Organizations in Cyber Security

Name Industry Address
gcom-software-inc_logo Voyatek (formerly GCOM)
Voyatek helps governments create safer, healthier, and more prosperous communities through outcome-driven technology.
Business Intelligence, Cyber Security, GovTech, IaaS, Information Technology, Software Columbia, Maryland, United States
team-cymru_logo Team Cymru
Team Cymru is an internet security firm that offers research services making the internet a more secure place.
Cyber Security, Online Portals, Security Lake Mary, Florida, United States
europe-assistance_logo Europ Assistance
We support over 300 million customers in 208 countries thanks to our network of 750.000 approved providers and 36 assistance centres.
Automotive, Consumer, Customer Service, Cyber Security, Elder Care, Health Care, Insurance, Travel Paris, Ile-de-France, France
syllab-systems_logo SylLab Systems
Post Quantum Security For Networks and IoT
Cloud Security, Cyber Security, Information Technology Manassas, Virginia, United States
hackedu_logo HackEDU
HackEDU provides interactive cyber security training and secure code development courses for software engineers.
Cyber Security, Software Pittsburgh, Pennsylvania, United States
secured_logo SecurEd
SecurEd is focused on helping academic institutions build a cyber-ready workforce.
Cyber Security, Education Towson, Maryland, United States
auth-base-pvt-ltd_logo AuthBase
AuthBase is a deep tech cybersecurity startup using AI and ML to identify and mitigate threats and attacks across networks!
Artificial Intelligence (AI), Cyber Security, Information Technology, Machine Learning, Software Hyderabad, Andhra Pradesh, India
advanced-technology-leaders_logo Advanced Technology Leaders
Advanced Technology Leaders offers administration, information technology, consulting, project management, training, and cybersecurity.
Consulting, Cyber Security, Information Technology, Project Management, Training Martinez, Georgia, United States
new-horizons_logo New Horizons
New Horizons provides career training solutions as well as IT training to small, mid-sized, and global enterprises.
Cyber Security, Education, Information Technology, Security, Training Conshohocken, Pennsylvania, United States
nudata-security_logo NuData Security A Mastercard Company
NuData Security positively verifies users online through real-time passive biometrics and behavioral analytics.
Analytics, Cyber Security, Enterprise Software, Fraud Detection, Internet Vancouver, British Columbia, Canada
amplify-intelligence_logo Amplify Intelligence AU
Amplify Intelligence takes a data driven approach to reduce Cyber Insurance losses.
Artificial Intelligence, Cyber Security, Insurance Melbourne, Victoria, Australia
blackpanda_logo Blackpanda
Blackpanda is a digital forensics and cyber crisis management firm.
Computer, Cyber Security, Network Security Hong Kong, Hong Kong Island, Hong Kong
virtual-software-systems-vs2_logo Virtual Software Systems
Virtual Software Systems is a software venture focused on transforming the reliability and security of enterprise applications and data.
Apps, Cyber Security, Information Technology, Security, Software Waltham, Massachusetts, United States
apolyta_logo Apolyta
Apolyta is driving the future of security engineering in order to significantly improve defense.
Cyber Security, Network Security, Security, Software Sunnyvale, California, United States
skypher_logo Skypher
Skypher automates security questionnaires response in the sales process.
Compliance, Cyber Security, Information Services, Information Technology, SaaS, Software San Francisco, California, United States
shellfire_logo Shellfire
Your trusted provider for vpn tunnel hosting
Cyber Security, Network Security, Privacy, Security Bad Vilbel, Hessen, Germany
firezone_logo Firezone
Firezone is an open-source security platform to manage secure remote access for teams.
Cloud Security, Cyber Security, Information Technology, Network Security, Open Source, Privacy, Security, Software Mountain View, California, United States
shevirah_logo Shevirah
Shevirah is a provider of testing tools for assessing and managing the risk of mobile devices.
Cyber Security, Mobile, Security Herndon, Virginia, United States
infogps-networks-llc_logo InfoGPS Networks
Real time interrogation of information at rest, intelligent indexing of a network, information behavior pattern analysis.
Cyber Security, Information Technology, IT Management, Software North Canton, Connecticut, United States
synergy-ecp_logo Synergy ECP
Synergy ECP deals with cybersecurity, information technology, procurement support, project management and financial analysis.
Cyber Security, Procurement, Project Management Columbia, Maryland, United States
veridt-middleton-wisconsin_logo Veridt
Veridt manufactures radio isotope detection devices for homeland security, force protection, and other applications.
