Organizations in Cyber Security

Name Industry Address
morta-security_logo Morta Security
Morta Security is a stealth-mode startup developing solutions for cybersecurity.
Cloud Security, Computer, Cyber Security, Internet, Network Security, Security Palo Alto, California, United States
medblox_logo MedBlox
MedBlox is a decentralized healthcare patient identity & information exchange. Enabling you the patient for the first time to #OwnYourRecord
Consulting, Cyber Security, Data Integration, Electronic Health Record (EHR), Health Care, Identity Management, Medical, Security Coralville, Iowa, United States
sooho_logo SOOHO.IO
We support build-in cross-chain bridge for enterprise mainnet
Blockchain, Cloud Security, Cyber Security, FinTech, Information Technology, SaaS, Security Yeoksamdong, Seoul-t'ukpyolsi, South Korea
conjur_logo Conjur
Conjur delivers solution for identity and access management for machines, code, and the people who work with them.
Cyber Security, Information Technology, Software Newton, Massachusetts, United States
fhoosh_logo Fhoosh
Encryption SDK
Cyber Security San Diego, California, United States
breachbits_logo BreachBits
BreachBits is a simplified SaaS cyber risk and penetration testing solution.
Artificial Intelligence, Cyber Security, Machine Learning, SaaS Annapolis, Maryland, United States
malwation_logo Malwation
Malwation is a company fully focused on developing malware analysis solutions.
Analytics, Cyber Security Istanbul, Istanbul, Turkey
cufflink-io_logo Cufflink.io
Cyber Security Software as a Service
Compliance, Cyber Security, Information Technology, Software Gaerwen, Isle of Anglesey, United Kingdom
camel-secure_logo Camel Secure
Cibersecurity risk management platform
Cyber Security, Information Technology, Software Providencia, Region Metropolitana, Chile
cybertrap_logo CyberTrap Software GmbH
CyberTrap is an advanced highly-interactive deception technology, CyberTrap lures malicious actors into its digital playground.
Cyber Security, Information Technology, Security, Software Neustadt, Niederosterreich, Austria
appsco_logo AppsCo
Appsco helps you manage access to your company applications and gives you meaningful insights over sensitive data flow.
Analytics, Blockchain, Cloud Computing, Cyber Security, Enterprise Software, Identity Management, Internet of Things, SaaS, Security, Software St Louis, Missouri, United States
mindlink-software_logo MindLink Software
MindLink provides business critical collaboration enabled through Enterprise Chat.
Cyber Security, Developer APIs, Email, Information Technology, Messaging, Software London, England, United Kingdom
presidio-identity-inc_logo Presidio Identity
Presidio Identity is on a mission to eliminate identity and financial fraud, bringing trust and security to our digital interactions.
Cyber Security, Information Technology, Internet, Privacy, Security San Francisco, California, United States
fraud-net_logo Fraud.net
The Future of Fraud Prevention - fraud detection, intelligence augmentation, and live-streaming visualizations.
Analytics, Artificial Intelligence, Banking, Big Data, Business Intelligence, Consumer Lending, Cyber Security, E-Commerce, Financial Services, FinTech, Fraud Detection, Internet, Machine Learning, Payments, Retail, SaaS, Security New York, New York, United States
trace-data_logo Trace Data
Data observability for a connected world. Trace Data helps companies understand, monitor and secure their data.
Analytics, Big Data, Cyber Security, Privacy San Francisco, California, United States
arcusteam_logo DeviceTotal
DeviceTotal is a SaaS platform that provides risk management for any un-agentable device including any IoT and OT devices.
Android, Big Data, Cyber Security, Internet of Things, iOS, Linux, SaaS, Software Tel Aviv-yafo, Tel Aviv, Israel
code-research-and-technological-development_logo CoDe_RTD
CoDe RTD fights digital piracy by collecting legal evidence of copyright infringement and by preventing illegal sharing
Artificial Intelligence, Cyber Security, DRM, Information Technology, Network Security, Software Torino, Piemonte, Italy
neokami-2_logo Neokami
Artificial Intelligence for Sensitive Data Security
Artificial Intelligence, Computer Vision, Cyber Security, Machine Learning New York, New York, United States
cipherpoint-software_logo CipherPoint
Cipherpoint provides solutions that help businesses and governments identify, protect, and control access to sensitive information.
Cloud Data Services, Compliance, Content Discovery, Cyber Security, Security Sydney, New South Wales, Australia
cryptolab-inc_logo Cryptolab Inc.
