Organizations in Cyber Security
Name | Industry | Address | |
---|---|---|---|
SecurEnds SecurEnds is an information security company that helps to reduce security risk and costs by automating IGA. |
Cloud Security, Cyber Security, Identity Management, Information Technology, Security | Atlanta, Georgia, United States | |
GuardRails GuardRails is a platform that empowers developers to find, fix, and prevent security vulnerabilities in their web and mobile applications. |
Cyber Security, Developer Tools, Internet, Productivity Tools, Security | Singapore, Central Region, Singapore | |
SpiderOak SpiderOak is a collaboration tool that develops a technology that eliminates entire categories of cyberattacks. |
Blockchain, Cyber Security, Enterprise Software, Open Source | Lenexa, Kansas, United States | |
Arctic Wolf Arctic Wolf helps companies end cyber risk by providing security operations as a concierge service. |
Cyber Security, Information Technology, Network Security, Software | Eden Prairie, Minnesota, United States | |
Bluelava Blue Lava is a cybersecurity management solution enabling IT teams to strategize, prioritize, and budget core cybersecurity programs. |
Cyber Security, Information Technology, Network Security, Software | Menlo Park, California, United States | |
Contrast Security Contrast Security is a modernized application security, embedding code analysis, and attack prevention directly into the software. |
Cloud Security, Cyber Security, Developer Tools, Enterprise Applications, Security, Software | Los Altos, California, United States | |
NanoLock Security Ltd NanoLock Security ensures operational integrity of smart meters and industrial machines regardless of cyber events or human errors |
Cyber Security, Internet of Things, Software | Hod Hasharon, HaMerkaz, Israel | |
TypingDNA TypingDNA is a platform that provides cybersecurity, investigation, passive authentication, and typing biometrics services. |
Cyber Security, Fraud Detection, Identity Management, Software | New York, New York, United States | |
XONA Systems XONA is the frictionless user access platform purpose-built for critical infrastructure. |
Cyber Security, Industrial Automation, Information Technology, Internet of Things, Oil and Gas, Renewable Energy, Software | Annapolis, Maryland, United States | |
Heylogin Password Manager without Master Password - Swipe to Login replaces all passwords |
Cyber Security, Network Security, Privacy, Security, Software | N/A | |
Private AI Private AI develops privacy-preserving machine learning and natural language processing tools making privacy and GDPR compliance reliable. |
Artificial Intelligence, Cloud Data Services, Cloud Security, Cyber Security, Machine Learning, Natural Language Processing, Security, Software | Toronto, Ontario, Canada | |
Corsha Corsha is an API Identity and Access Management platform that secures machine-to-machine communication and adds automated MFA to APIs. |
Cloud Security, Cyber Security, IT Infrastructure, SaaS, Security | Vienna, Virginia, United States | |
Astrix Security Access management for third-party integrations |
Cyber Security | Tel Aviv, Tel Aviv, Israel | |
Tala Security Tala provides security solutions to protect enterprise websites against formjacking, magecart, and advanced attacks. |
Cyber Security, Information Technology, Security, Software | Fremont, California, United States | |
Polymer No-Code Data Loss Prevention for SaaS Platforms |
Compliance, Cyber Security, Data Center, Data Integration, SaaS, Software | New York, New York, United States | |
Tromzo Developer-First AppSec Management Platform |
Cyber Security, Information Technology, Software | Mountain View, California, United States | |
Skuchain SKUChain offers a blockchain-based commerce cloud for procurement and contracts management, financing arrangements. |
Bitcoin, Blockchain, Cyber Security, Enterprise, Enterprise Applications, Enterprise Software, Ethereum, Finance, FinTech, Supply Chain Management | Mountain View, California, United States | |
Avocado Systems Next-generation Agentless Application Security & Monitoring for Enterprise |
Cloud Security, Compliance, Computer, Cyber Security, Developer Tools, Enterprise Applications, Enterprise Software, Information Technology, Network Security, Software | San Jose, California, United States | |
SaltStack SaltStack is intelligent automation for a software-defined world. |
Cloud Management, Cyber Security, Information Technology, IT Management, Software | Lehi, Utah, United States | |
Vectra Vectra is a cybersecurity platform that uses AI to detect attackers in real time and perform conclusive incident investigations. |
