Organizations in Cyber Security

Name Industry Address
skurio_logo Skurio
Skurio is a cybersecurity company that gives every organization the ability to reveal their spectrum of digital risk.
Cyber Security, Database, Information Technology, Network Security, SaaS, Software Belfast, Belfast, United Kingdom
harbour-beijing-internet-technology-co_logo Beijing Internet Harbor Technology
Beijing Internet Harbor Technology Co., Ltd Established in 2009, Headquarter located in Beijing, 140+ employee.
Cyber Security, Information Technology, Internet, Telecommunications Beijing Shi, Beijing, China
openavn_logo DefenseArk
Decentralized Realtime Endpoint Protection & Cyber Threat Intelligence
Architecture, Blockchain, Cloud Security, Crowdsourcing, Cyber Security, Network Security, Security, Software New York, New York, United States
idss-holdings_logo IDSS Holdings
IDSS Holdings provides support services, technical solutions and cyber security capabilities to the defense intelligence community.
Cyber Security, Identity Management, National Security Armonk, New York, United States
watad-energy-and-communications_logo Watad Energy And Communications Co.
Watad provides Cybersecurity for IT and OT/ICS, AI/ML solutions, Industrial Automation, Smart Cities solutions, IT infrastructure and Space.
Aerospace, Artificial Intelligence (AI), Cyber Security, Energy, Energy Efficiency, Industrial Automation, IT Infrastructure, Renewable Energy, Smart Cities Al Khobar, Ash Sharqiyah, Saudi Arabia
chino-io_logo Chino.io
Chino.io solves GDPR and HIPAA compliance for Digital Health and Medtech companies by combining regulatory expertise and technology.
Cloud Data Services, Compliance, Cyber Security, Health Care, Information Technology Rovereto, Trentino-Alto Adige, Italy
blueshift-cybersecurity_logo Blueshift Cybersecurity
Blueshift Cybersecurity is a burgeoning startup that delivers full-service XDR protection to small and medium-sized businesses.
Cyber Security, SaaS Fort Myers, Florida, United States
vantyr_logo Vantyr
Automate the lifecycle management and security of your non-human identities.
Cyber Security, Information Technology, SaaS, Software Redwood City, California, United States
rhodecode_logo RhodeCode
RhodeCode is an open source repository management platform.
Cyber Security, Enterprise Software, Information Technology, IT Management, Open Source, SaaS, Security, Software, Software Engineering Berlin, Berlin, Germany
solebit-labs_logo Solebit
Solebit takes a non-behavioral approach to detecting and preventing APTs and zero-day attacks.
Computer, Cyber Security, Information Technology, Network Security, Real Time, Software San Francisco, California, United States
prevailion-inc_logo Prevailion
Prevailion is a compromise intelligence company on a mission to discover active compromises in your network and your partners at scale.
Artificial Intelligence (AI), Business Intelligence, Cyber Security, Machine Learning, Predictive Analytics The Woodlands, Texas, United States
mistnet-io_logo MistNet
MistNet develops breakthrough multi-entity threat detection & hunting powered by patent-pending mist computing & edge AI technologies.
Artificial Intelligence, Cyber Security, Risk Management, Security Mountain View, California, United States
rank_logo RANK Software
RANK is an advanced security analytics and threat hunting platform.
Analytics, Cyber Security, Enterprise Software, Information Technology, Network Security, Security Toronto, Ontario, Canada
xaptum_logo Xaptum
Multi-tenant, future-proof network operator that enables enterprises to seamlessly scale and secure IoT deployments.
Cyber Security, Homeland Security, Infrastructure, Internet of Things, National Security, Railroad, Transportation, Water Chicago, Illinois, United States
onegini_logo Onegini
Onegini offers features such as mobile authentication platform and core identity capabilities.