Cryptolab is a Cryptography and Cyber Security company that implemented the First Search Engine working for Encrypted data
Cloud Computing, Cyber Security, Information and Communications Technology (ICT), Search Engine, Software Santa Clara, California, United States
authomzie_logo Authomize (Now Part Of Delinea)
Authomize is an Detect and Eliminate Identity threats across cloud and IAM.
Cloud Security, Cyber Security, Data Center Automation, Identity Management, Information Technology, Software Tel Aviv, Tel Aviv, Israel
rejjee_logo Rejjee
Lost & Found for travelers world-wide. SaaS platform posting official TSA Lost & Found reports & delivering JIT product replacement ads.
Cyber Security, Mobile Apps, SaaS, Travel Cambridge, Massachusetts, United States
conatix_logo Conatix
Where AI meets cybersecurity
Business Intelligence, Cyber Security, Knowledge Management, Machine Learning, Search Engine Arlington, Virginia, United States
bisec_logo BISEC
BISEC is a next generation cyber incident response platform for SOC and MSSPs.
Cyber Security, Information Technology, Security Holon, Tel Aviv, Israel
reason-core-security_logo ReasonLabs
ReasonLabs is a leading cybersecurity company providing end-to-end protection for users all around the world.
Cyber Security, Mobile Apps, Privacy, Software New York, New York, United States
javelin-networks_logo Javelin Networks
Protect Active Directory from every endpoint. Agentless.
Computer, Cyber Security, Information Technology Austin, Texas, United States
communicate-technology_logo Communicate Technology
Communicate Technology specializes in offering network infrastructure, cyber security, cloud management, and IT support solutions.
Cloud Management, Cyber Security, IT Infrastructure Stockton, Stockton-on-Tees, United Kingdom
steer-837a_logo STEER
STEER builds retrofit kits to convert passenger & commercial vehicles into automated driverless vehicles for various low speed applications
Automotive, Autonomous Vehicles, Cyber Security, Industrial Automation, Logistics, Parking, Software, Transportation Annapolis Junction, Maryland, United States
sunday-security_logo Sunday Security
Sunday is a personal cybersecurity platform, built to protect executive teams beyond the enterprise perimeter.
Cyber Security Tel Aviv, Tel Aviv, Israel
firedome_logo Firedome
Firedome secures IoT devices and prevent next cyber-catastrophe.
Analytics, Cyber Security, Security New York, New York, United States
evixar_logo Evixar
Evixar provides an Automatic Content Recognition technology โ€œEvixar ACRโ€ that identifies and analyzes sound content.
Communications Infrastructure, Content, Cyber Security, Developer Tools, Information Technology, Internet, Marketing, Network Security Tokyo, Tokyo, Japan
saltycloud_logo SaltyCloud
Isora GRC from SaltyCloud is the Lightweight Governance, Risk, and Compliance (GRC) Assessment Platform.
Compliance, Cyber Security, Information Technology, Risk Management, Security Austin, Texas, United States
ditno_logo Ditno.
ditno uses machine learning to help build a fully governed and micro-segmented network to significantly mitigate risk across organizations.
Artificial Intelligence, Cloud Computing, Cloud Security, Cyber Security, Machine Learning, Network Security, Security Sydney, New South Wales, Australia
tilos_logo Tilos
Tilos mission is to make impossible optimizations possible, at scale and in practice.
Artificial Intelligence (AI), Cyber Security, Product Research La Jolla, California, United States
trianz_logo Trianz
Accelerating Digital Evolution
Analytics, Artificial Intelligence (AI), Big Data, Business Intelligence, Cloud Infrastructure, Collaboration, Cyber Security, Generative AI, Mobile Apps, Test and Measurement Santa Clara, California, United States
lexisnexis-risk-solutions-2_logo LexisNexis Risk Solutions
LexisNexis Risk Solutions provides information to assist customers in industry and government in assessing, predicting, and managing risk.
Analytics, Consulting, Cyber Security, Information Services, Information Technology, Management Consulting, Risk Management, Software Alpharetta, Georgia, United States
beaufort-solutions-as_logo Beaufort Solutions
Beaufort Solutions is a developer of a cybersecurity platform.
Cyber Security, Financial Services, Software Oslo, Oslo, Norway
haekka_logo Haekka
Haekka is a privacy and security micro-training platform built for Slack.
Cyber Security N/A
mydocsafe_logo MyDocSafe
MyDocSafe is a secure client portal and compliance dashboard for a secure client and employee onboarding.
