Organizations in Cyber Security

Name Industry Address
cord3_logo Cord3
A game changing B2B information centric security approach.
B2B, Cyber Security, Government, Information Technology, Security Ottawa, Ontario, Canada
accolite_logo Accolite Digital
Accolite Digital is a software company that offers data & AI, cloud, devops, cyber security and UX design solutions.
Analytics, Cloud Computing, Cyber Security, Machine Learning, Software Addison, Texas, United States
triagingx_logo TriagingX
TriagingX provides cyber responders tools and insights for malware analysis.
Analytics, Cyber Security, Risk Management, Security San Jose, California, United States
nettoken_logo Nettoken
The control panel for your digital identity!
Cyber Security, Information Technology, Productivity Tools, Software London, England, United Kingdom
xor-data-exchange_logo XOR Data Exchange
XOR Data Exchange is a data revolution by giving transparency, accountability and control back to data owners.
Analytics, Cyber Security, Information Services, Marketing Austin, Texas, United States
arbitrary-execution_logo Arbitrary Execution
Arbitrary Execution develops a security system to secure the crypto ecosystem.
Blockchain, Cyber Security, Network Security Sterling, Virginia, United States
shieldio_logo ShieldIO, Inc.
Database Security and Analytics Search
Analytics, CRM, Cyber Security, Information Technology, Security Reno, Nevada, United States
cryptonite-nxt_logo Cryptonite NXT
Cryptonite NXT help enterprises regain the upper hand against attackers.
Cyber Security, Developer Tools, Network Security Rockville, Maryland, United States
zobi-io_logo Zobi
Zobi develop products to provide whole-home protection against the malicious digital activity.
Artificial Intelligence (AI), Cyber Security, Homeland Security, Internet of Things, Security London, England, United Kingdom
nect-8b06_logo Nect WORLD
We enable business professionals to be confident in their day-to-day operations with secure and reliable Internet for their laptops.
Consumer Electronics, Cyber Security, Electronics, Information Technology, Internet, Productivity Tools, Telecommunications Kyiv, Kyyiv, Ukraine
quorum-control_logo Quorum Control
Quorum Control is building a platform for digital ownership.
Blockchain, Cyber Security, Security Berlin, Berlin, Germany
turing-inc_logo Turing
Turing is an IT company that allows startups, businesses, and organizations to hire software engineers.
Cyber Security, Quantum Computing, Software Brooklyn, New York, United States
tcell-io_logo TCell
tCell is a next-gen web app firewall for the cloud designed to overcome the limitations of traditional Web Application Firewalls.
Computer, Cyber Security, DevOps, Network Security San Francisco, California, United States
sitesecure_logo SiteSecure
SiteSecure provides website security-related solutions to its clients.
Cyber Security, Security, Web Browsers Moscow, Moscow City, Russian Federation
omnistruct-inc_logo Omnistruct Inc
SaaS, Consulting, Audit
Cloud Computing, Cyber Security, Marketing, Privacy, Risk Management, SaaS, Security Sacramento, California, United States
xindajiean_logo Xindajiean
Xindajiean is an information security company that design a security chip. NEEQ:834403
Cyber Security, Information Services, Security Zhengzhou, Henan, China
dronesec_logo DroneSec
DroneSec is revolutionising cybersecurity and threat intelligence for safe and secure drone operations.
Artificial Intelligence, Cyber Security, Drone Management, Drones, Intelligent Systems, Security, Training Melbourne, Victoria, Australia
flk_logo FLK
FLK is a mobile information encryption service platform.
Cyber Security, Information Technology, Mobile Hangzhou, Zhejiang, China
agita-labs_logo Agita Labs
Agita Labs develops privacy-enhanced computing architectures that facilitate the creation of new data markets.
Cloud Computing, Cyber Security, Privacy Ann Arbor, Michigan, United States
signacert_logo SignaCert
SignaCert specializes in revolutionizing IT compliance and change detection.
Cyber Security, IT Management, Software Austin, Texas, United States
traced_logo Traced
Traced operates as a mobile cybersecurity start-up.
Computer, Cyber Security, Information Technology, Mobile, Mobile Apps Oxford, Oxfordshire, United Kingdom
softhread_logo Softhread
Softhread is a blockchain technology company that develops enterprise solutions using a blockchain and AI-enabled platform.
