Organizations in Cyber Security
Name | Industry | Address | |
---|---|---|---|
|
LimaCharlie LimaCharlie is an Information security tools & infrastructure delivered in a manner similar to AWS. |
Cloud Security, Cyber Security, Information Technology, Network Security, SaaS | Walnut, California, United States |
![]() |
ThreatMetrix ThreatMetrix is an integrated digital identity platform that allows its users to transact their businesses without friction. |
Cyber Security, FinTech, Information Technology, Mobile, Security | San Jose, California, United States |
|
Carbide SaaS for SMB to attain and maintain compliance with information security and privacy standards (SOC2, HIPAA, GDPR, CCPA ISO and more). |
Compliance, Cyber Security, Information Technology, SaaS, Security, Software | Sydney, Nova Scotia, Canada |
|
LayerX Security Securing the core workspace in the modern enterprise. |
Cyber Security, Enterprise Software, SaaS, Web Browsers | Tel Aviv, Tel Aviv, Israel |
![]() |
Jscrambler Jscrambler is the leading client-side security solution for JavaScript protection and webpage real-time monitoring. |
Cyber Security, Security, Web Apps, Web Development | Porto, Lisboa, Portugal |
|
Cyvatar.ai Automated cybersecurity management platform enabling SMBs to effectively deploy & maintain cybersecurity while accelerating business growth. |
Cloud Security, Compliance, Cyber Security, Information Technology, Network Security, Operating Systems, Risk Management, Small and Medium Businesses, Subscription Service | Irvine, California, United States |
|
Sysnet Global Solutions Sysnet Global Solutions offers a range of cybersecurity, payment, and compliance solutions designed to empower businesses. |
Compliance, Consulting, Cyber Security, Information Technology, Payments | Carrickmines, Dublin, Ireland |
|
AUTOCRYPT End-to-end mobility security solutions for autonomous vehicles and beyond |
Automotive, Autonomous Vehicles, Cyber Security, Security, Software | Seoul, Seoul-t'ukpyolsi, South Korea |
|
BreachLock Inc. Pen Testing as A Service (PTaaS) | World's first full stack PTaaS powered by Certified Hackers and AI |
Artificial Intelligence, Cyber Security, SaaS | New York, New York, United States |
|
CyberHash World's Leading Distributed Storage Provider |
Blockchain, Cloud Storage, Cyber Security, Data Storage | Singapore, Central Region, Singapore |
|
CyberSmart CyberSmart is an automated end-to-end cyber security compliance platform that helps SMB's. |
Compliance, Cyber Security, Network Security, SaaS | London, England, United Kingdom |
|
Ockam Trust Data-in-Motion. |
Cloud Computing, Cyber Security, Developer Tools, Enterprise Software, Identity Management, Network Security, Open Source, Security, Software | San Francisco, California, United States |
|
LogicHub LogicHub automates security analysts' intelligence process to reduce breach detection time. |
Artificial Intelligence, Cyber Security, Network Security, SaaS, Security | Mountain View, California, United States |
|
Deep Instinct Deep Instinct applies deep learning to cybersecurity, offering zero-day attack protection. |
Artificial Intelligence, Cyber Security, Machine Learning, Network Security, Security | New York, New York, United States |
|
RiskLens RiskLens empowers risk officers and CISOs to manage their cyber risk from a business perspective by quantifying it in financial terms |
Cyber Security, Information Services, Risk Management, SaaS, Security | Spokane, Washington, United States |
|
Zivver Zivver is the effortless, smart, secure digital communications platform powering the next generation of secure communications. |
Cyber Security, Information Technology, Messaging, Software | Amsterdam, Noord-Holland, The Netherlands |
|
Guardian Guardian protects and secures privacy and data while using apps and browsing the web on an iOS device. |
Cyber Security, Information Technology, Privacy, Software | San Francisco, California, United States |
|
Trustpair Trustpair is digitizes and automates the validation of your vendor payments to protect you against transfer frauds. |
Cyber Security, FinTech, Software | Puteaux, Ile-de-France, France |
|
CyberMDX CyberMDX offers a cybersecurity solution for medical devices and clinical assets. |
Cyber Security, Enterprise Software, Health Care, Medical Device, Network Security, Software | New York, New York, United States |
|
Crypto Quantique Crypto Quantique offers hardware based cyber-security solution for authentication and encryption in a wired local network. |
Cyber Security, Hardware, Software, Wired Telecommunications | City Of London, England, United Kingdom |
|
