Organizations in Cyber Security

Name Industry Address
threshing-floor_logo Threshing Floor
Threshing Floor is a cybersecurity product for enterprise security teams to detect threats.
Computer, Cyber Security, Network Security Washington, District of Columbia, United States
aujas-networks_logo Aujas Cybersecurity
Aujas Cybersecurity is a global specialist firm focused on protecting digital identities, data, applications, and infrastructure systems.
Cloud Security, Cyber Security, Information Technology, Security Plano, Texas, United States
comply7_logo Comply7
Data Governance and Unstructured Data Management professional services around Varonis, STEALTHbits, Symantec DLP/Vontu and Data Insight
Big Data, Consulting, Cyber Security, Information Technology, Professional Services, Software San Diego, California, United States
cs-group-cc0f_logo CS GROUP
CS GROUP is to enter a professional environment focused on high-potential growth sectors that provides virtual reality, navigation systems.
Computer, Cyber Security, Industrial, Information Technology, Virtual Reality Le Plessis-robinson, Ile-de-France, France
os33_logo OS33
Empowering employees to securely log in and work anytime, anywhere without compromising data security or regulatory compliance.
Compliance, Cyber Security, Enterprise Software, Information Technology, Software, Virtual Desktop New York, New York, United States
s-rm_logo S-RM
S-RM is a global intelligence and cyber security consultancy.
Business Intelligence, Cyber Security London, England, United Kingdom
dualspark_logo DualSpark
Expert cloud consulting and services company.
Big Data, Cloud Computing, Cloud Infrastructure, Consulting, Cyber Security, Training Santa Monica, California, United States
spark-security-services_logo Spark Security Services
Spark Security Services is a security and investigations company offering security management services.
Cyber Security, Information Technology, Security Abu Dhabi, Abu Dhabi, United Arab Emirates
lts-video-solutions-for-security-professionals_logo LTS
LTS is a security and investigations company specializing in video surveillance solutions.
Cyber Security, Information Technology, Professional Services, Security, Social Media, Video San Jose, California, United States
sphere-secure-workspace_logo Sphere Secure Workspace
Sphere Secure Workspace makes it easy for employees to securely use their personal devices at work.
Cyber Security, Mobile Devices, Security London, England, United Kingdom
ryn-file_logo RYN File
Cloud identity-based encryption software allows you to certify, protect, track & control all types of digital info.
Cyber Security, Security, Software N/A
nsfocus_logo NSFOCUS
NSFOCUS is a proven global leader in providing enterprise-level network security solutions and services. SZSE:300369
Cloud Security, Cyber Security, Infrastructure, Network Security Santa Clara, California, United States
kaduu-ag_logo Kaduu
Kaduu provides cyber threat intelligence services.
Cyber Security, Intelligent Systems Zug, Zug, Switzerland
envers-group-sia_logo EnVers Group SIA
GoGetSSL.com - Cheap SSL certificates. We offer wide range of SSL certificates
Cyber Security, E-Commerce, Information Technology, Internet, Network Security Riga, Riga, Latvia
linewize_logo Linewize
Linewize is a provider of cyber security and safety services, specialising in the education sector.
Cyber Security Christchurch, Canterbury, New Zealand
zer0data_logo Zer0Data
Zer0Data is a cybersecurity advisory firm specializing in the identification of zero-day computer-software vulnerabilities.
Cyber Security, Information Technology, Software Moscow, Moscow City, Russian Federation
center-for-internet-security_logo Center For Internet Security
The Center for Internet Security is focused on enhancing the cybersecurity readiness and response of public and private sector entities.
Association, Cyber Security, Network Security, Non Profit East Greenbush, New York, United States
cnc-intelligence-inc_logo CNC Intelligence Inc
CNC Intelligence specializes in the fields of crypto forensics and open source intelligence.
Cryptocurrency, Cyber Security N/A
bitlabs-academy_logo Bitlabs Academy
Bitlabs is an online education platform to upgrade digital skills for the young generation nationwide.
Big Data, Cyber Security, Digital Marketing, E-Learning, EdTech, Education, Mobile Apps Tangerang, Jawa Barat, Indonesia
waterfall-security-solutions_logo Waterfall Security Solutions
Waterfall Security Solutions Unidirectional Security Gateway
Cloud Data Services, Cyber Security, Government, Information Technology, Manufacturing, Mining, Oil and Gas, Security, Software, Water Rosh Ha'ayin, HaMerkaz, Israel
appspicket_logo AppsPicket
Frictionless secure two factor authentication based on innovative cryptographic protocol.
