Organizations in Cyber Security
Name | Industry | Address | |
---|---|---|---|
Four18 Intelligence Four18 Intelligence is developing a collaborative cyber threat hunting PaaS for analyst training and on-demand talent access |
Analytics, Artificial Intelligence, Cyber Security, Information Services, Information Technology, Software | Reston, Virginia, United States | |
Alpin Alpin is SaaS management: a single dashboard to discover Shadow IT, cut costs up to 30%, monitor activity and improve security. |
Asset Management, Cloud Security, Cyber Security, Identity Management, IT Infrastructure, IT Management, SaaS, Security, Software | Boulder, Colorado, United States | |
OneSpan OneSpan, is a cybersecurity provider in the financial services industry specializing in digital identity and anti-fraud solutions. NASDAQ:OSPN |
Cyber Security, Financial Services, FinTech, Information Technology, SaaS, Security | Chicago, Illinois, United States | |
UnitedLex UnitedLex is a provider of data solutions and technology powered legal services. |
Cyber Security, Intellectual Property, Legal | Overland Park, Kansas, United States | |
Melius Cyber Melius Cyber continuously monitors an organization's IT network, testing security and protecting it from the latest threats. |
Cyber Security, Information Services, Information Technology | Wear, Devon, United Kingdom | |
RapidSpike Digital Experience Monitoring SaaS Platform (Magecart Detection, Website Performance Improvement, Customer Interaction Monitoring and More) |
Application Performance Management, Apps, Cyber Security, Information Technology, Management Information Systems, SaaS | Leeds, Leeds, United Kingdom | |
AsicVault Physically secure cryptocurrency vault |
Bitcoin, Blockchain, Cryptocurrency, Cyber Security, Hardware | Tallinn, Harjumaa, Estonia | |
PayOK PayOK offers a range of solutions to combat payment fraud, securely onboard suppliers and meet audit and compliance requirements. |
Banking, Cyber Security, Financial Services, Fraud Detection | Sydney, New South Wales, Australia | |
24metrics A.I powered Cybersecurity with built in Prevention Features to stop Threats / Fraud before they happen. |
Artificial Intelligence, Big Data, Cyber Security, Internet, Marketing, SaaS, Software | Berlin, Berlin, Germany | |
Nanitor Nanitor Vulnerability Management platform providing visibility and control in cybersecurity |
Cyber Security, Real Time, SaaS, Software | Reykjavรญk, Gullbringusysla, Iceland | |
TASCET TASCET is a cybersecurity company providing the SYM Cyber Credential to prevent human risk, cyber threats and fraud across the enterprise. |
Cyber Security, Fraud Detection, Information Technology, Privacy, Risk Management, Software | Madison, Wisconsin, United States | |
Spyder Spyder is an automated intelligent document & operational processing company serving insurance & financial services. |
Cloud Data Services, Cyber Security, Document Management, Financial Services, Information Technology, Insurance, Software, Wealth Management | Fort Scott, Kansas, United States | |
Saining Wangan Saining Wangan offers network and cyber security services. |
Cyber Security, Network Security, Security | Jiangning, Jiangsu, China | |
Telos Corporation Telos is a leading provider of cyber, cloud and enterprise security solutions for the worldโs most security-conscious organizations. NASDAQ:TLS |
Cloud Security, Cyber Security, Enterprise Software, Information Technology, Network Security, Software | Ashburn, Virginia, United States | |
EYL EYL offers the world's "smallest, cheapest, fastest, and most energy-efficient" quantum random number generators and applications. |
Computer, Cyber Security, Network Security | Arlington, Virginia, United States | |
Horangi Horangi is a SaaS cybersecurity company that offers product innovation and technology designed to protect organizations. |
Cyber Security, Network Security, SaaS, Security, Software | Singapore, Central Region, Singapore | |
Uplevel Security Uplevel Security offers adaptive system of intelligence that uses graph theory and machine learning to modernize security operations. |
Cloud Security, Cyber Security, Data Visualization, Intelligent Systems, Machine Learning | New York, New York, United States | |
AppsCo Appsco helps you manage access to your company applications and gives you meaningful insights over sensitive data flow. |
Analytics, Blockchain, Cloud Computing, Cyber Security, Enterprise Software, Identity Management, Internet of Things, SaaS, Security, Software | St Louis, Missouri, United States | |
