Organizations in Cyber Security
Name | Industry | Address | |
---|---|---|---|
PCS PCS provides IT Outsourcing, help desk support, managed services, cloud services, data backup, network support and cybersecurity services. |
Cloud Computing, Cyber Security, Information Technology | Moorestown, New Jersey, United States | |
Experis Israel Experis Israel is an information technology and services company. |
Business Intelligence, Cyber Security, Information Technology, Professional Services, Project Management, Recruiting | Tel Aviv, Tel Aviv, Israel | |
Cloud Distribution Cloud Distribution is a next generation value-added distributor that specialises in bringing , securityโ, networking and storageโ solutions. |
Cyber Security, Information Technology | Reading, Reading, United Kingdom | |
MOXFIVE MOXFIVE specializes in the technical advisory service to minimize the business impact of cyberattacks. |
Advice, Cyber Security, Information Technology | Mclean, Virginia, United States | |
The Email Laundry The Email Laundry develop email security solutions to make email safe! |
Cyber Security, Network Security, Software | Kildare, Kildare, Ireland | |
Viadex Viadex provides a global IT supply chain, IT infrastructure, IT procurement, cybersecurity, cloud solutions and professional services. |
Consulting, Cyber Security, Information Technology | Surbiton, Kingston upon Thames, United Kingdom | |
Gryphon Strategies Gryphon Strategies is a security and investigations company providing anti-corruption investigations services. |
Cyber Security, Information Technology, Security | White Plains, New York, United States | |
Critical Stack Critical Stack is revolutionizing the way organizations select, acquire, deploy, and operate visibility and security tools. |
Cyber Security, Network Security, Sensor, Software | Boston, Massachusetts, United States | |
Viria Viria renders business intelligence, cybersecurity, IT infrastructure, security technology and structural security services. |
Cyber Security, Information Technology, IT Infrastructure, Security | Vaasa, Western Finland, Finland | |
Armor Scientific Armor Scientific is a cyber-security company that delivers a hybrid identity and access management platform. |
Cyber Security, Identity Management, Information Technology, Software, Wearables | Newport Beach, California, United States | |
Kunai Labs Cybersecurity Tools Company |
Cloud Security, Cyber Security, Intrusion Detection, Penetration Testing | La Jolla, California, United States | |
Zartech Cybersecurity Products & Advisory Services Firm |
B2B, Cloud Security, Cyber Security, Information Services, Management Consulting, Training | Dallas, Texas, United States | |
Unikname Unikname is a multipurpose Decentralized Identity Platform that empowers web solutions with blockchain innovation. |
Blockchain, Cyber Security, Information Technology, Internet, Privacy, Software | Nantes, Pays de la Loire, France | |
Apricorn Apricorn, Inc. is a leader in the design and manufacture of PC storage products, utilities and accessories. |
Cyber Security, Manufacturing, Software | San Diego, California, United States | |
IOTwitt Inc Cyber security services enabling companies to encrypt communications in and between IoT devices |
Cyber Security, Information and Communications Technology (ICT), Network Security | Honolulu, Hawaii, United States | |
Envistacom Envistacom is a defense & space company that provides counterterrorism, cyber, and communications solutions. |
Cyber Security, Information Technology, Security, Telecommunications | Atlanta, Georgia, United States | |
Spiceware IT/Cloud Security Solution |
Cloud Security, Cyber Security, Information Technology, Network Security, Software | Yongdungpo, Seoul-t'ukpyolsi, South Korea | |
ESpear eSpear.com is a compliance and due-diligence solution provider. |
Banking, Compliance, Cyber Security, E-Commerce, Information Technology, Risk Management, Security | New York, New York, United States | |
Seccom Global Seccom Global stays abreast of the latest technological trends in offering IT security services that help to solve business challenges. |
Consulting, Cyber Security, Information Technology, Network Security | Sydney, New South Wales, Australia | |
UM Labs UM-Labs R&D provides Real-Time Communications Cyber Security UOS (Unicus) - protects all Data in Transit and Motion, running on any cloud. |
Cloud Security, Cyber Security, Internet of Things, National Security, Network Security, Operating Systems, Security, Video, VoIP, Wireless | London, England, United Kingdom | |
