Organizations in Cyber Security

Name Industry Address
digital-authentication-technologies_logo Digital Authentication Technologies
Digital Authentication Technologies develops contextual location fingerprints for location-based authentication.
Cyber Security, Information Services, Security Boca Raton, Florida, United States
europe-assistance_logo Europ Assistance
We support over 300 million customers in 208 countries thanks to our network of 750.000 approved providers and 36 assistance centres.
Automotive, Consumer, Customer Service, Cyber Security, Elder Care, Health Care, Insurance, Travel Paris, Ile-de-France, France
hackedu_logo HackEDU
HackEDU provides interactive cyber security training and secure code development courses for software engineers.
Cyber Security, Software Pittsburgh, Pennsylvania, United States
secured_logo SecurEd
SecurEd is focused on helping academic institutions build a cyber-ready workforce.
Cyber Security, Education Towson, Maryland, United States
sphere-secure-workspace_logo Sphere Secure Workspace
Sphere Secure Workspace makes it easy for employees to securely use their personal devices at work.
Cyber Security, Mobile Devices, Security London, England, United Kingdom
analyticmate_logo Analyticmate
Analyticmate is a Big Data analytical company. focused on security.
Analytics, Big Data, Cyber Security San Francisco, California, United States
advanced-technology-leaders_logo Advanced Technology Leaders
Advanced Technology Leaders offers administration, information technology, consulting, project management, training, and cybersecurity.
Consulting, Cyber Security, Information Technology, Project Management, Training Martinez, Georgia, United States
new-horizons_logo New Horizons
New Horizons provides career training solutions as well as IT training to small, mid-sized, and global enterprises.
Cyber Security, Education, Information Technology, Security, Training Conshohocken, Pennsylvania, United States
pondurance_logo Pondurance
Pondurance is cybersecurity company that focuses on delivering both technology-enabled and compliance-advisory solutions.
Cloud Security, Compliance, Consulting, Cyber Security, Network Security Indianapolis, Indiana, United States
nudata-security_logo NuData Security A Mastercard Company
NuData Security positively verifies users online through real-time passive biometrics and behavioral analytics.
Analytics, Cyber Security, Enterprise Software, Fraud Detection, Internet Vancouver, British Columbia, Canada
amplify-intelligence_logo Amplify Intelligence AU
Amplify Intelligence takes a data driven approach to reduce Cyber Insurance losses.
Artificial Intelligence, Cyber Security, Insurance Melbourne, Victoria, Australia
blackpanda_logo Blackpanda
Blackpanda is a digital forensics and cyber crisis management firm.
Computer, Cyber Security, Network Security Hong Kong, Hong Kong Island, Hong Kong
swat-systems_logo SWAT Systems
SWAT Systems providing Information Technology services specialize in Seattle IT services.
Cyber Security, Information Technology, Network Security Seattle, Washington, United States
skypher_logo Skypher
Skypher automates security questionnaires response in the sales process.
Compliance, Cyber Security, Information Services, Information Technology, SaaS, Software San Francisco, California, United States
shellfire_logo Shellfire
Your trusted provider for vpn tunnel hosting
Cyber Security, Network Security, Privacy, Security Bad Vilbel, Hessen, Germany
firezone_logo Firezone
Firezone is an open-source security platform to manage secure remote access for teams.
Cloud Security, Cyber Security, Information Technology, Network Security, Open Source, Privacy, Security, Software Mountain View, California, United States
shevirah_logo Shevirah
Shevirah is a provider of testing tools for assessing and managing the risk of mobile devices.
Cyber Security, Mobile, Security Herndon, Virginia, United States
infogps-networks-llc_logo InfoGPS Networks
Real time interrogation of information at rest, intelligent indexing of a network, information behavior pattern analysis.
Cyber Security, Information Technology, IT Management, Software North Canton, Connecticut, United States
unity-technology-solutions_logo Unity Technology Solutions
Unity Technology Solutions offers cloud solutions, cloud computing, managed services, and cybersecurity services.
Cloud Computing, Cyber Security, Information Technology, Software Dublin, Dublin, Ireland
globo_logo Globo
Globo help businesses enable their employees to work and collaborate from anywhere, anytime and extend their engagement with customers. LSE:GBO
Content, Cyber Security, Enterprise Software, Mobile, Software Palo Alto, California, United States
smartronix_logo Smartronix
Smartronix is a provider of cloud, C5ISR, and advanced engineering and IT solutions.
