Organizations in Cyber Security

Name Industry Address
seworks_logo SEWORKS
Automated offensive security developed by a team of white hat hackers.
Cloud Security, Cyber Security, Penetration Testing, Security San Francisco, California, United States
central-intelligence-agency_logo Central Intelligence Agency (CIA)
The Central Intelligence Agency provides national security intelligence services.
Cyber Security, Government, National Security Washington, District of Columbia, United States
windtalker-security_logo WindTalker Security
WindTalker Security is a data encryption software that provides role-based sub-file encryption to its users.
Cyber Security, Network Security, Software Cumming, Georgia, United States
threatspike-labs_logo ThreatSpike Labs
ThreatSpike Labs provides a managed security service using a unique, in-house developed technology platform.
Cyber Security London, England, United Kingdom
qbound_logo Qbound
We enable organizations to securely access cloud solutions, servers, and IoT devices via our blockchain-backed Zero Trust access solution.
Cloud Security, Cyber Security, Identity Management, Information Technology, Privacy, Software München, Bayern, Germany
science-gateways-community-institute_logo Science Gateways Community Institute
Science gateways are collections of tools, services, and apps
Cyber Security, Incubators San Diego, California, United States
ensign-infosecurity_logo Ensign InfoSecurity
Ensign InfoSecurity, Southeast Asia’s largest pure-play cybersecurity services provider.
Cloud Security, Consulting, Cyber Security, Identity Management, Information and Communications Technology (ICT), Information Technology, Internet, Network Security, Penetration Testing, Professional Services Singapore, Central Region, Singapore
cyberpeace-institute_logo CyberPeace Institute
CyberPeace Institute is an independent and neutral nongovernmental organization.
Cyber Security Genève, Geneve, Switzerland
fortify-24x7_logo Fortify 24x7
Fortify 24×7 is a leading managed security services provider offering comprehensive services that cover all aspects of the cyber kill chain.
Cloud Security, Cyber Security, Information Technology, Management Consulting, Network Security Point Roberts, Washington, United States
underwriters-laboratories-ul_logo Underwriters Laboratories (UL)
UL is a global independent safety science company offering expertise across five key strategic businesses: Product Safety, Environment,
Business Development, Cloud Management, Cyber Security, Enterprise, Management Consulting, Risk Management, Security, Service Industry, Sustainability Northbrook, Illinois, United States
aves-netsec_logo Aves Netsec
Aves is a Finnish-owned cyber security company.
Cyber Security Helsinki, Southern Finland, Finland
gleam-ai_logo Gleam AI
Un-intrusive AI-Powered Cybersecurity SaaS platform for Enterprises and Service Providers
Analytics, Artificial Intelligence, Big Data, Cyber Security, Machine Learning, Network Security, Predictive Analytics, SaaS Seville, Andalucia, Spain
cryptee_logo Cryptee
Cryptee is a safe, encrypted place to write personal documents, privately store photos and more.
Cloud Data Services, Cyber Security, Data Storage, Information Technology, Privacy, Productivity Tools, Security, Software Tallinn, Harjumaa, Estonia
adaptive-systems_logo Adaptive Systems
Adaptive Systems specializes in the fields of data protection, database compliance, data encryption, and information security.
Cyber Security, Information Technology, Software East Brunswick, New Jersey, United States
perseus-5e69_logo Perseus
Perseus provides cyber security, and data privacy services.
Cyber Security, InsurTech, Internet, IT Management, Network Security, Privacy Berlin, Berlin, Germany
narya-security_logo Narya Security
Narya Security helps enterprises solve the damage from Ransomware infections, with a single click.
Cyber Security, Network Security Saint Louis, Missouri, United States
arcserve_logo Arcserve
Arcserve is a provider of data protection and recovery software that provides organizations with the assurance.
Big Data, Cyber Security, Enterprise Software, Information Technology, Network Security, Software Eden Prairie, Minnesota, United States
newsky-security_logo NewSky Security
Enable enterprise-level security protection for all connected devices
Cyber Security, Internet of Things Redmond, Washington, United States
guardiot_logo GuardIoT
Our mission at GuardIoT is to make sure that Smart Cities are also Safe Cities!
Cyber Security, Industrial, Information Technology, Internet of Things Prague, Hlavni mesto Praha, Czech Republic
gurucul_logo Gurucul
Gurucul provides Actionable Risk Intelligenceâ„¢ to detect, prevent, and deter advanced internal and external threats and fraud.
