Organizations in Cyber Security

Name Industry Address
limacharlie_logo LimaCharlie
LimaCharlie is an Information security tools & infrastructure delivered in a manner similar to AWS.
Cloud Security, Cyber Security, Information Technology, Network Security, SaaS Walnut, California, United States
threatmetrix_logo ThreatMetrix
ThreatMetrix is an integrated digital identity platform that allows its users to transact their businesses without friction.
Cyber Security, FinTech, Information Technology, Mobile, Security San Jose, California, United States
carbide_logo Carbide
SaaS for SMB to attain and maintain compliance with information security and privacy standards (SOC2, HIPAA, GDPR, CCPA ISO and more).
Compliance, Cyber Security, Information Technology, SaaS, Security, Software Sydney, Nova Scotia, Canada
mirovia-security_logo LayerX Security
Securing the core workspace in the modern enterprise.
Cyber Security, Enterprise Software, SaaS, Web Browsers Tel Aviv, Tel Aviv, Israel
jscrambler_logo Jscrambler
Jscrambler is the leading client-side security solution for JavaScript protection and webpage real-time monitoring.
Cyber Security, Security, Web Apps, Web Development Porto, Lisboa, Portugal
cyvatar-ai-inc_logo Cyvatar.ai
Automated cybersecurity management platform enabling SMBs to effectively deploy & maintain cybersecurity while accelerating business growth.
Cloud Security, Compliance, Cyber Security, Information Technology, Network Security, Operating Systems, Risk Management, Small and Medium Businesses, Subscription Service Irvine, California, United States
sysnet-global-solutions_logo Sysnet Global Solutions
Sysnet Global Solutions offers a range of cybersecurity, payment, and compliance solutions designed to empower businesses.
Compliance, Consulting, Cyber Security, Information Technology, Payments Carrickmines, Dublin, Ireland
autocrypt_logo AUTOCRYPT
End-to-end mobility security solutions for autonomous vehicles and beyond
Automotive, Autonomous Vehicles, Cyber Security, Security, Software Seoul, Seoul-t'ukpyolsi, South Korea
breachlock-inc_logo BreachLock Inc.
Pen Testing as A Service (PTaaS) | World's first full stack PTaaS powered by Certified Hackers and AI
Artificial Intelligence, Cyber Security, SaaS New York, New York, United States
cyberhash_logo CyberHash
World's Leading Distributed Storage Provider
Blockchain, Cloud Storage, Cyber Security, Data Storage Singapore, Central Region, Singapore
cybersmart-2_logo CyberSmart
CyberSmart is an automated end-to-end cyber security compliance platform that helps SMB's.
Compliance, Cyber Security, Network Security, SaaS London, England, United Kingdom
ockam_logo Ockam
Trust Data-in-Motion.
Cloud Computing, Cyber Security, Developer Tools, Enterprise Software, Identity Management, Network Security, Open Source, Security, Software San Francisco, California, United States
logichub_logo LogicHub
LogicHub automates security analysts' intelligence process to reduce breach detection time.
Artificial Intelligence, Cyber Security, Network Security, SaaS, Security Mountain View, California, United States
deep-instinct_logo Deep Instinct
Deep Instinct applies deep learning to cybersecurity, offering zero-day attack protection.
Artificial Intelligence, Cyber Security, Machine Learning, Network Security, Security New York, New York, United States
risklens_logo RiskLens
RiskLens empowers risk officers and CISOs to manage their cyber risk from a business perspective by quantifying it in financial terms
Cyber Security, Information Services, Risk Management, SaaS, Security Spokane, Washington, United States
zivver_logo Zivver
Zivver is the effortless, smart, secure digital communications platform powering the next generation of secure communications.
Cyber Security, Information Technology, Messaging, Software Amsterdam, Noord-Holland, The Netherlands
guardian-mobile-firewall_logo Guardian
Guardian protects and secures privacy and data while using apps and browsing the web on an iOS device.
Cyber Security, Information Technology, Privacy, Software San Francisco, California, United States
trustpair_logo Trustpair
Trustpair is digitizes and automates the validation of your vendor payments to protect you against transfer frauds.
Cyber Security, FinTech, Software Puteaux, Ile-de-France, France
cybermdx_logo CyberMDX
CyberMDX offers a cybersecurity solution for medical devices and clinical assets.
Cyber Security, Enterprise Software, Health Care, Medical Device, Network Security, Software New York, New York, United States
crypto-quantique_logo Crypto Quantique
Crypto Quantique offers hardware based cyber-security solution for authentication and encryption in a wired local network.