Cyber Security, Government, Information Technology, Security, Software Hollywood, Maryland, United States
oosto_logo Oosto
Oosto assists enterprises in protecting their customers, guests and employees by identifying security and safety threats in real-time.
Cyber Security, Information Services, Information Technology, Security, Software Holon, Tel Aviv, Israel
secupi_logo SecuPi
Data-Centric Security and Privacy Compliance
Analytics, Cloud Data Services, Cloud Security, Cyber Security, Data Visualization, Privacy, Software Ramat Ef'al, HaMerkaz, Israel
astra-c747_logo Astra Security
Astra is a plug & play intelligent firewall to protect your website in this world of ever increasing threats.
Cyber Security, Security, Software Le Kremlin-bicรชtre, Ile-de-France, France
secure-digital-solutions-sds_logo TrustMAPP
Security Performance Management
Compliance, Cyber Security, SaaS, Software Minneapolis, Minnesota, United States
futurism-technologies_logo Futurism Technologies
Futurism Technologies offers Next Generation Information Technologies Services and Solutions. Futurism Technologies has strategic ...
Cyber Security, IT Management, Software, Web Design, Web Development Piscataway, New Jersey, United States
drum-cussac_logo Drum Cussac.
Drum Cussac is a global consultancy delivering intelligence-led, technology-enabled business risk, security and crisis management solutions.
Consulting, Cyber Security, Information Technology, Risk Management, Security, Software Bournemouth, Bournemouth, United Kingdom
cybertiger_logo CyberTiger
CyberTiger is an Asian marketing gateway focused on bridging between international mobile application developers to Japanese publishers.
Cyber Security, Internet, Marketing Tokyo, Tokyo, Japan
codemettle-llc_logo CodeMettle
CodeMettle optimizes end-to-end application, network, security and service management for complex IT operations.
Cyber Security, Information Technology, Security, Software Atlanta, Georgia, United States
trustmo-info_logo Trustmo Info
Trustmo Info is an information security products and technology development company. NEEQ:839195
Cyber Security, Information Technology, Security Guangzhou, Guangdong, China
kalepso_logo Kalepso
Kalepso unlocks the power of sensitive big data and data sharing, through patent-pending privacy.
Big Data, Cyber Security, Database, Information Services, Information Technology, Privacy Montrรฉal, Quebec, Canada
crest-data-systems_logo Crest Data Systems
Crest Data Systems is a provider of custom solutions in software technologies.
Analytics, Consulting, Cyber Security, Information Technology, Software San Jose, California, United States
firmex_logo Firmex
Firmex is a global provider of virtual data rooms where more deals, diligence, and compliance gets done.
Cyber Security, FinTech, Legal, SaaS, Software Toronto, Ontario, Canada
incito_logo Incito
Incito builds and provides business Insurance for small businesses and independent professionals.
Consulting, Cyber Security, Insurance, InsurTech Stockholm, Stockholms Lan, Sweden
newipnow-com-premium-private-proxies_logo NewIPNow.com Premium Private Proxies
NewIPNow.com offers HTTP private proxies from multiple locations.
Cyber Security, Software Us, Picardie, France
cymotive-technologies_logo CYMOTIVE Technologies
Automotive Cyber Security on the Move.
Cyber Security Tel Aviv, Tel Aviv, Israel
alphaone-operations_logo AlphaOne Operations
AlphaOne Operations provides IT security services to help traditional MSPs โ€œcover the gapโ€ in their framework.
Cyber Security, Network Security, Security Montgomery, Alabama, United States
intrusion-inc_logo Intrusion
Intrusion, Inc. is a cybersecurity company that offers its customers access to its exclusive threat intelligence database. NASDAQ:INTZ
Cyber Security, Network Security, Security Plano, Texas, United States
circle-ai_logo Circle.ai
Circle.ai API enables apps, APIs, and IoT devices to share data with networks without compromising identity, privacy, or UX.
Cyber Security, Developer APIs, Enterprise Software Oakland, California, United States
-isc-2_logo (ISC)2
(ISC)2 is the official organization that maintains and administers the CISSP certification exam.
Association, Cyber Security, Education, Internet, Non Profit, Security Clearwater, Florida, United States
ml4cyber_logo ML4Cyber
ML4Cyber provides machine learning cyber security solutions.
Computer, Cyber Security, Information Technology, Machine Learning Baltimore, Maryland, United States
atcipher_logo AtCipher
AtCipher helps company to protect data in the cloud using patent-pending key management technology that is zero knowledge.
