Organizations in Cyber Security

Name Industry Address
meta-networks_logo Meta Networks
Meta Networks is rebuilding the enterprise WAN for the cloud age, with a new paradigm that is secure, simple and cloud-native.
Computer, Cyber Security, Information Technology, Network Security Tel Aviv, Tel Aviv, Israel
spaceit_logo Spaceit
Spaceit develops an end-to-end infrastructure for satellite operations
Aerospace, Cyber Security, Information and Communications Technology (ICT), Internet of Things, Satellite Communication, Software, Software Engineering Tartu, Tartumaa, Estonia
tophant_logo Tophant
Tophant is a innovative Internet security service provider in China.
Cyber Security, Internet Shanghai, Shanghai, China
trend-micro_logo Trend Micro
Trend Micro, a global technology leader, helps make the world safe for exchanging digital information with its innovative security platform. TYO:4704
Cloud Security, Cyber Security, Security, Virtualization Tokyo, Tokyo, Japan
logsentinel_logo LogSentinel
LogSentinel's mission is to help organizations improve their security posture by leveraging the latest technologies like blockchain and AI.
Cloud Data Services, Compliance, Cyber Security, Database, Developer Tools, Fraud Detection, Information Technology, SaaS, Software Naarden, Noord-Holland, The Netherlands
permiso-security_logo Permiso Security
Permiso Security delivers a unique identity-based approach cloud detection & response to your cloud infrastructure
Cloud Infrastructure, Cloud Security, Cyber Security Palo Alto, California, United States
baffin-bay-networks_logo Baffin Bay Networks
Baffin Bay Networks is a cybersecurity company that delivers cloud-based security platform for network and application attacks prevention.
Cyber Security, Software Stockholm, Stockholms Lan, Sweden
extrahop-networks_logo ExtraHop Networks
ExtraHop helps organizations to stop advanced threats with security that canโ€™t be undermined, outsmarted, or compromised.
Analytics, Cyber Security, Enterprise Software, IT Management, Network Security, Software Seattle, Washington, United States
rapidsec_logo RapidSec
RapidSec offers a software-as-a-service platform designed to provide rapid web security in a self-service manner.
Cyber Security, Information Technology, SaaS, Software Tel Aviv, Tel Aviv, Israel
illusive-networks_logo Illusive
Illusive is a defense to eliminate attacker pathways that uses deception for detection of lateral movement of APTs, ransomware & threats.
Computer, Cyber Security, Network Security, Software Tel Aviv-yafo, Tel Aviv, Israel
wynyard-group_logo Wynyard Group
Wynyard Group is a market leader in high consequence Crime Fighting, used by Law Enforcement and National Security Agencies. NZE:WYN
Analytics, Cyber Security Kowloon City, Kowloon, Hong Kong
chainvine_logo Chainvine
Next Generation Enterprise Systems / Identity Access Management (IAM) / Technology Providers Blockchain
Asset Management, Blockchain, Compliance, Cyber Security, Database, Enterprise Software, Intelligent Systems, Internet of Things, Software, Supply Chain Management London, England, United Kingdom
datacloak_logo Datacloak
Datacloak is an integrated solution for the core needs of data security and privacy protection for medium and large enterprises.
Cyber Security, Information Technology, Security, Software Shenzhen, Guangdong, China
loch-technologies_logo Loch Technologies
Loch offers actionable intelligence on all 5G cellular and wireless IoT devices to improve security of orgaizations.
Cyber Security, Security, Telecommunications Emeryville, California, United States
cymatic-security-inc_logo Cymatic.io
In under 20 minutes, Cymatic delivers where traditional and next-gen WAFs fall short without high costs, complexity, or compliance hiccups.
Cloud Security, Cyber Security, Information Technology, Software Raleigh, North Carolina, United States
encode_logo Encode
Enorasys Security Analytics enables continuous cyber situational awareness to address advanced persistent threats (APTs).
