Organizations in Cyber Security

Name Industry Address
paymentworks_logo PaymentWorks
PaymentWorks is a security platform that enables enterprises to mitigate B2B payment fraud risk and ensure regulatory compliance.
Cyber Security, FinTech, Identity Management, Information Technology, Payments Waltham, Massachusetts, United States
argus-cyber-security_logo Argus Cyber Security
Argus is a global leader in automotive cyber security, helping OEMs and their suppliers protect their fleets against cyber-attacks
Automotive, Cyber Security, Service Industry Tel Aviv-yafo, Tel Aviv, Israel
threatconnect-inc-_logo ThreatConnect
ThreatConnect fuses intelligence, automation, orchestration, and response to enable organizations to be more proactive, and efficient.
Analytics, Cyber Security, Information Technology, Network Security, Security, Software Arlington, Virginia, United States
jask-labs-inc_logo JASK
JASK is a SOC Company which transforms security analyst workflows through intelligence and automation.
Cyber Security, Security, Software Austin, Texas, United States
sam-seamless-network_logo SAM Seamless Network
SAM is a cybersecurity company that specializes in network and IoT device security for both consumers and small and medium-sized businesses.
Cyber Security, Enterprise Software, Internet of Things, Network Security, Software Tel Aviv, Tel Aviv, Israel
envelop-risk-analytics_logo Envelop Risk
Envelop Risk is a global specialty cyber and emerging risk underwriting firm.
Cyber Security, Information Technology Bristol, Bristol, City of, United Kingdom
identiv_logo Identiv
A global security technology company that establishes trust in the connected world, including premises, information, and everyday items. NASDAQ:INVE
Cyber Security, Developer Platform, Hardware, Identity Management, Internet of Things, Network Security, NFC, RFID, Security Fremont, California, United States
cybera-global_logo CYBERA
We developed a platform to support customers who've been victims of scam/fraud, and built the world's first real-time cybercrime watchlist.
Banking, Business Intelligence, Cryptocurrency, Cyber Security, Financial Services, Law Enforcement, SaaS New York, New York, United States
truffle-security_logo Truffle Security
Truffle Security is an open source cybersecurity company that offers solutions for finding and remediating leaked software credentials.
Cyber Security, Information Technology, Network Security, Software San Francisco, California, United States
cyence_logo Cyence
Cyence empowers the insurance industry to understand the economic impact of cyber risk.
Computer, Cyber Security, Insurance, Software San Mateo, California, United States
remediant_logo Remediant
Remediant provides enterprises with Privileged Access Management (PAM) software to help them protect their accounts from misuse and abuse.
Cyber Security, Enterprise Software, Information Technology, Software San Francisco, California, United States
scadafence_logo SCADAfence
SCADAfence secures industrial networks as they increase automation, digitization and connectivity
Cyber Security, Homeland Security, Network Security, Security Tel Aviv, Tel Aviv, Israel
certifid_logo CertifID
CertifID is a SaaS security platform used to validate identity and securely transfer bank account information.
B2B, Cyber Security, InsurTech, Real Estate, SaaS Austin, Texas, United States
blue-hexagon_logo Blue Hexagon
Blue Hexagon offers an on-device machine learning-based malware detection.
Artificial Intelligence, Cyber Security, Machine Learning, Software San Francisco, California, United States
continuum-security-sl_logo IriusRisk
The automated threat modeling platform trusted by global organisations
Cyber Security, Enterprise Software, Information Technology, Security, Software Huesca, Aragon, Spain
castle-2_logo Castle
Account security and fraud prevention for developers, teams, and enterprises.
Cyber Security, FinTech, Fraud Detection, Internet, Security San Francisco, California, United States
bitmex-bitcoin-mercantile-exchange_logo BitMEX
BitMEX is a P2P crypto-coin trading platform.
Bitcoin, Cyber Security, Financial Exchanges, FinTech, Security Mahรฉ, Beau Vallon, Seychelles
nethone_logo Nethone
Know Your Usersโ„ข to resolve fraud. Gain more loyal customers, reject only fraudsters.
Artificial Intelligence, Business Intelligence, Cyber Security, FinTech, Fraud Detection, Machine Learning, Risk Management, SaaS Warsaw, Mazowieckie, Poland
intertrust-technologies_logo Intertrust
Intertrust is a software company providing trusted computing products and services to leading global corporations NASDAQ:ITRU
Cyber Security, Enterprise Software, Internet of Things, Mobile Apps, Privacy, Security, Software, Video Streaming Milpitas, California, United States
axonius_logo Axonius
Axonius is an asset inventory management platform that focuses on cybersecurity solutions and policies.
