Entities
LogoName Σ Employees
Fox-IT Fox-IT

For a more secure society Fox-IT prevents, solves and mitigates the most serious cyber threats with innovative solutions for government, defense, law enforcement, critical infrastructure, banking, and commercial enterprise clients worldwide. Our approach combines human intelligence and technology into innovative solutions that ensure a more secure society. We develop custom and packaged solutions that maintain the security of sensitive government systems, protect industrial control networks, defend online banking systems, and secure highly confidential data and networks. Intelligence, Cyber security, Forensic investigation, Threat monitoring, Managed services, Red teaming, Pentesting, Education, Fraud detection, Detection, Incident Response, Security Operations Center, and Crypto technlogy

Type: SMB Activities: IT Services edtech Technologies: Cybersecurity

5 1 4 440
Riscure Riscure

Driving Your Security Forward Riscure is an independent security laboratory founded in 2001 with customers in North America, Europe and Asia. We specialize in evaluating and improving the security of products that are designed to operate securely in an environment where attackers might attempt access by either physical or logical means, often without the risk of being detected. Our work includes endpoint, communication protocols as well as back-end security. Besides offering security evaluation and advisory services, Riscure develops and maintains security test products for organizations that wish to perform their own hardware or software testing. Riscure is market leader in …

Type: SMB Activities: deeptech IT Services Technologies: Cybersecurity Embedded Systems IoT

3 0 3 174
NEOWAVE NEOWAVE

Strong authentication and secure transactions NEOWAVE is an innovative company specializing in strong authentication and secure transactions. Our main mission is to protect companies’ and individuals’ digital assets through strong authentication technologies based on secure components and digital certificates. Our solutions address the cybersecurity, digital trust and identity management markets. NEOWAVE products combine the high level of security offered by smart cards with the advantages of storage and connectivity technologies: USB, RFID/NFC and Bluetooth Low Energy (BLE). Designed and manufactured in France, they meet the security requirements of European agencies. Clefs USB / Tokens USB, RFID / NFC, Chiffrement de …

Type: SMB Activities: IT Services Technologies: Cybersecurity NFC Wireless

6 3 3 8
EfficientIP EfficientIP

Our Goal: Simplify modern key IT challenges and enable secure dynamic IP communication between users, apps, & services. EfficientIP is a network security and automation company, specializing in DNS-DHCP-IPAM (DDI). We promote business continuity by making your IP infrastructure foundation reliable, agile, and secure. Integrated solutions enable IP communication and simplify network management with end-to-end visibility and smart automation, while patented technology secures DNS services to safeguard data and ensure application access. Companies in all sectors rely on EfficientIP offerings to face the challenges of key IT initiatives such as cloud applications and mobility. IP Address Management, DNS-DHCP services management, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

4 0 4 228
Kleverware by WALLIX Kleverware by WALLIX

The Key solution to Governance Kleverware provides solutions where helps companies answer questions from auditors. Help the Business to reduce the time for compliance. Mitigate Identity & Access risks. Kleverware IAG his flexible solutions. Kleverware has been a pioneer in IAG (Identity & Access Governance) since 2005, constantly focusing on innovation and its return on investments. Our goal is to help businesses mitigates the risks associated with managing their permissions. Kleverware solutions lets you see who has access to what and why. IAM - IAG, Role Management, Access review, access governance, gestion des habilitations, gouvernance des identités, and audit des …

Type: SMB Activities: IT Services

1 0 1 2
MaadixZone S.L. MaadixZone S.L.

MaadixZone S.L is a company based in Barcelona and dedicated to the development of IT solutions for companies and professionals focusing on the protection of their privacy and digital autonomy. Every time we use "free"​ services provided by large companies, we are providing them with extremely valuable information. In order to access these services, we must subscribe to certain terms of use, which oblige us to accept practices that undermine our privacy. We lose control over our data, which is caged in closed platforms controlled by companies whose business is, in most cases, based on the marketing of our personal …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity

1 1 0 1
Smart Protection Smart Protection

Making the internet a safer place for online businesses and consumers alike. We are experts in brand and content protection online. Thanks to our team of cybersecurity experts and our AI technology, we protect the intellectual property for our clients worldwide. As Member of Google’s Trusted Copyright Removal Program (TCRP), and thanks to our special agreements with the main digital marketplaces and social networks, we are able to delist infringing URLs, and remove illicit products and content quickly and efficiently. This allows brands and content owners to focus resources on their individual business needs. Protection of intellectual and industrial property …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

7 1 5 91
Apheris Apheris

Governed, private, secure data access for ML and analytics Apheris enables governed, private, and secure access to data for ML and analytics. As model architectures become increasingly commoditized, data becomes an organization’s key differentiator. However, businesses need to safeguard their data assets and IP while leveraging it for ML. Our product, the Apheris Compute Gateway, ensures only approved computations can be launched on that data. It also enables federation across organizational boundaries, allowing ML-powered insights with no need to centralize data, while ensuring compliance with data privacy, security, and governance obligations. Founded in 2019, Apheris is backed by top investors …

Type: Startup Activities: privacytech IT Services Technologies: A.I. A.I. - Deep Learning A.I. - Natural Language Processing

5 0 4 37
Least Authority Least Authority

Advancing digital security and preserving privacy as a fundamental human right. Least Authority is committed to building and supporting the development of usable technology solutions and ethical business practices to advance digital security and preserve privacy as a fundamental human right. We focus our work in three main areas: Security Consulting, Product Development, and Community-Contribution Projects. We pursue these areas knowing they are complementary and offer various ways for us to contribute to our mission: we enable more people to use secure and privacy-respecting technology. We uphold our mission by: -Conducting security audits and providing consulting services for software development …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency Cybersecurity

4 0 3 19
Veri Security Bilişim ve Danışmanlık Hizmetleri A.Ş. Veri Security Bilişim ve Danışmanlık Hizmetleri A.Ş.

[Automatic translation follows] Forensic Information and Forensic Solutions, KVKK, ISO 27001 Certification, Information Security Consultancy and Training Computer Forensics and Information Security Consultancy

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 4
Galaxkey Limited Galaxkey Limited

Data security designed to keep your important information safe, wherever it goes Unique three-layer identity-based encryption that protects all your data and communications, even when they leave your network. Encrypted emails, secure file management and collaboration, secure file transfer and electronically signed documents, all in one easy-to-use platform. Giving you ultimate control over who see's your important data and when. Email Security, Document Security, Data Security, Electronic Signature, and Secure Collaboration

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

3 1 0 34
STASH Global Inc. STASH Global Inc.

Quantum-resistant defense in depth. Proactive No Ransom Ransomware Solution. Zero trust. The Breach Stops Here. stash.global We Protect Only What's Important. The Data Itself. We are living in a world of cyber security smoke and mirrors. Your valuable data? As vulnerable as a newborn baby. Others try to protect your data by creating a fence around it. We don't. Because a fence has holes. On-cloud or off. On-site or off. Modular and fully-managed by STASH. Theft, loss, manipulation, harm-proof, ransomware proof data. It's what matters. To you. To us. Data-centric Security, Data Governance, Ransomware Solution, Access Management, Big Data, and …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity Data Analytics

0 0 0 3
Critical Start Critical Start

The Next Evolution of MDR Manage cyber risk and build resilience with Managed Cyber Risk Reduction (MCRR)—the next evolution of Managed Detection and Response (MDR). Critical Start expands Detect and Respond services beyond traditional MDR to include Identify, Protect, and Recover capabilities. Our risk-based approach empowers security and risk leaders to manage risk with expanded services available through our centralized Cyber Operations Risk & Response (CORR) platform, backed by our purpose-built Trusted Behavior Registry (TBR) and full feature-parity MOBILESOC app. With 24x7x365 Risk & Security Operations Center (RSOC) analysts and an expert Cyber Research Unit (CRU), we monitor, investigate, and …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 0 271
Kapalya Inc. Kapalya Inc.

