Organizations in Cyber Security
Name | Industry | Address | |
---|---|---|---|
Meta Networks Meta Networks is rebuilding the enterprise WAN for the cloud age, with a new paradigm that is secure, simple and cloud-native. |
Computer, Cyber Security, Information Technology, Network Security | Tel Aviv, Tel Aviv, Israel | |
Spaceit Spaceit develops an end-to-end infrastructure for satellite operations |
Aerospace, Cyber Security, Information and Communications Technology (ICT), Internet of Things, Satellite Communication, Software, Software Engineering | Tartu, Tartumaa, Estonia | |
Tophant Tophant is a innovative Internet security service provider in China. |
Cyber Security, Internet | Shanghai, Shanghai, China | |
Trend Micro Trend Micro, a global technology leader, helps make the world safe for exchanging digital information with its innovative security platform. TYO:4704 |
Cloud Security, Cyber Security, Security, Virtualization | Tokyo, Tokyo, Japan | |
LogSentinel LogSentinel's mission is to help organizations improve their security posture by leveraging the latest technologies like blockchain and AI. |
Cloud Data Services, Compliance, Cyber Security, Database, Developer Tools, Fraud Detection, Information Technology, SaaS, Software | Naarden, Noord-Holland, The Netherlands | |
Permiso Security Permiso Security delivers a unique identity-based approach cloud detection & response to your cloud infrastructure |
Cloud Infrastructure, Cloud Security, Cyber Security | Palo Alto, California, United States | |
Baffin Bay Networks Baffin Bay Networks is a cybersecurity company that delivers cloud-based security platform for network and application attacks prevention. |
Cyber Security, Software | Stockholm, Stockholms Lan, Sweden | |
ExtraHop Networks ExtraHop helps organizations to stop advanced threats with security that canโt be undermined, outsmarted, or compromised. |
Analytics, Cyber Security, Enterprise Software, IT Management, Network Security, Software | Seattle, Washington, United States | |
RapidSec RapidSec offers a software-as-a-service platform designed to provide rapid web security in a self-service manner. |
Cyber Security, Information Technology, SaaS, Software | Tel Aviv, Tel Aviv, Israel | |
Illusive Illusive is a defense to eliminate attacker pathways that uses deception for detection of lateral movement of APTs, ransomware & threats. |
Computer, Cyber Security, Network Security, Software | Tel Aviv-yafo, Tel Aviv, Israel | |
Wynyard Group Wynyard Group is a market leader in high consequence Crime Fighting, used by Law Enforcement and National Security Agencies. NZE:WYN |
Analytics, Cyber Security | Kowloon City, Kowloon, Hong Kong | |
Chainvine Next Generation Enterprise Systems / Identity Access Management (IAM) / Technology Providers Blockchain |
Asset Management, Blockchain, Compliance, Cyber Security, Database, Enterprise Software, Intelligent Systems, Internet of Things, Software, Supply Chain Management | London, England, United Kingdom | |
Datacloak Datacloak is an integrated solution for the core needs of data security and privacy protection for medium and large enterprises. |
Cyber Security, Information Technology, Security, Software | Shenzhen, Guangdong, China | |
Loch Technologies Loch offers actionable intelligence on all 5G cellular and wireless IoT devices to improve security of orgaizations. |
Cyber Security, Security, Telecommunications | Emeryville, California, United States | |
Cymatic.io In under 20 minutes, Cymatic delivers where traditional and next-gen WAFs fall short without high costs, complexity, or compliance hiccups. |
Cloud Security, Cyber Security, Information Technology, Software | Raleigh, North Carolina, United States | |
Encode Enorasys Security Analytics enables continuous cyber situational awareness to address advanced persistent threats (APTs). |
Analytics, Cyber Security, Predictive Analytics, Security, Software | London, England, United Kingdom | |
Segasec Segasec is a cybersecurity company aiming to protect organizations from phishing, pharming, business email compromise and ransomware |
Cyber Security, Fraud Detection, Information Technology, Security, Software | Tel Aviv, Tel Aviv, Israel | |
Virgil Security Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users. |
Cloud Security, Cyber Security, Developer APIs, Developer Platform, Developer Tools, Internet of Things, Network Security, Software | Manassas, Virginia, United States | |
TrustElevate Trust Elevate solves the problem of age verification and parental consent for young adults and children in online transactions. |