Cyber Security, Machine Learning, Predictive Analytics, Software El Segundo, California, United States
appspicket_logo AppsPicket
Frictionless secure two factor authentication based on innovative cryptographic protocol.
Computer, Cyber Security, Information Technology, Mobile Payments, Network Security, Security, Software London, England, United Kingdom
nexus-stack-technologies_logo Nexus Stack Technologies
SAAS Based Vulnerability Management solution, supported by AI-Driven checks and False Positive Removal
Cyber Security, SaaS, Software Dehra Dun, Uttarakhand, India
cyber-security-hub_logo Cyber Security Hub
The Cyber Security Hub is an online news source for global cyber security professionals and business leaders.
Cyber Security, Security New York, New York, United States
intelli-network_logo Intelli Network
Intelli is a peer-to-peer crime report platform using distributed ledger network.
Blockchain, Cryptocurrency, Cyber Security, Information Technology, Legal, Network Security Calgary, Alberta, Canada
digitary_logo Digitary
Digitary helps universities to issue digitally certified transcripts, degrees and other documents. Lower costs, great student experience
Cyber Security, EdTech, Education, Software Dublin, Dublin, Ireland
expedient_logo Expedient
Expedient is a network of data centers offering cloud computing, a wide range of managed services, and network connectivity.
Cloud Computing, Cyber Security, Information Services, Information Technology, Security, Telecommunications, Virtualization Pittsburgh, Pennsylvania, United States
crosslake-technologies_logo Crosslake Technologies
Crosslake is your end-to-end software technology partner that enables customers to transform their people, processes, and technology.
Consulting, Cyber Security, Information Technology, IT Management, Management Consulting, Software Kirkland, Washington, United States
levitection-2dfe_logo Levitection
Levitection is developing a breakthrough security platform with automatic screening capabilities for open public spaces.
Artificial Intelligence, Cyber Security, Security Haifa, Hefa, Israel
cetas-cyber_logo Cetas Cyber
Security Analytics, SOC, Automated Detection and Reponses
Cyber Security, Software Palo Alto, California, United States
wymsical_logo Wymsical
Wymsical allows its users to create a virtual document vault where they can access, authenticate, and lock
Cyber Security, Information Technology, Mobile Apps, Software Greenwich, Connecticut, United States
cryptomage_logo Cryptomage
network anomaly detection solutions and cybersecurity services
Analytics, Communication Hardware, Cyber Security, Telecommunications Wroclaw, Dolnoslaskie, Poland
secon-cyber_logo Secon Cyber
Secon Cyber provides cyber security solutions to customers ranging from small to large enterprises.
Cyber Security, Information Technology, Network Security Hersham, Surrey, United Kingdom
gat-infosec_logo GAT InfoSec
GAT InfoSec is the CISO's best friend cyber security platform provider. GAT Security Score, GAT Core, GAT Scan and other products.
Cyber Security, Information Services, Information Technology, Risk Management, SaaS, Software São Paulo, Sao Paulo, Brazil
socradar_logo SOCRadar
Digital risk protection platform as a service
Cyber Security Middletown, Delaware, United States
digify_logo Digify
Digify is a cloud-based document security service that helps companies to protect and keep control of confidential documents.
Cyber Security, DRM, Information Technology, Security San Francisco, California, United States
trail-of-bits_logo Trail Of Bits
Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products.
Cyber Security, National Security, Security, Software New York, New York, United States
securityescape_logo SecurityEscape
SecurityEscape is a SaaS-based infosec firm which uses cloud-based vulnerability identification and industrial expertise for apps' security.
Computer, Cyber Security, Network Security, SaaS Hyderabad, Andhra Pradesh, India
defenselayers_logo Defenselayers
Cybersecurity & Compliance Automation Platform delievered in Software as a Service model.
Cyber Security, SaaS Warsaw, Mazowieckie, Poland
fascent-technologies_logo Fascent Technologies
Software development company
Big Data, Cloud Data Services, Consumer Applications, Cyber Security, Enterprise Applications, Enterprise Software, Information Technology, Internet, Internet of Things, Mobile Advertising, Mobile Apps, Network Security, Security, Software, Web Development Hyderabad, Andhra Pradesh, India
firecompass_logo FireCompass
FireCompass is a Saas platform for Continuous Automated Red Teaming (CART) and Attack Surface Management (ASM).