Artificial Intelligence, Cloud Security, Cyber Security, Network Security, Software | San Jose, California, United States | |
Smart Protection Smart Protection keeps and protects intellectual and industrial property rights online. |
Artificial Intelligence, Customer Service, Cyber Security, Intellectual Property, Legal, Legal Tech, SaaS, Security, Software | Madrid, Madrid, Spain | |
Trapp Technology Trapp Technology is an IT company that provides managed IT services, cloud hosting, hosted VoIP, and managed security services. |
Cloud Computing, Cyber Security, Information Technology, Technical Support, Telecommunications | Phoenix, Arizona, United States | |
Source Defense Source Defense provides websites with prevention technology for attacks of third-party origin. |
Cyber Security | Be'er Sheva, HaDarom, Israel | |
Votiro Votiro specializes in eliminating file-borne attacks carried through email, web downloads, portal uploads and all file sharing platforms. |
Cyber Security, Security, Software | New York, New York, United States | |
Nanopay nanopay empowers businesses and banks to scale with innovative payment and liquidity management products. |
B2B, Cyber Security, Financial Services, FinTech, Mobile Payments, Payments, Transaction Processing | Toronto, Ontario, Canada | |
BugBase India's First Consolidated Bug Bounty Platform |
Cloud Security, Cyber Security, National Security, Network Security, Penetration Testing, Security | N/A | |
Voiro Voiro is the first all-in-one revenue management suite exclusively for ad-led digital publishers across media. |
Advertising, Cyber Security, Information Technology, Management Information Systems, Publishing, Social Media | Bengaluru, Karnataka, India | |
Kion Kion is a cloud enablement solution designed to help organizations simplify management and governance of the cloud. |
Cloud Infrastructure, Cloud Management, Cloud Security, Cyber Security, Information Technology, Software | Fulton, Maryland, United States | |
Infinipoint Infinipoint is the pioneer in the Device-Identity-as-as-Service security category to extend a true Zero Trust security posture to devices. |
Cloud Security, Cyber Security, Identity Management, Information Technology, Security | Tel Aviv, Tel Aviv, Israel | |
ByteChek ByteChek helps businesses build cybersecurity programs to enhance sales and build trust from customers. |
Compliance, Cyber Security, Information Technology, Risk Management, SaaS, Software | Miami, Florida, United States | |
Prosegur Prosegur is a multinational company that offers security solutions and services, tailored to the needs of its customers. BME:PSG |
Cyber Security, Logistics, Retail, Security | Madrid, Madrid, Spain | |
6clicks Your complete Risk & Compliance Operating System, including award-winning mobile app and world-first AI engine. |
Compliance, Cyber Security, Legal Tech, Risk Management, Software | Melbourne, Victoria, Australia | |
Immuta Immuta accelerates secure data access by discovering, securing, and monitoring cloud data. |
Analytics, Big Data, Cyber Security, Privacy | Boston, Massachusetts, United States | |
Imagen Imagen Ltd is a modular enterprise video platform that enables content owners to publish and monetize media archives. |
Cloud Data Services, Cyber Security, Information Technology, Video, Web Development | Cambridge, Cambridgeshire, United Kingdom | |
ProtectWise ProtectWise provides Cloud-Powered Network Detection and Response. |
Cloud Security, Cyber Security, Network Security, SaaS | Denver, Colorado, United States | |
Odix odix is a leading cybersecurity company specializing in Malware Prevention solutions utilizing its Deep File Inspection patented technology. |
Cyber Security, Information Technology | Rosh Ha'ayin, HaMerkaz, Israel | |
Yogosha Yogosha is a french bug bounty platform. |
Cyber Security, Internet, Security, Software | Paris, Ile-de-France, France | |
QWANT QWANT is an internet search engine that focuses on user privacy, web content filtering, and social networks. |
Cyber Security, Internet, Search Engine, Security | Paris, Ile-de-France, France | |
Cyber Defense Labs Cyber Defense Labs is a full lifecycle information security service provider helping companies detect, manage and respond to cyber risks. |
Compliance, Consulting, Cyber Security, Infrastructure, Penetration Testing | Dallas, Texas, United States | |
Hackuity Hackuity is a comprehensive cybersecurity solution that orchestrates and automates Vulnerability Management. |
Cyber Security, Information Technology, SaaS, Software | Lyon, Rhone-Alpes, France | |
Abnormal Security Abnormal Security is an email security company that protects enterprises and organizations from targeted email attacks. |
Cyber Security, Email, Information Technology, Network Security, Security | San Francisco, California, United States | |
Viakoo Vulnerability management for unmanaged & IoT Devices; firmware patching, certificate management, password enforcement, and service assurance |
Cloud Data Services, Cyber Security, Internet of Things, IT Infrastructure, Physical Security, SaaS | Mountain View, California, United States | |
SPHERE Technology Solutions SPHERE provides software and services to improve data governance, security, and compliance across data, platforms, and applications. |
Compliance, Cyber Security, Data Integration, Software | Hoboken, New Jersey, United States | |
ObserveIT ObserveIT helps organizations identify and eliminate insider threats. |
Cloud Security, Compliance, Cyber Security, Information Services, Information Technology, Software | Boston, Massachusetts, United States | |
OneTrust OneTrust helps companies manage privacy, security, and governance requirements in a regulatory environment that constantly changes. |
Compliance, Cyber Security, Privacy, Risk Management, Software | Atlanta, Georgia, United States | |
Doppel Doppel is a real-time, cross-chain monitoring platform for detecting NFT fraud and counterfeits. |
Blockchain, Cyber Security, Fraud Detection | San Carlos, California, United States | |
Norse Norse provides internet security intelligence solutions to e-commerce and enterprise clients. |
Computer, Cyber Security, Network Security, Security | San Mateo, California, United States | |
EnSilo enSilo protects businesses around the world from data breaches and disruption caused by cyber attacks. |
Cyber Security | San Francisco, California, United States | |
Allure Security Technology Allure's anti-phishing solution defends enterprise customers from attacks. |
Big Data, Cloud Security, Cyber Security, Mobile, Risk Management | Waltham, Massachusetts, United States | |
RiskSense Provides pen testing services & a cloud-based vulnerability prioritization and management platform to measure and control cybersecurity risk |
Cyber Security, Information Technology, Network Security, Risk Management, Security, Software | Sunnyvale, California, United States | |
Cmd Cmd allows organizations to intuitively monitor and control user interaction within their Linux environment. |
B2B, Cyber Security, Information Technology, Internet, Internet of Things, Linux | Vancouver, British Columbia, Canada | |
Cloudentity Cloudentity is a cloud based provider of Identity-Aware Authorization and Application Security solutions for the API first economy. |
Cyber Security, Identity Management, Security | Seattle, Washington, United States | |
ORNA ORNA is an innovative AI-driven Security Orchestration, Automation and Response (SOAR) platform for small and midsize businesses. |
Artificial Intelligence, Cyber Security, SaaS | Toronto, Ontario, Canada | |
Threatcare Threatcare provides easy, actionable Breach and Attack Simulations to help businesses test their cybersecurity defenses. |
Cyber Security, Information Technology, Network Security | Austin, Texas, United States | |
Circadence Circadence offers cyber range solutions and cybersecurity learning platforms, running on Microsoft Azure. |
Cloud Computing, Cyber Security | Boulder, Colorado, United States | |
Mocana Mocana is a developer of cybersecurity software solutions that protect Internet of Things devices and industrial infrastructure. |
Cyber Security, Information Technology, Internet, Software | Sunnyvale, California, United States | |
ThreatMark ThreatMark brings trust to the digital world by providing cutting-edge fraud prevention solutions. |
Banking, Cyber Security, FinTech, Fraud Detection, PaaS, Payments, SaaS | Brno, Jihomoravsky kraj, Czech Republic | |
4iQ 4iQ is a Cyber Intelligence company that protects digital identities and investigating threats, adversaries, and fraud. |
Artificial Intelligence, Cyber Security, Information Technology, Internet, Security, Software | Los Altos, California, United States | |
GreatHorn GreatHorn provides protection for cloud email systems, via advanced threat detection, automated defense, and integrated incident response. |
Cyber Security, Email, Hardware, Internet, Machine Learning, Security, Software | Waltham, Massachusetts, United States | |
Forge Institute Forge Institute helps small and mid-sized businesses in cyber security defenses. |
Cyber Security, Enterprise Software, Information Technology | Little Rock, Arkansas, United States | |
BioCatch BioCatch unlocks the power of behavior and deliver actionable insights to create a digital world where identity, trust, and ease co-exist. |
Analytics, Cyber Security, FinTech, Fraud Detection, Network Security | Tel Aviv, Tel Aviv, Israel | |
Racktop Systems The leader in Cyberstorage and only data-centric cyber solution which stops ransomware in < 1 second without agents! |
Cloud Data Services, Compliance, Cyber Security, Data Storage, Flash Storage, Software | Fulton, Maryland, United States | |
Hysolate Hysolate enables organizations to isolate risky and sensitive activities on usersโ endpoints with a local workspace that isolates the data. |
Computer, Cyber Security, Software | Tel Aviv, Tel Aviv, Israel | |
AaDya Security AaDya Security is a cyber security company that offers cybersecurity software solutions for small and medium businesses. |
Cyber Security, Information Technology, Security, Small and Medium Businesses, Software | Detroit, Michigan, United States | |
Centripetal Networks Centripetal Networks Inc. is dedicated to protecting organizations from advanced threats by operationalizing intelligence-driven security. |
Cyber Security, Fraud Detection, Internet, Network Security, Real Time, Security | Herndon, Virginia, United States | |
BlastWave BlastWave creates the next phase of cybersecurity solutions, built on proprietary hardware, software, and a social layer. |
Cyber Security, Network Security, Security | Mountain View, California, United States | |
Wizdome wizdome is an autonomous AI & machine learning based cybersecurity engine |
Artificial Intelligence, Computer, Cyber Security, Information Technology, Machine Learning, Software | Tel Aviv, Tel Aviv, Israel | |
Sky.One Solutions We transform the way companies consume technology by adding intelligence and agility with different platforms. |
Cloud Computing, Cyber Security, Data Integration, Information Services, Information Technology, PaaS, SaaS, Software | Sรฃo Paulo, Sao Paulo, Brazil | |
Cynomi Cynomi addresses a critical gap in mid-market cyber protection - creating and executing a cyber and compliance strategy . |
Cyber Security | London, England, United Kingdom | |
Secberus Secberus is a Cloud Governance Platform used by leading enterprises to manage security & compliance with policy-as-code. |
Cloud Infrastructure, Cloud Security, Compliance, Cyber Security, SaaS | Miami, Florida, United States | |
Trinity Cyber Innovative Technology with Automated, Preventive Actions |
Cyber Security, Information Technology | Bowie, Maryland, United States | |
GigaTrust GigaTrust provides endpoint email security and document in-use protection for PC and mobile devices, offering a fully managed SaaS solution. |
Cloud Security, Cyber Security, Enterprise Software, Mobile, SaaS, Security | Herndon, Virginia, United States | |
Valence Security Valence Security is the first Business Application Mesh security company focused on managing the risks from third-party integrations. |
Cloud Security, Cyber Security, Security | Tel Aviv, Tel Aviv, Israel | |
Qohash Qohash finds, tracks, and safeguards the world's most sensitive data. |
Compliance, Cyber Security, Enterprise Software, Security | Quebec, Quebec, Canada | |
Byos Byos delivers an edge microsegmentation solution for better protecting and managing remote endpoints on untrusted networks. |
Cloud Security, Cyber Security, National Security, Network Security | Halifax, Nova Scotia, Canada | |
Plurilock Plurilock provides invisible MFA & continuous authentication using state-of-the-art behavioral-biometric & machine learning technology. CVE:PLUR |
Biometrics, Cyber Security, Identity Management, Information Technology, Machine Learning, Network Security, Security | Victoria, British Columbia, Canada | |
Clear Skye Clear Skye delivers a complete Identity and Access Governance solution providing employee lifecycle automation and business intelligence. |
Compliance, Cyber Security, Information Technology | San Francisco, California, United States | |
D3 Security D3 Security provides the platform for incident response, investigation or case management, and security operations. |
Cloud Security, Cyber Security, Security | Vancouver, British Columbia, Canada | |
Kriptos Kriptos uses AI to ensure accurate classification for your company. |
Artificial Intelligence, Cyber Security, Enterprise Software, Machine Learning, SaaS, Software | Belvedere Tiburon, California, United States | |
Risk Ledger Risk Ledger is the world's most innovative vendor risk management platform, built on the model of a secure social network. |