Analytics, Cyber Security, Predictive Analytics, Security, Software London, England, United Kingdom
segasec-2_logo Segasec
Segasec is a cybersecurity company aiming to protect organizations from phishing, pharming, business email compromise and ransomware
Cyber Security, Fraud Detection, Information Technology, Security, Software Tel Aviv, Tel Aviv, Israel
virgil-security_logo Virgil Security
Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.
Cloud Security, Cyber Security, Developer APIs, Developer Platform, Developer Tools, Internet of Things, Network Security, Software Manassas, Virginia, United States
trust-elevate_logo TrustElevate
Trust Elevate solves the problem of age verification and parental consent for young adults and children in online transactions.
Banking, Cyber Security, Information Technology, Software London, England, United Kingdom
enclave-networks_logo Enclave Networks
Connect all your computers, servers, cloud instances and containers across any infrastructure with effortless Zero Trust Network Access.
Cyber Security, Information Technology, Network Security, Security Newport, Newport, United Kingdom
apozy_logo Apozy
Apozy creates Airlock, a Browser Endpoint Detection and Response platform that fills the gap in endpoint protection.
Cloud Security, Cyber Security, Enterprise Software, Information Technology, SaaS, Security San Francisco, California, United States
shieldsquare_logo ShieldSquare
ShieldSquare helps online portals to protect against web scraping by bots run by competitors and un-authorized 3rd parties.
Analytics, Cyber Security, Information Technology, Internet, SaaS, Software Bangalore, Karnataka, India
kryptnostic_logo Kryptnostic
Kryptnostic web services platform enables end-to-end encrypted processing of data in the cloud.
Cloud Computing, Cloud Security, Cyber Security, Enterprise Software, Security Redwood City, California, United States
secure-set_logo SecureSet
SecureSet is a premier educational resource for launching or accelerating a cybersecurity career.
Cyber Security, Education, Network Security Denver, Colorado, United States
salvador-technologies_logo Salvador Technologies
Salvador Technologies provides the worldโ€™s fastest technology to recover from cyber-attacks/IT Failures.
Cyber Security, Information Technology, Security Rehovot, HaMerkaz, Israel
lantern-5046_logo Lantern
Lantern provides user behavior monitoring for modern product teams.
Analytics, Cyber Security, Information Technology, Network Security, Security San Francisco, California, United States
prelude-institute_logo Prelude Institute
Prelude Institute is a new form of higher education that focuses on helping transition people into the new labor market.
Consumer Software, Cyber Security, Education, Information Technology Manchester, New Hampshire, United States
timus-networks-inc_logo Timus Networks, Inc.
Timus Networks is a platform that develops technologies to build and secure the modern workplace.
Cloud Security, Cyber Security, Network Security Delaware City, Delaware, United States
think-stack_logo Think|Stack
Think|Stack expertise in cloud management, network segmentation, threat management, IT infrastructure, cybersecurity & consulting services.
Consulting, Cyber Security, IT Infrastructure Baltimore, Maryland, United States
ctm360_logo CTM360
CTM360ยฎ is a Digital Risk Protection platform powered by EDX Labs
Computer, Cyber Security, Information Technology, Risk Management, Software Manama, Al Manamah, Bahrain
monuv_logo Monuv
Monuv is a Brazilian technology company, present since 2010, bringing a cloud recording solution for security videos.
B2B, Cyber Security, Network Security, SaaS, Security Sรฃo Paulo, Sao Paulo, Brazil
sirp_logo SIRP
Risk-Based Security Orchestration, Automation & Response (SOAR) Platform
Cyber Security, Network Security, Security, Software London, England, United Kingdom
avertro_logo Avertro
SaaS Cyber Management Decision System (MDS) helping organisations manage, measure and report on their cybersecurity performance
Cyber Security, Information Technology, SaaS, Software Sydney, New South Wales, Australia
iothic_logo Iothic
Iothic provides IoT end-to-end systems with post-quantum resistant security and a full interoperability communication platform.