Banking, Cyber Security, Developer APIs, Developer Tools, Identity Management, Insurance, Mobile, Security Woerden, Zuid-Holland, The Netherlands
virnetx_logo VirnetX
VirnetX is an internet security software and technology company that provides technology for 4G long term evolution (LTE) security. NYSEMKT:VHC
Blockchain, Cyber Security, Enterprise Software, Information Technology, Internet, Security, Software Zephyr Cove, Nevada, United States
trackd-7f6b_logo Trackd
Vulnerability remediation without the guesswork.
B2B, Cloud Security, Cyber Security, Enterprise Software Reston, Virginia, United States
threatstop_logo ThreatSTOP
ThreatSTOP is a pioneer in Protective DNS security with a mission to provide actionable Threat Intelligence for everyone.
Cloud Computing, Cloud Data Services, Cyber Security, Network Security Carlsbad, California, United States
cyberq-group_logo CyberQ Group
CyberQ Group - We Make Your Business Cyber Resilient.
Artificial Intelligence, Consulting, Cyber Security, Information Technology, Software Birmingham, Birmingham, United Kingdom
checkred_logo CheckRed
A cloud security solution that helps you to detect , prioritize ,and remediate your cloud security risks faster
Cloud Security, Cyber Security Wilmington, Delaware, United States
spherical-defence-labs_logo Spherical Defense
Spherical Defense offers API Security powered by Deep Learning
Artificial Intelligence (AI), Cyber Security, Machine Learning, Security, Software San Francisco, California, United States
powerdmarc_logo PowerDMARC
PowerDMARC SaaS platform helps organizations combat email, domain name spoofing and impersonation.
Cyber Security, SaaS Middletown, Delaware, United States
graphistry_logo Graphistry
Help every analyst investigate like 10 analysts.
Analytics, Cloud Data Services, Cyber Security, Data Center Automation, Data Visualization, GPU, IT Management, Security Oakland, California, United States
kobalt_logo Kobalt
Kobalt provides cyber security programs.
Cloud Security, Cyber Security, Enterprise, Information Technology Vancouver, British Columbia, Canada
greensql_logo HexaTier
HexaTier delivers unified database security solutions utilizing a patented database reverse proxy technilogy.
Cloud Data Services, Cyber Security, Database, Security, Software Tel Aviv, Tel Aviv, Israel
grapherex_logo Grapherex
Secure messenger, cryptocurrency wallet and P2P exchange in one app
Blockchain, Cryptocurrency, Cyber Security, FinTech, Messaging, Mobile Apps Gibraltar, Gibraltar, Gibraltar
fifthdomain_logo FifthDomain
FifthDomain is a cyber operations skills and workforce development platform
Cyber Security, Developer Platform, PaaS, Security, STEM Education, Training Canberra, Australian Capital Territory, Australia
zenedge_logo Zenedge
Zenedge is a provider of cloud-based, artificial intelligence-driven cybersecurity solutions.
Cloud Computing, Cyber Security, Enterprise Software, Network Security Aventura, Florida, United States
cipherloc_logo CipherLoc
Cipherloc gives you the power to secure your information today and in the coming quantum computing era.
Cloud Security, Cyber Security, Network Security, Security, Software Austin, Texas, United States
cronus-cyber-technologies_logo Cronus Cyber Technologies
Cronus Cyber Technologies offers software solutions for the automated penetration testing market.
Cyber Security, Information Technology, Network Security, Security, Software, Virtualization Haifa, Hefa, Israel
intertech-security-llc_logo Intertech Ci
Intertech Ci is a security and investigations firm that offers security, life safety, and communication system integration services.
Cyber Security, Information Technology, Public Safety, Security Pittsburgh, Pennsylvania, United States
letstalkpayments-com_logo MEDICI
MEDICI is the global destination for the FinTech industry for the benefit of enterprises, startups, and investors.