Cloud Security, Computer, Cyber Security, Information Technology, Network Security, Software Seattle, Washington, United States
pkware_logo PKWARE
Data Protection Software
Cyber Security, Software Milwaukee, Wisconsin, United States
cyber-driveware_logo Cyber DriveWare
Cyber DriveWare is an innovative anti-malware solution, specializing in protection against business continuity disruption attacks.
Cyber Security, Information Technology, Security Herzliya, Tel Aviv, Israel
thinair_logo Thinair
ThinAir is an intelligent endpoint security solution built to keep your data safe and under your control.
Cloud Data Services, Cyber Security, Information Technology, SaaS, Security Palo Alto, California, United States
stc-amdef_logo STC AMDEF
Scientific and Technical Center "AMDEF" develop new security RTOS CUBE and provide services of security analysis for information systems.
Cyber Security, Embedded Systems, Hardware, Mobile, Operating Systems, Satellite Communication, Security Obninsk, Kaluga, Russian Federation
impervious-ai_logo Impervious.ai
Impervious builds the tools and infrastructure for the Peer-to-Peer ("P2P") internet standard.
Bitcoin, Blockchain, Communications Infrastructure, Cyber Security, Information and Communications Technology (ICT), National Security, Software, Software Engineering N/A
aci-learning_logo ACI Learning
ACI Learning trains leaders in Cybersecurity, Audit, and IT to create a personal, professional, and business outcomes that impact lives.
Cyber Security, EdTech, Education, Information Technology, Training Centennial, Colorado, United States
trustonic_logo Trustonic
Trustonic is a leading cybersecurity company for the mobile, automotive and IoT industries.
Automotive, Cyber Security, Information Technology, Internet, Mobile, Security, Software, Wearables Cambridge, Cambridgeshire, United Kingdom
pci-pal_logo PCI Pal
PCI Pal is a specialist provider of secure payment solutions for contact centers and businesses taking Cardholder Not Present payments. LSE:PCIP
Cryptocurrency, Cyber Security, Financial Services, Information Technology, Payments, Software Charlotte, North Carolina, United States
bankguard_logo Bankguard
BankGuard is involved in the research and development of countermeasures against attacks on online banking.
Cyber Security, Network Security Tokyo, Tokyo, Japan
money2020_logo Money20/20
Money20/20 is a provider of a marketplace for ideas, connections, and deals in payments and financial services.
Banking, Biometrics, Blockchain, Cyber Security, Digital Marketing, Financial Services, Information Technology, Marketplace, Mobile Payments, Payments New York, New York, United States
blueally_logo BlueAlly
BlueAlly has been serving as a prime source of IT Services for customers both large and small.
Cyber Security, Information Technology Vienna, Virginia, United States
stormagic_logo StorMagic
StorMagic engages in simplifying storage and security from the edge to the core.
Cloud Security, Cyber Security, Data Storage, Information Technology, Software, Virtualization Bristol, Bristol, City of, United Kingdom
myriad360_logo Myriad360
Myriad put together huge thought and smooth delivery to unleash the potential of techย for you, Supply supports more than 10,000 customers.
Cloud Computing, Consulting, Cyber Security, Infrastructure, Security, VoIP New York, New York, United States
cyex-oรผ_logo Cyex
cyex develops an AI-based tool that generates personalized cybersecurity exercises with a special focus on cyber threat specifics.
Artificial Intelligence, Cyber Security, Information Technology, Machine Learning Tallinn, Harjumaa, Estonia
secpod-technologies_logo SecPod Technologies
SecPod is a SaaS-based cybersecurity products and technology company.
Cyber Security, SaaS, Software Bangalore, Karnataka, India
velas_logo Velas
Velas offers artifical intelligence, blockchain technology, social impact, cybersecurity, design thinking and decentralization services.
Artificial Intelligence, Cyber Security, Social Impact Zug, Zug, Switzerland
netcraft_logo Netcraft
Netcraft is an Internet services company based in Bath which provides Internet data mining and anti-cybercrime services.
Cyber Security, Fraud Detection, Government, Online Portals Bath, Bath and North East Somerset, United Kingdom
passbird_logo Passbird Research
Passbird Research is a software company.
Blockchain, Cryptocurrency, Cyber Security, IaaS, Network Security, PaaS, Payments, Security, Software Sunnyvale, California, United States
cannon-cyber-c045_logo Cannon Cyber
Transforms Security Posture from Reactive to Responsive.
Cyber Security, Security Sunnyvale, California, United States
cloak-labs_logo Cloak Labs
Cloak Labs are secure B2B messaging in the cloud.