OiOIoT Smart iOT solutions for connected community projects through patented highly secure bi-directional communication. |
Cyber Security, Energy, Hardware, Smart Home, Software | Honolulu, Hawaii, United States | |
ClearOPS ClearOPS privacy tech platform offers questionnaires-as-a-service and vendor risk management to vendors. |
Cyber Security, Information Technology, Internet, Privacy, SaaS, Security | New York, New York, United States | |
Solutions By Design II, LLC Solutions By Design II is a computer software company that provides management consulting and technology services. |
Consulting, CRM, Cyber Security, Information Technology, Infrastructure, Robotics, Software | Vienna, Virginia, United States | |
Sains Sains works with government and private organizations to develop technology solutions. |
Big Data, Cloud Computing, Cyber Security, Information Technology, Infrastructure, Software | Kuching, Sarawak, Malaysia | |
Fortreum Fortreum simplifies the cybersecurity requirements process for cloud technologies to achieve authorization that enables business. |
Cloud Security, Cyber Security | Ashburn, Virginia, United States | |
Acuity Risk Management Creators of award-winning cyber, operational and IT risk management software |
Cyber Security, Information Technology, Risk Management, Security, Software | London, England, United Kingdom | |
Dynamic Systems Technology, Inc. (DysTech) Dynamic Systems Technology, Inc. (DysTech) is an IT firm offering IT solutions & services, training solutions & cybersecurity services. |
Cyber Security, Information Technology, IT Management, Software | Fairfax, Virginia, United States | |
Cotelligent India Cotelligent is a global cyber risk assurance solutions provider whose DNA is rooted in Enterprise Identity solution, Cyber advisory. |
Cyber Security, Information Technology, Software | Hyderabad, Andhra Pradesh, India | |
HAKTIV SaaS, B2B, Bug Bounty Platform, Penetration Testing, Crowdsourced Security Testing |
B2B, Cyber Security, Information Technology, Penetration Testing, SaaS | Cairo, Al Qahirah, Egypt | |
SustainaBase SustainaBase platform has everything you need for effortless, dynamic management and reporting of carbon emissions, water, waste, and more. |
Commercial, Cyber Security, Information Services, Information Technology | West Palm Beach, Florida, United States | |
Foregenix Foregenix prevents, protects, investigates, and solves serious cyberthreats for large enterprises and SMEs all around the globe. |
Consulting, Cyber Security, Information Technology, Software | Marlborough, Wiltshire, United Kingdom | |
Leapfrog IT Services Leapfrog IT Services is an information technology company offering cybersecurity and cloud services. |
Cyber Security, Information Services, Information Technology, Software | Atlanta, Georgia, United States | |
TODAQ Everyone's decentralized mobile marketplace |
Blockchain, Cyber Security, Financial Services, FinTech, Marketplace, Privacy, Virtual Currency | Toronto, Ontario, Canada | |
Netpresenter Netpresenter provides organizations with a communication platform to keep employees measurably better informed, engaged, productive |
Apps, B2B, Business Information Systems, Cyber Security, Enterprise Software, Information and Communications Technology (ICT), Messaging, SaaS, Software, Unified Communications | Beek, Limburg, The Netherlands | |
Amplicy Amplicy is a market-leading company and technology disruptor in global attack surface and vulnerability management. |
Computer, Cyber Security, Network Security | Tel Aviv, Tel Aviv, Israel | |
Meveto Meveto offers authentication solutions for protection against online thefts and cybercrimes. |
Cyber Security, Software | Lewes, Delaware, United States | |
ASC27 Artificial Intelligence & CyberSecurity |
Artificial Intelligence, Cyber Security, Information Technology, Software | Roma, Lazio, Italy | |
Innovative Solutions Innovative Solutions is a specialized professional services company. |
Cloud Security, Consulting, Cyber Security, Identity Management, Information Services, Information Technology, Penetration Testing, Predictive Analytics, Privacy | Riyadh, Ar Riyad, Saudi Arabia | |
Cyberspatial SaaS Cyber awareness platform |
Cyber Security, Information Technology, Software | N/A | |
Background Investigation Bureau (BIB) Background Investigation Bureau is a security and investigations company offering employment background screening services. |
Cyber Security, Information Technology, Security | Huntersville, North Carolina, United States | |
