Entities
LogoName Σ Employees
Samsung Knox Samsung Knox

Knox is Samsung’s guarantee of security, and a secure device gives you the freedom to work and play how, where, and when you want. Samsung Knox consists of a highly secure platform built into Samsung devices and a set of solutions that leverage this platform. Whether you’d like to keep your personal photos private, or remotely manage a batch of business smartphones, Knox has you covered.

Type: SMB Activities: IT Services Technologies: Cybersecurity

8 2 6 4
VirusTotal VirusTotal

Crowdsourced security intelligence for everyone What? VirusTotal is the richest and most actionable crowdsourced threat intelligence platform in the planet. It equips security teams with comprehensive context and cutting edge functionalities to proactively protect their networks from cybersecurity threats. Why? Security teams are often confronted with an unknown file/URL/domain/IP address and asked to make sense of an attack. Without further context, it is virtually impossible to determine attribution, build effective defenses against other strains of the attack, or understand the impact of a given threat in your organization. Through API and web based interaction with VirusTotal, security analysts can quickly …

Type: SMB Activities: IT Services Technologies: Cybersecurity

7 2 1 56
Crypto Quantique Crypto Quantique

Crypto Quantique is a quantum driven cybersecurity company addressing the growing challenges of end-to-end IoT security. Crypto Quantique is building the most secure end-to-end IoT security platform. We are a transformative cybersecurity technology company, using the most advanced techniques in cryptography and quantum physics, designed to ensure that both device security becomes foundational and end-to-end IoT security standard practice. Crypto Quantique has proven the world's first quantum driven security on a chip and its IP can generate multiple, unique, unforgeable cryptographic keys that never need to be stored and used independently by multiple applications on demand. When combined with their …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

16 3 12 49
Threat Protect Threat Protect

Enabling organisations and individuals to work with confidence by providing tailored Cybersecurity solutions Threat Protect helps businesses fight cybercrime, protect data and reduce security risks. With our cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Threat Protect enables businesses to transform the way they manage their information security and compliance programs. At Threat Protect we provide near real-time active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Join us in achieving a cyber resilient posture to help reduce your financial losses, meet regulatory requirements, improve your …

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity

2 1 1 9
CyberFish CyberFish

Making Teams Crisis - Ready Through the Resilience Dojo Incident Exercising and Learning Platform We help businesses and government teams prepare to better handle business disruptions, by improving effectiveness and resilience of crisis management teams. crisis team resilience, incident exercisising, decision-making for crisis response, crisis communications, crisis team effectiveness, cyber resilience, cyberpsychology, and team resilience

Type: Startup Activities: IT Services Technologies: SaaS

3 2 0 8
TelStrong TelStrong

Do you really think your IT guy has your company's security covered? TelStrong can give you an unbiased, expert opinion. How would you like to have a better idea of what your real risks are and how to mitigate them? According to the 2017 Marsh & McLennan Cyber Risk Report the worldwide average dwell time is 146 days. That's almost 6 months between the occurrence of a data breach and the time it is detected. My company, TelStrong Business Communications can help identify what assets are at risk, We also have the tools to identify incursions as they happen. The …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 0 2
nSure.ai nSure.ai

Payment Fraud Prevention for High-Risk Digital Merchants nSure.ai is the payment fraud prevention provider of choice for Gaming, Prepaid and Gift Cards, and Crypto. We offer a managed service based on adaptive AI that deploys, for each customer, a dedicated model trained on their data. Focusing on behavior patterns - the most accurate and uniquely effective way to mitigate modern scalable fraud - our solution takes a fundamentally different approach to detecting fraud and preventing it from happening. Our customers benefit from the highest-efficacy decisions delivered in under 300 ms, with up to 98% approval rates and a chargeback guarantee, …

Type: Startup Activities: fintech IT Services Technologies: A.I. A.I. - Machine Learning

4 1 3 57
Living Security Living Security

We help organizations transform human risk into proactive defense with award-winning Human Risk Management solutions. Founded in 2017, Living Security’s mission is to help prevent cybersecurity breaches with a human risk management solution that does more than meet compliance needs, it also truly changes behavior. Living Security believes empowering people is the key to ending cybersecurity breaches - picking up where traditional security awareness training drops off. Gamified learning and immersive experiences engage and educate users, while the science-backed, tech-enabled platform uniquely provides CISOs the ability to measure training efficacy and program ROI. Named one of Austin’s Best Places to …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 60
Metabase Q Metabase Q

Empowering businesses to seamlessly manage, measure, and mature their cybersecurity defense / Better Base, Better Future Metabase Q offers an end-to-end platform that enables businesses to manage, measure and mature their cybersecurity. The company’s unified platform integrates with customers’ existing infrastructure to enable advanced cybersecurity capabilities and processes. Funded by world-class investors, including SYN Ventures, GBM, and others, Metabase Q was started to make cybersecurity accessible, understandable, and manageable, especially for businesses in the Latin America market, but now has a presence globally. Contact us:contact@metabaseq.com Cybersecurity, Technology, Managed Services, Information Security, Penetration Testing, and Security as a Service

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 98
Clearwave Enterprise Solutions Limited Clearwave Enterprise Solutions Limited

Technology Simplified, IT Support made simple. Clearwave is a forward thinking IT service provider supporting the needs of small business all over the UK. We bring clients the best of both worlds in saving them both time and valuable resources. Clearwave believes in the power of harnessing technology that improves business processes, increases operational effectiveness and aids profitability. Clearwave’s strongest advantage is its excellent understanding of technology and how to implement processes into your business that are cost effective. We believe in our clients and because of our strong work ethic we are able to be proactive in identifying our …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 1 0 7
Crypta Labs Crypta Labs

Compact, low power and affordable hardware quantum random number generator design solutions for OEM partners. (QRNG) Crypta Labs is a cyber security company developing Quantum seeded random number generator designs specifically aimed at the security OEM hardware manufacturer sector. Our patented portfolio of solutions uses the quantum properties of light to detect photons which are in turned used to generate a quantum seed. We have a low power USB quantum hardware security module perfect for satellite communications. Twitter: @cryptalabs Cyber Security, Quantum Random Number Generator, Authentication, Security Software, monte carlo, and fintech

Type: Startup Activities: IT Services Technologies: Cybersecurity 5G

11 0 9 13
OutThink OutThink

Cybersecurity Human Risk Management Platform (SaaS) OutThink brings the world's first cybersecurity human risk management platform (SaaS). An innovative, disruptive solution, OutThink is the evolution of traditional security awareness training. Used by large, complex organisations (incl. FTSE 100) around the world, the OutThink SaaS platform has been developed specifically to identify, measure human risk and affect behaviour change. OutThink was purpose-built by a team of visionary CISOs, security experts and researchers, for security professionals who are looking to build more effective, usable security and make people their strongest defense mechanism. Headquartered in the City of London with development in UK, …

Type: Startup Activities: IT Services Technologies: Cybersecurity SaaS

10 1 10 46
Osavul Osavul

Protecting states, businesses and society from disinformation OSavul is a tech company focused on countering disinformation. It provides software solution to explore disinformation threats, assess them and counter malicious actors.