Blockchain, Cyber Security, Finance, Financial Services, FinTech Charlotte, North Carolina, United States
emtec_logo Emtec
Emtec is a global IT consultancy dedicated to helping organizations drive transformation and growth via innovative technology and processes. OTCPINK:ETEC
Cloud Computing, Cloud Security, Consulting, CRM, Cyber Security, Enterprise Applications, Enterprise Resource Planning (ERP), Information Technology, Mobile Apps, Software Jacksonville, Florida, United States
auditone-9d84_logo AuditOne
AuditOne is an audit platform that facilitates seamless smart contracts audit process as well as offers Web3-based verification services.
Blockchain, Cyber Security, Information Technology, Productivity Tools, Security, Smart Contracts, Software, Web3 Cologne, Nordrhein-Westfalen, Germany
faceki_logo Faceki
FACEKI is a real-time identity verification platform with advance biometric technology powered by AI.
Artificial Intelligence, Biometrics, Cyber Security, Developer APIs, Facial Recognition, Identity Management, Information Technology Manama, Al Manamah, Bahrain
power-fingerprinting_logo PFP Cybersecurity
PFP is a cloud-based analytics that enables integrity assessment-as-a-service using dynamic power behavior analysis.
Analytics, Cyber Security, Hardware, Internet of Things, Intrusion Detection, Security Vienna, Virginia, United States
shape-matrix_logo Shape Matrix
Developing and commercializing the Shape Matrix system
Asset Management, Big Data, Cyber Security, Data Visualization, Enterprise Software, Identity Management, Industrial Manufacturing, Supply Chain Management Brooklyn, New York, United States
everykey_logo Everykey
Everykey is a offers a Bluetooth device designed to replace keys and passwords.
Cyber Security, Security, Software Cleveland, Ohio, United States
phalanx-547d_logo Phalanx
Phalanx stops cyber threats at the human layer with Zero Trust Data Security and provides seamless data security designed for productivity.
Big Data, Cyber Security, Data Integration, Data Storage, Database, Information Technology, Software Arlington, Virginia, United States
askenigma_logo Enigma
Enigma helps companies hire stronger, more diverse cybersecurity teams.
Cyber Security, Recruiting New York, New York, United States
delta-risk_logo Delta Risk
Delta Risk provides managed security services, cloud security, and security consulting to businesses and public sector clients.
Cloud Security, Cyber Security, Network Security, Penetration Testing, SaaS, Security San Antonio, Texas, United States
nanotech-security_logo Nanotech Security
Nanotech Security is a public company that designs and commercializes advanced security products and devices. OTCQX:NTSFF
Cyber Security, Nanotechnology, Security Burnaby, British Columbia, Canada
pr0ph3cy_logo Pr0ph3cy
Pr0ph3cy is a consulting firm that creates cybersecurity-related products and concepts.
Cyber Security, Network Security, Software Guyancourt, Ile-de-France, France
styrk-ai_logo STYRK AI
Security, Trust and Privacy for AI
Artificial Intelligence (AI), Cyber Security, Generative AI, Machine Learning Fremont, California, United States
nso-group_logo NSO Group
NSO Group develops Cyber Intelligence tools for Governments use only
Cyber Security, Government, National Security Herzliya, Tel Aviv, Israel
secsmart_logo Secsmart
Secsmart is a data security company which offers artificial intelligence and cryptographic technology based data security solutions.
Artificial Intelligence, Big Data, Cloud Data Services, Cyber Security, Software Hangzhou, Zhejiang, China
whizhack_logo Whizhack
Whizhack Technologies is an online cyber security training institute that partners with academic research institutions.
Cyber Security, Information Technology, Training Haryana, Haryana, India
catchprobe_logo CatchProbe
CatchProbe is the world's leading technology company that developed the world's first AI-Driven SaaS-based centralized intelligence product.