Cyber Security, Hardware, Software, Wired Telecommunications City Of London, England, United Kingdom
dasera_logo Dasera
Daseraโ€™s data security platform combines collaboration and automation to ensure data is protected from creation to deletion.
Cloud Security, Cyber Security, Software Mountain View, California, United States
garrison-technology_logo Garrison Technology
Garrison Technology is a cybersecurity firm that offers a secure remote browsing technology.
Computer, Cyber Security, Network Security London, England, United Kingdom
cyberowl_logo CyberOwl
CyberOwl offers an early warning system for cyber attacks through real-time monitoring of high value targets for malicious behavior.
Analytics, Computer, Cyber Security, Internet of Things, Network Security London, England, United Kingdom
sevco-security_logo Sevco Security
Sevco Security is a provider of cybersecurity services and products for cyber experts.
Cyber Security, Information Technology, Network Security, Software Austin, Texas, United States
nsknox_logo NsKnox
NsKnox Technologies is a Fintech - Security company, revolutionizing the way organizations would protect themselves.
Cyber Security, Finance, FinTech, Payments, Security Petah Tiqva, HaMerkaz, Israel
phantom-cyber_logo Phantom
Phantom is a purpose-built, community-powered security automation, and orchestration platform.
Cyber Security, Network Security, Security Palo Alto, California, United States
dust-identity_logo DUST Identity
DUST Identity is a proprietary technology which utilizes nanodiamonds to create an unclonable identity layer on any object.
Cyber Security, Information Technology, Internet of Things, Nanotechnology, Security, Software, Supply Chain Management Boston, Massachusetts, United States
enso-security_logo Enso Security
Enso is an information security startup that offers an application security posture management solution.
Cyber Security, Information Services, Network Security, Software, Software Engineering Tel Aviv, Tel Aviv, Israel
pcloud_logo PCloud
pCloud is a provides cloud storage solutions for personal and business consumers.
Cloud Computing, Cloud Data Services, Cloud Storage, Cyber Security, Software Baar, Zug, Switzerland
blackcloak_logo BLACKCLOAK
Concierge Cybersecurity & Privacy Platform for Corporate Executives & High-Net-Worth Individuals
Cyber Security, Information Technology, Privacy Lake Mary, Florida, United States
oort_logo Oort
Identity threat detection and response for enterprise security
Cyber Security, SaaS Boston, Massachusetts, United States
cyscale_logo Cyscale
Cloud-native Security and Compliance - scalable Products and Services for Cloud Cybersecurity, DevSecOps and Cloud Security Management.
Asset Management, Cloud Computing, Cloud Infrastructure, Cloud Management, Cloud Security, Compliance, Cyber Security, Information Technology, SaaS, Software London, England, United Kingdom
whitehat-security_logo WhiteHat Security
WhiteHat Security is an application security provider committed to securing digital business.
Cyber Security, Network Security, Risk Management, Security, Web Apps San Jose, California, United States
red-balloon-secrurity_logo Red Balloon Security
Red Balloon Security is an embedded device security research and development firm.
Cyber Security, Embedded Systems, Internet of Things, Network Security, Software New York, New York, United States
blackpoint-holdings_logo Blackpoint Cyber
Blackpoint Cyber is a leading provider of cybersecurity threat hunting, detection, and response technology.
Computer, Cyber Security, Network Security, Software Ellicott City, Maryland, United States
cujo_logo CUJO AI
CUJO is an AI platform offering SaaS solutions to telecom operators and gateway manufacturers.
Artificial Intelligence, Big Data, Cyber Security, Internet of Things, Network Security, SaaS, Smart Home, Software El Segundo, California, United States
squarex-dca3_logo SquareX
SquareX helps organisations detect, mitigate and threat-hunt web attacks happening against their users in real-time.
Cyber Security Singapore, Central Region, Singapore
blubracket_logo BluBracket
BluBracket develops a code security platform that checks for security and integrity issues.
Cyber Security, Enterprise Software, Software Palo Alto, California, United States
securends_logo SecurEnds
SecurEnds is an information security company that helps to reduce security risk and costs by automating IGA.
Cloud Security, Cyber Security, Identity Management, Information Technology, Security Atlanta, Georgia, United States
guardrails_logo GuardRails
GuardRails is a platform that empowers developers to find, fix, and prevent security vulnerabilities in their web and mobile applications.
