Truesec | Company Profile
Contact Information
Industry & Market
Company Metrics
Funding Information
Headcount Distribution
By Department
Department Breakdown
Technology Stack
Analytics & Tracking
Social & Marketing
Video & Media
Email & Communication
Keywords & Focus Areas
Truesec
Overview
Truesec is an international cybersecurity company based in Stockholm, Sweden, founded in 2005. With over 300 specialists across Sweden, Denmark, Finland, and Germany, it offers a wide range of cybersecurity services, including incident response, IT infrastructure security, secure development, and threat intelligence. The company focuses on preventing breaches and minimizing their impact through a balanced security approach.
Services include Managed Detection and Response (MDR) for 24/7 monitoring, a Managed Microsoft XDR SOC Service, penetration testing, and red teaming to enhance proactive security. Its cybersecurity platform integrates expert tools and services for comprehensive protection and risk management. Emphasis is also placed on human threat intelligence and training with workshops and support for managing risks during international travel and events, serving a diverse clientele, particularly in the Nordic region.
Basic Information
| Industry | computer & network security |
|---|---|
| Founded | 2005 |
| Revenue | 35M |
| Headquarters | 18 Luntmakargatan, 111 37 Stockholm, Stockholm County, Sweden |
| Languages | English |
| Parent Organization | IK Partners |
| Alexa Ranking | 831436 |
Contact Details
- Phone: +46 8 10 00 10
- Website: truesec.com
- LinkedIn: linkedin.com/company/truesec
Key Focus Areas & Initiatives
- IT security
- Secure development
- IT infrastructure
- Workshops in IT security
- Infrastructure
- Consultation in IT security
- Hands-on labs
- Trainings
- Seminars in IT security
- Penetration testing
- Threat intelligence
- Security posture
- Cloud security
- Cyber defense
- Zero trust
- Threat hunting tools
- Cybersecurity risk management
- Security monitoring
- Manufacturing
- Cyber attack mitigation
- Cyber threat detection tools
- Cybersecurity platform
- Government
- Incident response automation
- Threat hunting
- Risk management
- Cyber breach management
- Cybersecurity
- Cyber incident management
- Cloud security solutions
- Incident response services
- Cybersecurity innovation hub
- Cyber attack prevention strategies
- Cyber threat actor tracking
- Security consulting
- Cybersecurity strategy
- Security automation tools
- B2B
- Cybersecurity threat hunting techniques
- Cyber threat hunting
- Cyber threat intelligence center
- Vulnerability management
- Cyber threat intelligence platform
- SOC as a Service
- Cyber threat detection software
- Services
- Vulnerability assessment
- Cyber attack response
- Cybersecurity analytics
- Cybersecurity training
- Cybersecurity for government agencies
- Cyber risk management
- Cyber threat intelligence
- Network security
- Cybersecurity threat intelligence feeds
- Cybersecurity threat analysis
- Cybersecurity consulting services
- Cybersecurity consulting
- Cybersecurity threat hunting
- Cyber resilience building
- Nordic cybersecurity
- Cybersecurity for critical infrastructure
- Cyber threat detection
- Cyber threat mitigation
- Cyber attack simulation exercises
- Cybersecurity threat analysis reports
- Managed detection and response
- Cyber threat analysis
- Cybersecurity incident management
- Financial services
- Cybersecurity monitoring
- Incident response team
- Security automation
- Cybersecurity services
- Security operations center
- Cyber attack response toolkit
- Cybersecurity threat landscape
- Security incident response
- Cybersecurity threat mitigation strategies
- Cyber resilience
- Cybersecurity knowledge sharing
- Information technology and services
- Computer systems design and related services
- Cybersecurity platform integration
- Cybersecurity solutions
- Vulnerability management tools
- Cyber risk assessment
- Cybersecurity for financial services
- Cybersecurity expertise
- Consulting
- Cyber attack prevention
- Cybersecurity compliance
- Security operations
- Cybersecurity incident response planning
- Incident response
- Cyber threat detection AI
- Cyber attack simulation
- Compliance
- Digital forensics
- Identity access management
- Security compliance
- Red team exercises
- Advisory services
- Security vetting
- Endpoint protection
- Cloud-native security
- Data breach response
- Security assessments
- RAT detection
- Social engineering
- Human threat intelligence
- Penetration testing services
- Early warning systems
- Users access controls
- Tactical attack simulations
- Application security measures
- GDPR compliance
- Audit and compliance
- Security improvements
- Threat prediction
- SIEM solutions
- EPP solutions
- Digital security strategies
- 24/7 monitoring
- Enterprise security management
- Security incident management
- Threat actor profiles
- Malware detection
- Cybersecurity workshops
- Attack mitigation strategies
- Security technology integration
- Finance
- Computer & network security
- Information technology & services
- Mechanical or industrial engineering
Technologies Used
- AI
- Adobe Media Optimizer
- Cedexis Radar
- DoubleClick
- DoubleClick Conversion
- Facebook Custom Audiences
- Facebook Login (Connect)
- Facebook Widget
- Google Dynamic Remarketing
- Google Tag Manager
- Hubspot
- IoT
- Leadfeeder
- Linkedin Marketing Solutions
- MailJet
- Mobile Friendly
- Outlook
- Ruby On Rails
- Shutterstock
- Twitter Advertising
- Vercel
- Vimeo
- WP Engine
- WordPress.org
- YouTube
- Zscaler