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 13
NIS. NIS.

[Automatic translation follows] Find all the latest cybersecurity news on the Itancia group page. NIS is recognized as a true Value Added Distributor (VAD). The company offers its partners (resellers, integrators and IT services companies) tailored solutions in the areas of health, loyalty, access control, digital security and M2M and IoT. NIS is also in charge of IoT technological and commercial monitoring, as well as relations with VSEs/SMEs and start-ups in this area. We aim to put our expertise at the service of our integrator and reseller partners in order to offer security and M2M solutions with high added value …

Type: SMB Activities: IT Services Technologies: Cybersecurity IoT NFC

0 0 0 5
HIUMA | Gestion, maintenance informatique HIUMA | Gestion, maintenance informatique

[Automatic translation follows] Finally, IT support without obligation! 🙋🏻‍♂️ Cyber ​​Security Partner of Major Accounts since 2011, we position ourselves as experts in Cyber-security, networks, Cloud, infrastructures. We see digital technology as a tool serving people and not the other way around. One of the keys to progress in cybersecurity cybersecurity, managed services, networks, and cybersecurity audit

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 5
Menaya Menaya

A Turnkey pre-breach virtual hacker cybersecurity services to detect and prevent cyber vulnerability exposures Menaya utilizes the newest and most advanced technologies to stop cyber-attacks via websites. Our insurance partners reduce exposure and increase brand awareness by bundling our technology with their Cyber Insurance Policies, and reduces loss ratios, by increasing cyber risk transparency with cyber portfolio intelligence data and risk score. We use cutting edge virtual hacker technology to identify and eradicate dangerous malware threats and website application vulnerabilities, a pre-breach tool designed to detect and prevent cyber-attacks. Our focus is on proactive loss prevention and minimizing the exposures …

Type: SMB Activities: IT Services Technologies: Cybersecurity SaaS

7 1 7 10
SatoshiLabs SatoshiLabs

The creator of Trezor, Invity, Tropic Square and Vexl. Innovations that empower independence. We are technology pioneers developing products that secure individual autonomy and privacy. Innovation drives our brand success, putting us in a unique position where we get to focus on projects that matter, without having to compromise. SatoshiLabs established the cryptocurrency hardware wallet industry in 2013 with Trezor and hasn’t stopped innovating since. Our pioneering team delivers secure solutions to real-world problems, with Tropic Square creating the first auditable secure chip, Invity bringing new ways to access crypto, and Trezor developing new secure hardware and interfaces. Trezor, the …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

6 3 0 67
FIVE STRATEGY FIVE STRATEGY

[Automatic translation follows] We are a company specialized in services and products in the areas of Management Systems, Computer and Information Security, Business Architecture, security in school environments and digital transformation. We generate differential values ​​by helping our clients overcome their challenges through cutting-edge technology and best practices worldwide. Our experience and methodology is aimed at providing easy and comprehensive but also innovative solutions, in very attractive times and deadlines for your company and with costs that ensure a quick return on investment. We have a multidisciplinary team of professionals who have individual experience of more than 20 years in …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 5
Hacknowledge SA Hacknowledge SA

Your Vendor Neutral Cybersecurity Partner Security Made Simple What is Hacknowledge? Hacknowledge is a Swiss security monitoring solution that will help you shorten the time between breach and detection. Our service is built on experience and intelligence gained from more than a decade of penetration test and mitigating advanced threats An innovative approach Searching the logs to find security issues is close to finding a needle in the haystack. This is why we will leverage the use of your existing security devices and fortify your logs with strong indicators of compromise generated by our custom sensors installed on your network. …

Type: Startup Activities: IT Services Technologies: Cybersecurity Sensors

8 1 2 54
Liquidity Network Liquidity Network

Decentralized Trustless Finance LiquidChain builds the Liquidity.Network (http://liquidity.network), a practical global blockchain micropayment system, built on top of Ethereum, supporting millions of users securely, reducing transaction costs significantly and enabling the mainstream adoption of blockchain. As a global settlement system, the Liquidity.Network offers an API to developers to build their applications on top of and allowing payment processors to benefit from the secure and fast transmission of digital cash. The Liquidity.Network has no access to the assets of the participants/users, those funds are secured by the underlying blockchain. The secret sauce of the Liquidity.Network are novel hubs, which are significantly …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

1 0 0 1
ChainSecurity ChainSecurity

We build trust in the blockchain ecosystem and make it secure for corporations, governments and startups. ChainSecurity builds trust within the blockchain ecosystem, and makes it secure for established organizations, governments and blockchain companies alike. We provide blockchain security services such as smart contract audits, audits of new blockchains and DLTs, architecture recommendations and much more. Learn more on www.ChainSecurity.com or contact us on contact@ChainSecurity.com Blockchain Security, Smart Contracts, Automated Solutions, and protocols

Type: Spin-off Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

2 0 2 23
TEHTRIS TEHTRIS

Unified & Automated Cybersecurity | TEHTRIS XDR Platform, Extended Detection Response >> Face the unpredictable! TEHTRIS is the software editor of the TEHTRIS XDR Platform, the world leader in automatic, real-time, non-human neutralization of cyber attacks. With its "Security & Ethics by design" engineering, this solution provides cybersecurity specialists with a holistic view of their infrastructure, while guaranteeing the confidentiality of their data. Thanks to its technology, the company is positioned as a 🇪🇺 trusted third party. TEHTRIS XDR Platform monitors, analyzes, detects, & neutralizes threats worldwide for the benefit of major players & administrations. It is interoperable with existing …

Type: Startup Activities: IT Services Technologies: Cybersecurity

104 21 93 205
Agarri Agarri

[Automatic translation follows] Advice, training and services in offensive IT security: intrusion testing, Burp Suite Pro training, code audit, black-box testing, awareness, risk analysis, fuzzing, vulnerability search, application audit, etc. From the magnificent setting of the Luberon, Agarri satisfies its customers located all over the world. security, hacking, pentest, exploit, testing, and risk

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 0 1
SkyRecon Systems SkyRecon Systems

SkyRecon® Systems is a leading global provider of endpoint protection platforms. With its award-winning single-policy endpoint security solutions, organizations are able to ensure protection, control access, and enforce policy for the network resources, endpoint systems, applications, data and users upon which their business relies. The company is a contributing member of Microsoft's SecureIT Alliance, has received the prestigious Red Herring 100 Award, and has been named "Entrepreneurial Security Company of the Year” by Frost & Sullivan. The StormShieldTM Security Suite (http://skyrecon.com/stormshield) has again received 4 stars in the SC Magazine Endpoint Security Group Test, has been nominated as a finalist …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 6
Soteria Lab Soteria Lab