MaidSafe Building the SAFE Network: an open source P2P decentralized Web with privacy, security and freedom by default for all users. |
Blockchain, Cryptocurrency, Cyber Security, Network Security, Privacy, Software | Ayr, South Ayrshire, United Kingdom | |
Observable Networks Observable Networks operates in the enterprise network security and management industry. |
Cyber Security, Network Security, Security | Saint Louis, Missouri, United States | |
Hotpyp Provides its users with connections having built-in cyber trust |
Cyber Security, Information Technology | Walnut Creek, California, United States | |
CyberHive CyberHive has developed a patent-protected cybersecurity platform called Trusted Cloud. |
Cyber Security, Information Technology | Newbury, West Berkshire, United Kingdom | |
CoolBitX An international blockchain security company providing solutions, CoolWallet and Sygna, to enable the mass adoption of virtual assets. |
Bitcoin, Cryptocurrency, Cyber Security, Hardware, Information Services, Information Technology, Software | Taipei, T'ai-pei, Taiwan | |
BlackFog BlackFog is the leader in on device data privacy, data security and ransomware prevention |
Computer, Cyber Security, Network Security, Security | Cheyenne, Wyoming, United States | |
Suavei Suavei makes it easy for businesses to rapidly find & fix cybersecurity threats across IoT and 5G devices through AI threat management. |
Artificial Intelligence, Cyber Security, Enterprise Software, Information Technology, Machine Learning, Network Security, SaaS, Security, Software, Wireless | Las Vegas, Nevada, United States | |
Oakwood Oakwoodโs expertise in established and emerging technologies provides a unique value-add to organizations of all sizes. |
Cyber Security, Data Center, Information Technology | St Louis, Missouri, United States | |
NimbeLink NimbeLink specializes in providing cellular modems, cellular gateway systems, and developer services. |
Cyber Security, Embedded Systems, Information Technology, Network Security, Software | Plymouth, Minnesota, United States | |
Beijing Internet Harbor Technology Beijing Internet Harbor Technology Co., Ltd Established in 2009, Headquarter located in Beijing, 140+ employee. |
Cyber Security, Information Technology, Internet, Telecommunications | Beijing Shi, Beijing, China | |
Better Mobile Security Better Mobile Security is a solution provider of mobile phishing protection and mobile threat defense for Android and iOS. |
Computer, Cyber Security, Information Technology, Network Security, Software | New York, New York, United States | |
Bugbounter PaaS - crowdsourced testing that discovers your most critical cyber security vulnerabilities |
Cyber Security | Tallinn, Harjumaa, Estonia | |
Case.one Case.one is focused on bringing your legal practice up to the next level |
Cyber Security, Information Technology, Law Enforcement, Software | Irvine, California, United States | |
Beyond (Israel) Beyond (Israel) is an anew cyber-security company. |
Cyber Security, Security | Netanya, HaMerkaz, Israel | |
HyperQube HyperQube is a cyber range as a service offering that enables enterprises to quickly and easily build an exact copy of IT infrastructure. |
Cyber Security, Information Technology, Training | Washington, District of Columbia, United States | |
ExpressVPN One of the worldโs largest providers of VPN services, enabling users to protect their privacy and security online with just a few clicks. |
Cyber Security, Information Technology, Internet, Privacy, Software | N/A | |
ANKKI ANKKI is a provider of data security governance solutions in China. |
Cyber Security, Database, Security | Nanshanqu, Guangdong, China | |
LogDog 1 in 4 online accounts gets hacked. LogDog gives you free protection from hackers and identity theft. |
Big Data, Cyber Security, Mobile, Security | Tel Aviv, Tel Aviv, Israel | |
Salt Communications Salt is the first company to provide a holistic solution for closed encrypted communications between modern smartphone users. |
Cyber Security, Information and Communications Technology (ICT), Information Technology, Meeting Software, Messaging, Mobile, Software, Telecommunications | Belfast, Belfast, United Kingdom | |
BEST Antivirus By SSG Winning Trusted Antivirus Comparison and Antivirus Store since 2004. Trademark : BEST Antivirus ยฎ |
Consumer Reviews, Cyber Security, Information Technology, Software | London, England, United Kingdom | |
Batten Batten provides personalized security recommendations to help keep people safe at home, online, and in an emergency. |
Advice, Consumer, Cyber Security, Security | Seattle, Washington, United States | |
