Organizations in Cyber Security
Name | Industry | Address | |
---|---|---|---|
|
Threshing Floor Threshing Floor is a cybersecurity product for enterprise security teams to detect threats. |
Computer, Cyber Security, Network Security | Washington, District of Columbia, United States |
|
Aujas Cybersecurity Aujas Cybersecurity is a global specialist firm focused on protecting digital identities, data, applications, and infrastructure systems. |
Cloud Security, Cyber Security, Information Technology, Security | Plano, Texas, United States |
![]() |
Comply7 Data Governance and Unstructured Data Management professional services around Varonis, STEALTHbits, Symantec DLP/Vontu and Data Insight |
Big Data, Consulting, Cyber Security, Information Technology, Professional Services, Software | San Diego, California, United States |
|
CS GROUP CS GROUP is to enter a professional environment focused on high-potential growth sectors that provides virtual reality, navigation systems. |
Computer, Cyber Security, Industrial, Information Technology, Virtual Reality | Le Plessis-robinson, Ile-de-France, France |
|
OS33 Empowering employees to securely log in and work anytime, anywhere without compromising data security or regulatory compliance. |
Compliance, Cyber Security, Enterprise Software, Information Technology, Software, Virtual Desktop | New York, New York, United States |
|
S-RM S-RM is a global intelligence and cyber security consultancy. |
Business Intelligence, Cyber Security | London, England, United Kingdom |
![]() |
DualSpark Expert cloud consulting and services company. |
Big Data, Cloud Computing, Cloud Infrastructure, Consulting, Cyber Security, Training | Santa Monica, California, United States |
![]() |
Spark Security Services Spark Security Services is a security and investigations company offering security management services. |
Cyber Security, Information Technology, Security | Abu Dhabi, Abu Dhabi, United Arab Emirates |
|
LTS LTS is a security and investigations company specializing in video surveillance solutions. |
Cyber Security, Information Technology, Professional Services, Security, Social Media, Video | San Jose, California, United States |
![]() |
Sphere Secure Workspace Sphere Secure Workspace makes it easy for employees to securely use their personal devices at work. |
Cyber Security, Mobile Devices, Security | London, England, United Kingdom |
|
RYN File Cloud identity-based encryption software allows you to certify, protect, track & control all types of digital info. |
Cyber Security, Security, Software | N/A |
![]() |
NSFOCUS NSFOCUS is a proven global leader in providing enterprise-level network security solutions and services. SZSE:300369 |
Cloud Security, Cyber Security, Infrastructure, Network Security | Santa Clara, California, United States |
|
Kaduu Kaduu provides cyber threat intelligence services. |
Cyber Security, Intelligent Systems | Zug, Zug, Switzerland |
![]() |
EnVers Group SIA GoGetSSL.com - Cheap SSL certificates. We offer wide range of SSL certificates |
Cyber Security, E-Commerce, Information Technology, Internet, Network Security | Riga, Riga, Latvia |
|
Linewize Linewize is a provider of cyber security and safety services, specialising in the education sector. |
Cyber Security | Christchurch, Canterbury, New Zealand |
|
Zer0Data Zer0Data is a cybersecurity advisory firm specializing in the identification of zero-day computer-software vulnerabilities. |
Cyber Security, Information Technology, Software | Moscow, Moscow City, Russian Federation |
|
Center For Internet Security The Center for Internet Security is focused on enhancing the cybersecurity readiness and response of public and private sector entities. |
Association, Cyber Security, Network Security, Non Profit | East Greenbush, New York, United States |
|
CNC Intelligence Inc CNC Intelligence specializes in the fields of crypto forensics and open source intelligence. |
Cryptocurrency, Cyber Security | N/A |
|
Bitlabs Academy Bitlabs is an online education platform to upgrade digital skills for the young generation nationwide. |
Big Data, Cyber Security, Digital Marketing, E-Learning, EdTech, Education, Mobile Apps | Tangerang, Jawa Barat, Indonesia |
|
Waterfall Security Solutions Waterfall Security Solutions Unidirectional Security Gateway |
Cloud Data Services, Cyber Security, Government, Information Technology, Manufacturing, Mining, Oil and Gas, Security, Software, Water | Rosh Ha'ayin, HaMerkaz, Israel |
![]() |
AppsPicket Frictionless secure two factor authentication based on innovative cryptographic protocol. |
