Cyber Security Services,Penetration Testing,Managed Security Services,Security Assessments,Cyber Threat Intelligence,Cyber Security Incident Response

Your Swiss Quality Cyber Security Partner Worldwide

Wizlynx mantains a global network with cybersecurity companies - premier technology and service providers that help us protect sensitive information and business assets of our customers. Our strategic business and technology partnerships allows us also to propose enterprise-level and industry-proven technology, best-in-class know-how, and experience that deliver the best resources and performance in the market today.

Business Partners

Certego is a company specialised in providing managed computer security services and to contrast Cyber Crime.

The in-depth competences and extensive experience in Incident Response, Security Intelligence and Malware Analysis merge with the passion and desire of the security analysts to be constantly updated on what is happening in the world of computer threats.

Information, People and the Unique Selling Proposition (USP) are the most valuable assets of a company. Therefore, it is essential that Information Security, Governance Risk and Compliance (GRC) is part of the company’s nature and business processes.

CISS is supporting you to address Information Security and GRC tailored to your company’s need. With the usage of the CISS ISMS SaaS solution and the managed control framework (covering ISO27001, ISO27002, ISO27005, SANS CSC, PCI DSS, GDPR etc.) CISS can apply a pragmatic and flexible approach to design, built or optimize your ISMS or GRC framework.

Located in Hamburg, the law firm WIRTSCHAFTSRAT Recht advises corporate and municipal clients on how to comply with European and German IT laws. Its highly specialized attorneys examine the security framework of critical industries, analyze its sufficiency from a legal perspective and recommend technical and organizational measures to keep pace with the latest regulatory updates. In addition, WIRTSCHAFTSRAT Recht analyses the trends in legislation and jurisdiction on cyber security standards. Based on its careful assessment of the legal landscape, the law firm maps out legal risks and develops affordable solutions to circumvent them. If necessary, WIRTSCHAFTSRAT Recht will also accompany its clients through investigations and proceedings; however, its primary objective is to prevent legal disputes related with cyber security concerns altogether.


We create digital solutions that merge technology and user needs. Always having the big picture in mind: We explore opportunities, we outline scenarios, we design and develop digital solutions, we enrich them with valuable content, we measure, we reflect, continuously evolve the solutions and ensure scalable operation.

Technology Partners

360inControl® is a new generation of an internal control system (ICS) consisting of Governance Risk & Compliance (GRC), Information Security Management (ISMS), Data Classification and Audit & Evaluation Management. Digitalization, centralization and sustainability are significantly promoted by the use of 360inControl® and silo generation is prevented. Employees are actively involved in the processing of measures/action items (CAPAs), which increases acceptance and promotes cooperation. 360inControl® is based on its own 'Control Library', which covers the requirements of international standards such as ISO27001, ISO27002, COBIT, GDPR, PCI and others. Company controls and control frameworks can easily be added as needed. In 2019 360inControl® won the "Solution Award 2019" of the CISO Alliance in Germany. You are welcome to try 360inControl free of charge.

AlienVault’s mission is to enable organizations with limited resources to accelerate and simplify their ability to detect and respond to the growing landscape of cyber threats. Alienvault’s Unified Security Management (USM) platform provides all of the essential security controls required for complete security visibility, and is designed to enable any IT or security practitioner to benefit from results on day one. Powered by threat intelligence from AlienVault Labs and the AlienVault Open Threat Exchange - the world’s largest crowd-sourced threat data network — AlienVault USM delivers a unified, simple and affordable solution for threat detection, incident response and compliance management.

Barracuda Networks, Inc. offers industry-leading, cloud-connected solutions designed to solve mainstream IT problems – efficiently and cost effectively – while maintaining a level of customer support and satisfaction second to none. Barracuda’s products span three distinct markets, including: 1) content security, 2) networking and application delivery, as well as 3) data storage, protection and disaster recovery, and increased productivity solutions. While Barracuda maintain a strong heritage in email and web security appliances, their award-winning portfolio includes more than a dozen purpose-built solutions that support literally every aspect of the network. Beyond traditional security measures, Barracuda’s best-of-breed security portfolio is designed to protect all threat vectors—email, web, network perimeters, mobile, remote access, and your users; this is known as Total Threat Protection. Barracuda provides organizations of all sizes with true end-to-end protection that can be deployed as physical, virtual, cloud, and hybrid form factors.

