Organizations in Cyber Security

Name Industry Address
fortify-24x7_logo Fortify 24x7
Fortify 24×7 is a leading managed security services provider offering comprehensive services that cover all aspects of the cyber kill chain.
Cloud Security, Cyber Security, Information Technology, Management Consulting, Network Security Point Roberts, Washington, United States
yōkai_logo Yokai
https://www.yokai.network/
Cyber Security Amsterdam, Noord-Holland, The Netherlands
gleam-ai_logo Gleam AI
Un-intrusive AI-Powered Cybersecurity SaaS platform for Enterprises and Service Providers
Analytics, Artificial Intelligence, Big Data, Cyber Security, Machine Learning, Network Security, Predictive Analytics, SaaS Seville, Andalucia, Spain
cryptee_logo Cryptee
Cryptee is a safe, encrypted place to write personal documents, privately store photos and more.
Cloud Data Services, Cyber Security, Data Storage, Information Technology, Privacy, Productivity Tools, Security, Software Tallinn, Harjumaa, Estonia
perseus-5e69_logo Perseus
Perseus provides cyber security, and data privacy services.
Cyber Security, InsurTech, Internet, IT Management, Network Security, Privacy Berlin, Berlin, Germany
telefonica-tech_logo Telefonica Tech
Telefonica Tech is a key holding of the Telefónica Group. The company offers a wide range of integrated technology services.
Cloud Computing, Cyber Security, Information Services, Information Technology Madrid, Madrid, Spain
narya-security_logo Narya Security
Narya Security helps enterprises solve the damage from Ransomware infections, with a single click.
Cyber Security, Network Security Saint Louis, Missouri, United States
aware7_logo AWARE7
AWARE7 offers Risk Rex which helps SME to assess and link cyber security risks with solutions, insurances and loans.
Cyber Security, Information Technology, InsurTech, Risk Management Gelsenkirchen, Nordrhein-Westfalen, Germany
newsky-security_logo NewSky Security
Enable enterprise-level security protection for all connected devices
Cyber Security, Internet of Things Redmond, Washington, United States
guardiot_logo GuardIoT
Our mission at GuardIoT is to make sure that Smart Cities are also Safe Cities!
Cyber Security, Industrial, Information Technology, Internet of Things Prague, Hlavni mesto Praha, Czech Republic
gurucul_logo Gurucul
Gurucul provides Actionable Risk Intelligence™ to detect, prevent, and deter advanced internal and external threats and fraud.
Cyber Security, Machine Learning, Predictive Analytics, Software El Segundo, California, United States
nexus-stack-technologies_logo Nexus Stack Technologies
SAAS Based Vulnerability Management solution, supported by AI-Driven checks and False Positive Removal
Cyber Security, SaaS, Software Dehra Dun, Uttarakhand, India
trufflepig-forensics_logo Trufflepig Forensics
Trufflepig Forensics is a Ger­man soft­ware de­vel­op­ment com­pany, sup­port in var­i­ous sec­tors rang­ing from foren­sic ser­vices, etc.
Consulting, Cyber Security, Information Technology, Software, Software Engineering Pfaffenhofen An Der Ilm, Bayern, Germany
cyber-security-hub_logo Cyber Security Hub
The Cyber Security Hub is an online news source for global cyber security professionals and business leaders.
Cyber Security, Security New York, New York, United States
intelli-network_logo Intelli Network
Intelli is a peer-to-peer crime report platform using distributed ledger network.
Blockchain, Cryptocurrency, Cyber Security, Information Technology, Legal, Network Security Calgary, Alberta, Canada
digitary_logo Digitary
Digitary helps universities to issue digitally certified transcripts, degrees and other documents. Lower costs, great student experience
Cyber Security, EdTech, Education, Software Dublin, Dublin, Ireland
tutanota_logo Tutanota
Tutanota is an end-to-end encrypted mail service that encrypts the entire mailbox.
Cyber Security, Data Integration, Email, Security Hanover, Niedersachsen, Germany
expedient_logo Expedient
Expedient is a network of data centers offering cloud computing, a wide range of managed services, and network connectivity.
Cloud Computing, Cyber Security, Information Services, Information Technology, Security, Telecommunications, Virtualization Pittsburgh, Pennsylvania, United States
apility-io_logo Apility.io
Apility.io is an API which checks if an IP address, domain or email ID has been blacklisted for abuse or fraud.