Numentech Hybrid Cybersecurity Solutions |
Blockchain, Cyber Security, Software | Barcelona, Catalonia, Spain | |
Vdoo Vdoo provides an integrated security platform designed for connected, IoT, and embedded devices. |
Cyber Security, Internet of Things, Network Security | Tel Aviv-yafo, Tel Aviv, Israel | |
PhishFirewall PhishFirewall is an AI-driven SaaS platform that helps companies in solving their phishing problem. |
Analytics, Artificial Intelligence, Cyber Security, Information Technology, SaaS | Huntsville, Alabama, United States | |
Israel Tech Challenge We specialize in providing a combination of classroom learning & industry experience, and offer job placement assistance |
Big Data, Cyber Security, EdTech, Education, Hardware | Tel Aviv, Tel Aviv, Israel | |
Apility.io Apility.io is an API which checks if an IP address, domain or email ID has been blacklisted for abuse or fraud. |
Big Data, Cyber Security, Developer APIs, Reputation | Tallinn, Harjumaa, Estonia | |
Armour Communications Armour Communications provides government-grade encryption for secure communications. |
Cyber Security, Security, Telecommunications | London, England, United Kingdom | |
Orkus Orkus is the only solution that delivers continuous access governance for data, infrastructure & privileged identities in the hybrid cloud. |
Cyber Security, Information Technology, Internet, Internet of Things, Software | San Jose, California, United States | |
SkyFort Enterprise-grade cybersecurity in just a tap. |
Cloud Infrastructure, Cyber Security, IaaS, Privacy, Software | Santa Monica, California, United States | |
Cyber Pop-up Cyber Pop-up is an on-demand cybersecurity service platform that makes cybersecurity accessible to businesses of all sizes. |
Cyber Security, Freelance, Information Technology, Network Security | Chicago, Illinois, United States | |
NuPSYS nuPSYS offers technology solutions that focus on the visualization of data networks and centers, and video camera applications. |
Cyber Security, Search Engine, Software | Menlo Park, California, United States | |
CyberCore Technologies CyberCore Technologies supports many long-term engagements throughout DoD, IC, DHS and commercial organizations. |
Cyber Security, Enterprise Software, Information Services, Information Technology | Elkridge, Maryland, United States | |
Technisanct Big Data and Cyber Security Startup |
Artificial Intelligence, Big Data, Cyber Security, Machine Learning | Kochi, Kerala, India | |
Emerging Threats Emerging Threats is a cyber security research organization. |
Cyber Security, Enterprise Software, Security | Lafayette, Indiana, United States | |
ATAR Labs ATAR Labs builds next generation SOAR platforms. ATAR helps SOCs become more vigilant and effective while helping them achieve more. |
Cyber Security, Information Services, Information Technology, Security | London, England, United Kingdom | |
Gray Wolf Analytics Building the future of blockchain understanding and security |
Blockchain, Cyber Security, Information Technology | Fredericton, New Brunswick, Canada | |
Paypixl A portfolio + payment platform for drone pilots to map and share images, videos, and 3D models. |
Cyber Security, Drones, Hardware, Image Recognition, Information Technology, Mobile Apps, Photo Sharing, Software | Tampa, Florida, United States | |
Securosys SA Securosys SA is a technology company headquartered in Zurich, Switzerland. |
Cyber Security, Information Technology, Network Security | Zรผrich, Zurich, Switzerland | |
Tauruseer No-Code Application Security Posture Management Platform |
Cloud Security, Compliance, Cyber Security, Developer Platform, Developer Tools, Risk Management, Software, Software Engineering | Jacksonville Beach, Florida, United States | |
WEBGAP INC. WEBGAP is a remote browser isolation platform that delivers a native browser user experience in a scalable way and cost-effective way. |
Cloud Computing, Cyber Security, Network Security | Walnut, California, United States | |
CommuniTake Technologies CommuniTake is a software company that builds mobile security, productivity, and management solutions. |
Cyber Security, Enterprise Software, Mobile Devices, Security, Software, Telecommunications | Yoqne`am `illit, HaZafon, Israel | |
Shard X Shard X develops technology for crypto custodians, in order to boost the security of its services. |
Computer, Cryptocurrency, Cyber Security, Software | London, England, United Kingdom | |
Beetles Cyber Security A platform-led, SaaS enabled Ethical Hacking Platform. |