Cyber Security, Homeland Security, Intrusion Detection, Law Enforcement, Manufacturing, Network Security Middleton, Wisconsin, United States
globo_logo Globo
Globo help businesses enable their employees to work and collaborate from anywhere, anytime and extend their engagement with customers. LSE:GBO
Content, Cyber Security, Enterprise Software, Mobile, Software Palo Alto, California, United States
smartronix_logo Smartronix
Smartronix is a provider of cloud, C5ISR, and advanced engineering and IT solutions.
Cyber Security, Government, Information Technology, Security, Software Hollywood, Maryland, United States
vericlave_logo Vericlave
Vericlave prevents cyberattacks on critical assets with a simple to deploy solution that mitigates risks and addresses security challenges.
Computer, Cyber Security, Internet of Things, IT Infrastructure, Network Security, Security Dallas, Texas, United States
oosto_logo Oosto
Oosto assists enterprises in protecting their customers, guests and employees by identifying security and safety threats in real-time.
Cyber Security, Information Services, Information Technology, Security, Software Holon, Tel Aviv, Israel
secupi_logo SecuPi
Data-Centric Security and Privacy Compliance
Analytics, Cloud Data Services, Cloud Security, Cyber Security, Data Visualization, Privacy, Software Ramat Ef'al, HaMerkaz, Israel
better-mobile-security_logo Better Mobile Security
Better Mobile Security is a solution provider of mobile phishing protection and mobile threat defense for Android and iOS.
Computer, Cyber Security, Information Technology, Network Security, Software New York, New York, United States
akima_logo Akima
Akima focuses on delivering services in the areas of logistics, IT, supply chain, systems engineering, construction and protective services.
Construction, Consulting, Cyber Security, Information Technology, Logistics, Management Consulting, Supply Chain Management, Technical Support Herndon, Virginia, United States
futurism-technologies_logo Futurism Technologies
Futurism Technologies offers Next Generation Information Technologies Services and Solutions. Futurism Technologies has strategic ...
Cyber Security, IT Management, Software, Web Design, Web Development Piscataway, New Jersey, United States
drum-cussac_logo Drum Cussac.
Drum Cussac is a global consultancy delivering intelligence-led, technology-enabled business risk, security and crisis management solutions.
Consulting, Cyber Security, Information Technology, Risk Management, Security, Software Bournemouth, Bournemouth, United Kingdom
cybertiger_logo CyberTiger
CyberTiger is an Asian marketing gateway focused on bridging between international mobile application developers to Japanese publishers.
Cyber Security, Internet, Marketing Tokyo, Tokyo, Japan
codemettle-llc_logo CodeMettle
CodeMettle optimizes end-to-end application, network, security and service management for complex IT operations.
Cyber Security, Information Technology, Security, Software Atlanta, Georgia, United States
sri-international_logo SRI International
SRI International is a nonprofit, independent research center serving government and industry.
Advanced Materials, Artificial Intelligence (AI), Computer Vision, Cyber Security, Non Profit, Robotics Menlo Park, California, United States
valt-x-cyber-security_logo Valt.X Cyber Security
Valt.X is developing technology to cybersecure endpoint computing devices with absolute certainty.
Cyber Security, Hardware, Manufacturing, Software Surprise, Arizona, United States
kalepso_logo Kalepso
Kalepso unlocks the power of sensitive big data and data sharing, through patent-pending privacy.
Big Data, Cyber Security, Database, Information Services, Information Technology, Privacy Montrรฉal, Quebec, Canada
badrap_logo Badrap
Cyber Security Made Easy
Cyber Security, Information Technology, Security Oulu, Oulu, Finland
crest-data-systems_logo Crest Data Systems
Crest Data Systems is a provider of custom solutions in software technologies.
Analytics, Consulting, Cyber Security, Information Technology, Software San Jose, California, United States
firmex_logo Firmex
Firmex is a global provider of virtual data rooms where more deals, diligence, and compliance gets done.
Cyber Security, FinTech, Legal, SaaS, Software Toronto, Ontario, Canada
asicvault_logo AsicVault
Physically secure cryptocurrency vault
Bitcoin, Blockchain, Cryptocurrency, Cyber Security, Hardware Tallinn, Harjumaa, Estonia
wallet-security-checker_logo Wallet Security Checker
A tool to check your wallets security settings and make recommendations for improvement.
Blockchain, Cryptocurrency, Cyber Security, Finance, Security, Software London, England, United Kingdom
incito_logo Incito
Incito builds and provides business Insurance for small businesses and independent professionals.