Cyber Security, Information Technology, Internet, Internet of Things, Software Oxford, Oxfordshire, United Kingdom
qylur-intelligent-systems_logo Qylur Intelligent Systems
Qylur is an intelligent systems company using its IIoT and AI platforms to transform entry security and guest experience for public venues.
Artificial Intelligence, Cyber Security, Intelligent Systems, Machine Learning, Security, Software Palo Alto, California, United States
sath-inc_logo Sath
Sath provides managed IT, build identities, software development, integrations, cyber security compliance, and access management services.
Compliance, Cyber Security, Identity Management, Information Technology Schaumburg, Illinois, United States
lupovis_logo Lupovis
Lupovis is a Glasgow-based company that specializes in helping its customers protect their business-critical network assets.
Cyber Security Glasgow, Glasgow City, United Kingdom
peernova_logo PeerNova
PeerNovaโ€™s mission is to empower firms to make confident and timely decisions using high-quality data.
Analytics, Big Data, Blockchain, Cyber Security, FinTech, Privacy, Software San Jose, California, United States
pr0ph3cy_logo Pr0ph3cy
Pr0ph3cy offers IT, network, and cybersecurity solutions such as security by design and cyber protection of mobility.
Cyber Security, Network Security, Software Guyancourt, Ile-de-France, France
beauceron-security_logo Beauceron Security
Cybersecurity start-up with a platform for measuring, managing and monitoring holistic cyber risk.
Cyber Security, Information Technology, Risk Management Fredericton, New Brunswick, Canada
enigmedia_logo Enigmedia
Enigmedia develops technological solutions that allow the encryption of information in real-time.
Cyber Security, Security, Software San Sebastian, Pais Vasco, Spain
escape-b74e_logo Escape
Escape automatically secures GraphQL APIs during the development cycle.
Cyber Security, Developer Tools, SaaS, Software Paris, Ile-de-France, France
exeon-analytics_logo Exeon Analytics
Exeon is a Swiss cyber security company and a market leader in AI-driven security analytics.
Analytics, Cyber Security, Information Technology, Network Security, Software Zรผrich, Zurich, Switzerland
paygilant-ltd_logo Paygilant
Frictionless Digital Banking & Payments Fraud prevention
Banking, Cyber Security, E-Commerce, FinTech, Fraud Detection, Mobile, Mobile Payments Ramat Gan, Tel Aviv, Israel
river-security_logo River Security
River Security focuses on providing the industry's cutting edge Internet dynamic application security solution.
Cyber Security, Information Technology, Network Security Shanghai, Shanghai, China
risk-io_logo Kenna Security
Kenna is a SaaS risk and vulnerability intelligence platform that accurately measures risk and prioritizes remediation efforts.
Cyber Security, SaaS, Security, Software San Francisco, California, United States
stamus-networks_logo Stamus Networks
Stamus Networks is a provider of high-performance network-based threat detection and hunting systems.
Big Data, Cyber Security, Information Technology, Intrusion Detection, Network Security Indianapolis, Indiana, United States
root9b_logo Root9B
R9B is a global cybersecurity leader founded on the principles of technical innovation, tailored solutions and professional excellence.โ€‹
Cyber Security, Information Services, Information Technology Colorado Springs, Colorado, United States
ionic-security_logo Ionic Security
Ionic Security, a data security platform, provides access control, intellectual property monitoring, data encryption, and policy management.
Cyber Security, Information Technology, Intellectual Property, Security Atlanta, Georgia, United States
secucloud_logo Secucloud
Secucloud is a service provider of cloud-based IT security, operating worldwide.
Cloud Computing, Cloud Security, Cyber Security, Mobile, Network Security Hamburg, Hamburg, Germany
lacoon-security_logo Lacoon Mobile Security
Lacoon Mobile Security offers a solution that assesses mobile risks and enables enterprises to detect and eliminate mobile attacks.