Dasera Daseraโs data security platform combines collaboration and automation to ensure data is protected from creation to deletion. |
Cloud Security, Cyber Security, Software | Mountain View, California, United States |
|
Garrison Technology Garrison Technology is a cybersecurity firm that offers a secure remote browsing technology. |
Computer, Cyber Security, Network Security | London, England, United Kingdom |
|
CyberOwl CyberOwl offers an early warning system for cyber attacks through real-time monitoring of high value targets for malicious behavior. |
Analytics, Computer, Cyber Security, Internet of Things, Network Security | London, England, United Kingdom |
|
Sevco Security Sevco Security is a provider of cybersecurity services and products for cyber experts. |
Cyber Security, Information Technology, Network Security, Software | Austin, Texas, United States |
|
NsKnox NsKnox Technologies is a Fintech - Security company, revolutionizing the way organizations would protect themselves. |
Cyber Security, Finance, FinTech, Payments, Security | Petah Tiqva, HaMerkaz, Israel |
|
Phantom Phantom is a purpose-built, community-powered security automation, and orchestration platform. |
Cyber Security, Network Security, Security | Palo Alto, California, United States |
|
DUST Identity DUST Identity is a proprietary technology which utilizes nanodiamonds to create an unclonable identity layer on any object. |
Cyber Security, Information Technology, Internet of Things, Nanotechnology, Security, Software, Supply Chain Management | Boston, Massachusetts, United States |
|
Enso Security Enso is an information security startup that offers an application security posture management solution. |
Cyber Security, Information Services, Network Security, Software, Software Engineering | Tel Aviv, Tel Aviv, Israel |
![]() |
PCloud pCloud is a provides cloud storage solutions for personal and business consumers. |
Cloud Computing, Cloud Data Services, Cloud Storage, Cyber Security, Software | Baar, Zug, Switzerland |
|
BLACKCLOAK Concierge Cybersecurity & Privacy Platform for Corporate Executives & High-Net-Worth Individuals |
Cyber Security, Information Technology, Privacy | Lake Mary, Florida, United States |
|
Oort Identity threat detection and response for enterprise security |
Cyber Security, SaaS | Boston, Massachusetts, United States |
|
Cyscale Cloud-native Security and Compliance - scalable Products and Services for Cloud Cybersecurity, DevSecOps and Cloud Security Management. |
Asset Management, Cloud Computing, Cloud Infrastructure, Cloud Management, Cloud Security, Compliance, Cyber Security, Information Technology, SaaS, Software | London, England, United Kingdom |
|
WhiteHat Security WhiteHat Security is an application security provider committed to securing digital business. |
Cyber Security, Network Security, Risk Management, Security, Web Apps | San Jose, California, United States |
|
Red Balloon Security Red Balloon Security is an embedded device security research and development firm. |
Cyber Security, Embedded Systems, Internet of Things, Network Security, Software | New York, New York, United States |
|
Blackpoint Cyber Blackpoint Cyber is a leading provider of cybersecurity threat hunting, detection, and response technology. |
Computer, Cyber Security, Network Security, Software | Ellicott City, Maryland, United States |
|
CUJO AI CUJO is an AI platform offering SaaS solutions to telecom operators and gateway manufacturers. |
Artificial Intelligence, Big Data, Cyber Security, Internet of Things, Network Security, SaaS, Smart Home, Software | El Segundo, California, United States |
|
SquareX SquareX helps organisations detect, mitigate and threat-hunt web attacks happening against their users in real-time. |
Cyber Security | Singapore, Central Region, Singapore |
|
BluBracket BluBracket develops a code security platform that checks for security and integrity issues. |
Cyber Security, Enterprise Software, Software | Palo Alto, California, United States |
|
SecurEnds SecurEnds is an information security company that helps to reduce security risk and costs by automating IGA. |
Cloud Security, Cyber Security, Identity Management, Information Technology, Security | Atlanta, Georgia, United States |
|
GuardRails GuardRails is a platform that empowers developers to find, fix, and prevent security vulnerabilities in their web and mobile applications. |
Cyber Security, Developer Tools, Internet, Productivity Tools, Security | Singapore, Central Region, Singapore |
![]() |
Viakoo Vulnerability management for unmanaged & IoT Devices; firmware patching, certificate management, password enforcement, and service assurance |