Cyber Security, Developer Tools, Internet, Productivity Tools, Security Singapore, Central Region, Singapore
viakoo-inc_logo Viakoo
Vulnerability management for unmanaged & IoT Devices; firmware patching, certificate management, password enforcement, and service assurance
Cloud Data Services, Cyber Security, Internet of Things, IT Infrastructure, Physical Security, SaaS, Security Mountain View, California, United States
bluelava_logo Bluelava
Blue Lava is a cybersecurity management solution enabling IT teams to strategize, prioritize, and budget core cybersecurity programs.
Cyber Security, Information Technology, Network Security, Software Menlo Park, California, United States
contrast-security_logo Contrast Security
Contrast Security is a modernized application security, embedding code analysis, and attack prevention directly into the software.
Cloud Security, Cyber Security, Developer Tools, Enterprise Applications, Security, Software Los Altos, California, United States
nanolock-security_logo NanoLock Security Ltd
NanoLock Security ensures operational integrity of smart meters and industrial machines regardless of cyber events or human errors
Cyber Security, Internet of Things, Software Hod Hasharon, HaMerkaz, Israel
xona-systems_logo XONA Systems
XONA is the frictionless user access platform purpose-built for critical infrastructure.
Cyber Security, Industrial Automation, Information Technology, Internet of Things, Oil and Gas, Renewable Energy, Software Annapolis, Maryland, United States
heylogin_logo Heylogin
Password Manager without Master Password - Swipe to Login replaces all passwords
Cyber Security, Network Security, Privacy, Security, Software N/A
sysdig_logo Sysdig
The leader in cloud security powered by runtime insights
Cloud Computing, Cloud Security, Cyber Security, Open Source, SaaS, Security San Francisco, California, United States
corsha_logo Corsha
Corsha is an API Identity and Access Management platform that secures machine-to-machine communication and adds automated MFA to APIs.
Cloud Security, Cyber Security, IT Infrastructure, SaaS, Security Vienna, Virginia, United States
acreto_logo Acreto
Acreto is a cloud-delivered, end-to-end connectivity & security platform that connects & protects any technology, on any network, anywhere.
Cloud Security, Cyber Security, Information Technology, Internet of Things, Mobile, Network Security, SaaS, Software Cupertino, California, United States
skuchain_logo Skuchain
SKUChain offers a blockchain-based commerce cloud for procurement and contracts management, financing arrangements.
Bitcoin, Blockchain, Cyber Security, Enterprise, Enterprise Applications, Enterprise Software, Ethereum, Finance, FinTech, Supply Chain Management Mountain View, California, United States
tehtris_logo TEHTRIS
TEHTRIS is a cybersecurity leader
Cloud Security, Consulting, Cyber Security, Intrusion Detection, Network Security, Penetration Testing Pessac, Aquitaine, France
saltstack_logo SaltStack
SaltStack is intelligent automation for a software-defined world.
Cloud Management, Cyber Security, Information Technology, IT Management, Software Lehi, Utah, United States
smart-protection_logo Smart Protection
Smart Protection keeps and protects intellectual and industrial property rights online.
Artificial Intelligence, Customer Service, Cyber Security, Intellectual Property, Legal, Legal Tech, SaaS, Security, Software Madrid, Madrid, Spain
source-defense_logo Source Defense
Source Defense provides websites with prevention technology for attacks of third-party origin.
Cyber Security Be'er Sheva, HaDarom, Israel
plurilock-security-solutions_logo Plurilock
Plurilock provides invisible MFA and continuous authentication using behavioral-biometric and machine learning technology. CVE:PLUR
Biometrics, Cyber Security, Identity Management, Information Technology, Network Security Victoria, British Columbia, Canada
nanopay-inc_logo Nanopay
nanopay empowers businesses and banks to scale with innovative payment and liquidity management products.
B2B, Cyber Security, Financial Services, FinTech, Mobile Payments, Payments, Transaction Processing Toronto, Ontario, Canada
bugbase_logo BugBase
India's First Consolidated Bug Bounty Platform
Cloud Security, Cyber Security, National Security, Network Security, Penetration Testing, Security N/A
typingdna_logo TypingDNA
TypingDNA is a cybersecurity SaaS platform that offers authentication and fraud detection services.
Artificial Intelligence (AI), Cyber Security, Developer APIs, Fraud Detection, Identity Management, SaaS, Software Brooklyn, New York, United States
ThreatBlockr_logo Threater
Threater provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.
Cyber Security, Software Washington, District of Columbia, United States
cloudtamer_logo Kion
Kion is a cloud enablement solution designed to help organizations simplify management and governance of the cloud.
Cloud Infrastructure, Cloud Management, Cloud Security, Cyber Security, Information Technology, Software Fulton, Maryland, United States
infinipoint_logo Infinipoint
Infinipoint is the pioneer in the Device-Identity-as-as-Service security category to extend a true Zero Trust security posture to devices.