Computer, Cyber Security, Information Technology, Mobile Payments, Network Security, Security, Software London, England, United Kingdom
sontiq_logo Sontiq
Sontiq is an IT consultancy that offers mobile security, identity restoration, breach response, and digital identity protection.
Consulting, Cyber Security, Information Technology Framingham, Massachusetts, United States
acunetix_logo Acunetix
Aquinetix offers an automated tool that enables companies to scan their web apps to identify and resolve exploitable vulnerabilities.
Cyber Security, Enterprise Software, Information Technology, Network Security, SaaS London, England, United Kingdom
ivacy_logo Ivacy VPN
Ivacy is a VPN provider based in Singapore with more than 5000 servers and 100+ locations
Apps, Cyber Security, Mobile, Mobile Apps, Software, Web Apps, Web Hosting Singapore, Central Region, Singapore
provenance-technologies_logo Provenance Technologies
Provenance Technologies is a software company that develops digital platforms to enhance financial security for businesses.
Cyber Security, Physical Security, Security, Software San Francisco, California, United States
cybers_logo Cybers
Cybers is an information security management firm, fiscally responsible for delivering cyber-security solutions to its diverse clientele.
Cyber Security, Information Technology, Network Security Tallinn, Harjumaa, Estonia
superna_logo Superna
Superna is a global leader in managing, protecting and securing unstructured data across both on-prem and hybrid cloud environments.
Cyber Security, Data Center Automation, Security Ottawa, Ontario, Canada
signal-mountain_logo Signal Mountain
Signal Mountain provides satellite, MPLS, and wireless network solutions.
Cyber Security, Professional Services, Project Management, Satellite Communication Atlanta, Georgia, United States
quantivate_logo Quantivate
Governance Risk and Compliance Solutions
Cyber Security, Risk Management, Software Woodinville, Washington, United States
identityiq_logo IdentityIQ
IdentityIQ is a US-based identity theft and credit protection company designed to help users stay on top identity thieves and data breaches.
Credit, Cyber Security, Identity Management, Information Technology, Security, Software Temecula, California, United States
vidoc-security-lab_logo Vidoc Security Lab
Building an AI Security Engineer to keep up with the emerging threat of AI-generated code.
Artificial Intelligence (AI), Cyber Security, Generative AI, Security San Francisco, California, United States
thinkst-canary_logo Thinkst Canary
Thinkst Canary provide high fidelity honeypots that deploy in minutes (to let you know when your networks have been breached).
Cyber Security, Intrusion Detection, Network Security, Security, Software Australia, Isabela, Philippines
dispersive-networks_logo Dispersive
Dispersive provides accelerated, private and secure virtual networking for cloud, branch, mobile device and embedded IoT.
Cyber Security, Information Technology, Telecommunications Roswell, Georgia, United States
mailpile_logo Mailpile
Mailpile provides online email services and a saving feature in an internet server mailbox with encryption and privacy features.
Cyber Security, Information Technology, Online Portals, Privacy, Service Industry Reykjavík, Gullbringusysla, Iceland
gemnasium_logo Gemnasium (acquired By Gitlab)
Gemnasium monitors software dependencies, notifies users of security updates or advisories, and automates open source code updates.
Cyber Security, Developer Tools, Open Source, Security, Software Quebec, Quebec, Canada
digidentity_logo Digidentity
Identity, Verification, Authentication and Security
CRM, Cyber Security, Identity Management, Information Technology, Robotics, Security, Software The Hague, Zuid-Holland, The Netherlands
safeaeon-inc_logo SafeAeon Inc.
SafeAeon is a leading provider of SOC-as-a-service (Cyber Security Operations Center – SOC).
Cloud Management, Cloud Security, Cyber Security, Network Security, Penetration Testing, Security Pleasanton, California, United States
axur_logo Axur
Axur is every company's takedown (digital content removal) partner. We also help to detect digital fraud, data leakage and online piracy
Advertising, Artificial Intelligence (AI), Compliance, Cyber Security, Fraud Detection, Information Technology, Internet, Risk Management, SaaS, Security San Francisco, California, United States
sheffield-scientific-llc_logo Sheffield Scientific
Sheffield Scientific is an IT company specializing in energy asset management and cybersecurity services.
Cyber Security, Information Technology, Renewable Energy Houston, Texas, United States
cognni_logo Cognni
Cognni makes an InfoSec think like a human, so the user can focus on the bigger picture, keeping the information flow safe.