Banking, Cyber Security, Information Technology, Software | London, England, United Kingdom | |
Enclave Networks Connect all your computers, servers, cloud instances and containers across any infrastructure with effortless Zero Trust Network Access. |
Cyber Security, Information Technology, Network Security, Security | Newport, Newport, United Kingdom | |
Apozy Apozy creates Airlock, a Browser Endpoint Detection and Response platform that fills the gap in endpoint protection. |
Cloud Security, Cyber Security, Enterprise Software, Information Technology, SaaS, Security | San Francisco, California, United States | |
ShieldSquare ShieldSquare helps online portals to protect against web scraping by bots run by competitors and un-authorized 3rd parties. |
Analytics, Cyber Security, Information Technology, Internet, SaaS, Software | Bangalore, Karnataka, India | |
Kryptnostic Kryptnostic web services platform enables end-to-end encrypted processing of data in the cloud. |
Cloud Computing, Cloud Security, Cyber Security, Enterprise Software, Security | Redwood City, California, United States | |
SecureSet SecureSet is a premier educational resource for launching or accelerating a cybersecurity career. |
Cyber Security, Education, Network Security | Denver, Colorado, United States | |
Salvador Technologies Salvador Technologies provides the worldโs fastest technology to recover from cyber-attacks/IT Failures. |
Cyber Security, Information Technology, Security | Rehovot, HaMerkaz, Israel | |
Lantern Lantern provides user behavior monitoring for modern product teams. |
Analytics, Cyber Security, Information Technology, Network Security, Security | San Francisco, California, United States | |
Prelude Institute Prelude Institute is a new form of higher education that focuses on helping transition people into the new labor market. |
Consumer Software, Cyber Security, Education, Information Technology | Manchester, New Hampshire, United States | |
Timus Networks, Inc. Timus Networks is a platform that develops technologies to build and secure the modern workplace. |
Cloud Security, Cyber Security, Network Security | Delaware City, Delaware, United States | |
Think|Stack Think|Stack expertise in cloud management, network segmentation, threat management, IT infrastructure, cybersecurity & consulting services. |
Consulting, Cyber Security, IT Infrastructure | Baltimore, Maryland, United States | |
CTM360 CTM360ยฎ is a Digital Risk Protection platform powered by EDX Labs |
Computer, Cyber Security, Information Technology, Risk Management, Software | Manama, Al Manamah, Bahrain | |
Monuv Monuv is a Brazilian technology company, present since 2010, bringing a cloud recording solution for security videos. |
B2B, Cyber Security, Network Security, SaaS, Security | Sรฃo Paulo, Sao Paulo, Brazil | |
SIRP Risk-Based Security Orchestration, Automation & Response (SOAR) Platform |
Cyber Security, Network Security, Security, Software | London, England, United Kingdom | |
Avertro SaaS Cyber Management Decision System (MDS) helping organisations manage, measure and report on their cybersecurity performance |
Cyber Security, Information Technology, SaaS, Software | Sydney, New South Wales, Australia | |
Iothic Iothic provides IoT end-to-end systems with post-quantum resistant security and a full interoperability communication platform. |
Cyber Security, Information Technology, Internet, Internet of Things, Software | Oxford, Oxfordshire, United Kingdom | |
Qylur Intelligent Systems Qylur is an intelligent systems company using its IIoT and AI platforms to transform entry security and guest experience for public venues. |
Artificial Intelligence, Cyber Security, Intelligent Systems, Machine Learning, Security, Software | Palo Alto, California, United States | |
Sath Sath provides managed IT, build identities, software development, integrations, cyber security compliance, and access management services. |
Compliance, Cyber Security, Identity Management, Information Technology | Schaumburg, Illinois, United States | |
Lupovis Lupovis is a Glasgow-based company that specializes in helping its customers protect their business-critical network assets. |
Cyber Security | Glasgow, Glasgow City, United Kingdom | |
PeerNova PeerNovaโs mission is to empower firms to make confident and timely decisions using high-quality data. |
Analytics, Big Data, Blockchain, Cyber Security, FinTech, Privacy, Software | San Jose, California, United States | |
Pr0ph3cy Pr0ph3cy offers IT, network, and cybersecurity solutions such as security by design and cyber protection of mobility. |
Cyber Security, Network Security, Software | Guyancourt, Ile-de-France, France | |