Big Data, Cyber Security, Developer APIs, Reputation Tallinn, Harjumaa, Estonia
crosslake-technologies_logo Crosslake Technologies
Crosslake is your end-to-end software technology partner that enables customers to transform their people, processes, and technology.
Consulting, Cyber Security, Information Technology, IT Management, Management Consulting, Software Kirkland, Washington, United States
vercara_logo Vercara
Vercara provides cloud security solutions to protect online presence, data, and brand reputation.
Cloud Security, Cyber Security, Information Technology Sterling, Virginia, United States
levitection-2dfe_logo Levitection
Levitection is developing a breakthrough security platform with automatic screening capabilities for open public spaces.
Artificial Intelligence, Cyber Security, Security Haifa, Hefa, Israel
cetas-cyber_logo Cetas Cyber
Security Analytics, SOC, Automated Detection and Reponses
Cyber Security, Software Palo Alto, California, United States
appremon-inc_logo Appremon, Inc.
SaaS, Cybersecurity, Cloud Security, Hybrid Security
Cyber Security, Information Technology, Manufacturing N/A
wymsical_logo Wymsical
Wymsical allows its users to create a virtual document vault where they can access, authenticate, and lock
Cyber Security, Information Technology, Mobile Apps, Software Greenwich, Connecticut, United States
cryptomage_logo Cryptomage
network anomaly detection solutions and cybersecurity services
Analytics, Communication Hardware, Cyber Security, Telecommunications Wroclaw, Dolnoslaskie, Poland
secon-cyber_logo Secon Cyber
Secon Cyber provides cyber security solutions to customers ranging from small to large enterprises.
Cyber Security, Information Technology, Network Security Hersham, Surrey, United Kingdom
gat-infosec_logo GAT InfoSec
GAT InfoSec is the CISO's best friend cyber security platform provider. GAT Security Score, GAT Core, GAT Scan and other products.
Cyber Security, Information Services, Information Technology, Risk Management, SaaS, Software São Paulo, Sao Paulo, Brazil
socradar_logo SOCRadar
Digital risk protection platform as a service
Cyber Security Middletown, Delaware, United States
zero-code-1aaa_logo Zero Code
Zero Code revolutionizes software development with its cutting-edge platform.
Computer, Cyber Security, Network Security N/A
digify_logo Digify
Digify is a cloud-based document security service that helps companies to protect and keep control of confidential documents.
Cyber Security, DRM, Information Technology, Security San Francisco, California, United States
securityescape_logo SecurityEscape
SecurityEscape is a SaaS-based infosec firm which uses cloud-based vulnerability identification and industrial expertise for apps' security.
Computer, Cyber Security, Network Security, SaaS Hyderabad, Andhra Pradesh, India
defenselayers_logo Defenselayers
Cybersecurity & Compliance Automation Platform delievered in Software as a Service model.
Cyber Security, SaaS Warsaw, Mazowieckie, Poland
allpriv-dislm_logo ALLPRIV
Allpriv presents the World’s First solution in data privacy on-the-go for enterprises.
Artificial Intelligence (AI), Cyber Security, Electronics, Information Technology, Software Aniane, Languedoc-Roussillon, France
fascent-technologies_logo Fascent Technologies
Software development company
Big Data, Cloud Data Services, Consumer Applications, Cyber Security, Enterprise Applications, Enterprise Software, Information Technology, Internet, Internet of Things, Mobile Advertising, Mobile Apps, Network Security, Security, Software, Web Development Hyderabad, Andhra Pradesh, India
prae_logo Prae
Human digital risk and continuous monitoring
Cyber Security, Human Resources, Risk Management Laurel, Maryland, United States
firecompass_logo FireCompass
FireCompass is a Saas platform for Continuous Automated Red Teaming (CART) and Attack Surface Management (ASM).
Big Data, Cyber Security, Information Technology, Internet, SaaS, Software N/A
qascom_logo Qascom
Qascom is an engineering company offering security solutions in satellite navigation and space cybersecurity.
Aerospace, Cyber Security, Information Technology, Satellite Communication, Security Bassano Del Grappa, Veneto, Italy
nettitude_logo Nettitude
Nettitude is a global leader in the delivery of cyber security testing, risk management, compliance and incident response services.
Cyber Security, Information Technology, Security New York, New York, United States
open-systems-ag_logo Open Systems
Open Systems is the preeminent cybersecurity and connectivity provider for the enterprise cloud.
Cloud Security, Cyber Security, Network Security Zürich, Zurich, Switzerland
comodo_logo Comodo
Comodo delivers cybersecurity solutions to protect businesses, schools, and government organizations.