[Automatic translation follows] Cybersecurity for your business Soteria Lab supports businesses and communities in the Grand Est in their cybersecurity strategy. Our mission is to reduce cyber risk to the level accepted by managers, for the benefit of the continuity of their activity, to allow them to devote themselves fully to the vocation of their organization. With Hoplite, a global offering of cybersecurity services, or CyberRange, a cyber combat simulation platform, Soteria Lab is the local “Pure Player” expert, dedicated to the essential security of data and infrastructure in our economy. As a “Pure Player” in cybersecurity, our vocation is …

Type: Startup Activities: IT Services Technologies: Cybersecurity

13 2 11 9
Cyberzen Cyberzen

Cybersecurity for SMBs We provide products and services for securing SMBs Cybersécurité des TPE/PME, Cloud souverain, and Boitier physique de sécurité

Type: Startup Activities: Games IT Services Technologies: Cybersecurity

2 0 2 9
Manika Manika

[Automatic translation follows] Supporting the cyber-resilience and agility of our clients to support their growth 🚀 MANIKA, commitment by nature. MANIKA, is the consulting firm of Anetys Specializing in security governance and information system resilience, Manika experts have been strengthening Anetys’ positioning since June 2022. ​ We are more than 100 specialists in cybersecurity, risk management and digital workspace. Our global and integrated approach allows us to respond to the new uses and new cyber threats faced by our customers. About the NEXTEDIA Group ----- The NEXTEDIA Group is a specialist in the areas of Cybersecurity, Cloud, Digital Workspace & …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 0 55
Infosecure Infosecure

[Automatic translation follows] Protect data and network with Infosecure solutions Protect your company data! Your data produced and stored is vital to the operation of your business. Every day this digital heritage is exposed. A suitable backup policy is essential to cover your entire IT fleet and ensure the continuity of your business. data backup, computer network protection, cyber resilience, cyber security, and VPN

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
Tenacy Tenacy

Cybersecurity teams's daily partner for better company performance. Tenacy is on a mission to make cybersecurity and compliance a business accelerator for organizations thanks to a more rationalized used of their cyber resources. With an all-in-one SaaS platform designed for CISOs, we consolidate, simplify and automate the management of cybersecurity and compliance. We are leaders on the French market where we serve 100+ customers and 3,000+ users. Founded in 2019 and with 50 employees in our headquarters in Lyon, Tenacy raised 6 million euros in Series A in December 2023. GRC, IRM, and Cybersecurity

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 5 49
Dattak Dattak

The best defense is Dattak ! Dattak is an insurtech with a mission to protect businesses against cyberattacks. This protection is provided by combining cybersecurity services with the most comprehensive insurance coverage available, all in one product. Thanks to our proactive approach, we reduce the risk of attacks, which allows us to offer the best rates on the market. Working alongside our broker partners and insurers, Dattak already protects over 1000 businesses and has completed two fundraising rounds totaling €18M from XAnge, Breega, and Bpifrance. insurance and cybersecurity

Type: Startup Activities: insurtech Technologies: Cybersecurity

15 6 12 36
Citalid Citalid

A new way to live with cyber risk Citalid's cyber risk quantification platform enables Enterprises and Insurers to make enlightened decisions about the risks they face. Our advanced technology assesses the likelihood and financial impact of the cyber threats you face, in a simple and dynamic way. Then, we make this knowledge actionable by automatically generating tailored security and insurance recommendations, and simulating their return on investment. In 2023, Citalid has been featured by Gartner in the "Hype Cycle" for Cyber Risk Quantification and was a winner of the Zurich Innovation Championship. cybersécurité, cyberdéfense, aide à la décision, cybermenaces, threat …

Type: Startup Activities: IT Services Technologies: Cybersecurity

42 13 33 45
Dataxium Dataxium

[Automatic translation follows] Securing New Technologies to Accelerate Innovation In a changing environment where cyberattacks are increasingly advanced, cybersecurity and more generally the security of information systems is a vital issue for companies. Furthermore, the different departments (general, CISO, DSI, risks, operational, etc.) must take up the challenge of new technologies (Big Data, NoSQL, BlockChain, Docker, Cloud, IoT, AI) to avoid being left behind. In this context, how can we combine the appropriation of new technologies and security? Specialist in the security of information systems and new technologies, Dataxium helps you take stock of your information system, secure it, define …

Type: Startup Activities: IT Services Technologies: IoT Cybersecurity Blockchain/Cryptocurrency

2 1 2 9
Lybero Lybero

Stocker et partager des données chiffrées de bout en bout ! Le chiffrement des données facile à utiliser et à manager ! Lybero.net is a cybersecurity software editor specialised in cryptography. We provide easy to use, easy to deploy and easy to manage cryptography, with a very high level of security. We have 3 products : CryptNDrive a web encrypted file sharing server software, a LybCrypt SDK and LEMS a fully digital escrow system. CryptNDrive allows anybody in an organisation to share encrypted files inside or outside of the organisation without any sotware. Only a web browser is required. CryptNDrive …

Type: Startup Activities: IT Services Technologies: Cybersecurity

15 6 12 2
Stormshield Stormshield

The European Choice in Cybersecurity All around the world, companies, governmental institutions and defence organisations need to guarantee cybersecurity for their critical infrastructure, their sensitive data and their operational environments. Certified and qualified at the highest European levels, Stormshield’s technological solutions meet the challenges faced by IT and OT to protect their activities. Our mission: to provide cyber-serenity for our clients so they can concentrate on their core activities, something which is vital to the satisfactory operation of our institutions, our economy and the services provided to our populations. When you choose Stormshield, you are choosing a trusted European cybersecurity …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

8 6 2 380
Intruder Intruder

Secure your attack surface with continuous vulnerability scanning, network monitoring, and proactive threat response. Intruder is a proactive security monitoring platform for internet-facing systems. Cyber threats are ever-changing and require dedicated oversight. Existing services are inadequate, overly complex to configure and operate, and the jargon produced is often confusing, requiring specialist interpretation. Intruder provides a simple cloud based security solution which continually scans your digital assets, highlighting vulnerabilities and outlining remediation advice in the simplest terms. ============================ We're hiring! https://careers.intruder.io ============================ Information Security, Vulnerability Scanning, Cyber Security, Penetration Testing, and Vulnerability Scanner

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 1 69
Device Authority Device Authority

Automating Zero Trust For IoT Device Authority is a global leader in Identity and Access Management (IAM) for the Internet of Things (IoT) and Blockchain. Our KeyScalerTM platform provides trust for IoT devices and the IoT ecosystem, to address the challenges of securing the Internet of Things. KeyScaler uses breakthrough technology including Dynamic Device Key Generation (DDKG) and PKI Signature+ that delivers unrivalled simplicity and trust to IoT devices. This solution delivers automated device provisioning, authentication, credential management and policy based end-to-end data security/encryption. With offices in Fremont, California and Reading, UK, Device Authority partners with the leading IoT ecosystem …

Type: Startup Activities: IT Services privacytech Technologies: IoT Blockchain/Cryptocurrency

4 1 4 33
SenseOn SenseOn

SenseOn makes advanced cybersecurity quickly accessible for organisations of all sizes. Our mission is your mission. Make complex security toolstacks a thing of the past and gain efficiency with SenseOn, a consolidated cyber defence system. SenseOn is the single piece of software security stack, combining the capabilities of EDR, NDR, SOAR, SIEM, and AV into a single platform. By alerting accurately on genuine threats in a single system, SenseOn dramatically reduces noise from rapidly-increasing volumes of data, consolidates your security stack, and gives you full visibility into your cloud and on-prem IT infrastructure. The SenseOn platform captures all endpoint and …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

5 0 1 77
Privitar Privitar

Privitar empowers organizations to use their data safely and ethically. Our Data Security Platform (DSP) builds collaborative workflows and policy-based data privacy and access controls into data operations. Only Privitar has the right combination of technology, regulatory expertise, and best practices to support modern data innovation initiatives while navigating regulations and protecting customer trust. Founded in 2014, co-founders Jason du Preez and John Taysom united to combine John’s academic work on privacy with Jason’s experience of big data and enterprise software. Together, they launched Privitar, with a passion for building a center of excellence around their idea that technology and …

Type: Startup Activities: privacytech IT Services Technologies: Data Analytics

8 1 7 54
Cybertonica Ltd Cybertonica Ltd

Our products provide real-time automated decisioning based on machine learning and enhanced behavioural insights. Cybertonica uses Machine Learning and Artificial Intelligence to manage risk and fraud, increasing trust and growing frictionless banking and m/e-payments globally. Cybertonica’s service increases conversion and sales by up to 25% while managing card-not-present and other categories of fraud at world-class compliant standards. Our goal is to build Trust in Transaction. Cybertonica has won numerous distinctions and awards since its product came to market, including the “Best Use of Payments Data Award” at Emerging Payments Awards 2018 and the “Best Data Analytics and Science Award” at …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity Data Analytics

9 1 9 13
NopSec NopSec

Fix Less, Secure More Vulnerability assessment scanners are adept at finding security flaws, but they leave professionals with chaotic lists of vulnerabilities to sift through. With a mixture of spreadsheets and crossed fingers, cyberdefenders struggle to determine what to fix first. This results in wasted time and little progress made on their overall risk exposure. NopSec has been recognized by both Gartner and Forrester for its whole-brain approach to vulnerability prioritization. We’ve infused our years of offensive security expertise into a patented algorithm that prioritizes vulnerabilities for remediation based on each company’s unique environment. As a result, companies spend less …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 0 51
VikingCloud VikingCloud

The leading Predict-to-Prevent cybersecurity and compliance company. VikingCloud is the leading Predict-to-Prevent cybersecurity and compliance company, offering businesses a single, integrated solution to make informed, predictive, and cost-effective risk mitigation decisions – faster. Powered by the Asgard PlatformTM, the industry’s largest repository of anonymized cybersecurity and compliance event data, we continuously monitor and analyze over 6+ billion online events every day. VikingCloud is the one-stop partner trusted by 4+ million customers to provide the predictive intelligence and competitive edge they need to stay one step ahead of cybersecurity and compliance disruptions to their business. Our 1,000 dedicated cybersecurity and compliance …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 2 574
Holistic Cyber (HolistiCyber) Holistic Cyber (HolistiCyber)

Defend What Matters. HolistiCyber’s mission is to assist corporations in defending themselves from the new phase of evolution in Cyber threats - not only in volume, but in the level of sophistication. Hackers, backed by Nation-States in many cases, use tools that were developed by the NSA and other Nation-State agencies that have leaked into the Darknet. HolistiCyber’s holistic approach includes a comprehensive understanding of business processes and identification of organizations’ critical and strategic assets - all from the view point of potential highly sophisticated attackers. We help organizations manage cybersecurity risks and demonstrate the impact a cyber-attack will have …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

3 0 3 24
Plurilock Plurilock

AI + behavioral biometrics = Invisible, device-free #MFA and true continuous authentication for #ZeroTrust. Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats, securing the enterprise and ensuring compliance with requirements in financial, healthcare, and federal organizations. Our flagship advanced authentication products are Plurilock ADAPT for login MFA and Plurilock DEFEND for continuous authentication. Using behavioral, environmental, and contextual signals, Plurilock invisibly authenticates users without added friction. Our solutions provide advanced authentication for enterprises to detect and prevent cyber-attacks before they occur. Network Security, IT Security, Continuous Authentication, Multi-factor Authentication, Biometric security …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I.

2 1 0 44
AuthenTrend Technology Inc. AuthenTrend Technology Inc.

No More Password! Bringing FIDO2 biometrics authenticator, cloud and on-premise server to partners AuthenTrend is the world's leading brand of fingerprint FIDO security keys (ATKey), and a certified member of Microsoft Information Security Alliance (MISA), also a recommended partner for Windows 10/11 and Azure AD Passwordless login. In addition to fido key, we also provide on-demand fido2 cloud (AT.AuthFi) that helps partners to convert their cloud into passwordless or multi-factor authentication to ensure account security; for on-premise AD environment, we are releasing new AT.fido server for enterprises (AT.LogOn), which enables the use of AD in the company domain users Passwordles …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 2 11
Mandiant (now part of Google Cloud) Mandiant (now part of Google Cloud)

Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Learn more at https://www.mandiant.com Check out Mandiant career opportunities at: https://www.linkedin.com/company/mandiant/jobs/ Network Security, Threat Intelligence, Computer Forensics, and Incident Response

Type: Large company Activities: IT Services

16 2 4 1,352
Faraday Faraday

Our platform helps you perform security engineering by maximizing your team's resources Security has been available for the 1%, We believe that creating Open Source technologies and added value services can help address the problems of the 99% https://www.faradaysec.com/ penetration test, physical infrastructure, client side attacks, red team services, research, vulnerability management, and cibersecurity

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 1 51
BCD BCD

Purpose-built, Performance Driven With a focus on proactive response and personal service, BCD is the most trusted source for purpose-built and performance-driven IP video data infrastructure solutions. The company’s innovative and award-winning products include video surveillance recording and storage servers, access control servers, virtualized solutions, harsh environment appliances, client viewing stations, networking solutions, and professional on-site services. All BCD appliances come standard with its exclusive software integration, Harmonize Bridge, powered by Tiger Technology, for hybrid cloud connectivity and disaster recovery. Each system is validated and tested by BCD’s certified technicians to ensure the appliances meet and exceed the specifications and …

Type: SMB Activities: IT Services Technologies: Cybersecurity

4 1 4 276
NetDiligence® NetDiligence®

Serving today's cyber insurance community with world-class solutions and programming. NetDiligence® is a Cyber Risk Assessment and Data Breach Services company. Since 2001, we have conducted thousands of enterprise-level cyber risk assessments for a broad variety of corporate clients, including well-known names in banking, brokerage, mortgage, insurance, clearinghouse, and other financial service sectors. We have also assessed major Internet-based retailers, online auctions, B2B service providers, software companies, medical providers, universities, and a significant percentage of the Fortune 2000. NetDiligence services are used by leading insurers in the US and UK that offer "cyber risk insurance"​ for businesses. Insurers like ACE, …

Type: SMB Activities: insurtech IT Services Technologies: Data Analytics

2 0 2 16
CEFCYS - Cercle des Femmes de la CyberSécurité CEFCYS - Cercle des Femmes de la CyberSécurité

[Automatic translation follows] #Cybersecurity Awareness #Education Talent development #Leadership #WomenInTech #CyberWomen #Women CEFCYS is aimed at women and men concerned by cybersecurity professions and issues. Our actions : - Promote and professionalize women's skills through working groups, mentoring programs, publications - Raise awareness among companies, educational partners and recruiters of the importance of gender parity and thus advance the presence and impact of women. - Raise awareness of cybersecurity among the general public, particularly young people, for protection and education in the secure use of digital technology. - Organize and/or participate in events and conferences in France and internationally. 2020 …

Type: NGO, Think-tanks, Ed, & Culture Activities: edtech

53 6 44 28
Thinkst Applied Research Thinkst Applied Research

We build the much loved Thinkst Canary - https://canary.tools Thinkst is an Applied Research company with a deep focus on information security. We build the much loved Thinkst Canary https://canary.tools

Type: Startup Activities: deeptech Technologies: Cybersecurity

1 1 0 28
APrivacy APrivacy

Securing the digital world. Combining seamless data security with convenience for the financial services industry. APrivacy provides the banking and finance industry with an information security and tracking service anywhere, any time and on any device. APrivacy’s enabling technology allows banks to drive new revenues, reduce risk and support compliance efforts. APrivacy’s patented solution empowers bankers to communicate and share information with their clients using the devices they prefer (iPhone, Android, etc.) via the channels they prefer (Gmail, Outlook, Dropbox, etc. ) and the medium they prefer (Email, PDF, PPT, Word, Excel, etc. ). With APrivacy financial institutions achieve a …

Type: Startup Activities: IT Services Technologies: Data Analytics

0 0 0 2
nextAuth nextAuth

Best in mobile user authentication | No trade-off between usability and security Best in mobile user authentication | No trade-off between usability and security user authentication, security, cryptography, IAM, mobile authentication, two factor, second factor, strong authentication, cyber security, authentication, user experience, UX, multi factor authentication, mfa, 2fa, sca, strong customer authentication, mobile security, infosecurity, advanced electronic signatures, e-Signatures, electronic signing, frictionless authentication, seamless login, and two factor authentication

Type: Startup Activities: IT Services uxtech Technologies: Cybersecurity

2 1 2 5
iGuards - Keeping your data safe. iGuards - Keeping your data safe.

CISO & IT-Governance Helping you guarding your valuable digital information today and for the future. • CISO • CISO-as-a-service • IT-Governance • ISO-27001 • NIST • GRC: Governance, Risk and Compliance iGuards offers a full service in gaining & keeping the trust in your Digital world. Are you in need of a CISO or further protection of your valuable digital information? Our professionals supervise complex security and privacy assignments from diagnosis to implementation. Let us be the guardians of your digital trust ! iGuards – Keeping your data safe. Information Security, Governance, CISO, CISO-as-a-service, Security Audit, NIST, ISO 27001, and …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity

0 0 0 3
Intigriti Intigriti

Global crowdsourced security provider, trusted by world's largest organizations Intigriti provides continuous, realistic security testing to help companies protect their assets and their brand. Our community of ethical hackers challenge our customers’ security against realistic threats — we test in precisely the same way malicious hackers do. Intigriti goes beyond traditional pentesting or bug bounty programs; our customers publicly acknowledge our advanced guidance and unmatched agility. Our interactive platform features real-time reports of current vulnerabilities and commonly identifies crucial vulnerabilities within 48 hours. Ethical hacking, Responsible disclosure, Bug bounty, Penetration Testing, Security, Security Testing, and vulnerability disclosure

Type: Startup Activities: IT Services Technologies: Cybersecurity

11 6 6 465
Cyberwings Cyberwings

[Automatic translation follows] Hacking and Strategic Information Management Cyberwings is a French company of experts in ethical hacking and strategic information management since 2001. Follow you on Twitter: @cyberwings_pub IT Security, Ethical Hacking, and Security Audits

Type: Startup Activities: deeptech Technologies: Cybersecurity

3 1 0 9
COGICEO COGICEO

Passionate consultants to achieve your cybersecurity COGICEO is an independent company, founded in 2012, whose core business is based on technical expertise in IT security and penetration tests (pentest). Our head office is based in Paris and COGICEO Ltd., our subsidiary, is based in London. We operate both in France and internationally, in the following areas: ** SECURITY AUDITS: Penetration Test; Penetration test; Configuration review; Architecture review; Physical & organizational review; Source code review ** REDTEAM: Phishing campaign; Social Engineering; Physical intrusion test; Internet exposure pentest; Internal network pentest ** FORENSIC: Incident handling; Digital forensic; Malware analysis; Network tracking ** …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 2 0 25
ANOZR WAY ANOZR WAY

People-centric cyber protection Today, 80% of cyberattacks exploit human vulnerabilities. ANOZR WAY offers a software platform to reduce the human attack surface of organizations. French software editor, pioneer company in people protection against cyber and fraud risks - solutions based on an automated, 100% proprietary, sovereign and RGPD compliant technology. Account and identity theft, fraud, social engineering, data theft... use the professional and private data of executives and employees exposed from social media to the dark web. To stop being an easy target, ANOZR WAY provides a complete platform for human risk management including audit, remediation, monitoring, alert. cyber sécurité, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

33 9 29 40
IPGenius IPGenius

[Automatic translation follows] IPGenius is an IT services company that offers solutions adapted to all the needs encountered by VSEs/SMEs and liberal professions. ◾Have you just created your business and need to set up a computer network? ◾Do you have an existing network and you have a specific IT need? ◾Do you need to host your server or site? We suggest that we study your needs together to provide you with a concrete response in line with your expectations, the size of your company and your activity. This can range from a simple recommendation for the purchase of computer equipment, …

Type: Startup Activities: IT Services

1 0 1 2
CybelAngel CybelAngel

Scan, Prioritize, Resolve External Threats CybelAngel is a global leader in cybersecurity solutions focused on External Attack Surface Protection and Management. As an early pioneer in ‘outside-in’ search technology, approaching cybersecurity just as an attacker would carry out infiltration, CybelAngel has developed the industry’s most extensive defense for external attack vectors, where the majority of cyber-attacks are initiated. Combining expanded discovery and analysis, CybelAngel finds unknown assets and exposures to preemptively diffuse attack vectors that cyber criminals use to breach systems and wreak havoc. CybelAngel proudly protects some of the largest global enterprises representing various sectors including the Pharmaceutical, Manufacturing, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

10 5 5 161
Yogosha Yogosha

Offensive Security Testing Platform Yogosha is an Offensive Security Platform enabling you to identify your most critical vulnerabilities—that are difficult to uncover. Bug Bounty, Pentest, Security, Private bug bounty, crowdsourced security, crowdsourced pentest, hacking, ethical hacking, hackers, cybersecurity, and vulnerability management

Type: Startup Activities: IT Services Technologies: Cybersecurity

32 7 27 211
Quarkslab Quarkslab

[Automatic translation follows] Securing every bit of your data Founded in 2011 by Fred Raynal, Quarkslab is a French company specializing in cybersecurity and more specifically in software protection and analysis. Research and development are the fundamental pillars of Quarkslab. Its goal has always been to promote innovation by creating a function between academic research and concrete implementation. His expertise combines offensive and defensive security in protecting applications and data, and helps businesses and government organizations adopt a new security posture: forcing attackers, not defenders, to continually adapt. Through these consulting services and through its Lab's R&D work and through …

Type: Startup Activities: IT Services deeptech Technologies: Cybersecurity

10 1 10 96
Olvid Olvid

Private messaging for everyone. Olvid, private messaging for everyone. Only cryptography can guarantee the complete security of your communications. Cryptography

Type: Startup Activities: IT Services Technologies: Cybersecurity

25 8 20 14
Absec Cybersécurité Absec Cybersécurité

[Automatic translation follows] Cybersecurity advice and support. Absec is a cybersecurity company that helps managers of small and medium-sized businesses understand and limit their cyber risks. Our cybersecurity experts help you protect yourself against cyberattacks.

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 1 0 2
Certilane Certilane

Imagine a world where all clicks are safe. 90% of cyber attacks begin with phishing. #Certilane is a simple and free solution based on patented technology to give internet users complete confidence when they visit websites - especially those requiring sensitive personal or financial information. Browse the internet with complete peace of mind. All it takes is a simple download. Want to help restore trust online? We've just developed an app, work on an API, and are looking for feedback before launch. Join the Certilane Trust Alliance and meet like-minded leaders. #Certilane, for a safer Internet 🤝 #zerotrustweb #whitelisting2.0 anti-phishing, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 3
Cyberfort Group Cyberfort Group

Combining technology, people, and expertise to create a cybersecurity capability that is second to none. Cyberfort exists to provide our clients with the peace-of-mind about the security of their data and the compliance of their business, which is much needed in our increasingly data hungry world. Since we were established in 2017, we have brought together technology, people, expertise, facilities and leaders in cybersecurity to create a capability that is second to none. Our vision is to create a safer world for us all to live, by creating safer organisations. To do this we want to be recognised and trusted …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity IoT Robotics

0 0 0 117
Pen Test Partners Pen Test Partners

Pen Test Partners has been providing cyber security expertise to a huge variety of industries and businesses since 2010. Pen Test Partners / PTP has been providing cyber security expertise to a huge variety of industries and businesses since 2010. We’re paid to hack and test the security of all sorts of things, as well as providing essential consultancy, incident response, accreditation, and forensics services. We’ve tested ships and rigs (while at sea!), connected and electric vehicles, the power grids and stations that keeps countries running, as well as the payment, transport, and fulfilment systems on which everybody is reliant. …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 128
Think Cyber Security Ltd Think Cyber Security Ltd

Next generation security awareness A UK company developing products that reinvent the delivery of end-user security education and awareness training. info@thinkcyber.co.uk @thinkcyberuk Cyber Security, Security Education, and Security Awareness Training

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 2 4 17
RazorSecure RazorSecure

Specialists in Rail Cyber Security Solutions RazorSecure offers products and services to enhance railway cyber security by protecting networks and monitoring key systems. We deliver this through our flexible approach to cyber security, designed specifically for rolling stock, signalling and infrastructure systems. We’ve learned from working with industry leading companies that everyone has a unique set of requirements and challenges to overcome, so we have tailored our solution to provide the flexibility to address even the most difficult environments. Railway, Cyber Security, Asset Discovery, Intrusion Detection, Anomaly Detection, Rail Cyber Security Compliance, and Rail Cyber Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

10 2 10 47
CyberOwl CyberOwl

Helping fleet operators gain visibility, cybersecurity and cyber compliance of systems onboard vessels CyberOwl helps asset operators in the maritime and critical national infrastructure sectors gain visibility, cyber security and cyber compliance of systems on their distributed, remote assets. We provide technologies, a managed service and specific cyber security advisory services to support the asset operator. Our technologies provide near-real-time visibility of the behaviours of assets and their communication patterns. They are deployed to identify and inventory assets on the IT and OT networks of these operational platforms. They detect and raise early warning of cyber attack tactics, techniques and …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

1 0 1 56
Ontrack Ontrack

The Global Leader in Data Recovery Ontrack, a KLDiscovery business, is the global leader in data recovery. Offering data management, disaster recovery, email extraction and restoration, data destruction, erasure verification, and tape management, Ontrack serves clients with in-lab, remote, and do-it-yourself options. With cleanroom facilities worldwide and engineering expertise in every major global region, Ontrack has developed hundreds of proprietary solutions over the past three decades to recover data from enterprise storage, tapes, HHDs, SSDs, flash media, mobile devices, and virtual environments. In addition, Ontrack's PowerControls software suite enables search, recovery, and restoration of data from Exchange, SharePoint, and SQL …

Type: Startup Activities: IT Services Technologies: Data Analytics

7 2 6 812
CyberSmart CyberSmart

Cybersecurity should be simple. Protect your business with CyberSmart. #BeCyberSmart Cybersecurity should be simple. Protect your business with CyberSmart. #BeCyberSmart Cybersecurity, Device Security Checks, Policy distribution, Cybersecurity Awareness Training, Cyber Essentials, Compliance, and Risk Transfer

Type: Startup Activities: regtech privacytech IT Services Technologies: Cybersecurity

9 2 3 67
Venari Security Venari Security

Cryptographic Discovery Tool | Cryptographic Visibility | Internal and Regulatory Compliance Venari Security provides organisations with advanced visibility into their encrypted attack surface, ensuring regulatory compliance and privacy adherence through our cryptographic discovery tool. Our focus is on crypto agility which helps you assess both external and internal cryptographic risks, preparing your business now and for the quantum future. Advanced Analytics, Machine Learning, Fraud Detection, Cyber Security, Threat intelligence, Threat Detection, Metadata, Artificial Intelligence, Encrypted Traffic Visibility, Encryption, Next Generation, Data Privacy, Ransomware, Encrypted Traffic Analysis, Cryptographic Discovery Tool, Cryptographic Visibility, Regulatory Compliance, NIST, and NCSC

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity A.I. - Machine Learning Data Analytics A.I.