Beauceron Security Cybersecurity start-up with a platform for measuring, managing and monitoring holistic cyber risk. |
Cyber Security, Information Technology, Risk Management | Fredericton, New Brunswick, Canada | |
Enigmedia Enigmedia develops technological solutions that allow the encryption of information in real-time. |
Cyber Security, Security, Software | San Sebastian, Pais Vasco, Spain | |
Escape Escape automatically secures GraphQL APIs during the development cycle. |
Cyber Security, Developer Tools, SaaS, Software | Paris, Ile-de-France, France | |
Exeon Analytics Exeon is a Swiss cyber security company and a market leader in AI-driven security analytics. |
Analytics, Cyber Security, Information Technology, Network Security, Software | Zรผrich, Zurich, Switzerland | |
Paygilant Frictionless Digital Banking & Payments Fraud prevention |
Banking, Cyber Security, E-Commerce, FinTech, Fraud Detection, Mobile, Mobile Payments | Ramat Gan, Tel Aviv, Israel | |
River Security River Security focuses on providing the industry's cutting edge Internet dynamic application security solution. |
Cyber Security, Information Technology, Network Security | Shanghai, Shanghai, China | |
Kenna Security Kenna is a SaaS risk and vulnerability intelligence platform that accurately measures risk and prioritizes remediation efforts. |
Cyber Security, SaaS, Security, Software | San Francisco, California, United States | |
Stamus Networks Stamus Networks is a provider of high-performance network-based threat detection and hunting systems. |
Big Data, Cyber Security, Information Technology, Intrusion Detection, Network Security | Indianapolis, Indiana, United States | |
Root9B R9B is a global cybersecurity leader founded on the principles of technical innovation, tailored solutions and professional excellence.โ |
Cyber Security, Information Services, Information Technology | Colorado Springs, Colorado, United States | |
Ionic Security Ionic Security, a data security platform, provides access control, intellectual property monitoring, data encryption, and policy management. |
Cyber Security, Information Technology, Intellectual Property, Security | Atlanta, Georgia, United States | |
Secucloud Secucloud is a service provider of cloud-based IT security, operating worldwide. |
Cloud Computing, Cloud Security, Cyber Security, Mobile, Network Security | Hamburg, Hamburg, Germany | |
Lacoon Mobile Security Lacoon Mobile Security offers a solution that assesses mobile risks and enables enterprises to detect and eliminate mobile attacks. |
Cyber Security, Security, Software | San Francisco, California, United States | |
SecureSky SecureSky, Inc., is a cloud security management company. |
Cyber Security | Omaha, Nebraska, United States | |
Smart Eye Technology, Inc. Smart Eye Technology is a document privacy company that uses biometrics to open documents. |
Computer, Cyber Security, Document Management, E-Signature, Enterprise Applications, Information Technology, Mobile Apps, Software, Web Apps | Atlanta, Georgia, United States | |
BlueTalon BlueTalon provides data-centric security along with visibility and control at the data layer across Hadoop, Spark, SQL, and Big Data. |
Big Data, Cloud Data Services, Cyber Security, Information Technology | Redwood City, California, United States | |
SecureCo SecureCoโs network security solutions for government and enterprise provide superior protection using multi-path routing and anonymization. |
Cyber Security, Developer APIs, GovTech, Software, Telecommunications | New York, New York, United States | |
Subconscious Compute Security for Distributed Data and Devices |
Cyber Security, Internet of Things | Bengaluru, Karnataka, India | |
Delta Cygni Labs Delta Cygni Labs develops a professional remote video collaboration solution POINTR |
Augmented Reality, B2B, Cyber Security, Service Industry | Tampere, Western Finland, Finland | |
Sookasa Sookasa provides encryption and compliance for sensitive files across cloud storage services and mobile devices. |
Cloud Security, Cyber Security, Enterprise Software | San Mateo, California, United States | |
Hackrate An ethical hacking platform, which helps the companies to reduce cybersecurity risks by using the power of a global hacker community. |
Cyber Security, Information Technology, Security | Budapest, Budapest, Hungary | |
CyberDirekt CyberDirekt enables SMEs to easily and fully protect against digital risks. |
Commercial Insurance, Cyber Security, InsurTech | Berlin, Berlin, Germany | |
BDATA Solutions Inc We provide Digital Twin platform along with patent Blockchain IoT (BIoT) SDK for Simcards, IoT Gateway, PLC, SCADA etc. |
