Entities
LogoName Σ Employees
Alertra Alertra

Established April, 2000, Alertra has become a leading provider of Internet server monitoring and alerting services. Our U.S. headquarters is located in the historic W.E. Going (Town Center) building in downtown Stillwater, Oklahoma. Stillwater is 50 miles northeast of Oklahoma City and is the home of Oklahoma State University. Yahoo! Internet Life Magazine named Stillwater "One of America's Most Wired Cities." Our building is also home to a local Internet service provider and some other technology companies. Our monitoring servers are located around the world in Equinix, Telehouse and similar carrier-class data centers. Alertra monitors the availability, performance and security …

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 0 0 2
DomainTools DomainTools

Detect. Investigate. Prevent. DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know. The world's most advanced security teams use our solutions to identify external risks, investigate threats, and proactively protect their organizations in a constantly evolving threat landscape. DomainTools constantly monitors the Internet and brings together the most comprehensive and trusted domain, website and DNS data to provide immediate context and machine-learning driven risk analytics delivered in near real-time. Visit domaintools.com to experience firsthand why DomainTools is the first stop for advanced security teams when they need to know. …

Type: SMB Activities: IT Services Technologies: Cybersecurity A.I. - Machine Learning A.I.

4 0 0 134
IOActive, Inc. IOActive, Inc.

Research-fueled Security Services IOActive is a trusted partner for Global 1000 enterprises, providing research-fueled security services across all industries. Our cutting-edge security teams provide highly specialized technical and programmatic services including full stack penetration testing, program efficacy assessments, and hardware hacking. IOActive brings a unique attacker’s perspective to every client engagement to maximize security investments and improve client’s overall security posture and business resiliency. Passion and pride through quality client work is something money simply can't buy. IOActive has spent more than a decade searching for the required blend of characteristics and work ethic that comprise a world-class, international security …

Type: SMB Activities: IT Services Technologies: Cybersecurity IoT

5 0 0 144
Illinois Department of Innovation & Technology (DoIT) Illinois Department of Innovation & Technology (DoIT)

DoIT guides technology solution delivery and support for the agencies in the executive branch of state government. Vision Reimagine Illinois government through innovation Mission Improve access to government services by leveraging modern technologies Values Teamwork, Reliability, Upskilling, Service, Transparency Background: The Department of Innovation & Technology (DoIT) became an agency by statute on July 20, 2018 being charged with responsibility for the information technology functions of agencies under the jurisdiction of the governor. DoIT is leading a digital transformation toward an enterprise approach to technology at the State of Illinois to gain efficiencies and improve service delivery for customer agencies …

Type: Public Activities: IT Services Technologies: Data Analytics

5 0 2 370
Personal Data - WeAreProject Personal Data - WeAreProject

[Automatic translation follows] Specialized in IT infrastructure solutions for management, virtualization, security and business continuity Personal Data Srl, an IT company in Brescia since 1981. Specialized in customized infrastructure solutions for the management, virtualization, security and business continuity of IT systems. The Personal Data Business Units are dedicated to the development of software programs for business management and System Integration and Security. Since 2012, Personal Data has been part of the Project Informatica Group, an Italian leader in the IT sector with numerous owned offices and data centers. As a System Integrator, Personal Data accompanies private and public companies in …

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 0 5 43
Cyberdian Groupe Cyberdian Groupe

[Automatic translation follows] WE ARE COMMITTED TO BEING ONE OF THE FRANCE'S LEADING PROACTIVE CYBERSECURITY CONSULTING COMPANY Created in January 2017, Cyberdian is a cybersecurity consultancy specializing in support, risk analysis, strategy and the implementation of technical and human resources to deal with internal and external IT threats. Bringing together a team of 5 employees, Cyberdian aims to remain a Digital Service Company (ESN) on a human scale. “We work on the two main aspects of cybersecurity: strategy and operational. Our values ​​are excellence, quality, customer satisfaction as well as the loyalty of our customers and associated consultants” IT security, …

Type: SMB Activities: Consulting Technologies: Cybersecurity

9 1 8 15
CIV by Etix Everywhere CIV by Etix Everywhere

[Automatic translation follows] CIV becomes CIV by Etix Everywhere! A pioneer in the creation of server rooms and a recognized player for its green data center solutions, CIV joined the Etix group, leader in edge data centers and became CIV by Etix Everywhere. Proximity, availability, innovation, these are the values ​​of CIV by Etix Everywhere to support you on a daily basis in your projects. Our commitment ? Bring you a secure, sovereign hosting offer while enhancing your energy impact for the benefit of a committed eco-responsible approach. All of our expertise, certifications, allow us to deliver the highest level …

Type: SMB Activities: IT Services Technologies: Data Analytics

3 0 3 17
ARKHINEO ARKHINEO

[Automatic translation follows] Arkhineo, a solution from the Docaposte group, is the first French electronic archiving solution with probative value. Created in 2001, CDC Arkhinéo, Caisse des Dépôts group, trusted third-party archiver, is the first French archiving company with probative value for electronic data (120 million documents archived in 2011). Thanks to its unique Electronic Safe® solution in SaaS mode, CDC Arkhinéo ensures the integrity and long-term conservation of all types of electronic documents (invoices, pay slips, loan contracts, employment contracts, emails, tokens timestamps, evidence files, etc.). CDC Arkhinéo is committed to all stages of the process: guarantee of data …

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 0 5 11
ReFirm Labs, Inc. ReFirm Labs, Inc.

Type: Startup Activities: IT Services transporttech regtech

4 0 1 1
PAPAYA project PAPAYA project

Type: Startup Activities: IT Services privacytech

1 0 0 N/A
PixelPin PixelPin

Lock in at Login - Increase Marketing ROI - Improve customer's Digital Experience If you could remove the friction from your customer's digital journey across any digital channel, suddenly the pain and awkwardness of meaningless and insecure passwords becomes a huge opportunity. PixelPin helps you retain the loyalty of your existing customers, cost effectively attract new customers and in doing so make your customers journey simple and secure. Designed to benefit Chief Marketing Officers, Digital Innovators, Customer Experience and Security Leaders. PixelPin specialises in Retail, Entertainment, Travel & Leisure industries, helping their customers fully engage through all digital channels across …

Type: Startup Activities: IT Services Technologies: Data Analytics

11 6 8 1
Seald Seald

The embedded protection for documents Empathy. Honesty. Playfulness. Craftsmanship. Solidarity — these are some of the values we live by, as a company. We work by them too: we’re building a product we believe in — we bring security and control over your company's data, wherever it's sent or stored. See https://www.seald.io cybersecurity, encryption, data security, end-to-end encryption, and data protection

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

17 8 10 9
BitLogiK BitLogiK

Specific infosec : Access, Payments, Blockchain, Privacy Specific infosec : Access, Payments, Blockchain, Privacy. Security systems design and review. Analysis and improving cryptographic implementations. Secret keys and data protection. infosec, blockchain, payments, access systems, cryptography, cloud, and privacy

Type: Startup Activities: privacytech IT Services Technologies: Blockchain/Cryptocurrency

1 0 0 1
Shadline Shadline

The Autonomous Cyber Shelter. The 1st anti-crisis solution with tamper-proof communications and vital data access. The first autonomous digital survival system. Major attack or ransomware: Shadline combines collaborative tools and guaranteed access to your vital data to overcome crises. All your employees and partners can use Shadline on a daily basis or as an immediately operational digital fallback environment in the event of a crisis. Keep a footprint of your key data and keep working whatever happens: fulfill your obligations, ensure business continuity and speed up recovery. Defeat cyber attacks! Now, you can get ready. confiance digitale, sécurisée par conception, …

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics

2 1 2 11
Cypheme Cypheme

The Breakthrough Anti-counterfeit Technology Cypheme is an anti-counterfeit service provider that uses artificial intelligence to detect counterfeit products by analyzing the product's packaging with a neural network, using only a cellphone camera. Cypheme is a smartphone-based anti-counterfeit system. A mobile app using machine-learning powered pattern-recognition, it will allow anyone, anywhere, to verify the authenticity of the products adopting the technology. To know more about us : Website - https://cypheme.com/ Twitter - https://twitter.com/cypheme Facebook - https://www.facebook.com/cypheme YouTube: https://www.youtube.com/channel/UC-GeYZVUJuvodHograYDTtQ Anti-Counterfeit Technology, Brand Protection, Artificial Intelligence, and Artificial Neural Network

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Deep Learning

0 0 0 22
Ledger Ledger

Ledger is your gateway to securing, buying, and managing crypto safely. Founded in Paris in 2014, LEDGER is a global platform for digital assets and Web3. Ledger is already the world leader in Critical Digital Asset security and utility. With more than 6M devices sold to consumers in 200 countries and 10+ languages, 100+ financial institutions and brands as customers, 20% of the world’s crypto assets are secured, plus services supporting trading, buying, spending, earning, and NFTs. LEDGER’s products include: Ledger Stax, Nano S Plus, Nano X hardware wallets, LEDGER Live companion app, [ LEDGER ] Market, the world’s first …

Tags: FrenchTech120 Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency Cybersecurity

120 59 51 708
SecludIT - Ahead of Security SecludIT - Ahead of Security

Founded by security experts together with EURECOM, a French research institute in telecom and network security, SecludIT has developed Elastic Security, a set of products and services specifically designed to help cloud infrastructure providers and users to safely migrate to the cloud. Since its creation in 2011, SecludIT has become a recognized industry player, one of the Cloud Security Alliance founders and active member, co-author of Security Best Practices 2.1. SecludIT is a technology partner of Amazon Web Services, HP Cloud, VMware and Eucalyptus. Cloud Computing, Security, IaaS, Monitoring, Automation, Vulnerability Assessment, Audit, Amazon Web Services (AWS EC2 & VPC), …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
inWebo inWebo

The Simple Key to High Security - our strong authentication solution protects B2B or B2C applications from phishing Founded in 2008, inWebo is a major international player in the cybersecurity industry that offers an Identity & Access Management solution including: - inWebo adaptive & passwordless MFA that secures access to B2B and B2C applications by combining the highest level of security on the market with a seamless user experience, freeing them from equipment constraints, thanks to its SaaS mode and multiple tokens. - A CIAM orchestrator to create frictionless, personalized and secure access journeys using a graphical interface or low …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 57
Pradeo Pradeo

Be simply mobile, we take care of the rest. Pradeo is a global leader of mobile security. The company ensures the protection of all mobile usages, by offering services dedicated to securing smartphones, tablets and mobile applications. Pradeo's cutting-edge AI-based technology, Pradeo Security, is recognized as one of the most advanced mobile security technologies by Gartner, IDC, Frost & Sullivan and Forrester. It provides a reliable protection from mobile threats to prevent data leakage and reinforce compliance with data privacy regulations. Pradeo counts Governments, public administrations and Fortune 500 companies among its clients. Along the years, Pradeo has developed strong …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 2 2 42
OneWave OneWave

[Automatic translation follows] OneWave radically simplifies enterprise authentication. OneWave radically simplifies enterprise authentication. Humans are the primary vector of cyberattacks, yet effectively blocked by strong authentication. And you, have you activated it on your sensitive services? No way ? Not enough ? OneWave removes the complexity of strong authentication to democratize it. With our innovative biometric card, authenticating securely has never been easier for teams. Administration becomes a formality for the IT department. OneWave is: 🔹 The end of cybersecurity reserved for experts: basic use thanks to technologies mastered by everyone (Bluetooth, Biometrics, card format). The complexity of the most …

Type: Startup Activities: consumer services Technologies: Cybersecurity IoT SaaS Sensors Wireless

22 6 13 21
Alsid Alsid

A $1.5-trillion cybercrime industry is evolving faster than your defenses. They say there’s no gain without pain. We’re not buying that. Welcome to Alsid, the creators of the AD security solution built on 4 pillars: FIX existing weaknesses with intel-driven insights, threat scores, cost estimates, and custom step-by-step recommendations. HARDEN against future vulnerabilities to break attack paths and keep your threat exposure in check. DETECT attacks in real time with continuous IoE monitoring and empower your threat hunters with AD-native investigation capabilities. RESPOND to threats at machine-speed, replay attacks to hunt for patient zero, and kick persistence mechanisms out for …

Type: Startup Activities: IT Services Technologies: Cybersecurity

11 4 3 14
CopSonic CopSonic

Universal and secure ultrasound communication Launched in September 2013, CopSonic is developing and marketing a technology which allows communication between electronic devices based on ultrasounds as a way to interact or transmit data. This patented technology is distributed as an SDK which allows B2B partners to integrate this new communication channel within their existing vertical activities and environments. The CopSonic technology is a new universal contactless communication protocol for digital security, smart detection and IoT connectivity. It is already available for the billions of smart devices existing worldwide: feature phones, smartphones, tablets, TV-box, computers, vocal assistants, game consoles, Internet of …

Type: Startup Activities: IT Services Technologies: Wireless Sensors IoT

0 0 0 6
TYREX CYBER (ex KUB) TYREX CYBER (ex KUB)

[Automatic translation follows] TYREX, LEADER IN DECONTAMINATION OF USB DEVICES Born from the French Defense industry, TYREX is the leader in antivirus and antimalware white station solutions for all removable USB devices. TYREX stations feature rugged hardware and software: designed to be ergonomic, reliable and secure, the solution adapts to all uses, all IT or OT architectures and all regulations. Every day, our customers use the approximately 3,000 TYREX stations in production on their offshore platforms, their ships, their industrial facilities and in their offices, to operate with confidence in sensitive and critical environments. White Station, Terminal Antivirus, Security, Cybersecurity, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 1 3 19
FIRST France FIRST France

Resilience, Security and Trust first To build a safer Europe and seize digital opportunities with trust, we decided to work together

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
Parsec Parsec

[Automatic translation follows] Trust the cloud PARSEC is a Zero Trust solution for cybersecurity of sensitive data developed in partnership with the Directorate General of Armaments and the Bordeaux Computer Science Research Laboratory. Parsec is CSPN certified by ANSSI and a member of the LaPlace Stratégique business accelerator, an ecosystem supported by AID, the DGA, the National Gendarmerie, Thales and many other industrial groups. Functionally, the solution allows you to share, partition and store sensitive data in the cloud, whether private or public. Parsec relies on the technological innovations of Zero Trust and Zero knowledge. The objectives of PARSEC are: …

Type: Startup Activities: IT Services Technologies: Data Analytics

10 3 0 18
TrustHQ TrustHQ

TrustHQ, helping CISO save time and risk mitigation and compliance TrustHQ is the 1st Solution for CISO to drive and track cybersecurity compliance and Risk mitigation progress. -- Map internal information security and compliance requirements to any standard (ISO 2700x, II901, ISA, NIST, GDPR, PCI...), -- Assign compliance tasks to internal teams, -- Fill in and visualize progress across the company, collect and centralize proofs of compliance, -- Check at any point in time your compliance maturity and risk mitigation (ISSP, ISO...) via intuitive dashboards. TrustHQ provides CISO with an efficient and adapted cybersecurity compliance management solution to seamlessly drive …

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity

11 2 8 16
defants defants

Collaborative & Automated Solutions We develop collaborative and automated solutions to accelerate DFIR and Threat Hunting missions through our semantic investigation-based approach. Cybersecurity, Software-as-a-Service, Incident Response, Digital Forensic, Incident Anticipation, and Threat Intelligence

Type: Startup Activities: IT Services Technologies: Cybersecurity SaaS

19 9 15 22
kamaé kamaé

[Automatic translation follows] kamaé - your cybersecurity dojo Join the kamaé dojo ⛩️! Kamaé is the simple and gamified cyber risk awareness platform. Protect your data and activities by developing your security culture: 🛡️ Training designed by cybersecurity and GDPR experts 🎮 An ultra-gamified experience: belt passes like in judo! 🤩 A very easy-to-use platform for employees and the back office The Kamaé platform boosts your defense, by quickly strengthening employees and engaging them sustainably 👉 micro-learnings, phishing tests, reflex sheets and a dedicated dashboard to monitor your progress. Would you like to take a trial lesson? It’s this way …

Type: Startup Activities: IT Services Technologies: Cybersecurity

11 3 9 12
Ingecom Ingecom

[Automatic translation follows] Are you sure you want to do business? Well, start by making your business secure. Ingecom is a Value Added Distributor (VAD) specialized in cybersecurity solutions, OT/ICS cybersecurity, IToT and IoT cyber intelligence and cyber intelligence solutions, founded in 1996 in Bilbao. We provide tested and approved solutions to security and networking integrators. We are constantly in contact with new technologies that appear on the market, so that any technological evolution can be applied to our clients as soon as possible. With headquarters in Bilbao, Ingecom has offices in Madrid, Lisbon (Portugal) and Milan (Italy), as well …

Type: SMB Activities: IT Services Technologies: Cybersecurity IoT

3 0 2 107
Keyfactor Keyfactor

Identity-first security for every machine. Keyfactor brings digital trust to the hyper-connected world with identity-first security for every machine and human. By simplifying PKI, automating certificate lifecycle management, and securing every device, workload, and thing, Keyfactor helps organizations move fast to establish digital trust at scale — and then maintain it. In a zero-trust world, every machine needs an identity and every identity must be managed. For more, visit keyfactor.com or follow @keyfactor. Identity & Access Management, SaaS, IoT Security, Public Key Infrastructure, cybersecurity, software, enterprise software, enterprise cybersecurity, PKI, PKIaaS, IIoT Security, CLA, and Certificate Lifecycle Automation

Type: SMB Activities: IT Services Technologies: Cybersecurity

8 1 6 437
DIATEAM DIATEAM

A Cy4gate company #CyberRange #HandsOn #Training Founded in 2002, on the French MoD needs, DIATEAM is a R&D company specializing in computer security. DIATEAM develops highly innovative cyber range platforms and Industry-leading systems for cybersecurity training and testing labs. With its Cyber Range, which already equips many strategic organizations, DIATEAM is now well known as a major cybersecurity player in Europe. In the field of learn-by-doing cybersecurity, DIATEAM has partnered with Thales in launching a Cyber Range Solution benefiting some large businesses and Governement Entities worldwide. cyber range, cybersécurité, virtualisation, développement logiciel, formation, systèmes industriels, red team, développement matériel, software …

Type: SMB Activities: IT Services Technologies: Cybersecurity

17 8 11 26
Exclusive Networks Exclusive Networks

A global trusted cybersecurity specialist for digital infrastructure Exclusive Networks is a global trusted cybersecurity specialist for digital infrastructure helping to drive the transition to a totally trusted digital future for all people and organisations. Our distinctive approach to distribution gives partners more opportunity and more customer relevance. Our specialism is their strength – equipping them to capitalise on rapidly evolving technologies and transformative business models. The Exclusive story is a global one with a services-first ideology at its core, harnessing innovation and disruption to deliver partner value. With offices in 43 countries and the ability to service customers in …

Type: Large company

7 0 7 2,363
Toulouse Hacking Convention Toulouse Hacking Convention

[Automatic translation follows] The Toulouse Hacking Convention is a meeting event between IT security enthusiasts (researchers, industry professionals and students) with two days of conferences in a friendly atmosphere (social event, all-you-can-eat coffee and buffet, gifts, etc.) as well as as a “Capture The Flag” type competition on the 3rd day. The Toulouse Hacking Convention is supported by TLS-SEC information systems security training, provided by ENSEEIHT, ENAC and INSA. cybersecurity and events

Type: Event

7 0 7 3
Nomios France Nomios France

[Automatic translation follows] Cybersecurity experts since 2004 Nomios has been a cybersecurity integrator since 2004, born from the observation that security in businesses was a specialist profession. Businesses need tailor-made support, with very specific expertise. Infrastructure and cybersecurity topics are specific to each company's applications, data and businesses. Our engineers are experts in different fields, and support our customers in the integration and maintenance in operational conditions of the solutions of our publishing partners. Our catalog is made up of selected and complementary products, in which we invest heavily. Service and volume commitments are made with publishers. Our engineers are …

Type: SMB Activities: IT Services Technologies: Cybersecurity

11 1 8 251
Melius Cyber Melius Cyber

Cyber security for all | greater-depth vulnerability scanning/management | Cyber Essentials | CE Plus | ISO27001 Melius Cyber developed a world-leading SaaS platform, Cyber Safe, built around continuous assessment and continuous improvement through vulnerability scanning, penetration testing with built-in decision trees and machine learning to simulate brute force attacks on discovered vulnerabilities. Cyber Safe is also your framework for Cyber Essentials Plus (CE+) and will reduce the person-hours in half that is needed to implement CE+ in the first year and by up to 75% in the following years. More and more businesses will be looking to see their supply …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 12
ResQuant ResQuant

Pioneering the post-quantum revolution in hardware security. With our cryptography accelerator any electronic device can be protected against quantum computer attacks. We use post-quantum standards recommended by National Institute of Standards and Technology (NIST) for secure end-to-end encryption. One of the main features of our solution is crypto agility, enabling a wide area of application. post-quantum cryptography, side-channel protection, crypto-agility, encryption, post-quantum secureness, and cybersecurity

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency Cybersecurity

1 0 1 4
Quantum Blocks Inc Quantum Blocks Inc

Quantum computing algorithm development for (Blockchain and other) cryptography and cryptoanalysis projects. Fusion of Quantum Computing and Blockchain Tech: "we let Schrodinger's cat play with blocks"​. Among other things, we are working on quNIX - to provide a workable Quantum Computer OS for algorithms and applications. Focus Areas: Algorithms - Cryptography and Crypto Analysis Applications - Military-Grade Blockchain Solutions & Enhancements Quantum Blocks Inc is a RLC, Delaware, Company Quantum Computing, Blockchain, Cryptography, Crypto Analysis, Digital Ledgers, quNIX, and MIL-TEC

Type: Startup Activities: IT Services deeptech Technologies: Blockchain/Cryptocurrency

0 0 0 3
Anomali Anomali

The Leading AI-Powered Security Operations Platform Anomali is a revolutionary AI-Powered Security Operations Platform that is the first and only solution to bring together security operations and defense capabilities into one proprietary cloud-native big data solution. At the center of it is the best-in-class omnipresent and intelligent Anomali Copilot that automates routine tasks and empowers teams to deliver the requisite risk insights. A recognized security analytics leader with the largest global repository of actioned intelligence, customers rely on Anomali to consolidate their tech stack and give them unprecedented speed, scale, and performance at a lower cost. Be Different. Be the …

Type: Startup Activities: IT Services Technologies: A.I. Cybersecurity Data Analytics

9 1 8 301
Axio Axio

Optimize Investment. Minimize Cyber Risk. Axio is the leader in SaaS-based cyber management software, which empowers security leaders to build and optimize security programs and quantify risk in financial terms. Axio360 is the only cyber risk management platform to align security leaders, business leaders, and Boards of Directors around a single source of truth about their most critical corporate risks. Since 2016, Axio has been a trusted partner to many of the world’s leading critical infrastructure, energy, manufacturing, and financial services companies, helping drive better visibility and decision-making about cybersecurity priorities and investments. For more information visit axio.com Risk Management, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 1 94
NOFTEK LLC NOFTEK LLC

Fortifying Healthcare SMBs with Human-Centric Cyber Resilience Empowering Cyber Resilience for Healthcare Organizations At NOFTEK, we empower healthcare organizations to build cyber resilience through our human-centric, integrated risk management approach. Our mission is to provide clarity and control, enabling businesses to navigate cybersecurity and compliance complexities confidently. We're confident in our core values of integrity, trust, and service, and we'll take a consultative approach that aligns with your unique business objectives. Our experienced team conducts comprehensive assessments, quantifies risks, and implements tailored solutions, allowing you to focus on your core mission. Our AI-powered platform delivers: - Real-time threat prevention across …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 3
DataDome DataDome

DataDome's bot and online fraud protection detects and mitigates attacks with unparalleled accuracy and zero compromise. DataDome’s bot and online fraud protection detects and mitigates attacks with unparalleled accuracy and zero compromise. Our machine learning solution analyzes 5 trillion signals per day to adapt to new threats in real time. Hundreds of enterprises worldwide—including Rakuten, AllTrails, Scentbird and Helly Hansen—trust DataDome’s solution and 24/7 SOC and Threat Research experts to protect their mobile apps, websites, and APIs against online fraud, ATO, carding, scraping, layer 7 DDoS, credential stuffing, and more. A force multiplier for IT and security teams, DataDome is …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I. A.I. - Machine Learning

4 2 2 194
SafeBreach SafeBreach

Validate Your Controls. Maximize their Effectiveness. Drive Risk Down. Combining the mindset of a CISO and the toolset of a hacker, SafeBreach is the pioneer in breach-and-attack simulation (BAS) and is the most widely used platform for continuous security validation. SafeBreach continuously executes attacks, correlates results to help visualize security gaps, and leverages contextual insights to highlight remediation efforts. With its Hacker’s PlaybookTM, the industry’s most extensive collection of attack data enabled by state-of-the-art threat intelligence research, SafeBreach empowers organizations to get proactive about security with a simple approach that replaces hope with data. We’re looking for hackers and trailblazers …

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 2 4 134
Codeproof Technologies Inc Codeproof Technologies Inc

Modern Endpoint Management Platform for SME. Dead Easy To Use. #CyberSecurity #MobileDeviceManagement #UEM #BYOD Embrace the power of mobility to grow your business as a mobile-first enterprise. The comprehensive Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more. The SaaS enterprise mobile security platform is built on the elastic cloud stack for flexible, scalable, secure and productive mobility operations. The Codeproof cloud console enables centralized Mobile Application Management, Mobile Content Management and Mobile Device Management. The platform boasts Geofencing and time-based policy enforcement to manage your …

Type: Startup Activities: IT Services Technologies: IoT Cybersecurity

8 0 8 18
ReliaQuest Threat Research ReliaQuest Threat Research

Identify Unwanted Exposure Online: Data Loss Detection, Online Brand Security, Attack Surface Reduction Digital Shadows, a ReliaQuest company, minimizes digital risk by identifying unwanted exposure and protecting against external threats. Organizations can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital Shadows SearchLightTM helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface. To learn more and get free access to SearchLight, visit www.digitalshadows.com. Digital Risk, Reputational Risks, Cyber Security, Cyber Intelligence, Data Leakage, Cyber Monitoring, Threat Intelligence, Digital Risk Monitoring, Digital Risk Management, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

26 8 9 36
Cloudflare Area 1 Security Cloudflare Area 1 Security

The preemptive, comprehensive, contextual, and continuous Cloud Email Security service. Acquired by Cloudflare Cloudflare Area 1 is a cloud-native email security service that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email Compromise (BEC), and other advanced threats that evade existing defenses. Area 1 is part of the Cloudflare Zero Trust platform. Acquired by Cloudflare in April 2022 Security, Big Data, Phishing, Social Engineering, Cybersecurity, Threat Intelligence, BEC, Email Security, Cloud Security, Threat and Malware Protection, Web Security, Network Security, Services for Office 365, Services for Gmail, and email protection

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics

0 0 0 30
CUJO AI CUJO AI

Global leader in AI-powered cybersecurity and device intelligence solutions for network providers and their subscribers CUJO AI is the global leader of cutting-edge cybersecurity and network intelligence solutions that enable network operators globally to improve the digital life protection of their customers in and outside the home. By pioneering AI-powered cybersecurity and empowering a growing ecosystem of OEM partners, CUJO AI helps major ISPs around the world to protect their subscribers. Mobile and fixed network operators use our holistic capabilities to improve their customer value proposition, monetize their networks, and reduce operating complexity and costs. The CUJO AI Platform powers …

Type: Startup Activities: IT Services Technologies: IoT Cybersecurity Data Analytics SaaS A.I. - Machine Learning A.I.

5 1 3 179
Bearer Bearer

Redefining what code security can do for you. Developer-first modern SAST solution. Bearer helps modern teams ship trustworthy products with the help of our code security solution built for security, privacy and engineering teams. We combine sensitive data context with static code analysis to make security and privacy engineering simpler and smarter to maximize the ROI for your DevSecOps and central security team driven programs. For enterprises, we offer Bearer Cloud to manage product and application security at scale with deep sensitive data context. This is powered by Bearer CLI, an open-source static code analysis product with sensitive data context …

Type: Startup Activities: IT Services Technologies: Cybersecurity

12 0 12 24
CyCognito CyCognito

External Attack Surface Management See Exactly What Attackers See. Take full control over your attack surface by uncovering and eliminating critical security risks – the ones you didn't know existed. Our botnet and discovery engine use graph data modeling to map and classify the assets across your attack surface. attacksurface, asset discovery, cloud security, cyber security threats, vulnerability management, attack surface, IT security, cyber threat intelligence, vulnerability assessment, attack surface management, network security, cyber posture, penetration testing, attack surface visibility, data security, data breach, pentesting, attack surface security, CISO, internet security, security posture, cybersecurity, cloud security, infosec, digital assets, shadow …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 4 160
Vicarius Vicarius

Leading the pack in vulnerability remediation. Vicarius helps security and IT teams protect their most critical apps and assets against software exploitation through vRx, a consolidated end-to-end vulnerability remediation platform. Headquartered in New York and backed by tier-one Silicon Valley investors, Vicarius was founded by security experts on a mission to provide problem-solving remediation solutions that proactively reduce risk wherever assets reside. Effortlessly find and eliminate threats while reducing the strain on internal security resources, freeing up personnel to focus on other mission-critical tasks without sacrificing security. Get started for free today or learn more at https://vicarius.io Cyber, CDS, Malwares, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 3 75
HYPR | The Identity Assurance Company HYPR | The Identity Assurance Company

Creating Trust in the Identity Lifecycle as The Identity Assurance Company HYPR is on a mission to improve the lives of security-minded leaders, their employees and customers by helping organizations create trust in the identity lifecycle. HYPR provides the strongest end-to-end identity security, combining modern passwordless authentication with adaptive risk mitigation, automated identity verification and a simple, intuitive user experience. With a third-party validated ROI of 324%, HYPR easily integrates with existing identity and security tools and can be rapidly deployed at scale in the most complex environments. Cybersecurity, Mobile Security, Infrastrucure, Data Security, Security, Wireless, Privacy, SaaS, Software, Cloud, …

Type: Startup Activities: IT Services privacytech regtech Technologies: Cybersecurity IoT SaaS Wireless

16 3 5 122
NINJIO Cybersecurity Awareness Training NINJIO Cybersecurity Awareness Training

Building the knowledge and intuition people need to stay safe online. NINJIO is an all-in-one solution that lowers human-based cybersecurity risk through engaging training, personalized testing, and insightful reporting. Our multi-pronged approach to training focuses on the latest attack vectors to build employee knowledge and the behavioral science behind human engineering to sharpen users’ intuition. The proprietary NINJIO Risk AlgorithmTM identifies users’ social engineering vulnerabilities based on NINJIO Phish3D phishing simulation data and informs content delivery to provide a personalized experience that changes individual behavior. We serve some of the largest companies in the world and have changed the behavior …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 62
SIMBA Chain SIMBA Chain

SIMBA Chain makes it easy to build and deploy blockchain systems across multiple blockchains and data stores. Incubated at the University of Notre Dame in 2017 after winning a DARPA grant, SIMBA Chain has grown to be the trusted name in decentralized data exchange in Government and Enterprise. SIMBA Chain’s platform allows for secure, reliable and verifiable data interactions across any system. Our comprehensive solution suite marries the power of decentralized identifiers (DIDs) and verifiable credentials (VCs) with the security assurance of blockchain transactions - delivering low-cost data exchange that is secure, portable and third party verified. SIMBA allows for …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

0 0 0 66
SpyCloud SpyCloud

The leader in operationalizing Cybercrime Analytics to prevent ATO, ransomware, and online fraud. SpyCloud transforms recaptured darknet data to protect businesses from cyberattacks. Its products operationalize Cybercrime Analytics (C2A) to produce actionable insights that allow enterprises to proactively prevent ransomware and account takeover, protect their business from consumer fraud losses, and investigate cybercrime incidents. Its unique data from breaches, malware-infected devices, and other underground sources also powers many popular dark web monitoring and identity theft protection offerings. SpyCloud customers include half of the ten largest global enterprises, mid-size companies, and government agencies around the world. Headquartered in Austin, TX, SpyCloud …

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 1 4 221
PIXM PIXM

Phishing protection beyond the inbox Which cloud-based Anti-Phishing do you use? Pixm uses a popular one too. But there are critical gaps. 1. Did you know the typical failure rate of cloud-based anti-phishing services is about 15%? i.e., About 15% of all bad emails make it to users'​ Inboxes. 2. What keeps the CISO/CIO up at night? In spite of adding top-notch anti-phishing protection and training, about 25% of employees still click on phishing links and give away their passwords. 3. When was the last time you called someone and asked to check their Junk folder for an email you …

Type: Startup Activities: IT Services Technologies: A.I. - Image Processing A.I. A.I. - Deep Learning Cybersecurity

3 1 3 10
Cyblex Technologies Cyblex Technologies

Audit et Conseil en cybersécurité At Cyblex Technologies, we believe that we must change the paradigm in cybersecurity management to reduce the gap between targets and attackers in order to allow organizations to be more resilient and durable. To achieve our vision, we are transforming the digital world of our customers to make it safer and smarter. Our consultants support our clients on various topics related to IT security and cybersecurity. Our R&D department develops decision-helping products to support our clients' IT security teams in order to implement automation and artificial intelligence into their daily lives. Cybersécurité, Gouvernance, Pentest, Consulting, …

Type: Startup Activities: IT Services Technologies: A.I. Cybersecurity

4 1 4 19
Archiv Tech Archiv Tech

[Automatic translation follows] Optimize your information system! Since 2008, SAS ARCHIV TECH has been developing innovative services to optimize the security, ease of use and budget of information systems for businesses and communities throughout France. With a highly experienced team, we provide packaged services to hundreds of clients: outsourced backup, infrastructure outsourcing, secure collaborative space, improved VPN, as well as tailor-made expertise missions. Our services are developed in SaaS mode, using Open Source technologies. They are accessible for all types of hardware and operating systems. From independent professionals to major accounts, we provide responsiveness and a sense of service in …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 8
Mohatra Mohatra

[Automatic translation follows] Mohatra at the service of professionals: IT, GDPR, Consulting, ERP and Project management MOHATRA has been Qualiopi certified since January 2022 to guarantee you the greatest professionalism for your training. All our training can be covered by your OPCO. Do not hesitate to contact us for further information. GDPR, CyberSecurity, our team supports you in your efforts to protect personal data. In 2024, become a business provider!! Mohatra is recruiting to expand its intervention network nationally. Find out more about the offer: https://mohatra.fr/devenir-apporteur-daffaires/ Business Development, Real Estate, Renewable Energy, GDPR, and GDPR Audit

Type: Startup Activities: proptech cleantech greentech IT Services privacytech Technologies: Solar Technologies Decarbonization

4 0 4 2
ArcanSecurity ArcanSecurity

[Automatic translation follows] ArcanSecurity is developing an innovative password-free authentication solution to simplify a user's connection process while improving the level of security. Security, Authentication, Cryptography, Software Development, and Cloud

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 0 1
ExaTrack ExaTrack

[Automatic translation follows] Find and neutralize the attacker In recent years, the number of computer attacks has increased significantly, targeting both governments and private companies. The complexity of these attacks has also increased significantly, regardless of the type of target. Current state-of-the-art attacks and operating methods (often called APT) show that an attacker can invade an IS and remain active there for years without being detected. In this current context of computer threats, it is recommended for any entity concerned about its security to be proactive and to look for a possible compromise even before having proof that it exists. …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 4
HIAsecure HIAsecure

[Automatic translation follows] The French start-up that invented the strong authentication solution secured by human intelligence To protect businesses and individuals from increasingly virulent cybercrime in Europe, the French start-up HIAsecure has developed a strong authentication solution that is non-observable, non-attackable and non-hackable by automated means by reassuring by a factor specific to the human being: intelligence. Simple and fun to use, it allows its user to generate a single-use access code themselves from a secret formula that only they know. Compatible with all IT systems, the HIAsecure solution is easily integrated while meeting financial constraints as well as business …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 2 3 5
eShard eShard

Empowering companies to control their cyber risks. Sensitive data in mobile and IoT are increasingly exposed to more and more sophisticated threats. Compromising security can lead to severe reputation damage and your customers losing trust in your product. And ultimately your customers can be subjected to fraud, identity theft or other forms of cybercrime. eShard aims to be a trusted partner to developers and solution providers for understanding and analysing the risks in those complex technical areas. Together with you, we find the right measures to apply to ensure you maintain a strong and adequate level of security for your …

Type: Startup Activities: IT Services fintech Technologies: Cybersecurity Embedded Systems IoT

9 0 6 37
YesWeHack YesWeHack

Global Bug Bounty & Vulnerability Management Platform YesWeHack is a leading Bug Bounty and Vulnerability Management Platform. Founded by ethical hackers in 2015, YesWeHack connects organisations worldwide to tens of thousands of ethical hackers, who uncover vulnerabilities in websites, mobile apps, connected devices and digital infrastructure. Bug Bounty programs benefit from in-house triage, personalised support, a customisable model and results-based pricing. Clients include ZTE, Tencent, Swiss Post, Orange France and the French Ministry of Armed Forces. The YesWeHack platform offers a range of integrated, API-based solutions: Bug Bounty (crowdsourcing vulnerability discovery); Vulnerability Disclosure Policy (creating and managing a secure channel …

Tags: FrenchTech2030 Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

38 8 32 265
CVC-IT CVC-IT

[Automatic translation follows] The solution for your IT projects With extensive experience in Carve-in and Carve-out, CVC-IT has been supporting its clients since 2013 in securing their data and infrastructures. In this sense, we have the skills and experience necessary to respond to the problems of our customers (Industrial / Pharma / Agricultural / Local Authorities / etc.) As an agile, responsive and pragmatic partner, we are driven by the desire to ensure the performance of your Information Systems while controlling costs. We are involved in the management of applications and infrastructures and favor innovative and scalable technical responses focused …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 1 3
Snowpack Snowpack

Become Invisible. We anonymize you and your devices and make your data and infrastructure invisible. Snowpack is a 16-people European cybersecurity startup, spin-off from CEA, French largest applied research center, created in 2021. Snowpack secured more than €2 million in funding in 2022. Snowpack is developing its VIPN (Virtual & Invisible Private Network) technology, which avoids any trust to the Internet infrastructure in the broadest sense (i.e. hardware, software, encryption layers, Snowpack relays, etc.). Thanks to its technology, Snowpack has become in less than two years THE company specializing in Internet invisibility. Users, equipment and data become invisible, preventing the …

Type: Startup Activities: IT Services Technologies: Cybersecurity

37 11 33 15
GLIMPS GLIMPS

Boost the intelligence of your lines of defense! GLIMPS is a French editor that develops cybersecurity solutions for file analysis, detection and characterization of malware. They developed a unique technology based on automatic reverse engineering, GLIMPS Deep Engine, which is capable of code conceptualization offering a more efficient code analysis and malware detection.

Type: Startup Activities: IT Services Technologies: Cybersecurity

17 6 14 48
Acorus Networks - Merger was done with Volterra in 2019 Acorus Networks - Merger was done with Volterra in 2019

Acorus Networks gives opportunity to enterprise to grow their revenue with complete peace of mind and with clear visibility and control of the threats to which they may be exposed. Acorus Networks provides a Cloud infrastructure service to guarantee high availability of its customers like government, defense, media, e-commerce, retail, transport, healthcare, gaming etc. by protecting them against increasing sophisticated denial of service attacks. DDoS Protection, DDoS, Website Protection, and Cybersecurity

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 2 3
Lokly Lokly

We developed Lokly, a secure and connected flash drive for mobile professionals. Control, access, share data anywhere. The Lokly makes possible the transportation and share of your confidential data everywhere, safely and easily. It looks like a crypted USB key controlled (driven) by a smartphone.

Type: Startup Activities: IT Services Technologies: Data Analytics

3 2 1 2
Women4Cyber Foundation Women4Cyber Foundation

Official legal entity for ECSO's Women4Cyber initiative - working towards a gender-inclusive cybersecurity community! The Women4Cyber "Mari Kert-Saint Aubyn"​ Foundation has been established by the European Cyber Security Organisation (ECSO) and Guardtime to raise awareness and funds towards a gender-inclusive cybersecurity community. Unlike many digital awareness initiatives for women focusing on a wide-ranging ICT sector, the Foundation is set up to support the Women4Cyber initiative, launched by ECSO, to target the inherently complex cybersecurity field and meet the growing demand for cybersecurity professionals in Europe. Contact: hello@women4cyber.eu Diversity, Cybersecurity, and Access to Education

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

2 0 2 26
Independent Security Evaluators Independent Security Evaluators

Creating a community that rejects conventional thinking in order to make better, more secure technology. Companies come to ISE when they need to find and fix their security vulnerabilities and prove their tech is secure. They also come to ISE when they need help managing the complex and error prone process of managing security assessments. People come to work at ISE because it’s community, flexibility, and they are empowered to do meaningful work that helps others. Architecture review, Penetration testing, Source Code review, Cryptographic Protocol & Algorithm Review, Third Party Evaluation, Application Security, Software Development, Governance Risk and Compliance, and …

Type: SMB Activities: IT Services Technologies: Cybersecurity

9 0 7 42
SecurityDiscovery SecurityDiscovery

Cyber security consultancy assessing risks, problems, and solutions for organizations governments and individuals. SecurityDiscovery is a security consulting firm that specializes in identifying and reporting data security vulnerabilities and data leaks. Founded by Bob Diachenko and Jeremiah Fowler. The SecurityDiscovery website provides information about recent data breaches, leaks, and security vulnerabilities. It also provides tools and resources for security professionals, such as vulnerability scanners, security guides, and security news. The consulting arm of SecurityDiscovery provides data security services, such as vulnerability assessments, penetration testing, and security audits. The company also provides incident response services to help organizations respond to data …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 3
Group-IB Group-IB

Global Threat Hunting and Adversary-Centric Cyber Intelligence Company Founded in 2003 and headquartered in Singapore, Group-IB is a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime. Combating cybercrime is in the company’s DNA, shaping its technological capabilities to defend businesses, citizens, and support law enforcement operations. Group-IB’s Digital Crime Resistance Centers (DCRCs) are located in the Middle East, Europe, and Asia-Pacific to help critically analyze and promptly mitigate regional and country-specific threats. These mission-critical units help Group-IB strengthen its contribution to global cybercrime prevention and continually expand its threat-hunting capabilities. Group-IB’s decentralized and autonomous operational structure …

Type: SMB Activities: IT Services Technologies: Cybersecurity

11 1 7 193
Clavister Clavister

Clavister is a specialised European cybersecurity company, protecting complex digital businesses for more than two decades. Founded and headquartered in Örnsköldsvik, Sweden, Clavister pioneered one of the first firewalls and continues to build robust and adaptive cybersecurity solutions since. Empowering a growing ecosystem of partners and resellers, we have been serving customers in more than 100 countries with 125,000+ deployments across public sector, service provider and defence sectors. Network, cloud, mobile, end points - we secure them all. The company is, since 2014, listed on Nasdaq First North. For more information, visit www.Clavister.com Network Security, Next Generation Firewalls, UTM, Information …

Type: SMB Activities: IT Services Technologies: Cybersecurity

8 0 8 121
InfoWatch InfoWatch

InfoWatch is a European Software Company, Leader In Intellectual Data Protection Solutions. Once a small Kaspersky Lab project in Russia, it is now a group of companies with outstanding reputation for protecting global ogranisations against various information security threats. We have been active in the information security business for more than 10 years and have experience in implementing extremely complex solutions at the largest companies and in government agencies. Thousands of large businesses successfully use InfoWatch solutions in countries such as Southeast Asia, Western Europe, the Middle East, India, and Russia, CIS. DLP (Data Leakage Prevention), Encryption software, linguistic technologies …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 201
Endpoint Protector by CoSoSys (now part of Netwrix) Endpoint Protector by CoSoSys (now part of Netwrix)

Easy to use, multi-OS Data Loss Prevention Endpoint Protector by CoSoSys (now part of Netwrix) is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks, protects from malicious data theft and offers seamless control of portable storage devices. Its content inspection capabilities for both data at rest and in motion range from predefined content based on dictionaries, regular expressions, and machine learning to profiles for data protection regulations such as GDPR, HIPAA, CCPA, PCI DSS, etc. network-endpoint-protection-solutions, applications-for-portable-storage-devices, data-loss-prevention, DLP, IT-Security, security, endpoints, device-control, Enterprise-Mobility-Management, Content-Aware-DLP, and eDiscovery

Type: SMB Activities: IT Services privacytech Technologies: A.I. A.I. - Machine Learning Cybersecurity

2 0 0 143
IBO IBO

[Automatic translation follows] We simplify your digital life! Since its creation, IBO has developed a unique and proven managed IT services approach to support companies in the technical and financial optimization of their information systems. Our approach aims to increase the competitiveness of companies by relieving them partially or entirely of the daily management of their IT in order to allow them to concentrate on their business activity. IBO’s service offering is divided into 4 main families: - Accommodation services, - Outsourcing services, - Services related to IT security, - Services dedicated to Health. IBO has been approved since 2013 …

Type: SMB Activities: IT Services Technologies: Data Analytics

0 0 0 155
Certilience Certilience

[Automatic translation follows] IT Security Expert Agency Certilience, Your IT security, our priority! Our approach : - Advise you: Risk management - preventive actions - Defend yourself: Risk management - reactive actions - Guide you: Infrastructure management - daily actions Our jobs : 1. Security audits 2. Solution integration 3. Services and support 24/7 4. Training center 5. Private accommodation What if security constraints helped to enhance the value of your business? Faced with the complexity of information systems, the risk of attack increases. A real IT security management policy is required. By evaluating and testing your company's information systems, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 27
SCASSI - Expert cybersécurité des systèmes critiques & embarqués SCASSI - Expert cybersécurité des systèmes critiques & embarqués

[Automatic translation follows] We are cybersecurity experts specializing in critical and embedded systems and qualified PASSI-LPM Our employees, experts in the fields of security and safety, are involved from carrying out risk analyzes to the security acceptance of the entrusted project in an approach mastering SSI standards (ISO 2700x, CC, AR methods) and in close proximity to operational realities. We are positioned in the following areas (FR, EU, Maghreb Zone): - Banking/Finance/Insurance - Local authorities and state organizations - Field of health - Industries including aeronautics SCASSI Conseil is one of the leading players specializing in security in the South …

Type: SMB Activities: edtech IT Services Technologies: Cybersecurity Embedded Systems

5 0 2 54
cyberprotect cyberprotect

[Automatic translation follows] Reference brand of @inherent group, dedicated to managed cybersecurity services. Security of Digital Networks International (SDN International), is an independent company founded in 2005 by IT security experts. SDN International provides services for the management of IT intangible risks for companies. Digital Network Monitoring, Cybersecurity, Incident Tracing, Security Incident Detection, and Security Incident Response

Type: SMB Activities: IT Services Technologies: Cybersecurity

3 1 0 29
telitem telitem

[Automatic translation follows] Created in early 2014, telitem positions itself as an expert in technological convergence in the Greater West region. Based in Rennes (head office), Nantes and Paris, we operate in three main business areas:  Telecoms, networks and multimedia,  Information system and mobile computing,  Embedded computing. We need you ! Telecom, IS, and Embedded

Type: SMB Activities: IT Services telecommunications

0 0 0 14
UCOPIA UCOPIA

Capitalize on the potential of wireless networks to transform the way you work, collaborate and communicate ... UCOPIA, the European leader in Wi-Fi connectivity, aims to capitalize on the great potential of wireless networks to transform the way of working, collaborating, communicating, learning and entertaining. Founded in 2002, the French company has reinvented itself to meet the demands of the markets and impose its vision of the customer experience as a guideline in the evolution of its products and services. With more than 15 years of experience in Wi-Fi access security, profiles and logs management, UCOPIA is a recognized partner …

Type: SMB Activities: uxtech Consulting IT Services Technologies: Wireless

3 0 2 23
WALLIX Group WALLIX Group

Cybersecurity and privileged access management solutions to secure and protect your most critical IT assets Leader worldwide in Identity Security and access management for IT and OT environments, WALLIX provides proven cybersecurity technology in a digital world where cyberattacks are more and more sophisticated, especially targeting privileged accounts as potential gateway for cybercriminals. Listed on Euronext (ALLIX), WALLIX supports several thousand organizations around the world, in securing their digital transformation for over 20 years, and distributed through a network of more than 300 resellers. Check out more on WALLIX => www.wallix.com | www.ot.security | info@wallix.com Privileged User Management, Identity and …

Type: SMB Activities: IT Services Technologies: Cybersecurity

19 8 13 271
Wallarm. API & App Security Integrated Wallarm. API & App Security Integrated

End-to-end API security. Securing REST, GraphQL, gRPC, WebSockets, and web apps at scale. Protect any API. In any environment. Against any threat. Built by security practitioners for practitioners, Wallarm products provide robust protection for APIs, apps, and serverless workloads running in cloud-native environments. Hundreds of Security and DevOps teams chose Wallarm to get unique visibility into malicious traffic, robust protection across the whole application portfolio, and automated incident response for appsec programs. The company is committed to supporting modern tech stacks, offering dozens of deployment options in cloud and Kubernetes-based environments, and also provides a full cloud solution. Founded in …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 4 115
Virgil Security, Inc. Virgil Security, Inc.

Data and password security developer toolkits for HIPAA and GDPR compliance, liability transfer, and peace of mind. Virgil Security, Inc., makes every software developer into an applied cryptologist. Virgil provides password-free authentication, encryption, distributed immutable data storage via Blockchain, and verification of data, devices, and identities that is quickly and easily integrated into developer products. Virgil provides this via a cloud-based service in combination with open sourced libraries that are available for desktop, embedded (IoT), mobile, and cloud / web applications with support for a wide variety of modern programming languages. • Finalist for Red Herring's Top 100 North America …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity Blockchain/Cryptocurrency IoT SaaS

0 0 0 15
Yubico Yubico

Yubico sets new world standards for simple, secure login. Yubico (Nasdaq First North Growth Market Stockholm: YUBICO), the inventor of the YubiKey, offers the gold standard for phishing-resistant multi-factor authentication (MFA), stopping account takeovers in their tracks and making secure login easy and available for everyone. Since the company was founded in 2007, it has been a leader in setting global standards for secure access to computers, mobile devices, servers, browsers, and internet accounts. Yubico is a creator and core contributor to the FIDO2, WebAuthn, and FIDO Universal 2nd Factor (U2F) open authentication standards, and is a pioneer in delivering …

Type: Startup Activities: IT Services Technologies: Cybersecurity

5 0 5 473
SCADAfence, a Honeywell Company SCADAfence, a Honeywell Company

The Most Comprehensive OT & IoT Cyber Security Platform. A Gartner Cool Vendor. SCADAfence is the global technology leader in OT & IoT cybersecurity. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access, and IoT device security. A Gartner “Cool Vendor”, SCADAfence delivers proactive security and visibility to some of the world's most complex OT networks, including the largest manufacturing facility in Europe. SCADAfence enables organizations in critical infrastructure, manufacturing, and building management industries to operate securely, reliably, and efficiently. OT Security, ICS Security, …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

7 0 6 53
The Authoriti Network, Inc. The Authoriti Network, Inc.

... So long and thanks for all of the fish.

Type: Startup Activities: fintech healthtech insurtech IT Services

1 0 1 1
AppGuard, Inc., a Blue Planet-works company AppGuard, Inc., a Blue Planet-works company

Succeeds where Malware Detection Disappoints, Add AppGuard AppGuard, Inc., a Blue Planet-Works company, provides endpoint protection software that blocks malware in real-time, before endpoints are compromised, without having to detect or recognize it. AppGuard was founded on the belief that prevention is a critical component of an effective defense-in-depth strategy and complements detection-based tools that often are unable to detect new malware variants. Today, over 6,000 organizations leverage AppGuard’s patented technology to outsmart malicious actors by disrupting known and unknown, fileless, and Zero-day exploits before they cause harm. Cyber Security, Computer Security, IT Security, Network Security, and Mobile Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 0 20
AttackIQ AttackIQ

Testing for everyone. Your way, your budget, your needs. AttackIQ is the industry leading provider of breach and attack simulation products for security control validation. AttackIQ emulates adversary tactics, techniques, and procedures, aligned to the MITRE ATT&CK framework, and provides visibility into your security program performance with clear data-driven analysis and mitigation guidance. At AttackIQ, we get that every organization has different testing needs. That’s why we’ve designed products fit for your unique needs: Enterprise, Ready!, and Flex. So, whether you’re new to security testing, want someone to manage it for you, or just need some help running it yourself, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 149
Deceptive Bytes Deceptive Bytes

Active Endpoint Cyber Defense - Prevention by Deception Deceptive Bytes' patented malware and ransomware prevention technology is provided as part of its Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome, by creating deceptive information based on the current detected stage of compromise through the entire Endpoint Kill Chain. The preemptive solution covers the evolving nature of advanced threat landscape & sophisticated malware techniques, stopping all threats without relying on signatures, patterns or the need for constant updates. Recognized as a Gartner Cool Vendor in Security Operations and Threat Intelligence. For more information, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 1 0 8
Cervello | Rail Cybersecurity Cervello | Rail Cybersecurity

Turn Data Into Operational Security Insights Cervello is the world’s leading cybersecurity platform designed to protect the critical environment of heavy transport infrastructure from cyber threats (across OT/ICS, IT/IoT, Signaling, Rolling Stock, and proprietary technologies). Cervello Platform is used by some of the world’s most known operators and infrastructure managers as their go-to tool for risk management - delivering comprehensive visibility, deep asset and threat intelligence, and proactive operational resilience capabilities. Recognized by Fast Company and Forbes, Cervello provides transport teams the contextual understanding to efficiently manage and control their operations, as well as take action to maintain safe and …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

1 0 2 36
MIRACL | The login you love MIRACL | The login you love

Secure, simple, affordable MFA in 2 seconds. MIRACL provides the world’s only user-friendly, single step Multi-Factor Authentication (MFA) and Digital Signing service. Secure MFA in 2 seconds. MIRACL Trust® ID blocks 98% of all attacks* and eliminates the need for outdated security practices such as passwords, SMS Texts, push notifications and key-cards. The use of true two-factor authentication coupled with the latest Zero Knowledge Proof (ZKP) technology means no personal data is stored or transmitted and there are no "honey-pots"​ of data exposed to attack keeping MIRACL Trust out of scope for GDPR. MIRACL Trust® Proof allows every user to …

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity

4 0 1 19
DeepView DeepView

A privacy-focused platform to monitor and archive business communications DeepView protects companies from data leakage by staff. Real-time alerts to public data leaks and opt-in encrypted channel recording make personal devices in the workplace safer. DeepView’s unrivalled, patent-pending technology and AI algorithm is built to read photos. It is the only solution that allows companies to manage data leakage from photos, videos and text shared by employees, thereby protecting companies from inadvertent and intentional data leaks. The advanced, slick encryption recording is the only solution to meet GDPR and MiFID II standards. The platform instantly notifies you to confidential company …

Type: Startup Activities: IT Services fintech regtech Technologies: A.I.

0 0 0 8
dataz dataz

[Automatic translation follows] Data protection from A to Z: texts, articles, tools and voice assistants are available on www.dataz.fr. Data protection from A to Z: texts, articles, tools and voice assistants are available on www.dataz.fr.

Type: Startup Activities: IT Services Technologies: Data Analytics

0 0 0 N/A
PyGuard PyGuard

[Automatic translation follows] PyGuard offers the latest technology in protecting personal data from connected objects. PyGuard, innovation in the service of personal data PyGuard offers the latest technology in protecting personal data from connected objects. The solution ensures control, security and protection of personal data to guarantee privacy. Personal data security, Data protection, Connected objects, and IoT

Type: Startup Activities: privacytech IT Services Technologies: IoT Cybersecurity

0 0 0 1
Face-Alive Face-Alive

Startup specialized in biometric security enhancement which gather industrial experts and academic partner. FACE-ALIVE is a startup specialized in biometric security enhancement which gather experts coming from industries and academic partner. FACE-ALIVE’s liveness detection system performs instantly a 3D capture with a 2D Camera detecting any presentation attack. Our technology is reliable, portable and certified. FACE-ALIVE est une startup spécialisée dans l'amélioration de la sécurité biométrique qui rassemble des experts de l'industrie et de la recherche. Le système de détection du vivant de FACE-ALIVE effectue instantanément une capture 3D avec une caméra 2D détectant toute attaque de présentation. Notre technologie …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 4 1
IDECSI IDECSI

Data Access Governance for Microsoft 365 & file server. Empower employee through user-centric technology, MyDataSecurity French startup in cybersecurity, IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection. Immediately operational, Idecsi now offers a complete range of solutions allowing you to protect all your resources on all key applications: Microsoft Teams, SharePoint Online, Exchange, Onedrive,... You benefit from continuous protection that detects in real time every malicious access or setting (internal or external). With MyDataSecurity, users have the means to control and monitor the security of their data and that of …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

10 1 9 30
BlueFinch-ESBD France BlueFinch-ESBD France

Secure Data Integrator BlueFinch-ESBD is a young and dynamic Franco-Dutch company. We are a trusted provider of advanced data integration solutions with over 10 years of experience serving customers across all industries. Our European presence, with customers in France, Benelux and Nordic, enables us to provide a localised, high-quality service to our customers. Transferts de fichiers, MFT, Managed File Transfer, Chiffrement, Data Loss Prevention, Protection contre la perte de données , migration, and consulting

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 16
Authentic BlockChain Authentic BlockChain

[Automatic translation follows] We guarantee Law and Figures professionals against the falsification of their digital documents Authentic BlockChain provides Legal and Financial Professionals with an online service based on blockchain to freeze digital documents on a secure date and prevent their falsification. By simply dragging and dropping, lawyers, auctioneers, accountants, genealogists, bailiffs, corporate lawyers and notaries can anchor legal documents in the blockchain or check that they are already there, knowing who they are. filed and when. Authentic BlockChain relies on the immutability offered by the blockchain, on reinforced authentication carried out by people during user registration and on the …

Type: Startup Activities: legaltech Technologies: Blockchain/Cryptocurrency

17 2 17 4
IA_AUT_ECO IA_AUT_ECO

Push back the possible, the impossible, is not on the agenda JDiscover our revolutionary AI solution: the ultimate defense against current and future attacks. In an era of cyber hacking and offensive artificial intelligence, traditional APT methods are proving insufficient. Preserve the integrity of your vital business data with our unparalleled AI solution. A standard bearer for visionary companies, we are building a secure future hand in hand with our innovation. AI, deeptech, open source, cybersecurité, and AI ethics

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning A.I. - Deep Learning

20 1 19 1
CREST CREST

Building capability, capacity, consistency and collaboration in the global cyber security industry. CREST is an international not-for-profit, membership body representing the global cyber security industry. Our goal is to help create a secure digital world for all by quality assuring our members and delivering professional certifications to the cyber security industry. We accredit 300+ member companies, operating across dozens of countries, and certify thousands of professionals worldwide. We work with governments, regulators, academe, training partners, professional bodies and other stakeholders around the world. Our members undergo a rigorous quality assurance process and employ competent professionals. Organisations buying their cyber security …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

2 0 2 273