Chrometec Capital Venture Capital & Private Equity |
Advanced Materials, Cannabis, CleanTech, Cloud Computing, Cyber Security, FinTech, Life Science, Sustainability, Venture Capital | N/A | |
EPCOM EPCOM is a worldwide distributor for wireless and security systems. |
Consumer Electronics, Cyber Security, Electronics, Security, Telecommunications, Wireless | Miami, Florida, United States | |
VCORE Technology Partners vCORE Technology Partners provides customized IT solutions and services for more than 100 companies across the U.S. and Canada. |
Cyber Security, Information Technology, Security, Telecommunications | Scottsdale, Arizona, United States | |
KMicro Tech, Inc. Dynamics 365, MSP, MSSP, Professional Services, Azure, AWS, Office 365 |
Cloud Management, Cloud Security, CRM, Customer Service, Cyber Security, Enterprise Resource Planning (ERP), Information Technology, Professional Services, SaaS, Security | Costa Mesa, California, United States | |
Security 1st Title Security 1st Title is a provider of title insurance in Kansas. |
Cyber Security, Financial Services, Information Technology | Abilene, Kansas, United States | |
Bedrock Automation Bedrock Automation is an IT firm that deals with software development, consultation, cyber-security, supply chain and application services. |
Consulting, Cyber Security, Software | San Jose, California, United States | |
Exida Exida delivers best-in-class products, services, and solutions to both automation hardware manufacturers and process market end users. |
Cyber Security, Industrial Automation, Security | Sellersville, Pennsylvania, United States | |
ThinkingSafe ThinkingSafe operates as the global information security experts. |
Cyber Security | Egham, Surrey, United Kingdom | |
The Crow Group Crow is a leading designer and manufacturer of electronic intruder alarm systems and detection devices. OTCPINK:CRWTF |
Cyber Security, Information Technology, Manufacturing, Security | Tel Aviv, Tel Aviv, Israel | |
GuavaTech A leading managed service provider specializing in customized IT solutions for proprietary trading firms. |
Cyber Security, Financial Services, Information Technology | Chicago, Illinois, United States | |
Netasq Unified Threat Management solutions. |
Cyber Security, Information Technology, Security | Boulogne-billancourt, Ile-de-France, France | |
Lyonl Enterprise-grade cybersecurity solutions to safeguard your business from data breaches and malicious attacks. |
Cyber Security, Enterprise Software, Identity Management, Information Technology, Management Information Systems | Miami, Florida, United States | |
Superlative Technologies Superlative Technologies is an information technology company that offers cyber security and enterprise IT solutions. |
Computer, Consumer Electronics, Cyber Security, Information Technology, Security, Software | Ashburn, Virginia, United States | |
Hexagon US Federal Hexagon US Federal is a provider of integrated geospatial and technical solutions to the U.S. government. |
Consulting, Cyber Security, Geospatial | Chantilly, Virginia, United States | |
Inflow Technologies Inflow Technologies is IT infrastructure distribution services. |
Cyber Security, Information Technology, Infrastructure, Software | Bangalore, Karnataka, India | |
Magal Security Systems Magal S3 is a leading international provider of cyber and physical security, safety & site management solutions and products. NASDAQ:MAGS |
Cyber Security, IT Infrastructure, Security, Software | Yehud, HaMerkaz, Israel | |
Canopy Software Canopy is the leader in AI-powered privacy and data breach response software. |
Cyber Security, Data Mining, Legal Tech, SaaS, Security, Software | Reston, Virginia, United States | |
IDMerit iDMerit provides industry leading identity verification solutions to keep your business safe, secure and compliant while maximizing ROI. |
Cyber Security, Government, Information Technology, Security | Carlsbad, California, United States | |
CyActive CyActive is a predictive cyber security company. |
Cyber Security, Enterprise Software, Security | Be'er Sheva, HaDarom, Israel | |
PRODAFT SARL PRODAFT is a pioneering company in the cyber threat intelligence industry, supporting private and public sectors globally with its solutions |
Commercial, Cyber Security, Finance, Information Technology, Internet, Telecommunications | Yverdon-les-bains, Vaud, Switzerland | |
Sensato Sensato Cybersecurity Solutions provides risk assessment, penetration testing, security operations, executive guidance. |
