Entities
LogoName Σ Employees
Telsy Telsy

[Automatic translation follows] Future Security Telsy is the TIM Group company, operating within TIM Enterprise, specializing in cybersecurity and communications security. Founded in 1971, it develops and provides proprietary cybersecurity and encryption solutions for government agencies, businesses, institutions and SMEs. Thanks to its crypto, cyber, quantum and intelligence souls, Telsy's commercial proposal represents a truly unicum in the market, integrating advanced technologies and highly specialized experts to offer its customers the best security against the threats of today and tomorrow. Since 2021, Telsy has been part of the share capital of QTI, a leading Italian company in Quantum Key Distribution …

Type: SMB Activities: telecommunications Technologies: A.I. Cybersecurity A.I. - Machine Learning

0 0 0 275
Venafi Venafi

Venafi solutions find, protect and secure machine identities for our hyper-connected world. Venafi is a world-class cyber-security company dedicated to protecting machine identities for our hyper-connected digital economy. We identify, fix and manage machine identities wherever they exist, combining expertise with innovation to provide world-class cybersecurity across the extended enterprise network. We are committed to not only solving the machine identity protection issues of today but anticipating those of tomorrow. Venafi has been delivering solutions to high-profile customers for over 10 years. We are extremely proud of our pioneering heritage and the levels of expertise we have delivered for our …

Type: SMB Activities: IT Services Technologies: Cybersecurity

8 2 2 439
GoSecure GoSecure

Based in Montreal and San Diego, GoSecure is a leading provider of managed security solutions and advisory services. GoSecure is a recognized cybersecurity leader, delivering innovative managed Extended Detection and Response (MXDR) solutions and expert advisory services. GoSecure Titan® managed security solutions deliver multi-vector protection to counter modern cyber threats through a complete suite of offerings that extend the capabilities of our customers’ in-house teams. GoSecure Titan Managed Extended Detection and Response (MXDR) offers a best-in-class mean-time-to-respond, with comprehensive coverage across customers’ networks, endpoints, and inboxes. For over 10 years, GoSecure has been helping customers better understand their security gaps, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

6 1 5 177
StrongKey StrongKey

Leading the industry with PKI, Encryption/Tokenization, and open-source passwordless authentication with FIDO. We make breaches irrelevant. We've provided data security thought leadership and solutions to governments, central banks, the Fortune 100, SMEs, global non-profits, standards organizations and startups for almost 20 years. Payment processors have entrusted us with billions of dollars in payments transactions, a Fortune 100 customer relies on us to provide peace of mind in a medical device IIoT application, and we keep customer data secure for companies as diverse as rewards programs, one of the top website-building platforms and a turnkey credit card program provider, among others. …

Type: SMB Activities: IT Services privacytech fintech govtech Technologies: Cybersecurity IoT

8 0 7 12
Code42 Code42

Data + insider threat protection to secure modern collaboration without compromising the speed of innovation Code42 offers an alternative approach to DLP that helps organizations protect data more effectively and stop insider threats efficiently. Native to the cloud, Code42’s Incydr product rapidly detects data loss, leak, theft, and sabotage while speeding incident response – all without lengthy deployments, complex policy management, or blocking employee productivity. With Code42, security professionals can protect corporate data and reduce insider risk while fostering a collaborative culture for employees. Today, our team is focused on helping organizations stop IP theft, protect customer data, get better …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 2 272
Club EBIOS Club EBIOS

[Automatic translation follows] Experts in #riskmanagement! Supports EBIOS Risk Manager and all EBIOS derivatives, with the support of ANSSI Created in 2006, the EBIOS Club is an independent non-profit association (Law 1901), made up of individual experts and organizations. It has supported and enriched the French risk management framework since 2003, with the support of ANSSI. Obviously, he promotes and develops EBIOS Risk Manager. In addition, its scope extends to all uses of this method and their derivatives in the field of risk management. The Club organizes periodic meetings to encourage the exchange of experiences, the standardization of practices and …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

4 2 3 32
CertEurope CertEurope

[Automatic translation follows] Digital Identity, website security, PVID & KYC, Electronic signature CertEurope, an InfoCert group company, is a trust service provider to guarantee the confidentiality and traceability of digital exchanges. Created in December 2000, CertEurope joined the InfoCert Group in 2021. The numerous labels and accreditations enjoyed by CertEurope (LSTI/COFRAC) attest to strict compliance with the technical requirements developed by the National Information Systems Security Agency (ANSSI). CertEurope is an RGS** certification operator and qualified trust service provider in compliance with eIDAS regulations on ETSI EN 319 411-1 and 2 standards. electronic certificate, electronic signature, PKI, dematerialization, Digital Trust, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

13 2 13 60
IT and Cybersecurity Meetings IT and Cybersecurity Meetings

The One to One Meetings for networks, cloud, mobility and cybersecurity IT & Cybersecurity Meetings: your business meeting place on 20 and 21 March 2024 in Cannes! IT & Cybersecurity Meetings, the business meeting place for IT and cybersecurity, is a business exhibition dedicated to IT professionals (manufacturers, publishers, telecoms operators), infrastructure suppliers, mobility professionals and IT security experts. The aim is to encourage direct face-to-face meetings between top decision-makers and exhibitors, through pre-organised, highly-qualified meetings ahead of the event, in a relaxed, friendly atmosphere. IT & Cybersecurity Meetings is a privileged forum for exchange and an instant business platform, …

Type: Event

4 2 2 2
Identity Days Identity Days

[Automatic translation follows] The first French conference dedicated to IAM - See you in 2023 for the fifth edition! A unique event in France! The Identity Days will allow the various players in the identity management market to participate in more than 25 conferences in a very friendly atmosphere! See you on October 24, 2023 at the NewCap Event Center! Email: event@identitydays.com

Type: Event

0 0 0 3
SecurIT Innosup SecurIT Innosup

Goal: identify security needs and usecases and support 63 best-in-class projects developped by 126 SMEs across Europe SecurIT is a European project (H2020-Innosup-01) aiming at supporting and co-financing the development of collaborative projects allowing prototyping and experimentation of top-notch technological solutions in the field of Security, with respect of the nowadays ethics, legal, and social challenges. The project is structured in three major axes: - Demand analyses (new use cases identification) on the Security market, with integrators and final users (including industrial players, public authorities, managers of critical infrastructures...) - Identification of technological solutions in Europe (solutions and services for …

Type: Public Activities: IT Services

10 4 9 1
Board of Cyber Board of Cyber

Beyond Rating In 2022, in our ultra-connected world, cyber risk is one of the main concerns of companies and public organizations. Their leaders are realizing that cyber attacks threaten the very existence of their organizations and that of their partners. "Cybersecurity is in the TOP 3 risks to address for a company in 2021." Because cybersecurity begins with objective knowledge of one's own performance, Board of Cyber offers a fast, non-intrusive solution to continuously, and automatically, assess organizations' exposure to cyber risks. Security Rating, Cybersecurity Assessment, notation cyber, cybersécurité, and évaluation risque cyber

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

28 2 27 26
Edgeless Systems Edgeless Systems

We develop leading open-source software for confidential computing. Edgeless Systems is a German cybersecurity company that develops leading open-source software for confidential computing. With Constellation, we've built the world's first Kubernetes that keeps data always encrypted - even at runtime. Backed by renowned investors such as the Swiss Stock Exchange and SquareOne, we provide robust solutions for sectors like healthcare, public sector, finance, and telco. Our products eliminate infrastructure-based security risks and ensure privacy compliance when using public clouds. Confidential computing, Cloud native, Open source, Cybersecurity, Cloud security, and Kubernetes

