Cybersecurity Company Directory
Get listed on the Canadian Cybersecurity Network Website (note only business members will have fields with a BM notation added to the website.
Your name - not part of data set
*
First Name
Last Name
Email (company) - not part of data set
*
example@example.com
Title - not part of data set
*
Company name
*
Country of origin
*
Province or State
*
Website (BM)
*
Add logo (BM)
Browse Files
Cancel
of
Linkedin Company Site (BM)
Company Description
*
Cyber categories (BM)
*
Type of cyber product or service (BM)
*
Application Control
Application Security Testing
Authentication (User Authentication, Biometric Authentication and PKI)
Automotive Cyber Security
Behavior Analytics (User and Entity)
Big Data Security
Browser Security (Secure Virtual Browser and Remote Browser)
Cloud Access Security Broker
Cloud Security
Compliance Management
Container Security
Cyber Maneuver (Network Masking)
Cyber Threat Hunting
Data Discovery
Data Loss (Leakage) Prevention (DLP)
Data Masking
Data Security
Data-at-Rest Encryption
Data-in-Motion/Transit (Network) Encryption and VPN
Database Security
DDoS Protection
Deception-Based Security
Digital Forensic Investigation and Computer Forensics
Digital Rights Management
Digital Risk Monitoring
DPO
Embedded Security
Endpoint Protection and Anti-virus
Endpoint Threat Detection and Response
File Content Security
Firewall Configuration and Management
Fraud Prevention
Governance/Compliance Management
Hypervisor Security
Identity and Access Management
Identity Theft Detection
Industrial Security (ICS/SCADA Security)
Internet of Things (IoT) Security
Intrusion Prevention Systems (and Intrusion Detection Systems)
Malware Detection and Analysis
Managed Security Service Providers
Messaging Security
Mobile Data Protection
Mobile Device Management
Network Access Control
Network Behavior Analysis and Anomaly Detection
Network Firewall (includes Next Generation Firewalls)
Network Monitoring and Forensics
Password Manager
Patch Configuration and Management
Penetration Testing
Pervasive Trust Services
Phish Testing
Risk and Compliance Management
Risk and Vulnerability Assessment
Secure File Transfer
Secure Web Gateway
Security Configuration Management
Security Incident Management and Response
Security Information and Event Management (and Log Management)
Security Operations Automation and Orchestration
Security Ratings
Security Training Software
Specialized Threat Analysis and Protection
SSL and Digital Certificate Authority and Management
Threat Intelligence and Signature Feeds
Transport Access Control
Trusted Computing, Cross Domain Security and Multi Level Security
Unified Threat Management
vCISO
Vulnerability Assessment
Web Application Firewall
Wireless Intrusion Detection System
Phone number (BM)
Number of employees
*
HQ Address (BM)
Business email (BM)
Established date
-
Month
-
Day
Year
Date
Contact type
Submit
Should be Empty: