Entities
LogoName Σ Employees
allpriv allpriv

Edge cybersecurity solutions based in Zero-trust endpoints managed by A.I. & Blockchain Next-gen cybersecurity Easier & Safer than ever before. Allpriv designs "Zero-trust Endpoints managed by A.I. secured by Blockchain" tackling all legacy pains, lacks & gaps! - "Medical Cyber-Brick" Mitigates dramatically cyberthreats on Hospitals, building a cyber-shield on each Medical Devices - "Telework Easier & Safer than ever before" increases as well security than Efficiency to remote workforce, IT & CISO

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency Cybersecurity

8 3 6 1
Yourax Yourax

[Automatic translation follows] Your expert in IT solutions: Consulting, Cybersecurity, Infrastructure, Networks, Wifi, Connectivity & Cloud Yourax is a company specializing in the implementation of IT solutions responding to all issues related to the security, optimization and management of system and network infrastructures. Who are we ? YOURAX supports companies and administrations in all phases of their IT projects: Consulting, audit, integration, training and support. Founded in 1996 by Eric WIEN, YOURAX operates in the “far north” with missions spread across French territory and border countries. With more than 15 years of experience, our technical and sales teams benefit from …

Type: SMB Activities: IT Services Technologies: Cybersecurity

8 0 7 23
TheGreenBow TheGreenBow

We protect your connections in any situation TheGreenBow is a leading provider of Cybersecurity Software and the first company to achieve Common Criteria EAL3+ certification and NATO restricted and EU restricted for its VPN Client. TheGreenBow VPN Client is a universal VPN client, compatible with virtually all VPN Gateways, supporting IPsec/OpenVPN, IPv4/IPv6, IKEv1/IKEv2, used by SMBs and major corporations and administrations worldwide. TheGreenBow is a founding member of Hexatrust and member of the competitive cluster Systematic. cybersecurity

Type: SMB Activities: IT Services Technologies: Cybersecurity

8 0 8 30
HIUMA | Gestion, maintenance informatique HIUMA | Gestion, maintenance informatique

[Automatic translation follows] Finally, IT support without obligation! 🙋🏻‍♂️ Cyber ​​Security Partner of Major Accounts since 2011, we position ourselves as experts in Cyber-security, networks, Cloud, infrastructures. We see digital technology as a tool serving people and not the other way around. One of the keys to progress in cybersecurity cybersecurity, managed services, networks, and cybersecurity audit

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 5
Secure Technology Alliance Secure Technology Alliance

The Secure Technology Alliance is a not-for-profit, multi-industry association working to stimulate the understanding, adoption and widespread application of secure solutions, including smart cards, embedded chip technology, and related hardware and software. The Alliance invests heavily in education on the appropriate uses of secure technologies for authentication, commerce, and the Internet of Things to protect privacy and data. The Secure Technology Alliance engages its members to share their knowledge, experience, and thought leadership through training, research, publications, industry outreach and open forums in the U.S. and Latin America.The Secure Technology Alliance was formerly called the Smart Card Alliance, which changed …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

6 0 6 10
PCI Security Standards Council PCI Security Standards Council

Securing the future of payments together. The PCI Security Standards Council is a global open body formed to develop, enhance, disseminate and assist with the understanding of security standards for payment account security. The Council maintains, evolves, and promotes the Payment Card Industry Security Standards. It also provides critical tools needed for implementation of the standards such as assessment and scanning qualifications, self-assessment questionnaires, training and education, and product certification programs.

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

12 4 5 155
GlobalSign GlobalSign

Ask us about Atlas, GlobalSign’s next-generation, high-speed cloud certificate management engine. GlobalSign is the leading provider of trusted identity and security solutions. Enabling businesses, large enterprises, cloud service providers and IoT innovators around the world to secure online communications, manage millions of verified digital identities and automate authentication and encryption. Its high-scale Public Key Infrastructure (#PKI) and identity solutions support the billions of services, devices, people and things comprising the Internet of Everything (#IoE). PKI, SSL, Internet security, Digital Certificate deployments, SSL Certificates, Authentication, Online Security, Encryption Solutions, Identity and Access Management, Certificate Authority, Code Signing, Authentication, and Digital Signatures

Type: SMB Activities: IT Services Technologies: Cybersecurity IoT

20 1 18 484
Webroot Webroot

Webroot, an OpenText company, was the first to harness the cloud and artificial intelligence to stop zero-day threats in real time. We provide endpoint protection, network protection, and security awareness training solutions purpose built for managed service providers and small businesses. Webroot BrightCloud® Threat Intelligence Services are used by market leading companies like Cisco, F5 Networks, Citrix, Aruba, A10 Networks, and more. Leveraging the power of machine learning to protect millions of businesses and individuals, Webroot secures the connected world. In 2019, Webroot and its parent company Carbonite were acquired by OpenText, a global leader in Enterprise Information Management. Together, …

Type: SMB Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

12 0 0 290
Pipl Pipl

Stop fake profiles at signup with easy-to-implement and affordable trust decisioning tools Pipl is the identity trust company. Our solutions allow organizations to provide frictionless customer experiences and approve more transactions with greater confidence and speed. We use multivariate linking to establish deep connections among more than 330 billion trust signals—email, mobile phone and social media data that spans the globe—and then look at the big picture to derive identity trust. Learn more at pipl.com. Identity Verification, Fraud Prevention, Identity Resolution, Business Intelligence, Contact Enrichment, Identity Trust, Digital Trust & Safety, Digital Trust Policy, Stopping Fake Profiles, and Trust at …

Type: SMB Activities: IT Services regtech Technologies: Data Analytics

10 0 10 93
ERCOM ERCOM

Société du groupe Thales, Ercom sécurise vos communications, données et terminaux. Ercom, a Thales company, is a reference company with 30 years of combined expertise in two key areas: cybersecurity and communication networks. Being a reference company means providing clients with cutting edge solutions for their industry, combining certified security and simplicity in order to accelerate end-user adoption over a large range of devices. Ercom presents : - Cryptosmart, the only “Restricted” French, EU & NATO certified solution, jointly developed with Samsung, to secure devices and end-to-end mobile communications (voice, SMS and data) on consumer smartphones and tablets. - Cryptobox, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

6 0 6 154
Trail of Bits Trail of Bits

Deepening the Science of Security Since 2012, Trail of Bits has been the premier place for security experts to boldly advance security and address technology’s newest and most challenging risks. software security, reverse engineering, cryptography, blockchain, osquery, machine learning, binary analysis, blockchain, and Application Security

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Blockchain/Cryptocurrency

5 0 1 98
Tessian Tessian

Cloud Email Security that intelligently prevents advanced email threats and protects against data loss Tessian was acquired by Proofpoint. View the press release: https://www.proofpoint.com/us/newsroom/press-releases/proofpoint-closes-acquisition-tessian. To see what’s new, visit https://www.linkedin.com/company/proofpoint/. Tessian is a leading cloud email security platform that intelligently protects organizations against advanced threats and data loss on email, while coaching people about security threats in-the-moment. Using machine learning and behavioral data science, Tessian automatically stops threats that evade legacy Secure Email Gateways, including advanced phishing attacks, business email compromise, accidental data loss and insider threats. Tessian’s intelligent approach not only strengthens email security but also builds smarter security …