Cloud Data Services, Cyber Security, Internet of Things, IT Infrastructure, Physical Security, SaaS, Security | Mountain View, California, United States |
|
Bluelava Blue Lava is a cybersecurity management solution enabling IT teams to strategize, prioritize, and budget core cybersecurity programs. |
Cyber Security, Information Technology, Network Security, Software | Menlo Park, California, United States |
|
Contrast Security Contrast Security is a modernized application security, embedding code analysis, and attack prevention directly into the software. |
Cloud Security, Cyber Security, Developer Tools, Enterprise Applications, Security, Software | Los Altos, California, United States |
|
NanoLock Security Ltd NanoLock Security ensures operational integrity of smart meters and industrial machines regardless of cyber events or human errors |
Cyber Security, Internet of Things, Software | Hod Hasharon, HaMerkaz, Israel |
|
XONA Systems XONA is the frictionless user access platform purpose-built for critical infrastructure. |
Cyber Security, Industrial Automation, Information Technology, Internet of Things, Oil and Gas, Renewable Energy, Software | Annapolis, Maryland, United States |
|
Heylogin Password Manager without Master Password - Swipe to Login replaces all passwords |
Cyber Security, Network Security, Privacy, Security, Software | N/A |
|
Sysdig The leader in cloud security powered by runtime insights |
Cloud Computing, Cloud Security, Cyber Security, Open Source, SaaS, Security | San Francisco, California, United States |
|
Corsha Corsha is an API Identity and Access Management platform that secures machine-to-machine communication and adds automated MFA to APIs. |
Cloud Security, Cyber Security, IT Infrastructure, SaaS, Security | Vienna, Virginia, United States |
|
Acreto Acreto is a cloud-delivered, end-to-end connectivity & security platform that connects & protects any technology, on any network, anywhere. |
Cloud Security, Cyber Security, Information Technology, Internet of Things, Mobile, Network Security, SaaS, Software | Cupertino, California, United States |
|
Skuchain SKUChain offers a blockchain-based commerce cloud for procurement and contracts management, financing arrangements. |
Bitcoin, Blockchain, Cyber Security, Enterprise, Enterprise Applications, Enterprise Software, Ethereum, Finance, FinTech, Supply Chain Management | Mountain View, California, United States |
|
TEHTRIS TEHTRIS is a cybersecurity leader |
Cloud Security, Consulting, Cyber Security, Intrusion Detection, Network Security, Penetration Testing | Pessac, Aquitaine, France |
|
SaltStack SaltStack is intelligent automation for a software-defined world. |
Cloud Management, Cyber Security, Information Technology, IT Management, Software | Lehi, Utah, United States |
|
Smart Protection Smart Protection keeps and protects intellectual and industrial property rights online. |
Artificial Intelligence, Customer Service, Cyber Security, Intellectual Property, Legal, Legal Tech, SaaS, Security, Software | Madrid, Madrid, Spain |
![]() |
Source Defense Source Defense provides websites with prevention technology for attacks of third-party origin. |
Cyber Security | Be'er Sheva, HaDarom, Israel |
|
Plurilock Plurilock provides invisible MFA and continuous authentication using behavioral-biometric and machine learning technology. CVE:PLUR |
Biometrics, Cyber Security, Identity Management, Information Technology, Network Security | Victoria, British Columbia, Canada |
|
Nanopay nanopay empowers businesses and banks to scale with innovative payment and liquidity management products. |
B2B, Cyber Security, Financial Services, FinTech, Mobile Payments, Payments, Transaction Processing | Toronto, Ontario, Canada |
|
BugBase India's First Consolidated Bug Bounty Platform |
Cloud Security, Cyber Security, National Security, Network Security, Penetration Testing, Security | N/A |
|
TypingDNA TypingDNA is a cybersecurity SaaS platform that offers authentication and fraud detection services. |
Artificial Intelligence (AI), Cyber Security, Developer APIs, Fraud Detection, Identity Management, SaaS, Software | Brooklyn, New York, United States |
|
Threater Threater provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale. |
Cyber Security, Software | Washington, District of Columbia, United States |
|
Kion Kion is a cloud enablement solution designed to help organizations simplify management and governance of the cloud. |
Cloud Infrastructure, Cloud Management, Cloud Security, Cyber Security, Information Technology, Software | Fulton, Maryland, United States |
|