14 3 10 48
Trustonic Trustonic

We embed world-leading trusted cybersecurity technology into smart devices and connected vehicles. Trustonic a world leader in hardware backed mobile device security, app protection and secures a range of mission critical in vehicle systems. Trustonic has over 100 employees, with its headquarters in Cambridge, UK and offices across 7 international locations. Trustonic counts the worlds leading car manufacturers, financial institutions and mobile operators as customers, as well as every tier 1 Android handset manufacturer. Our patented security technology is embedded in c.2 billion devices worldwide – created initially from a joint venture between ARM & Gemalto, Trustonic is now an …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT Sensors

18 3 14 116
AimBrain AimBrain

Award-winning fraud detection & user authentication platform, based on Deep Learning. AimBrain is a #BIDaaS (Biometric Identity as-a-Service) platform. Connectivity to the platform is via open-source SDKs and an API; businesses and developers can go trial-to-deployment with 1,000 free API calls a month, on our free platform AimBrain On Demand. Our approach combines 100% proprietary passive (anomaly detection and behavioural) and active (voice, facial and combined face/audio/lip movement) authentication modules to verify the user, not the device. The cloud model lets companies authenticate their users across any channel and any device, to reduce fraud and improve the security experience. Biometrics, …

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity A.I. A.I. - Deep Learning

0 0 0 2
Comsec Comsec

Keep Your Company Cyber Secure & Compliant Comsec is a leading global cybersecurity consultancy. With more than three decades of experience, the company adopts a proactive stance in combating cyberattacks. Its services include Security Testing & Assessments, Governance, Risk & Compliance, Education and Training & Awareness. Comsec employs a mix of automated tools, industry best practices, and expert human intervention to safeguard its customers' business continuity. Since 2021, Comsec Global has been a part of the HUB Security Group (Nasdaq: HUBC). Information Security, IT Security, Application Security, Operational Risk Management, Fraud Detection and Prevention, Cyber Security, Cyber Intelligence, Automation, DDoS, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

3 0 3 250
Information Risk Management (IRM) Information Risk Management (IRM)

Think Cyber. Think Security. Think Data IRM, part of the Capgemini Group, works to defend organisations against cyber threats. Founded in 1998, IRM provides visibility and control across entire cyber landscapes by combining more than two decades of consultancy with advanced technology. By covering all aspects of cybersecurity governance to automated threat intelligence, IRM supports organisations at every step of their cyber maturity journey. Enabling organisations to comply with ever-evolving standards, legislation and regulation is a key objective for IRM; as cybersecurity experts we collaborate with manufacturers, suppliers and government regulators ensuring we’re abreast with the latest research and development. …

Type: SMB Activities: IT Services privacytech Technologies: Cybersecurity

2 1 2 40
STid STid

Smarter Security Answers STid is one of the leading developers of contactless identification solutions using RFID, NFC and Bluetooth® technologies, and the Internet of Things (IoT). For over 20 years, we have been inventing smart solutions designed to secure access and provide traceability for assets in testing environments such as the aeronautical, energy or defense sectors. As experts in our field, we are constantly striving for excellence, giving us an unrivalled command of cutting-edge technologies to safeguard digital identity. We give companies, industries and governments the means to identify, protect and supervise their assets to make their daily operations easier …

Type: SMB Activities: IT Services Technologies: Wireless IoT NFC

20 3 17 161
Hermitage Solutions Hermitage Solutions

[Automatic translation follows] IT, network and infrastructure security solutions and services Hermitage Solutions is a value-added distributor specializing in IT infrastructure, networking and security solutions. Hermitage Solutions markets its offer throughout France via a network of +500 Reseller/Integrator partners. Since its creation in 2002, Hermitage Solutions has distributed solutions from IT publishers and manufacturers with high innovative content, intended for companies and organizations of all sizes, to help them meet today's technological challenges in the field of IT: information system security, hyper-convergence of infrastructures, SDN, mobility, cloud computing, etc. The Hermitage Solutions portfolio makes it possible to address the following …

Type: SMB Activities: IT Services Technologies: Cybersecurity

7 0 7 31
KIWI BACKUP KIWI BACKUP

[Automatic translation follows] Backup intelligence Kiwi Backup is one of the pioneers of outsourced backup. In 2003, when it was created, there was no question of Cloud yet... and yet, that's already what we were doing. Secure company data by saving it in redundant Data Centers spread across France. Today, this philosophy has not changed and we continue to ensure that backing up your data is not a constraint, but almost a pleasure! Our leitmotif: to make life easier for system administrators, whether they are IT resellers or CIOs. Only our catalog of solutions has grown, with the appearance over …

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 2 1 8
Pluribus One Pluribus One

Safer AI for a better world Pluribus One is a research-intensive startup company that turns basic research results into commercial products and provides innovative solutions for cyber security, machine vision, and other data-driven applications. Pluribus-One can offer advanced consulting and ICT training services to Public Administrations and private companies, for managing, understanding, and exploiting data from different physical and logical sources. Pluribus One's founders have more than 20 years of experience in world-class research and in providing solutions based on pattern-recognition and machine-learning technologies for real-world applications. The founders of Pluribus One have a large experience in leading projects in …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

8 0 3 17
Trinity Cyber Trinity Cyber

See More, Do More and Stop More Trinity Cyber is an international cybersecurity firm that invents and operates innovative solutions to the most difficult cybersecurity challenges. The company’s products and services replace multiple market segments in the traditional cybersecurity market, with customers in over a dozen of the largest market verticals. The company’s founders, management team, and technologists are all award-winning, recognized leaders in their field—and their tech has revolutionized network security. Proactive Threat Interference® and cybersecurity

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 51
Triskele Labs Triskele Labs

When Experience Matters Triskele Labs is one of Australia’s fastest growing cybersecurity companies. We deliver services including traditional projects such as Penetration Testing, Compliance and Risk Management through to new breed services including 24*7*365 Security Operations and outsourced Cybersecurity Managers to ensure we are a complete cybersecurity solution centre. Our team of experts leverage elite threat intelligence to provide the highest level of cybersecurity professional services. We go the extra mile to demystify cybersecurity and become your trusted partner by developing customised programs that deliver on your specific needs to meet your budget. Our holistic approach allows us to achieve …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 75
Entersoft Security Entersoft Security

Application security simplified. Entersoft is a leading application security provider helping organizations worldwide protect their products against malicious threats and compliance concerns. We believe that application security is a journey, not just a goal, and work with business leaders as partners and advisors to safeguard their applications with an integrated, proactive and forward-thinking approach. Entersoft was launched in 2012 and has its headquarters in Bangalore, R&D centre in Hyderabad and offices in Brisbane and Hong Kong. We provide application security assessments, DevSecOps solutions and consulting services to enhance performance through proactive, collaborative and cost-effective security practices. Going beyond penetration testing, …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency Cybersecurity IoT

2 0 0 62
heylogin heylogin

Password Manager without a Master Password heylogin replaces passwords with a swipe-to-login on your phone. It's the first password manager without an inconvenient master password. It works with all websites and saves time of your employees. approx. 3 h / month. For project managers, it eases on- and off-boarding of employees. security and authentication

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 12
Quantum Dice Quantum Dice

Securing a connected future. Quantum Dice is an award-winning, fast growing quantum technology and photonics developer backed by world leading innovation from the University of Oxford. Providing random number generation (QRNGs) which generate unbiased, true random numbers. RNGs are essential components of modern communication technologies which generate cryptographically secure keys for enterprise and user needs. Quantum Random Number Generator, Cybersecurity, Quantum, Photonics, and Hardware

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 2 4 24
SECQAI SECQAI

Security · Quantum · AI Quantum & AI Cyber Security Cyber Security, Quantum, and AI

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I.

