Local Cybersecurity Companies
Impact: Tech Leadership
This initiative is under the Cybersecurity Industry Development Program (Hadatha) to support the expansion of local cybersecurity products and services locally, regionally, and internationally through marketing and promoting.
Procedures
1
Registration
Complete the registration form with the required data
2
Evaluation
Assessment of applications by relevant teams
3
Accreditation
Approval of applications by meeting technical and commercial criteria:
- Valid commercial registration certificate
- The product is technically ready and complete to be operated and tested
- The product must be produced or developed by the company or individual
📢Initiating Support and Promotion
*We would like to clarify that the website includes a list of Omani cybersecurity companies, and this does not constitute an endorsement or accreditation of those companies.
This company has been accredited under the Technology Service Providers Accreditation Program by the Ministry of Transport, Communications, and Information Technology to provide cybersecurity services.
Security Services
- Penetration Testing (Web Applications Testing - Infrastructure Testing)
- Technical Assessment (Web Applications Testing - Infrastructure Testing)
- Readiness Assessment (Audit and Maturity Evaluation - Policies and Procedures Assessment)
Contact
This company has been accredited under the Technology Service Providers Accreditation Program by the Ministry of Transport, Communications, and Information Technology to provide cybersecurity services.
Security Services
- Penetration Testing (Web Application Testing - Infrastructure Testing) Technical Assessment (Web Application Testing - Infrastructure Testing) Readiness Assessment (ISO 27001 Compliance Assessment - Risk Assessment - Audit and Maturity Evaluation - Policies and Procedures Assessment)
Contact
This company has been accredited under the Technology Service Providers Accreditation Program by the Ministry of Transport, Communications, and Information Technology to provide cybersecurity services.
Security Services
Penetration Testing (Web Application Testing - Infrastructure Testing) Technical Assessment (Web Application Testing - Infrastructure Testing - Firewall Configuration Review)
Local Products
Nebula:
It is Omans first Virtual Data Center (VDC), enabling companies to set up their data centers quickly and at low cost, while fully complying with local data regulations. Nebula offers flexible options and significantly reduces operational costs for businesses.
Esign:
It is an electronic signature and document management solution developed locally in Oman. This solution provides a secure and efficient way to manage and electronically sign documents, reducing the need for paper and improving organizational efficiency.
Contact
This company has been accredited under the Technology Service Providers Accreditation Program by the Ministry of Transport, Communications, and Information Technology to provide cybersecurity services.
Security Services
- Penetration Testing (Web Application Testing - Infrastructure Testing)
- Technical Assessment (Infrastructure Testing - Firewall Configuration Review)
- Configuration Review (Infrastructure)
- Script Review (Infrastructure)
- Enterprise Architecture Review (Infrastructure)
Local Products
Archon:
An internal knowledge platform built on LLMs and organization internal documentation datasets with data sovereignty in mind that is extended to be hosted on-premises and in an air-gapped manner. The platform uses myriad modules aiming to reduce the load on seniors and increase productivity among employees while preventing any critical data from leakage into public domain solutions such as Phind, Preplexity, ChatGPT or Gemini.
Hades:
A Zero-day delivery platform developed for the sake of assessing clients' security solution postures and providing them with the needed hardening techniques to circumvent these zero-day payloads.
Project Mimir:
An AI protection layer against Adversarial Deep learning noise attacks, this layer acts as an input sanitization layer optimized by our quantum-based algorithm.
Al'Razi:
This engine generates remediations based on the client's environment feeds delivered through the data stream, by producing the required configuration code and steps to plug the security gap internally.
Eye of Horus:
The platform acts as a medium between multiple cybersecurity solutions and generates responses/takes actions on found security threats/vulnerabilities delivering near real-time vulnerability identification, intelligent remediation, and detailed reporting.
Contact
This company has been accredited under the Technology Service Providers Accreditation Program by the Ministry of Transport, Communications, and Information Technology to provide cybersecurity services.
Security Services
- Penetration Testing (Web Application Testing - Infrastructure Testing)
- Technical Assessment (Infrastructure Testing - Web Application Testing)
- Configuration Review (Web Applications)
- Code Review (Web Applications - Infrastructure)
- Enterprise Architecture Review (Web Applications)
- Readiness Assessment (ISO 27001 Standard Evaluation - Risk Assessment - Audit and Maturity Evaluation - Policy and Procedure Assessment)
Contact
This company has been accredited under the Technology Service Providers Accreditation Program by the Ministry of Transport, Communications, and Information Technology to provide cybersecurity services.