Cloud Security, Cyber Security, Identity Management, Information Technology, Security Tel Aviv, Tel Aviv, Israel
bytechek_logo ByteChek
ByteChek helps businesses build cybersecurity programs to enhance sales and build trust from customers.
Compliance, Cyber Security, Information Technology, Risk Management, SaaS, Software Miami, Florida, United States
veridium_logo Veridium
Veridium is a leading provider of strong digital authentication platform
Biometrics, Cyber Security, Fraud Detection, Identity Management, Mobile, Security, Software London, England, United Kingdom
speqtral_logo SpeQtral
SpeQtral aims to secure global networks for the fast-approaching quantum revolution through a portfolio of QKD and PQC solutions.
Aerospace, Cyber Security, Satellite Communication Singapore, Central Region, Singapore
6clicks_logo 6clicks
Your complete Risk & Compliance Operating System, including award-winning mobile app and world-first AI engine.
Compliance, Cyber Security, Legal Tech, Risk Management, Software Melbourne, Victoria, Australia
immuta_logo Immuta
Immuta accelerates secure data access by discovering, securing, and monitoring cloud data.
Analytics, Big Data, Cyber Security, Privacy Boston, Massachusetts, United States
cambridge-imaging-systems-ltd_logo Imagen
Imagen Ltd is a modular enterprise video platform that enables content owners to publish and monetize media archives.
Cloud Data Services, Cyber Security, Information Technology, Video, Web Development Cambridge, Cambridgeshire, United Kingdom
protectwise_logo ProtectWise
ProtectWise provides Cloud-Powered Network Detection and Response.
Cloud Security, Cyber Security, Network Security, SaaS Denver, Colorado, United States
odi_logo Odix
odix is a leading cybersecurity company specializing in Malware Prevention solutions utilizing its Deep File Inspection patented technology.
Cyber Security, Information Technology Rosh Ha'ayin, HaMerkaz, Israel
sternum_logo Sternum
Sternum's patented technology shifts the paradigm on how organizations develop, protect and manage IoT, IoMT and IIoT devices.
Cyber Security, Data Visualization, Internet of Things, Software Tel Aviv, Tel Aviv, Israel
spyderbat_logo Spyderbat
Cloud Native Runtime Security from Spyderbat detects and stops attacks throughout your Software Development Lifecycle (SDLC).
Cloud Security, Cyber Security, Network Security, Software Austin, Texas, United States
zentera-systems_logo Zentera Systems
Zentera Systems specializes in Zero Trust security solutions for the digitally-transformed enterprise.
Cloud Computing, Cloud Security, Cyber Security, Network Security, Security Milpitas, California, United States
qwant_logo QWANT
QWANT is an internet search engine that focuses on user privacy, web content filtering, and social networks.
Cyber Security, Internet, Search Engine, Security Paris, Ile-de-France, France
cyber-defense-lab_logo Cyber Defense Labs
Cyber Defense Labs is a full lifecycle information security service provider helping companies detect, manage and respond to cyber risks.
Compliance, Consulting, Cyber Security, Infrastructure, Penetration Testing Dallas, Texas, United States
athena-security-inc_logo Athena Security
Athenaโ€™s mission is to save lives with AI Weapons Detection System Software and Visitor Managment System
Artificial Intelligence (AI), Computer Vision, Cyber Security, Education, Information Technology, Machine Learning, Physical Security, Security, Software Austin, Texas, United States
hackuity_logo Hackuity
Hackuity is a comprehensive cybersecurity solution that orchestrates and automates Vulnerability Management.
Cyber Security, Information Technology, SaaS, Software Lyon, Rhone-Alpes, France
dyadic-security_logo Unbound Security
Unbound Security providing protection for cryptographic keys and credentials, even in the presence of a network and server breach.
Cloud Security, Cyber Security, Home Services, Privacy, Security, Service Industry New York, New York, United States
abnormal-security_logo Abnormal Security
Abnormal Security is an email security company that protects enterprises and organizations from targeted email attacks.
Cyber Security, Email, Information Technology, Network Security, Security San Francisco, California, United States
observeit_logo ObserveIT
ObserveIT helps organizations identify and eliminate insider threats.
Cloud Security, Compliance, Cyber Security, Information Services, Information Technology, Software Boston, Massachusetts, United States
onetrust_logo OneTrust
OneTrust helps companies manage privacy, security, and governance requirements in a regulatory environment that constantly changes.