Computer, Cyber Security, Information Technology, Mobile Payments, Network Security, Security, Software | London, England, United Kingdom |
|
Sontiq Sontiq is an IT consultancy that offers mobile security, identity restoration, breach response, and digital identity protection. |
Consulting, Cyber Security, Information Technology | Framingham, Massachusetts, United States |
![]() |
Acunetix Aquinetix offers an automated tool that enables companies to scan their web apps to identify and resolve exploitable vulnerabilities. |
Cyber Security, Enterprise Software, Information Technology, Network Security, SaaS | London, England, United Kingdom |
|
Ivacy VPN Ivacy is a VPN provider based in Singapore with more than 5000 servers and 100+ locations |
Apps, Cyber Security, Mobile, Mobile Apps, Software, Web Apps, Web Hosting | Singapore, Central Region, Singapore |
|
Provenance Technologies Provenance Technologies is a software company that develops digital platforms to enhance financial security for businesses. |
Cyber Security, Physical Security, Security, Software | San Francisco, California, United States |
|
Cybers Cybers is an information security management firm, fiscally responsible for delivering cyber-security solutions to its diverse clientele. |
Cyber Security, Information Technology, Network Security | Tallinn, Harjumaa, Estonia |
|
Superna Superna is a global leader in managing, protecting and securing unstructured data across both on-prem and hybrid cloud environments. |
Cyber Security, Data Center Automation, Security | Ottawa, Ontario, Canada |
|
Signal Mountain Signal Mountain provides satellite, MPLS, and wireless network solutions. |
Cyber Security, Professional Services, Project Management, Satellite Communication | Atlanta, Georgia, United States |
|
Quantivate Governance Risk and Compliance Solutions |
Cyber Security, Risk Management, Software | Woodinville, Washington, United States |
|
IdentityIQ IdentityIQ is a US-based identity theft and credit protection company designed to help users stay on top identity thieves and data breaches. |
Credit, Cyber Security, Identity Management, Information Technology, Security, Software | Temecula, California, United States |
|
Vidoc Security Lab Building an AI Security Engineer to keep up with the emerging threat of AI-generated code. |
Artificial Intelligence (AI), Cyber Security, Generative AI, Security | San Francisco, California, United States |
|
Thinkst Canary Thinkst Canary provide high fidelity honeypots that deploy in minutes (to let you know when your networks have been breached). |
Cyber Security, Intrusion Detection, Network Security, Security, Software | Australia, Isabela, Philippines |
|
Dispersive Dispersive provides accelerated, private and secure virtual networking for cloud, branch, mobile device and embedded IoT. |
Cyber Security, Information Technology, Telecommunications | Roswell, Georgia, United States |
![]() |
Mailpile Mailpile provides online email services and a saving feature in an internet server mailbox with encryption and privacy features. |
Cyber Security, Information Technology, Online Portals, Privacy, Service Industry | ReykjavÃk, Gullbringusysla, Iceland |
|
Gemnasium (acquired By Gitlab) Gemnasium monitors software dependencies, notifies users of security updates or advisories, and automates open source code updates. |
Cyber Security, Developer Tools, Open Source, Security, Software | Quebec, Quebec, Canada |
|
Digidentity Identity, Verification, Authentication and Security |
CRM, Cyber Security, Identity Management, Information Technology, Robotics, Security, Software | The Hague, Zuid-Holland, The Netherlands |
|
SafeAeon Inc. SafeAeon is a leading provider of SOC-as-a-service (Cyber Security Operations Center – SOC). |
Cloud Management, Cloud Security, Cyber Security, Network Security, Penetration Testing, Security | Pleasanton, California, United States |
|
Axur Axur is every company's takedown (digital content removal) partner. We also help to detect digital fraud, data leakage and online piracy |
Advertising, Artificial Intelligence (AI), Compliance, Cyber Security, Fraud Detection, Information Technology, Internet, Risk Management, SaaS, Security | San Francisco, California, United States |
|
Sheffield Scientific Sheffield Scientific is an IT company specializing in energy asset management and cybersecurity services. |
Cyber Security, Information Technology, Renewable Energy | Houston, Texas, United States |
|
Cognni Cognni makes an InfoSec think like a human, so the user can focus on the bigger picture, keeping the information flow safe. |
Artificial Intelligence, Cyber Security, Software | Tel Aviv, Tel Aviv, Israel |
|