Asset Management, Cloud Security, Cyber Security, Information Technology, Network Security New York, New York, United States
wirewheel-io_logo WireWheel.io
WireWheel.io is a software company that revolutionizes data privacy and protection as-a-service for companies.
Compliance, Cyber Security, Privacy, Software Arlington, Virginia, United States
vequrity_logo RangeForce
RangeForce is a SaaS-based human cyber defense readiness platform that continuously develops defensive skills against the latest threats.
Cyber Security, Information Technology, SaaS, Security, Software, Training Manassas, Virginia, United States
riskrecon_logo RiskRecon
RiskRecon is a leading third-party/vendor cyber risk solutions provider
Cyber Security, Network Security, SaaS, Security Salt Lake City, Utah, United States
prismo-systems-inc_logo Prismo Systems
Prismo closes the gap between risk and response, protecting users, workloads, and applications from the datacenter to the cloud.
Cloud Security, Compliance, Computer, Cyber Security, Information Technology, Network Security, Software Santa Clara, California, United States
inpher-io_logo Inpher.io
Inpher.io is a secret computing technology for privacy-preserving machine learning and AI.
Artificial Intelligence, Cyber Security, Machine Learning, Predictive Analytics New York, New York, United States
securden_logo Securden
Securden is a Windows Privilege Management Software.
Artificial Intelligence, Cyber Security, Software Newark, Delaware, United States
kondukto_logo Kondukto
Kondukto is an application security orchestration and correlation platform.
Computer, Cyber Security, Network Security, Security Wilmington, Delaware, United States
calamu-technologies_logo Calamu Technologies
Calamu patented solution allows critical digital assets to be stored in the cloud with complete security.
Cyber Security, Data Storage, Information Services Clinton, New Jersey, United States
cybavo_logo Cybavo
Cybavo provides digital asset custody infrastructure for crypto businesses.
Bitcoin, Blockchain, Cryptocurrency, Cyber Security, Financial Services, FinTech, Identity Management, Information Technology, Internet, Software Singapore, Central Region, Singapore
monad-3a10_logo Monad
Monad makes security data easy and accessible for DevOps and cloud engineering teams.
Compliance, Cyber Security, Network Security San Francisco, California, United States
c2a-security_logo C2A Security
C2A Security is a trusted end-to-end automotive cybersecurity solutions provider.
Automotive, Cyber Security Jerusalem, Yerushalayim, Israel
dragos_logo Dragos
Dragos is an industrial cybersecurity company that detects and responds to threats in industrial controls systems.
Cyber Security, Network Security, Security Hanover, Maryland, United States
binalyze_logo Binalyze
Binalyze develops digital forensic tools for enterprises that help in understanding the full extent of a cyber breach.
Cyber Security, Information Technology, Law Enforcement, Software Tallinn, Harjumaa, Estonia
rsam_logo Rsam
Rsam is a platform-based solution that supports a unified approach to managing risks while adhering to regulations and policies.
Compliance, Computer, Cyber Security, Risk Management, Security, Software Secaucus, New Jersey, United States
verodin_logo Verodin
Verodin is a business platform that enables organizations to measure, manage, and improve their cybersecurity effectiveness.
Cloud Security, Compliance, Cyber Security, Intrusion Detection, Network Security, Penetration Testing, Security, Software Mclean, Virginia, United States
cysiv_logo Cysiv
Cysiv is combines all the elements of an advanced, proactive, threat hunting SOC with a managed security stack for hybrid cloud.
Cyber Security, Information Technology, SaaS, Software Irving, Texas, United States
half-square-security_logo Half Square
Half Square Security is a global leader in vulnerability management that protects Fortune 500 companies, & governments globally
Aerospace, Cloud Security, Cyber Security, Fraud Detection, Information Technology, Network Security, Penetration Testing, Space Travel Wellington, Texas, United States
cylera_logo Cylera
Cylera is a healthcare IoT cybersecurity and intelligence company used to protect healthcare organizations.
Cyber Security, Health Care, Internet of Things, Medical New York, New York, United States
strike-graph_logo Strike Graph
Strike Graph is a compliance SAAS solution simplifying cyber security certifications.
Compliance, Cyber Security, SaaS Seattle, Washington, United States
borneodata_logo Borneo
Borneo is a data security platform that helps companies to prevent sensitive data misuse, stop data leaks, and drive privacy compliance.