Cyber Security, Security, Software San Francisco, California, United States
securesky_logo SecureSky
SecureSky, Inc., is a cloud security management company.
Cyber Security Omaha, Nebraska, United States
smart-eye-technology_logo Smart Eye Technology, Inc.
Smart Eye Technology is a document privacy company that uses biometrics to open documents.
Computer, Cyber Security, Document Management, E-Signature, Enterprise Applications, Information Technology, Mobile Apps, Software, Web Apps Atlanta, Georgia, United States
bluetalon_logo BlueTalon
BlueTalon provides data-centric security along with visibility and control at the data layer across Hadoop, Spark, SQL, and Big Data.
Big Data, Cloud Data Services, Cyber Security, Information Technology Redwood City, California, United States
secureco-ccc4_logo SecureCo
SecureCoโ€™s network security solutions for government and enterprise provide superior protection using multi-path routing and anonymization.
Cyber Security, Developer APIs, GovTech, Software, Telecommunications New York, New York, United States
subconscious-compute_logo Subconscious Compute
Security for Distributed Data and Devices
Cyber Security, Internet of Things Bengaluru, Karnataka, India
delta-cygni-labs_logo Delta Cygni Labs
Delta Cygni Labs develops a professional remote video collaboration solution POINTR
Augmented Reality, B2B, Cyber Security, Service Industry Tampere, Western Finland, Finland
sookasa_logo Sookasa
Sookasa provides encryption and compliance for sensitive files across cloud storage services and mobile devices.
Cloud Security, Cyber Security, Enterprise Software San Mateo, California, United States
hackrate_logo Hackrate
An ethical hacking platform, which helps the companies to reduce cybersecurity risks by using the power of a global hacker community.
Cyber Security, Information Technology, Security Budapest, Budapest, Hungary
cyberdirekt_logo CyberDirekt
CyberDirekt enables SMEs to easily and fully protect against digital risks.
Commercial Insurance, Cyber Security, InsurTech Berlin, Berlin, Germany
bdata-solutions-inc_logo BDATA Solutions Inc
We provide Digital Twin platform along with patent Blockchain IoT (BIoT) SDK for Simcards, IoT Gateway, PLC, SCADA etc.
Cyber Security, Information Technology, Oil and Gas Toronto, Ontario, Canada
prevasio_logo Prevasio
Prevasio: a next-gen Cloud Security with a vulnerability & anti-malware scan
Cloud Security, Cyber Security, Developer Tools, Penetration Testing, Software Sydney, New South Wales, Australia
skurio_logo Skurio
Skurio is a cybersecurity company that gives every organization the ability to reveal their spectrum of digital risk.
Cyber Security, Database, Information Technology, Network Security, SaaS, Software Belfast, Belfast, United Kingdom
openavn_logo DefenseArk
Decentralized Realtime Endpoint Protection & Cyber Threat Intelligence
Architecture, Blockchain, Cloud Security, Crowdsourcing, Cyber Security, Network Security, Security, Software New York, New York, United States
idss-holdings_logo IDSS Holdings
IDSS Holdings provides support services, technical solutions and cyber security capabilities to the defense intelligence community.
Cyber Security, Identity Management, National Security Armonk, New York, United States
aironworks_logo AironWorks
Next Gen Solutions for Human-Based Cyber Attacks
Cyber Security N/A
threatq_logo ThreatQuotient
ThreatQuotient is a threat intelligence platform that centrally manages and correlates unlimited external sources.
Analytics, Cyber Security, Network Security, Security Reston, Virginia, United States
chino-io_logo Chino.io
Chino.io solves GDPR and HIPAA compliance for Digital Health and Medtech companies by combining regulatory expertise and technology.