Cloud Security, Consulting, Crowdsourcing, Cyber Security, Network Security, Penetration Testing, SaaS, Security | Dhaka, Dhaka, Bangladesh | |
Olympus Sky Olympus Sky provides secure communication and credential management for IoT-related hardware and virtual assets. |
Aerospace, Automotive, Cyber Security, Industrial, Industrial Automation, Industrial Manufacturing, Internet of Things, Network Hardware, Network Security, Software | Lodz, Lodzkie, Poland | |
Evina Cybersecurity for mobile payment |
Cyber Security, Fraud Detection, Mobile Payments, SaaS | Paris, Ile-de-France, France | |
Harvest.ai Harvest.ai is a data security firm that enables organizations to identify and stop data breaches, insider threats, and stolen credentials. |
Artificial Intelligence, Cloud Security, Cyber Security, Predictive Analytics | San Diego, California, United States | |
Protected Media Protected Media has developed the next gen of fraud/bot detection system |
Advertising Platforms, Cyber Security, Security, Software | Tel Aviv, Tel Aviv, Israel | |
RankedRight RankedRight is a vulnerability triage platform that prioritises security based on customer defined rules. |
Cyber Security, SaaS, Software | London, England, United Kingdom | |
I BLADES We Turn Ordinary Smartphones into Extraordinary Mobile Solutions |
Consumer Electronics, Cyber Security, Enterprise Software, Information Technology, Mobile Devices | Milpitas, California, United States | |
Uleska Uleska is an application security automation platform. We help security and development teams manage application security at scale. |
Cyber Security, Developer Tools, SaaS, Security, Software | Belfast, Belfast, United Kingdom | |
Delve Security Delve Security develops and provides a complete, automated, AI-Driven vulnerability management solution. |
Artificial Intelligence, Collaboration, Cyber Security, Data Center Automation, Machine Learning, Productivity Tools, Security, Software | Montrรฉal, Quebec, Canada | |
FixNix Inc Makers of FreshGRC.com, World's 1st SaaS Virtual Security Officer Platform, Takes misery and mystery out of passing security, compliance |
Banking, Compliance, Cyber Security, Insurance, Predictive Analytics, SaaS, Software | Walnut, California, United States | |
Data Solutions Data Solutions is a leading distributor in the fields of Virtualisation, Security, Unified Communications, and Cloud Computing. |
Computer, Cyber Security, Information Technology, Telecommunications | Dublin, Dublin, Ireland | |
Zero Networks Zero Networks automates the development and enforcement of network access rules throughout an entire network. |
Cyber Security, Data Center Automation, Information Technology, Network Security | Tel Aviv, Tel Aviv, Israel | |
Madaster Madaster facilitates registration, organisation, storage, and exchange of data. |
Association, Cyber Security, Developer Platform, Information Services, Information Technology, Online Portals, Real Estate | Laren, Noord-Holland, The Netherlands | |
Quad Miners Quad Miners creates the Network Blackbox, a solution that proactively detects and responds to cyber threats. |
Cyber Security, Information Technology, Software | Yeoksamdong, Seoul-t'ukpyolsi, South Korea | |
Modular Modular is provides security for ethereum blockchain. |
Cyber Security, Information Technology, Network Security, Software | Burleson, Texas, United States | |
SecLogic INC SecLogic is a cloud security posture management and identity governance and organization risk orchestration startup. |
Cloud Security, Cyber Security, Risk Management | Jacksonville, Florida, United States | |
EID Easy eID Easy is a SAAS solution provider of Qualified Electronic Signatures (QES) and electronic identity. |
Cyber Security, Developer Tools, E-Signature, Identity Management, SaaS, Software | Tallinn, Harjumaa, Estonia | |
SkyPoint Cloud The Modern Data Stack Platform and Industry Solutions |
Analytics, Cloud Data Services, Cyber Security, Data Integration, Retail | Lake Oswego, Oregon, United States | |
Uponit Uponit is an ad recovery platform for publishers. |
Cyber Security, Internet | New York, New York, United States | |
Seconize Seconize is a continuous and contextual cyber risk and compliance management platform. |
Artificial Intelligence, Cloud Security, Compliance, Cyber Security, Information Technology, Risk Management, SaaS, Security | Bangalore, Karnataka, India | |
Keychain Keychain is the decentralized authentication blockchain platform for finance, IoT, and enterprise. |
Blockchain, Cyber Security, Financial Services, FinTech, Information Technology, Security | Tokyo, Tokyo, Japan | |