Artificial Intelligence, Blockchain, Cyber Security Baltimore, Maryland, United States
stash-datacentric-security_logo STASH No Ransom Ransomware Solution
A Datacentric Security Platform, plus the World's First and Only No Ransom Ransomware Protection, Mitigation, and Recovery Solution
Business Intelligence, Cyber Security, Data Visualization, Information Technology, Internet, Security, Software Stamford, Connecticut, United States
cloud4c_logo Cloud4C
Cloud4C is an IT firm that deals with disaster recovery, SAP solutions, cybersecurity and access management services.
Cloud Computing, Cyber Security, Information Technology Singapore, Central Region, Singapore
responsight_logo ResponSight
ResponSight offers enterprise risk and security profiling technology using behavioral analytics without collecting private information.
Analytics, Cyber Security, Intelligent Systems, Network Security, Risk Management, Security Melbourne, Victoria, Australia
tenorshare-co-ltd_logo Tenorshare Co.,Ltd.
Tenorshare, Inc. is a world pioneer software developer of PC/Mac utility technologies and applications.
Apps, Cyber Security, Software New York, New York, United States
tactic-ly_logo Tactic.ly
Tactic.ly offers penetration testing and cybersecurity consulting and assessments.
Cyber Security, Mobile Apps, Network Security, Penetration Testing N/A
ambit-a3f6_logo Ambit
Ambit is a post-quantum network security company focusing on post-quantum cryptography and encryption.
Cyber Security, Database, Information Technology, Network Security Kirkland, Washington, United States
securedtouch_logo SecuredTouch
SecuredTouch is a platform that provides bot attack prevention, identity risk, and fraud intelligence services.
Biometrics, Cyber Security, FinTech, Fraud Detection, Mobile Payments, Risk Management, Software Palo Alto, California, United States
equisign_logo Equisign
Equisign is a software editor specialized in digital security.
Cyber Security, Software Paris, Ile-de-France, France
nextgenid_logo NextgenID
NextgenID is a technology innovator that provides end-to-end trusted identity solutions to government and commercial sectors.
Big Data, Cyber Security, Identity Management, Information Technology, Productivity Tools, Software Fairfax, Virginia, United States
valtix_logo Valtix
Valtix protects customer applications in the public cloud with its multi-cloud network security platform delivered as a service.
Cloud Security, Cyber Security, DevOps, Network Security, SaaS Santa Clara, California, United States
coinpay-605e_logo Coinpay
Coinpay Lets users can send Bitcoin and other cryptocurrencies anywhere in the world within seconds.
Cryptocurrency, Cyber Security, Financial Services, FinTech Bloomfield Hills, Michigan, United States
squirrel-compliancy-solutions_logo Squirrel Compliancy Solutions
Squirrel Compliancy Solutions provides cybersecurity compliance and risk management lifecycle automation.
Cyber Security, Information Technology, Software Raleigh, North Carolina, United States
connax_logo CONNAX
CONNAX - Simple & Secure IoT, a company based in Helsinki Finland that provides B2B IoT software.
Cyber Security, Information Technology, Internet of Things, Telecommunications Helsinki, Southern Finland, Finland
exclusive-networks-850d_logo Exclusive Networks
Exclusive Networks offers global cybersecurity and cloud solutions, and various services including logistics, financing and leasing. EPA:EXN
Cyber Security, Financial Services, Logistics Duffel, Antwerpen, Belgium
cyber-struggle_logo Cyber Struggle
Cyber Struggle provides 360-degree cybersecurity vision and abilities.
Cyber Security, Information Technology, Network Security Tallinn, Harjumaa, Estonia
http-www-cyber-ee-cms-en_logo Cybernetica
Cybernetica is a research and development company that researches, develops and manufactures software solutions in the field of ICT.
Cyber Security, Manufacturing, Software Tallinn, Harjumaa, Estonia
honeygain_logo Honeygain
Honeygain is the crowdsourced web intelligence network.
Apps, Cyber Security, Information Technology, Internet, iOS, Network Security New York, New York, United States
deceptive-bytes-ltd_logo Deceptive Bytes
Deceptive Bytes provides Active Endpoint Cyber Defense solution: Prevention by Deception.
Cyber Security, Security Holon, Tel Aviv, Israel
metcloud_logo MetCloud
MetCloud is a cybersecurity and cloud platform that is shaping the future of new digital economy.