HITRUST HITRUST a not-for-profit organization whose mission is to champion programs that safeguard sensitive information & manage information risk. |
Cyber Security, Information Technology, Security | Frisco, Texas, United States |
|
NexusTek NexusTek provides small and medium-sized businesses a trusted resource to optimize and manage their IT environments |
Cloud Infrastructure, Cloud Management, CRM, Cyber Security, Enterprise Resource Planning (ERP), Enterprise Software, Information Technology, Software, Technical Support, VoIP | Greenwood Village, Colorado, United States |
![]() |
MSA Security A New York-based provider of "high consequence" threat protection |
Consulting, Cyber Security, Government, Security, Training | New York, New York, United States |
![]() |
Cognitive Big Data Systems Cognitive Big Data Systems use creative machine vision to glean real-time business intelligence and threat information from video streams. |
Artificial Intelligence, Cyber Security, Information Technology, Robotics, Video | Pensacola, Florida, United States |
|
Dark Wolf Solutions Dark Wolf Solutions is an IT consultancy firm that offers software development, system engineering and management solutions. |
Cyber Security, Information Technology, Management Consulting, Software, Technical Support | Herndon, Virginia, United States |
![]() |
Blackbird Technologies Blackbird Technologies is a technology solutions provider to solve challenging problems. |
Cyber Security, Information Technology, National Security | Herndon, Virginia, United States |
|
InvizBox InvizBox is a device that gives customers a range of privacy and security options. |
Computer, Cyber Security, Network Security, Software | Dublin, Dublin, Ireland |
|
ZULA Cybersecurity Cybersecurity platform accessible to all kind of organizations |
Cyber Security, Information Technology, Software | Buenos Aires, Distrito Federal, Argentina |
|
Kivu Kivu is a cyber security firm trusted by top cyber insurance providers, law firms, and enterprise clients across the globe. |
Cyber Security, Security | Denver, Colorado, United States |
|
AIS AIS is an IT firm that provides cybersecurity, managed IT, cloud solutions, and consulting services. |
Cloud Management, Cyber Security, Information Services, Information Technology | Indianapolis, Indiana, United States |
|
Netgate Netgate is focused on delivering secure high-performance network connectivity for everyone through security and privacy. |
Cloud Infrastructure, Cloud Security, Cyber Security, Network Security, Open Source | Austin, Texas, United States |
|
Security CTRL Security CTRL offers cyber security for cloud infrastructures. |
Cloud Infrastructure, Cyber Security, Security, Software | Edinburgh, Edinburgh, City of, United Kingdom |
|
Nullafi Nullafi Shield is a zero-code add-on to any endpoint that gives admins one-click control over what data that endpoint receives |
Cyber Security, Data Storage, Data Visualization, Information Technology, Internet, Software | Chicago, Illinois, United States |
|
Elpha Secure Elpha Secure is a provider of cybersecurity solutions and software protection to small businesses. |
Cyber Security, Insurance, Software | New York, New York, United States |
![]() |
Cyfir CyFIR is the ideal network investigation and Incident Response tool for performing live computer investigations across any size enterprise. |
Cyber Security, Information Technology, Security | Manassas, Virginia, United States |
|
CyberGuard Compliance CyberGuard Compliance is an IT company that offers solutions for accounting, audit assessment, cyber security, and data privacy services. |
Accounting, Cyber Security, Information Technology, Professional Services | Las Vegas, Nevada, United States |
|
Gamma.AI AI Powered Cloud Data Discovery, Data Classification & Data Loss Prevention Platform |
Artificial Intelligence, Big Data, CRM, Cyber Security, Information Technology, Internet of Things, Machine Learning | Sunnyvale, California, United States |
|
Promon Promon is an app security firm specializing in on-app protection or application shielding. |
Cyber Security, Security, Software | Oslo, Oslo, Norway |
![]() |
Dynetics Employee-owned, mid-tier, engineering solutions provider for defense and aerospace. |
Computer, CRM, Cyber Security, Information Technology, Manufacturing | Huntsville, Alabama, United States |
|
Solute Solute provides Software Engineering, Network Engineering, Cyber Security Engineering, Cloud Architecture, and DevOps services. |
Consulting, Cyber Security, Government, Information Technology, Legal, Security, Software | San Diego, California, United States |
![]() |