Artificial Intelligence, Cyber Security, Software Tel Aviv, Tel Aviv, Israel
hitrust_logo HITRUST
HITRUST a not-for-profit organization whose mission is to champion programs that safeguard sensitive information & manage information risk.
Cyber Security, Information Technology, Security Frisco, Texas, United States
nexustek_logo NexusTek
NexusTek provides small and medium-sized businesses a trusted resource to optimize and manage their IT environments
Cloud Infrastructure, Cloud Management, CRM, Cyber Security, Enterprise Resource Planning (ERP), Enterprise Software, Information Technology, Software, Technical Support, VoIP Greenwood Village, Colorado, United States
msa-security_logo MSA Security
A New York-based provider of "high consequence" threat protection
Consulting, Cyber Security, Government, Security, Training New York, New York, United States
cognitive-big-data-systems_logo Cognitive Big Data Systems
Cognitive Big Data Systems use creative machine vision to glean real-time business intelligence and threat information from video streams.
Artificial Intelligence, Cyber Security, Information Technology, Robotics, Video Pensacola, Florida, United States
dark-wolf-solutions_logo Dark Wolf Solutions
Dark Wolf Solutions is an IT consultancy firm that offers software development, system engineering and management solutions.
Cyber Security, Information Technology, Management Consulting, Software, Technical Support Herndon, Virginia, United States
blackbird-technologies_logo Blackbird Technologies
Blackbird Technologies is a technology solutions provider to solve challenging problems.
Cyber Security, Information Technology, National Security Herndon, Virginia, United States
invizbox_logo InvizBox
InvizBox is a device that gives customers a range of privacy and security options.
Computer, Cyber Security, Network Security, Software Dublin, Dublin, Ireland
zula-cybersecurity_logo ZULA Cybersecurity
Cybersecurity platform accessible to all kind of organizations
Cyber Security, Information Technology, Software Buenos Aires, Distrito Federal, Argentina
kivu_logo Kivu
Kivu is a cyber security firm trusted by top cyber insurance providers, law firms, and enterprise clients across the globe.
Cyber Security, Security Denver, Colorado, United States
ais-1755_logo AIS
AIS is an IT firm that provides cybersecurity, managed IT, cloud solutions, and consulting services.
Cloud Management, Cyber Security, Information Services, Information Technology Indianapolis, Indiana, United States
netgate_logo Netgate
Netgate is focused on delivering secure high-performance network connectivity for everyone through security and privacy.
Cloud Infrastructure, Cloud Security, Cyber Security, Network Security, Open Source Austin, Texas, United States
securityctrl_logo Security CTRL
Security CTRL offers cyber security for cloud infrastructures.
Cloud Infrastructure, Cyber Security, Security, Software Edinburgh, Edinburgh, City of, United Kingdom
nullafi_logo Nullafi
Nullafi Shield is a zero-code add-on to any endpoint that gives admins one-click control over what data that endpoint receives
Cyber Security, Data Storage, Data Visualization, Information Technology, Internet, Software Chicago, Illinois, United States
elpha-secure_logo Elpha Secure
Elpha Secure is a provider of cybersecurity solutions and software protection to small businesses.
Cyber Security, Insurance, Software New York, New York, United States
cyfir_logo Cyfir
CyFIR is the ideal network investigation and Incident Response tool for performing live computer investigations across any size enterprise.
Cyber Security, Information Technology, Security Manassas, Virginia, United States
cyberguard-compliance_logo CyberGuard Compliance
CyberGuard Compliance is an IT company that offers solutions for accounting, audit assessment, cyber security, and data privacy services.
Accounting, Cyber Security, Information Technology, Professional Services Las Vegas, Nevada, United States
gamma-ai_logo Gamma.AI
AI Powered Cloud Data Discovery, Data Classification & Data Loss Prevention Platform
Artificial Intelligence, Big Data, CRM, Cyber Security, Information Technology, Internet of Things, Machine Learning Sunnyvale, California, United States
promon_logo Promon
Promon is an app security firm specializing in on-app protection or application shielding.
Cyber Security, Security, Software Oslo, Oslo, Norway
dynetics_logo Dynetics
Employee-owned, mid-tier, engineering solutions provider for defense and aerospace.
Computer, CRM, Cyber Security, Information Technology, Manufacturing Huntsville, Alabama, United States
solute-inc_logo Solute
Solute provides Software Engineering, Network Engineering, Cyber Security Engineering, Cloud Architecture, and DevOps services.