Cloud Storage, Cyber Security, Technical Support Birmingham, Birmingham, United Kingdom
protegrity_logo Protegrity
For 15+ years, Protegrity has set the standard in precision data protection, helping enterprises secure and use sensitive data
Analytics, Big Data, Cloud Security, Cyber Security, Enterprise Software, Privacy, Security, Software Salt Lake City, Utah, United States
spera-fbce_logo Spera
Spera is an identity security posture management platform multiplier for identity teams -prioritize, and remediate identity-driven breaches.
Cyber Security, Network Security, Security Tel Aviv, Tel Aviv, Israel
marknum-technology_logo Marknum Technology
Marknum Technology is a Cybersecurity-focused AI solutions firm, focuses on Internet Security Technology and Public safety.
Analytics, Artificial Intelligence, Cyber Security Beijing, Beijing, China
praeferre_logo PRAEFERRE
Praeferre is backed by a number of high-profile VCs, accelerators and universities.
Blockchain, Computer, Cyber Security, Network Security Manchester, Manchester, United Kingdom
watchguard_logo WatchGuard
WatchGuard Technologies provides cutting-edge cyber security technology including network security, secure wi-fi, & MFA. NASDAQ:WGRD
Cyber Security, Network Security, Security, Software Seattle, Washington, United States
trail-of-bits_logo Trail Of Bits
Since 2012, Trail of Bits has helped secure some of the worldโ€™s most targeted organizations and products.
Cyber Security, National Security, Security, Software New York, New York, United States
bitsensor_logo BitSensor
BitSensor uses big data correlation and efficient attack detection to give visual insight into attacks and creates applications
Compliance, Cyber Security, Fraud Detection Eindhoven, Noord-Brabant, The Netherlands
militus_logo Militus
Militus is a cyber security company that provides an advanced cyber and network security solutions for government and commercial sectors.
Cyber Security, Information Technology, Network Security, Software Irvine, California, United States
peyk-447b_logo Peyk
Peyk is an advanced website monitoring service with smart correlation rules.
Cyber Security, Internet Kocaeli, Kocaeli, Turkey
iobit_logo IObit
IObit designs and develops system utilities and security software for superior PC performance and security for user worldwide.
Cyber Security, Enterprise Software, Software, Software Engineering, Technical Support San Francisco, California, United States
podium-data_logo Podium Data
Podium Data uses big data technologies to redefine the enterprise data management.
Analytics, Cyber Security, Data Management, Enterprise, Information Technology, Intelligent Systems Lowell, Massachusetts, United States
drivesec_logo Drivesec
Drivesec is a cybersecurity company which developes products and solution to secure the Internet of Things (IOT).
Cyber Security, Internet of Things, Security Torino, Piemonte, Italy
romad-cyber-systems_logo ROMAD Cyber Systems
ROMAD - Threat Detection & Response
Cyber Security, Information Technology, Network Security, Robotics, Security, Software Herndon, Virginia, United States
ark-sec_logo Ark.sec
Ark sec is a software firm that offers cloud-native security products and services.
Cloud Security, Cyber Security, Embedded Software, Intrusion Detection Beijing, Beijing, China
kryptokloud_logo KryptoKloud
KryptoKloud provides cyber security intelligence and monitoring services inc. GDPR compliance monitoring.
Cyber Security, Network Security Lincoln, Lincolnshire, United Kingdom
daon_logo Daon
Daon is an information technology company that offers biometrics and identity assurance software.
Cyber Security, Security, Software Fairfax, Virginia, United States
cypherpath_logo Cypherpath Inc.
Are you cyber ready? Rapidly build, deploy, and operate resilient cyber environments anywhere.
Cyber Security, Infrastructure, IT Infrastructure, Security, Smart Cities, Virtualization Mountain View, California, United States
itsavvy_logo ITsavvy
ITsavvy is showing the industry how to integrate IT products and advanced IT solutions.
Cyber Security, Information Technology, Software Illinois City, Illinois, United States
zangi_logo Zangi Private Messenger
Zangi - The New Era Messenger.
Consumer Software, Cyber Security, Enterprise Software, Privacy, Private Social Networking, Security, Unified Communications, Video Chat, Video Conferencing, VoIP Santa Clara, California, United States
jumble_logo Jumble
Jumble helps businesses to quickly secure their 75 billion daily emails by providing integrated one click end-to-end encryption.