Big Data, Cyber Security, Information Technology, Internet, SaaS, Software N/A
appsec360_logo Appsec360
Appsec360 is a cloud agnostic SaaS platform to build & run high performing application security programs
Cyber Security, Information Technology, SaaS, Software Melbourne, Victoria, Australia
qascom_logo Qascom
Qascom is an engineering company offering security solutions in satellite navigation and space cybersecurity.
Aerospace, Cyber Security, Information Technology, Satellite Communication, Security Bassano Del Grappa, Veneto, Italy
nettitude_logo Nettitude
Nettitude is a global leader in the delivery of cyber security testing, risk management, compliance and incident response services.
Cyber Security, Information Technology, Security New York, New York, United States
jazz-networks_logo Ava Security
Ava Security is a Bleeding Edge Network, Data Security solution start-up.
Cloud Security, Cyber Security, Events, Machine Learning, Network Security New York, New York, United States
open-systems-ag_logo Open Systems
Open Systems is the preeminent cybersecurity and connectivity provider for the enterprise cloud.
Cloud Security, Cyber Security, Network Security Zürich, Zurich, Switzerland
comodo_logo Comodo
Comodo delivers cybersecurity solutions to protect businesses, schools, and government organizations.
Cloud Security, Cyber Security, Network Security, Professional Services, Software Bloomfield, New Jersey, United States
auth-base-pvt-ltd_logo AuthBase
AuthBase is a deep tech cybersecurity startup using AI and ML to identify and mitigate threats and attacks across networks!
Artificial Intelligence, Cyber Security, Information Technology, Machine Learning, Software Hyderabad, Andhra Pradesh, India
safnah-com-it-services_logo Safnah.com IT Services
Safnah.com Information Technology Services
Apps, Cloud Computing, Computer, Cyber Security, Information Services, Information Technology, Mobile Apps, Web Apps, Web Hosting Baghdad, Baghdad, Iraq
endpoint-security-inc_logo Endpoint Security Inc
Secure Wireless Communications for the Internet of Things
Cyber Security, Internet of Things, Semiconductor College Station, Texas, United States
hummingbirds-ai_logo Hummingbirds AI
Hummingbirds AI Creates Privacy-first Intelligent Applications for Security and Efficiency of Enterprises #Guacamole
Artificial Intelligence, Cyber Security, Employee Benefits, Fraud Detection, Internet of Things, Machine Learning, Security, Software Miami Beach, Florida, United States
smart-screen_logo Smart Screen
Smart Screen is an automated onboarding and background solution delivering fast, affordable, and highly personalized background checks.
Cloud Security, Compliance, Cyber Security New York, New York, United States
portswigger_logo PortSwigger
PortSwigger Burp Suite is the leading toolkit for web application security testing.
Cyber Security, Information Technology, Security, Software Knutsford, Cheshire, United Kingdom
any-run-llc_logo ANY.RUN
ANY.RUN is the first interactive online malware analysis sandbox.
Cyber Security, Information Technology Dubai, Dubai, United Arab Emirates
buster-ai_logo Buster.Ai
SaaS
Artificial Intelligence, Cyber Security, Journalism, Machine Learning, Natural Language Processing, SaaS, Software La Défense, Ile-de-France, France
mach-1-development_logo Mach 1 Development
Mach 1 delivers hardware and software solutions to observe, track and analyze data movements in network systems.
Cyber Security, Information Technology, Security, Software Austin, Texas, United States
tv-rheinland_logo TÃœV Rheinland Group
TÃœV Rheinland Group is a provider of technical services worldwide.
CRM, Cyber Security, Information Technology, Public Safety, Test and Measurement Köln, Nordrhein-Westfalen, Germany
veridt-middleton-wisconsin_logo Veridt
Veridt manufactures radio isotope detection devices for homeland security, force protection, and other applications.
Cyber Security, Homeland Security, Intrusion Detection, Law Enforcement, Manufacturing, Network Security Middleton, Wisconsin, United States
augmenta-cyber-security_logo Augmenta Cyber Security
Cyber-security, Safe data storage, SCADA security, SAP Security, DLP, e2ee
Cloud Data Services, Cyber Security, Data Visualization, Information Technology, SEM, Simulation, Software, Virtualization Gaborone, South-East, Botswana
yunjizhi_logo Yunjizhi
Yunjizhi is an innovative technology company in the field of next-generation data security in China.
Big Data, Customer Service, Cyber Security, Marketing, Sales Fengtai, Beijing, China
smart-orbis_logo Smart Orbis
SmartOrbis is a stealth-mode security startup in Santa Clara, California that is on a mission to revolutionize enterprise security.