Helm Solutions Helm is a global cyber security and technology firm that provides legal and compliance solutions to government and the enterprise. |
Cyber Security, Information Technology, Legal | New York, New York, United States |
|
Pondurance Pondurance is cybersecurity company that focuses on delivering both technology-enabled and compliance-advisory solutions. |
Cloud Security, Compliance, Consulting, Cyber Security, Network Security, Security | Indianapolis, Indiana, United States |
|
Assured Data Protection Assured Data Protection provides IT services in cloud data services, backup and disaster recovery, Office 365 services, and data protection. |
Cloud Computing, Cyber Security, Data Integration, Information Technology | Herndon, Virginia, United States |
|
Axiomatics Axiomatics is the originator and leading provider of runtime, fine-grained authorization for applications, Big Data, APIs, and microservices |
Cloud Security, Cyber Security, Enterprise Software, Identity Management, Security, Service Industry | Stockholm, Stockholms Lan, Sweden |
|
LockDown LockDown is a technology company focused on data privacy and security. |
Apps, Cyber Security, Desktop Apps, Information Technology, Messaging, Mobile, Mobile Apps, Privacy, Security, Software | N/A |
|
IDIQ IDIQ is a credit monitoring, identity theft protection and data breach management company. |
Credit, Cyber Security, Information Technology | Temecula, California, United States |
![]() |
ISC8 ISC8 provides intelligent cyber security solutions and multiple hardware and software products for enterprise threat management. |
3D Technology, Cyber Security, Electronics, Nanotechnology, Security, Software, Wireless | Plano, Texas, United States |
|
BluVector Inc. BluVector is a network security company delivering next generation IDS |
Cyber Security, Information Technology, Network Security | Arlington, Virginia, United States |
![]() |
Accutech Accutech Security, is a leading manufacturer of advanced electronic monitoring and security systems. |
Cyber Security, Information Technology, Manufacturing, Security | Franklin, Wisconsin, United States |
|
Jing An Yunxin Jing An Yunxin is a company specialized in product development and services in the information security fields. |
Cyber Security, Information Services, Information Technology | Haidian, Beijing, China |
![]() |
CipherTooth, Inc Internet security technology to protect the data stream from Man in the Middle or other attacks. |
Cyber Security, Security, Technical Support | American Fork, Utah, United States |
|
GTB Technologies, Inc. The Creator of DLP for IP and Leader of Data Protection that Work security platforms. |
Cloud Data Services, Cloud Security, Computer, Content Discovery, Cyber Security, Ediscovery, Information Technology, Software | Newport Beach, California, United States |
![]() |
Prolifics Prolifics is a digital engineering and consulting firm that offers test automation, cybersecurity, and business automation services. |
Consulting, Cyber Security, Information Technology, Software | Orlando, Florida, United States |
|
GetID Identity Verification, KYC/AML checks, Customer Onboarding |
Cyber Security, FinTech, Identity Management, Information Technology, SaaS, Software | Tallinn, Harjumaa, Estonia |
|
Ridgeline International Technology, Digital Signature Management |
Cloud Management, Cyber Security, Information Services, Information Technology, IT Infrastructure, Messaging, Software | Mclean, Virginia, United States |
|
NEC XON NEC XON designs, builds, operates, and manages information and communication technology (ICT) solutions created specifically for customers. |
Communications Infrastructure, Cyber Security, Information Technology, Professional Networking | Midrand, NA - South Africa, South Africa |
![]() |
Focal Point Data Risk Focal Point Data Risk, formerly Cyber Risk Management (CRM), is a leading data risk management services company. |
Cyber Security, Risk Management | Tampa, Florida, United States |
![]() |
InfoArmor InfoArmor offers businesses industry-leading employee identity protection and advanced threat intelligence solutions. |
Analytics, Cyber Security, Employee Benefits | Scottsdale, Arizona, United States |
|
Netsync Netsync specializes in collaboration & unified communications, data center and cloud, network infrastructure and others. |
Cyber Security, Data Center, Information Services, Information Technology, IT Infrastructure, Wireless | Houston, Texas, United States |
|
PrivadoVPN PrivadoVPN is a virtual private network that defends your data from hackers & online spies with advanced encryption at super fast speeds. |
Computer, Cyber Security, Information Technology, Internet, Privacy, Software | Zug, Zug, Switzerland |
|
UQontrol uQontrol is a technology start-up focused on creating more secure, intuitive and seamless online experiences. |
Consumer Electronics, Cyber Security, E-Commerce, Hardware, Internet of Things, Payments, Software | Sandpoint, Idaho, United States |
![]() |
Entreda Cybersecurity compliance and risk analytics software |
Compliance, Cyber Security, Financial Services, Software | Santa Clara, California, United States |
|
Cyberinfrastructure Technologies We develop dual-use sensing and communication technologies |
Cyber Security, Network Security, Software, Telecommunications | West Valley City, Utah, United States |
![]() |
DataLocker DataLocker is a developer of easy to use, data encryption solutions for portable storage devices, media systems, and cloud storage accounts. |
Cyber Security, Hardware, Software | Overland Park, Kansas, United States |
|
Cleafy Cleafy protects web and mobile applications from tampering attempts and deploys countermeasures to guarantee data and content integrity. |
Cyber Security, FinTech, Information Services, Information Technology, Security | Milan, Lombardia, Italy |
![]() |
ShadowDragon ShadowDragon architects cyber intelligence solutions. |
Cyber Security, Network Security, Security | Cheyenne, Wyoming, United States |
![]() |
NIKSUN NIKSUN® is the leader in making the unknown known. NIKSUN delivers the best next-generation network monitoring solutions to secure critical |
Cyber Security, Network Security, Security, Software | Princeton, New Jersey, United States |
|
WithSecure WithSecure specializes in offering security software solutions, managed services, security hardware solutions, and consulting. |
Consulting, Cyber Security, Information Technology, Software | Helsinki, Southern Finland, Finland |
![]() |
Premera Blue Cross Premera is a leading health plan in the Pacific Northwest, providing comprehensive health benefits and tailored services. |
Cyber Security, Health Care, Information Technology, Insurance | Mountlake Terrace, Washington, United States |
|
Hush Hush is a provider of digital privacy management services used to help families protect their digital identities. |
Cyber Security, Identity Management, Risk Management | Detroit, Michigan, United States |
|
HackersEra Cyber Security Consultancy Pvt Ltd HackersEra is India based Cyber Security Consultancy and Training firm established by leading industry experts in 2015. |
Cloud Security, Cyber Security, Information Technology, Network Security, Penetration Testing | Pune, Maharashtra, India |
|
Walrus Security Walrus keeps push payments safe by developing and deploying novel authentication technology in a low-friction platform. |
Computer, Cyber Security, FinTech, Fraud Detection, Identity Management, Payments | New York, New York, United States |
|
Interphase Systems Interphase Systems is a consulting and IT services organization located in the Greater Philadelphia area. |
Consulting, Cyber Security, Information Technology | Blue Bell, Pennsylvania, United States |
|
Pixee Your automated product security engineer |
Cyber Security, Software | N/A |
![]() |
Rapiscan Systems Rapiscan Systems provides surveillance like people screening, radiation detection, cargo and vehicle inspection. |
Cyber Security, Government, Information Technology, Security, Software, Virtual Reality | Torrance, California, United States |
![]() |
N-Dimension Solutions N-Dimension Solutions provides managed cybersecurity services protecting critical energy infrastructures, data and assets. |
Cyber Security, Energy, Service Industry | Toronto, Ontario, Canada |
|
Oneleet Scalable manual cybersecurity testing as a service provided by vetted expert penetration testers |
Cyber Security, Penetration Testing | Amsterdam, Noord-Holland, The Netherlands |
![]() |
Webonise We build what is essential for business, powered by our innovative platforms and services. |
Cyber Security, E-Learning, Fantasy Sports, Information Technology, Internet, Marketing Automation, Mobile Apps, SaaS, Software, UX Design | Raleigh, North Carolina, United States |
![]() |
Sher.ly Sher.ly is a B2B shared data projects secure platform with context smart syncing for large files directly and only from on premise storage. |
Cloud Data Services, Cyber Security, File Sharing, Local, Software | Palo Alto, California, United States |
![]() |
LockPath, Inc. LockPath provides enterprise governance, risk management, compliance and information security software applications. |
Cyber Security, Risk Management, Software | Overland Park, Kansas, United States |