ESET offers security solutions for home users and corporate customers worldwide. It provides endpoint security solutions that integrates antimalware scanner that detects and disables known and unknown viruses, trojans, worms, adware, spyware, rootkits, and other Internet threats, as well as those present on flash drives, CDs, and DVDs. ESET's endpoint security solution also integrate a two-way firewall, antispam, and web access protection to eliminate various security threats.

ESET is available on a wide variety of Operating Systems such as Linux, Microsoft Windows, MacOS X, and Android.

F5 Networks, Inc., is a developer and provider of software defined application services. F5 Networks is engaged in the development, marketing and sale of application delivery networking products that optimize the security, performance and availability of network applications, servers and storage systems. F5's Traffic Management Operating System (TMOS) based offerings include software products for local and global traffic management, network and application security, access management, Web acceleration and various network and application services. These products are available as modules that can run individually or as part of an integrated solution on the Company's purpose-built BIG-IP appliances and VIPRION chassis-based hardware, or as software-only Virtual Editions. F5 Networks also offers distributed denial-of-service (DDoS) protection, application security and other application services by subscription on its cloud-based Silverline platform.

Imperva has a singular purpose: to defend your business-critical data and applications from cyber-attacks and internal threats. Imperva solutions enable you to discover assets and risks, and then protect your most valuable information—such as intellectual property, business plans, trade secrets, customer and employee information, and the day-to-day data that drives your business. Imperva also help you comply with the myriad of increasingly stringent data protection regulations and mandates, as well as enforce policies, entitlements and audit controls. Imperva is the only Leader in Gartner’s 2016 Magic Quadrant for Web Application Firewalls (WAF).

Imperva Incapsula is a cloud-based application delivery service that protects websites and increases their performance, improving the customer experience while safeguarding web applications and data from attack. Incapsula includes a web application firewall to thwart hacking attempts, DDoS mitigation to ensure attacks don’t impact online business assets, a content delivery network to optimize and accelerate web traffic, and a load balancer to maximize the potential of web environments.

Palo Alto Networks is the leading company in a new era of cybersecurity. Palo Alto Networks solutions protect the networks of thousands of large companies, government agencies and service providers against risks. In contrast to fragmented legacy solutions, the Palo Alto Networks security platform is capable of secure business operations. The solutions protect systems based on what is most important in today's dynamic IT environments: applications, users, and content.

The Palo Alto Networks security platform brings network, cloud and endpoint security to a common architecture. It integrates all major network security features, including advanced firewall, IDS / IPS, and URL filtering. Since these functions were integrated into the platform and shared important information across disciplines, Palo Alto Networks’ system ensures a much higher level of security than company-specific firewalls, UTMs, or targeted threat detection systems.

Qualys’ solutions help organizations with globally distributed data centers and IT infrastructures to identify their IT assets, collect and analyze large amounts of IT security data, discover and prioritize vulnerabilities, recommend remediation actions and verify the implementation of such actions. By deploying Qualys’ solutions, organizations can gain actionable security intelligence into potential vulnerabilities and malware in their IT infrastructures and enable their compliance with internal policies and external regulations. Delivered as a multi-tenant cloud platform, the QualysGuard integrated suite of solutions incorporates Qualys’ industry leading vulnerability management service, with a robust IT compliance solution, comprehensive web application scanning and malware detection services.

SyferLock offers an innovative software-based alternative to hard tokens, smart cards and other authentication solutions. SyferLock delivers two-factor and multi-factor authentication utilizing patented software-based grids to convert static passwords/PINs into device-less one-time passwords/PINs (OTPs), without the need for hardware tokens and without any dependency on a cell phone like SMS-based solutions.