Cloud Security, Cyber Security, Information Technology, Network Security, Security Santa Clara, California, United States
safelogic_logo SafeLogic
Incumbent-crushing mobile, server, cloud, and IoT encryption built for regulatory compliance
Cyber Security, Internet of Things, Mobile, Security Palo Alto, California, United States
core-bts_logo Core BTS
Core BTS is a customer-centric technology consulting organization dedicated to transforming IT experiences and delivering value to clients.
Cyber Security, Information Technology, Software Madison, Wisconsin, United States
sacumen-security-thought-partner_logo Sacumen
Sacumen specializes in working with Security Product Companies. Built 750+ Connectors & working with 50+ Security Product Companies
Cyber Security, Identity Management, Industrial Engineering, Information Technology, Network Security, Security, SEM, Software Engineering Bangalore, Karnataka, India
cyberiq-services_logo CyberIQ Services
CyberIQ Services provides cyber threat detection software and service solutions for government agencies, consortiums, and enterprises.
Analytics, Cyber Security, Enterprise Software Arlington, Virginia, United States
cyberxngan_logo CyberXngan
CyberXngan is an information security solution and cyber-security service provider company.
Cyber Security, Information Technology, Network Security Changping, Beijing, China
boxtrap-security_logo Boxtrap Security
Cyber Security, AI, Machine Learning
Artificial Intelligence, Cloud Security, CRM, Cyber Security, Information Technology, Location Based Services, Machine Learning, Network Security Prague, Hlavni mesto Praha, Czech Republic
jiaotu-technology-pepper-map-technology_logo Jiaotu Technology(Pepper Map Technology)
Jiaotu Technology is a service provider of server security hardening solutions.
Cyber Security, Enterprise Beijing, Beijing, China
prot-on_logo Prot-On
Prot-On is an innovative and new generation Information Rights Management solution
Cyber Security, Document Management, Security Madrid, Madrid, Spain
arcycle-software_logo ArCycle Software
ArCycle Software provides SMBs and enterprises with backup, replication, and disaster recovery solutions.
Cyber Security, Enterprise Software, Software Larnaca, Larnaca, Cyprus
cyberghost-srl_logo CyberGhost
CyberGhost is the creator of one of the world's most reliable privacy and security solutions in the world: CyberGhost VPN
Cyber Security, Network Security, PaaS, Privacy, SaaS, Security, Software Bucharest, Bucuresti, Romania
revert-io_logo ThisData
ThisData is the leader in contextual authentication and login anomaly detection.
Cloud Security, Cyber Security, Identity Management, SaaS Auckland, Auckland, New Zealand
monkphish_logo MonkPhish
SaaS, Cybersecurity Training, Gaming
Cyber Security, Education, SaaS, Security, Software N/A
redwall-technologies_logo Redwall Technologies
Redwall Technologies offers security solution enables the creation of secure mobile devices for government and regulated industries.
Cyber Security, Security, Wireless Dayton, Ohio, United States
drwintech_logo DrwinTech
DrwinTech is an information technology firm that offers consulting and managed services.
Consulting, Cyber Security, Information Technology, Small and Medium Businesses Austin, Texas, United States
taplink_logo TapLink
TapLink has developed a patented new way to secure passwords and databases on the internet.
Cyber Security, Database, Internet Boston, Massachusetts, United States
trustcom-ltd_logo Trustcom
Trustcom is a cybersecurity company that offers a wide variety of solutions.
Cyber Security, Information Technology, Mobile, Risk Management, Security, Training Nairobi, Nairobi Area, Kenya
bibu-labs_logo Bibu Labs
Dynamic Defence Against Cyber Attacks for IoT
Computer, Cyber Security, Enterprise, Software Kitchener, Ontario, Canada
ncc-group_logo NCC Group
NCC Group exists to make the world safer and more secure. LSE:NCC
Consulting, Cyber Security, Human Computer Interaction, Information Technology, Network Security, Software Manchester, Manchester, United Kingdom
metaintell_logo Mi3 Security
Mi3 Security provides a cloud-based mobile risk management solution.
Apps, Cloud Data Services, Cyber Security, Enterprise Software, Mobile, Security Mountain View, California, United States
tla-innovation_logo TLA Innovation
TLA Innovation develops solutions faced by individuals and enterprises for the cybersecurity, privacy, and regulatory industries.