LOCK DATA, UNLOCK SUCCESS! We encrypt all data in-transit and at-rest on mobile end-points, corporate servers, and cloud servers. Our technique only allows the user to generate encryption keys. Cloud and corporate systems administrators are masked from viewing your data. Cybersecurity, Data Encryption, and AI & ML Based

Type: Startup Activities: IT Services Technologies: A.I. Data Analytics

0 0 0 7
NuHarbor Security NuHarbor Security

Cybersecurity services you want from a team of experts you can trust. NuHarbor Security is a leading national cybersecurity services firm, supporting the diverse needs of hundreds of clients with clear, comprehensive, and outcome-based solutions. We support only best-of-breed security technologies with thoroughly trained and vetted analysts. We make cybersecurity easier for our clients by integrating the most comprehensive set of security services in the market, from compliance and offensive testing to award-winning 24×7 managed security operations. What’s more, NuHarbor advisors analyze information from multiple sources to deliver the most well-informed strategies for building, improving, and maintaining your cybersecurity program. …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

2 0 2 154
CovertSwarm CovertSwarm

YOU DESERVE TO BE HACKED Your best defence is your worst enemy. They say you should keep your friends close, but your enemies closer — and CovertSwarm is your worst nightmare. A specialist red team of ethical hackers and penetration testers, we attack relentlessly from every angle to hit your brand where it hurts again, and again, and again. If there’s a weak spot in your app or website, we’ll find it. If an update exposes a vulnerability, we’ll spot it. And we’ll raise the alarm fast, before anyone can break in. Cyber Services, Social Engineering, Cyber assurance, Cyber Risk, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 42
ThreatsHub ThreatsHub

Threat Analysis & Cloud Security, a tailored architecture to help your security teams fight against cyber-threats ThreatsHub provides reliable and actionable Threat Intelligence and Cloud Security Services. Combines Machine Learning and Cybersecurity techniques in a custom built platform to scan, acquire and classify public Internet data. Our innovation and research make it possible to tackle escalating cyber risks through exceptional network visibility, threat detection and operational insight. Learn more at threatshub.org. Get security news, trends and insights at threatshub.org/blog or follow us on Twitter @ThreatsHub.

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I. - Machine Learning

0 0 0 1
ShiftState Security ShiftState Security

Bringing enterprise level security to an evolving digital landscape. ShiftState Security is a cybersecurity services firm focused on applying enterprise security insights and best practices to organizations looking for a more comprehensive approach to security. Founded by veteran FBI Cyber Special Agents Andre McGregor and Jason Truppi, ShiftState provides security assessment, advisory, and implementation services for small to enterprise companies, in addition to consulting on unique projects and initiatives aimed at furthering the digital security landscape. Years of experience securing Fortune 500 and government organizations led to ShiftState's unique strategy on how to operationalize security in any environment, so all …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 8
Iron Bastion Iron Bastion

Australia's cybersecurity experts Australia's phishing and cybersecurity experts. We offer a comprehensive range of cybersecurity services that protect your business from cyber criminals and digital threats. Cloud Security, Application Security, Infrastructure Security, PCI DSS, Phishing, and Email Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 3
Vumetric Cybersecurity Vumetric Cybersecurity

Company specialized in Penetration Testing, IT Security Audits and Cybersecurity. Vumetric⭐⭐⭐⭐⭐ is a leading provider of cybersecurity assessment services, our team of certified professionals conducts over 500 penetration tests annually for a wide range of clients, including Fortune 1000 companies, SMBs, and government organizations. Penetration Testing, Security Audit, IT Security, Cloud Security, Cybersecurity, Compliance, Pentest, and Penetration Test

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 33
Fresh Security Fresh Security

A hacker’s view of you and your business. Security insights without jargon. It’s like cyber security, but simple. A security service that provides a hacker’s view of you and your business. That's the idea behind Fresh Security. We talk to you as a human - without jargon - and provide you with clear actionable insights in real time. So you can stop attacks before they start.

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 4
Heimdal® Heimdal®

Secure Anything. Anytime. Anywhere. Heimdal is an industry-leading unified and AI-powered cybersecurity solutions provider established in Copenhagen in 2014. With an integrated approach to cybersecurity, Heimdal has dramatically boosted operational efficiency and security effectiveness for over 15k+ customers globally. Heimdal empowers CISOs, Security Teams, and IT admins to enhance their SecOps, reduce alert fatigue, and be proactive using one seamless XDR security platform. Our award-winning line-up of 10+ fully integrated cybersecurity solutions span the entire IT estate, allowing organizations to be proactive, whether remote or onsite. That's why our XDR suite and managed services offer solutions for every attack surface, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 276
Brier & Thorn, Inc Brier & Thorn, Inc

Brier & Thorn helps organizations build value by taking a critical thinking approach to managing IT risk. This approach helps our clients focus on their areas of increased risk, bridge silos to effectively manage risk across organizational boundaries and seek not only risk mitigation, but also pursue intelligent risk taking as a means to value creation. Brier & Thorn is a global IT risk management firm, supporting companies in their important strategic decisions on operational security, IT risk management, and managed security services in their enterprise and products – cross-industry and cross-border. Together with its clients, Brier & Thorn works …

Type: Startup Activities: IT Services Technologies: Cybersecurity

10 1 9 10
ISARA Corporation ISARA Corporation

Clearing the path to quantum-safe security ISARA Corporation is a security solutions company specializing in creating class-defining quantum-safe cryptography for today's computing ecosystems. When ISARA was founded in 2015, we kept one ambitious mission in mind: to build a quantum-safe world where all the possibilities and benefits of quantum computing can be realized, with none of the security risks. We’re proud to be part of a collaborative effort with academic and standards institutions to raise awareness of the quantum threat, and design and implement quantum-safe solutions for classical data security systems that will work globally.

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 19
OMVAPT OMVAPT

InfoSec by Consciousness OMVAPT OÜ is an Information Security company based out of Tallinn, Estonia – The Silicon Valley of Europe. We analyse the entire security posture of your organisation from the malicious adversary’s perspective with the intent to ensure business continuity and build resilience by remediating. We Perform Black Hat Penetration (PT) and Comprehensive Vulnerability Assessment (VA). Vulnerability Assessment, Penetration Testing, Digital Forensics, Vulnerability Management, Offensive Security, Information Security, OffSec, InfoSec, VAPT, VA, PT, Black Hat PenTest, Cyber Security, CyberSec, Network-Level Penetration Testing, Ethical Hacking, Web Application Penetration Testing, Dynamic Application Security Testing, Run-Time Application Security Testing, iOS Penetration …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 5
Red Piranha Red Piranha

Simplifying Cybersecurity with Crystal Eye, The world's most powerful XDR Platform At Red Piranha, we came up with a simple concept: a holistic threat protection solution that works. Recruiting a team of experts from the corners of the planet – from engineers to academics to ethical hackers – we worked to develop the most exhaustive and effective security measures on the market. In 2015, we integrated the threat intelligence platform DNS.insure into the development of the Crystal Eye Unified Threat Management systems – a custom suite of software solutions that can be implemented on Red Piranha hardware or on a …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 60
Ground Labs Ground Labs

Streamlined Data Management For Privacy | Security | Compliance Ground Labs enables organizations to discover and remediate all of their data across multiple types and locations — on servers, on desktops and in the cloud. Ground Labs serves as the most comprehensive and trusted solution in the enterprise to confidently mitigate risk and find sensitive data. Ground Labs’ core focus is to develop technology to meet the increasing challenges of data management and regulatory compliance. This is shown with our flagship products of Enterprise Recon and Card Recon, along with our continued development of future solutions to address the complexities, …

Type: Startup Activities: IT Services privacytech Technologies: Data Analytics

6 0 4 42
Info Security Forum Info Security Forum

Est. 1989 the Information Security Forum (ISF) is dedicated to investigating, clarifying and resolving key issues in information security and risk management.

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 N/A
Crypto4A Technologies Crypto4A Technologies

Quantum ready cybersecurity foundations for a trusted digital world. At Crypto4A we developed the fifth-generation quantum-safe crypto-agile Hardware Security Modules (HSM), Hardware Security Platforms (HSP), and PQC Migration Solutions. Our products and solutions provide processing capabilities for classic and quantum-safe cryptography that is built in —not bolted on. We enable the cryptographic agility, mobility, and scalability demanded by enterprises and government agencies to secure their digital assets and infrastructure while adapting to changing markets, standards, and requirements. Security, Entropy, PKI, HSM, Cybersecurity, Quantum Computing, Security Software, Data Diode, Fintech, Blockchain, Data Centre security, and DevSecOps

Type: Startup Activities: IT Services Technologies: Cybersecurity Blockchain/Cryptocurrency

2 0 2 28
Performanta Performanta

Aware - Secure - Safe | Cyber Security Performanta, the global purple tribe, delivering the bedrock of quality cyber security services to our customers, enabling them to do business safely. Founded in 2010 with Offices in the UK, North America, South Africa and Australia, Performanta employs over 140 people globally with an amalgamation of over 1,000 years of experience, servicing satisfied customers in more than 50 countries worldwide. At Performanta, we hire only the best people to join our Purple Tribe, a passionate group of highly motivated, empowered and successful employees. We work hard and are committed to the values …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 162
Appsian (a Pathlock company) Appsian (a Pathlock company)

Now part of Pathlock. Delivering unrivaled Access Governance & Application Security Across the Enterprise. Pathlock brings simplicity to customers who are facing the security, risk, and compliance complexities of a digitally transformed organization. New applications, new threats, and new compliance requirements have outpaced disparate, legacy solutions. Pathlock provides a single platform to unify access governance, automate audit and compliance processes, and fortify application security. With integration to 140+ applications and counting, Pathlock customers can confidently handle the security and compliance requirements in their core ERP and beyond. Whether it’s minimizing risk exposure and improving threat detection, handling SoD with ease, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 0 6 56
ANGOKA ANGOKA

Embedding Trust Into Connected Devices ANGOKA is an IoT security company focused on protecting M2M communications for Smart Cities and Mobility. Headquartered in Belfast, with offices in London and The Hague, ANGOKA offers solutions that protect devices’ identities. With an increase of inherently insecure networks coming online with the boom of IoT, ANGOKA’s solutions safeguard critical machine-to-machine communication integrity and data provenance, creating trusted connections, even in untrustworthy networks. ANGOKA is the only cybersecurity company to win a place on Zenzic’s CAM Scale-Up Programme, delivered in partnership with Plug and Play. ANGOKA was also the first NI start-up to be …

Type: Startup Activities: IT Services Technologies: IoT Cybersecurity

2 1 1 34
Fortifyedge Fortifyedge

Advanced Biometric IAM for Wearables/IOT powered by on-Device Machine Learning Fortifyedge provides edge based cybersecurity for cyber-physical devices for industrial IoT customers. Our embedded software utilizes AI to detect attacks before they start. artificial intelligence, cybersecurity, edge computing, Industrial IoT, LoRaWAN, FIDO, embedded systems, and privacy

Type: Startup Activities: IT Services privacytech Technologies: A.I. A.I. - Machine Learning IoT Embedded Systems Cybersecurity

0 0 0 6
Idenprotect Idenprotect

We eliminate ALL passwords to make organisations more efficient and cyber-secure We help organisations solve their password and access pains. Our passwordless MFA and our Secure Browser for mobile ensures that user passwords can never be compromised. Using biometrics, public key cryptography and the secure hardware on smart devices, we improve usability for employees and customers whilst reducing the risk of data breaches, financial fraud and fines for non-compliance. Leading organisations use idenprotect to improve security, meet regulatory mandates and reduce complexity and costs. Why idenprotect? Because life is complicated enough. Authentication, Innovation, Information Security, Security, Mobility, Assurance, Cryptography, Multi-Factor …

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity

2 0 2 18
Illumio Illumio

Illumio, the Zero Trust Segmentation company, stops breaches from spreading across the hybrid attack surface. Illumio, the Zero Trust Segmentation company, stops breaches from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes all traffic flows between workloads, devices, and the internet, automatically sets granular segmentation policies to control communications, and isolates high-value assets and compromised systems proactively or in response to active attacks. Illumio protects organizations of all sizes, from Fortune 100 to small business, by stopping breaches and ransomware in minutes, saving millions of dollars in application downtime, and accelerating cloud and digital transformation projects.

Type: Startup Activities: IT Services Technologies: Cybersecurity

14 1 3 656
Uniware Systems Uniware Systems

Moving IT to the Cloud Uniware Systems help businesses become Cloud-First & Data-Driven on Cloud. For over 25 years, we empower Businesses with modern cloud infrastructure, cloud security, cloud storage and cloud consulting services. Certified and partnered with leading cloud platforms like AWS, Azure, Google Cloud and all Leading Enterprise Information Systems companies, Uniware Systems offers best of the breed computing solutions. Continuous Learning is key at Uniware which forms as the base for offering technology service excellence to our clients. Today Uniware Systems is positioned as one of the preferred IT Solution Partners for many brands in Chennai, India …

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 1 4 54
Aqua Security Aqua Security

We Stop Cloud Native Attacks Aqua Security is the largest pure-play cloud native security company, providing customers the freedom to innovate and run their businesses with minimal friction. The Aqua Cloud Native Security Platform provides prevention, detection, and response automation across the entire application lifecycle to secure the build, secure cloud infrastructure and secure running workloads wherever they are deployed. Security, Docker, Containers, Cyber Security, Cloud, Virtualization, kubernetes, serverless, aws lambda, container security, open source, and VMs

Type: SMB Activities: IT Services Technologies: Cybersecurity

27 2 17 647
Checkmarx Checkmarx

Checkmarx. Make Shift Happen. Checkmarx is the Enterprise Application Security provider, offering the industry leading cloud-native platform that builds DevSecTrust – Checkmarx OneTM. Fueled by intelligence from our industry leading AppSec security research team, our AI driven technology and services enable CISO, AppSec and Development leaders to prioritize their teams on what impacts their business. Our offering secures every phase of development for every application from the very first line of code until production (Shift Everywhere) while simultaneously balancing the dynamic needs of security and development teams. We are honored to serve more than 1,800 customers, including 60 percent of …

Type: Large company Activities: IT Services

5 0 5 937
Sysdream Sysdream

[Automatic translation follows] 360° security expertise: Audit, Training, Cyber-training, IS security, SOC & CERT - www.sysdream.com SysDream, the Cybersecurity subsidiary of the Hub One group, supports you throughout the life cycle of securing your information system. A French pure player in IT security, SysDream offers a global offering and tailor-made solutions aligned with your challenges. It provides major accounts, public and private, in France and internationally, with a wide range of solutions focused on evaluation & the design of IS security, securing the information system as well as monitoring & IS remediation. SysDream relies on strong expertise in the areas …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 2 58
Advens Advens

Security for the greater good Advens is a European, independent and outstanding leader in cybersecurity. We are located throughout France (Paris, Lille, Lyon, Marseille, Toulouse, Bordeaux, Nantes, Rennes and Tahiti), Spain (Madrid, Barcelona), Italy (Milano, Roma), Germany (Munich), as well as Canada (Montréal), Our mission is to protect, 24 hours a day, 365 days a year, public and private organisations which are increasingly dependent on digital technology, and are increasingly exposing their resources to ever-more professional cyber attackers. This mission drives us on a daily basis. But it is still not enough for us. Our financial performance allows us to …

Type: SMB Activities: IT Services Technologies: Cybersecurity

28 15 11 518
IDnomic IDnomic

IDnomic is digital identity management and PKI (Public Key Infrastructure) solutions of Atos Group IDnomic is the leading European provider of software and cloud trust services. IDnomic develops software that protects the identities of people and devices, and for securing electronic documents and transactions. Our role as an internationally recognized Certificate Authority is the guarantee of the reliability of our solutions. Every day, millions of people around the world use IDnomic technologies with their corporate badges, their passports or ID cards, when exchanging data or digitally signing contracts. Since 2004, over 200 large international organizations have placed their trust in …

Type: SMB Activities: IT Services Technologies: Cybersecurity

7 1 4 60
Intrinsec Intrinsec

Notre métier ? Protéger le vôtre Intrinsec is focused on Information Security. Delivering security services since 20 years, the company is focused on building services & offers for a better protection of its customers & partners business. Information Security, Audit, Penetration testing, Consultancy, SOC, CERT, MSSP, Threat Intelligence, Incident Response, Forensic, Red Team, Purple Team, MSSP, CISO, Shared-Time CISO, Awareness, FR/EU Compliance, Data leaks, CTI, Threat Hunting, Crisis management, EDR, MDR, and Vulnerability management

Type: SMB Activities: IT Services Technologies: Cybersecurity

7 3 3 244
SIFARIS SIFARIS

[Automatic translation follows] Visualize to understand and act SIFARIS is an IT engineering services company specializing in the architecture and outsourcing of information systems in application of the ISO 27001 standard (system security) as well as in regulated sectors. The strength of SIFARIS lies in its knowledge of the management of projects with high technological value, its practice in regulated sectors and management on behalf of third parties. Quite naturally, its teams have a certain bias in favor of innovative technologies, those that simplify processes and avoid intermediate steps. The information system is considered today as one of the major …

Type: SMB Activities: IT Services Technologies: Cybersecurity

3 2 2 7
Flare Flare

Attackers Shouldn’t Have The Information Advantage. Enabling organizations to continuously monitor threats caused by human error and malicious actors to protect their data, financial resources, and reputation. Dark Web, External Threat Intelligence, Data Analysis, Web Crawling, CTI, Darknet, Intelligence, cybersecurity, Big data, and Fraud

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics

1 0 1 72
HYAS HYAS

The world-leading authority on detecting & identifying threat adversary infrastructure in networks to stop cyberattacks. HYAS is a world-leading authority on cyber adversary infrastructure and communication to that infrastructure. HYAS is dedicated to protecting organizations and solving intelligence problems through detection of adversary infrastructure and anomalous communication patterns. We help businesses see more, do more, and understand more in real time about the nature of the threats they face. HYAS turns meta-data into actionable threat intelligence, actual adversary visibility, and protective DNS that renders malware inoperable. Reverse Whois, Cybercrime Attribution, Malware Network Analysis, Rare Data, information security, attribution intelligence, threat …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 1 2 40
CTM360® CTM360®

Your Cybersecurity Department in the Cloud. CTM360 is a unified external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surface, Deep & Dark Web Monitoring, Security Ratings, Third Party Risk Management and Unlimited Takedowns. Seamless and turn-key, CTM360 requires no configurations, installations, or inputs from the end user, with all data pre-populated and specific to your organization. All aspects are managed by CTM360. CTM360 has been listed as one of the Top 14 Digital Risk Protection Companies globally by Forrester in 2018. CTM360 has been recognized as Digital Risk Protection …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 94
NVISO Security NVISO Security

NVISO is a cyber security services firm composed of outstanding security professionals - each has a specific field of expertise, ranging from security research and risk management to incident response and security testing. This unique "skill blend"​ allows them to analyse and respond to complex client challenges and help those companies prevent, detect and respond to security challenges with a positive business outcome. Built on values of Pride, Caring for our people, Breaking Barriers, and fostering a no-BS approach, our mission is to be an innovative, trusted and respected security partner for our clients. Penetration Testing, Digital Forensics & Incident …

Type: Startup Activities: IT Services deeptech Technologies: Cybersecurity

6 2 4 270
Sweepatic, an Outpost24 Company Sweepatic, an Outpost24 Company

We discover, analyze and monitor the external attack surface of organizations. Sweepatic, an Outpost24 Company is the European leader in External Attack Surface Management. Our cloud-based platform automates the continuous mapping, monitoring, and managing of all internet-connected assets and risks. Running 24/7, the Sweepatic Platform delivers attack surface observations via high-impact notifications and an easy-to-use dashboard. In this way, Sweepatic supports organizations in structuring and reducing their external attack surface – making them more cyber resilient and an unpopular target for bad actors. Passive reconnaissance, Cyber security, Data leakage, Cyber Threat Intelligence, Digital footprint, Digital Risk monitoring, Counterintelligence, Asset management, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 15
Open Cloud Factory Open Cloud Factory

[Automatic translation follows] Visibility. Control. Compliance Open Cloud Factory is a European manufacturer of cybersecurity solutions whose main objective is to increase the security of companies' networks with a holistic IT/OT approach. Backed by international market recognition, the company stands out for the modularity and adaptability that its solutions offer to clients of different sizes and sectors. infrastructures, optimization, cloud, Securization, Security, Access Control, and Virtualization

Type: Startup Activities: IT Services manufacturing Technologies: Cybersecurity

6 0 0 38
Clearswift Clearswift

Adaptive Cyber Security & Data Loss Prevention Solutions Why Clearswift? Clearswift is trusted by government, defense and financial organizations around the world to prevent cyber threats and protect critical information. Its Adaptive Cyber Security and Data Loss Prevention solutions provide an unparalleled layer of inspection, sanitization and threat prevention, enabling secure collaboration through across email, web, endpoint and cloud applications. What Makes Clearswift Unique? Embedded deep at the core of its products is a robust Deep Content Inspection (DCI) engine that inspects information flowing in and out of the network, identifies risks and applies the appropriate levels of security actions. …

Type: SMB Activities: privacytech IT Services Technologies: Cybersecurity

0 0 0 94
CAPSLOCK CAPSLOCK

Award-winning online cyber security courses that help adults change careers and see an average salary increase of 54%. CAPSLOCK is a revolutionary training company which delivers career-changing cyber security bootcamps, entirely online. We help adults reskill, via a curriculum we built in collaboration with some of the UK’s largest cyber employers. We teach you the hands-on skills you need to land your dream job in cyber. Future-proof your income, learn from anywhere with Wi-Fi, and unlock your true potential. Head to www.capslock.ac to apply cyber security, cybersecurity, information security, networking, SIEM, Incident Response, Network Protocols, Higher Education, Vocational Training, Apprenticeships, …