Computer, Cyber Security, Software | New Jersey, Saint Patrick, Trinidad and Tobago | |
SinglePoint Global SinglePoint Global serves the needs of customers with a diversified suite of IT services. |
Cloud Computing, Consulting, Cyber Security, Information Services, Information Technology, Network Security, VoIP | Ashburn, Virginia, United States | |
Penta Penta is a Swiss private cloud IT provider specializing in sensitive industries requiring reliability, security and regulatory compliance. |
Cloud Computing, Cloud Data Services, Cloud Infrastructure, Cloud Management, Cloud Security, Cyber Security, Information Technology | Geneva, Geneve, Switzerland | |
2Keys 2Keys was founded in 1998 on the security principles of Confidentiality, Availability, Integrity and Privacy. |
Cyber Security, Financial Services, Information Technology, Security, Software | Ottawa, Ontario, Canada | |
CSA CSA designs, implements and runs technology solutions for clients in a high performance, secure and cost effective way. |
Cyber Security, Information Technology | Wickham, New South Wales, Australia | |
ILI.DIGITAL ILI.DIGITAL is a digital business model transformation company. |
Cyber Security, Innovation Management, Management Consulting, Software, UX Design, Virtual Reality | Karlsruhe, Baden-Wurttemberg, Germany | |
Enterprise Security Enterprise Security offers multi-branded access control systems, CCTV, sound masking, gunshot detection, cybersecurity and IT services. |
Cyber Security, Information Technology, Public Safety, Security | Yorba Linda, California, United States | |
CyberPower CyberPower manufactures computer system. |
Computer, Cyber Security, Manufacturing, Software | City Of Industry, California, United States | |
PrivacyProtector PrivacyProtector offers internet privacy protection services such as user traffic encryption and fragmentation. |
Cyber Security, Identity Management, Privacy, Security | Cracow, Malopolskie, Poland | |
MacAulay Brown MacB has been providing ground breaking engineering-services and product solutions. |
Cyber Security | Dayton, Ohio, United States | |
RootSecure RootSecure is a industry leading CyberRisk Platform which provides information security, compliance, and risk analytics solutions. |
Analytics, Compliance, Cyber Security, Machine Learning, Risk Management, SaaS, Security | Kitchener, Ontario, Canada | |
NVISO BE NVISO was founded by a group of security professionals working in the Cyber Security industry. |
Cyber Security | Brussels, Brussels Hoofdstedelijk Gewest, Belgium | |
Saudi PenTesting Company Saudi PenTesting Company provide services related to Cybersecurity, Artificial Intelligence, Machine Learning, and Intelligent Systems. |
Artificial Intelligence, Business Intelligence, Computer Vision, Cyber Security, Facial Recognition, Image Recognition, Intelligent Systems, Machine Learning, Penetration Testing, Project Management | Khobar, Ash Sharqiyah, Saudi Arabia | |
AuthenTec AuthenTec is a tech security company providing computer and mobile safety, identity management, biometrics, and touch control solutions. NASDAQ:AUTH |
Biometrics, Cyber Security, Identity Management, Mobile, NFC, Security, Semiconductor, Sensor | Melbourne Beach, Florida, United States | |
Prescient Security Prescient Security specializes in cyber security auditing and testing. |
Computer, Cyber Security, Network Security | New York, New York, United States | |
UPX Technologies UPX Technologies is a specialist in network protection, information security and content delivery services. |
Cyber Security, Information Technology, Internet | Campina, Sao Paulo, Brazil | |
Brainwave Science Brain Fingerprinting, Counter-terrorism technology, Intelligence, Investigations, Border Security, Law Enforcement, National Security, |
Association, Consulting, Cyber Security, Government, Homeland Security, Information Technology, Intelligent Systems, Law Enforcement, National Security, Security | Southborough, Massachusetts, United States | |
Tesorion.nl Tesorion offers cyber security solutions to companies securing their industrial, official, cloud, mobile, & IoT data. |
Cloud Security, Cyber Security, Network Security | Leusden, Utrecht, The Netherlands | |
BUFFERZONE Security Ltd BUFFERZONE endpoint security solution protects enterprises from malicious exploits including Ransomware, Zero-Day, Phishing Attacks etc. |
Cyber Security, Enterprise Software, Security | Tel Aviv, Tel Aviv, Israel | |