Cloud Data Services, Compliance, Cyber Security, Health Care, Information Technology Rovereto, Trentino-Alto Adige, Italy
blueshift-cybersecurity_logo Blueshift Cybersecurity
Blueshift Cybersecurity is a burgeoning startup that delivers full-service XDR protection to small and medium-sized businesses.
Cyber Security, SaaS Fort Myers, Florida, United States
goto-metrics_logo Zettaset, Inc.
Zettaset is software-defined encryption that protects against data theft and can be deployed across all physical and virtual environments.
Big Data, Cyber Security, Enterprise Software, Software Los Altos, California, United States
rhodecode_logo RhodeCode
RhodeCode is an open source repository management platform.
Cyber Security, Enterprise Software, Information Technology, IT Management, Open Source, SaaS, Security, Software, Software Engineering Berlin, Berlin, Germany
solebit-labs_logo Solebit
Solebit takes a non-behavioral approach to detecting and preventing APTs and zero-day attacks.
Computer, Cyber Security, Information Technology, Network Security, Real Time, Software San Francisco, California, United States
mistnet-io_logo MistNet
MistNet develops breakthrough multi-entity threat detection & hunting powered by patent-pending mist computing & edge AI technologies.
Artificial Intelligence, Cyber Security, Risk Management, Security Mountain View, California, United States
rank_logo RANK Software
RANK is an advanced security analytics and threat hunting platform.
Analytics, Cyber Security, Enterprise Software, Information Technology, Network Security, Security Toronto, Ontario, Canada
xaptum_logo Xaptum
Multi-tenant, future-proof network operator that enables enterprises to seamlessly scale and secure IoT deployments.
Cyber Security, Homeland Security, Infrastructure, Internet of Things, National Security, Railroad, Transportation, Water Chicago, Illinois, United States
trilogy-technologies_logo Trilogy Technologies
Trilogy Technologies provides proactive and secure managed IT services, cloud and infrastructure solutions.
Cloud Computing, Cloud Data Services, Cloud Infrastructure, Cloud Management, Cyber Security, Information Technology, IT Infrastructure, Network Security Dublin, Dublin, Ireland
onegini_logo Onegini
Onegini offers features such as mobile authentication platform and core identity capabilities.
Banking, Cyber Security, Developer APIs, Developer Tools, Identity Management, Insurance, Mobile, Security Woerden, Zuid-Holland, The Netherlands
processbolt_logo ProcessBolt
AI Powered Client/Vendor Risk Assessment Platform
Cyber Security, Risk Management, Supply Chain Management Minneapolis, Minnesota, United States
cyberq-group_logo CyberQ Group
CyberQ Group - We Make Your Business Cyber Resilient.
Artificial Intelligence, Consulting, Cyber Security, Information Technology, Software Birmingham, Birmingham, United Kingdom
checkred_logo CheckRed
A cloud security solution that helps you to detect , prioritize ,and remediate your cloud security risks faster
Cloud Security, Cyber Security Wilmington, Delaware, United States
graphistry_logo Graphistry
Help every analyst investigate like 10 analysts.
Analytics, Cloud Data Services, Cyber Security, Data Center Automation, Data Visualization, GPU, IT Management, Security Oakland, California, United States
kobalt_logo Kobalt
Kobalt provides cyber security programs.
Cloud Security, Cyber Security, Enterprise, Information Technology Vancouver, British Columbia, Canada
greensql_logo HexaTier
HexaTier delivers unified database security solutions utilizing a patented database reverse proxy technilogy.
Cloud Data Services, Cyber Security, Database, Security, Software Tel Aviv, Tel Aviv, Israel
vpn-com_logo VPN.com
Internet, Security, Reviews, Domain Names
Consumer Reviews, Cyber Security, Information Technology, Internet, Privacy, Security, Software Atlanta, Georgia, United States
grapherex_logo Grapherex
Secure messenger, cryptocurrency wallet and P2P exchange in one app
Blockchain, Cryptocurrency, Cyber Security, FinTech, Messaging, Mobile Apps Gibraltar, Gibraltar, Gibraltar
fifthdomain_logo FifthDomain
FifthDomain is a cyber operations skills and workforce development platform
Cyber Security, Developer Platform, PaaS, Security, STEM Education, Training Canberra, Australian Capital Territory, Australia
securerf-corporation_logo Veridify Security
Veridify Security delivers fast, small footprint and quantum-resistant public-key security tools for low-resource processors powering IoT.