Type: NGO, Think-tanks, Ed, & Culture Activities: edtech IT Services

0 0 0 330
Glasswall Glasswall

We are a cybersecurity company that keeps organizations secure from file-based threats with leading CDR technology. Glasswall is a cybersecurity company that protects government agencies and commercial organizations from malicious files with its Content Disarm and Reconstruction (CDR) technology. Unlike traditional detection-based methods, Glasswall employs a zero-trust approach, which removes the ability for malware to exist in files altogether. Elimination of file-based threats, Malware risk removal, Metadata removal, Safe data migration, File uploads & downloads, Secure email, Content Disarm and Reconstruction, Preventive cybersecurity, Threat removal, Threat Intelligence, and Preventing Cybersecurity Attacks

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 130
AFI Business Consulting AFI Business Consulting

Be Better AFI Business Consulting provides a wide range of professional and a better consulting services approach to all size businesses. Areas of focus include : - CIO/CSO/VP department turn-around, - Information Security Audit & Management, - IS Risk Management, - Incident Management, - Business Continuity Management, - Professional training, Information Security Training; - IT Service Management Consulting; - Project & Proof of Concept Management; - IoT Security Consulting; - RFI/RFP management. We will be happy to offer you our services with results oriented commitment and a high quality standards. Our credo : Be Better. IS Security Consulting, IS Management, …

Type: SMB Activities: Consulting IT Services Technologies: Cybersecurity IoT

0 0 0 1
Oceanet Technology Oceanet Technology

[Automatic translation follows] CELESTE Group Secure Cloud Operator Founded in 1996 and a subsidiary of the SFDI Group, Oceanet Technology is a hosting provider and telecom operator. the Nantes-based company offers a wide range of IT services for businesses. With already 4 hosting centers and a turnover of more than 5 million euros in 2010, Oceanet Technology is today a recognized player in the Great West and continues its development by expanding its infrastructure and strengthening its teams. . infrastructure hosting - Web services, interconnection - Internet access - Firewall, messaging solutions, and outsourced backup - PRA

Type: SMB Activities: IT Services Technologies: SaaS

8 2 8 72
Eur'Net Eur'Net

[Automatic translation follows] Since 1997, Eur'Net has been made up of teams of professionals specializing in the security of IT services & Internet. Kaspersky Gold Partner

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 5
Guardea Cyberdefense Community Guardea Cyberdefense Community

1st B2B Platform in Cyberdefense: 850+ experts, 150+ Pro and Open Source solutions, News, etc. 🔐 Guardea is the first national assistance and support platform in cyber defense, freely accessible, for businesses with 1 to 10,000 employees. Guardea, as a national one-stop shop, facilitates access to over 850 French experts and the best protection solutions. Guardea, as a co-pilot, helps you enhance your security, from protection to remediation, all across France and 7 days a week. Cyber Défense, Cyber Sécurité, Lutte contre la fraude, Pilotage Projets, Assistance technique, Formation, Réponse à incidents, Sécurité Informatique, Cybersécurité, Tests d'intrusion, Siem & Soc, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

13 2 11 14
CYMOTIVE Technologies CYMOTIVE Technologies

Trusted Smart Mobility Founded in 2016 by top tier Israeli security experts, CYMOTIVE Technologies designs, develops and deploys cybersecurity solutions to solve the most complex challenges in the smart mobility market. With teams working from Israel, Germany, Sweden, and the U.S, CYMOTIVE offers a full lifecycle platform of solutions for secured development to post-production stages in the smart mobility ecosystem. The company’s customers include several manufacturers, smart cities and top tier suppliers of vehicles, fleets and other embedded solutions. Cybersecurity, Automotive, Cyber, Security, Risk, Architecture, Embedded, Software, Hardware, Analysis, Research, Vehicle, Development, SOC, PRD, System, Penetration, Testing, Requirements, and Smart …

Type: Startup Activities: Smart City transporttech IT Services Technologies: IoT

0 0 0 191
wizlynx group wizlynx group

Leave No Stone Unturned! wizlynx group is an ethical, trustworthy, and vendor-agnostic global Cyber Security provider. Headquartered in Switzerland, you can rely on us to effectively protect your business and trade secrets against any form of cybercrime. Our vision is to be a best-in-class global Cyber Security company, enabling customers to focus on their core business by providing high-quality, value added and innovative Cyber Security services. wizlynx group is one of the few globally accredited CREST Penetration Testing service providers, employing CREST registered Penetration Testers. This highly recognized certification is proof to our customers that wizlynx maintains the highest quality …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 130
Pentest-Tools.com Pentest-Tools.com

Your pentesting arsenal, ready to go ► Start a full pentest in minutes with powerful cloud-based tools and features Since 2013, the team of pentesters behind Pentest-Tools.com has been pouring its best work into making this cloud-based platform the most reliable toolkit for every engagement. Whether you’re doing recon, scanning for vulnerabilities, or looking for offensive tools, our customers say we’ve built "a superb toolbox, not the usual easy online toy" that’s "great and getting even better every few months." We strive to live up to that promise with every platform update. Get your arsenal of pentesting tools with powerful …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 61
abuse.ch abuse.ch

Cyber Security - figthing malware and botnets abuse.ch is providing community driven threat intelligence on cyber threats. It is the home of a couple of projects that are helping internet service providers and network operators protecting their infrastructure from malware. IT-Security researchers, vendors and law enforcement agencies rely on data from abuse.ch, trying to make the internet a safer place. cybersicherheit, cybersecurity, and threat intelligence

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 1
Karamba Security Karamba Security

Securing the Future of Smart Mobility and IoT, automotive, medical, enterprise edge, and Industry 4.0 connected devices. Karamba Security is a global software company that focuses on securing connected devices and embedded software with full solution for Product Security. Karamba Security is led by a team comprised of security experts, serial entrepreneurs and business savvy executives with a track record of multiple IPOs and M&As. For more details contact us at contact@karambasecurity.com Automotive Cybersecurity, Cyber Attack Prevention, Autonomous Security, IoT Security, IIoT Security, Industry 4.0, Field controllers Security, CAN Security, Inverters Security, Threat Analysis, Code Review, Remote Code Execution, Control …

Type: Startup Activities: IT Services Technologies: Cybersecurity Embedded Systems IoT

5 0 2 42
MedSec MedSec

Medical device security from start to finish. MedSec is a full-service medical device security support throughout the device lifecycle. Global regulatory expectations for medical device security have become increasingly prescriptive and comprehensive over the last decade. Threat models, penetration tests, SBOMs, and cybersecurity postmarket plans are now baseline expectation for many regulatory submissions. Staffing shortages and a widening talent deficit are stretching product security teams further than before. Keeping up can be exhausting, and it helps to have an expert in your corner. MedSec specializes in addressing these issues and more for our global client base. Nearly all of our …

Type: Startup Activities: healthtech Technologies: Cybersecurity

1 0 1 24
LogSentinel LogSentinel

Simplify security and ease compliance with LogSentinel SIEM We, at LogSentinel, deliver robust and reliable cybersecurity solutions designed to protect against data breaches and insider attacks, as well as ensure a higher level of compliance with legal standards and regulations. The average enterprise has 75 different security tools, and yet is still losing the battle with cybercriminals. Are you? Instead of having to deploy and manage dozens of point security and compliance tools, now all you need to stay safe and be compliant is LogSentinel Next-Generation Security Information and Event Management system. Log management, behavior analytics, advanced AI-driven threat detection …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Blockchain/Cryptocurrency Cybersecurity