Cyber Security, Information Technology, Oil and Gas | Toronto, Ontario, Canada | |
Prevasio Prevasio: a next-gen Cloud Security with a vulnerability & anti-malware scan |
Cloud Security, Cyber Security, Developer Tools, Penetration Testing, Software | Sydney, New South Wales, Australia | |
Skurio Skurio is a cybersecurity company that gives every organization the ability to reveal their spectrum of digital risk. |
Cyber Security, Database, Information Technology, Network Security, SaaS, Software | Belfast, Belfast, United Kingdom | |
DefenseArk Decentralized Realtime Endpoint Protection & Cyber Threat Intelligence |
Architecture, Blockchain, Cloud Security, Crowdsourcing, Cyber Security, Network Security, Security, Software | New York, New York, United States | |
IDSS Holdings IDSS Holdings provides support services, technical solutions and cyber security capabilities to the defense intelligence community. |
Cyber Security, Identity Management, National Security | Armonk, New York, United States | |
AironWorks Next Gen Solutions for Human-Based Cyber Attacks |
Cyber Security | N/A | |
ThreatQuotient ThreatQuotient is a threat intelligence platform that centrally manages and correlates unlimited external sources. |
Analytics, Cyber Security, Network Security, Security | Reston, Virginia, United States | |
Chino.io Chino.io solves GDPR and HIPAA compliance for Digital Health and Medtech companies by combining regulatory expertise and technology. |
Cloud Data Services, Compliance, Cyber Security, Health Care, Information Technology | Rovereto, Trentino-Alto Adige, Italy | |
Blueshift Cybersecurity Blueshift Cybersecurity is a burgeoning startup that delivers full-service XDR protection to small and medium-sized businesses. |
Cyber Security, SaaS | Fort Myers, Florida, United States | |
Zettaset, Inc. Zettaset is software-defined encryption that protects against data theft and can be deployed across all physical and virtual environments. |
Big Data, Cyber Security, Enterprise Software, Software | Los Altos, California, United States | |
RhodeCode RhodeCode is an open source repository management platform. |
Cyber Security, Enterprise Software, Information Technology, IT Management, Open Source, SaaS, Security, Software, Software Engineering | Berlin, Berlin, Germany | |
Solebit Solebit takes a non-behavioral approach to detecting and preventing APTs and zero-day attacks. |
Computer, Cyber Security, Information Technology, Network Security, Real Time, Software | San Francisco, California, United States | |
MistNet MistNet develops breakthrough multi-entity threat detection & hunting powered by patent-pending mist computing & edge AI technologies. |
Artificial Intelligence, Cyber Security, Risk Management, Security | Mountain View, California, United States | |
RANK Software RANK is an advanced security analytics and threat hunting platform. |
Analytics, Cyber Security, Enterprise Software, Information Technology, Network Security, Security | Toronto, Ontario, Canada | |
Xaptum Multi-tenant, future-proof network operator that enables enterprises to seamlessly scale and secure IoT deployments. |
Cyber Security, Homeland Security, Infrastructure, Internet of Things, National Security, Railroad, Transportation, Water | Chicago, Illinois, United States | |
Trilogy Technologies Trilogy Technologies provides proactive and secure managed IT services, cloud and infrastructure solutions. |
Cloud Computing, Cloud Data Services, Cloud Infrastructure, Cloud Management, Cyber Security, Information Technology, IT Infrastructure, Network Security | Dublin, Dublin, Ireland | |
Onegini Onegini offers features such as mobile authentication platform and core identity capabilities. |
Banking, Cyber Security, Developer APIs, Developer Tools, Identity Management, Insurance, Mobile, Security | Woerden, Zuid-Holland, The Netherlands | |
ProcessBolt AI Powered Client/Vendor Risk Assessment Platform |
Cyber Security, Risk Management, Supply Chain Management | Minneapolis, Minnesota, United States | |
CyberQ Group CyberQ Group - We Make Your Business Cyber Resilient. |
Artificial Intelligence, Consulting, Cyber Security, Information Technology, Software | Birmingham, Birmingham, United Kingdom | |
CheckRed A cloud security solution that helps you to detect , prioritize ,and remediate your cloud security risks faster |
Cloud Security, Cyber Security | Wilmington, Delaware, United States | |
Graphistry Help every analyst investigate like 10 analysts. |