Analytics, Artificial Intelligence, Big Data, Cyber Security, Information Technology, Intrusion Detection, Network Security, Risk Management, Software San Francisco, California, United States
datashield_logo Datashield
DATASHIELD has provided advanced data security services since its founding in 2009
Computer, Cyber Security, Network Hardware, Network Security Salt Lake City, Utah, United States
suavei_logo Suavei
Suavei provides Enterprise-grade Cybersecurity to protect you, your Smart Home, and your business from hackers.
Cyber Security, Internet of Things, Telecommunications, Wireless N/A
abusix_logo Abusix
Abusix is a company of Internet security, network abuse handling, antispam and fraud specialists.
B2B, Cloud Infrastructure, Cloud Security, Communications Infrastructure, Cyber Security, Information Technology, Network Security, Security, Software Boston, Massachusetts, United States
zeguro_logo Zeguro
Zeguro is a cyber insurance startup focusing on helping small businesses mitigate their cyber risks.
Cyber Security, Insurance San Francisco, California, United States
4securitas_logo 4Securitas
Data centric cybersecurity for Enterprise.
Artificial Intelligence, Cyber Security, Information Services, Information Technology, Internet, Security, Software Dublin, Dublin, Ireland
tall-poppy_logo Tall Poppy
Tall Poppy builds tools and services to help companies protect their employees against online harassment and abuse.
Cyber Security, Employee Benefits, Security San Francisco, California, United States
firstpoint-mobile-guard_logo FirstPoint Mobile Guard
Giving organizations the power to protect all cellular device against all types of cellular cyber threats.
Cyber Security, Internet of Things, Mobile, Smart Cities, Telecommunications Netanya, HaMerkaz, Israel
specterops_logo SpecterOps
SpecterOps is a cybersecurity company that provides services and training solutions to help enterprises defend against attacks.
Cyber Security, Information Technology, Network Security, Training Alexandria, Virginia, United States
ultrasoc_logo UltraSoC Technologies
UltraSoC Technologies provides SoC infrastructure to enable rapid development of embedded systems.
Cyber Security, Embedded Systems, Hardware, Infrastructure, Software Cambridge, Cambridgeshire, United Kingdom
atto-research_logo ATTO Research
ATTO Research is a network virtualisation innovator with advanced SDN and NFV technologies.
Cyber Security, Information Technology, Software, Virtual Reality Seoul, Seoul-t'ukpyolsi, South Korea
qnext-corporation_logo Qnext Corp
Red Herring Top 100 global winner for zero trust remote data access/sharing of hybrid-IT on-premises, SharePoint and cloud-hosted storage
Android, Cyber Security, Enterprise Software, File Sharing, Information Technology, Internet, iOS, Privacy, Private Cloud, Virtualization Toronto, Ontario, Canada
oculusit_logo OculusIT
Higher education's high-touch, customer-centric IT services partner of choice.
Cloud Computing, Cyber Security, Enterprise Applications, Higher Education, Infrastructure, IT Management, Outsourcing Summit, New Jersey, United States
privacera_logo Privacera
Privacera is a SaaS-based data security and governance platform that offers data sharing without compromising regulatory compliance.
Big Data, Cloud Security, Compliance, Cyber Security, SaaS San Francisco, California, United States
groupsense_logo GroupSense
GroupSense is a provider of cyber intelligence services.
Artificial Intelligence, Cyber Security, Information Technology, Network Security, Risk Management, Security Arlington, Virginia, United States
sweepatic_logo Sweepatic
Sweepatic is an external attack surface management (EASM) company that helps customers become cyber resilient.
Asset Management, Cyber Security, Information Technology, Network Security Leuven, Vlaams-Brabant, Belgium
pribit-technology_logo Pribit Technology
Pribit Technology is a technology agency that provides cloud network security technology to related technology services.
Cyber Security, Information Technology, Security, Technical Support Seoul, Seoul-t'ukpyolsi, South Korea
avatao-com_logo Avatao
Interactive, job-relevant security training with real-life security labs to increase the security skills of development teams
Cyber Security, DevOps, E-Learning, Software, Software Engineering, Training Budapest, Budapest, Hungary
puresec_logo PureSec
PureSec develops a cloud-based cyber security platform designed to provide network protection for serverless architectures.