Ticto Ticto is an information tech company that offers a security wearable that provides instant visual verification of authorized presence. |
Cyber Security, Information Services, Information Technology, Network Security, Security | San Francisco, California, United States | |
STASH No Ransom Ransomware Solution A Datacentric Security Platform, plus the World's First and Only No Ransom Ransomware Protection, Mitigation, and Recovery Solution |
Cyber Security, Information Technology, Internet, Security, Software | Stamford, Connecticut, United States | |
TechProcess Solutions TechProcess Solutions offers transaction and payment processing services across a spectrum of industries in India. |
Cyber Security, Financial Services, Insurance, Payments, Real Time | Mumbai, Maharashtra, India | |
SideChannel SideChannel is a cybersecurity and privacy consulting firm that serves small businesses and midmarket. |
Consulting, Cyber Security, Information Technology, Professional Services | Worcester, Massachusetts, United States | |
Proof Zero Proof Zero connects data with confidence, turning data complexity into opportunity. |
Big Data, Business Intelligence, Compliance, Cyber Security, Fraud Detection, Identity Management, Internet, Software | Toronto, Ontario, Canada | |
UnboundID The UnboundID identity and preference management software platform modernizes IAM systems and enables multichannel customer engagement. |
Cloud Computing, Cyber Security, Identity Management, Internet of Things, Mobile, SaaS, Software | Austin, Texas, United States | |
SpeakIn Speakin is a voiceprint recognition and identity security solutions AI company. |
Artificial Intelligence, Audio, Cyber Security, Internet, Robotics | Shenzhen, Guangdong, China | |
WireSecure WireSecure offers a security platform to prevent fraud, provide confidentiality and automate financial transactions. |
Cyber Security, Finance, Security | New York, New York, United States | |
ARGOS Cloud Security Cloud Security Autopilot |
Cloud Security, Cyber Security, Information Technology, SaaS, Software | Geelong, Victoria, Australia | |
Palo Alto Networks Palo Alto Networks is a multinational cybersecurity company that offers cybersecurity solutions for organizations. NYSE:PANW |
Cloud Security, Cyber Security, Network Security, Security | Santa Clara, California, United States | |
Socket Socket is a cybersecurity platform that protects companies from software supply chain attacks. |
Cloud Security, Cyber Security, Developer Tools, Internet, Open Source, Security, Software | Stanford, California, United States | |
Traced Traced operates as a mobile cybersecurity start-up. |
Computer, Cyber Security, Information Technology, Mobile, Mobile Apps | Oxford, Oxfordshire, United Kingdom | |
Kaspersky Kaspersky is a global cybersecurity company. It is in-depth threat intelligence and security expertise means a continuous evolution. |
Cloud Security, Cyber Security, Information Technology | Roma, Lazio, Italy | |
Mondoo A security solution for DevOps and security teams |
Cyber Security, Developer Platform | San Francisco, California, United States | |
Cybear Networks Cybear introduced the 1st Autonomous Cyber Security Analyst โ RoboSOC. This solution is unique and disruptive in the current Security Operation Center domain. While the attackers are getting more sophisticated, organized and are using robots in the majority of the attacks, the SOCs are still fully dependent on the human factor to analyze the incidents and the risk to the organization. |
Cyber Security | Tel Aviv, Tel Aviv, Israel | |
Shift Cryptosecurity Shift Cryptosecurity designs and manufactures the BitBox, the worldโs most secure, cryptographically protected hardware wallet. |
Blockchain, Cryptocurrency, Cyber Security, Manufacturing, Network Security, Security | Adliswil, Zurich, Switzerland | |
KashIO KashIO is the Payment Platform for SMB in Latam |
Cyber Security, Financial Services, Information Technology, Mobile Payments, Security | Miami, Florida, United States | |
Intensity Analytics Corporation We have patented AI engines for recognizing identity through human effort (physical UEBA), to protect credentials and track insider threats. |
Analytics, Artificial Intelligence, Cyber Security, Enterprise Software, Identity Management, Machine Learning, Market Research, Software | Warrenton, Virginia, United States | |
Radio Physics Solutions Radio Physics Solutions specializes in the fields of real-time concealed threat detection, Up to 30m Distance, autonomous, and unobtrusive. |
Cyber Security, Fraud Detection, Security | Ely, Cambridgeshire, United Kingdom |