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 0 8 20
Sitehop Sitehop

Cyber Security Evolved. Network Communication Accelerated. Sitehop is a cybersecurity technology company developing and supplying FPGA hardware-enforced cyber security solutions for companies requiring the highest level of security available, which is not available from software-only solutions. FPGA, Cryptography, Ultra-low latency, Encryption, Network Accelerator, Layer 2 Processing, and Layer 3 Processing

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 2 16
ZORB Security ZORB Security

Stop data loss BEFORE it becomes a breach ZORB Security is an information risk and data breach specialist. We eliminate business data theft for businesses whose reputation is their differentiator. Our approach is simple - we don't allow outbound data to be sent from your business unless it meets THREE criteria: - the data has come from a known 'trusted' application - the data is destined to a 'trusted' destination - the data is being transmitted over a 'trusted' comms channel Only if the answer is YES to all the above is the data sent - otherwise, we immediately stop …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 2
Hadrian Hadrian

Digital security insights from a hacker’s perspective Hadrian’s digital security model focuses on automated event-based scanning. Our approach maps vulnerabilities in an organisations’ entire attack surface infrastructure, and provides the critical insights to fortify them. Unlike traditional security which relies on scheduled testing, Hadrian proactively strikes to deliver accurate information. Developed by a team of expert hackers, our unique approach to digital security allows for continuous security validation, running tests on 1000s of digital assets. Follow Hadrian on LinkedIn and Twitter to find out how our Legion is disrupting the digital security landscape!

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 3 77
Foreseeti (now part of Google Cloud) Foreseeti (now part of Google Cloud)

Empowering you to act on cyber risks instead of incidents foreseeti is now part of Google Cloud

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 1 1
Hirmes Cybersécurité Hirmes Cybersécurité

[Automatic translation follows] Stay in control of your data. You help keep what is most precious to you is our leitmotif. Hirmes Cybersecurity is a company that works for digital trust. We offer consulting and audit services in the field of securing information systems. Based in Clermont-Ferrand, we are committed to securing and supporting all digital players in the Rhône Alpes Auvergne region. Our service offerings are adapted from VSEs to SMEs with several areas of expertise: - Website monitoring and security (e-commerce, business site, association site). - Security audit and intrusion test of your information systems. (GDPR compliance) - …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 0
Alcees Alcees

[Automatic translation follows] GRC Consulting and Expertise Firm. Pure Player Cybersecurity & Digital trust since 2018. More than a consulting firm in Governance, Risks, Compliance, Alcees present in Paris, is a partner 🇫🇷 🇪🇺 of local digital trust serving VSE/SME clients, startups, Large Groups, professionals, Institutions, associations, communities, training centers... and a mission-driven digital services company. Our values: Ethics - Commitment - Innovation - Trust #alceesfr Why choose Alcees? Tools dedicated to financial institutions ▪ Quality ▪ Proximity ▪ 24/7 support ▪ Cross-functional experiences ▪ Versatility ▪ Expertise ▪ Team ▪ Internationality ▪ Feminization Alcees, for which sectors of activity? …

Type: SMB Activities: privacytech Consulting healthtech insurtech Technologies: A.I. Cybersecurity

24 1 12 3
Paris Cyber Summit Paris Cyber Summit

🎥 Paris Cyber Summit brings together #EU leaders and top decision makers to lead the digital transformation with Trust The annual nationals ecosystem’s meeting for EU leaders and decision-makers committed to digital transformation, tech, cyberespace and Trust. Paris Cyber ​​Summit brings together all digital players around industrial sectors, thus creating a community of experts capable to deliver a forward-looking vision and helping public and private decision-makers to anticipate the strategic dimension of digital transformation It marks the result of three years of high-level European meetings on cyber challenges. Gathered within CyberTaskForce, MPs, ministers, European commissioners, managers of SMEs and large …

Type: Event

17 0 13 3
NICE Actimize Xceed NICE Actimize Xceed

Cloud-based fincrime and compliance coverage for mid-market, regional, community banks and credit unions. Powered by the cloud, NICE Actimize Xceed brings together best-in-class AML and fraud solutions, offering complete financial crime and compliance on a single platform - tailored to mid-market, regional, community banks and credit unions. Through unique self-learning abilities, Xceed adapts to new attacks and changes in customer behavior. Prevent Online & Mobile banking Fraud, Detect fraudulent ACH payments, Behavioral analytics, Detect suspicious wire payments, Detect unauthorized portal access, FFIEC Compliance, Anti Money Laundering Software, Fraud Detection Software, Machine Learning, and Risk Scoring

Type: SMB Activities: IT Services Technologies: A.I. A.I. - Machine Learning Data Analytics

0 0 0 35
RedSeal, Inc. RedSeal, Inc.

Cloud security solutions and services that show what’s on all network environments and where resources are exposed. RedSeal delivers actionable insights to close defensive gaps across the entire network, on premises and in the cloud. Hundreds of Fortune 1000 companies and more than 75 government agencies, including five branches of the U.S. military, depend on RedSeal for exceptionally secure environments. Visit www.redseal.net to learn more. Network Security, Network Modeling, Risk Scoring & Analytics, Incident Response, Network Situational Awareness, Vulnerability Prioritization, Continuous Monitoring, Security Metrics, Cybersecurity, Continuous Compliance, Cyber Resilience, Digital Resilience, and Cloud

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 1 3 184
PKWARE PKWARE

Data discovery and protection to locate and secure sensitive data on any device/environment, minimizing risks and costs PKWARE offers the only data discovery and protection solution that locates and secures sensitive data to minimize organizational risks and costs, regardless of device or environment. Our ultra-efficient, scalable software is simple to use on a broad range of data types and repositories, enabling precise, automated visibility and control of personal data, even in the fastest-moving, most complex IT environments. With more than 1,200 customers, including many of the world’s largest financial institutions, retailers, healthcare organizations, and government agencies, PKWARE continues to innovate …

Type: SMB Activities: IT Services privacytech Technologies: Data Analytics

5 2 7 148
CLUSIS - Association suisse de la sécurité de l'information CLUSIS - Association suisse de la sécurité de l'information

[Automatic translation follows] CLUSIS - Swiss Association for Information Systems Security _________________________________________________________ A non-profit association, founded in 1989 by a few visionaries aware of the need for awareness of computer system security issues, CLUSIS strives to respond to the requests and questions of managers and managers confronted with the difficulties generated by rapid evolution of information processing technologies and the risks associated with them. Also present in German-speaking Switzerland and Ticino, with nearly two hundred and twenty members, CLUSIS has created a vast network of skills and information to become an effective association, a true benchmark in information systems security. …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 6
NAVISTA NAVISTA

Virtual Operator Company. Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company Operador de Seguridad and Creación de redes privadas en Internet

Type: SMB Activities: IT Services

1 1 0 21
ALL4TEC ALL4TEC

Cyber risk management software publisher. Our tools offer an agile and systemic approach to Cyber risk analysis, based on recognized methodologies and continuous feedback. Simplicity, openness and proximity are the main axes to which our approach is anchored. Our range of tools is both recognised by the ANSSI, through its Ebios RM labeling, and widely deployed and implemented: defence, aeronautics and space industries, institutions, medium-sized private players, etc. Safety, Model Based Testing, Cyber Security, Ebios RM, EBIOS, Analyse de risques, Développement logiciel, and Agilité

Type: SMB Activities: IT Services Technologies: Cybersecurity

13 3 10 25
CLUSIR Auvergne-Rhône-Alpes CLUSIR Auvergne-Rhône-Alpes

[Automatic translation follows] Information Security Club in the Auvergne-Rhône-Alpes Region The CLUSIR Rhône-Alpes was created in 2004 on the initiative of Yannick BOUCHET by those involved in the promotion and development of Information and Communication Technologies in Rhône-Alpes who were ADIRA, Lyon Infocité, Espace Numérique Entreprises and the Rhône Alpes Digital Agency. CLUSIR Auvergne-Rhône-Alpes is an association affiliated with the “French Information Security Club – CLUSIF” association.