Cloud Security, Cyber Security, Enterprise Software, Security, Software Tel Aviv, Tel Aviv, Israel
apollo-2e62_logo Apollo Secure
Apollo Secure is an automated cybersecurity platform for startups and small businesses to quickly and easily achieve security compliance.
Compliance, Cyber Security, Network Security, Privacy, Security Sydney, New South Wales, Australia
lunasec_logo LunaSec
Open Source data security platform to help you protect your most sensitive data.
Cyber Security, Information Technology, Software Seattle, Washington, United States
baffin-bay-networks_logo Baffin Bay Networks
Baffin Bay Networks is a cybersecurity company that delivers cloud-based security platform for network and application attacks prevention.
Cyber Security, Software Stockholm, Stockholms Lan, Sweden
fend-994c_logo Fend
Fend provides a secure way to have situational awareness of IoT-enabled assets.
Big Data, Cyber Security, IT Infrastructure, Software Arlington, Virginia, United States
cyemptive-technologies_logo Cyemptive Technologies
Cyemptive Technologies is a cybersecurity company providing IT infrastructure solutions.
Cloud Infrastructure, Cyber Security, Information Services, Information Technology, PaaS Snohomish, Washington, United States
venari_logo Venari Security
Venari Security is an encrypted analysis platform that detects anomalous behaviour in encrypted traffic without the need for decryption.
Compliance, Cyber Security, Risk Management, Software London, England, United Kingdom
huaun_logo HUAUN
HUAUN is a security vendor that focuses on vulnerability management and AI offense and defense.
Artificial Intelligence, Cyber Security, Security Haidian, Beijing, China
filancore_logo Filancore
filancore helps organizations safeguard their digital business and assets in terms of a fully networked device and machine economy.
Automotive, Autonomous Vehicles, Blockchain, Cyber Security, Software Limburgerhof, Rheinland-Pfalz, Germany
surance-io_logo Surance.io
Surance.io is a provider of personal cyber protection and insurance service.
Cyber Security, Insurance, InsurTech, Internet of Things Ramat Hasharon, Tel Aviv, Israel
ecsc-group_logo ECSC Group
Established in 2000, ECSC is the UK's longest running full service information and cyber security service provider LSE:ECSC
Cloud Security, Cyber Security, Information Technology, Web Design Bradford, Somerset, United Kingdom
deduce_logo Deduce
Deduce provides real-time analytics profiling and scoring to detect and prevent bad actors and account takeover.
Analytics, Artificial Intelligence, Big Data, Cyber Security, Fraud Detection, Identity Management, Predictive Analytics, Software Philadelphia, Pennsylvania, United States
sentryo_logo Sentryo
Sentryo develops and provides cybersecurity and situation awareness solutions to industrial networks and the internet of things.
Artificial Intelligence, Computer, Cyber Security, Industrial, Information Technology, Internet of Things, Security, Software, Technical Support Villeurbanne, Rhone-Alpes, France
pixm_logo Pixm
Pixm is a computer and network company that specializes in cybersecurity and endpoint security.
Artificial Intelligence (AI), Computer, Cyber Security, Network Security New York, New York, United States
exalens_logo Exalens
Cyber-Physical Security for Digital Industry
Cyber Security, Industrial, Information Technology, Intrusion Detection, Network Security, Predictive Analytics, Software London, England, United Kingdom
ssh-communication-security_logo SSH Communication Security
SSH Communications Security is the market leader in developing advanced security solutions HEL:SSH1V
Computer, Cyber Security, Network Security Helsinki, Southern Finland, Finland
polyrize_logo Polyrize
Polyrize is a cyber security service providing company.
