside the company
  • Transfer files that are deemed safe
  • Plug-and-play scanning
tehtris-logo

Extended Detection and Response (XDR)

  • Extended Detection & Response (XDR)
  • Security Information and Event Management (SIEM)
  • Security Orchestration, Automation, and Response (SOAR)
  • Mobile Threat Defense (MTD)
  • Network Traffic Analysis (NTA)
  • Honeypots / Deception

Distributed Denial of Service (DDoS) Protection

  • On-premises Protection of DDoS Attacks
  • L7 Application Layer Detection of All Kinds of DDoS Attacks
  • First Layer Detection of DDoS Before it Reaches Your Network
  • Scalable Options From 0.5 to 100+ Gbps
dalos

Asset Management

  • IT Asset Management
  • Contract Management
  • Contract & Subscription Renewal
  • Customer Web Portal
  • IT Network Monitoring

Myneral

  • Traceability solutions
  • Supplier risk and relationship management
  • Sustainability tracking 
  • Blockchain-backed data security
  • AI-driven analytics

People strong

  • Human Capital Management
  • Talent Acquisition
  • Employee Collaboration Software
  • Payroll and Workforce
    Management
  • Talent Management
  • HR Chatbot (Jinie)
  • Analytics

Educhain

  • Digital issuance of academic credentials
  • Automated verification of records
  • Secure document sharing