| | - Consulting Services (i.e.: Advisory, Research)
- Secure System Development (i.e.: Hardware, Software, Mobile Apps)
- Managed Security Services (i.e.: SOC, Secure Hosting, Log Management, Threat Intelligence)
- New Technology Security (i.e.: Artificial Intelligence, IoT, IIoT, Cloud, 5G)
- Data Security (i.e.: Big Data, Encryption, Sanitization, Leak Protection)
|
| | |
| | |
| | |
| | - Consulting Services (i.e.: Advisory, Research)
- Governance, Risk & Compliance (i.e.: Audit)
- Training & Education (i.e.: Awareness, Coaching)
- Distributor/Reseller (i.e.: System Integrator, Contractor, Supplier)
- Others
|
| | |
| | |
| | |
| | - Consulting Services (i.e.: Advisory, Research)
- Security Risk Assessment (i.e.: Behavioural, Maturity)
- Security Testing Services (i.e.: Penetration Test, VA, SPA)
- Managed Security Services (i.e.: SOC, Secure Hosting, Log Management, Threat Intelligence)
- Business Continuity Management (i.e.: Crisis Management, Disaster Discovery)
|
| | - Consulting Services (i.e.: Advisory, Research)
- Governance, Risk & Compliance (i.e.: Audit)
- Security Testing Services (i.e.: Penetration Test, VA, SPA)
|
| | - Secure System Development (i.e.: Hardware, Software, Mobile Apps)
|
| | |
| | - Consulting Services (i.e.: Advisory, Research)
- Governance, Risk & Compliance (i.e.: Audit)
- Training & Education (i.e.: Awareness, Coaching)
- Security Testing Services (i.e.: Penetration Test, VA, SPA)
- Managed Security Services (i.e.: SOC, Secure Hosting, Log Management, Threat Intelligence)
|
| | - Consulting Services (i.e.: Advisory, Research)
- Training & Education (i.e.: Awareness, Coaching)
- Distributor/Reseller (i.e.: System Integrator, Contractor, Supplier)
- Managed Security Services (i.e.: SOC, Secure Hosting, Log Management, Threat Intelligence)
- Maintenance & Support (i.e.: IT Support, Infra Management)
|
| | |
| | |
| | |
| | |
| | |
| | |
| | - Secure System Development (i.e.: Hardware, Software, Mobile Apps)
- New Technology Security (i.e.: Artificial Intelligence, IoT, IIoT, Cloud, 5G)
- Data Security (i.e.: Big Data, Encryption, Sanitization, Leak Protection)
- Identity Management & Access Control (i.e.: Authentication, Biometrics)
|
| | |
| | |
| | - Consulting Services (i.e.: Advisory, Research)
- Training & Education (i.e.: Awareness, Coaching)
- New Technology Security (i.e.: Artificial Intelligence, IoT, IIoT, Cloud, 5G)
- Data Security (i.e.: Big Data, Encryption, Sanitization, Leak Protection)
- Digital Forensics (i.e.: Audio, Video, Mobile)
|
| | |
| | |
| | |
| | |
| | |
| | - Consulting Services (i.e.: Advisory, Research)
- Governance, Risk & Compliance (i.e.: Audit)
- Distributor/Reseller (i.e.: System Integrator, Contractor, Supplier)
- Security Testing Services (i.e.: Penetration Test, VA, SPA)
- Standards & Certifications (i.e.: Common Criteria, ISMS, Lab)
|
| | - Consulting Services (i.e.: Advisory, Research)
- Security Risk Assessment (i.e.: Behavioural, Maturity)
- Secure System Development (i.e.: Hardware, Software, Mobile Apps)
- Security Testing Services (i.e.: Penetration Test, VA, SPA)
- Managed Security Services (i.e.: SOC, Secure Hosting, Log Management, Threat Intelligence)
|
| | |
| | - Training & Education (i.e.: Awareness, Coaching)
- Standards & Certifications (i.e.: Common Criteria, ISMS, Lab)
|
| | |
| | - Training & Education (i.e.: Awareness, Coaching)
- Standards & Certifications (i.e.: Common Criteria, ISMS, Lab)
|
| | - Consulting Services (i.e.: Advisory, Research)
- Governance, Risk & Compliance (i.e.: Audit)
- Training & Education (i.e.: Awareness, Coaching)
|
| | |
| | |
| | |
| | - Consulting Services (i.e.: Advisory, Research)
- Security Risk Assessment (i.e.: Behavioural, Maturity)
- New Technology Security (i.e.: Artificial Intelligence, IoT, IIoT, Cloud, 5G)
- Data Security (i.e.: Big Data, Encryption, Sanitization, Leak Protection)
- Maintenance & Support (i.e.: IT Support, Infra Management)
|
| | - Training & Education (i.e.: Awareness, Coaching)
- Incident Handling (i.e.: Emergency Response)
- Distributor/Reseller (i.e.: System Integrator, Contractor, Supplier)
- Digital Forensics (i.e.: Audio, Video, Mobile)
- Maintenance & Support (i.e.: IT Support, Infra Management)
|
| | |
| | - Consulting Services (i.e.: Advisory, Research)