Cyber Security, Security Tel Aviv, Tel Aviv, Israel
1fort_logo 1Fort
Cyber insurance made seamless for growing businesses
B2B, Cyber Security, InsurTech, Software New York, New York, United States
axis-security_logo Axis Security
Axis Security is a cloud security company that makes it simple to secure access to business resources.
Cloud Security, Cyber Security, Information Technology, Network Security, Software San Mateo, California, United States
digital-fingerprints-is-a-continuous-authentication-solution-based-on-behavioural-biometrics_logo Digital Fingerprints
Digital Fingerprints is a continuous authentication solution based on behavioural biometrics compliant with PSD2 and GDPR
Artificial Intelligence, Big Data, Biometrics, Cyber Security, Fraud Detection, Machine Learning, Risk Management, Software Katowice, Slaskie, Poland
cohere-communications_logo Cohere Cyber Secure
Cohere provides unsurpassed skills in meeting the needs of todayโ€™s businesses.
Cyber Security, Information Technology, Network Security, Software, Telecommunications, VoIP New York, New York, United States
cyberangels_logo Cyberangels
Cyberangels is an all-in-one platform to help SMBs reduce cyber risk by 90%, without becoming or hiring cyber experts and breaking the bank.
Cyber Security, Information Technology, InsurTech Milano, Lombardia, Italy
fyde_logo Fyde
Software-defined remote access and security
Computer, Cyber Security, Network Security, Software Palo Alto, California, United States
cavelo_logo Cavelo
Cavelo is a data discovery and cybersecurity startup.
Cyber Security, Software Kitchener, Ontario, Canada
randori_logo Randori
Randori is your trusted adversary.
Computer, Cyber Security, Network Security, SaaS Waltham, Massachusetts, United States
treacle-technologies_logo Treacle Technologies
Treacle Technologies is a cybersecurity startup which ensures that businesses remain safe in an ever-changing digital world.
Cyber Security, Information Technology, Internet Kanpur, Uttar Pradesh, India
my1login_logo My1Login
My1Login is a next generation Identity and Access Management solutions for Enterprise.
Cyber Security, Identity Management, SaaS, Software London, England, United Kingdom
eperi-gmbh_logo Eperi
Eperi is a software company based in Germany that provides open source cloud-based IT security solutions.
Computer, Cyber Security, Information Technology, Network Security, Security, Software Pfungstadt, Hessen, Germany
arsen_logo Arsen
Arsen is a phishing simulation SaaS, allowing CISOs and consultants to create realistic attacks simulations and train against them.
Cyber Security, Information Technology, SaaS, Software Paris, Ile-de-France, France
ijiam_logo IJiami
iJiami is a mobile information security service provider with focus on application, big data and IoT security.
Cyber Security, Information Technology Beijing, Beijing, China
veriflow-systems_logo Veriflow
Veriflowโ€™s mission is to apply continuous verification to networks, preventing outages and vulnerabilities that lead to astronomical losses.
Cyber Security, Information Technology, Network Security, Predictive Analytics San Jose, California, United States
terranova-security_logo Terranova Security
Terranova Security provides phishing, GDPR, and security awareness programs to change behaviors and reduce data breaches.
Cyber Security, Data Governance, Event Management, Information Technology, Training Laval, Quebec, Canada
krypt-co_logo Krypt.co
krypt.co builds the next generation of mobile-based authentication based on strong cryptography.
Apps, Cyber Security, Mobile Apps, Security Boston, Massachusetts, United States
port53-technologies_logo Port53
Port53 is a cybersecurity firm that offers penetration testing and cloud risk assessment services.
Cloud Security, Cyber Security, Risk Management San Francisco, California, United States
blue-sentry_logo Blue Sentry
Blue Sentry is an Amazon Web Services (AWS) premier consulting partner that elevates businesses to the AWS Cloud.
Cloud Computing, Cyber Security Murrells Inlet, South Carolina, United States