D-ploy GmbH

D-ploy is an IT Engineering and Consulting Company with a wide portfolio of services and solutions suitable for globally as well as regionally operating companies. Our strength is in providing proven standard and individually tailored solutions helping our customers achieve their strategic and business goals. Our core competencies are operational IT Infrastructure services and consulting in the areas of Service Management, Program and Project Management as well as Quality Management.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

DATA SECURITY

CYBERMDX JOINS THE MICROSOFT INTELLIGENT SECURITY ASSOCIATION

CyberMDX | April 21, 2021

news image

CyberMDX, a leading healthcare cybersecurity provider that provides visibility and threat prevention for medical devices and clinical networks, announced today that it has joined the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors and managed security service providers that have integrated their security solutions with Microsoft to better defend against a wide range of threats. CyberMDX's leading Healthcare Security Suite has been integrated wi...

Read More

DATA BREACH REPORT: POPULAR DIGITAL WALLET APP KEY RING EXPOSES 14 MILLION USERS

securitymagazine | April 03, 2020

news image

Led by Noam Rotem and Ran Locar, vpnMentor’s research team of ethical hackers, recently discovered a data leak by the popular app Key Ring, that compromised the privacy and security of their 14 million users. Key Ring allows users to upload scans and photos of membership and loyalty cards onto a digital folder on one’s phone. However, many users also use it to store copies of IDs, driver licenses, credit cards, and more. A misconfigured Amazon Web Services (AWS) S3 bucket owned by th...

Read More

TIME IS RIGHT FOR UNIFIED SECURITY SOLUTIONS, FINDS CHECK POINT'S DIMENSIONAL RESEARCH SURVEY

Cisco | June 12, 2020

news image

Non-integrated point solutions make enterprise cyber security more challenging, thereby damaging confidence in security, according to a plurality of IT and security professionals. Adding multiple products from different suppliers simply adds more comple...

Read More

LORCA ANNOUNCES FOURTH AND LARGEST COHORT OF CYBERSECURITY INNOVATORS

Infosecurity | January 16, 2020

news image

The London Office for Rapid Cybersecurity Advancement (LORCA) has announced the 20 scale-ups selected to join its fourth cohort of cyber-innovators. The latest group is LORCA’s largest and most international yet – including companies from the UK, Israel, Spain, Switzerland, Denmark, Singapore and the US – using technologies such as automation and quantum to protect UK industry against the latest threats. LORCA is hosted and delivered by Plexal at Here East in London’s Que...

Read More
news image

DATA SECURITY

CYBERMDX JOINS THE MICROSOFT INTELLIGENT SECURITY ASSOCIATION

CyberMDX | April 21, 2021

CyberMDX, a leading healthcare cybersecurity provider that provides visibility and threat prevention for medical devices and clinical networks, announced today that it has joined the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors and managed security service providers that have integrated their security solutions with Microsoft to better defend against a wide range of threats. CyberMDX's leading Healthcare Security Suite has been integrated wi...

Read More
news image

DATA BREACH REPORT: POPULAR DIGITAL WALLET APP KEY RING EXPOSES 14 MILLION USERS

securitymagazine | April 03, 2020

Led by Noam Rotem and Ran Locar, vpnMentor’s research team of ethical hackers, recently discovered a data leak by the popular app Key Ring, that compromised the privacy and security of their 14 million users. Key Ring allows users to upload scans and photos of membership and loyalty cards onto a digital folder on one’s phone. However, many users also use it to store copies of IDs, driver licenses, credit cards, and more. A misconfigured Amazon Web Services (AWS) S3 bucket owned by th...

Read More
news image

TIME IS RIGHT FOR UNIFIED SECURITY SOLUTIONS, FINDS CHECK POINT'S DIMENSIONAL RESEARCH SURVEY

Cisco | June 12, 2020

Non-integrated point solutions make enterprise cyber security more challenging, thereby damaging confidence in security, according to a plurality of IT and security professionals. Adding multiple products from different suppliers simply adds more comple...

Read More
news image

LORCA ANNOUNCES FOURTH AND LARGEST COHORT OF CYBERSECURITY INNOVATORS

Infosecurity | January 16, 2020

The London Office for Rapid Cybersecurity Advancement (LORCA) has announced the 20 scale-ups selected to join its fourth cohort of cyber-innovators. The latest group is LORCA’s largest and most international yet – including companies from the UK, Israel, Spain, Switzerland, Denmark, Singapore and the US – using technologies such as automation and quantum to protect UK industry against the latest threats. LORCA is hosted and delivered by Plexal at Here East in London’s Que...

Read More