Valiant Solutions, LLC Valiant Solutions is an information technology company that offers Information Security services. |
Cyber Security, Information Technology, Security | Washington, District of Columbia, United States | |
ItsMe!Rocks Inc. A password free Ubercloud for all your cloud content. Secure files and directories inside your Box, Dropbox and even Facebook account. |
Cloud Computing, Cloud Security, Cyber Security, File Sharing, Security | Reisterstown, Maryland, United States | |
Blue Equinox Blue Equinox offers cloud and managed services, cybersecurity, IoT and consulting services. |
Cloud Data Services, Consulting, Cyber Security | Nashville, Tennessee, United States | |
Mandrill Mandrill is a reliable, scalable, and secure delivery API for transactional emails from websites and applications. |
Apps, Cyber Security, Information Technology, Internet, Software | Beijing, Beijing, China | |
FortMesa FortMesa is a security software company that converts the entire workforce into a cyber army with on-demand security culture. |
Compliance, Cyber Security, Information Technology, Risk Management, Security, Software | Spencertown, New York, United States | |
Stratign FZE Holds globe in Communication Interception, Signal Processing Systems, Communication Jamming and Communication Security Systems |
Cyber Security, Information Technology, Security, Telecommunications | Dubai, Dubai, United Arab Emirates | |
Deepinfo Empower your security with the most comprehensive Internet data. |
Big Data, Cloud Security, Cyber Security | Paris, Ile-de-France, France | |
Genians, Inc. Genians reimagines NAC by Device Platform Intelligence to ensure the highest levels of security and IT operational efficiency. KOSDAQ:263860 |
Cyber Security, Government, Information Technology, IT Management, Network Security, Security | Anyang, Kyonggi-do, South Korea | |
Key IVR Key IVR is a privately-owned business offering automated payment services internationally. |
Call Center, Compliance, Computer, Cyber Security, Enterprise Software, Financial Services, Information Technology, Payments, Software, Telecommunications | Armthorpe, Doncaster, United Kingdom | |
WishKnish Blockchain Technology Company |
Blockchain, Cryptocurrency, Cyber Security | Washington, District of Columbia, United States | |
ControlC ControlC is an automated solution that will monitor your clipboard and store the data for you so you can later share or retrieve for |
Cloud Data Services, Cyber Security, Data Center, Information Technology | N/A | |
LinkShadow LinkShadow is a next-generation cybersecurity analytics platform. |
Analytics, Cyber Security, Information Technology | Athens, Georgia, United States | |
LMG Security LMG Security is a cybersecurity consulting, research and education firm. |
Advice, Compliance, Cyber Security, Security, Training | Missoula, Montana, United States | |
JustProtect JustProtect is a platform that helps enterprises simplify the process of distributing internal and third-party assessments. |
Analytics, Cyber Security, Risk Management, SaaS, Software | Tampa, Florida, United States | |
UN1QUELY A premium software development and cybersecurity services provider driven by senior talent, strong culture and empowering passion |
Cloud Security, Consulting, Cyber Security, Enterprise Software, Intrusion Detection, Penetration Testing, Quality Assurance, Software, Software Engineering | Novi Sad, Vojvodina, Serbia | |
Softcamp Document security (e-DRM) and Data sanitization (CDR) solution provider KOSDAQ:258790 |
Cyber Security, Information Technology, Security, Software | Seongnam, Kyonggi-do, South Korea | |
Open Bug Bounty Free Bug Bounty Program and Coordinated Vulnerability Disclosure Platform |
Cyber Security | N/A | |
ARX Alliance Ltd. UK based cyber-security platform |
Cyber Security, Information Technology, Software | London, England, United Kingdom | |
Alt-N Technologies Alt-N Technologies develops email and email security software. |
Computer, Cyber Security, Information Technology, Internet, Internet of Things, Messaging, Robotics, Software | Grapevine, Texas, United States | |
SKYSENSE Skysense brings safety and security in the airspace by turning radio signals into actionable information. |
Communications Infrastructure, Cyber Security, Physical Security, Satellite Communication | Kista, Stockholms Lan, Sweden | |
Kyrus Kyrus provides computer security, vulnerability research, reverse engineering, malware analysis, and custom development. |
Cyber Security | Washington, District of Columbia, United States |