Infinipoint Infinipoint is the pioneer in the Device-Identity-as-as-Service security category to extend a true Zero Trust security posture to devices. |
Cloud Security, Cyber Security, Identity Management, Information Technology, Security | Tel Aviv, Tel Aviv, Israel |
|
ByteChek ByteChek helps businesses build cybersecurity programs to enhance sales and build trust from customers. |
Compliance, Cyber Security, Information Technology, Risk Management, SaaS, Software | Miami, Florida, United States |
|
Veridium Veridium is a leading provider of strong digital authentication platform |
Biometrics, Cyber Security, Fraud Detection, Identity Management, Mobile, Security, Software | London, England, United Kingdom |
|
SpeQtral SpeQtral aims to secure global networks for the fast-approaching quantum revolution through a portfolio of QKD and PQC solutions. |
Aerospace, Cyber Security, Satellite Communication | Singapore, Central Region, Singapore |
|
6clicks Your complete Risk & Compliance Operating System, including award-winning mobile app and world-first AI engine. |
Compliance, Cyber Security, Legal Tech, Risk Management, Software | Melbourne, Victoria, Australia |
|
Immuta Immuta accelerates secure data access by discovering, securing, and monitoring cloud data. |
Analytics, Big Data, Cyber Security, Privacy | Boston, Massachusetts, United States |
|
Imagen Imagen Ltd is a modular enterprise video platform that enables content owners to publish and monetize media archives. |
Cloud Data Services, Cyber Security, Information Technology, Video, Web Development | Cambridge, Cambridgeshire, United Kingdom |
![]() |
ProtectWise ProtectWise provides Cloud-Powered Network Detection and Response. |
Cloud Security, Cyber Security, Network Security, SaaS | Denver, Colorado, United States |
|
Odix odix is a leading cybersecurity company specializing in Malware Prevention solutions utilizing its Deep File Inspection patented technology. |
Cyber Security, Information Technology | Rosh Ha'ayin, HaMerkaz, Israel |
|
Sternum Sternum's patented technology shifts the paradigm on how organizations develop, protect and manage IoT, IoMT and IIoT devices. |
Cyber Security, Data Visualization, Internet of Things, Software | Tel Aviv, Tel Aviv, Israel |
|
Spyderbat Cloud Native Runtime Security from Spyderbat detects and stops attacks throughout your Software Development Lifecycle (SDLC). |
Cloud Security, Cyber Security, Network Security, Software | Austin, Texas, United States |
|
Zentera Systems Zentera Systems specializes in Zero Trust security solutions for the digitally-transformed enterprise. |
Cloud Computing, Cloud Security, Cyber Security, Network Security, Security | Milpitas, California, United States |
![]() |
QWANT QWANT is an internet search engine that focuses on user privacy, web content filtering, and social networks. |
Cyber Security, Internet, Search Engine, Security | Paris, Ile-de-France, France |
|
Cyber Defense Labs Cyber Defense Labs is a full lifecycle information security service provider helping companies detect, manage and respond to cyber risks. |
Compliance, Consulting, Cyber Security, Infrastructure, Penetration Testing | Dallas, Texas, United States |
|
Athena Security Athenaโs mission is to save lives with AI Weapons Detection System Software and Visitor Managment System |
Artificial Intelligence (AI), Computer Vision, Cyber Security, Education, Information Technology, Machine Learning, Physical Security, Security, Software | Austin, Texas, United States |
|
Hackuity Hackuity is a comprehensive cybersecurity solution that orchestrates and automates Vulnerability Management. |
Cyber Security, Information Technology, SaaS, Software | Lyon, Rhone-Alpes, France |
|
Unbound Security Unbound Security providing protection for cryptographic keys and credentials, even in the presence of a network and server breach. |
Cloud Security, Cyber Security, Home Services, Privacy, Security, Service Industry | New York, New York, United States |
|
Abnormal Security Abnormal Security is an email security company that protects enterprises and organizations from targeted email attacks. |
Cyber Security, Email, Information Technology, Network Security, Security | San Francisco, California, United States |
|
ObserveIT ObserveIT helps organizations identify and eliminate insider threats. |
Cloud Security, Compliance, Cyber Security, Information Services, Information Technology, Software | Boston, Massachusetts, United States |
|
OneTrust OneTrust helps companies manage privacy, security, and governance requirements in a regulatory environment that constantly changes. |