B2B, Cloud Data Services, Collaboration, Cyber Security, Enterprise Software, Messaging, Security, Software Redwood City, California, United States
srm-solutions_logo Security Risk Management Ltd
SRM are able to demystify information and cyber security, helping you to understand and manage the risks to your information.
Consulting, Cyber Security, Information Services, Information Technology, Test and Measurement Newcastle Upon Tyne, Newcastle upon Tyne, United Kingdom
tutanota_logo Tutanota
Tutanota is an end-to-end encrypted mail service that encrypts the entire mailbox.
Cyber Security, Data Integration, Email, Messaging Hanover, Niedersachsen, Germany
ecs-federal_logo ECS Federal
ECS is a technology company providing cybersecurity, cloud solutions and complementary IT capabilities.
Consulting, Cyber Security, Information Technology, Software Fairfax, Virginia, United States
adt-caps-co_logo SK Shielders
SK Shielders is a life care platform company that provides security and safety care services.
Cloud Security, Cyber Security, Physical Security, Security Seongnam, Kyonggi-do, South Korea
adbonitas_logo Adbonitas
Adbonitas is an internet security company that aims to make digital a safer space for brands.
Cyber Security Cologne, Nordrhein-Westfalen, Germany
ima_logo IMA
IMA is a rich and diverse product hub, delivering enterprise ready innovation . IMA serves the Financial, Enterprise & Telco verticals.
Big Data, Cyber Security, Digital Marketing, Internet, Internet of Things, Telecommunications, Wireless Tel Aviv, Tel Aviv, Israel
rang-technologies-inc_logo Rang Technologies Inc.
Rang Technologies has been a leading diversity firm specializing in Analytics and Data Science solutions and comprehensive IT staffing.
Analytics, Artificial Intelligence, Big Data, Business Intelligence, Cyber Security, Data Mining, Information Technology, Internet of Things, IT Management, Machine Learning Piscataway, New Jersey, United States
phantom-login-3_logo Phantom LogIn
Authentication technology. Prevents most known password attacks while making the login process enjoyable for the user
Cyber Security, Mobile San Francisco, California, United States
ericom-software_logo Ericom Software
Global Leader in Enterprise-grade Cybersecurity & Access Solutions to securely Deliver Desktops, Applications & Web Content to Any Device
Cyber Security, Enterprise Software, Security, Software, Virtual Desktop Closter, New Jersey, United States
owl-cyber-defense_logo Owl Cyber Defense
Owl Cyber Defense offers cyber security, cyber defense, and critical infrastructure security.
Cyber Security, Information Technology, Network Security, Security Columbia, Maryland, United States
esn-global-media_logo ESN Global Media
ESN Global Media specializes in marketing, data management, websites, apps, cyber security, cloud, firewall, network, and other IT services.
Cloud Data Services, Cyber Security, Internet, Marketing, Web Apps Ramat Gan, Tel Aviv, Israel
arete-advisors_logo Arete Advisors
Arete Advisors is a cybersecurity company providing an accelerated incident response for detecting and responding to cyber-attacks.
Computer, Cyber Security, Network Security, Security New York, New York, United States
digital-monitoring-products_logo Digital Monitoring Products
Digital Monitoring Products is a security and investigations company providing high-security ids systems and store intrusion systems.
Cyber Security, Manufacturing Springfield, Missouri, United States
zyraz-technology_logo Zyraz Technology
Zyraz Technology is a merger between a chocolate manufacturing company and a franchise of internet Media.
Cyber Security, Financial Services, FinTech, Food and Beverage, Pharmaceutical Damansara New Village, Kuala Lumpur, Malaysia
silobreaker_logo Silobreaker
Silobreaker builds intelligence technology that makes sense of unstructured data on the web.
Artificial Intelligence, Big Data, Cyber Security, Data Mining, Machine Learning, National Security, Security, Text Analytics London, England, United Kingdom
stratascale_logo Stratascale, An SHI Company
Delivers โ€œDigital Agilityโ€ using a consultative approach to design, delivering, and supporting technology to transform your business
Cloud Computing, Cyber Security, Enterprise Software Austin, Texas, United States
thinkst-canary_logo Thinkst Canary
Thinkst Canary provide high fidelity honeypots that deploy in minutes (to let you know when your networks have been breached).
Cyber Security, Intrusion Detection, Network Security, Security, Software Australia, Isabela, Philippines
halo-privacy_logo Halo Privacy
Halo Privacy specializes in total digital privacy for individuals, small groups, and teams.