2 0 2 1
RCDevs Security RCDevs Security

One solution for your MFA, IAM, SSO, NAC, BADGING, SSH, PAM & more needs. RCDevs is an award winning security company specialized in next-generation two-factor authentication. RCDevs is building its growing reputation over high-quality security software and its customers’ entire satisfaction. RCDevs provides cutting-edge enterprise-grade solutions in world-wide to customers ranging from SMEs to large corporations in the IT, financial, healthcare and government sectors. RCDevs is the developer of OpenOTPTM Authentication Server (http://www.rcdevs.com/products/openotp/) and TiQR Server (http://www.rcdevs.com/products/tiqr/). RCDevs’ OpenOTP and TiQR Authentication Server received the Highly Commended Award for the Best SME Security Solution at SC Magazine Awards 2012 Europe …

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 2 2 19
DIGITAL.SICHER.NRW DIGITAL.SICHER.NRW

[Automatic translation follows] We show small and medium-sized companies in North Rhine-Westphalia how digital self-defense works. Competence Center for Cybersecurity in Business in North Rhine-Westphalia - an initiative of the Ministry of Economics, Innovation, Digitalization and Energy of the State of North Rhine-Westphalia. We offer small and medium-sized companies access to tailored information, events and networking opportunities on the topic of cybersecurity. Imprint: www.digital-sicher.nrw/impressum/

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 7
Code Intelligence Code Intelligence

Application security testing for developers. Code Intelligence enables developers to take the security and stability of their software into their own hands. By automating and simplifying powerful security testing mechanisms, our technology lets developers write more secure code in enterprise and open-source. Our core technology, feedback-based fuzz testing, is a white-box testing approach, that uses instrumentation of the code base to intelligently refine test inputs. This way, our tools can uncover bugs and vulnerabilities that traditional testing methods tend to miss. All of this functionality is available open-source. For enterprise use, we provide extended features including advanced bug reporting and …

Type: SMB Activities: IT Services Technologies: Cybersecurity

6 0 6 60
ATHENE Digital Hub Cybersecurity ATHENE Digital Hub Cybersecurity

Located in Germany's cyber hot-spot, we are Germany’s leading innovation community of cybersecurity start-ups, founders, coders, investors and scientists. The hub is a project of ATHENE, the National Research Center for Applied Cybersecurity. It is also part of the German Federal Ministry of Economic Affairs and Energy's Digital Hub Initiative to promote digital innovation in Germany. If you are interested to learn more about how we can support you, don't hesitate to reach out or check out our homepage: https://www.athene-center.de/gruenden. Imprint: https://www.athene-center.de/impressum Privacy Statement: https://www.athene-center.de/en/privacy-statement

Type: Public Activities: IT Services

4 2 1 1
Veridify Security Veridify Security

Cybersecurity for Building Automation Controls, Smart Buildings, Industrial Automation Controls / ICS, SCADA, and IIoT Veridify Security provides real-time cybersecurity protection for building automation controls, smart buildings, industrial automation controls, ICS, and IIoT devices. Utilizing a NIST-compliant zero-trust framework, Veridify's DOMETM solution stops cyberattacks before they can happen. Veridify started as SecureRF to deliver fast, small footprint, ultra-low-energy, and quantum-resistant public-key security tools for low-resource processors powering the Internet of Things (IoT). Veridify’s new DOMETM Device Ownership Management and EnrollmentTM solution provides a zero-touch onboarding and ownership management platform for the smallest IoT devices in the field without requiring a …

Type: SMB Activities: IT Services constructiontech Technologies: IoT Cybersecurity

1 0 1 19
Secure Network Secure Network

Your protection, our mission. Founded in 2004, Secure Network offers specialized services to assess the security of your systems. Thanks to standard methodologies sharpened by years of experience offering penetration testing and security assessment services worldwide, Secure Network is able to effectively answer all your needs and support you in the protection of your core businesses. ethical hacking, penetration testing, computer forensics, information security, and network security

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 30
Turnkey Consulting Turnkey Consulting

Turnkey Consulting is the leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security. Built on nearly two decades of expertise, we help leading organisations around the world to safeguard their critical business applications to ensure the associated risks are minimised and controlled. Our culture is built upon quality, satisfaction, and knowledge sharing to ensure that your company’s need is at the forefront of our offerings. We are a group of passionate individuals with a shared purpose to help the world’s leading companies act with integrity and embrace best practices for Risk Management, Identity …

Type: SMB Activities: IT Services Technologies: Cybersecurity

3 0 3 189
digital.security digital.security

digital.security is now an Eviden business Founded in 2015 by a group of IT security experts with the support of the Econocom Group, digital.security (~ 230 experts) aims to offer companies and government organisations advanced audit and consulting services and a CERTTM dedicated to the IoT ecosystem. Our experts have strong expertise in providing Integration & Projects (SSO, IAM, IAG, PKI, privilege management, Logs collection, analysis and management Data compliance solutions), and also in Operational Security (outsourcing, security services center operations, SOC & SIEM management). Audit, IoT, IAM, SSO, Security, Pentesting, BugBounty, DLP, Consulting, CERT, CSIRT, RedTeam, SOC, SIEM, DFIR, …

Type: SMB Activities: IT Services Technologies: IoT Cybersecurity

0 0 0 77
Pentera Pentera

Automated Security Validation Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. For more info visit: pentera.io. Pentesting, Compliance, cybersecurity, Penetration testing, Network security, Vulnerability scanning, Ethical Hacking, Breach and Attack Simulation, Automated Red Team, Cyber Attack Simulation, Breach Assessments, Information Security, and Vulnerability Management

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 398
Chainspace Chainspace

Sharded smart contracts. Decentralised infrastructure on a planetary scale. The Chainspace platform is powering a community of makers. Makers committed to building decentralised services that allow us all to have greater ownership and control of how we interact with the digital world. We don't care about being the first, we care about being outstanding. Blockchain, Sharding, S-BAC, Atomicity, Decentralisation, User-Centred Design, and Open Source

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

0 0 0 2
Microsynbiotix, Ltd. Microsynbiotix, Ltd.

A Sundew company We are creating a potentially revolutionary algal platform technology. Thanks to major advances in algal genomics and molecular biology, microalgae can be engineered to express inexpensive therapeutic proteins and vaccines of economic value. The cost of the synthetic biology tools has dropped. We are building our technology based on solid, peer-reviewed science[1][2][3][4]. By using microalgae as an oral delivery vehicle, we can substantially cut the labor and post-processing production costs, allowing us to produce effective vaccines that are much more affordable and user-friendly. Our technology can reduce or eliminate the use of antibiotics, reduce fish mortality rates …

Type: Startup Activities: deeptech biotech Technologies: Synthetic Biology

2 1 1 35
RiskRecon, A Mastercard Company RiskRecon, A Mastercard Company

Enabling you to easily achieve better risk outcomes for your enterprise and your supply chain. RiskRecon by Mastercard enables you to easily achieve better risk outcomes for your enterprise and your supply chain. RiskRecon’s cybersecurity ratings and assessments make it easy for you to understand and act on your risks, delivering accurate, risk prioritized action plans custom tuned to match your risk priorities. As a leading provider of cybersecurity ratings, RiskRecon continuously monitors the cybersecurity risk of over 19 million companies across even the most highly regulated industries from finance and insurance to aerospace and healthcare. RiskRecon provides deep, risk-contextualized, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 2 115
Voatz Voatz

