Loading
Data Protection Consultancy
We offer data protection consultancy and gap analysis services, this allows your organisation to see exactly where you are falling short with your GDPR complience and offers not only an overview but a …
Data Remediation

Data Remediation

02 Aug 2022
Surgically and rapidly recover your apps, files or objects while avoiding malware reinfection
Data Resilience

Data Resilience

02 Aug 2022
Secure your data from insider threats or ransomware with air-gapped, immutable, access-controlled backups
Deepfake Audio Detection
Detects voice cloning and synthetic speech using voice biometrics, spectral analysis, and AI-based anomaly detection, ensuring audio authenticity.
Deepfake Image Detection
Identified tampered or AI-generated images using facial extraction, texture analysis, and forensic image analysis to detect synthetic manipulations.
Deepfake Video Detection
Analyses frame-level inconsistencies, facial movements, and temporal artifacts to identify manipulated (face-swapped) or AI-generated video content.
DevOps Secrets Management
This powerful extension of Sectona’s PAM enables IT security teams to secure the secrets of users that practice DevOps to access applications and services.
Digital Forensics and Incident Response
Our team work with yours to make sure threats are quickly contained and eradicated, allowing you to recover & learn from the incident, getting back to work fast, with minimal disruption to your organi …
Dot
The first step in effectively identifying potential cyber threats of your modern and legacy operational infrastructure. Identify OT Assets Discover Vulnerabilities Understand and Reduce Cyber Risk Bui …
e2e-assure app for Microsoft Teams
When detecting and responding to potential cyber-attacks, speed is of the essence. Teams are often geographically distant, working remotely and even on mobile devices. CISOs, board members and other c …
283 Results