Cyber Security, Email, SaaS, Software Dublin, Dublin, Ireland
myeasydocs_logo Myeasydocs
Tharakan Web Innovations Private Limited โ€œTWIโ€ has premiered myeasydocs.com,
Cyber Security, Document Management, Fraud Detection, Information Technology, Privacy, Security, Software Chennai, Tamil Nadu, India
netwrix_logo Netwrix
A provider of visibility and governance platform for on-premises, hybrid and cloud IT environments.
Cyber Security, Software Irvine, California, United States
iqvcloud_logo IQVCloud
iQVCloud is an IT company that provides encryption systems and related technology.
Cloud Computing, Cyber Security, Information Technology, Software Reno, Nevada, United States
smartaxiom-iot-security-product-iot-connectivity-platform_logo SmartAxiom
Decentralized Autonomous Solution for Fast, Reliable, Secure IoT
Blockchain, Cyber Security, Internet of Things, Security, Software Irvine, California, United States
grid7_logo Grid7
Grid7 is a energy tech company.
Blockchain, Cyber Security, Energy Boulder, Colorado, United States
fraudmarc_logo Fraudmarc
Fraudmarc provides email security & authentication services for businesses.
Cyber Security, Email, Software Atlanta, Georgia, United States
q-branch-labs_logo Q-Branch Labs
Cybersecurity protection for remote and work from home employees
Cyber Security, Internet of Things, Network Hardware, Network Security London, England, United Kingdom
protectbox_logo ProtectBox
NetZero cybersecurity marketplace
Consulting, Cyber Security, Information Technology, Internet, Marketplace, Sustainability Belfast, Belfast, United Kingdom
cloudvector_logo CloudVector
CloudVector protects an organizationโ€™s internally-developed APIs, third-party application APIs, and the data carried within them.
Cyber Security, Developer APIs, Information Technology, Software Los Altos, California, United States
deepbits-technology_logo DeepBits Technology
Cybersecurity, Vulnerability Discovery on IoT devices, container images, cloud platform, and other devices, malware intelligence.
Cyber Security, Software Riverside, California, United States
cyberlytic_logo Cyberlytic
Cyberlyticโ€™s web application security software uses AI to deliver advanced threat detection and prioritisation of web-injection attacks.
Artificial Intelligence, Cyber Security, Machine Learning, Security, Software London, England, United Kingdom
joy-shebao_logo Joy Shebao
Joy Shebao is a personal social benefit analytical platform and social security media in China.
Analytics, Apps, Cyber Security Beijing, Beijing, China
swidch_logo SwIDch
swIDch is an information technology company that offers secure authentication through dynamic codes.
Cyber Security, Information Technology, Security, Software London, England, United Kingdom
redinent_logo Redinent
Redinent Innovations is a IoT Cybersecurity Company.
Cyber Security Bangalore, Karnataka, India
argos-cloud-security_logo ARGOS Cloud Security
Cloud Security and Compliance assessments for MS(S)P done in under 5 mins, including detailed diagrams so you know exactly what to focus on.
Cloud Security, Cyber Security, Information Technology, SaaS, Software Geelong, Victoria, Australia
apothe-ka-systems-inc_logo Apotheka Systems Inc.
Decentralizing Self-sovereign Identity and Personal Records Securely On Blockchain
Blockchain, Cloud Computing, Cyber Security, Digital Entertainment, Enterprise Software, Information Technology, Sports Beverly Hills, California, United States
weblife-balance_logo WebLife Balance
Exceptional Web Browsing. Allowing enteprise customers to boldly go where we feared to browse before
Cloud Security, Cyber Security, Network Security, Privacy, Web Browsers Los Angeles, California, United States
acorus-networks_logo Acorus Networks
Acorus Networks provide DDoS protection for both network and application layers thanks to a large scaled cloud mitigation infrastructure.
Cloud Security, Cyber Security, Network Security Nanterre, Ile-de-France, France
sytorus_logo Sytorus
Sytorus, the developers of PrivacyEngine, a leading privacy management platform to help companies manage and demonstrate privacy compliance.
Cyber Security, Information Services, Privacy, Security Dublin, Dublin, Ireland
sensorfu_logo SensorFu
SensorFu detects new network leak paths before they are exploited.