Compliance, Cyber Security, Privacy, Risk Management, Software Atlanta, Georgia, United States
arcana-network_logo Arcana Network
Arcana is a Decentralised Storage Layer for Ethereum and EVM blockchains with a Privacy Stack for Auth, IAM, and KMS.
Blockchain, Cloud Storage, Cyber Security, Developer Platform, Developer Tools, Privacy Bengaluru, Karnataka, India
tausight_logo Tausight
Tausightโ€™s mission is to solve one of the most challenging responsibilities of healthcare CIOs, CISOs, and their IT organizations.
Cyber Security, Health Care, Information Technology, Software Boston, Massachusetts, United States
doppel-9e9d_logo Doppel
Doppel is a real-time, cross-chain monitoring platform for detecting NFT fraud and counterfeits.
Blockchain, Cyber Security, Fraud Detection San Carlos, California, United States
norse-corporation_logo Norse
Norse provides internet security intelligence solutions to e-commerce and enterprise clients.
Computer, Cyber Security, Network Security, Security San Mateo, California, United States
ensilo_logo EnSilo
enSilo protects businesses around the world from data breaches and disruption caused by cyber attacks.
Cyber Security San Francisco, California, United States
veradocs_logo Vera
Vera enables organizations to secure, track, and revoke access to confidential data, across any platform or device.
Cyber Security, Enterprise Software, Information Technology, Security Palo Alto, California, United States
trapp-technology_logo Trapp Technology
Trapp Technology is an IT company that provides managed IT services, cloud hosting, hosted VoIP, and managed security services.
Cloud Computing, Consulting, Cyber Security, Information Technology, IT Infrastructure, Security, Technical Support, Telecommunications Phoenix, Arizona, United States
risksense_logo RiskSense
Provides pen testing services & a cloud-based vulnerability prioritization and management platform to measure and control cybersecurity risk
Cyber Security, Information Technology, Network Security, Risk Management, Security, Software Sunnyvale, California, United States
cmd_logo Cmd
Cmd allows organizations to intuitively monitor and control user interaction within their Linux environment.
B2B, Cyber Security, Information Technology, Internet, Internet of Things, Linux Vancouver, British Columbia, Canada
syntegrity-networks_logo Cloudentity
Cloudentity is a cloud based provider of Identity-Aware Authorization and Application Security solutions for the API first economy.
Cyber Security, Identity Management, Security Seattle, Washington, United States
surefire-cyber_logo Surefire Cyber
Surefire Cyber provide clients confidence by helping them prepare, respond, and recover from cyber incidents.
Computer, Cyber Security, Network Security Elkridge, Maryland, United States
orna_logo ORNA
ORNA is an innovative AI-driven Security Orchestration, Automation and Response (SOAR) platform for small and midsize businesses.
Artificial Intelligence, Cyber Security, SaaS Toronto, Ontario, Canada
aci-learning_logo ACI Learning
ACI Learning trains leaders in Cybersecurity, Audit, and IT to create a personal, professional, and business outcomes that impact lives.
Cyber Security, EdTech, Education, Information Technology, Training Centennial, Colorado, United States
circadence_logo Circadence
Circadence offers cyber range solutions and cybersecurity learning platforms, running on Microsoft Azure.
Cloud Computing, Cyber Security Boulder, Colorado, United States
mocana_logo Mocana
Mocana is a developer of cybersecurity software solutions that protect Internet of Things devices and industrial infrastructure.
Cyber Security, Information Technology, Internet, Software Sunnyvale, California, United States
4iq_logo 4iQ
4iQ is a Cyber Intelligence company that protects digital identities and investigating threats, adversaries, and fraud.
Artificial Intelligence, Cyber Security, Information Technology, Internet, Security, Software Los Altos, California, United States
arnica-io_logo Arnica
Arnica is a framework for DevOps supply chain security that is behavior-based.
Cyber Security, Developer Tools, DevOps, Software Alpharetta, Georgia, United States
greathorn_logo GreatHorn
GreatHorn provides protection for cloud email systems, via advanced threat detection, automated defense, and integrated incident response.
Cyber Security, Email, Hardware, Internet, Machine Learning, Security, Software Waltham, Massachusetts, United States
forge-institute_logo Forge Institute
Forge Institute helps small and mid-sized businesses in cyber security defenses.
Cyber Security, Enterprise Software, Information Technology Little Rock, Arkansas, United States
strobes_logo Strobes Security
A Continuous Threat Exposure Management (CTEM) Company
Cyber Security, Information Technology, SaaS, Software Plano, Texas, United States
« First   7