Cloud Security, Cyber Security, Document Management, E-Signature, Identity Management, Information Technology, Privacy, Professional Services, Security, Software Bedford, Bedfordshire, United Kingdom
redsocks_logo RedSocks Security
RedSocks Security is specialised in network monitoring and breach detection using applied in-house Cyber Threat Intelligence.
Cyber Security, Intrusion Detection, Network Security The Hague, Zuid-Holland, The Netherlands
intel-471_logo Intel 471
Intel 471 is the premier provider of cybercrime intelligence for leading security, fraud, and intelligence teams.
Cyber Security, Risk Management, Security Wilmington, Delaware, United States
topspin-security_logo TopSpin Security
TopSpin Security is a leading developer of cutting edge devices providing advanced malware deception and detection technology.
Cyber Security, Network Security, Security Herzliya, Tel Aviv, Israel
mypermissions_logo MyPermissions
MyPermissions is an online privacy shield app that allows users to scan, manage and regain control of their social media content.
Cloud Security, Cyber Security, Privacy, Security Tel Aviv, Tel Aviv, Israel
esafe-global_logo ESafe Global
A safeguarding software company.
Cyber Security, Education, Software Salford, Oxfordshire, United Kingdom
armur-ai_logo Armur Ai
Armur Ai is a web3 cybersecurity product suite that helps secure decentralized applications and blockchain solutions.
Artificial Intelligence (AI), Cyber Security, Developer Tools, Software, Web Development, Web3 Bengaluru, Karnataka, India
accellis-technology-group_logo Accellis Technology Group
Accellis Technology Group offers IT services, cyber security, application development, and software solutions.
Cyber Security, Information Services, Information Technology, Software Cleveland, Ohio, United States
fti-consulting_logo FTI Consulting
FTI Consulting is a global business advisory firm. NYSE:FCN
Accounting, Consulting, Cyber Security, Enterprise Software, Public Relations Washington, District of Columbia, United States
filestring_logo FileString
Empowers to protect files sharing.
Cloud Computing, Cyber Security, File Sharing Santa Cruz, California, United States
wivity-inc_logo Wivity Inc.
Distributed database that holds security-critial information on cyrptographic private keys. Standardized by the SunSpec Alliance.
Blockchain, Cyber Security, Internet of Things, Power Grid, Security, Solar San Francisco, California, United States
securepush-ltd_logo Securepush LTD
Highly Secured IoT Platform on a Chip
Cloud Data Services, Cyber Security, Developer Platform, Internet of Things, Security Migdal Tefen, HaZafon, Israel
surfshark_logo Surfshark
Surfshark is a cybersecurity company focused on developing humanized privacy & security solutions.
Cyber Security, Information Technology, Network Security, Privacy, Social Media, Software Engineering Amsterdam, Noord-Holland, The Netherlands
oxford-biochronometrics_logo Oxford BioChronometrics
Armed w/Ox Bio Human Recognition Technology (HRT) advertisers reach their targets of real people with real purchasing power for real growth.
Analytics, Big Data, Biometrics, Cyber Security, Fraud Detection London, England, United Kingdom
rubicon-labs_logo Rubicon Labs
Rubicon Labs, is a cybersecurity company founded by veterans of Apple and Broadcom,
Cyber Security, Internet of Things, Network Security, Software San Francisco, California, United States
tokenone_logo TokenOne
TokenOne is a cyber security software company that provides high security business solutions.
Cyber Security, Enterprise Software, Information Technology, Software Newcastle, New South Wales, Australia
redrays_logo RedRays
RedRays Security Platform for SAP is designed to provide complete protection and vulnerability detection on your SAP systems
Cyber Security, Enterprise Resource Planning (ERP), Network Security, Penetration Testing Yerevan, Yerevan, Armenia
stealthmail_logo StealthMail
StealthMail makes your emails secure and invisible to email relays, hackers, or Public Internet threats.
Cloud Security, Cyber Security, Email, Enterprise Software San Francisco, California, United States
kapalya_logo Kapalya
Kapalya protects corporate data by encrypting files on end-points, corporate servers, and public cloud providers.
Cyber Security, File Sharing, Information Technology, Software Berkeley, California, United States
spikes-inc_logo Spikes Security
A cyber security company with innovative, patented isolation technology to prevent browser-borne malware attacks.