Voatz is a mobile elections platform powered by cutting edge technology making it safe and easy to vote from anywhere. Voatz is on a mission to make it safer and more accessible for people to participate in democracy. Backed by military grade technology, Voatz makes it possible and secure to vote from a smartphone. Voatz can be used in all kinds of voting events, including overseas citizen absentee voting, state political party conventions, town hall meetings, university student government elections, professional organizations and more. Depending on the election, Voatz leverages both high-security and low-security measures in order to protect both …

Type: Startup Activities: civictech IT Services regtech Technologies: Blockchain/Cryptocurrency

0 0 0 16
Privakey Privakey

Passwordless Authentication and MFA Privakey’s mission is to simplify how people confirm their identities, assert their intent and respond to any challenge. We improve the customer experience and security of digital interactions by eliminating the reliance on passwords, “security” questions and other forms of identity confirmation that introduce known security vulnerabilities and frustrate users. Our embedded software solution transforms existing mobile apps into strong customer authorizers, streamlining many existing workflows. Services use Privakey to send users challenges—a new form of secure engagement within apps. Challenges include traditional identity assertions, confirmations of intent and any type of message that may require …

Type: Startup Activities: IT Services uxtech fintech Technologies: Cybersecurity Embedded Systems

1 1 1 7
Telesoft Telesoft

Providing up-to-date Cyber Threat Intelligence, Security News, Trends, Insights, Analysis & Cyber Security News. Telesoft Technologies is a trusted global provider of government infrastructure, cyber security and telecom products and services. Headquartered in the UK, we are an engineering-led company that continuously strives to produce cutting-edge technologies, providing world-leading network monitoring solutions for network visibility and threat detection at carrier scale. Recently, we have expanded our capabilities to tailor our solutions to enterprise grade customers, offering a 24/7 Managed Detection and Response (MDR) service to help meet the needs of businesses with limited cyber security resources. Gain access to our …

Type: SMB Activities: IT Services Technologies: Cybersecurity

19 0 18 111
Secure Ideas, LLC Secure Ideas, LLC

Professionally Evil Founded in 2010, Secure Ideas is a woman-owned, small-business consulting firm. An industry leader in security consulting, training, and penetration testing, Secure Ideas is continually striving to improve the state of the art and practice of information security. Our focus is collaborating with clients to improve their security management, and reduce the risk of potential losses through a proactive approach. Having architected security solutions for large enterprises, and performed penetration testing for numerous industries from government agencies to Fortune 100 companies, we are adept at assessing client needs, comprehending complex details on new technologies, and identifying risks to …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 29
BehavioSec BehavioSec

Better Authentication. Better Experience. BehavioSec®, now LexisNexis® BehavioSec®, is the industry pioneer and technology leader for behavioral biometrics. We deliver actionable behavioral identity insight so businesses can provide customer-first digital experiences. Our behavioral biometrics technology helps passively establish identity trust and proactively target fraud as a transaction is happening. Find out more by visiting us at: https://risk.lexisnexis.com/ IT Security, Fraud detection, Information theft, Continious Authentication, authentication, digital transformation, behavioral biometrics, social engineering, fraud prevention, and fraud mitigation

Type: Startup Activities: IT Services Technologies: Cybersecurity

16 5 5 23
Intercede Intercede

Digital trust for governments, corporations, citizens and employees. Intercede® is a cybersecurity company specialising in identity, credential management and secure mobility to enable digital trust. It provides software and services that help organisations ensure the safety and security of their people, facilities, networks and information in an increasingly mobile, digital world. Intercede has been delivering solutions to high profile customers, from the US and UK governments to some of the world’s largest corporations, telecommunications providers and information technology firms, for over 20 years. Intercede’s MyID software is an identity and credential management system that enables organisations to create and assign …

Type: SMB Activities: IT Services Technologies: Cybersecurity

3 0 1 153
IT-Harvest IT-Harvest

Mining the cybersecurity industry for insights. IT-Harvest researches and reports on the cybersecurity industry, covering 3,284 vendors. Our Analyst Dashboard is coupled with concierge access to an industry expert who is on call to help with sorting an investment thesis, identifying prospective investments, partners, and acquisitions. dashboard.it-harvest.com industry research, analysis, and security

Type: SMB Activities: IT Services Technologies: Cybersecurity

7 2 4 13
Women in CyberSecurity (WiCyS) Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field. Founded through a National Science Foundation grant to Tennessee Tech University in 2012, WiCyS (pronounced Wee-Sis) is the brainchild of Dr. Ambareen Siraj, who grew the initiative into a vibrant and active community of women and supportive men from academia, industry, government and research. The organization is working to improve diversity and pipeline in the cybersecurity workforce, and it does so through numerous initiatives, together with Strategic Partners and an army of energetic volunteers. WiCyS'​ Founding Partners are Cisco, …

Type: NGO, Think-tanks, Ed, & Culture Activities: edtech

16 1 12 255
Cado Security Cado Security

Cado Security provides the first cloud forensics and incident response platform Cado Security is the provider of the first cloud forensics and incident response platform. By leveraging the scale and speed of the cloud, the Cado platform automates forensic-level data capture and processing across cloud, container, and serverless environments. Only Cado empowers security teams to respond at cloud speed.

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 2 4 55
Virus Bulletin Virus Bulletin

Security testing and certification body. Organiser of the annual Virus Bulletin conference. Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape, as well as conducting bimonthly certifications of anti-malware and anti-spam products and running an annual international IT security conference. Virus Bulletin is supported by an Advisory Board comprising some of the world's leading anti-malware and anti-spam experts.

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 1 3 13
Ubisecure Ubisecure

Identity management that improves security, streamlines user experiences, meets compliance, & lowers operational costs. Ubisecure is a Europe-based Identity Services specialist and offers a comprehensive CIAM (Customer Identity & Access Management) & LEI (Legal Entity Identifier) platform to manage the digital identities of customers, citizens, workforce and organisations. Through our RapidLEI service, the company is the largest accredited LEI issuer globally and has issued verified organisation identities to over 200k organisations. Ubisecure works with enterprises, banks, fintech/regtech, and Government for internal and client use of digital identity in digital identity management, KYC/KYB, and legal entity regulatory requirements, and delivering on …

Type: SMB Activities: IT Services Technologies: Cybersecurity

25 0 24 61
Botconf Botconf

The International Botnet & Malware Ecosystems Fighting Conference - Every year in France The International botnet fighting alliance is the organsing body for Botconf - The Botnet Fighting Conference. Organised since 2013, it aims at bringing together specialists in the fight against botnets to exchange on technical, social and legal issues relative to that fight. Botnets, Information security, and Conference

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

2 1 1 6
CyberAlps CyberAlps

Grenoble Alpes Cybersecurity Institute The Grenoble Alpes Cybersecurity Institute aims at undertaking ground-breaking interdisciplinary research in order to address cybersecurity and privacy challenges. Our main technical focus is on low-cost secure elements, critical infrastructures, vulnerability analysis and validation of large systems, including practical resilience across the industry and the society. Our approach to cybersecurity is holistic, encompassing technical, legal, law-enforcement, economic, social, diplomatic, military and intelligence-related aspects with strong partnerships with the private sector and robust national and international cooperation with leading institutions in France and abroad. Cybersecurity, Critical Infrastructures, Cryptography, Social Sciences, International Law, Embedded Hardware, Vulnerabilty assessment, and …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 4
IntSights, a Rapid7 company IntSights, a Rapid7 company