- Training & Education (i.e.: Awareness, Coaching)
- New Technology Security (i.e.: Artificial Intelligence, IoT, IIoT, Cloud, 5G)
- Business Continuity Management (i.e.: Crisis Management, Disaster Discovery)
- Maintenance & Support (i.e.: IT Support, Infra Management)
|
| | - Consulting Services (i.e.: Advisory, Research)
- Governance, Risk & Compliance (i.e.: Audit)
- Incident Handling (i.e.: Emergency Response)
- Security Risk Assessment (i.e.: Behavioural, Maturity)
- Managed Security Services (i.e.: SOC, Secure Hosting, Log Management, Threat Intelligence)
|
| | - Training & Education (i.e.: Awareness, Coaching)
- Distributor/Reseller (i.e.: System Integrator, Contractor, Supplier)
- Managed Security Services (i.e.: SOC, Secure Hosting, Log Management, Threat Intelligence)
- New Technology Security (i.e.: Artificial Intelligence, IoT, IIoT, Cloud, 5G)
- Data Security (i.e.: Big Data, Encryption, Sanitization, Leak Protection)
|
| | - Secure System Development (i.e.: Hardware, Software, Mobile Apps)
- New Technology Security (i.e.: Artificial Intelligence, IoT, IIoT, Cloud, 5G)
- Identity Management & Access Control (i.e.: Authentication, Biometrics)
|
| | - Training & Education (i.e.: Awareness, Coaching)
- Security Risk Assessment (i.e.: Behavioural, Maturity)
- Managed Security Services (i.e.: SOC, Secure Hosting, Log Management, Threat Intelligence)
- Business Continuity Management (i.e.: Crisis Management, Disaster Discovery)
|
| | |
| | - Distributor/Reseller (i.e.: System Integrator, Contractor, Supplier)
- Secure System Development (i.e.: Hardware, Software, Mobile Apps)
- New Technology Security (i.e.: Artificial Intelligence, IoT, IIoT, Cloud, 5G)
- Data Security (i.e.: Big Data, Encryption, Sanitization, Leak Protection)
- Maintenance & Support (i.e.: IT Support, Infra Management)
|
| | |
| | - Consulting Services (i.e.: Advisory, Research)
- Secure System Development (i.e.: Hardware, Software, Mobile Apps)
- Security Testing Services (i.e.: Penetration Test, VA, SPA)
- Data Security (i.e.: Big Data, Encryption, Sanitization, Leak Protection)
|
| | - Secure System Development (i.e.: Hardware, Software, Mobile Apps)
- Security Testing Services (i.e.: Penetration Test, VA, SPA)
|
| | |
| | - Consulting Services (i.e.: Advisory, Research)
- Governance, Risk & Compliance (i.e.: Audit)
- Training & Education (i.e.: Awareness, Coaching)
- Security Risk Assessment (i.e.: Behavioural, Maturity)
- Distributor/Reseller (i.e.: System Integrator, Contractor, Supplier)
- Secure System Development (i.e.: Hardware, Software, Mobile Apps)
- Security Testing Services (i.e.: Penetration Test, VA, SPA)
- Managed Security Services (i.e.: SOC, Secure Hosting, Log Management, Threat Intelligence)
- New Technology Security (i.e.: Artificial Intelligence, IoT, IIoT, Cloud, 5G)
- Standards & Certifications (i.e.: Common Criteria, ISMS, Lab)
- Others
|
| ELP International Group Sdn Bhd | - Training & Education (i.e.: Awareness, Coaching)
|
| Noble Forensic Technology PLT | - Consulting Services (i.e.: Advisory, Research)
- Training & Education (i.e.: Awareness, Coaching)
- Distributor/Reseller (i.e.: System Integrator, Contractor, Supplier)
- Security Testing Services (i.e.: Penetration Test, VA, SPA)
- Managed Security Services (i.e.: SOC, Secure Hosting, Log Management, Threat Intelligence)
- Identity Management & Access Control (i.e.: Authentication, Biometrics)
- Digital Forensics (i.e.: Audio, Video, Mobile)
- Maintenance & Support (i.e.: IT Support, Infra Management)
- Others
|
| | - Consulting Services (i.e.: Advisory, Research)
- Governance, Risk & Compliance (i.e.: Audit)
- Training & Education (i.e.: Awareness, Coaching)
- Incident Handling (i.e.: Emergency Response)
- Security Risk Assessment (i.e.: Behavioural, Maturity)
- Distributor/Reseller (i.e.: System Integrator, Contractor, Supplier)
- Security Testing Services (i.e.: Penetration Test, VA, SPA)
- Managed Security Services (i.e.: SOC, Secure Hosting, Log Management, Threat Intelligence)
- New Technology Security (i.e.: Artificial Intelligence, IoT, IIoT, Cloud, 5G)
- Data Security (i.e.: Big Data, Encryption, Sanitization, Leak Protection)
- Digital Forensics (i.e.: Audio, Video, Mobile)
- Business Continuity Management (i.e.: Crisis Management, Disaster Discovery)
