Get updates to this list
You’re signing up to all partnering opportunity alerts for:
Please check your inbox
Thank you for verifying your email. We have sent you a confirmation email containing a 6 digit verification code to complete your subscription
You've successfully created a subscription
The search results below each have a summary which you may find useful
in determining if the opportunity is what you’re looking for.
The Japanese company is a cyber security software developer that is now approaching the EU market after successfully expanding in Japan and the US with their products.
The company offers seeds based R&D in Cyber... more
Companies that are sensitive to their confidential information and newly developed technologies should have reliable network security equipment to protect valuable information by taking good care of their network... more
The Korean SME established in 2004 has been a portal system development company based on global web agency. They are interested in web-based security technology, such as IoT security... more
chassis. Among such devices are wheelchairs or deckchairs designed to operate in difficult terrain and spatial conditions as well as a light carrier for security applications.
The platform consists of a vehicle... more
The volume of digital data is growing (estimation of 40 Zeta bytes by 2020) and at the same time the data management security has become more complex due to the backup policy and the legal compliance (some companies... more
documents security and authentication provides its own developed products in the area of electronic signature for secure and cost effective handling of electronic documents. The products are suited for any corporate,... more
A Slovak technological company specialised in the area of communication security has developed patented technology in the field of GSM (Global System for Mobile Communications) communication security.... more
To provide a safe communication environment, a Korean IT company specialized in network and security is offering P2P (Peer to Peer) communication protocol. With this protocol, IT companies can construct... more
The company was established in 2000 to provide a total solution for information security. The company developed Korea’s first Secure OS solution at its establishment. The company's three main business areas are... more
The company was established in 2008 to develop specialized malware detection/response solutions in the anti-virus centric security market. Eventually the company developed a product and provides the products to... more
prevention and management of potential disasters. Those in charge of coordinating the security will be able to minimize the risks currently taken due to a scarcity of available information, which in general is... more
may help in assessing the validity of third parties and third party transactions in order to protect the small, medium sized companies and to improve their international trade compliance and security.
A Polish company has been building innovative mobile applications since 2004 (as a part of another, mid-sized Polish security solutions vendor). In 2012, as a result of a spin-off, the company is working as an... more
in short period of time, reduction of the used raw materials.
The commercially available hologram technology is extremely complex, slow and unstable for manufacturing of thick or volume holograms.
The old technology for documents security... more
to aid diagnoses and promote wellbeing in healthcare and sports, and in providing intelligent textiles solutions for personal protective equipment and security. The materials and devices used for this therefore... more
business areas such as bio-diagnostics / healthcare / security / authentication services requiring high level security and long service time. The feasibility of HBC’s core technologies... more
A software development company from B&H founded in 2013 is specialized for customized, complex business solutions development based on Microsoft .NET technologies. It currently employs 17 experts working mainly with security... more
Authorities and organzisations with security tasks require wireless communication systems that guarantee a particularly high degree of reliability against unauthorized interception or even manipulation of transmitted... more
this technology could include security cameras, automotive cameras, medical and nursing care cameras and social infrastructure monitoring cameras.The technology could also be integrated in consumer products such... more
. The technology allows you to analyze the data and make predictions. Some of the analogs include international frameworks developed by transnational companies.
Applications: the public sector (voting, access control system, security... more