4 0 4 6
Data Theorem, Inc. Data Theorem, Inc.

Prevent AppSec Data Breaches Data Theorem prevents AppSec data breaches. We provide SAST, DAST, & RASP for API Security, Web Security, Mobile Security, and Cloud Security. Our products provide Inventory (Discovery), Security Testing (SAST/DAST), and Active Protection (RASP) for APIs (RESTful, GraphQL, gRPC, and SOAP), mobile apps (iOS, Android, React Native, Flutter), Web Apps (Web 2.0 & Single Page Apps), & Cloud Apps + CSPM (Serverless Lambda, Google Cloud Functions, Azure Functions). Data Theorem is headquartered in Palo Alto, CA., with offices in New York, Chicago, Boston, Paris, and London. For more information visit https://www.datatheorem.com. Mobile Security, Data Privacy, Android, …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity

1 1 0 94
Obsidian Security Obsidian Security

Comprehensive Security for Your SaaS Applications Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS. The company is backed by Greylock Partners, Wing, GV and Norwest Venture Partners. Advanced Threat Protection, Insider Threat Protection, Threat Detection, Threat Response, Automated Intelligence, Machine Learning, Information Security Software, SaaS Security , Incident Response, Visibility and Monitoring, and compliance

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I. A.I. - Machine Learning

6 2 2 158
passbolt passbolt

Collaborative open source password manager for businesses Finally, a password manager built for organizations that take their security and privacy seriously. Passbolt is trusted by 15 000 of them worldwide, including F500 companies, the defense industry, universities, startups and many others.

Type: Startup Activities: IT Services Technologies: Data Analytics

3 2 0 28
Wiconnect_ Wiconnect_

[Automatic translation follows] A global approach to your digital environment! Wiconnect has been working for more than 15 years on the commissioning and operation of digital services. Drawing on extensive experience obtained during the deployment of infrastructure for more than 200 shopping centers in France and Europe, for numerous communities and businesses, Wiconnect offers its services in the following areas: - IT: Supply and deployment of equipment, Server and Cloud solutions, Microsoft 365, Outsourcing, Backup - Network Infrastructure: Engineering and commissioning of equipment, Internal Wi-Fi integration, Public Wi-Fi services, captive portals - Cybersecurity: Firewall IDS security solution, Antivirus, EDR, One-off …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 3 13
NBS System NBS System

[Automatic translation follows] Cybersecurity Expert NBS System is a cybersecurity company part of the CELESTE Group. Specialist in IT security since 1999, its experts support its clients with audits and intrusion tests to improve their level of security within their information system and their platform. Security (pentest, audit, etc.), Open Source Intelligence, Phishing & Spear Phishing, DevSecOps, Cyber ​​Coaching, IT Security Awareness, Application Pentest, Internal Pentest, and Heavy Client Security Audit

Type: SMB Activities: IT Services Technologies: Cybersecurity

6 1 6 32
Immersive Labs Immersive Labs

The leader in people-centric cyber resilience. The leader in people-centric cyber resilience. Cyber Labs, Develop Skills, Ethical Hacking, Coding, Application Security, Red Team, Blue Team, Cybersecurity, Human Cyber Readiness, and appsec

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 2 1 321
Metomic Metomic

Helping you detect and protect sensitive data across your SaaS apps. Metomic protects sensitive data in SaaS applications like Slack, Jira, Microsoft Teams, and ChatGPT. data privacy, gdpr, ccpa, data quality, data management, pci, soc ii, iso 27001, and data infrastructure

Type: Startup Activities: privacytech IT Services Technologies: A.I. Data Analytics Generative A.I.

3 0 3 51
PQShield PQShield

Leading Experts in Post-Quantum Cryptography For Software and Hardware "Think openly, build securely" Our team is shaping the way our digital world is protected against the threats of tomorrow. In a time when quantum computers will soon be able to break current cryptography methods, we're focused on empowering organizations, industries, and nations, with the ultimate quantum-resistant cryptography solutions. PQShield was selected as a World Economic Forum Tech Pioneer in 2021, a FAST COMPANY winner 2022, WIRED Trailblazer 2023 and Bloomberg’s Startups to Watch 2023. Our expertise, clarity and care enable us to deliver new global standards alongside real-world, post-quantum hardware …

Type: Startup Activities: deeptech IT Services nanotech Technologies: Cybersecurity IoT

23 3 21 64
Clayton Clayton

Your complete Salesforce code reviewer. Your complete Salesforce code reviewer. Salesforce, Code analysis, Security, Vulnerability scanning, and DevSecOps

Type: Startup Activities: IT Services Technologies: A.I.

1 0 1 20
Wiz Wiz

Secure everything you build and run in the cloud Organizations of all sizes and industries use Wiz to rapidly identify and remove the most critical risks in AWS, Azure, GCP, OCI, Alibaba Cloud and Kubernetes so they can build faster and more securely.

Type: Startup Activities: IT Services Technologies: Cybersecurity

13 2 11 1,312
Cerby Cerby

Securely manage access to all your apps, no exceptions, with the first and only comprehensive access management platform Cerby is the first and only comprehensive access management platform for nonstandard applications. Harnessing the power of identity providers, Cerby makes passwordless authentication an immediate reality for any application by extending single sign-on (SSO) and lifecycle management capabilities. Onboard, offboard, and manage users at scale, with just a few clicks. Cerby makes it possible to securely extend access, minimize risk, and lower costs. With Cerby, your team can: ✔ Go passwordless (and ditch your password manager) ✔ Automate offboarding ✔ Securely manage …

Type: Startup Activities: IT Services Technologies: Robotics RPA

2 1 2 100
KYND KYND

Cyber risk management for every business. Simple to understand, quick to monitor and easy to prevent. Organisations of all sizes have or will be impacted by cyber risks and whilst this threat is well publicised it is not always well understood. KYND is about to change that. KYND's innovative, industry first and proprietary cyber risk management technology enables all businesses to easily monitor and understand the cyber risks they face, take action when necessary and be alerted to future risks as they arise. KYND's cyber risk products provides businesses of all sizes a simple, easy to use and cost-effective solution …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 45
CyberSafe CyberSafe

CyberSafe is the original commercial provider of Kerberos-based security solutions, with over 20 years'​ experience, and focused on providing innovative security solutions for SAP business applications. The TrustBroker product family utilise your existing Active Directory infrastructure to offer user authentication, encryption, and Secure Single Sign-On (SSO). The products also have the flexibility to support many SAP business applications - whether on-premise or in a cloud, and being accessed from a user’s personal workstation, shared workstations, or mobile devices. The user only needs one identity (their Active Directory account) and one credential (such as a password). When users logon to SAP …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 10
Snyk Snyk

Develop fast. Stay secure. Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams. Snyk is used by 2,500+ customers worldwide today, including industry …

Type: Large company Activities: IT Services

11 4 8 1,192