- Standards & Certifications (i.e.: Common Criteria, ISMS, Lab)
|
| | - Consulting Services (i.e.: Advisory, Research)
- Training & Education (i.e.: Awareness, Coaching)
- Distributor/Reseller (i.e.: System Integrator, Contractor, Supplier)
- Secure System Development (i.e.: Hardware, Software, Mobile Apps)
- Security Testing Services (i.e.: Penetration Test, VA, SPA)
- Data Security (i.e.: Big Data, Encryption, Sanitization, Leak Protection)
- Identity Management & Access Control (i.e.: Authentication, Biometrics)
|
| BSMART System Solutions Sdn Bhd | - Distributor/Reseller (i.e.: System Integrator, Contractor, Supplier)
|
| | - Consulting Services (i.e.: Advisory, Research)
- Governance, Risk & Compliance (i.e.: Audit)
- Training & Education (i.e.: Awareness, Coaching)
- Security Risk Assessment (i.e.: Behavioural, Maturity)
- Distributor/Reseller (i.e.: System Integrator, Contractor, Supplier)
- Secure System Development (i.e.: Hardware, Software, Mobile Apps)
- Security Testing Services (i.e.: Penetration Test, VA, SPA)
- Managed Security Services (i.e.: SOC, Secure Hosting, Log Management, Threat Intelligence)
- New Technology Security (i.e.: Artificial Intelligence, IoT, IIoT, Cloud, 5G)
- Data Security (i.e.: Big Data, Encryption, Sanitization, Leak Protection)
- Identity Management & Access Control (i.e.: Authentication, Biometrics)
- Digital Forensics (i.e.: Audio, Video, Mobile)
- Business Continuity Management (i.e.: Crisis Management, Disaster Discovery)
- Standards & Certifications (i.e.: Common Criteria, ISMS, Lab)
- Maintenance & Support (i.e.: IT Support, Infra Management)
- Others
|
| KYROL Security Labs Sdn Bhd | - Consulting Services (i.e.: Advisory, Research)
- Governance, Risk & Compliance (i.e.: Audit)
- Training & Education (i.e.: Awareness, Coaching)
- Incident Handling (i.e.: Emergency Response)
- Security Risk Assessment (i.e.: Behavioural, Maturity)
- Distributor/Reseller (i.e.: System Integrator, Contractor, Supplier)
- Secure System Development (i.e.: Hardware, Software, Mobile Apps)
- Security Testing Services (i.e.: Penetration Test, VA, SPA)
- Managed Security Services (i.e.: SOC, Secure Hosting, Log Management, Threat Intelligence)
- New Technology Security (i.e.: Artificial Intelligence, IoT, IIoT, Cloud, 5G)
- Data Security (i.e.: Big Data, Encryption, Sanitization, Leak Protection)
- Identity Management & Access Control (i.e.: Authentication, Biometrics)
- Digital Forensics (i.e.: Audio, Video, Mobile)
- Business Continuity Management (i.e.: Crisis Management, Disaster Discovery)
- Standards & Certifications (i.e.: Common Criteria, ISMS, Lab)
- Maintenance & Support (i.e.: IT Support, Infra Management)
|
| | - Governance, Risk & Compliance (i.e.: Audit)
- Security Testing Services (i.e.: Penetration Test, VA, SPA
|
| | Consulting Services (i.e.: Advisory, Research) Governance, Risk & Compliance (i.e.: Audit) Training & Education (i.e.: Awareness, Coaching) Security Risk Assessment (i.e.: Behavioural, Maturity) Distributor/Reseller (i.e.: System Integrator, Contractor, Supplier) Secure System Development (i.e.: Hardware, Software, Mobile Apps) New Technology Security (i.e.: Artificial Intelligence, IoT, IIoT, Cloud, 5G) Data Security (i.e.: Big Data, Encryption, Sanitization, Leak Protection Standards & Certifications (i.e.: Common Criteria, ISMS, Lab) Maintenance & Support (i.e.: IT Support, Infra Management)
|
| | Consulting Services (i.e.: Advisory, Research) Governance, Risk & Compliance (i.e.: Audit) Training & Education (i.e.: Awareness, Coaching) Incident Handling (i.e.: Emergency Response) Security Risk Assessment (i.e.: Behavioural, Maturity) Distributor/Reseller (i.e.: System Integrator, Contractor, Supplier) Secure System Development (i.e.: Hardware, Software, Mobile Apps) Security Testing Services (i.e.: Penetration Test, VA, SPA) Managed Security Services (i.e.: SOC, Secure Hosting, Log Management, Threat Intelligence) New Technology Security (i.e.: Artificial Intelligence, IoT, IIoT, Cloud, 5G) Data Security (i.e.: Big Data, Encryption, Sanitization, Leak Protection) Identity Management & Access Control (i.e.: Authentication, Biometrics) Business Continuity Management (i.e.: Crisis Management, Disaster Discovery) Maintenance & Support (i.e.: IT Support, Infra Management) Others
|