Cloud Security, Cyber Security, Network Security, Professional Services, Software Bloomfield, New Jersey, United States
prismo-systems-inc_logo Prismo Systems
Prismo closes the gap between risk and response, protecting users, workloads, and applications from the datacenter to the cloud.
Cloud Security, Compliance, Computer, Cyber Security, Information Technology, Network Security, Software Santa Clara, California, United States
safnah-com-it-services_logo Safnah.com IT Services
Safnah.com Information Technology Services
Apps, Cloud Computing, Computer, Cyber Security, Information Services, Information Technology, Mobile Apps, Web Apps, Web Hosting Baghdad, Baghdad, Iraq
endpoint-security-inc_logo Endpoint Security Inc
Secure Wireless Communications for the Internet of Things
Cyber Security, Internet of Things, Semiconductor College Station, Texas, United States
hummingbirds-ai_logo Hummingbirds AI
Hummingbirds AI Creates Privacy-first Intelligent Applications for Security and Efficiency of Enterprises #Guacamole
Artificial Intelligence, Cyber Security, Employee Benefits, Fraud Detection, Internet of Things, Machine Learning, Security, Software Miami Beach, Florida, United States
smart-screen_logo Smart Screen
Smart Screen is an automated onboarding and background solution delivering fast, affordable, and highly personalized background checks.
Cloud Security, Compliance, Cyber Security New York, New York, United States
buster-ai_logo Buster.Ai
SaaS
Artificial Intelligence, Cyber Security, Journalism, Machine Learning, Natural Language Processing, SaaS, Software La Défense, Ile-de-France, France
mach-1-development_logo Mach 1 Development
Mach 1 delivers hardware and software solutions to observe, track and analyze data movements in network systems.
Cyber Security, Information Technology, Security, Software Austin, Texas, United States
augmenta-cyber-security_logo Augmenta Cyber Security
Cyber-security, Safe data storage, SCADA security, SAP Security, DLP, e2ee
Cloud Data Services, Cyber Security, Data Visualization, Information Technology, SEM, Simulation, Software, Virtualization Gaborone, South-East, Botswana
venseca_logo Venseca
Using a provisional patent algorithm, Venseca allows for easy interpretation of a risk a third-party vendor brings to an organization
Compliance, Cyber Security, Information Technology, Risk Management, Software Breinigsville, Pennsylvania, United States
bedrock-systems_logo BedRock Systems
BedRock Systems delivers a trusted computing base from edge to cloud, where safety and security is a formally proven reality.
Cyber Security, National Security, Network Security, Software, Virtualization San Francisco, California, United States
uleska_logo Uleska
Uleska is an application security automation platform. We help security and development teams manage application security at scale.
Cyber Security, Developer Tools, DevOps, SaaS, Security, Software Belfast, Belfast, United Kingdom
smart-orbis_logo Smart Orbis
SmartOrbis is a stealth-mode security startup in Santa Clara, California that is on a mission to revolutionize enterprise security.
Cloud Security, Cyber Security, Information Technology, Network Security, Security Santa Clara, California, United States
safelogic_logo SafeLogic
Incumbent-crushing mobile, server, cloud, and IoT encryption built for regulatory compliance
Cyber Security, Internet of Things, Mobile, Security Palo Alto, California, United States
core-bts_logo Core BTS
Core BTS is a customer-centric technology consulting organization dedicated to transforming IT experiences and delivering value to clients.
Cyber Security, Information Technology, Software Madison, Wisconsin, United States
authillo_logo Authillo
The world's first internet passport.
Compliance, Cyber Security, Software Santa Clara, California, United States
ticto_logo Ticto
Ticto is an information tech company that offers a security wearable that provides instant visual verification of authorized presence.
Cyber Security, Information Services, Information Technology, Network Security, Security San Francisco, California, United States
sacumen-security-thought-partner_logo Sacumen
Sacumen specializes in working with Security Product Companies. Built 750+ Connectors & working with 50+ Security Product Companies
Cyber Security, Identity Management, Industrial Engineering, Information Technology, Network Security, Security, SEM, Software Engineering Bangalore, Karnataka, India
cyberiq-services_logo CyberIQ Services
CyberIQ Services provides cyber threat detection software and service solutions for government agencies, consortiums, and enterprises.
Analytics, Cyber Security, Enterprise Software Arlington, Virginia, United States
any-run-llc_logo ANY.RUN
ANY.RUN is the first interactive online malware analysis sandbox.