Consulting, Cyber Security, Insurance, InsurTech Stockholm, Stockholms Lan, Sweden
yunjizhi_logo Yunjizhi
Yunjizhi is an innovative technology company in the field of next-generation data security in China.
Big Data, Customer Service, Cyber Security, Marketing, Sales Fengtai, Beijing, China
newipnow-com-premium-private-proxies_logo NewIPNow.com Premium Private Proxies
NewIPNow.com offers HTTP private proxies from multiple locations.
Cyber Security, Software Us, Picardie, France
cymotive-technologies_logo CYMOTIVE Technologies
Automotive Cyber Security on the Move.
Cyber Security Tel Aviv, Tel Aviv, Israel
zerum-research-and-technology_logo Zerum Research And Technology
Zerum Research and Technology is a provider of information technology and services.
Artificial Intelligence (AI), Big Data, Cyber Security, Information Technology Sunnyvale, California, United States
intrusion-inc_logo Intrusion
Intrusion, Inc. is a cybersecurity company that offers its customers access to its exclusive threat intelligence database. NASDAQ:INTZ
Cyber Security, Network Security, Security Plano, Texas, United States
bawn_logo Bawn
Cybersecurity Services and Insurance
Compliance, Cyber Security, Insurance, Security Austin, Texas, United States
circle-ai_logo Circle.ai
Circle.ai API enables apps, APIs, and IoT devices to share data with networks without compromising identity, privacy, or UX.
Cyber Security, Developer APIs, Enterprise Software Oakland, California, United States
-isc-2_logo (ISC)2
(ISC)2 is the official organization that maintains and administers the CISSP certification exam.
Association, Cyber Security, Education, Internet, Non Profit, Security Clearwater, Florida, United States
ml4cyber_logo ML4Cyber
ML4Cyber provides machine learning cyber security solutions.
Computer, Cyber Security, Information Technology, Machine Learning Baltimore, Maryland, United States
preclusio_logo Preclusio
Preclusio develops software that helps companies comply with privacy regulations.
Cyber Security, Privacy, Software Redwood City, California, United States
cyber-driveware_logo Cyber DriveWare
Cyber DriveWare is an innovative anti-malware solution, specializing in protection against business continuity disruption attacks.
Cyber Security, Information Technology, Security Herzliya, Tel Aviv, Israel
impervious-ai_logo Impervious.ai
Impervious builds the tools and infrastructure for the Peer-to-Peer ("P2P") internet standard.
Bitcoin, Blockchain, Communications Infrastructure, Cyber Security, Information and Communications Technology (ICT), National Security, Software, Software Engineering N/A
pci-pal_logo PCI Pal
PCI Pal is a specialist provider of secure payment solutions for contact centers and businesses taking Cardholder Not Present payments. LSE:PCIP
Cryptocurrency, Cyber Security, Financial Services, Information Technology, Payments, Software Charlotte, North Carolina, United States
money2020_logo Money20/20
Money20/20 is a provider of a marketplace for ideas, connections, and deals in payments and financial services.
Banking, Biometrics, Blockchain, Cyber Security, Digital Marketing, Financial Services, Information Technology, Marketplace, Mobile Payments, Payments New York, New York, United States
blueally_logo BlueAlly
BlueAlly has been serving as a prime source of IT Services for customers both large and small.
Cyber Security, Information Technology Vienna, Virginia, United States
myriad360_logo Myriad360
Myriad put together huge thought and smooth delivery to unleash the potential of techย for you, Supply supports more than 10,000 customers.
Cloud Computing, Consulting, Cyber Security, Infrastructure, Security, VoIP New York, New York, United States
cyex-oรผ_logo Cyex
cyex develops an AI-based tool that generates personalized cybersecurity exercises with a special focus on cyber threat specifics.
Artificial Intelligence, Cyber Security, Information Technology, Machine Learning Tallinn, Harjumaa, Estonia
wakaru_logo Wakaru
Wakaru is a technology-based company, focused on developing solutions for the management and analysis of complex events in real-time.
Cyber Security, Information Technology, IT Management Torres Vedras, Lisboa, Portugal
secpod-technologies_logo SecPod Technologies
SecPod is a SaaS-based cybersecurity products and technology company.
Cyber Security, SaaS, Software Bangalore, Karnataka, India
netcraft_logo Netcraft
Netcraft is an Internet services company based in Bath which provides Internet data mining and anti-cybercrime services.