Cloud Infrastructure, Cloud Security, Cyber Security, SaaS, Security Singapore, Central Region, Singapore
netacea_logo Netacea
Netacea is a bot management using Intent Analytics powered by machine learning- a sophisticated approach for sophisticated threats.
Analytics, Artificial Intelligence, Cyber Security, Information Technology, Internet, Machine Learning, Network Security, SaaS, Security Manchester, Manchester, United Kingdom
canonic-security_logo Canonic Security
Canonic Security is a cybersecurity startup protecting SaaS business applications.
Cyber Security, Network Security, SaaS Tel Aviv, Tel Aviv, Israel
zeronorth_logo ZeroNorth
ZeroNorth provides applications for business development.
Cloud Security, Cyber Security, Information Technology, Internet, Security, Software Boston, Massachusetts, United States
sequretek_logo Sequretek
Sequretek will help you secure and manage information assets in all digital platforms.
Cyber Security, Identity Management, Security Mumbai, Maharashtra, India
fido_logo Fido
A PaaS to fuel third party apps with digital footprints powered by a library of ready-to-use ML based scoring models
Artificial Intelligence, Cyber Security, Identity Management, Lead Management, Machine Learning, PaaS, Payments, Risk Management, Security Milano, Lombardia, Italy
socure_logo Socure
Socure is a predictive analytics platform for digital identity verification of consumers.
Artificial Intelligence, Cyber Security, Identity Management, Machine Learning, Predictive Analytics Incline Village, Nevada, United States
deepfactor_logo DeepFactor
DeepFactor enables developers to ship secure code without sacrificing productivity by observing application telemetry events.
Cyber Security, Developer Tools, SaaS, Software San Jose, California, United States
idenfy_logo IDenfy
iDenfy software makes online identity verification through smartphone or any computer device.
Cyber Security, Identity Management, Online Portals, Software Kaunas, Kauno Apskritis, Lithuania
hacken_logo Hacken
Hacken is a tire 1 WEB3 cybersecurity consulting and product company
B2B, Blockchain, Cyber Security, Network Security, Penetration Testing, Software Kyiv, Kyyiv, Ukraine
skycure_logo Skycure
Skycure offers technology that provides a seamless and holistic solution for organizationsโ€™ mobile security needs.
Cyber Security, Mobile, Network Security, Security Palo Alto, California, United States
nantero_logo Nantero
Nantero is a next-generation memory technology that, packs massive amounts of storage and is nonvolatile.
Computer, Cyber Security, Hardware, Manufacturing, Nanotechnology, Semiconductor, Software Woburn, Massachusetts, United States
scythe_logo SCYTHE
SCYTHE is an adversary emulation platform for the enterprise and cybersecurity consulting market.
Cyber Security, Enterprise, Risk Management Arlington, Virginia, United States
vmray-gmbh_logo VMRay
VMRay Analyzer is a breakthrough solution for dynamic analysis of advanced threats, including zero day and targeted attacks.
Cyber Security, Information Technology, Network Security Bochum, Nordrhein-Westfalen, Germany
sekoia-2_logo SEKOIA
SEKOIA is the SaaS cybersecurity that analyzes and understands emerging threats.
Cyber Security, SaaS, Software Paris, Ile-de-France, France
id-experts_logo IDX
IDX is a consumer privacy platform that enables consumers to take control of their privacy and identity.
Cyber Security, Fraud Detection, Privacy, Security, Software Portland, Oregon, United States
sysdig_logo Sysdig
Sysdig is driving the standard for cloud and container security.
Cloud Computing, Cloud Security, Cyber Security, SaaS San Francisco, California, United States
phishlabs_logo PhishLabs
PhishLabs is the leading provider of 24/7 cybersecurity services that protect against threats that exploit people.
Cyber Security, Security, Software Charleston, South Carolina, United States
thycotic-software_logo Thycotic
Thycotic protects companies from cyber attacks with innovative technologies that secure privileged accounts across the modern enterprise.
Cyber Security, Enterprise Software, Identity Management, Information Technology, Software Washington, District of Columbia, United States
limacharlie_logo LimaCharlie
LimaCharlie is an Information security tools & infrastructure delivered in a manner similar to AWS.
Cloud Security, Cyber Security, Information Technology, Network Security, SaaS Walnut, California, United States
carbide_logo Carbide
SaaS for SMB to attain and maintain compliance with information security and privacy standards (SOC2, HIPAA, GDPR, CCPA ISO and more).