Compliance, Cyber Security, Privacy, Risk Management, Software | Atlanta, Georgia, United States |
|
Arcana Network Arcana is a Decentralised Storage Layer for Ethereum and EVM blockchains with a Privacy Stack for Auth, IAM, and KMS. |
Blockchain, Cloud Storage, Cyber Security, Developer Platform, Developer Tools, Privacy | Bengaluru, Karnataka, India |
|
Tausight Tausightโs mission is to solve one of the most challenging responsibilities of healthcare CIOs, CISOs, and their IT organizations. |
Cyber Security, Health Care, Information Technology, Software | Boston, Massachusetts, United States |
|
Doppel Doppel is a real-time, cross-chain monitoring platform for detecting NFT fraud and counterfeits. |
Blockchain, Cyber Security, Fraud Detection | San Carlos, California, United States |
![]() |
Norse Norse provides internet security intelligence solutions to e-commerce and enterprise clients. |
Computer, Cyber Security, Network Security, Security | San Mateo, California, United States |
![]() |
EnSilo enSilo protects businesses around the world from data breaches and disruption caused by cyber attacks. |
Cyber Security | San Francisco, California, United States |
![]() |
Vera Vera enables organizations to secure, track, and revoke access to confidential data, across any platform or device. |
Cyber Security, Enterprise Software, Information Technology, Security | Palo Alto, California, United States |
|
Trapp Technology Trapp Technology is an IT company that provides managed IT services, cloud hosting, hosted VoIP, and managed security services. |
Cloud Computing, Consulting, Cyber Security, Information Technology, IT Infrastructure, Security, Technical Support, Telecommunications | Phoenix, Arizona, United States |
|
RiskSense Provides pen testing services & a cloud-based vulnerability prioritization and management platform to measure and control cybersecurity risk |
Cyber Security, Information Technology, Network Security, Risk Management, Security, Software | Sunnyvale, California, United States |
|
Cmd Cmd allows organizations to intuitively monitor and control user interaction within their Linux environment. |
B2B, Cyber Security, Information Technology, Internet, Internet of Things, Linux | Vancouver, British Columbia, Canada |
|
Cloudentity Cloudentity is a cloud based provider of Identity-Aware Authorization and Application Security solutions for the API first economy. |
Cyber Security, Identity Management, Security | Seattle, Washington, United States |
|
Surefire Cyber Surefire Cyber provide clients confidence by helping them prepare, respond, and recover from cyber incidents. |
Computer, Cyber Security, Network Security | Elkridge, Maryland, United States |
|
ORNA ORNA is an innovative AI-driven Security Orchestration, Automation and Response (SOAR) platform for small and midsize businesses. |
Artificial Intelligence, Cyber Security, SaaS | Toronto, Ontario, Canada |
|
ACI Learning ACI Learning trains leaders in Cybersecurity, Audit, and IT to create a personal, professional, and business outcomes that impact lives. |
Cyber Security, EdTech, Education, Information Technology, Training | Centennial, Colorado, United States |
|
Circadence Circadence offers cyber range solutions and cybersecurity learning platforms, running on Microsoft Azure. |
Cloud Computing, Cyber Security | Boulder, Colorado, United States |
|
Mocana Mocana is a developer of cybersecurity software solutions that protect Internet of Things devices and industrial infrastructure. |
Cyber Security, Information Technology, Internet, Software | Sunnyvale, California, United States |
|
4iQ 4iQ is a Cyber Intelligence company that protects digital identities and investigating threats, adversaries, and fraud. |
Artificial Intelligence, Cyber Security, Information Technology, Internet, Security, Software | Los Altos, California, United States |
|
Arnica Arnica is a framework for DevOps supply chain security that is behavior-based. |
Cyber Security, Developer Tools, DevOps, Software | Alpharetta, Georgia, United States |
![]() |
GreatHorn GreatHorn provides protection for cloud email systems, via advanced threat detection, automated defense, and integrated incident response. |
Cyber Security, Email, Hardware, Internet, Machine Learning, Security, Software | Waltham, Massachusetts, United States |
|
Forge Institute Forge Institute helps small and mid-sized businesses in cyber security defenses. |
Cyber Security, Enterprise Software, Information Technology | Little Rock, Arkansas, United States |
|
Strobes Security A Continuous Threat Exposure Management (CTEM) Company |
Cyber Security, Information Technology, SaaS, Software | Plano, Texas, United States |