Type: SMB Startup Activities: IT Services Technologies: A.I. - Machine Learning Cybersecurity A.I. Data Analytics

2 0 2 115
TaliwareTM TaliwareTM

The next wave of cardiac ECG biometrics is here, where the unique rhythm of your heart is your biometric password. The Biombeat, a Patent Award-winning biometric technology by Taliware delivers true touchless login and location-based authentication using the unique rhythm of your heart as password. internet of things, identity management, authentication, geolocation, wearables, and security

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity

1 0 1 5
Specter Solutions Specter Solutions

Secure Bitcoin Solutions ● 1 of 21 Most Influential Bitcoin Companies Of 2020 Secure Bitcoin Solutions ● 1 of 21 Most Influential Bitcoin Projects And Companies Of 2020 Specter Desktop emerged as the easiest way to use your own bitcoin wallets directly with Bitcoin Core in 2020. ● This enabled a much more private and sovereign method than using hosted applications. ● While also providing much easier set up and use than previous Electrum-based alternatives. Source Link: https://lnkd.in/dp3AsmX Source: Bitcoin Magazine -21 Most Influential Bitcoin Projects And Companies Of 2020 ● We are building Secure Bitcoin Solutions. Why Bitcoin-Only? Because …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

0 0 0 2
Spanugo Spanugo

Spanugo is a world-leading company providing Cybersecurity Posture Assurance for the enterprise hybrid cloud. It accomplishes this by automating all aspects of Risk, Cybersecurity and Compliance assurance, including automating resource discovery, configuration management, and security best practices. Spanugo provides a unified single pane of glass view with comprehensive fine-grained visibility for all resources spanning the on-premises data center infrastructure, such as VM’s and physical machines, network elements and applications along with multi-cloud based infrastructure resources such as AWS/Azure Cloud accounts and services, cloud virtual machines and cloud-native applications. Spanugo’s agent-less architecture enables friction-less deployment in the enterprise hybrid cloud with …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 0 3
SocialProof Security SocialProof Security

Defend against cyber criminals with engaging security awareness videos, training, talks, and pentesting. Defend against cyber criminals with engaging security awareness and social engineering prevention videos, training, talks and penetration testing.

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 2
SecurityWeek SecurityWeek

Leading Source of Cybersecurity News, Insights and Expert Analysis. Industry-leading events portfolio SecurityWeek helps cybersecurity professionals do their jobs better by providing timely news, information, analysis and insights from experts in the trenches. Created by industry professionals and a seasoned news team, SecurityWeek produces actionable content and a portfolio of industry-leading events to help cybersecurity professionals around the globe defend their organizations from increasingly complex cyber threats. (www.securityweek.com) cybersecurity, news, events, IT security, conferences, cyberdefense, and SCADA

Type: Startup Activities: IT Services Technologies: Cybersecurity

18 4 12 7
Red Goat Cyber Security LLP Red Goat Cyber Security LLP

Training, Crisis Exercises and Consultancy Services Red Goat Cyber Security provides cyber crisis exercises and consultancy services along with awareness training and insider threat program development for organisations around the world. social engineering, Cyber Security, Training, Keynote Speaker, Exercising, Wargaming, cyber crisis exercising, and cyber security training

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 0 2
RangeForce RangeForce

Empowering cyber readiness for teams. Achieve true cyber readiness with the leading blue team training for SOC teams. Assess, refine, and validate skills needed to defend your organization against current cybersecurity threats. Cyber Security, Security Attack, Defense & Incident Response, Threat Intelligence, Security Monitoring, Incident Response, Security Simulations, Skills Assessment & Development, datasecurity, cybersecurity, infosecurity, webapplicationsecurity, Cyber Training, SOC team training, Cyber range, blue team , cyber upskilling, and cyber readiness

Type: Startup Activities: Games IT Services Technologies: Cybersecurity

3 0 2 79
Protect4S (a SecurityBridge company) Protect4S (a SecurityBridge company)

SAP Security Automation and Continuous Protection | Now a part of SecurityBridge Protect4S has joined forces with SecurityBridge to provide greater SAP Security. Join us on our new journey by following SecurityBridge! https://www.linkedin.com/company/securitybridge/ ​ Press Release: https://securitybridge.com/press/securitybridge-and-protect4s-are-joining-forces/ ​ SecurityBridge Website: https://securitybridge.com/ Protect4S builds SAP Platform Security software that enables SAP customers to continuously improve their SAP cybersecurity through automation and simplicity of use. Our mission is to make our SAP cybersecurity solutions accessible and affordable to everyone because we want to make the world a bit safer. To achieve this, we work closely with SAP service partners around the world …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 3 2
Pindrop Pindrop

Security, Identity & Intelligence On Every Voice Pindrop® solutions are leading the way to the future of voice by establishing the standard for security, identity, and trust for every voice interaction. Pindrop solutions protect some of the biggest banks, insurers, and retailers in the world using patented technology that extracts an unrivaled amount of intelligence from every call encountered. Pindrop solutions help detect fraudsters and authenticate callers, reducing fraud and operational costs, while improving customer experience and protecting brand reputation. Pindrop solutions have been implemented in 8 of the top 10 US banks and 5 of the top 7 US …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 283
Oppidum Security Oppidum Security

[Automatic translation follows] Expert consultants and proven solutions for cybersecurity projects. As a historical security expert in Microsoft 365 and Azure environments, we have noticed that the majority of attacks come from email. This is why we have developed particular expertise in email security, with particular attention paid to the implementation and maintenance of DMARC, as well as the development of our own innovative solutions. We also pride ourselves on protecting our clients' brands by neutralizing similar domain names, preventing spoofing or branding attacks. We are able to detect and neutralize fraudulent domains before hackers can use them to launch …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 2
EVERTRUST EVERTRUST

We manage your certificates wisely! Managing manually thousands of certificates is time consuming and without added value, moreover it is prone to errors. This is why we have designed two software programs to solve your different problems: Horizon and OCSP. The Horizon governance platform helps to avoid these operational risks. By using our tools, it will be possible to monitor non-compliance and future expirations as well as to gain responsiveness in the event of an incident or compromise. This platform makes it possible to centralize, automate and secure the certificate life cycle (enrollment, renewal, revocation, recovery) independently of the PKI …

Type: Startup Activities: IT Services Technologies: SaaS Cybersecurity

5 0 4 32
Nybble Security Nybble Security

The world's first Threat Bounty platform. Nybble provides an alert triage and incident management service thanks to the world’s first qualified analyst network. Clients, let our analysts categorize and answer your security alerts. Raise your defense level by engaging a Threat Bounty campaign. Get an immediate ROI on your detection platform. You’re an analyst or a hunter? Join our Blue Team community and get rewarded for your skills and hard work.

Type: Startup Activities: IT Services Technologies: Cybersecurity

13 2 8 5
GEOIDE Crypto&Com GEOIDE Crypto&Com

[Automatic translation follows] Designer of hypervision and cybersecurity solutions. Creator of products proven in armies, NATO and major accounts, GEOIDE Crypto&Com seeks to revolutionize the management of connected cities by providing innovative solutions ensuring both cybersecurity, optimized management and security in cities. The combined use of innovative technologies and highly secure GEOIDE solutions makes it possible to leverage the data essential for making the most critical decisions. SMART CITY GEOIDE develops tools to optimize the management of the urban environment. A true control center, our hypervisor makes it possible to optimize the effectiveness of public action and facilitate exchanges, while …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 12
Novidy's Novidy's

[Automatic translation follows] CS in Cybersecurity is an integrator specializing in Cybersecurity solutions, services and IT transformation. Novidy’s, the integration subsidiary of the Novidy’s Group, was founded in 2009. Specializing in the network and security market, it operates in the following areas of expertise: - Consulting and audit - Integration / support for latest generation security solutions - Social Security Services on security architectures Our specificity lies in our responsiveness, our ability to adapt to the customer context and to make the link between functional aspects and technical aspects thanks to a pool of experts. An element of distinction which …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 4 140
Ambionics Security Ambionics Security

By using an offensive attacker’s point of view, Ambionics Security has created an efficient and realistic approach which oversteps the limits of classical manual or automated assessment. Through the combination of its powerful technical platform and its team of experts in breach tactics, Ambionics Security provides to companies an innovative solution for continuous web application security assessment. Detecting, assessing and exploiting the real weaknesses of your web applications is the core of Ambionics Security. Our goal is to keep you one step ahead of cyber threats. Web Application Security and Offensive Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 6
Unicorn Security Unicorn Security

Helping companies of all sizes to thrive by protecting them against cyberattacks We help companies of all sizes to thrive by protecting their information system against future cyber-attacks. We offer different formats of IT security audits in order to adapt to the complexity of the system audited and the scope of the security checks needed. Contact us and make sure that your company network, website, application or IoT product is complying with all security standards!

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

2 0 2 7
v6Protect v6Protect

Analyze I Fix I Protect your web applications - SaaS v6Protect - Web Application Security v6Protect revolutionizes vulnerability monitoring and protection of Internet-exposed applications. Get powerful, intuitive, and automated solutions to secure your applications in a timely manner. The solution manages daily priorities: ✔️ Attack surface monitoring ✔️ Vulnerabilities management ✔️ Prioritization and vulnerabilities remediation plan ✔️ Compliance improvement ✔️ Web applications protection How it works ❓ Scoring View your Security Score daily, your vulnerabilities and simply track your risk. Easily define your priorities, get the key indicators. Alerting Stay informed daily about Zero Day vulnerabilities, receive targeted alerts of …

Type: Startup Activities: IT Services Technologies: Cybersecurity

11 2 10 13
Purplemet - Web Applications Attack Surface Management & Security Monitoring Purplemet - Web Applications Attack Surface Management & Security Monitoring

Follow your web application security exposure over time. Focus on key weaknesses and cybersecurity metrics. Purplemet is One-of-a-kind Web Application Security Monitoring SaaS solution focused on what hackers may see and exploit. It’s complementary to scanners enabling cyber hygiene on a URL portfolio while providing an additional list of vulnerabilities and technologies that makes Purplemet the fastest, most cost-effective, and the non-intrusive benchmark solution for web app security. Use Cases: • Closes gap on uncovered Web Applications that are out of scope for Web App vulnerabilty scans • Covers “blind period” on infrequently scanned web apps • Allows customers without …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 4
Pragma Security Pragma Security

[Automatic translation follows] Your managed cybersecurity partner in France French specialist in managed cybersecurity, Pragma Security offers flexible and scalable cloud protection to media, websites, e-commerce and other web applications. With a network of more than 1Tbit/s, Pragma Security adapts to different needs from 1Gbit/s. DDoS, Peering, BGP routing, Cybersecurity, Cyber ​​Security, DNS Protection, WAF, Web Application Firewall, and Web Firewall

Type: Startup Activities: IT Services e-commerce Technologies: Cybersecurity

0 0 0 2
Malizen Malizen

The all-in-one platform to accelerate your cybersecurity operations. Data visualization to better explore and understand complex cybersecurity data. Machine learning algorithms to support and multiply the capacities of teams. A full visual environment to boost your cybersecurity teams. Dataviz, Deeptech, Cybersecurity, Cyberinvestigation, Start up, Frenchtech, Threat Hunting, SOC, and CERT

Type: Startup Activities: deeptech IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity Data Analytics

25 5 22 7
Ravel Technologies Ravel Technologies

[Automatic translation follows] . .

Type: Startup Activities: IT Services

0 0 0 10
Belgian Cyber Security Coalition Belgian Cyber Security Coalition

Promotes a vibrant and robust cybersecurity ecosystem in Belgium by bringing together experts across sectors The Cyber Security Coalition is a unique partnership between players from the academic world, the public authorities and the private sector to join forces in the fight against cybercrime. Currently more than 170 key players from across these 3 sectors are active members. Our mission is to bolster Belgium’s cyber security resilience by building a strong cyber security ecosystem at national level. We do so by bringing together the skills and expertise of the academic world, the private sector and public authorities on a trust-based …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

15 2 14 32
Malware Patrol Malware Patrol

Since 2005, we've provided actionable threat intelligence to prevent, detect and respond to cyber attacks. Malware Patrol has provided cyber threat intelligence since 2005. Enterprises and members of our community in more than 175 countries use our up-to-the-minute data for threat research and hunting, incident response, and network protection. Our machine readable feeds are available in predefined and customized formats, compatible with the most popular security systems, including: Cisco ASA, Fortinet FortiGate Firewall, Palo Alto Firewall, Mikrotik, MISP, pfSense, Squid, among others Protect your company from unwanted cyber attacks. For a FREE evaluation of our data feeds, send us a …

Type: SMB Activities: IT Services Technologies: Cybersecurity

3 0 1 8
Alert Logic Alert Logic

Cybersecurity made easy with MDR, XDR, and Managed WAF solutions. Alert Logic is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Achieve comprehensive security coverage with managed detection and response (MDR), extended detection and response (XDR) and managed web application firewall (WAF) solutions for public cloud, hybrid, and on-premises environments. Security-as-a-Service, Vulnerability Assessment, Intrusion Detection, Threat Management, Log Management, Compliance, Web Application Security, 24x7 Security Research and Operations, SaaS, Cloud Security, MDR, Managed Detection and Response, Web Application Firewall, Cybersecurity, WAF, and XDR

Type: SMB Activities: IT Services Technologies: Cybersecurity

15 2 6 271
I-TRACING I-TRACING

CYBERSECURITY SERVICES I-TRACING, pure player and cybersecurity service provider leader in France, supports over 400 clients around the world in managing their cyber risks, from anticipating threats to maintain the highest level of security for their systems and assets, to the ability to respond in case of attacks to minimize consequences. I-TRACING generated a revenue of 90 million euros in 2022 and has 450 employees in France, as well as in London, Hong Kong, and Montreal. Through a broad range of cybersecurity services, from consulting to integration to managed services, SOC, and CERT, I-TRACING brings together all the technical expertise …

Type: SMB Activities: privacytech IT Services Technologies: Cybersecurity

9 1 9 510
Intezer Intezer

Leave the SOC grunt work to technology. Keep noise, false positives, and alerts from overwhelming your security team. Leave the SOC grunt work to Intezer. Automatically triage alerts 24/7, respond faster, and cut out noise & false positives. Try free: analyze.intezer.com Malware Analysis, Threat Detection, Incident Response, Cybersecurity, Malware Classification, Threat Hunting, DFIR, Memory Forensics, Digital Forensics, Reverse Engineering, Security Operations, Memory Analysis, Attribution, Threat Research, Threat Intelligence, YARA, Disk Image Forensics, File Scanning, URL Scanning, Sandboxing, Attribution, Memory Dump Scanning, Alert Triage, and SOC Automation

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 43
Hacker House Hacker House

All computers are Broken. Let us show you how to secure them. Hacker House is the global portal for skills training, security services, cyber arms, and defense products. We train individuals and organizations to be self-sufficient in all things cyber security. Hacker House is a team of computer hackers seeking innovation within the information security industry. Hacker House provides offensive security solutions so you can understand the real-world risks that impact on your business. Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied. Hacker House's …

Type: Startup Activities: edtech Technologies: Cybersecurity

0 0 0 10
Nucleaus Nucleaus

NucleausTM is an application security platform that continuously monitors your code repositories #SAST #spellcheckforcode NucleausTM continuously monitors your code repositories and reports back vulnerabilities and dependencies before that code causes risks. Offering a consistent platform process with minimal learning curve, simple to use interface, remediation strategy reports and NIST conformance status, NucleausTM enables transparency and risk management to code repositories. Security as a Service, Application Security Programs, Application Security Testing, Application Security, and Web Application Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 10
Global-e Datacenter BV Global-e Datacenter BV

An optimally equipped, sustainable and secure colocation for your ICT servers? Global-e Datacenter BV is a modern carrier-neutral datacenter located in the south of the Netherlands (Rijen). Your data is safely stored in our datacenters. We are centrally located to the cities of Rotterdam, Antwerp and Eindhoven. We focus on high availability, reliability and security. Our state of the art datacenters meet all high standards. If you choose to connect to Global-e Datacenter, you will have a direct connection between your office, our datacenter, the Internet and the cloud. Through the network of Global-e Datacenter you have quick access to …

Type: Startup Activities: IT Services telecommunications Technologies: Cybersecurity

3 0 1 5
Fidesmo Fidesmo

Bringing security to the ever-growing world of contactless transactions. Fidesmo brings security to the ever-growing world of contactless transactions. We unite service providers and device manufacturers in a single, secure and scalable NFC platform on a global scale – opening up a world of opportunities to the untapped potential of contactless transactions. Fidesmo is a Swedish tech company founded in 2013, with headquarters in Stockholm and R&D offices in Madrid. Read more at fidesmo.com. Near Field Communications, Trusted Service Manager, Mobile security, SmartCard applications management, Mifare For Mobile, Wearable payments, Tokenization, Digital Wallets, Access Credenitals, and Mobile Access Credentials

Type: Startup Activities: fintech Technologies: NFC Wireless

4 0 4 26
Cytomic Cytomic

Unit of Panda Security for Greater Understanding Cytomic is the business unit of Panda Security specialized in the largest enterprises, with the most advanced cybersecurity solutions and services: EDR, EPP, Threat Hunting, Investigation Service, Deep Learning and Behavior Certification for endpoints, processes and users. Because a system is much more than the sum of its parts. In order to perceive reality, we must pay attention to the bonds. Not a single process exists separately from the rest. Everything is related. We managed to see and understand all those bonds Only then are we able to think ahead of everyone else …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Deep Learning Cybersecurity

0 0 0 10
Hive Systems Hive Systems

Hive Systems provides smarter cybersecurity solutions with our trusted experts Hive Systems is a state-of-the-art cybersecurity company. We specialize in tailored solutions that unify risk assessments, IT, security awareness, and cybersecurity operations for businesses of all sizes. Our team has distinguished cybersecurity expertise in a vast array of industries including the public, private, and military sectors. Hive Systems is under the leadership of some of the brightest minds in cybersecurity and business as part of our executive team and advisory council. Alex Nette, our CEO and Co-founder, has a deep passion for cybersecurity and the role it plays in today’s …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 10
Authy Authy

Simple & secure two-factor authentication via mobile & desktop app that's free to users. Authy's 2FA API is by Twilio. Authy provides strong authentication for the connected world, protecting people and the enterprise against malicious attacks. Our two-factor authentication (2FA) security solution enables organizations to minimize risk while enhancing the user experience. Authy 2FA provides a fast-to-implement, highly scalable and proven 99.999 % reliable alternative to passwords. Used by 11,000+ websites serving 2 million consumers worldwide, it's designed to give users the ability to self-service or easily manage their own 2FA experience. Coinbase, CloudFlare, Humble Bundle and Twitch.tv are just …

Type: Startup Activities: IT Services Technologies: Cybersecurity

9 0 4 4
SheeldS (Formerly Arilou Automotive Cybersecurity) SheeldS (Formerly Arilou Automotive Cybersecurity)

Pioneers automotive cybersecurity, SheeldS is providing the premier solution for the heavy commercial fleet industry. SheeldS (formerly Arilou), an automotive cybersecurity pioneer, has developed multi patent technology, with award-winning products. SheeldS offers the first cloud-based cyber security solution built specifically for heavy commercial and bus fleets management specifications. Based on the experience and deep industry knowledge of the team, SheeldS has both the vision and the technology to provide the best platform for protecting commercial vehicles from cyberthreats The team is led by Israeli cyber defense forces veterans and highly experienced automotive software professionals. Cyber Security, Automotive Security, Industrial Control …

Type: Startup Activities: IT Services transporttech Technologies: Cybersecurity IoT

1 1 1 8
Argus Cyber Security Ltd. Argus Cyber Security Ltd.

Shifting gears in automotive cyber security. Argus, a global leader in automotive cyber security, provides DevSecOps, vehicle security and fleet protection technologies and services for automakers and their suppliers. Our solutions ensure that vehicle components, networks and fleets are secured and compliant throughout their life cycle. Argus’ innovative methods and solutions are based on decades of cyber security and automotive research and have culminated in over 100 granted and pending patents. Founded in 2014, Argus is headquartered in Israel, with offices in USA, Germany, France, Japan, and Korea. Cyber Security, Automotive, Penetration Testing, connected vehicles, smart mobility, UNR 155, electric …

Type: Startup Activities: IT Services transporttech Technologies: Cybersecurity Embedded Systems IoT

14 1 12 213
7 Minute Security 7 Minute Security

7 Minute Security, LLC is a Minneapolis-based information security consulting company focusing on: * Security assessments * Vulnerability scanning * Penetration testing * Training 7 Minute Security also offers a weekly podcast at https://7ms.us, covering information security topics such as pentesting, networking, virtualization and career advice. Security assessments, Vulnerability scanning, Penetration testing, Training, and Public speaking

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 2
Amn Brains Amn Brains

[Automatic translation follows] Software suite to manage cybersecurity with rigor, in a fine-grained manner and focused on the logic of the attacker Are you a cybersecurity auditor...and you want to speed up the writing of your compliance audit reports? Amn Auditor software allows you to write the majority of your audit report during your audit interviews. Concretely, ... you take notes on the software, ... you get help from auto-completion/suggestion, ...based on keywords ...and then at the exit, in two clicks, ... you generate your report, ...in different formats, ... with your graphic charter, or that of your client. Interested …

Type: Startup Activities: IT Services Technologies: SaaS

1 1 0 1
Root-Me Pro Root-Me Pro

The reference platform for ethical cybersecurity training Root-Me Pro is the Professional version of the well-known cybersecurity learning platform Root-Me. Completely dedicated to professionals, it allows schools and companies to access virtual environments in order to: -Prepare and train beginners and experts to the various disciplines within the field of cybersecurity (ethical hacking, forensic, web security, network security, system security, cryptography, ...). -Test and challenge your teams by organizing fun and interactive cybersecurity events, like Capture The Flag (CTF). Thanks to the contributions of Root-Me members and Root-Me PRO's teams, our environments offer the greatest quality, quantity and variety of …

Type: Startup Activities: IT Services edtech Technologies: Cybersecurity SaaS

12 1 11 38
DSecBypass DSecBypass

Company specialized in information security. We offer pentesting services and develop Exaface. DSecBypass is an IT security company based in Lyon. We offer penetration testing and post-mortem audits. We are also developing Exaface: a SaaS tool for External Attack Surface Management. Cybersécurité, Pentest, Audit, OSINT, Informatique, and Conseil

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 2 1 4
SKILLX SKILLX

[Automatic translation follows] Boosting the transformation of Information Systems In October 2018, SkillX was created in the heart of Hauts-de-France. Our objective is clear: to ensure security and accelerate the transition of our clients' information systems to the Cloud. Guided by a so-called liberated approach, based on the trust and responsibility of our SkillXmates, our team of passionate experts puts its know-how at the service of our clients. Our skills extend in particular to the following areas: - 🔒 Cybersecurity - ☁️ Cloud At SkillX, opportunities abound! Whether you want to join our ranks or collaborate with our experts, do …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 1 2 12
CHACK - Protection informatique CHACK - Protection informatique

[Automatic translation follows] Cybersecurity solutions, services and training for SMEs/ETIs Chack is a service company offering IT security support solutions through time-sharing or à la carte CISO time, security audits, intrusion tests (pentest), training, development business recovery plans, support and management for GDPR compliance as well as cyber tools (EDR, XDR, SIEM, SOC, SOAR) in managed service.

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 1 1
ARC Data Shield ARC Data Shield

[Automatic translation follows] Controlled data exchange IT & Network Cybersecurity Appliances OT OT, Networks, Cybersecurity, Appliances, and IS Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 3 5 4
Sekost Sekost

Your customers' cyber diagnostics Sekost offers companies an initial cybersecurity diagnostic to assess their situation, identify problems and make rapid progress. Audit de cybersécurité

Type: Startup Activities: IT Services Technologies: Cybersecurity

12 4 1 3
BZHunt BZHunt

[Automatic translation follows] Ethical #hacking for your security Eat🟢Sleep🟢Hack🟢Repeat🟢 The first French company to participate in hacking live events (Bug Bounty), BZHunt pushes the limits to defend and promote the culture of ethical hacking in France and around the world. Far from the Hollywood cliché, our ethical hackers have turned their passion into a profession with the aim of capitalizing on their research and development work to support the security of businesses. Our values ​​: #TryHarder Leave our comfort zone and develop BZHunt's technical track record, thus attesting to cutting-edge know-how. #SharingIsCaring Actively contribute to the cyber community by sharing …

Type: Startup Activities: IT Services Technologies: Cybersecurity

18 7 3 12
PIIRATES PIIRATES

[Automatic translation follows] Ethical Hacking The PIIRATES company relies on a community of experienced Ethical Hackers to allow organizations to test the robustness of their information systems in the face of the risks of computer hacking. We specialize in pentesting (computer intrusion testing) on ​​different IT targets: • Infrastructure & network, • Web platforms and mobile applications, • Social engineering, • Wireless, Goals : • Evaluate the security level of an organization’s information system • Check the implementation of usual good practices (compartmentalization, protection of administrators, etc.) • Identify and exploit possible vulnerabilities • Propose appropriate and prioritized corrective measures …

Type: Startup Activities: IT Services Technologies: Cybersecurity

5 3 4 2
Zygon Zygon

Offboard any user from every account. Even the accounts you don’t know about Get your SaaS stack under control. Sign up at www.zygon.tech

Type: Startup Activities: IT Services Technologies: Cybersecurity SaaS

4 2 2 7
GTXSERV S.A.S. GTXSERV S.A.S.

[Automatic translation follows] The sovereign cloud par excellence! Cloud, Web, Telecom and security solutions... GTXSERV offers a wide range of solutions for managing your IT. Security, Web, and DAAS

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 3
CybSec CybSec

[Automatic translation follows] French Threat Intelligence, Investigation and Analysis Agency specializing in Cyber ​​Risk Intelligence. First French Threat Intelligence, Investigation and Analysis Agency specializing in Cyber ​​Risk Intelligence. Targeted CTI provider. Specialist in Cyber ​​Intelligence and CyberProfiling. #infosec #ThreatIntel #cybersecurity A non-profit association, CybSec TIA is made up of experts in Cyber ​​Threat Intelligence. https://www.reddit.com/r/CybSecTIA/ | https://twitter.com/CybsecTIA Cyber ​​Threat Intelligence, Cyber ​​Risk, Cybersecurity, CyberProfiling, Threat Intelligence, and Cyber ​​Psychology

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
Arab Security Conference Arab Security Conference

Arab Security Conference is an annual International Cybersecurity conference. OUR EVENT: ------------- Arab Security Conference was founded in 2017 to raise awareness about Cybersecurity in the Arab world. Since that time, it has annually brought together leaders from industry, government, academics & security researchers. VISION: ------- To create secure societies. MISSION: --------- - Keep you up-to-date with security solutions and threats - Enrich your security awareness through technical discussions - Sharpen your skills through our War Game competition - Improve networking by connecting security professionals & organizations The Conference Features: -------------------------- - Keynote speakers, sessions & technical workshops that dive …

Type: Event NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 4
Lookout Lookout

We are a data-centric cloud security company, purpose-built for the intersection of enterprise and personal data. Lookout, Inc. is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack. Data is at the core of every organization, and our approach to cybersecurity is designed to protect that data within today’s evolving threat landscape no matter where or how it moves. People — and human behavior — are central to the challenge of protecting data, which is why organizations need total visibility into threats in real time. The Lookout Cloud Security …

Type: Large company Activities: IT Services privacytech Technologies: Cybersecurity

19 3 11 755
DataEndure DataEndure

Helping organizations attain & maintain cyber resilience to survive and thrive in an ever-changing threat landscape. DataEndure helps companies build and maintain cyber resilience in an ever-evolving threat landscape, without draining IT resources and budget. We provide intelligent, leading-edge, and cost-effective IT solutions that help you not only survive but thrive in the face of attacks, failures or disruptions. Our horse in the race is not a specific technology, but our clients’ success – so we aren’t hindered by the limits of a particular toolset or method. This gives us the freedom to recommend and deploy what we truly believe …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 2 47
Team Cymru Team Cymru

Mission: To Save & Improve Human Lives Since 2005, Team Cymru’s mission has been to save and improve human lives by working with public and private sector analyst teams around the world, enabling them to track and take down bad actors of all kinds. The company delivers comprehensive visibility into global cyber threat activity and is a key source of intelligence for many cyber security and threat intelligence vendors. Its Community Services division provides no-cost threat detection, DDoS mitigation and threat intelligence to network operators, hosting providers and more than 143 CSIRT teams across 86+ countries. Enterprise security teams rely …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 1 0 129
Core Security Core Security

Leading-edge cyber threat prevention and identity governance solutions to help prevent, detect, test, and monitor risk. Core Security is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra's Core Security delivers market-leading, threat-aware, vulnerability, identity and access management solutions that provide the actionable intelligence and context needed to manage security risks across the enterprise. penetration testing, security intelligence, software solutions, vulnerability research, threat expertise, threat modeling, identity governance, privileged access management, and identity and access management

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 0 0 111
CLUSIR PACA - Région SUD CLUSIR PACA - Région SUD

[Automatic translation follows] Clusir Paca is the association dedicated to information and systems security in the SOUTH Region Employees, customers, partners, administrations, everyone is concerned and everyone can become a security player and thus contribute to the safeguarding of information assets. Based on this observation, the Provence Alpes Côte d'Azur Region Information Security Club (CLUSIR PACA)'s main mission is to disseminate good practices in Computer Security in companies, administrations, schools and associations. , both in terms of use and operation. Attached to the French Information Security Club (CLUSIF), CLUSIR PACA, created more than 20 years ago, aims to be the …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

2 1 1 3
CLUSIR Nord de France CLUSIR Nord de France

[Automatic translation follows] CLUB FOR REFLECTIONS AND EXCHANGES ON GOOD PRACTICES FOR IMPROVING BUSINESS SECURITY in HAUTS-DE-FRANCE CLUSIR Nord de France is a club for reflection, exchanges on good practices, awareness-raising, meetings and contributions to the improvement of digital security. To keep in touch : - Website: https://www.clusir-ndf.fr/ - Twitter: https://twitter.com/ClusirNdf - Youtube: https://www.youtube.com/channel/UCSl0HqWoPqXaWthn7yh6QwA

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

6 3 3 1
NET FREED NET FREED

[Automatic translation follows] Master your cybersecurity Net Freed is a cybersecurity consulting and expertise firm that has been supporting companies of all sizes since 2017. We believe that cybersecurity relies on the combination of cutting-edge technologies, proven processes, and personnel aware of the risks. To counter the lack of visibility in the face of these threats, we offer an adapted and proportionate approach, to give you the keys to your cybersecurity solution, with an informed vision of your digital environment. Blockchain, Information Systems and Network Security, Digital Transformation, Cybersecurity, Networks, CISO, SOC, IAM, and Audit

Type: SMB Activities: IT Services Technologies: Blockchain/Cryptocurrency Cybersecurity

1 0 1 7
CyVaultTM CyVaultTM

Protect | Engage | Defend CyVaultTM has emerged as a global, cyber defense leader offering the most advanced comprehensive protection for companies and organizations of any industry and size. Our innovation, at “CyVaultTM | Labs”, focuses on Critical Infrastructure (OT / ICS), Information Technology (IT), Internet of Things (xIoT) and the Cloud, safeguarding against existing and emerging threats, leveraging its advanced battle-tested cyber defense models Our platform “CyVaultTM | DOME” enhances your digital presence with an innovative Automated Cyber-Defensive Ecosystem, supported by an expert-managed real-time threat protection, detection and response, 24/7/365.

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT Sensors

3 2 1 8
MedStack MedStack

The Go-To Compliance Platform for Digital Health Built specifically for the needs of the healthcare industry, MedStack makes it easy for application innovators to build, launch and scale compliant applications that automatically meet the requirements of today's healthcare enterprise systems. We are the only solution that combines the power of a platform with built-in security and provable compliance, so you can confidently provide the assurance needed to sell your digital health application. Trusted by hundreds of digital health companies and validated by major healthcare systems across North America, MedStack is emerging as the de facto standard for delivering the highest …

Type: Startup Activities: privacytech healthtech Technologies: Cybersecurity

13 4 10 21
GREYCORTEX GREYCORTEX

Security for Professionals GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable. GREYCORTEX Mendel is a network detection and response tool that combines advanced artificial intelligence, machine learning, and data mining methods with unique network visibility to visualize network communication, detect risks and threats, and respond quickly and effectively to threats from misconfigurations, performance problems, or policy violations, as well as new advanced threats and hacker activities that are able to bypass existing security tools. Network Security, Network Visibility, Network Traffic Analysis, Artificial Intelligence, Machine Learning, Data Analytics, …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity Data Analytics

3 1 1 34
FortifyData FortifyData

Comprehensive platform for continuous threat exposure management (CTEM). The FortifyData platform enables Enterprises to identify and manage their risk exposure across their entire attack surface – This includes external, internal, cloud configuration, and also third party risks. This information is then published as a Security Rating, translated into Cyber Risk Quantification and can further be customized with configurable risk models driving the most insightful cybersecurity risk indications on any company. Information Security Consulting, Security Policy Development, Application Security Consulting, Information Security Assessments, Vulnerability Assessments, Risk Assessments, Security Design and Architecture, IT Security Audits, cybersecurity, vendor assessment, Cyber Risk scoring, Vendor …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 4 19
Keepnet Labs Keepnet Labs

Keepnet is a SaaS platform that continuously protects businesses of any size from threats targeting the human factor! Our Vision: At Keepnet Labs, we see the future of cybersecurity differently. For us, the human element is at the core of every digital fortress. We are dedicated to crafting a cybersecurity environment that interweaves cutting-edge technology, the principles of behavioral psychology, and nudge theory. Our goal? To empower businesses and individuals, arming them with a consolidated platform to fight against ever-evolving cyber threats. Through collaboration, advanced technology integration, and measurable outcomes, we aim to create a secure and resilient digital ecosystem …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 3 43
Smarter Contracts Smarter Contracts

The power of trust Smarter Contracts is a FinTech that has designed, built and developed its own patent pending platform - Pulse. Pulse provides individuals with greater control over their data and rights and businesses with transparency over how they service the data they under their custodianship. blockchain, smart contracts, digital transformation, strategy consulting, retail banking, investment banking, design, service design, heathcare, and consentmanagement

Type: Startup Activities: fintech IT Services Technologies: Blockchain/Cryptocurrency

11 0 11 23
Seguru Seguru

Our mission is to provide everyone with a safer digital experience. Founded by experienced cybersecurity experts in response to increasing online threats against consumers. Your private information is out in the open, prey for anyone with a mind to get their hands on it; a virtual sheep in a world of wolves. You’re smart. You know protecting it is of vital importance. Data security is about more than simply keeping an unwelcome hand off of your private information; it’s about knowing where your data is traveling, and having the power to do something about it. Seguru is the vessel with …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 1 1
Cryptium Labs Cryptium Labs

Swiss-made Security-Oriented Staking Services Cryptium Labs offers secure and highly available digital signatures for Proof-of-Stake networks, such as Tezos, Cøsmos, and Polkadot from the Swiss Alps We publish educational, research-oriented, and data-driven analysis on Blockchain and all the disciplines the underlying technology requires, such as Cryptography, Computer Science, Hardware, or Security. We also wish to bring down the barriers to entry for people who struggle with technical jargon by writing easy-to-read and highly comprehensive content, suitable for audience with diverse backgrounds. Our aim is to make it as simple and secure as possible for all the stakeholders to participate and …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

2 0 1 1
Anomalix Anomalix

Next Generation Identity and Security Management Anomalix is a Gartner-recognized solutions and services company for Identity and Access Management. Anomalix provides Identity driven zero-trust security solutions that protect consumers, businesses and governments. Identity Management, Security Analytics, Information Security, IAG, Cloud Security, Third Party Risk Management, Audit & Compliance, Business Agility, and Identity Analytics

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity

0 0 0 8
FROGI SECURE FROGI SECURE

[Automatic translation follows] For more than 12 years, Frogi Secure has proven to be one of the French leaders in web access security. The Internet is everywhere today. But how can you be sure that children don't connect to sites that aren't for them? how to ensure that your employees do not log on all day for private reasons?... studies prove that employees waste 1 hour per day looking at personal sites at their workplace.. This is why Frogi-Secure has developed an internet filtering box, very easy to use, plug & play, and customizable. Our main clients are National Education, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 2 5
SKEYECODE SKEYECODE

Security technology for financial institutions, fintech companies and blockchains.

Type: Startup Activities: IT Services fintech Technologies: Blockchain/Cryptocurrency

1 1 0 0
Avant de Cliquer Avant de Cliquer

[Automatic translation follows] Human at the heart of cybersecurity, for a drastic reduction in the risk of cyberattack. 80% of cyberattacks originate from a click on a fraudulent email. It is therefore essential to increase the skills of users. Avant de Cliquer allows CIOs, CISOs, DPOs and managers to divide the risk of cyberattacks by 10. Beyond the development of a global cybersecurity culture, this program helps protect organizations while complying with article 32 of the GDPR which requires the implementation of organizational measures to protect personal data. Program composed of 3 tools: - Vulnerability audit: in a real situation …

Type: Startup Activities: IT Services Technologies: Cybersecurity

31 4 27 49
Beware Cyberlabs Beware Cyberlabs

Si Vis Cyber Pacem Para Cyber Bellum Cyber Range, Traffic Simulator, Cyber Deception Solution, Cyber Training cyber training, cyber range, traffic simulator, and cyber deception

Type: Startup Activities: IT Services

0 0 0 2
Kaizen Advisory Kaizen Advisory

. #infosec, #cybersecurity, #ddos, #phishing, #DFIR, managed services, GDPR, innovation, and consulting

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

0 0 0 3
Ziwit Ziwit

Our Expertise: Cyber Security Looking for services & solutions to secure your organization and your web applications? Discover our 4 areas of expertise to easily protect you 365 days a year. - Training & awareness programs : Ziwit Academy’s educational team trains and brings awareness to your infosec teams. - Audits & Consultancy services : Ziwit Consultancy Services’ experts team audits your systems and support you to ensure compliance with PCI DSS, ISO & GDPR. - SSL Certificates : rely on Trustsign by Ziwit, the first French SSL certification Authority dedicated to resellers. - SaaS Cybersecurity Solutions: the 4 automated …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

22 1 26 30
GATEWATCHER GATEWATCHER

Highlight cyber threats before they darken your business European leader in intrusion detection and advanced threat detection, Gatewatcher has been protecting the critical networks of large companies as well as public institutions since 2015. Its model combines multiple technologies with A.I. to provide consistent, optimal protection and meet the current and future cybersecurity challenges of organizations. cybersecurity, sécurité informatique, cyberdéfense, cyberdefense, cyberattacks, IT, advanced persistent threats, networks security, exploits, malware, intrusion detection system, threat protection, IDS, APT, Trackwatch technology, NDR, CTI, Threat hunting, and Threat forensics

Tags: FrenchTech2030 Type: Startup Activities: IT Services Technologies: Cybersecurity

48 12 38 120
STid STid

Smarter Security Answers STid is one of the leading developers of contactless identification solutions using RFID, NFC and Bluetooth® technologies, and the Internet of Things (IoT). For over 20 years, we have been inventing smart solutions designed to secure access and provide traceability for assets in testing environments such as the aeronautical, energy or defense sectors. As experts in our field, we are constantly striving for excellence, giving us an unrivalled command of cutting-edge technologies to safeguard digital identity. We give companies, industries and governments the means to identify, protect and supervise their assets to make their daily operations easier …

Type: SMB Activities: IT Services Technologies: Wireless IoT NFC

20 3 17 162
Hermitage Solutions Hermitage Solutions

[Automatic translation follows] IT, network and infrastructure security solutions and services Hermitage Solutions is a value-added distributor specializing in IT infrastructure, networking and security solutions. Hermitage Solutions markets its offer throughout France via a network of +500 Reseller/Integrator partners. Since its creation in 2002, Hermitage Solutions has distributed solutions from IT publishers and manufacturers with high innovative content, intended for companies and organizations of all sizes, to help them meet today's technological challenges in the field of IT: information system security, hyper-convergence of infrastructures, SDN, mobility, cloud computing, etc. The Hermitage Solutions portfolio makes it possible to address the following …

Type: SMB Activities: IT Services Technologies: Cybersecurity

7 0 7 30
KIWI BACKUP KIWI BACKUP

[Automatic translation follows] Backup intelligence Kiwi Backup is one of the pioneers of outsourced backup. In 2003, when it was created, there was no question of Cloud yet... and yet, that's already what we were doing. Secure company data by saving it in redundant Data Centers spread across France. Today, this philosophy has not changed and we continue to ensure that backing up your data is not a constraint, but almost a pleasure! Our leitmotif: to make life easier for system administrators, whether they are IT resellers or CIOs. Only our catalog of solutions has grown, with the appearance over …

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 2 1 9
Cybermalveillance.gouv.fr Cybermalveillance.gouv.fr