Compliance, Cyber Security, Information Technology, SaaS, Security, Software Sydney, Nova Scotia, Canada
axiad-ids-inc_logo Axiad
Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.
Cyber Security, Identity Management, Software Santa Clara, California, United States
mirovia-security_logo LayerX Security
Securing the core workspace in the modern enterprise.
Cyber Security, Enterprise Software, SaaS, Web Browsers Tel Aviv, Tel Aviv, Israel
jscrambler_logo Jscrambler
Jscrambler is the leading client-side security solution for JavaScript protection and webpage real-time monitoring.
Cyber Security, Security, Web Apps, Web Development Porto, Lisboa, Portugal
pqshield_logo PQShield
At PQShield, we help customers transition their product lines from legacy RSA and Elliptic Curve cryptography to quantum-safe standards.
Cyber Security, Software Oxford, Oxfordshire, United Kingdom
cyvatar-ai-inc_logo Cyvatar.ai
Automated cybersecurity management platform enabling SMBs to effectively deploy & maintain cybersecurity while accelerating business growth.
Cloud Security, Compliance, Cyber Security, Information Technology, Network Security, Operating Systems, Risk Management, Small and Medium Businesses, Subscription Service Irvine, California, United States
breachlock-inc_logo BreachLock Inc.
Pen Testing as A Service (PTaaS) | World's first full stack PTaaS powered by Certified Hackers and AI
Artificial Intelligence, Cyber Security, SaaS New York, New York, United States
cyberhash_logo CyberHash
World's Leading Distributed Storage Provider
Blockchain, Cloud Storage, Cyber Security, Data Storage Singapore, Central Region, Singapore
cybersmart-2_logo CyberSmart
CyberSmart is an automated end-to-end cyber security compliance platform that helps SMB's.
Compliance, Cyber Security, Network Security, SaaS London, England, United Kingdom
proficio_logo PROFICIO
Proficio is an award wining cyber security service provider helping customers detect and prevent security breaches.
Cloud Data Services, Cryptocurrency, Cyber Security, Software Carlsbad, California, United States
ockam_logo Ockam
Trust Data-in-Motion.
Cloud Computing, Cyber Security, Developer Tools, Enterprise Software, Identity Management, Network Security, Open Source, Security, Software San Francisco, California, United States
logichub_logo LogicHub
LogicHub automates security analysts' intelligence process to reduce breach detection time.
Artificial Intelligence, Cyber Security, Network Security, SaaS, Security Mountain View, California, United States
deep-instinct_logo Deep Instinct
Deep Instinct applies deep learning to cybersecurity, offering zero-day attack protection.
Artificial Intelligence, Cyber Security, Machine Learning, Network Security, Security New York, New York, United States
risklens_logo RiskLens
RiskLens empowers risk officers and CISOs to manage their cyber risk from a business perspective by quantifying it in financial terms
Cyber Security, Information Services, Risk Management, SaaS, Security Spokane, Washington, United States
guardian-mobile-firewall_logo Guardian
Guardian protects and secures privacy and data while using apps and browsing the web on an iOS device.
Cyber Security, Information Technology, Privacy, Software San Francisco, California, United States
cybermdx_logo CyberMDX
CyberMDX offers a cybersecurity solution for medical devices and clinical assets.
Cyber Security, Enterprise Software, Health Care, Medical Device, Network Security, Software New York, New York, United States
crypto-quantique_logo Crypto Quantique
Crypto Quantique offers hardware based cyber-security solution for authentication and encryption in a wired local network.
Cyber Security, Hardware, Software, Wired Telecommunications City Of London, England, United Kingdom
ThreatBlockr_logo ThreatBlockr
ThreatBlockr is the only active defense solution that blocks every threat from every path in your network. Block. Every. Threat.
Cyber Security, Software Washington, District of Columbia, United States
dasera_logo Dasera
Daseraโ€™s data security platform combines collaboration and automation to ensure data is protected from creation to deletion.
Cloud Security, Cyber Security, Software Mountain View, California, United States
strike-8f4c_logo Strike
Securing worldwide enterprises by connecting them with top cybersecurity professionals through Continuous Pentesting.
Cyber Security, Information Technology, Penetration Testing London, England, United Kingdom
garrison-technology_logo Garrison Technology
Garrison Technology is a cybersecurity firm that offers a secure remote browsing technology.
Computer, Cyber Security, Network Security London, England, United Kingdom
cyberowl_logo CyberOwl
CyberOwl offers an early warning system for cyber attacks through real-time monitoring of high value targets for malicious behavior.