Analytics, Cloud Data Services, Cyber Security, Data Center Automation, Data Visualization, GPU, IT Management, Security | Oakland, California, United States | |
Kobalt Kobalt provides cyber security programs. |
Cloud Security, Cyber Security, Enterprise, Information Technology | Vancouver, British Columbia, Canada | |
HexaTier HexaTier delivers unified database security solutions utilizing a patented database reverse proxy technilogy. |
Cloud Data Services, Cyber Security, Database, Security, Software | Tel Aviv, Tel Aviv, Israel | |
VPN.com Internet, Security, Reviews, Domain Names |
Consumer Reviews, Cyber Security, Information Technology, Internet, Privacy, Security, Software | Atlanta, Georgia, United States | |
Grapherex Secure messenger, cryptocurrency wallet and P2P exchange in one app |
Blockchain, Cryptocurrency, Cyber Security, FinTech, Messaging, Mobile Apps | Gibraltar, Gibraltar, Gibraltar | |
FifthDomain FifthDomain is a cyber operations skills and workforce development platform |
Cyber Security, Developer Platform, PaaS, Security, STEM Education, Training | Canberra, Australian Capital Territory, Australia | |
Veridify Security Veridify Security delivers fast, small footprint and quantum-resistant public-key security tools for low-resource processors powering IoT. |
Cyber Security, Embedded Systems, NFC, Power Grid, Security, Software | Shelton, Connecticut, United States | |
CipherLoc Cipherloc gives you the power to secure your information today and in the coming quantum computing era. |
Cloud Security, Cyber Security, Network Security, Security, Software | Austin, Texas, United States | |
PiiQ Media & Risk The Only TRULY AUTOMATED SPEAR PHISHING SIMULATION for Social, Open, & Dark Web Risk & OSINT Business Intelligence tool |
Analytics, Artificial Intelligence, Compliance, Cyber Security, Fraud Detection, Physical Security, Simulation, Social Media Management, Software, Training | Cambridge, Massachusetts, United States | |
Cronus Cyber Technologies Cronus Cyber Technologies offers software solutions for the automated penetration testing market. |
Cyber Security, Information Technology, Network Security, Security, Software, Virtualization | Haifa, Hefa, Israel | |
Intertech Ci Intertech Ci is a security and investigations firm that offers security, life safety, and communication system integration services. |
Cyber Security, Information Technology, Public Safety, Security | Pittsburgh, Pennsylvania, United States | |
MEDICI MEDICI is the global destination for the FinTech industry for the benefit of enterprises, startups, and investors. |
Blockchain, Cyber Security, Finance, Financial Services, FinTech | Charlotte, North Carolina, United States | |
Emtec Emtec is a global IT consultancy dedicated to helping organizations drive transformation and growth via innovative technology and processes. OTCPINK:ETEC |
Cloud Computing, Cloud Security, Consulting, CRM, Cyber Security, Enterprise Applications, Enterprise Resource Planning (ERP), Information Technology, Mobile Apps, Software | Jacksonville, Florida, United States | |
Faceki FACEKI is a real-time identity verification platform with advance biometric technology powered by AI. |
Artificial Intelligence, Biometrics, Cyber Security, Developer APIs, Facial Recognition, Identity Management, Information Technology | Manama, Al Manamah, Bahrain | |
PFP Cybersecurity PFP is a cloud-based analytics that enables integrity assessment-as-a-service using dynamic power behavior analysis. |
Analytics, Cyber Security, Hardware, Internet of Things, Intrusion Detection, Security | Vienna, Virginia, United States | |
Shape Matrix Developing and commercializing the Shape Matrix system |
Asset Management, Big Data, Cyber Security, Data Visualization, Enterprise Software, Identity Management, Industrial Manufacturing, Supply Chain Management | Brooklyn, New York, United States | |
Everykey Everykey is a offers a Bluetooth device designed to replace keys and passwords. |
Cyber Security, Security, Software | Cleveland, Ohio, United States | |
Phalanx Phalanx stops cyber threats at the human layer with Zero Trust Data Security and provides seamless data security designed for productivity. |
Big Data, Cyber Security, Data Integration, Data Storage, Database, Information Technology, Software | Arlington, Virginia, United States | |
Avalance Global Solutions Avalance is a complete cyber security solutions provider that enables clients to secure their web-based resources. |
Cyber Security, Network Security | Mumbai, Maharashtra, India | |
Enigma Enigma helps companies hire stronger, more diverse cybersecurity teams. |
Cyber Security, Recruiting | New York, New York, United States |