Cyber Security, Network Security, Privacy Seattle, Washington, United States
comprinno-technologies-pvt-ltd_logo Comprinno Technologies Pvt. Ltd.
IT infrastructure engineering and solutions company. Works in the domains of Cloud Computing, Big Data, DevOps, Storage and Security.
Big Data, Cloud Computing, Cyber Security Bangalore, Karnataka, India
bi-zone_logo BI.ZONE
BI.ZONE is disrupting the cyber security industry with its visionary approach to protecting clients networks.
Cyber Security, Information Technology Moscow, Moscow City, Russian Federation
globalsign_logo GMO GlobalSign
Globalsign enhances digital life by making interactions safer with trusted identities.
Cloud Security, Cyber Security, Identity Management, Security Portsmouth, New Hampshire, United States
thales-e-security_logo Thales E-Security
Thales e-Security is a leading supplier of data protection and cyber security solutions to the financial services, government technology.
Cloud Security, Computer, Cyber Security, Information Technology, Network Security, Security Plantation, Florida, United States
intrinsic_logo Intrinsic
Intrinsic is an application security startup.
Cyber Security, Information Technology, Network Security San Francisco, California, United States
wiacts_logo NoPassword (Acquired By LogMeIn)
Modernize identity with NoPassword Human and Hidden Multi-factor Authentication, SSO and IDM.
Cyber Security, Enterprise Applications, Enterprise Software, Identity Management, Information Technology Sunnyvale, California, United States
ghost-security-group_logo Ghost Security Group
Ghost Security Group is a counter terrorism organization that combats extremism on the digital front lines using the internet as a weapon.
Cyber Security, Information Services, Information Technology Washington, District of Columbia, United States
essence_logo Essence Group
Essence is a global provider of IoT connected-living solutions for tier-1 communication, security and healthcare service providers.
Cyber Security, Health Care, Information Technology, Internet of Things, Telecommunications Herzliya, Tel Aviv, Israel
armeron_logo Armeron
A Maryland, USA-based developer of an innovative application protection platform
Computer, Cyber Security, Network Security Herzliya, Tel Aviv, Israel
breachalarm_logo BreachAlarm
BreachAlarm is an IT and services company that let user know if their password is compromised online.
Cyber Security, Information Services, Information Technology Beaumaris, Victoria, Australia
haystack-solutions_logo Haystack Solutions
Haystack Solutions helps corporations, education, and workforce development organizations to identify cybersecurity talent.
Cyber Security, Information Technology, Recruiting College Park, Maryland, United States
cipher-a105_logo Cipher
CIPHER is a global cyber security company that provides information security products and services.
Consulting, Cyber Security, Government, Information Technology, Security Miami, Florida, United States
trineba-technologies-inc_logo Trineba Technologies Inc.
Trineba is a cybersecurity company that democratizes device verification
Cyber Security, Mobile, Privacy, Security New York, New York, United States
echobase_logo EchoBase
echoBase is focused on the development of SaaS-based and cloud-based mobile applications for companies.
Cloud Computing, Cyber Security, Health Care, Information Technology, Mobile, Robotics, SaaS, Software Wake Forest, North Carolina, United States
ghostdrive_logo GhostDrive
GhostDrive is fully open source, operates on a decentralized P2P network, and committed to giving control of data privacy back to the owner.
Blockchain, Cloud Computing, Cloud Security, Cyber Security, Network Security, Software N/A
ddmtek_logo DDMTEk
DDMTEk invents approachable and affordable technology that solves cybersecurity challenges.
Cyber Security, Information Technology, Network Security, Software Wake Forest, North Carolina, United States
nexusguard_logo Nexusguard
Nexusguard is the leading provider of DDoS Mitigation, ensuring uninterrupted internet service, visibility, optimization and performance.
Cloud Security, Cyber Security, Network Security, Security, Software Tsuen Wan, New Territories, Hong Kong
arbor-networks_logo Arbor Networks
Arbor defines the leading edge of network security and management for todayโ€™s network operators.
Cyber Security, Enterprise Software, Infrastructure, Network Security, Security, Virtual Reality Burlington, Massachusetts, United States
evidence-solutions_logo Evidence Solutions
Evidence Solutions is a premier forensic company founded in 1982
Cyber Security, Database, Information Technology, Legal, Software, Telecommunications Tucson, Arizona, United States
remprex-llc_logo REMPREX
REMPREX is a transportation company that provides terminal operations, engineering, and security services.
Cyber Security, Information Technology, Security Willowbrook, Illinois, United States