IntSights delivers best-in-class, cloud-native external threat detection to further extend Rapid7’s industry-leading security operations platform, providing customers with end-to-end external and internal threat detection, automation and remediation. Cyber Intelligence, Threat Remediation, Threat Intelligence, and Cyber Threat Intelligence

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 41
ActZero ActZero

24/7 Ransomware Defense You Can Measure. Designed for smaller businesses, ActZero Managed Detection & Response (MDR) service provides a powerful full-stack cybersecurity solution at a fair price. We wrapped enterprise-grade technology combined with our expert threat hunters into a service with 24/7 protection across endpoints, network, mobile devices, cloud, identity, and email accounts. Cloud Security, CMMC, Cybersecurity Maturity Model, Data Security, Info Sec, Information Security, Malware Analysis, Malware Defense, Malware Protection, Managed Detection and Response, MDR, MDR for Mobile, Ransomware, Ransomware Defense, Ransomware Protection, and Ransomware Readiness Assessment

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I. A.I. - Machine Learning

3 0 2 62
Cavirin Systems, Inc. Cavirin Systems, Inc.

The First Line of Defense for Your Cloud Security Cavirin protects your digital assets across the enterprise hybrid cloud by delivering CyberPosture Intelligence. We permit enterprises to maintain their ‘golden security posture’ via continuous visibility, automated scoring against the widest set of industry best practices, regulations, and benchmarks, and remediation leveraging predictive analytics and by integrating security into the DevOps cycle. Cloud Security, Regulatory compliance, DevSecOps, Docker, AWS, CIS CSC 6.1, PCI DSS 3.2, CIS Benchmark, DISA STIG, Secure Host Baseline Configuration, Risk Assessment, FedRamp, Google Cloud, HIPAA, SOC2, Cybersecurity, Microsoft Azure, ISO27002, Hybrid Cloud, and CyberPosture Intelligence

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity Data Analytics

4 0 4 15
Praetorian Praetorian

The Leader in Offensive Security Praetorian, a trusted leader in offensive security services, empowers enterprises to thrive in a digital world without compromise. Enterprise security demands the ability to proactively detect vulnerabilities and threats, yet identifying signals from noise in today’s ever-expanding attack surfaces is increasingly difficult. Our cybersecurity experts provide the deep subject matter expertise needed to defend against persistent, sophisticated attacks. Praetorian professional and managed services cover all attack vectors - external, internal, cloud, web app, secrets, phishing, and supply chain and vendor risk. With Praetorian standing guard, CISOs of the world’s largest organizations rest assured that they …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity IoT

6 2 2 149
Cobalt Cobalt

Modern pentesting for security and development teams. Cobalt combines talent and technology to provide transformative offensive security solutions for organizations to remediate risk across a dynamically changing attack surface. The innovators of Pentest as a Service, Cobalt empowers businesses to optimize their existing resources, access an on-demand community of trusted security experts, expedite remediation cycles, and share real-time updates and progress with internal teams to mitigate future risk. Web security, Vulnerability management, Application security, Web Application Security, Mobile Application Security, API Security, pentesting, and pentesting as a service

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 1 5 448
Cortex by Palo Alto Networks Cortex by Palo Alto Networks

The industry’s most comprehensive product suite for security operations. The industry’s most comprehensive product suite for security operations empowering enterprises with the best-in-class detection, investigation, automation and response capabilities. Incident Response, Computer Security, Security Orchestration, Security Automation, Threat Hunting, SOAR, and Security Orchestration Automation and Response

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 75
Claroty Claroty

Securing Cyber-Physical Systems Across the Extended Internet of Things (XIoT) Claroty empowers organizations to secure cyber-physical systems across industrial (OT), healthcare (IoMT), and enterprise (IoT) environments: the Extended Internet of Things (XIoT). The company’s unified platform integrates with customers’ existing infrastructure to provide a full range of controls for visibility, risk and vulnerability management, threat detection, and secure remote access. Backed by the world’s largest investment firms and industrial automation vendors, Claroty is deployed by hundreds of organizations at thousands of sites globally. The company is headquartered in New York City and has a presence in Europe, Asia-Pacific, and Latin …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

17 3 11 532
RAD Security RAD Security

Eliminate cloud native attacks with verifiable workload, identity and infrastructure baselines. In sharp contrast to one-size-fits-all, legacy CWPP and container detection and response solutions, RAD takes a custom, behavioral approach to cloud native detection and response that can counter evolving threats while sharpening inputs into shift-left and posture management. Cloud-Native Security, Kubernetes, AWS, Microsoft Azure, Google Cloud Platform, Docker, Security, cloud security, Kubernetes Security, Kubernetes RBAC, Kubernetes Admission Control, Kubernetes Security Posture Management, Kubernetes misconfigurations, AKS, EKS, and GKE

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 35
ISA Cybersecurity ISA Cybersecurity

Canada's leading cybersecurity-focused company. At ISA Cybersecurity, our vision is to help create a world in which everyone is safe from cyber threats. Through our commitment and passion for excellence and our trusted brand and people, our mission is to help protect our customers so that they can securely and safely support their employees and clients. ISA is Canada's leading pure-play cybersecurity company, with nearly three decades of experience delivering cybersecurity end-to-end services and people, you can trust. Our team is proud to serve clients both large and small across a diverse range of industries. We provide our clients with …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 2 84
Naoris Naoris

[Automatic translation follows] No Weak Links NAORIS was conceived to research how advancements in Blockchain, AI and data science can provide an alternative approach to traditional cybersecurity. Founded by a team with extensive experience in cybersecurity and cutting-edge Blockchain tech, NAORIS realizes the urgency in tackling the exponential rise of cyber threat across the digital world, one that traditional cybersecurity is struggling to mitigate. At the core of its R&D concept, NAORIS leverages blockchain consensus to provide the first decentralized anonymous cyber threat intelligence framework, unlocking a new paradigm in cybersecurity standards. With early success already proven, NAORIS have been …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I. Blockchain/Cryptocurrency Data Analytics

1 1 0 6
Hack The Box Hack The Box

The #1 cybersecurity upskilling, certification, and assessment platform for hackers and organizations. Hack The Box is a leading gamified cybersecurity upskilling, certification, and talent assessment platform enabling individuals, businesses, government institutions, and universities to sharpen their offensive and defensive security expertise. Launched in 2017, Hack The Box brings together the largest global cybersecurity community of more than 2m platform members and is on a mission to create and connect cyber-ready humans and organizations through highly engaging hacking experiences that cultivate out-of-the-box thinking. By offering a fully guided and exploratory skills development environment, Hack The Box is the ideal solution for …

Type: Large company Activities: IT Services Technologies: Cybersecurity

19 4 12 1,665
e92plus e92plus

We're e92plus: the leading cybersecurity VAD for the UK channel, with best in class tech and award winning services. e92plus is the leading cybersecurity VAD for the UK channel, going beyond traditional distribution to provide exceptional products and services that drive accelerated growth for our vendor and reseller partners. With an established track record of introducing disruptive and next-gen technologies and building successful channels, e92plus has grown to become an award winning, next generation VAD. Our services, delivered through in-house specialists, compliment and support our partners in their go-to-market strategy: encompassing technical, marketing, finance and operations, with our expertise in …

Type: SMB Activities: IT Services fintech martech Technologies: Cybersecurity

0 0 0 77