Consulting, Cyber Security, Government, Information Technology, Legal, Security, Software San Diego, California, United States
helm-solutions_logo Helm Solutions
Helm is a global cyber security and technology firm that provides legal and compliance solutions to government and the enterprise.
Cyber Security, Information Technology, Legal New York, New York, United States
pondurance_logo Pondurance
Pondurance is cybersecurity company that focuses on delivering both technology-enabled and compliance-advisory solutions.
Cloud Security, Compliance, Consulting, Cyber Security, Network Security, Security Indianapolis, Indiana, United States
assured-data-protection-limited_logo Assured Data Protection
Assured Data Protection provides IT services in cloud data services, backup and disaster recovery, Office 365 services, and data protection.
Cloud Computing, Cyber Security, Data Integration, Information Technology Herndon, Virginia, United States
axiomatics_logo Axiomatics
Axiomatics is the originator and leading provider of runtime, fine-grained authorization for applications, Big Data, APIs, and microservices
Cloud Security, Cyber Security, Enterprise Software, Identity Management, Security, Service Industry Stockholm, Stockholms Lan, Sweden
getlockdown_logo LockDown
LockDown is a technology company focused on data privacy and security.
Apps, Cyber Security, Desktop Apps, Information Technology, Messaging, Mobile, Mobile Apps, Privacy, Security, Software N/A
idiq_logo IDIQ
IDIQ is a credit monitoring, identity theft protection and data breach management company.
Credit, Cyber Security, Information Technology Temecula, California, United States
isc8_logo ISC8
ISC8 provides intelligent cyber security solutions and multiple hardware and software products for enterprise threat management.
3D Technology, Cyber Security, Electronics, Nanotechnology, Security, Software, Wireless Plano, Texas, United States
bluvector_logo BluVector Inc.
BluVector is a network security company delivering next generation IDS
Cyber Security, Information Technology, Network Security Arlington, Virginia, United States
accutech_logo Accutech
Accutech Security, is a leading manufacturer of advanced electronic monitoring and security systems.
Cyber Security, Information Technology, Manufacturing, Security Franklin, Wisconsin, United States
jing-an-yunxin_logo Jing An Yunxin
Jing An Yunxin is a company specialized in product development and services in the information security fields.
Cyber Security, Information Services, Information Technology Haidian, Beijing, China
ciphertooth-inc_logo CipherTooth, Inc
Internet security technology to protect the data stream from Man in the Middle or other attacks.
Cyber Security, Security, Technical Support American Fork, Utah, United States
gtb-technologies-inc-_logo GTB Technologies, Inc.
The Creator of DLP for IP and Leader of Data Protection that Work security platforms.
Cloud Data Services, Cloud Security, Computer, Content Discovery, Cyber Security, Ediscovery, Information Technology, Software Newport Beach, California, United States
prolifics_logo Prolifics
Prolifics is a digital engineering and consulting firm that offers test automation, cybersecurity, and business automation services.
Consulting, Cyber Security, Information Technology, Software Orlando, Florida, United States
getid_logo GetID
Identity Verification, KYC/AML checks, Customer Onboarding
Cyber Security, FinTech, Identity Management, Information Technology, SaaS, Software Tallinn, Harjumaa, Estonia
ridgeline_logo Ridgeline International
Technology, Digital Signature Management
Cloud Management, Cyber Security, Information Services, Information Technology, IT Infrastructure, Messaging, Software Mclean, Virginia, United States
xon-systems-pty-ltd_logo NEC XON
NEC XON designs, builds, operates, and manages information and communication technology (ICT) solutions created specifically for customers.
Communications Infrastructure, Cyber Security, Information Technology, Professional Networking Midrand, NA - South Africa, South Africa
cyber-risk-management_logo Focal Point Data Risk
Focal Point Data Risk, formerly Cyber Risk Management (CRM), is a leading data risk management services company.
Cyber Security, Risk Management Tampa, Florida, United States
infoarmor_logo InfoArmor
InfoArmor offers businesses industry-leading employee identity protection and advanced threat intelligence solutions.
Analytics, Cyber Security, Employee Benefits Scottsdale, Arizona, United States
netsync-network-solutions_logo Netsync
Netsync specializes in collaboration & unified communications, data center and cloud, network infrastructure and others.
Cyber Security, Data Center, Information Services, Information Technology, IT Infrastructure, Wireless Houston, Texas, United States
privadovpn_logo PrivadoVPN
PrivadoVPN is a virtual private network that defends your data from hackers & online spies with advanced encryption at super fast speeds.