Cloud Security, Cyber Security, Enterprise Software, Network Hardware, Network Security, Penetration Testing, Security Oulu, Oulu, Finland
quantum-integrity_logo Quantum Integrity
Quantum Integrity secures your cyber communications by detecting manipulations and potential forgeries in digital images and media.
CRM, Cyber Security, Information Technology Geneva, Geneve, Switzerland
untethered-labs_logo Untethered Labs
Untethered Labs is a revenue generating start-up focused on bringing wireless technology based security solutions to enterprises.
Cyber Security, Enterprise, Identity Management, Information Technology, Network Security, Security, Software, Wireless College Park, Maryland, United States
trilogy-technologies_logo Trilogy Technologies
Trilogy Technologies provides proactive and secure managed IT services, cloud and infrastructure solutions.
Cloud Computing, Cloud Data Services, Cloud Infrastructure, Cloud Management, Cyber Security, Information Technology, IT Infrastructure, Network Security Dublin, Dublin, Ireland
duskrise_logo DuskRise
DuskRise is a cybersecurity company that specializes in remote network protection of devices, apps, and cloud systems.
Cloud Security, Cyber Security, Network Security, Software New York, New York, United States
meterian_logo Meterian
Meterian is the simple and straightforward way to assess how secure are your software components.
Cyber Security, Enterprise Software, Software London, England, United Kingdom
opnt_logo OPNT
OPNT is a Dutch enterprise that engages in mobile networks, orders of magnitude beyond GPS, using existing fiber infrastructure.
Cyber Security, Information Technology, Network Hardware, Optical Communication, Telecommunications Amsterdam, Noord-Holland, The Netherlands
authoreon_logo Authoreon.io
Authoreon solutions prevent fraud, cyber attacks, material and immaterial identity theft.
Blockchain, Cyber Security, Ethereum, Identity Management Munich, Bayern, Germany
profian-703e_logo Profian
Profian solves cloud security for data in use
Cloud Computing, Cloud Security, Cyber Security, Software Raleigh, North Carolina, United States
wispero_logo Wispero
Wispero is transforming wireless IoT safety for enterprises.
Big Data, Cyber Security, Information Technology, SaaS, Security Santa Clara, California, United States
onwardly_logo Onwardly
Gain confidence in your security work, automate the tedious stuff and tell a better security story.
Cyber Security, SaaS, Security, Software Auckland, Auckland, New Zealand
assured-information-security_logo Assured Information Security
Assured Information Security is a software company offering service on the research of critical Air Force.
Cloud Security, Consulting, Cyber Security, Hardware, Homeland Security, Information Technology, Penetration Testing, Risk Management, Security, Software Rome, New York, United States
columbus-collaboratory_logo Columbus Collaboratory
Columbus Collaboratory is an information technology company that provides cybersecurity and big data services.
Analytics, Big Data, Cyber Security, Information Services, Information Technology Columbus, Ohio, United States
cyberfend_logo Cyberfend
Cyberfend offers a robust security solution to protect your web and mobile applications from sophisticated attacks.
Cyber Security, Mobile Apps, Network Security, Software Santa Clara, California, United States
alter-423a_logo Alter
Communication platform in web 3.0
Apps, Cyber Security, Information Technology, Internet, Privacy Tallinn, Harjumaa, Estonia
kopjra_logo Kopjra
Making the Internet a safer place
Cyber Security, Law Enforcement, Legal Tech Bologna, Emilia-Romagna, Italy
idsmanager_logo IDsManager
IDsManager is a cloud identity service platform.
Cloud Computing, Cyber Security, Mobile Apps Beijing, Beijing, China
trustpage_logo Trustpage
Trustpage is a software tool that provides reviews, questionnaires, directory, document sharing, roadmap, and knowledge base solutions.
Artificial Intelligence (AI), Compliance, Cyber Security, Document Management, Knowledge Management, Privacy, Security Royal Oak, Michigan, United States
protonvpn_logo ProtonVPN
ProtonVPN is Swiss-based VPN service
Cyber Security, Internet, Privacy Geneva, Geneve, Switzerland
ahad-information-technology-llc_logo AHAD
SaaS, B2B Marketplace, Cybersecurity, Software
Cyber Security, Information Technology, Marketplace, Software Dubai, Dubai, United Arab Emirates