Cyber Security, Information Technology Dubai, Dubai, United Arab Emirates
cyberxngan_logo CyberXngan
CyberXngan is an information security solution and cyber-security service provider company.
Cyber Security, Information Technology, Network Security Changping, Beijing, China
boxtrap-security_logo Boxtrap Security
Cyber Security, AI, Machine Learning
Artificial Intelligence, Cloud Security, CRM, Cyber Security, Information Technology, Location Based Services, Machine Learning, Network Security Prague, Hlavni mesto Praha, Czech Republic
jiaotu-technology-pepper-map-technology_logo Jiaotu Technology(Pepper Map Technology)
Jiaotu Technology is a service provider of server security hardening solutions.
Cyber Security, Enterprise Beijing, Beijing, China
prot-on_logo Prot-On
Prot-On is an innovative and new generation Information Rights Management solution
Cyber Security, Document Management, Security Madrid, Madrid, Spain
alinto_logo Alinto
Alinto provides messaging groupware and electronic communication solutions.
Cloud Security, Cyber Security, Email, Information Technology, Software Lyon, Rhone-Alpes, France
cyberghost-srl_logo CyberGhost
CyberGhost is the creator of one of the world's most reliable privacy and security solutions in the world: CyberGhost VPN
Cyber Security, Network Security, PaaS, Privacy, SaaS, Security, Software Bucharest, Bucuresti, Romania
monkphish_logo MonkPhish
SaaS, Cybersecurity Training, Gaming
Cyber Security, Education, SaaS, Security, Software N/A
syncurity_logo Syncurity
Syncurity's Incident Response Platform (IRP) IR-Flow, streamlines and automates IR to remediate incidents faster.
Cloud Security, Cyber Security, Security, Software, Training Bethesda, Maryland, United States
redwall-technologies_logo Redwall Technologies
Redwall Technologies offers security solution enables the creation of secure mobile devices for government and regulated industries.
Cyber Security, Security, Wireless Dayton, Ohio, United States
drwintech_logo DrwinTech
DrwinTech is an information technology firm that offers consulting and managed services.
Consulting, Cyber Security, Information Technology, Small and Medium Businesses Austin, Texas, United States
vigilant-cyber-systems_logo Vigilant Cyber Systems
Vigilant Cyber Systems provides testing solutions to the defense community.
Cloud Computing, Cyber Security, Software Carolina, Rhode Island, United States
ncc-group_logo NCC Group
NCC Group exists to make the world safer and more secure. LSE:NCC
Consulting, Cyber Security, Human Computer Interaction, Information Technology, Network Security, Software Manchester, Manchester, United Kingdom
metaintell_logo Mi3 Security
Mi3 Security provides a cloud-based mobile risk management solution.
Apps, Cloud Data Services, Cyber Security, Enterprise Software, Mobile, Security Mountain View, California, United States
speakin_logo SpeakIn
Speakin is a voiceprint recognition and identity security solutions AI company.
Artificial Intelligence (AI), Audio, Cyber Security, Internet, Robotics Shenzhen, Guangdong, China
tla-innovation_logo TLA Innovation
TLA Innovation develops solutions faced by individuals and enterprises for the cybersecurity, privacy, and regulatory industries.
Cyber Security, Enterprise Software, Information Technology Paramus, New Jersey, United States
guardtime_logo Guardtime
Guardtime is a network security company that validates the correctness of data, networks, systems, and processes.
Cyber Security, Network Security Tallin, Harjumaa, Estonia
cyberone_logo Cyberone
Cyberone is a cloud-based platform for integrated risk management software and cyber security.
Cyber Security, Information Technology, Software San Francisco, California, United States
securemarking_logo SecureMarking
SecureMarking is an unclonable nanotechnology solution for tracking authentic parts in a supply chain.
Blockchain, Cyber Security, Information Technology, Internet of Things, Logistics, Printing, Security, Supply Chain Management Rapid City, South Dakota, United States
nightdragon-security_logo NightDragon Security
NightDragon Security is a cybersecurity-focused VC firm investing in innovative growth and late-stage companies.
Cyber Security, Finance, Venture Capital San Francisco, California, United States
heimdal-security_logo Heimdal Security
Heimdal Security is a provider of cloud-based cybersecurity solutions.
Cyber Security, Information Technology, Privacy Copenhagen, Hovedstaden, Denmark
adversa_logo Adversa AI
Adversa AI uses AI systems by protecting them from cyber threats, privacy issues, and safety incidents.