Cyber Security, Enterprise Software, Information Technology Paramus, New Jersey, United States
guardtime_logo Guardtime
Guardtime is a network security company that validates the correctness of data, networks, systems, and processes.
Cyber Security, Network Security Tallin, Harjumaa, Estonia
threatgen_logo ThreatGEN
ThreatGEN is an industrial cybersecurity and cyber risk management technology and services firm.
Computer, Cyber Security, Network Security Sugar Land, Texas, United States
cyberone_logo Cyberone
Cyberone is a cloud-based platform for integrated risk management software and cyber security.
Cyber Security, Information Technology, Software San Francisco, California, United States
securemarking_logo SecureMarking
SecureMarking is an unclonable nanotechnology solution for tracking authentic parts in a supply chain.
Blockchain, Cyber Security, Information Technology, Internet of Things, Logistics, Printing, Security, Supply Chain Management Rapid City, South Dakota, United States
nightdragon-security_logo NightDragon Security
NightDragon Security is a cybersecurity-focused VC firm investing in innovative growth and late-stage companies.
Cyber Security, Finance, Venture Capital San Francisco, California, United States
heimdal-security_logo Heimdal Security
Heimdal Security is a provider of cloud-based cybersecurity solutions.
Cyber Security, Information Technology, Privacy Copenhagen, Hovedstaden, Denmark
moqom_logo Moqom
Moqom is an innovative software development company that designs and implements high security, cloud-based fraud prevention solutions.
Banking, Cyber Security, Identity Management, Mobile, Payments, Risk Management, Software Dublin, Dublin, Ireland
david-group-fb15_logo DAVID GROUP
PT David Sistem Group was formed as a preventive solution to the urgency of cyberattacks on a global scale.
Consulting, Cyber Security, Education, Information Technology, Internet, SEO, Software Medan, Sumatera Utara, Indonesia
acunetix_logo Acunetix
Aquinetix offers an automated tool that enables companies to scan their web apps to identify and resolve exploitable vulnerabilities.
Cyber Security, Enterprise Software, Information Technology, Network Security, SaaS London, England, United Kingdom
subarctic-limited_logo Subarctic Limited
Subarctic is focused on the development of software solutions that enable technology companies to manage their businesses.
Big Data, Cyber Security, Security, Software College Park, Maryland, United States
bravatek_logo Bravatek
Bravatek Solutions, Inc. is a high technology security solutions portfolio provider.
Cyber Security, Internet, Security, Software Austin, Texas, United States
societas-analytics_logo ANOVA Intelligence
US intelligence agency-grade forensic analysis and critical intel.
Analytics, Artificial Intelligence, Big Data, Cyber Security, Predictive Analytics Silver Spring, Maryland, United States
nimis-cybersecurity_logo Nimis Cybersecurity
Techstars backed cybersecurity company using artificial intelligence to provide real time penetration testing
Artificial Intelligence, Cyber Security, Enterprise Software, Machine Learning Melbourne, Victoria, Australia
noxtton_logo Noxtton
Noxtton a technology and consulting company.
Apps, Big Data, Blockchain, Consumer Applications, Cyber Security, Domain Registrar, Legal Tech, Software, Web Development Tbilisi, Dushet'is Raioni, Georgia
clipperz_logo Clipperz
Clipperz is an online vault and password manager that enables its users to encrypt text and documents.
Cyber Security, Privacy, Security Imola, Emilia-Romagna, Italy
microland_logo Microland
Making digital happen. Microland's delivery of digital is all about making technology do more and intrude less.
Application Performance Management, Cloud Computing, Cyber Security, Data Center, Data Center Automation, Internet of Things, IT Infrastructure, Network Security, Virtualization Bangalore, Karnataka, India
iota-foundation_logo IOTA Foundation
IOTA Foundation develops an open-source protocol that supports data and value transfer between devices and humans.
Blockchain, Cryptocurrency, Cyber Security, Information Technology, Internet of Things, Non Profit Berlin, Berlin, Germany
not_available_image IPass
iPass is a cybersecurity platform offering a one-stop-shop for identity verification solutions.
Cyber Security, Information Technology N/A
halcyon-d8cf_logo Halcyon
Halcyon is a cybersecurity business that develops tools to protect enterprise clients from ransomware.
Computer, Cyber Security, Network Security, Software Austin, Texas, United States
iosafe_logo IoSafe
ioSafe designs and builds fireproof and waterproof data storage solutions that provides cloud-based backup and disaster recovery solutions.
Cyber Security, Hardware Auburn, California, United States