Cyber Security, Network Security, Security Los Gatos, California, United States
cybersec-consulting_logo CyberSec Consulting
Cyber Security Professional Services, Consulting and Training Organiation
Consulting, Cyber Security, Identity Management, Information Services, Information Technology, Professional Services, Training Dubai, Dubai, United Arab Emirates
ossillate_logo Ossillate
Ossillate is a security testing platform for open-source software.
Cyber Security, Security, Software Auburn, Alabama, United States
tykn_logo Tykn
Tykn is an award-winning startup developing Self-Sovereign Identity solutions. Creating a future of opportunity through digital identity.
Blockchain, Cyber Security, Identity Management, Social Entrepreneurship, Social Impact The Hague, Zuid-Holland, The Netherlands
tensormark_logo TensorMark
TensorMark implements AI and computer vision onto camera streams to compile analytics and make data actionable
Analytics, Artificial Intelligence (AI), Computer Vision, Cyber Security, Fraud Detection, Identity Management, Machine Learning, National Security, Security Santa Monica, California, United States
carbonetes_logo Carbonetes
Shift-Left Container Security as a Service
Cloud Security, Cyber Security, Software Houston, Texas, United States
hacksurfer_logo SurfWatch Labs
SurfWatch Labs delivers strategic and operational cyber threat intelligence.
Analytics, Big Data, Cyber Security, Risk Management, Security, Social Media, Software Sterling, Virginia, United States
globalnetworks_logo Globalnetworks
Globalnetworks is a software company that engages in providing online platform for livestock direct deal.
Cyber Security, Security, Software Columbia, Maryland, United States
lifeready_logo LifeReady
LifeReady provides a secure, cloud-based platform to catalog and share critical information with trusted contacts
Consumer Software, Cyber Security, Information Technology, Software Melbourne, Victoria, Australia
fireblade_logo FireBlade
FireBlade is a security solution provider for security, visibility and control over website traffic.
Cyber Security, Network Security, Security Tel Aviv, Tel Aviv, Israel
cloudmask_logo CloudMask
With CloudMask, infrastructure breaches no longer mean data breaches. An insider possessing system access, no longer means seeing the data
Cloud Security, Cyber Security, Privacy, SaaS Ottawa, Ontario, Canada
fortifyedge_logo FortifyEdge
Fortifyedge is on-device cybersecurity software company.
Cyber Security, Network Security, Software Cambridge, Massachusetts, United States
prometheus8_logo Prometheus8
Prometheus8 provides services and industry information to help customers implement DevOps practices.
Cyber Security, DevOps, Information Technology, Software San Carlos, California, United States
itrust-2_logo ITrust
Cybersecurity risk ratings and risk intelligence to help businesses build trusted relationships with their vendors, partners, and suppliers.
Cloud Infrastructure, Cyber Security, Risk Management, SaaS, Security Atlanta, Georgia, United States
drie-secure-systems_logo Drie Secure Systems
Drie allows teams to rapidly develop and deploy applications to the cloud without compromising on security.
Cloud Computing, Computer, Cyber Security, Information Technology, Network Security, Software London, England, United Kingdom
federacy_logo Federacy
Federacy operates as a bug bounty platform for startups.
Cyber Security, Internet, Security San Francisco, California, United States
hackenproof_logo HackenProof
Bug Bounty and Vulnerability Coordination Platform
Cyber Security Tallinn, Harjumaa, Estonia
mtcaptcha_logo MTCaptcha
MTCaptcha is an online security with smart captchas and easy to use plugins all in the cloud as SaaS.
Cyber Security, SaaS, Software San Francisco, California, United States
ix-den_logo IXDen
Securing IoT devices of ICS systems. Invented "biometric-like" IoT Device Identity and Authentication using mathematics and AI
Artificial Intelligence, Cyber Security, Internet of Things Tel Aviv, Tel Aviv, Israel
lujam-internet-security_logo LuJam Cyber
LuJam Cyber provides affordable, real-time cyber security, risk and compliance monitoring for Managed Service Providers and their customers.
Compliance, Cyber Security, Information Technology, Internet, Risk Management Bristol, Bristol, City of, United Kingdom
terrogence_logo Terrogence Global
Intelligence Solutions
Cyber Security, Homeland Security, Security, Software Tel Aviv, Tel Aviv, Israel
trinity-cyber_logo Trinity Cyber
Trinity Cyber invents technology to solve the most difficult cyber security challenges. The company patented a new, innovative approach.