Artificial Intelligence (AI), Cyber Security, Machine Learning, Software Tel Aviv, Tel Aviv, Israel
sustainalytics_logo Sustainalytics
Sustainalytics is an independent ESG and corporate governance research, ratings and analysis firm.
Analytics, Cyber Security, Financial Services, Impact Investing, Sustainability Amsterdam, Noord-Holland, The Netherlands
moqom_logo Moqom
Moqom is an innovative software development company that designs and implements high security, cloud-based fraud prevention solutions.
Banking, Cyber Security, Identity Management, Mobile, Payments, Risk Management, Software Dublin, Dublin, Ireland
david-group-fb15_logo DAVID GROUP
PT David Sistem Group was formed as a preventive solution to the urgency of cyberattacks on a global scale.
Consulting, Cyber Security, Education, Information Technology, Internet, SEO, Software Medan, Sumatera Utara, Indonesia
threatlandscape_logo ThreatLandscape
ThreatLandscape is a cyber threat Intelligence start-up protecting, detecting, and remediating competition's threats and breaches.
Analytics, Artificial Intelligence (AI), Cyber Security, Machine Learning, Security San Jose, California, United States
bravatek_logo Bravatek
Bravatek Solutions, Inc. is a high technology security solutions portfolio provider.
Cyber Security, Internet, Security, Software Austin, Texas, United States
nimis-cybersecurity_logo Nimis Cybersecurity
Techstars backed cybersecurity company using artificial intelligence to provide real time penetration testing
Artificial Intelligence, Cyber Security, Enterprise Software, Machine Learning Melbourne, Victoria, Australia
noxtton_logo Noxtton
Noxtton a technology and consulting company.
Apps, Big Data, Blockchain, Consumer Applications, Cyber Security, Domain Registrar, Legal Tech, Software, Web Development Tbilisi, Dushet'is Raioni, Georgia
clipperz_logo Clipperz
Clipperz is an online vault and password manager that enables its users to encrypt text and documents.
Cyber Security, Privacy, Security Imola, Emilia-Romagna, Italy
trustware_logo TrustWare
TrustWare provides a non-custodial crypto vault that ensures secure and recoverable transactions.
Blockchain, Cryptocurrency, Cyber Security Wilmington, Delaware, United States
microland_logo Microland
Making digital happen. Microland's delivery of digital is all about making technology do more and intrude less.
Application Performance Management, Cloud Computing, Cyber Security, Data Center, Data Center Automation, Internet of Things, IT Infrastructure, Network Security, Virtualization Bangalore, Karnataka, India
telos_logo Telos
Telos is a provider of cyber, cloud and enterprise security solutions for the world’s most security-conscious organizations. NASDAQ:TLS
Cloud Security, Cyber Security, Enterprise Software, Information Technology, Network Security, Software Ashburn, Virginia, United States
tusdatos-co_logo Tusdatos.co
Background checks and identity validation in one click
Cyber Security, Security, Software Bogotá, Distrito Especial, Colombia
iota-foundation_logo IOTA Foundation
IOTA Foundation develops an open-source protocol that supports data and value transfer between devices and humans.
Blockchain, Cryptocurrency, Cyber Security, Information Technology, Internet of Things, Non Profit Berlin, Berlin, Germany
not_available_image IPass
iPass is a cybersecurity platform offering a one-stop-shop for identity verification solutions.
Cyber Security, Information Technology N/A
halcyon-d8cf_logo Halcyon
Halcyon is a cybersecurity business that develops tools to protect enterprise clients from ransomware.
Computer, Cyber Security, Network Security, Software Austin, Texas, United States
iosafe_logo IoSafe
ioSafe designs and builds fireproof and waterproof data storage solutions that provides cloud-based backup and disaster recovery solutions.
Cyber Security, Hardware Auburn, California, United States
arcserve_logo Arcserve
Arcserve is a provider of data protection and recovery software that provides organizations with the assurance.
Big Data, Cyber Security, Enterprise Software, Information Technology, Network Security, Software Draper, Utah, United States
10minutemail_logo 10MinuteMail
10MinuteMail provides a temporary disposable e-mail service to beat spam with a free secure email address that expires in 10 minutes.
Cyber Security, Email Boston, Massachusetts, United States
lexumo_logo Lexumo
Cloud service that helps companies find security vulnerabilities in their open source code.
Cloud Security, Cyber Security, Enterprise Software, Security, Software Cambridge, Massachusetts, United States