Cyber Security, Fraud Detection, Government, Online Portals Bath, Bath and North East Somerset, United Kingdom
passbird_logo Passbird Research
Passbird Research is a software company.
Blockchain, Cryptocurrency, Cyber Security, IaaS, Network Security, PaaS, Payments, Security, Software Sunnyvale, California, United States
titaniam_logo Titaniam
Titaniam offers a platform that renders data immune to ransomware, cyberattacks, extortion and any data related cyber event.
Cyber Security, Security San Jose, California, United States
cannon-cyber-c045_logo Cannon Cyber
Transforms Security Posture from Reactive to Responsive.
Cyber Security, Security Sunnyvale, California, United States
cloak-labs_logo Cloak Labs
Cloak Labs are secure B2B messaging in the cloud.
B2B, Cloud Data Services, Collaboration, Cyber Security, Enterprise Software, Messaging, Security, Software Redwood City, California, United States
srm-solutions_logo Security Risk Management Ltd
SRM are able to demystify information and cyber security, helping you to understand and manage the risks to your information.
Consulting, Cyber Security, Information Services, Information Technology, Test and Measurement Newcastle Upon Tyne, Newcastle upon Tyne, United Kingdom
ecs-federal_logo ECS Federal
ECS is a technology company providing cybersecurity, cloud solutions and complementary IT capabilities.
Consulting, Cyber Security, Information Technology, Software Fairfax, Virginia, United States
adt-caps-co_logo SK Shielders
SK Shielders is a life care platform company that provides security and safety care services.
Cloud Security, Cyber Security, Physical Security, Security Seongnam, Kyonggi-do, South Korea
ima_logo IMA
IMA is a rich and diverse product hub, delivering enterprise ready innovation . IMA serves the Financial, Enterprise & Telco verticals.
Big Data, Cyber Security, Digital Marketing, Internet, Internet of Things, Telecommunications, Wireless Tel Aviv, Tel Aviv, Israel
rang-technologies-inc_logo Rang Technologies Inc.
Rang Technologies has been a leading diversity firm specializing in Analytics and Data Science solutions and comprehensive IT staffing.
Analytics, Artificial Intelligence, Big Data, Business Intelligence, Cyber Security, Data Mining, Information Technology, Internet of Things, IT Management, Machine Learning Piscataway, New Jersey, United States
phantom-login-3_logo Phantom LogIn
Authentication technology. Prevents most known password attacks while making the login process enjoyable for the user
Cyber Security, Mobile San Francisco, California, United States
ericom-software_logo Ericom Software
Global Leader in Enterprise-grade Cybersecurity & Access Solutions to securely Deliver Desktops, Applications & Web Content to Any Device
Cyber Security, Enterprise Software, Security, Software, Virtual Desktop Closter, New Jersey, United States
archimigo_logo Archimigo
Archimigo - Digital Security Architect helps organisations design, continuously validate & enforce security controls for technology projects
Cloud Security, Cyber Security, Developer Tools, Enterprise Software, Information Technology, SaaS, Software Melbourne, Victoria, Australia
owl-cyber-defense_logo Owl Cyber Defense
Owl Cyber Defense offers cyber security, cyber defense, and critical infrastructure security.
Cyber Security, Information Technology, Network Security, Security Columbia, Maryland, United States
esn-global-media_logo ESN Global Media
ESN Global Media specializes in marketing, data management, websites, apps, cyber security, cloud, firewall, network, and other IT services.
Cloud Data Services, Cyber Security, Internet, Marketing, Web Apps Ramat Gan, Tel Aviv, Israel
zones_logo Zones
Zones provides IT solutions and guides businesses through digital transformation.
Cloud Infrastructure, Cyber Security, Information Services, Information Technology, Internet of Things, Software Auburn, Washington, United States
digital-monitoring-products_logo Digital Monitoring Products
Digital Monitoring Products is a security and investigations company providing high-security ids systems and store intrusion systems.
Cyber Security, Manufacturing Springfield, Missouri, United States
silobreaker_logo Silobreaker
Silobreaker builds intelligence technology that makes sense of unstructured data on the web.
Artificial Intelligence, Big Data, Cyber Security, Data Mining, Machine Learning, National Security, Security, Text Analytics London, England, United Kingdom
suments-data_logo Suments Data
Data Leakage Prevention Solutions to enhance cybersecurity and strengthen compliance
Cloud Data Services, Compliance, Cyber Security, IT Management, Legal Belfast, Belfast, United Kingdom
halo-privacy_logo Halo Privacy
Halo Privacy specializes in total digital privacy for individuals, small groups, and teams.
