The List of Cyber Security in Egypt

Looking for the Best Cyber Security in Egypt? Find the List of the Best Cyber Security in Egypt on Our Business Directory. Top Cyber Security in Egypt, Cyber Security Near Me.
Looking for the Best Cyber Security in Egypt? Find the List of the Best Cyber Security in Egypt on Our Business Directory. Top Cyber Security in Egypt, Cyber Security Near Me.
We found 10 companies

HAKTIV

6th District, 155 Emtedad Ramses, Namaa Building 5th floor, office S01, Nasr City, Cairo Governorate 11765, Cairo
HAKTIV is offering a comprehensive offensive security solution to tech-enabled businesses in the Middle East and Africa (MEA) region. Leveraging crowdsourced terminology, we are helping to bridge the ...
1

PENTIUM IT

Al Qahirah, Cairo
Pentium is an Information Technology (IT) company based in Cairo, Egypt. We specialize in providing comprehensive IT solutions to help our clients achieve their desired outcomes. Our team of experienc...
2

BugSwagger

289 أبو قير، الرياضة، سيدي جابر،, Alexandria Governorate, Alexandria
BugSwagger is a leading provider of penetration testing services that can help organizations protect their digital infrastructure from threats. Our advanced solutions are designed to simulate and anal...
3

WASS Technologies

X7FP+R3W, El-Mohandes Shawqi Abd El-Moneim, Ezbet Fahmy, El Basatin, Cairo Governorate 4234315, Cairo
6

Shieldfy

Al Iskandariyah, Alexandria
A group of passionate developers and security experts have come together to pursue a dream. They believe that everyone deserves the right to stay safe and access information without fear of being hack...

Cybrify

Al Qahirah, Cairo
Cybrify is an information security consulting firm that specializes in assessing information security web application vulnerabilities, performing penetration tests, and providing cyber security servic...

Solid Integrated Solutions

Al Qahirah, Cairo
SIS is striving to help businesses recognize the advantages of endpoint management by providing them with the ability to continuously control, observe, and safeguard their endpoints.
BACK TO TOP