Computer, Cyber Security, Information Technology, Internet, Privacy, Software Zug, Zug, Switzerland
uqontrol_logo UQontrol
uQontrol is a technology start-up focused on creating more secure, intuitive and seamless online experiences.
Consumer Electronics, Cyber Security, E-Commerce, Hardware, Internet of Things, Payments, Software Sandpoint, Idaho, United States
entreda_logo Entreda
Cybersecurity compliance and risk analytics software
Compliance, Cyber Security, Financial Services, Software Santa Clara, California, United States
cyberinfrastructure-technologies_logo Cyberinfrastructure Technologies
We develop dual-use sensing and communication technologies
Cyber Security, Network Security, Software, Telecommunications West Valley City, Utah, United States
data-locker-inc_logo DataLocker
DataLocker is a developer of easy to use, data encryption solutions for portable storage devices, media systems, and cloud storage accounts.
Cyber Security, Hardware, Software Overland Park, Kansas, United States
cleafy_logo Cleafy
Cleafy protects web and mobile applications from tampering attempts and deploys countermeasures to guarantee data and content integrity.
Cyber Security, FinTech, Information Services, Information Technology, Security Milan, Lombardia, Italy
shadowdragon_logo ShadowDragon
ShadowDragon architects cyber intelligence solutions.
Cyber Security, Network Security, Security Cheyenne, Wyoming, United States
niksun_logo NIKSUN
NIKSUN® is the leader in making the unknown known. NIKSUN delivers the best next-generation network monitoring solutions to secure critical
Cyber Security, Network Security, Security, Software Princeton, New Jersey, United States
withsecure_logo WithSecure
WithSecure specializes in offering security software solutions, managed services, security hardware solutions, and consulting.
Consulting, Cyber Security, Information Technology, Software Helsinki, Southern Finland, Finland
premera-blue-cross_logo Premera Blue Cross
Premera is a leading health plan in the Pacific Northwest, providing comprehensive health benefits and tailored services.
Cyber Security, Health Care, Information Technology, Insurance Mountlake Terrace, Washington, United States
hush-aac1_logo Hush
Hush is a provider of digital privacy management services used to help families protect their digital identities.
Cyber Security, Identity Management, Risk Management Detroit, Michigan, United States
hackersera-pvt-ltd_logo HackersEra Cyber Security Consultancy Pvt Ltd
HackersEra is India based Cyber Security Consultancy and Training firm established by leading industry experts in 2015.
Cloud Security, Cyber Security, Information Technology, Network Security, Penetration Testing Pune, Maharashtra, India
walrus-security_logo Walrus Security
Walrus keeps push payments safe by developing and deploying novel authentication technology in a low-friction platform.
Computer, Cyber Security, FinTech, Fraud Detection, Identity Management, Payments New York, New York, United States
interphase-systems_logo Interphase Systems
Interphase Systems is a consulting and IT services organization located in the Greater Philadelphia area.
Consulting, Cyber Security, Information Technology Blue Bell, Pennsylvania, United States
pixee_logo Pixee
Your automated product security engineer
Cyber Security, Software N/A
rapiscan-systems_logo Rapiscan Systems
Rapiscan Systems provides surveillance like people screening, radiation detection, cargo and vehicle inspection.
Cyber Security, Government, Information Technology, Security, Software, Virtual Reality Torrance, California, United States
n-dimension-solutions_logo N-Dimension Solutions
N-Dimension Solutions provides managed cybersecurity services protecting critical energy infrastructures, data and assets.
Cyber Security, Energy, Service Industry Toronto, Ontario, Canada
oneleet_logo Oneleet
Scalable manual cybersecurity testing as a service provided by vetted expert penetration testers
Cyber Security, Penetration Testing Amsterdam, Noord-Holland, The Netherlands
weboniselab_logo Webonise
We build what is essential for business, powered by our innovative platforms and services.
Cyber Security, E-Learning, Fantasy Sports, Information Technology, Internet, Marketing Automation, Mobile Apps, SaaS, Software, UX Design Raleigh, North Carolina, United States
sher-ly_logo Sher.ly
Sher.ly is a B2B shared data projects secure platform with context smart syncing for large files directly and only from on premise storage.
Cloud Data Services, Cyber Security, File Sharing, Local, Software Palo Alto, California, United States
lockpath_logo LockPath, Inc.
LockPath provides enterprise governance, risk management, compliance and information security software applications.
Cyber Security, Risk Management, Software Overland Park, Kansas, United States