Cyber Security, Information Technology, Software Bowie, Maryland, United States
enginsight_logo Enginsight
Enginsight is a integrated extended detection and response (XDR) platform, with the capability to build host and network based IDS and IPS
Cyber Security, IT Management, Penetration Testing, Software Jena, Thuringen, Germany
andro-computational-solutions_logo ANDRO Computational Solutions
ANDRO Computational Solutions offers advanced computer software research and development services.
Cyber Security, Product Research, Software, Software Engineering Rome, New York, United States
aiba_logo AiBA
AiBA is an AI-powered moderator tool that identifies and detects real-time detection of fake profiles, grooming, and toxicity.
Artificial Intelligence (AI), Cyber Security, Real Time, Security, Software Gjรธvik, Oppland, Norway
zerowall_logo ZeroWall
ZeroWall is an information security company and a provider of security analytics solutions.
Cyber Security, Enterprise, Information Services, Network Security Burlingame, California, United States
kinnami_logo Kinnami
Kinnami provides a resilient data fabric simplifying data availability, protection, and security for complex distributed networks.
Blockchain, Cyber Security, Internet of Things, Software Braintree, Massachusetts, United States
g-research_logo G-Research
G-Research is a research and technology company that specializes in Quantitative Research and IT Infrastructure.
Business Intelligence, Cyber Security, Information Technology, Machine Learning, Natural Language Processing, Software Engineering London, England, United Kingdom
sudoviz_logo Sudoviz
AI Powered Application Security Platform for Enterprises
Cloud Security, Cyber Security, Developer Tools, Enterprise Software, Security Sunnyvale, California, United States
siemens-energy-6cf7_logo Siemens Energy
Siemens Energy AG is one of the worldโ€™s leading energy technology company.
Cyber Security, Energy, Energy Storage, Industrial, Industrial Automation, Oil and Gas, Power Grid, Renewable Energy N/A
web-samurai_logo Web Samurai
A decentralized platform focused on WEB3 development and security.
Blockchain, Cryptocurrency, Cyber Security, Finance, Venture Capital Houston, Texas, United States
cybernetiq_logo CYBERNETIQ
Building technologies for the cyber battlefield by security operators for security operators.
Consulting, Cyber Security, Information Technology, Infrastructure, Real Time, Security, Software Ottawa, Ontario, Canada
secnap-network-security_logo SECNAP Network Security
SECNAP Network Security combines human intelligence with innovative technology to protect organizations from cyber threats.
Cloud Security, Cyber Security, Information Services, Internet, Intrusion Detection, Network Security, Penetration Testing, Risk Management, Security, Software Fort Lauderdale, Florida, United States
vericlouds_logo VeriClouds
VeriClouds pioneered credential monitoring and verification to help organizations detect compromised credentials and prevent data breaches.
Cloud Security, Cyber Security, Network Security, SaaS Seattle, Washington, United States
openrefactory_logo OpenRefactory
Fix security, safety, reliability, and compliance problems in software "automagically".
Cyber Security, Developer Tools, Security Milpitas, California, United States
ashield-technologies_logo AShield Technologies
AShield Technologies is an IT sector.
B2B, Cyber Security, Internet, Machine Learning, Security, UX Design Singapore, Central Region, Singapore
seclab_logo Seclab
Protecting Critical Infrastructures against cyber threats.
Cyber Security, Network Security, Security Montpellier, Languedoc-Roussillon, France
homesirens_logo HomeSirens, Inc.
SaaS Internet Security Solution that protects home consumers, work from home users, and small businesses with high speed internet.
Cyber Security, Home Services, Information Technology, Internet, Internet of Things, Network Security, SaaS, Smart Home Charlotte, North Carolina, United States
appgate_logo AppGate
AppGate develops and provides cloud and hybrid-ready security and analytics products and services.
Cloud Security, Cyber Security, Network Security, Software Coral Gables, Florida, United States
check-point_logo Check Point Software Technologies
Check Point Software Technologies provides and protects customers from cyberattacks. NASDAQ:CHKP
Cyber Security, Hardware, IT Management, Network Security, Software Tel Aviv, Tel Aviv, Israel
secure-blink_logo Secure Blink
Heuristic Application Security Management Platform For Modern Businesses.
Cyber Security, SaaS, Security Noida, Uttar Pradesh, India
ecora_logo ECora
Decentralised Ledger Technology for Central Bank Digital Currency
Blockchain, Cyber Security, Mobile Payments, Software Leicester, Leicester, United Kingdom
trust-elevate_logo TrustElevate
Trust Elevate solves the problem of age verification and parental consent for young adults and children in online transactions.
Banking, Cyber Security, Information Technology, Software London, England, United Kingdom