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

18 5 0 11
Windscribe Windscribe

Browse the web privately, as it was meant to be. Windscribe is a leading internet security and privacy company. Our goal is to transform the internet with easy to use yet powerful tools, that allow anyone to circumvent censorship, access geographically restricted content, and minimize their exposure to marketers, criminals and surveillance dragnets. Our well-received applications have appeared on Lifehacker, Techradar and CNET. Do you want to help to do something about internet tracking and surveillance? If so, why not join us in our downtown Toronto office. Windscribe launched in April 2016 and has already accumulated 25 million users. Being …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 1 0 36
Detectify Detectify

The External Attack Surface Management platform powered by elite ethical hackers. Go hack yourself. Detectify sets the standard for External Attack Surface Management (EASM), providing 99.7% accurate vulnerability assessments. Product security and AppSec teams trust Detectify to expose exactly how attackers will exploit their Internet-facing applications. The Detectify platform automates continuous real-world, payload-based attacks crowdsourced through its global community of elite ethical hackers, exposing critical weaknesses before it’s too late. Go hack yourself. Web Security, OWASP Top 10, XSS, Ethical Hacking, Web scanner, Web vulnerabilities, appsec, Web applications, attack surface, and cybersecurity

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 3 123
Callsign Callsign

Pioneering digital trust through proprietary technology that uniquely mimics the way humans identify each other. Callsign is pioneering digital trust through proprietary technology that uniquely mimics the way humans identify each other in the real world. Positive identification of genuine users delivers privacy, safety and minimal friction whilst ensuring that bad actors are blocked. Through a simple Swipe or Type, users can be personally recognized to a 99.999% accuracy, delivering the highest fidelity AI based user recognition for the digital world. Multi-factor Authentication (MFA), Cyber Security, Realtime Identification, Two-factor Authentication (2FA / TFA), Fraud and Security Prevention Plan, PSD2, Identity …

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity A.I.

7 0 7 228
Figment Figment

Figment is the leading provider of blockchain infrastructure. Figment is the leading provider of blockchain infrastructure. We provide the most comprehensive staking solution for over 250 institutional clients, including asset managers, exchanges, wallets, foundations, custodians, and large token holders, to earn rewards on their digital assets. On Ethereum, we are the largest non-custodial staking provider with nearly 5% of staked ETH on Figment validators. Figment’s institutional staking service offers seamless point-and-click staking dashboard, portfolio reward tracking, API integrations, audited infrastructure, and slashing protection. This all leads to our mission to support the adoption, growth, and long-term success of the digital …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

5 0 3 132
Cygenta Cygenta

We don’t just do cyber security. We navigate you through cyber risk. Our approach to cyber security is more than just penetration testing or awareness-raising. We are experts in combining the technical, human and physical aspects of security best practice. We help some of the largest and most complicated organisations build resilience and sustainability in their risk management, not just their technical response. ​ So how do we do it? First and foremost, we have front-line experience across all aspects of cyber security. We then support this with powerful tools to help analyse risks, identify weaknesses, strengthen defences and set …

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 0 4 5
Rubicon Labs, Inc Rubicon Labs, Inc

Rubicon Labs is a cybersecurity startup founded by veterans of Apple and Broadcom with offices in San Francisco, California and Austin, Texas. Cyberwarfare is widespread in the cloud and now going kinetic. A quarter of a billion cars and some 25 billion devices will join the IoT by 2020. That means that cars, homes, and public spaces will join credit cards and PCs on the list of things that speak the same language. It also means they’ll join the list of things that can be hacked. Rubicon Labs is solving that problem with an IoT identity platform. Zero-knowledge keys are …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

1 0 1 2
Atredis Partners Atredis Partners

Atredis Partners delivers advanced, research-driven security assessment and advisory services all over the world. With offices all around the United States and Canada, Atredis Partners was created by a number of security industry veterans who wanted to prioritize offering quality and client needs over the pressure to grow rapidly at the expense of delivery and execution. We wanted to build something better, for the long haul. Atredis Partners team members have written five books on information security topics, and have presented our research over fifty times at the BlackHat Briefings conference in Europe, Japan, and the United States, as well …

Type: Startup Activities: IT Services Technologies: Sensors Robotics IoT

0 0 0 32
QuintessenceLabs QuintessenceLabs

Securing your world through quantum innovation QuintessenceLabs is the leader in quantum-enhanced cybersecurity. We provide enterprises with the strongest data protection today, preparing them for a quantum-safe tomorrow. Products from QuintessenceLabs combine world class security expertise with advanced science to create high-value technology, including a quantum-based random number generator, a high-performance, interoperable key and policy manager and a broad range of strong encryption solutions. They support data in use, in motion or at rest, and for systems on-premise, in the cloud or hybrid infrastructure. For more information, visit www.quintessencelabs.com. Quantum cyber-security, Data security, High speed, true random number generation, Key …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity

10 0 5 47
Nozomi Networks Nozomi Networks

The leader in OT and critical infrastructure security We protect the world’s critical infrastructure from cyber threats. Our platform uniquely combines network and endpoint visibility, threat detection, and AI-powered analysis for faster, more effective incident response. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com Cybersecurity, OT Security, IoT Security, OT Cybersecurity, SaaS-Powered Security, Cloud-based Security, Digital Transformation, Cyber Threats, OT Network Visibility, Scalable IoT Security, Threat Detection, Anomaly Detection, IoT Network Security, Scalable Security Platform, IoT Device Security, OT Asset Security, Vulnerability Assessment, OT Network Monitoring, SCADA Security, and ICS Security

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

17 2 12 277
Welcomr Welcomr

[Automatic translation follows] Connected access control that optimizes your time and makes you more profitable. Welcomr is the leading French manufacturer of building access management in the cloud. We automate and secure your access to make your life easier, free up more time and profitability. On the side of your customers & users, everything is done to create a unique and fluid experience. How ? There is a solution for each use! 💡Welcomr is the only system that offers you by default 4 access modes per opening for a unified experience: - Access by smartphone (bluetooth) - Access by badge …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity SaaS

24 4 23 24
Escape Escape

We help your business stay secure with automated API discovery and security testing We help Application Security teams automate API discovery, inventory, and security testing through agentless scanning. With Escape, quickly inventory all your APIs, detect OWASP Top 10 and complex logic flaws at scale and empower your developers to adopt security in CI/CD.

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 3 3 22
Qontrol Qontrol

[Automatic translation follows] SMEs, Startups: Your cyber. A new pride. Qontrol is the first virtual cybersecurity assistant for SMEs & Startups that require no prior knowledge. Protection solutions already exist. The platform tells you what to use, when and how to protect your SME and prove it to your business partners. cybersecurity, cybersecurity, SMEs, security, information systems, business risk management, transformation, digital transformation, and artificial intelligence

Type: Startup Activities: IT Services Technologies: A.I. Cybersecurity

23 3 25 12
Be ys Research International Be ys Research International

#Research_and_Innovation be ys Research International is a group of researchers, engineers, data experts and business specialists sharing the same vision: innovation as competitive advantage and business accelerator. First of all, we are specialized in the edition of sensitive data protection software. We support businesses in their digital transformation by deploying a set of solutions in their infrastructure or remotely to address sensitive data issues. Building on its strong expertise and skills in the area, be-ys Research International masters the state of the art in the field. Thus, we have developed innovative products, protecting millions of people in Europe and covering …

Type: Startup Activities: healthtech IT Services Technologies: A.I. Blockchain/Cryptocurrency

12 1 10 2
Sekoia.io Sekoia.io

One view. Total control. Sekoia.io is a European cybersecurity SaaS company, whose mission is to develop the best protection capabilities against cyber attacks. The company created in France provides modern field-proven technologies, to enable operational cybersecurity teams and service providers to neutralize cyber threats before impact. The founders of Sekoia.io have been recognized security professionals for more than 15 years. Today, 100 Sekoia.io collaborators are following our vision and our strategy and contributes to the defensive cybersecurity in France and Europe. cybersecurity, Innovation, RedTeam, BlueTeam, sekoia.io, XDR, TIP, CTI, Threat Intelligence, CERT, Security Analytics, SOAR, SIEM, XDR Back end, SaaS, …

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics SaaS

38 9 27 116
RSA Conference RSA Conference

RSA Conference is the premier series of global events and year-round learning for the cybersecurity community. RSAC is where the security industry converges to discuss current and future concerns and have access to the experts, unbiased content and ideas that help enable individuals and companies advance their cybersecurity posture and build stronger and smarter teams. Both in-person and online, RSAC brings the cybersecurity industry together and empowers the collective “we” to stand against cyberthreats around the world. RSA Conference. Where the world talks security. Security, Conferences, Cyber security, Data protecton, and Cryptography

Type: SMB Activities: IT Services Technologies: Cybersecurity

3 1 2 63
Beyond Security (Acq. by HelpSystems) Beyond Security (Acq. by HelpSystems)

Secure your infrastructure with the only vulnerability management platform to combine XDR, SAST, DAST & mobile security. Beyond Security is a global leader in automated vulnerability assessment and compliance solutions - enabling businesses and governments to accurately assess and manage security weaknesses in their networks, applications, industrial systems and networked software at a fraction of the cost of human-based penetration testing. Product lines include: *beSECURE® (formerly AVDS): network vulnerability assessment, web application testing and PCI compliance scanning *beSTORM®: Dynamic Application Security Testing (DAST) aka Black Box Fuzzing *beSOURCE®: Static Application Security Testing (SAST) aka White Box Testing Beyond Security's automated, …

Type: SMB Activities: IT Services Technologies: IoT

3 1 1 32
Array Networks Array Networks

Array offers a complete range of application delivery and security solutions. Array offers a complete range of application delivery and security solutions aimed at maximizing employee productivity, ensuring always-on availability, optimizing the end-user experience, and guarding business infrastructure against attack and data leakage. Application Delivery Controllers, SSL VPN, Secure Access Gateways, Remote Desktop, NFV, Network HCI, Load balancers, SSL Intercept, and Web Application Firewall

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 0 229
eMazzanti Technologies eMazzanti Technologies

Technology Solutions for Business Growth eMazzanti Technologies is your outsourced IT consultant servicing clients worldwide since 2001. We specialize in a wide range of IT Services that can help grow your business exponentially. Our experienced IT engineers can quickly provide expert analysis of your business technology and suggest an IT solution that will increase your business productivity, business growth and business security. No matter what, we will meet and exceed your business expectations with a suite of technology services that includes antivirus solutions, network security, application control, cloud computing, virtualization, PCI compliance, video security, remote support, email security, spam filtering …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 1 58
Sword & Shield Enterprise Security, Inc. Sword & Shield Enterprise Security, Inc.

Follow us at our new page for cybersecurity news and updates! See the link in the banner above. Securing business for more than 20 years, Sword & Shield Enterprise Security, Inc. partners with our customers to meet the needs of their dynamic cybersecurity and compliance landscape. We work closely with companies to become tightly integrated with their enterprise operations in the areas of managed security, risk and compliance, enterprise security consulting, security incident response and forensics, and security training. Recognized nationally and headquartered in Knoxville, Tennessee, Sword & Shield has offices throughout the US. Sword & Shield services a broad …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 34
Recorded Future Recorded Future

The world’s largest threat intelligence company Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the internet across the open web, dark web, and technical sources, Recorded Future provides real-time visibility into an expanding attack surface and threat landscape, empowering clients to act with speed and confidence to reduce risk and securely drive business forward. Headquartered in Boston with offices and employees around the world, Recorded Future works with over 1,600 businesses and government organizations across more than 74 countries to provide real-time, unbiased and actionable intelligence. …

Type: Large company Activities: IT Services

1 0 1 1,099
INFINY LINK INFINY LINK

[Automatic translation follows] Manage and secure the IT and Telecom infrastructures of SMEs for daily operational performance. At INFINY LINK, we offer a full range of IT services for SMEs, including outsourcing, cybersecurity, cloud hosting solutions, as well as backup and Disaster Recovery Plan (DRP) services. Founded in October 2005, we specialize in IT and telecoms, offering multidisciplinary expertise. Our skills extend from help desk to supervision, including network management, systems integration, cloud solutions, telecoms and outsourced backup. We personalize our offers to meet the specific needs of companies with 20 to 500 employees. As a responsible company, INFINY LINK …

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 0 5 20
GrapheneOS GrapheneOS

Security and privacy focused mobile OS with Android app compatibility. GrapheneOS is an privacy and security focused mobile OS with Android app compatibility developed as a non-profit open source project. It's focused on the research and development of privacy and security technology including substantial improvements to sandboxing, exploit mitigations and the permission model.

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 3 5
ZenMate ZenMate

Fast. Secure. Easy. Founded in 2013 and headquartered in Berlin, Germany ZenGuard GmbH provides multi-platform security software and service that encrypts and secures user's internet connection and protects privacy while browsing. With its ZenMate flagship privacy service, ZenGuard prevents snoopers, hackers, governments, and ISP's from spying on user's web browsing activities, downloads, credit card information, and more. In addition to a slimmed-down free version, ZenMate is also available as a premium model with a subscription. With over 30 locations on all 5 continents and more than 45 million users, ZenMate is one of the world's leading VPNs. Internet Security, Privacy, …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity

1 0 1 6
Humio Humio

CrowdStrike Falcon LogScale is a time-series logging and aggregation platform for unrestricted, comprehensive event analysis, On-Premises or in the Cloud. With 1TB/day of raw log ingest/node, in-memory stream processing, and live, shareable dashboards and alerts, you can instantly and in real-time explore, monitor, and visualize any system’s data. Unique features of Humio include: • All-you-can-eat site license: Unlimited log volumes at fixed price/yr • Handles large data volumes efficiently (up to a 1 TB/day of data on a single node) • Streaming live queries, alerts, and dashboards provide an instant view into system and application health • Ad-hoc search capabilities …

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics

2 0 2 35
cyex cyex

Cyex helps people to become cyber wise. We enable our clients to find, track and improve cyber awareness in one place. Cyex Rootino is a VR powered B2B awareness platform that scales up the knowledge of your organization with personalized, realistic simulation trainings. cybersecurity, cyber exercises, and cybersecurity exercises

Type: Startup Activities: IT Services Technologies: Cybersecurity VR

2 2 0 3
Keyless Keyless

Simple, secure, private biometric authentication. The passwordless authentication platform that authenticates people, not just their devices. Keyless equips businesses with simple and secure privacy-preserving biometrics, elevating the user experience and assuring global compliance. Easily integrated, its patented Zero-Knowledge BiometricsTM technology distinguishes Keyless as the first biometric system that does not store biometric data anywhere. Proven to slash ATO fraud and help desk costs by up to 80%, Keyless delivers built-in multi-factor security that verifies a user’s genuine identity in addition to their device in 450ms or less. Compatible with over 1000 devices, Keyless is ISO27001 certified and uniquely has been …

Type: Startup Activities: privacytech IT Services regtech Technologies: Blockchain/Cryptocurrency Cybersecurity

14 3 4 60
Cylance Inc. Cylance Inc.

We've moved! Follow us at BlackBerry for the latest on BlackBerry Spark, Unified Endpoint Security, Unified Endpoint Management, and more! https://www.linkedin.com/company/blackberry/ Next Generation Anti-Virus, Penetration Testing, Malware Detection, Security Assessments, Machine Learning, Advanced Threat Protection, and Artificial Intelligence

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I. - Machine Learning A.I.

15 1 15 144
Merox Merox

DNS Security & DMARC Implement DMARC and many other protocols. Strengthen your DNS security posture, improve deliverability, reduce phishing, stop identity fraud... and much more. Mentioned by Gartner. Made in France, Europe. cybersecurity, cybersecurite, dmarc, dns, bimi, bec, business email compromise, tls, dnssec, dkim, spf, email security, and dns security

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 1 6 5
LOCKSIGHT LOCKSIGHT

[Automatic translation follows] Locksight is a human-sized structure specializing in the field of cybersecurity. Locksight combines functional and technical expertise to support and provide services with high added value throughout the life cycle of its clients' information systems. Locksight offers a 360° cybersecurity vision thanks to new generation technologies and a transversal structure, allowing teams to intervene at all stages of the project with an efficient and pragmatic approach. We are here to help you best meet your cybersecurity needs.

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 1 0 3
HarfangLab HarfangLab

The EDR for Next-Gen Cyber Security Experts 🤖 Choose the best technology to protect your endpoints 👨 Capitalize on the expertise of your SOCs analysts 💡 Enable agility in threat response Everything seems to be working, yet your system may already be compromised. Endpoint Detection & Response (EDR) is an essential security capability for any company looking to protect its digital assets from security breaches, which in addition to impacting a company’s reputation, can be very costly. HarfangLab EDR was developed by former ANSSI cyber intelligence professionals (the French National Agency for the Security of Information Systems). Our solution is …

Type: Startup Activities: IT Services Technologies: Cybersecurity

20 8 13 107
Oxibox Oxibox

La première solution qui protège vos sauvegardes des cyberattaques 🛡️💻☁️🔐 Pour garantir votre continuité d'activité Oxibox is a plug-and-protect cyber-resilience solution: you only need one simple installation to fully guarantee your capacity to recover after any disaster. Nothing to configure, no storage to allocate, no throttling due to limited network bandwidth. Our auto classification tools detect and prioritize critical data. Backups are isolated from the production network making them invisible to ransomwares but also to complex attacks. Oxibox aims to solve data protection once and for all - we bring together backup, disaster recovery, distributed storage and artificial intelligence to …

Type: Startup Activities: IT Services Technologies: Data Analytics

23 5 20 24
Digitemis Digitemis

[Automatic translation follows] Unique expertise in cybersecurity and GDPR compliance | PASSI qualified ✅ Digitemis is an expert in cybersecurity and personal data protection consulting. Its value proposition combines triple expertise: • Technical cybersecurity: penetration testing, Red Team, phishing, code audit, configuration audit • Organizational cybersecurity: audits, risk analysis, cybersecurity support (ISO27001, DORA, NIS2), PCA/PRA, PSSI, outsourced CISO • GDPR compliance: audit, training and support, shared/outsourced DPO Our added value? A coherent support proposal and an excellent understanding of needs thanks to synergy between centers of expertise. ANSSI (National Authority for Information Systems Security and Defense), has issued a Security …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity IoT

11 3 10 36
DIFENSO DIFENSO

[Automatic translation follows] Protect your data in any environment while respecting legal constraints The result of 5 years of work by our IT security research lab, the data protection that we offer represents a new approach to digital security: instead of securing its transmission or storage, Difenso directly protects the data by encrypting it. from its conception and supports “the right to be forgotten”. We thus meet European data confidentiality requirements (GDPR). Our innovative technology, certified by ANSSI, guarantees companies control and exclusive ownership of their data encryption, applicable to a multitude of infrastructure platforms and Cloud application services. Its …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

0 0 0 4
BforeAI BforeAI

Predictive Attack Intelligence & Digital Risk Protection Services BforeAI is a pioneer in predictive threat intelligence and Digital Risk Protection Services (DRPS). Powered by PreCrimeTM technology using behavioral AI, our mission is to shift cyber defense from a reactive to proactive approach – with solutions for threat intelligence, brand protection, adversary disruption, and infrastructure takedowns. Named by Gartner in five reports, and chosen for numerous awards and programs such as the FinTech Innovation Lab New York, BforeAI is the industry’s fastest, most accurate solution for automated protection against online fraud. To learn more, visit bfore.ai. Threat Intelligence , Digital Risk …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I.

12 8 5 44
Secure Technology Alliance Secure Technology Alliance

The Secure Technology Alliance is a not-for-profit, multi-industry association working to stimulate the understanding, adoption and widespread application of secure solutions, including smart cards, embedded chip technology, and related hardware and software. The Alliance invests heavily in education on the appropriate uses of secure technologies for authentication, commerce, and the Internet of Things to protect privacy and data. The Secure Technology Alliance engages its members to share their knowledge, experience, and thought leadership through training, research, publications, industry outreach and open forums in the U.S. and Latin America.The Secure Technology Alliance was formerly called the Smart Card Alliance, which changed …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

7 0 7 10
PCI Security Standards Council PCI Security Standards Council

Securing the future of payments together. The PCI Security Standards Council is a global open body formed to develop, enhance, disseminate and assist with the understanding of security standards for payment account security. The Council maintains, evolves, and promotes the Payment Card Industry Security Standards. It also provides critical tools needed for implementation of the standards such as assessment and scanning qualifications, self-assessment questionnaires, training and education, and product certification programs.

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

12 4 5 155
GlobalSign GlobalSign

Ask us about Atlas, GlobalSign’s next-generation, high-speed cloud certificate management engine. GlobalSign is the leading provider of trusted identity and security solutions. Enabling businesses, large enterprises, cloud service providers and IoT innovators around the world to secure online communications, manage millions of verified digital identities and automate authentication and encryption. Its high-scale Public Key Infrastructure (#PKI) and identity solutions support the billions of services, devices, people and things comprising the Internet of Everything (#IoE). PKI, SSL, Internet security, Digital Certificate deployments, SSL Certificates, Authentication, Online Security, Encryption Solutions, Identity and Access Management, Certificate Authority, Code Signing, Authentication, and Digital Signatures

Type: SMB Activities: IT Services Technologies: Cybersecurity IoT

20 1 18 484
Webroot Webroot

Webroot, an OpenText company, was the first to harness the cloud and artificial intelligence to stop zero-day threats in real time. We provide endpoint protection, network protection, and security awareness training solutions purpose built for managed service providers and small businesses. Webroot BrightCloud® Threat Intelligence Services are used by market leading companies like Cisco, F5 Networks, Citrix, Aruba, A10 Networks, and more. Leveraging the power of machine learning to protect millions of businesses and individuals, Webroot secures the connected world. In 2019, Webroot and its parent company Carbonite were acquired by OpenText, a global leader in Enterprise Information Management. Together, …

Type: SMB Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

12 0 0 290
Pipl Pipl

Stop fake profiles at signup with easy-to-implement and affordable trust decisioning tools Pipl is the identity trust company. Our solutions allow organizations to provide frictionless customer experiences and approve more transactions with greater confidence and speed. We use multivariate linking to establish deep connections among more than 330 billion trust signals—email, mobile phone and social media data that spans the globe—and then look at the big picture to derive identity trust. Learn more at pipl.com. Identity Verification, Fraud Prevention, Identity Resolution, Business Intelligence, Contact Enrichment, Identity Trust, Digital Trust & Safety, Digital Trust Policy, Stopping Fake Profiles, and Trust at …

Type: SMB Activities: IT Services regtech Technologies: Data Analytics

10 0 10 93
ERCOM ERCOM

Société du groupe Thales, Ercom sécurise vos communications, données et terminaux. Ercom, a Thales company, is a reference company with 30 years of combined expertise in two key areas: cybersecurity and communication networks. Being a reference company means providing clients with cutting edge solutions for their industry, combining certified security and simplicity in order to accelerate end-user adoption over a large range of devices. Ercom presents : - Cryptosmart, the only “Restricted” French, EU & NATO certified solution, jointly developed with Samsung, to secure devices and end-to-end mobile communications (voice, SMS and data) on consumer smartphones and tablets. - Cryptobox, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

7 0 7 154
Trail of Bits Trail of Bits

Deepening the Science of Security Since 2012, Trail of Bits has been the premier place for security experts to boldly advance security and address technology’s newest and most challenging risks. software security, reverse engineering, cryptography, blockchain, osquery, machine learning, binary analysis, blockchain, and Application Security

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Blockchain/Cryptocurrency

5 0 1 98
Tessian Tessian

Cloud Email Security that intelligently prevents advanced email threats and protects against data loss Tessian was acquired by Proofpoint. View the press release: https://www.proofpoint.com/us/newsroom/press-releases/proofpoint-closes-acquisition-tessian. To see what’s new, visit https://www.linkedin.com/company/proofpoint/. Tessian is a leading cloud email security platform that intelligently protects organizations against advanced threats and data loss on email, while coaching people about security threats in-the-moment. Using machine learning and behavioral data science, Tessian automatically stops threats that evade legacy Secure Email Gateways, including advanced phishing attacks, business email compromise, accidental data loss and insider threats. Tessian’s intelligent approach not only strengthens email security but also builds smarter security …

Type: SMB Startup Activities: IT Services Technologies: A.I. - Machine Learning Cybersecurity A.I. Data Analytics

2 0 2 115
TaliwareTM TaliwareTM

The next wave of cardiac ECG biometrics is here, where the unique rhythm of your heart is your biometric password. The Biombeat, a Patent Award-winning biometric technology by Taliware delivers true touchless login and location-based authentication using the unique rhythm of your heart as password. internet of things, identity management, authentication, geolocation, wearables, and security

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity

1 0 1 5
Specter Solutions Specter Solutions

Secure Bitcoin Solutions ● 1 of 21 Most Influential Bitcoin Companies Of 2020 Secure Bitcoin Solutions ● 1 of 21 Most Influential Bitcoin Projects And Companies Of 2020 Specter Desktop emerged as the easiest way to use your own bitcoin wallets directly with Bitcoin Core in 2020. ● This enabled a much more private and sovereign method than using hosted applications. ● While also providing much easier set up and use than previous Electrum-based alternatives. Source Link: https://lnkd.in/dp3AsmX Source: Bitcoin Magazine -21 Most Influential Bitcoin Projects And Companies Of 2020 ● We are building Secure Bitcoin Solutions. Why Bitcoin-Only? Because …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

0 0 0 2
Spanugo Spanugo

Spanugo is a world-leading company providing Cybersecurity Posture Assurance for the enterprise hybrid cloud. It accomplishes this by automating all aspects of Risk, Cybersecurity and Compliance assurance, including automating resource discovery, configuration management, and security best practices. Spanugo provides a unified single pane of glass view with comprehensive fine-grained visibility for all resources spanning the on-premises data center infrastructure, such as VM’s and physical machines, network elements and applications along with multi-cloud based infrastructure resources such as AWS/Azure Cloud accounts and services, cloud virtual machines and cloud-native applications. Spanugo’s agent-less architecture enables friction-less deployment in the enterprise hybrid cloud with …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 0 3
SocialProof Security SocialProof Security

Defend against cyber criminals with engaging security awareness videos, training, talks, and pentesting. Defend against cyber criminals with engaging security awareness and social engineering prevention videos, training, talks and penetration testing.

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 2
SecurityWeek SecurityWeek

Leading Source of Cybersecurity News, Insights and Expert Analysis. Industry-leading events portfolio SecurityWeek helps cybersecurity professionals do their jobs better by providing timely news, information, analysis and insights from experts in the trenches. Created by industry professionals and a seasoned news team, SecurityWeek produces actionable content and a portfolio of industry-leading events to help cybersecurity professionals around the globe defend their organizations from increasingly complex cyber threats. (www.securityweek.com) cybersecurity, news, events, IT security, conferences, cyberdefense, and SCADA

Type: Startup Activities: IT Services Technologies: Cybersecurity

18 4 12 7
Red Goat Cyber Security LLP Red Goat Cyber Security LLP

Training, Crisis Exercises and Consultancy Services Red Goat Cyber Security provides cyber crisis exercises and consultancy services along with awareness training and insider threat program development for organisations around the world. social engineering, Cyber Security, Training, Keynote Speaker, Exercising, Wargaming, cyber crisis exercising, and cyber security training

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 0 2
RangeForce RangeForce

Empowering cyber readiness for teams. Achieve true cyber readiness with the leading blue team training for SOC teams. Assess, refine, and validate skills needed to defend your organization against current cybersecurity threats. Cyber Security, Security Attack, Defense & Incident Response, Threat Intelligence, Security Monitoring, Incident Response, Security Simulations, Skills Assessment & Development, datasecurity, cybersecurity, infosecurity, webapplicationsecurity, Cyber Training, SOC team training, Cyber range, blue team , cyber upskilling, and cyber readiness

Type: Startup Activities: Games IT Services Technologies: Cybersecurity

3 0 2 79
Protect4S (a SecurityBridge company) Protect4S (a SecurityBridge company)

SAP Security Automation and Continuous Protection | Now a part of SecurityBridge Protect4S has joined forces with SecurityBridge to provide greater SAP Security. Join us on our new journey by following SecurityBridge! https://www.linkedin.com/company/securitybridge/ ​ Press Release: https://securitybridge.com/press/securitybridge-and-protect4s-are-joining-forces/ ​ SecurityBridge Website: https://securitybridge.com/ Protect4S builds SAP Platform Security software that enables SAP customers to continuously improve their SAP cybersecurity through automation and simplicity of use. Our mission is to make our SAP cybersecurity solutions accessible and affordable to everyone because we want to make the world a bit safer. To achieve this, we work closely with SAP service partners around the world …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 3 2
Pindrop Pindrop

Security, Identity & Intelligence On Every Voice Pindrop® solutions are leading the way to the future of voice by establishing the standard for security, identity, and trust for every voice interaction. Pindrop solutions protect some of the biggest banks, insurers, and retailers in the world using patented technology that extracts an unrivaled amount of intelligence from every call encountered. Pindrop solutions help detect fraudsters and authenticate callers, reducing fraud and operational costs, while improving customer experience and protecting brand reputation. Pindrop solutions have been implemented in 8 of the top 10 US banks and 5 of the top 7 US …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 283
Oppidum Security Oppidum Security

[Automatic translation follows] Expert consultants and proven solutions for cybersecurity projects. As a historical security expert in Microsoft 365 and Azure environments, we have noticed that the majority of attacks come from email. This is why we have developed particular expertise in email security, with particular attention paid to the implementation and maintenance of DMARC, as well as the development of our own innovative solutions. We also pride ourselves on protecting our clients' brands by neutralizing similar domain names, preventing spoofing or branding attacks. We are able to detect and neutralize fraudulent domains before hackers can use them to launch …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 2
EVERTRUST EVERTRUST

We manage your certificates wisely! Managing manually thousands of certificates is time consuming and without added value, moreover it is prone to errors. This is why we have designed two software programs to solve your different problems: Horizon and OCSP. The Horizon governance platform helps to avoid these operational risks. By using our tools, it will be possible to monitor non-compliance and future expirations as well as to gain responsiveness in the event of an incident or compromise. This platform makes it possible to centralize, automate and secure the certificate life cycle (enrollment, renewal, revocation, recovery) independently of the PKI …

Type: Startup Activities: IT Services Technologies: SaaS Cybersecurity

5 0 4 32
Nybble Security Nybble Security

The world's first Threat Bounty platform. Nybble provides an alert triage and incident management service thanks to the world’s first qualified analyst network. Clients, let our analysts categorize and answer your security alerts. Raise your defense level by engaging a Threat Bounty campaign. Get an immediate ROI on your detection platform. You’re an analyst or a hunter? Join our Blue Team community and get rewarded for your skills and hard work.

Type: Startup Activities: IT Services Technologies: Cybersecurity

13 2 8 5
GEOIDE Crypto&Com GEOIDE Crypto&Com

[Automatic translation follows] Designer of hypervision and cybersecurity solutions. Creator of products proven in armies, NATO and major accounts, GEOIDE Crypto&Com seeks to revolutionize the management of connected cities by providing innovative solutions ensuring both cybersecurity, optimized management and security in cities. The combined use of innovative technologies and highly secure GEOIDE solutions makes it possible to leverage the data essential for making the most critical decisions. SMART CITY GEOIDE develops tools to optimize the management of the urban environment. A true control center, our hypervisor makes it possible to optimize the effectiveness of public action and facilitate exchanges, while …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 12
Novidy's Novidy's

[Automatic translation follows] CS in Cybersecurity is an integrator specializing in Cybersecurity solutions, services and IT transformation. Novidy’s, the integration subsidiary of the Novidy’s Group, was founded in 2009. Specializing in the network and security market, it operates in the following areas of expertise: - Consulting and audit - Integration / support for latest generation security solutions - Social Security Services on security architectures Our specificity lies in our responsiveness, our ability to adapt to the customer context and to make the link between functional aspects and technical aspects thanks to a pool of experts. An element of distinction which …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 4 140
Ambionics Security Ambionics Security

By using an offensive attacker’s point of view, Ambionics Security has created an efficient and realistic approach which oversteps the limits of classical manual or automated assessment. Through the combination of its powerful technical platform and its team of experts in breach tactics, Ambionics Security provides to companies an innovative solution for continuous web application security assessment. Detecting, assessing and exploiting the real weaknesses of your web applications is the core of Ambionics Security. Our goal is to keep you one step ahead of cyber threats. Web Application Security and Offensive Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 6
Unicorn Security Unicorn Security

Helping companies of all sizes to thrive by protecting them against cyberattacks We help companies of all sizes to thrive by protecting their information system against future cyber-attacks. We offer different formats of IT security audits in order to adapt to the complexity of the system audited and the scope of the security checks needed. Contact us and make sure that your company network, website, application or IoT product is complying with all security standards!

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

2 0 2 7
v6Protect v6Protect

Analyze I Fix I Protect your web applications - SaaS v6Protect - Web Application Security v6Protect revolutionizes vulnerability monitoring and protection of Internet-exposed applications. Get powerful, intuitive, and automated solutions to secure your applications in a timely manner. The solution manages daily priorities: ✔️ Attack surface monitoring ✔️ Vulnerabilities management ✔️ Prioritization and vulnerabilities remediation plan ✔️ Compliance improvement ✔️ Web applications protection How it works ❓ Scoring View your Security Score daily, your vulnerabilities and simply track your risk. Easily define your priorities, get the key indicators. Alerting Stay informed daily about Zero Day vulnerabilities, receive targeted alerts of …

Type: Startup Activities: IT Services Technologies: Cybersecurity

11 2 10 13
Purplemet - Web Applications Attack Surface Management & Security Monitoring Purplemet - Web Applications Attack Surface Management & Security Monitoring

Follow your web application security exposure over time. Focus on key weaknesses and cybersecurity metrics. Purplemet is One-of-a-kind Web Application Security Monitoring SaaS solution focused on what hackers may see and exploit. It’s complementary to scanners enabling cyber hygiene on a URL portfolio while providing an additional list of vulnerabilities and technologies that makes Purplemet the fastest, most cost-effective, and the non-intrusive benchmark solution for web app security. Use Cases: • Closes gap on uncovered Web Applications that are out of scope for Web App vulnerabilty scans • Covers “blind period” on infrequently scanned web apps • Allows customers without …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 4
Pragma Security Pragma Security

[Automatic translation follows] Your managed cybersecurity partner in France French specialist in managed cybersecurity, Pragma Security offers flexible and scalable cloud protection to media, websites, e-commerce and other web applications. With a network of more than 1Tbit/s, Pragma Security adapts to different needs from 1Gbit/s. DDoS, Peering, BGP routing, Cybersecurity, Cyber ​​Security, DNS Protection, WAF, Web Application Firewall, and Web Firewall

Type: Startup Activities: IT Services e-commerce Technologies: Cybersecurity

0 0 0 2
Malizen Malizen

The all-in-one platform to accelerate your cybersecurity operations. Data visualization to better explore and understand complex cybersecurity data. Machine learning algorithms to support and multiply the capacities of teams. A full visual environment to boost your cybersecurity teams. Dataviz, Deeptech, Cybersecurity, Cyberinvestigation, Start up, Frenchtech, Threat Hunting, SOC, and CERT

Type: Startup Activities: deeptech IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity Data Analytics

25 5 22 7
Ravel Technologies Ravel Technologies

[Automatic translation follows] . .

Type: Startup Activities: IT Services

0 0 0 10
Belgian Cyber Security Coalition Belgian Cyber Security Coalition

Promotes a vibrant and robust cybersecurity ecosystem in Belgium by bringing together experts across sectors The Cyber Security Coalition is a unique partnership between players from the academic world, the public authorities and the private sector to join forces in the fight against cybercrime. Currently more than 170 key players from across these 3 sectors are active members. Our mission is to bolster Belgium’s cyber security resilience by building a strong cyber security ecosystem at national level. We do so by bringing together the skills and expertise of the academic world, the private sector and public authorities on a trust-based …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

15 2 14 32
Malware Patrol Malware Patrol

Since 2005, we've provided actionable threat intelligence to prevent, detect and respond to cyber attacks. Malware Patrol has provided cyber threat intelligence since 2005. Enterprises and members of our community in more than 175 countries use our up-to-the-minute data for threat research and hunting, incident response, and network protection. Our machine readable feeds are available in predefined and customized formats, compatible with the most popular security systems, including: Cisco ASA, Fortinet FortiGate Firewall, Palo Alto Firewall, Mikrotik, MISP, pfSense, Squid, among others Protect your company from unwanted cyber attacks. For a FREE evaluation of our data feeds, send us a …

Type: SMB Activities: IT Services Technologies: Cybersecurity

3 0 1 8
Alert Logic Alert Logic

Cybersecurity made easy with MDR, XDR, and Managed WAF solutions. Alert Logic is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Achieve comprehensive security coverage with managed detection and response (MDR), extended detection and response (XDR) and managed web application firewall (WAF) solutions for public cloud, hybrid, and on-premises environments. Security-as-a-Service, Vulnerability Assessment, Intrusion Detection, Threat Management, Log Management, Compliance, Web Application Security, 24x7 Security Research and Operations, SaaS, Cloud Security, MDR, Managed Detection and Response, Web Application Firewall, Cybersecurity, WAF, and XDR

Type: SMB Activities: IT Services Technologies: Cybersecurity

15 2 6 271
I-TRACING I-TRACING

CYBERSECURITY SERVICES I-TRACING, pure player and cybersecurity service provider leader in France, supports over 400 clients around the world in managing their cyber risks, from anticipating threats to maintain the highest level of security for their systems and assets, to the ability to respond in case of attacks to minimize consequences. I-TRACING generated a revenue of 90 million euros in 2022 and has 450 employees in France, as well as in London, Hong Kong, and Montreal. Through a broad range of cybersecurity services, from consulting to integration to managed services, SOC, and CERT, I-TRACING brings together all the technical expertise …

Type: SMB Activities: privacytech IT Services Technologies: Cybersecurity

9 1 9 510
Intezer Intezer

Leave the SOC grunt work to technology. Keep noise, false positives, and alerts from overwhelming your security team. Leave the SOC grunt work to Intezer. Automatically triage alerts 24/7, respond faster, and cut out noise & false positives. Try free: analyze.intezer.com Malware Analysis, Threat Detection, Incident Response, Cybersecurity, Malware Classification, Threat Hunting, DFIR, Memory Forensics, Digital Forensics, Reverse Engineering, Security Operations, Memory Analysis, Attribution, Threat Research, Threat Intelligence, YARA, Disk Image Forensics, File Scanning, URL Scanning, Sandboxing, Attribution, Memory Dump Scanning, Alert Triage, and SOC Automation

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 43
Hacker House Hacker House

All computers are Broken. Let us show you how to secure them. Hacker House is the global portal for skills training, security services, cyber arms, and defense products. We train individuals and organizations to be self-sufficient in all things cyber security. Hacker House is a team of computer hackers seeking innovation within the information security industry. Hacker House provides offensive security solutions so you can understand the real-world risks that impact on your business. Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied. Hacker House's …

Type: Startup Activities: edtech Technologies: Cybersecurity

0 0 0 10
Nucleaus Nucleaus

NucleausTM is an application security platform that continuously monitors your code repositories #SAST #spellcheckforcode NucleausTM continuously monitors your code repositories and reports back vulnerabilities and dependencies before that code causes risks. Offering a consistent platform process with minimal learning curve, simple to use interface, remediation strategy reports and NIST conformance status, NucleausTM enables transparency and risk management to code repositories. Security as a Service, Application Security Programs, Application Security Testing, Application Security, and Web Application Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 10
Global-e Datacenter BV Global-e Datacenter BV

An optimally equipped, sustainable and secure colocation for your ICT servers? Global-e Datacenter BV is a modern carrier-neutral datacenter located in the south of the Netherlands (Rijen). Your data is safely stored in our datacenters. We are centrally located to the cities of Rotterdam, Antwerp and Eindhoven. We focus on high availability, reliability and security. Our state of the art datacenters meet all high standards. If you choose to connect to Global-e Datacenter, you will have a direct connection between your office, our datacenter, the Internet and the cloud. Through the network of Global-e Datacenter you have quick access to …

Type: Startup Activities: IT Services telecommunications Technologies: Cybersecurity

3 0 1 5
Fidesmo Fidesmo

Bringing security to the ever-growing world of contactless transactions. Fidesmo brings security to the ever-growing world of contactless transactions. We unite service providers and device manufacturers in a single, secure and scalable NFC platform on a global scale – opening up a world of opportunities to the untapped potential of contactless transactions. Fidesmo is a Swedish tech company founded in 2013, with headquarters in Stockholm and R&D offices in Madrid. Read more at fidesmo.com. Near Field Communications, Trusted Service Manager, Mobile security, SmartCard applications management, Mifare For Mobile, Wearable payments, Tokenization, Digital Wallets, Access Credenitals, and Mobile Access Credentials

Type: Startup Activities: fintech Technologies: NFC Wireless

4 0 4 26
Cytomic Cytomic

Unit of Panda Security for Greater Understanding Cytomic is the business unit of Panda Security specialized in the largest enterprises, with the most advanced cybersecurity solutions and services: EDR, EPP, Threat Hunting, Investigation Service, Deep Learning and Behavior Certification for endpoints, processes and users. Because a system is much more than the sum of its parts. In order to perceive reality, we must pay attention to the bonds. Not a single process exists separately from the rest. Everything is related. We managed to see and understand all those bonds Only then are we able to think ahead of everyone else …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Deep Learning Cybersecurity

0 0 0 10
Hive Systems Hive Systems

Hive Systems provides smarter cybersecurity solutions with our trusted experts Hive Systems is a state-of-the-art cybersecurity company. We specialize in tailored solutions that unify risk assessments, IT, security awareness, and cybersecurity operations for businesses of all sizes. Our team has distinguished cybersecurity expertise in a vast array of industries including the public, private, and military sectors. Hive Systems is under the leadership of some of the brightest minds in cybersecurity and business as part of our executive team and advisory council. Alex Nette, our CEO and Co-founder, has a deep passion for cybersecurity and the role it plays in today’s …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 10