Cyber Security, Embedded Systems, NFC, Power Grid, Security, Software Shelton, Connecticut, United States
cipherloc_logo CipherLoc
Cipherloc gives you the power to secure your information today and in the coming quantum computing era.
Cloud Security, Cyber Security, Network Security, Security, Software Austin, Texas, United States
piiq-media_logo PiiQ Media & Risk
The Only TRULY AUTOMATED SPEAR PHISHING SIMULATION for Social, Open, & Dark Web Risk & OSINT Business Intelligence tool
Analytics, Artificial Intelligence, Compliance, Cyber Security, Fraud Detection, Physical Security, Simulation, Social Media Management, Software, Training Cambridge, Massachusetts, United States
cronus-cyber-technologies_logo Cronus Cyber Technologies
Cronus Cyber Technologies offers software solutions for the automated penetration testing market.
Cyber Security, Information Technology, Network Security, Security, Software, Virtualization Haifa, Hefa, Israel
intertech-security-llc_logo Intertech Ci
Intertech Ci is a security and investigations firm that offers security, life safety, and communication system integration services.
Cyber Security, Information Technology, Public Safety, Security Pittsburgh, Pennsylvania, United States
letstalkpayments-com_logo MEDICI
MEDICI is the global destination for the FinTech industry for the benefit of enterprises, startups, and investors.
Blockchain, Cyber Security, Finance, Financial Services, FinTech Charlotte, North Carolina, United States
emtec_logo Emtec
Emtec is a global IT consultancy dedicated to helping organizations drive transformation and growth via innovative technology and processes. OTCPINK:ETEC
Cloud Computing, Cloud Security, Consulting, CRM, Cyber Security, Enterprise Applications, Enterprise Resource Planning (ERP), Information Technology, Mobile Apps, Software Jacksonville, Florida, United States
faceki_logo Faceki
FACEKI is a real-time identity verification platform with advance biometric technology powered by AI.
Artificial Intelligence, Biometrics, Cyber Security, Developer APIs, Facial Recognition, Identity Management, Information Technology Manama, Al Manamah, Bahrain
power-fingerprinting_logo PFP Cybersecurity
PFP is a cloud-based analytics that enables integrity assessment-as-a-service using dynamic power behavior analysis.
Analytics, Cyber Security, Hardware, Internet of Things, Intrusion Detection, Security Vienna, Virginia, United States
shape-matrix_logo Shape Matrix
Developing and commercializing the Shape Matrix system
Asset Management, Big Data, Cyber Security, Data Visualization, Enterprise Software, Identity Management, Industrial Manufacturing, Supply Chain Management Brooklyn, New York, United States
everykey_logo Everykey
Everykey is a offers a Bluetooth device designed to replace keys and passwords.
Cyber Security, Security, Software Cleveland, Ohio, United States
phalanx-547d_logo Phalanx
Phalanx stops cyber threats at the human layer with Zero Trust Data Security and provides seamless data security designed for productivity.
Big Data, Cyber Security, Data Integration, Data Storage, Database, Information Technology, Software Arlington, Virginia, United States
avalance-global-solutions_logo Avalance Global Solutions
Avalance is a complete cyber security solutions provider that enables clients to secure their web-based resources.
Cyber Security, Network Security Mumbai, Maharashtra, India
askenigma_logo Enigma
Enigma helps companies hire stronger, more diverse cybersecurity teams.
Cyber Security, Recruiting New York, New York, United States