The Radar allows European cybersecurity SMEs to display their products and services in a competitive non-biased way, segmented by solution category. Designed to increase market transparency and provide visibility to the European cybersecurity industry, the Radar proved to be popular among European SMEs. Its success has led ECSO to enlarge the scope of the project with the development of a European Cybersecurity Market Registry the natural next step in ECSO’s quest to increase the visibility of European cybersecurity SMEs.

Introducing the latest European-based cybersecurity product vendors, service providers and consultancy offerings

The ECSO Cybersecurity Market Radar serves as a comprehensive visualisation tool, marking a significant step forward in ensuring the transparency of the European cybersecurity market and boosting the visibility of its deployment-ready cybersecurity solutions and capabilities. With more than 100 European cybersecurity companies, the 3rd ECSO Cybersecurity Market Radar release presents rich European cybersecurity industry landscape.

The Radar is based on a market-oriented taxonomy of cybersecurity capabilities, developed by the ECSO working groups, dealing with market analysis, investments, cybersecurity companies and regions. The ECSO Cybersecurity Market Radar taxonomy in high-resolution can be found [here].

5 designated capabilities – identify, protect, detect, respond, recover – present concrete competences and means to mitigate, resolve, monitor and analyse cyber-related threats. We invite you to have a look at a wide spectrum of cybersecurity products and services provided by European-based companies:

  IDENTIFY   – for the better organisational understanding of the IT infrastructure and cybersecurity readiness to manage cyber risks to individuals, systems, assets, data and capabilities [discover it here].

  PROTECT   – for appropriate safeguards to reduce the attack surface and to ensure the availability, integrity, confidentiality, auditability and performance of the critical IT services. Wide range of 'protect' capabilities are provided by large European cybersecurity companies [discover it here], as well as by small and medium enterprises (SMEs) [discover it here].

  DETECT   – for appropriate tools to identify the nature and the scope of cyber-attacks carried out on the entity [discover it here].

  RESPOND   – for appropriate measures to effectively mitigate the detected cybersecurity incidents [discover it here].

  RECOVER   – appropriate action plans to bounce back from cyber-attack and to restore any capabilities or services affected [discover it here].