Analytics, Computer, Cyber Security, Internet of Things, Network Security London, England, United Kingdom
sternum_logo Sternum
Sternum's patented technology shifts the paradigm on how organizations develop, protect and manage IoT, IoMT and IIoT devices.
Cyber Security, Data Visualization, Internet of Things, Software Tel Aviv, Tel Aviv, Israel
sevco-security_logo Sevco Security
Sevco Security is a provider of cybersecurity services and products for cyber experts.
Cyber Security, Information Technology, Network Security, Software Austin, Texas, United States
nsknox_logo NsKnox
NsKnox Technologies is a Fintech - Security company, revolutionizing the way organizations would protect themselves.
Cyber Security, Finance, FinTech, Payments, Security Petah Tiqva, HaMerkaz, Israel
swiss-security-solutions_logo Swiss Security Solutions LLC
Swiss Security Solutions provides customized security and investigative solutions, services and systems to help, serve, secure and care.
Consulting, Cyber Security, Government, Homeland Security, Intrusion Detection, Law Enforcement, Military, National Security, Privacy Zรผrich, Zurich, Switzerland
strongblock_logo StrongBlock
StrongBlock is a team of highly experienced blockchain, governance, security, and database technology experts.
Bitcoin, Blockchain, Cyber Security, Information Technology, Mobile Payments, Payments, Security Santa Monica, California, United States
phantom-cyber_logo Phantom
Phantom is a purpose-built, community-powered security automation, and orchestration platform.
Cyber Security, Network Security, Security Palo Alto, California, United States
dust-identity_logo DUST Identity
DUST Identity is a proprietary technology which utilizes nanodiamonds to create an unclonable identity layer on any object.
Cyber Security, Information Technology, Internet of Things, Nanotechnology, Security, Software, Supply Chain Management Boston, Massachusetts, United States
enso-security_logo Enso Security
Enso is an information security startup that offers an application security posture management solution.
Cyber Security, Information Services, Network Security, Software, Software Engineering Tel Aviv, Tel Aviv, Israel
pcloud_logo PCloud
pCloud is a provides cloud storage solutions for personal and business consumers.
Cloud Computing, Cloud Data Services, Cloud Storage, Cyber Security, Software Baar, Zug, Switzerland
blackcloak_logo BLACKCLOAK
Concierge Cybersecurity & Privacy Platform for Corporate Executives & High-Net-Worth Individuals
Cyber Security, Information Technology, Privacy Lake Mary, Florida, United States
trapx-security_logo TrapX Security
TrapX Security provides deception-based cyber security defense that rapidly detect, deceive, and defeat advanced cyber attacks.
Cloud Security, Computer Vision, Cyber Security, Network Security, Real Time, Security San Jose, California, United States
oort_logo Oort
Identity threat detection and response for enterprise security
Cyber Security, SaaS Boston, Massachusetts, United States
cyscale_logo Cyscale
Cloud-native Security and Compliance - scalable Products and Services for Cloud Cybersecurity, DevSecOps and Cloud Security Management.
Asset Management, Cloud Computing, Cloud Infrastructure, Cloud Management, Cloud Security, Compliance, Cyber Security, Information Technology, SaaS, Software London, England, United Kingdom
whitehat-security_logo WhiteHat Security
WhiteHat Security is an application security provider committed to securing digital business.
Cyber Security, Network Security, Risk Management, Security, Web Apps San Jose, California, United States
suridata-ai_logo Suridata.ai
Suridata is a data-centric SaaS Security Posture Management company
B2B, Cyber Security, Information Technology, Natural Language Processing, SaaS, Software Tel Aviv, Tel Aviv, Israel
red-balloon-secrurity_logo Red Balloon Security
Red Balloon Security is an embedded device security research and development firm.
Cyber Security, Embedded Systems, Internet of Things, Network Security, Software New York, New York, United States
blackpoint-holdings_logo Blackpoint Cyber
Blackpoint Cyber is a leading provider of cybersecurity threat hunting, detection, and response technology.
Computer, Cyber Security, Network Security, Software Ellicott City, Maryland, United States
cujo_logo CUJO AI
CUJO is an AI platform offering SaaS solutions to telecom operators and gateway manufacturers.
Artificial Intelligence, Big Data, Cyber Security, Internet of Things, Network Security, SaaS, Smart Home, Software El Segundo, California, United States
blubracket_logo BluBracket
BluBracket develops a code security platform that checks for security and integrity issues.
Cyber Security, Enterprise Software, Software Palo Alto, California, United States
« First   6