[Automatic translation follows] National system for assisting victims of cybercrime and raising awareness of digital risks. Official page of the national system for assisting victims of cybermalveillance, raising awareness of digital risks and observing the threat in France - Cybermalveillance.gouv.fr. Cybermalveillance.gouv.fr is a government program in public-private partnership managed by the GIP ACYMA (Public interest group "action against cybermalveillance"). Its mission is to prevent and help the French population in matters of digital security. Its audiences are individuals, VSEs/SMEs and local authorities. Also follow us on Twitter and Facebook: @cybervictimes Cybercrime, Cybercrime, Cybersecurity, Information, Assistance, Cybervictim, Awareness, Prevention, Digital Risk, …

Type: Public

39 27 18 40
CyberTaskForce CyberTaskForce

[Automatic translation follows] High Level Group on Cyberspace Security Challenges. Private initiative financed by French cyber SMEs. CyberTaskForce is a private sector initiative. This is an operational workforce that projects in France and Europe to support the digital transformation of society. This work force is an agile tool for mobilizing high-level decision-makers and involving those who have not yet integrated new threats. It makes it possible to strengthen operational and productive dialogue between public and private actors, all impacted by cyber. The work program is not designed as a discussion platform, an information cycle or a forward-looking think tank. It …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

54 5 49 6
Luxembourg House of Cybersecurity Luxembourg House of Cybersecurity

Luxembourg House of Cybersecurity - LHC is the backbone of leading-edge cyber resilience in Luxembourg. Luxembourg House of Cybersecurity - LHC is the backbone of leading-edge cyber resilience in Luxembourg. LHC aims at capitalising on and further developing collaboration, innovation, competencies and capacity building. www.lhc.lu www.nc3.lu www.circl.lu www.cybersecurity.lu cybersecurity, CERT, InfoSec, Training, and IT

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

17 9 7 26
Alertra Alertra

Established April, 2000, Alertra has become a leading provider of Internet server monitoring and alerting services. Our U.S. headquarters is located in the historic W.E. Going (Town Center) building in downtown Stillwater, Oklahoma. Stillwater is 50 miles northeast of Oklahoma City and is the home of Oklahoma State University. Yahoo! Internet Life Magazine named Stillwater "One of America's Most Wired Cities." Our building is also home to a local Internet service provider and some other technology companies. Our monitoring servers are located around the world in Equinix, Telehouse and similar carrier-class data centers. Alertra monitors the availability, performance and security …

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 0 0 2
DomainTools DomainTools

Detect. Investigate. Prevent. DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know. The world's most advanced security teams use our solutions to identify external risks, investigate threats, and proactively protect their organizations in a constantly evolving threat landscape. DomainTools constantly monitors the Internet and brings together the most comprehensive and trusted domain, website and DNS data to provide immediate context and machine-learning driven risk analytics delivered in near real-time. Visit domaintools.com to experience firsthand why DomainTools is the first stop for advanced security teams when they need to know. …

Type: SMB Activities: IT Services Technologies: Cybersecurity A.I. - Machine Learning A.I.

4 0 0 134
IOActive, Inc. IOActive, Inc.

Research-fueled Security Services IOActive is a trusted partner for Global 1000 enterprises, providing research-fueled security services across all industries. Our cutting-edge security teams provide highly specialized technical and programmatic services including full stack penetration testing, program efficacy assessments, and hardware hacking. IOActive brings a unique attacker’s perspective to every client engagement to maximize security investments and improve client’s overall security posture and business resiliency. Passion and pride through quality client work is something money simply can't buy. IOActive has spent more than a decade searching for the required blend of characteristics and work ethic that comprise a world-class, international security …

Type: SMB Activities: IT Services Technologies: Cybersecurity IoT

5 0 0 144
Illinois Department of Innovation & Technology (DoIT) Illinois Department of Innovation & Technology (DoIT)

DoIT guides technology solution delivery and support for the agencies in the executive branch of state government. Vision Reimagine Illinois government through innovation Mission Improve access to government services by leveraging modern technologies Values Teamwork, Reliability, Upskilling, Service, Transparency Background: The Department of Innovation & Technology (DoIT) became an agency by statute on July 20, 2018 being charged with responsibility for the information technology functions of agencies under the jurisdiction of the governor. DoIT is leading a digital transformation toward an enterprise approach to technology at the State of Illinois to gain efficiencies and improve service delivery for customer agencies …

Type: Public Activities: IT Services Technologies: Data Analytics

5 0 2 370
Personal Data - WeAreProject Personal Data - WeAreProject

[Automatic translation follows] Specialized in IT infrastructure solutions for management, virtualization, security and business continuity Personal Data Srl, an IT company in Brescia since 1981. Specialized in customized infrastructure solutions for the management, virtualization, security and business continuity of IT systems. The Personal Data Business Units are dedicated to the development of software programs for business management and System Integration and Security. Since 2012, Personal Data has been part of the Project Informatica Group, an Italian leader in the IT sector with numerous owned offices and data centers. As a System Integrator, Personal Data accompanies private and public companies in …

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 0 5 43
Cyberdian Groupe Cyberdian Groupe

[Automatic translation follows] WE ARE COMMITTED TO BEING ONE OF THE FRANCE'S LEADING PROACTIVE CYBERSECURITY CONSULTING COMPANY Created in January 2017, Cyberdian is a cybersecurity consultancy specializing in support, risk analysis, strategy and the implementation of technical and human resources to deal with internal and external IT threats. Bringing together a team of 5 employees, Cyberdian aims to remain a Digital Service Company (ESN) on a human scale. “We work on the two main aspects of cybersecurity: strategy and operational. Our values ​​are excellence, quality, customer satisfaction as well as the loyalty of our customers and associated consultants” IT security, …

Type: SMB Activities: Consulting Technologies: Cybersecurity

9 1 8 15
CIV by Etix Everywhere CIV by Etix Everywhere

[Automatic translation follows] CIV becomes CIV by Etix Everywhere! A pioneer in the creation of server rooms and a recognized player for its green data center solutions, CIV joined the Etix group, leader in edge data centers and became CIV by Etix Everywhere. Proximity, availability, innovation, these are the values ​​of CIV by Etix Everywhere to support you on a daily basis in your projects. Our commitment ? Bring you a secure, sovereign hosting offer while enhancing your energy impact for the benefit of a committed eco-responsible approach. All of our expertise, certifications, allow us to deliver the highest level …

Type: SMB Activities: IT Services Technologies: Data Analytics

3 0 3 17
ARKHINEO ARKHINEO

[Automatic translation follows] Arkhineo, a solution from the Docaposte group, is the first French electronic archiving solution with probative value. Created in 2001, CDC Arkhinéo, Caisse des Dépôts group, trusted third-party archiver, is the first French archiving company with probative value for electronic data (120 million documents archived in 2011). Thanks to its unique Electronic Safe® solution in SaaS mode, CDC Arkhinéo ensures the integrity and long-term conservation of all types of electronic documents (invoices, pay slips, loan contracts, employment contracts, emails, tokens timestamps, evidence files, etc.). CDC Arkhinéo is committed to all stages of the process: guarantee of data …

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 0 5 11
ReFirm Labs, Inc. ReFirm Labs, Inc.

Type: Startup Activities: IT Services transporttech regtech

4 0 1 1
PAPAYA project PAPAYA project

Type: Startup Activities: IT Services privacytech

1 0 0 N/A