Cyber Security, Network Security, Privacy Seattle, Washington, United States
comprinno-technologies-pvt-ltd_logo Comprinno Technologies Pvt. Ltd.
IT infrastructure engineering and solutions company. Works in the domains of Cloud Computing, Big Data, DevOps, Storage and Security.
Big Data, Cloud Computing, Cyber Security Bangalore, Karnataka, India
skycryptor_logo BeSafe IO
BeSafe IO enables end-to-end encrypted file sharing over any cloud application.
Cloud Security, Cyber Security, Information Technology, SaaS, Software Paris, Ile-de-France, France
bi-zone_logo BI.ZONE
BI.ZONE is disrupting the cyber security industry with its visionary approach to protecting clients networks.
Cyber Security, Information Technology Moscow, Moscow City, Russian Federation
globalsign_logo GMO GlobalSign
Globalsign enhances digital life by making interactions safer with trusted identities.
Cloud Security, Cyber Security, Identity Management, Security Portsmouth, New Hampshire, United States
thales-e-security_logo Thales E-Security
Thales e-Security is a leading supplier of data protection and cyber security solutions to the financial services, government technology.
Cloud Security, Computer, Cyber Security, Information Technology, Network Security, Security Plantation, Florida, United States
trustcom-ltd_logo Trustcom
Trustcom is a cybersecurity company that offers a wide variety of solutions.
Cyber Security, Information Technology, Mobile, Risk Management, Security, Training Nairobi, Nairobi Area, Kenya
intrinsic_logo Intrinsic
Intrinsic is an application security startup.
Cyber Security, Information Technology, Network Security San Francisco, California, United States
vulecc_logo Vulecc
Web Vulnerability Scanner
Cyber Security, Information Technology, SaaS Baku, Baki, Azerbaijan
wiacts_logo NoPassword (Acquired By LogMeIn)
Modernize identity with NoPassword Human and Hidden Multi-factor Authentication, SSO and IDM.
Cyber Security, Enterprise Applications, Enterprise Software, Identity Management, Information Technology Sunnyvale, California, United States
ghost-security-group_logo Ghost Security Group
Ghost Security Group is a counter terrorism organization that combats extremism on the digital front lines using the internet as a weapon.
Cyber Security, Information Services, Information Technology Washington, District of Columbia, United States
essence_logo Essence Group
Essence is a global provider of IoT connected-living solutions for tier-1 communication, security and healthcare service providers.
Cyber Security, Health Care, Information Technology, Internet of Things, Telecommunications Herzliya, Tel Aviv, Israel
appsec360_logo Appsec360
Appsec360 is a product security co-pilot for secure software development.
Cyber Security, Software Melbourne, Victoria, Australia
breachalarm_logo BreachAlarm
BreachAlarm is an IT and services company that let user know if their password is compromised online.
Cyber Security, Information Services, Information Technology Beaumaris, Victoria, Australia
haystack-solutions_logo Haystack Solutions
Haystack Solutions helps corporations, education, and workforce development organizations to identify cybersecurity talent.
Cyber Security, Information Technology, Recruiting College Park, Maryland, United States
cipher-a105_logo Cipher
CIPHER is a global cyber security company that provides information security products and services.
Consulting, Cyber Security, Government, Information Technology, Security Miami, Florida, United States
storiant_logo Storiant
Jeff Flowers, the inspiration for Storiant came from his experience at Carbonite,
Big Data, Compliance, Cyber Security, Data Center, Data Storage, Enterprise Software, Software Boston, Massachusetts, United States
echobase_logo EchoBase
echoBase is focused on the development of SaaS-based and cloud-based mobile applications for companies.
Cloud Computing, Cyber Security, Health Care, Information Technology, Mobile, Robotics, SaaS, Software Wake Forest, North Carolina, United States
ghostdrive_logo GhostDrive
GhostDrive is fully open source, operates on a decentralized P2P network, and committed to giving control of data privacy back to the owner.
Blockchain, Cloud Computing, Cloud Security, Cyber Security, Network Security, Software N/A
ddmtek_logo DDMTEk
DDMTEk invents approachable and affordable technology that solves cybersecurity challenges.
Cyber Security, Information Technology, Network Security, Software Wake Forest, North Carolina, United States
nexusguard_logo Nexusguard
Nexusguard is the leading provider of DDoS Mitigation, ensuring uninterrupted internet service, visibility, optimization and performance.
Cloud Security, Cyber Security, Network Security, Security, Software Tsuen Wan, New Territories, Hong Kong