Organizations in Cyber Security

Name Industry Address
securends_logo SecurEnds
SecurEnds is an information security company that helps to reduce security risk and costs by automating IGA.
Cloud Security, Cyber Security, Identity Management, Information Technology, Security Atlanta, Georgia, United States
guardrails_logo GuardRails
GuardRails is a platform that empowers developers to find, fix, and prevent security vulnerabilities in their web and mobile applications.
Cyber Security, Developer Tools, Internet, Productivity Tools, Security Singapore, Central Region, Singapore
spideroak_logo SpiderOak
SpiderOak is a collaboration tool that develops a technology that eliminates entire categories of cyberattacks.
Blockchain, Cyber Security, Enterprise Software, Open Source Lenexa, Kansas, United States
arctic-wolf-networks_logo Arctic Wolf
Arctic Wolf helps companies end cyber risk by providing security operations as a concierge service.
Cyber Security, Information Technology, Network Security, Software Eden Prairie, Minnesota, United States
bluelava_logo Bluelava
Blue Lava is a cybersecurity management solution enabling IT teams to strategize, prioritize, and budget core cybersecurity programs.
Cyber Security, Information Technology, Network Security, Software Menlo Park, California, United States
contrast-security_logo Contrast Security
Contrast Security is a modernized application security, embedding code analysis, and attack prevention directly into the software.
Cloud Security, Cyber Security, Developer Tools, Enterprise Applications, Security, Software Los Altos, California, United States
nanolock-security_logo NanoLock Security Ltd
NanoLock Security ensures operational integrity of smart meters and industrial machines regardless of cyber events or human errors
Cyber Security, Internet of Things, Software Hod Hasharon, HaMerkaz, Israel
typingdna_logo TypingDNA
TypingDNA is a platform that provides cybersecurity, investigation, passive authentication, and typing biometrics services.
Cyber Security, Fraud Detection, Identity Management, Software New York, New York, United States
xona-systems_logo XONA Systems
XONA is the frictionless user access platform purpose-built for critical infrastructure.
Cyber Security, Industrial Automation, Information Technology, Internet of Things, Oil and Gas, Renewable Energy, Software Annapolis, Maryland, United States
heylogin_logo Heylogin
Password Manager without Master Password - Swipe to Login replaces all passwords
Cyber Security, Network Security, Privacy, Security, Software N/A
private-ai_logo Private AI
Private AI develops privacy-preserving machine learning and natural language processing tools making privacy and GDPR compliance reliable.
Artificial Intelligence, Cloud Data Services, Cloud Security, Cyber Security, Machine Learning, Natural Language Processing, Security, Software Toronto, Ontario, Canada
corsha_logo Corsha
Corsha is an API Identity and Access Management platform that secures machine-to-machine communication and adds automated MFA to APIs.
Cloud Security, Cyber Security, IT Infrastructure, SaaS, Security Vienna, Virginia, United States
astrix-security_logo Astrix Security
Access management for third-party integrations
Cyber Security Tel Aviv, Tel Aviv, Israel
tala-security_logo Tala Security
Tala provides security solutions to protect enterprise websites against formjacking, magecart, and advanced attacks.
Cyber Security, Information Technology, Security, Software Fremont, California, United States
polymer-9779_logo Polymer
No-Code Data Loss Prevention for SaaS Platforms
Compliance, Cyber Security, Data Center, Data Integration, SaaS, Software New York, New York, United States
tromzo_logo Tromzo
Developer-First AppSec Management Platform
Cyber Security, Information Technology, Software Mountain View, California, United States
skuchain_logo Skuchain
SKUChain offers a blockchain-based commerce cloud for procurement and contracts management, financing arrangements.
Bitcoin, Blockchain, Cyber Security, Enterprise, Enterprise Applications, Enterprise Software, Ethereum, Finance, FinTech, Supply Chain Management Mountain View, California, United States
avocado-systems_logo Avocado Systems
Next-generation Agentless Application Security & Monitoring for Enterprise
Cloud Security, Compliance, Computer, Cyber Security, Developer Tools, Enterprise Applications, Enterprise Software, Information Technology, Network Security, Software San Jose, California, United States
saltstack_logo SaltStack
SaltStack is intelligent automation for a software-defined world.
Cloud Management, Cyber Security, Information Technology, IT Management, Software Lehi, Utah, United States
vectra-networks_logo Vectra
Vectra is a cybersecurity platform that uses AI to detect attackers in real time and perform conclusive incident investigations.
Artificial Intelligence, Cloud Security, Cyber Security, Network Security, Software San Jose, California, United States
smart-protection_logo Smart Protection
Smart Protection keeps and protects intellectual and industrial property rights online.
Artificial Intelligence, Customer Service, Cyber Security, Intellectual Property, Legal, Legal Tech, SaaS, Security, Software Madrid, Madrid, Spain
trapp-technology_logo Trapp Technology
Trapp Technology is an IT company that provides managed IT services, cloud hosting, hosted VoIP, and managed security services.
Cloud Computing, Cyber Security, Information Technology, Technical Support, Telecommunications Phoenix, Arizona, United States
source-defense_logo Source Defense
Source Defense provides websites with prevention technology for attacks of third-party origin.
Cyber Security Be'er Sheva, HaDarom, Israel
votiro_logo Votiro
Votiro specializes in eliminating file-borne attacks carried through email, web downloads, portal uploads and all file sharing platforms.
Cyber Security, Security, Software New York, New York, United States
nanopay-inc_logo Nanopay
nanopay empowers businesses and banks to scale with innovative payment and liquidity management products.
B2B, Cyber Security, Financial Services, FinTech, Mobile Payments, Payments, Transaction Processing Toronto, Ontario, Canada
bugbase_logo BugBase
India's First Consolidated Bug Bounty Platform
Cloud Security, Cyber Security, National Security, Network Security, Penetration Testing, Security N/A
voiro_logo Voiro
Voiro is the first all-in-one revenue management suite exclusively for ad-led digital publishers across media.
Advertising, Cyber Security, Information Technology, Management Information Systems, Publishing, Social Media Bengaluru, Karnataka, India
cloudtamer_logo Kion
Kion is a cloud enablement solution designed to help organizations simplify management and governance of the cloud.
Cloud Infrastructure, Cloud Management, Cloud Security, Cyber Security, Information Technology, Software Fulton, Maryland, United States
infinipoint_logo Infinipoint
Infinipoint is the pioneer in the Device-Identity-as-as-Service security category to extend a true Zero Trust security posture to devices.
Cloud Security, Cyber Security, Identity Management, Information Technology, Security Tel Aviv, Tel Aviv, Israel
bytechek_logo ByteChek
ByteChek helps businesses build cybersecurity programs to enhance sales and build trust from customers.
Compliance, Cyber Security, Information Technology, Risk Management, SaaS, Software Miami, Florida, United States
prosegur_logo Prosegur
Prosegur is a multinational company that offers security solutions and services, tailored to the needs of its customers. BME:PSG
Cyber Security, Logistics, Retail, Security Madrid, Madrid, Spain
6clicks_logo 6clicks
Your complete Risk & Compliance Operating System, including award-winning mobile app and world-first AI engine.
Compliance, Cyber Security, Legal Tech, Risk Management, Software Melbourne, Victoria, Australia
immuta_logo Immuta
Immuta accelerates secure data access by discovering, securing, and monitoring cloud data.
Analytics, Big Data, Cyber Security, Privacy Boston, Massachusetts, United States
cambridge-imaging-systems-ltd_logo Imagen
Imagen Ltd is a modular enterprise video platform that enables content owners to publish and monetize media archives.
Cloud Data Services, Cyber Security, Information Technology, Video, Web Development Cambridge, Cambridgeshire, United Kingdom
protectwise_logo ProtectWise
ProtectWise provides Cloud-Powered Network Detection and Response.
Cloud Security, Cyber Security, Network Security, SaaS Denver, Colorado, United States
odi_logo Odix
odix is a leading cybersecurity company specializing in Malware Prevention solutions utilizing its Deep File Inspection patented technology.
Cyber Security, Information Technology Rosh Ha'ayin, HaMerkaz, Israel
yogosha_logo Yogosha
Yogosha is a french bug bounty platform.
Cyber Security, Internet, Security, Software Paris, Ile-de-France, France
qwant_logo QWANT
QWANT is an internet search engine that focuses on user privacy, web content filtering, and social networks.
Cyber Security, Internet, Search Engine, Security Paris, Ile-de-France, France
cyber-defense-lab_logo Cyber Defense Labs
Cyber Defense Labs is a full lifecycle information security service provider helping companies detect, manage and respond to cyber risks.
Compliance, Consulting, Cyber Security, Infrastructure, Penetration Testing Dallas, Texas, United States
hackuity_logo Hackuity
Hackuity is a comprehensive cybersecurity solution that orchestrates and automates Vulnerability Management.
Cyber Security, Information Technology, SaaS, Software Lyon, Rhone-Alpes, France
abnormal-security_logo Abnormal Security
Abnormal Security is an email security company that protects enterprises and organizations from targeted email attacks.
Cyber Security, Email, Information Technology, Network Security, Security San Francisco, California, United States
viakoo-inc_logo Viakoo
Vulnerability management for unmanaged & IoT Devices; firmware patching, certificate management, password enforcement, and service assurance
Cloud Data Services, Cyber Security, Internet of Things, IT Infrastructure, Physical Security, SaaS Mountain View, California, United States
sphere-technology-solutions_logo SPHERE Technology Solutions
SPHERE provides software and services to improve data governance, security, and compliance across data, platforms, and applications.
Compliance, Cyber Security, Data Integration, Software Hoboken, New Jersey, United States
observeit_logo ObserveIT
ObserveIT helps organizations identify and eliminate insider threats.
Cloud Security, Compliance, Cyber Security, Information Services, Information Technology, Software Boston, Massachusetts, United States
onetrust_logo OneTrust
OneTrust helps companies manage privacy, security, and governance requirements in a regulatory environment that constantly changes.
Compliance, Cyber Security, Privacy, Risk Management, Software Atlanta, Georgia, United States
doppel-9e9d_logo Doppel
Doppel is a real-time, cross-chain monitoring platform for detecting NFT fraud and counterfeits.
Blockchain, Cyber Security, Fraud Detection San Carlos, California, United States
norse-corporation_logo Norse
Norse provides internet security intelligence solutions to e-commerce and enterprise clients.
Computer, Cyber Security, Network Security, Security San Mateo, California, United States
ensilo_logo EnSilo
enSilo protects businesses around the world from data breaches and disruption caused by cyber attacks.
Cyber Security San Francisco, California, United States
allure-security-technology-inc_logo Allure Security Technology
Allure's anti-phishing solution defends enterprise customers from attacks.
Big Data, Cloud Security, Cyber Security, Mobile, Risk Management Waltham, Massachusetts, United States
risksense_logo RiskSense
Provides pen testing services & a cloud-based vulnerability prioritization and management platform to measure and control cybersecurity risk
Cyber Security, Information Technology, Network Security, Risk Management, Security, Software Sunnyvale, California, United States
cmd_logo Cmd
Cmd allows organizations to intuitively monitor and control user interaction within their Linux environment.
B2B, Cyber Security, Information Technology, Internet, Internet of Things, Linux Vancouver, British Columbia, Canada
syntegrity-networks_logo Cloudentity
Cloudentity is a cloud based provider of Identity-Aware Authorization and Application Security solutions for the API first economy.
Cyber Security, Identity Management, Security Seattle, Washington, United States
orna_logo ORNA
ORNA is an innovative AI-driven Security Orchestration, Automation and Response (SOAR) platform for small and midsize businesses.
Artificial Intelligence, Cyber Security, SaaS Toronto, Ontario, Canada
threatcare_logo Threatcare
Threatcare provides easy, actionable Breach and Attack Simulations to help businesses test their cybersecurity defenses.
Cyber Security, Information Technology, Network Security Austin, Texas, United States
circadence_logo Circadence
Circadence offers cyber range solutions and cybersecurity learning platforms, running on Microsoft Azure.
Cloud Computing, Cyber Security Boulder, Colorado, United States
mocana_logo Mocana
Mocana is a developer of cybersecurity software solutions that protect Internet of Things devices and industrial infrastructure.
Cyber Security, Information Technology, Internet, Software Sunnyvale, California, United States
threatmark-s-r-o_logo ThreatMark
ThreatMark brings trust to the digital world by providing cutting-edge fraud prevention solutions.
Banking, Cyber Security, FinTech, Fraud Detection, PaaS, Payments, SaaS Brno, Jihomoravsky kraj, Czech Republic
4iq_logo 4iQ
4iQ is a Cyber Intelligence company that protects digital identities and investigating threats, adversaries, and fraud.
Artificial Intelligence, Cyber Security, Information Technology, Internet, Security, Software Los Altos, California, United States
greathorn_logo GreatHorn
GreatHorn provides protection for cloud email systems, via advanced threat detection, automated defense, and integrated incident response.
Cyber Security, Email, Hardware, Internet, Machine Learning, Security, Software Waltham, Massachusetts, United States
forge-institute_logo Forge Institute
Forge Institute helps small and mid-sized businesses in cyber security defenses.
Cyber Security, Enterprise Software, Information Technology Little Rock, Arkansas, United States
biocatch_logo BioCatch
BioCatch unlocks the power of behavior and deliver actionable insights to create a digital world where identity, trust, and ease co-exist.
Analytics, Cyber Security, FinTech, Fraud Detection, Network Security Tel Aviv, Tel Aviv, Israel
racktop-systems_logo Racktop Systems
The leader in Cyberstorage and only data-centric cyber solution which stops ransomware in < 1 second without agents!
Cloud Data Services, Compliance, Cyber Security, Data Storage, Flash Storage, Software Fulton, Maryland, United States
hysolate_logo Hysolate
Hysolate enables organizations to isolate risky and sensitive activities on usersโ€™ endpoints with a local workspace that isolates the data.
Computer, Cyber Security, Software Tel Aviv, Tel Aviv, Israel
aadya-security_logo AaDya Security
AaDya Security is a cyber security company that offers cybersecurity software solutions for small and medium businesses.
Cyber Security, Information Technology, Security, Small and Medium Businesses, Software Detroit, Michigan, United States
centripetal-networks_logo Centripetal Networks
Centripetal Networks Inc. is dedicated to protecting organizations from advanced threats by operationalizing intelligence-driven security.
Cyber Security, Fraud Detection, Internet, Network Security, Real Time, Security Herndon, Virginia, United States
blastwave_logo BlastWave
BlastWave creates the next phase of cybersecurity solutions, built on proprietary hardware, software, and a social layer.
Cyber Security, Network Security, Security Mountain View, California, United States
brandefender-inc_logo Wizdome
wizdome is an autonomous AI & machine learning based cybersecurity engine
Artificial Intelligence, Computer, Cyber Security, Information Technology, Machine Learning, Software Tel Aviv, Tel Aviv, Israel
sky-in-one_logo Sky.One Solutions
We transform the way companies consume technology by adding intelligence and agility with different platforms.
Cloud Computing, Cyber Security, Data Integration, Information Services, Information Technology, PaaS, SaaS, Software Sรฃo Paulo, Sao Paulo, Brazil
cynomi_logo Cynomi
Cynomi addresses a critical gap in mid-market cyber protection - creating and executing a cyber and compliance strategy .
Cyber Security London, England, United Kingdom
secberus_logo Secberus
Secberus is a Cloud Governance Platform used by leading enterprises to manage security & compliance with policy-as-code.
Cloud Infrastructure, Cloud Security, Compliance, Cyber Security, SaaS Miami, Florida, United States
trinity-cyber_logo Trinity Cyber
Innovative Technology with Automated, Preventive Actions
Cyber Security, Information Technology Bowie, Maryland, United States
gigatrust_logo GigaTrust
GigaTrust provides endpoint email security and document in-use protection for PC and mobile devices, offering a fully managed SaaS solution.
Cloud Security, Cyber Security, Enterprise Software, Mobile, SaaS, Security Herndon, Virginia, United States
valence-security_logo Valence Security
Valence Security is the first Business Application Mesh security company focused on managing the risks from third-party integrations.
Cloud Security, Cyber Security, Security Tel Aviv, Tel Aviv, Israel
qohash-inc_logo Qohash
Qohash finds, tracks, and safeguards the world's most sensitive data.
Compliance, Cyber Security, Enterprise Software, Security Quebec, Quebec, Canada
byos_logo Byos
Byos delivers an edge microsegmentation solution for better protecting and managing remote endpoints on untrusted networks.
Cloud Security, Cyber Security, National Security, Network Security Halifax, Nova Scotia, Canada
plurilock-security-solutions_logo Plurilock
Plurilock provides invisible MFA & continuous authentication using state-of-the-art behavioral-biometric & machine learning technology. CVE:PLUR
Biometrics, Cyber Security, Identity Management, Information Technology, Machine Learning, Network Security, Security Victoria, British Columbia, Canada
clear-skye-inc_logo Clear Skye
Clear Skye delivers a complete Identity and Access Governance solution providing employee lifecycle automation and business intelligence.
Compliance, Cyber Security, Information Technology San Francisco, California, United States
d3-security_logo D3 Security
D3 Security provides the platform for incident response, investigation or case management, and security operations.
Cloud Security, Cyber Security, Security Vancouver, British Columbia, Canada
kriptos_logo Kriptos
Kriptos uses AI to ensure accurate classification for your company.
Artificial Intelligence, Cyber Security, Enterprise Software, Machine Learning, SaaS, Software Belvedere Tiburon, California, United States
risk-ledger_logo Risk Ledger
Risk Ledger is the world's most innovative vendor risk management platform, built on the model of a secure social network.
Cyber Security, Network Security, Procurement, Risk Management, Security, Supply Chain Management London, England, United Kingdom
tempered-networks_logo Tempered
Tempered reduces cyber risks by providing point and click identity-based micro-segmentation.
Communications Infrastructure, Cyber Security, Network Security, Security Seattle, Washington, United States
critical-informatics_logo CI Security
CI Security is a security company that provides managed cyber-security solutions.
Computer, Cyber Security, Network Security, Security Seattle, Washington, United States
threatbook_logo ThreatBook
ThreatBook is Chinaโ€™s first security threat intelligence company.
Business Intelligence, Cyber Security, Network Security Beijing, Beijing, China
owl-cybersecurity_logo DarkOwl
DarkOwl is a Denver-based company that provides the world's largest database of DARKINTโ„ข, or darknet intelligence, content.
Cyber Security, Information Technology, Risk Management, Software Denver, Colorado, United States
buguroo_logo Revelock
Revelock is a fraud detection company that protects against current cyber threats in the banking and financial sectors.
Cyber Security, Fraud Detection, Software Madrid, Madrid, Spain
brighter-ai-technologies_logo Brighter AI
Protect every identity in public.
Artificial Intelligence, Cyber Security, Information Technology, Machine Learning, Privacy Berlin, Berlin, Germany
illumio_logo Illumio
Illumio is a provider of a SaaS platform offering automated enforcement against cyberattacks.
Cloud Security, Cyber Security, Data Center, SaaS, Security Sunnyvale, California, United States
digital-management_logo Digital Management
Digital Management provides mobile solutions and services that include enterprise mobility and cyber security.
Cyber Security, Enterprise Software, Information Technology, Software Bethesda, Maryland, United States
dev-con-detect_logo Otto-js
Client-side Application Security. SaaS. Visibility, Protection and Control for your 3rd-party script Supply Chain. Data Security.
Cloud Data Services, Compliance, Cyber Security, Enterprise Software, Fraud Detection, Machine Learning, Penetration Testing, Privacy, Risk Management Memphis, Tennessee, United States
qunnect_logo Qunnect
Qunnect is a spin-off venture company enabling the quantum internet for quantum repeater operation.
Cyber Security, Information Technology, Quantum Computing, Telecommunications New York, New York, United States
infisecure-technologies-inc_logo Infisecure Technologies
InfiSecure is a real-time SaaS bot detection and protection platform to block online security threats.
Cyber Security, E-Commerce, Information Technology, Internet, Real Time, SaaS, Security, Software Mumbai, Maharashtra, India
supply-wisdom_logo Supply Wisdom
Supply Wisdom is automating risk management, risk intelligence and monitoring on third parties and location services.
Cyber Security, Information Technology, Procurement, Risk Management New York, New York, United States
crowdsec_logo CrowdSec
CrowdSec is a security automation engine, using both local IP behavior detection & our community-driven IP reputation database.
Cloud Security, Cyber Security, Internet of Things, Network Security Montrouge, Ile-de-France, France
preveil_logo PreVeil
PreVeil is a cybersecurity company, born out of research at MIT, that provides end-to-end encryption.
Cyber Security, Information Technology, Software Boston, Massachusetts, United States
mwr-infosecurity_logo MWR InfoSecurity
MWR InfoSecurity provide specialist cyber security advice and solutions.
Computer, Cyber Security, Network Security Basingstoke, Hampshire, United Kingdom
cysec_logo CYSEC
CYSEC is a cyber security provider
Cyber Security, Information Technology, Security Lausanne, Vaud, Switzerland
awarego-2bc9_logo AwareGO
AwareGO is a security awareness training and learning platform and video content.
Cyber Security, Information Technology, Security, Software, Video Reykjavรญk, Gullbringusysla, Iceland
lookout_logo Lookout
Lookout is a cybersecurity company that integrates endpoint security with SASE technologies to secure data while respecting user privacy.
Cloud Security, Cyber Security, Network Security San Francisco, California, United States
id-me_logo ID.me
ID.me is a digital identity network that aims to simplify the user's indication verification experience.
Cloud Data Services, Cyber Security, Fraud Detection, Identity Management, Privacy, Software Mclean, Virginia, United States
privacy-tools_logo Privacy Tools
Privacy compliance platform, based on AI/Blockchain, which helps global companies to keep compliant with the data protection requirements.
Compliance, Cyber Security, Information Technology, Legal, Legal Tech, Network Security, Privacy, Software Porto Alegre, Rio Grande do Sul, Brazil
« First   7