Security Services
- Penetration Testing (Web Application Testing - Infrastructure Testing)
- Technical Assessment (Infrastructure Testing - Web Application Testing - Firewall Configuration Review)
- Configuration Review (Infrastructure)
- Code Review (Infrastructure)
- Enterprise Architecture Review (Infrastructure)
- Readiness Assessment (Audit and Maturity Evaluation - Policy and Procedure Assessment)
Contact
- 97041080
- tenders@intertechoman.com
This company has been accredited under the Technology Service Providers Accreditation Program by the Ministry of Transport, Communications, and Information Technology to provide cybersecurity services.
Security Services
- Penetration Testing (Web Application Testing - Infrastructure Testing)
- Technical Assessment (Infrastructure Testing - Web Application Testing - Firewall Configuration Review)
Contact
- This company has been accredited under the Technology Service Providers Accreditation Program by the Ministry of Transport, Communications, and Information Technology to provide cybersecurity services.
- Security Services
- Penetration Testing (Web Application Testing - Infrastructure Testing)
- Technical Assessment (Web Application Testing - Infrastructure Testing - Firewall Configuration Review)
- Configuration Review (Infrastructure)
- Script Review (Infrastructure)
- Enterprise Architecture Review (Infrastructure)
- Readiness Assessment (Audit and Maturity Assessment - Policy and Procedure Evaluation)
Contact
This company has been accredited in the Technology Service Providers Accreditation Program by the Ministry of Transport, Communications, and Information Technology to provide cybersecurity services.
Security Services
- Penetration tests
- Technical evaluation
- Infrastructure tests
- Reviewing firewall settings
- Code review
- Review of institutional design
- Readiness Assessment: ISO 27001 Standards Assessment - Risk Assessment - Audit and Maturity Evaluation
- Policy and procedure assessments
Contact
This company has been accredited in the Technology Service Providers Accreditation Program by the Ministry of Transport, Communications, and Information Technology to provide cybersecurity services.
Security Services
- Penetration tests
- Technical evaluation
- Infrastructure tests
- Reviewing firewall settings
- Code review
- Review of institutional design
- Readiness Assessment: ISO 27001 Standards Assessment - Risk Assessment - Audit and Maturity Evaluation
- Policy and procedures assessments
Contact
- 92833363
- info@highefficiency.net
Power DEMARC is a platform specialized in protecting email and domains from impersonation and breaches that occur via email. The idea is simply that we help companies protect their domain so that no one can use the company's name to send fake emails in its name. We help institutions implement email protection standards such as DMARC, SPF, and DKIM in an easy way, and we provide them with clear reports showing if any entity is trying to impersonate their domain or use it incorrectly. The platform also helps improve email delivery to customers without going into spam, while protecting the company's reputation and reducing the risks of phishing attacks. Many companies and banks around the world use PowerDMARC to protect their domains and comply with cybersecurity requirements.
Security Services
- Email Protection and Identity Verification
- Compliance with Security Standards
- Managed Services
- Training and Awareness
Local Products
Power DMARC :
It is a dedicated system designed to simplify the process for other organizations by managing and monitoring their email authentication requirements.
Contact
Iknaan Technology Company is the first accredited company in the Sultanate of Oman specializing in innovative and advanced cybersecurity solutions, particularly in the field of encryption. The company's main product is research and development in cybersecurity.
Local Products:
EKNAN SPN NETWORK ENCRYPTOR An Omani encryption engine at the chip level, adhering to international standards ISO270001, NIST, FIPs.
This product addresses existing market vulnerabilities while offering features that enhance efficiency and reduce operating costs.
Contact
- 97726606
- moosa@eknan.com
The Arab Center for Engineering Equipment and Services was established in March 1997 in the capital, Muscat, Sultanate of Oman. Since then, we have strengthened the markets of information technology, telecommunications, cybersecurity, and engineering services thru the best solutions and unique innovations, thanks to a team of experts and specialists who have successfully completed projects, in addition to providing supporting services that exceed customer expectations.
Security Services
- Information networks, risk assessment, and cybersecurity solutions. Information systems and secure digital transformation.
- Applications, metaverse, and virtual and augmented reality.
- Creative solutions and specialized technical training.
Local Products
Virtual Reality Platform for Cybersecurity Training and Breach Response:
A Virtual Reality platform for cybersecurity training and breach response. Featuring a large number of scenarios: multilingual with 165 scenarios covering a wide range of advanced cyber-attacks and modern tactics. This extensive variety provides a dynamic and effective learning experience, allowing trainees to continuously face new challenges.