Cyber Security, Network Security, Procurement, Risk Management, Security, Supply Chain Management | London, England, United Kingdom | |
Tempered Tempered reduces cyber risks by providing point and click identity-based micro-segmentation. |
Communications Infrastructure, Cyber Security, Network Security, Security | Seattle, Washington, United States | |
CI Security CI Security is a security company that provides managed cyber-security solutions. |
Computer, Cyber Security, Network Security, Security | Seattle, Washington, United States | |
ThreatBook ThreatBook is Chinaโs first security threat intelligence company. |
Business Intelligence, Cyber Security, Network Security | Beijing, Beijing, China | |
DarkOwl DarkOwl is a Denver-based company that provides the world's largest database of DARKINTโข, or darknet intelligence, content. |
Cyber Security, Information Technology, Risk Management, Software | Denver, Colorado, United States | |
Revelock Revelock is a fraud detection company that protects against current cyber threats in the banking and financial sectors. |
Cyber Security, Fraud Detection, Software | Madrid, Madrid, Spain | |
Brighter AI Protect every identity in public. |
Artificial Intelligence, Cyber Security, Information Technology, Machine Learning, Privacy | Berlin, Berlin, Germany | |
Illumio Illumio is a provider of a SaaS platform offering automated enforcement against cyberattacks. |
Cloud Security, Cyber Security, Data Center, SaaS, Security | Sunnyvale, California, United States | |
Digital Management Digital Management provides mobile solutions and services that include enterprise mobility and cyber security. |
Cyber Security, Enterprise Software, Information Technology, Software | Bethesda, Maryland, United States | |
Otto-js Client-side Application Security. SaaS. Visibility, Protection and Control for your 3rd-party script Supply Chain. Data Security. |
Cloud Data Services, Compliance, Cyber Security, Enterprise Software, Fraud Detection, Machine Learning, Penetration Testing, Privacy, Risk Management | Memphis, Tennessee, United States | |
Qunnect Qunnect is a spin-off venture company enabling the quantum internet for quantum repeater operation. |
Cyber Security, Information Technology, Quantum Computing, Telecommunications | New York, New York, United States | |
Infisecure Technologies InfiSecure is a real-time SaaS bot detection and protection platform to block online security threats. |
Cyber Security, E-Commerce, Information Technology, Internet, Real Time, SaaS, Security, Software | Mumbai, Maharashtra, India | |
Supply Wisdom Supply Wisdom is automating risk management, risk intelligence and monitoring on third parties and location services. |
Cyber Security, Information Technology, Procurement, Risk Management | New York, New York, United States | |
CrowdSec CrowdSec is a security automation engine, using both local IP behavior detection & our community-driven IP reputation database. |
Cloud Security, Cyber Security, Internet of Things, Network Security | Montrouge, Ile-de-France, France | |
PreVeil PreVeil is a cybersecurity company, born out of research at MIT, that provides end-to-end encryption. |
Cyber Security, Information Technology, Software | Boston, Massachusetts, United States | |
MWR InfoSecurity MWR InfoSecurity provide specialist cyber security advice and solutions. |
Computer, Cyber Security, Network Security | Basingstoke, Hampshire, United Kingdom | |
CYSEC CYSEC is a cyber security provider |
Cyber Security, Information Technology, Security | Lausanne, Vaud, Switzerland | |
AwareGO AwareGO is a security awareness training and learning platform and video content. |
Cyber Security, Information Technology, Security, Software, Video | Reykjavรญk, Gullbringusysla, Iceland | |
Lookout Lookout is a cybersecurity company that integrates endpoint security with SASE technologies to secure data while respecting user privacy. |
Cloud Security, Cyber Security, Network Security | San Francisco, California, United States | |
ID.me ID.me is a digital identity network that aims to simplify the user's indication verification experience. |
Cloud Data Services, Cyber Security, Fraud Detection, Identity Management, Privacy, Software | Mclean, Virginia, United States | |
Privacy Tools Privacy compliance platform, based on AI/Blockchain, which helps global companies to keep compliant with the data protection requirements. |
Compliance, Cyber Security, Information Technology, Legal, Legal Tech, Network Security, Privacy, Software | Porto Alegre, Rio Grande do Sul, Brazil |