Contact
A specialized firm providing comprehensive services and solutions to protect systems, networks, and digital information from cyber threats.
Security Services
- Consultations in Information Technology and Cybersecurity
- Risk Assessment, Vulnerability Management, Threat Monitoring, and Penetration Testing
- Design and Implementation of Security Solutions
- Helping clients comply with international and local cybersecurity standards
Contact
- 99112233
- ahmed.junaibi@webware.om
- The company provides consulting services in cybersecurity and information technology and offers the Shorkom platform to connect experts and companies with service seekers.
Security Services
Services in cybersecurity, business development, governance, compliance, and risk management, in addition to artificial intelligence and data analytics. Experts can provide a wide range of solutions and diverse consultations.
Local Products
Shorkom Platform :
A platform that connects service and consulting providers with service seekers, including individuals and companies. The target sectors are large enterprises, small and medium-sized businesses in the IT sector, housing sector, trade sector, and business development.
Contact
- 79996165
- info@shorkom.om
- An Omani company specialized in providing cybersecurity programs and awareness. It also offers security assessment services for organizations and their internal and external applications.
Security Services
- Innovative Awareness Program in Cybersecurity
- Training Courses (Ethical Hacking and Internal Network Assessment, Website Assessment, Windows Exploitation Level 1 Vulnerability Detection)
- Security Assessment for Internal Networks and Websites
Contact
Tech Trends offers high-quality services thru highly skilled technical consultants, providing a level of flexibility that ensures smooth project execution.
Security Services
Aman Platform Cybersecurity Training Preparing & Managing Cybersecurity CTF Events
Contact
The integrated platform for practical training in cybersecurity — enables the creation and hosting of customized CTF competitions, labs, networks, virtual machines, and comprehensive training programs.
CyberTask provides trainers and content creators with everything they need to deliver realistic cyber training experiences with ease.
Security Services
Cyber task is a clouding platform dedicated to build, host and manage security labs, trainings, courses and its related resources such as virtual machines (they support most Windows & Linux versions), contents, files, and exercises. As a trainer, cyber task is the home to assemble all valuable dispersed courses or labs.
Contact
A human-centered cybersecurity platform dedicated to protecting individuals wherever it matters most at home, at work, and thru various aspects of their lives.
Cybersecurity Services:
- Awareness Lab
- The market
- Verify the link, email, and message
- Checking if the identity has been leaked
- Checking social media
- Recovering lost data
- Home security services and consultations
- Cybersecurity personal guard
Contact
Bug Bounty LLC LLC M, founded in 2022, operates a leading platform in the field of cybersecurity. We specialize in vulnerability discovery reward programs, where we provide secure services for researchers and connect them with client needs.
Security Services
Defensive Services
- Configuration Security Review
- Application Security Design and Architecture Review
- Network Architecture Security Review
- Source Code Review (SAST and DAST)
- Vulnerability Fixing
- CIS Benchmark Compliance
Offensive Services
- Internal Vulnerability Assessment
- Internal Penetration Testing
- Wireless Network Testing
- Phishing Simulation
- Physical Hacking & Force Entry
Local Products
BugBounty platform:
The Bug Hunter bounty platform is the first of its kind in the Sultanate of Oman. It connects cybersecurity researchers with companies, offering financial rewards for each vulnerability discovered in websites registered on the platform. The amount of the reward varies based on the severity of the vulnerability.
Contact
A comprehensive suite of enterprise solutions that address IT operations, business processes, automation, and compliance — all delivered with local support and expertise.
Cybersecurity services:
- IT Service Management (ITSM).
- IT Operations Management (ITOM).
- Identity and Access Management (IAM).
- Unified Endpoint Management (UEM).
- Security Information and Event Management (SIEM).
- Asset management.
- Preparing the organization to comply with local data protection standards (PDPL) and global standards.
- Integrated services for end-to-end data transformation, including Business Intelligence (BI), data infrastructure, and Machine Learning.
If you are an innovator, or a freelancer, you can register for the initiative to support and promote local cybersecurity products and services.
If you are the owner of a local cybersecurity company, you can register for the initiative to support and promote local cybersecurity products and services.
Related Initiatives
Discover NowHadatha Center
Start Date: 31 October 2024
End Date: 01 January 2040
Impact: Tech Leadership
Global Cybersecurity Industry Development Watch Center
Start Date: 28 October 2024
Impact: Cyber Awareness
National Digital Forensics Lab
Impact: Tech Leadership
Digital Trust
Impact: Tech Security