Entities
LogoName Σ Employees
Computer Friendly Consultants Limited Computer Friendly Consultants Limited

What we do today, secures your business for tomorrow! Specialist in Business Continuity and Secure Remote Working! Computer Friendly Consultants are a Managed Service Provider and Business Continuity Specialist with 24/7 Remote Monitoring Systems ensuring system availability and data integrity. Giving business executives up to date information on the performance of their IT. Data Recovery and Disaster Recovery consultants are on call to assist with Cloud, Office 365 and the traditional on Premise solutions. Support for your server for less than a cup of coffee per day; surely a better investment than a Latte even with a sprinkle of chocolate …

Type: SMB Activities: IT Services Technologies: Data Analytics

0 0 0 5
SOLUCEO | HEXANET SOLUCEO | HEXANET

[Automatic translation follows] Walkthrough & Hexanet are players in the digital transformation of organizations in the field of IT infrastructures. SOLUCEO, belonging to HEXANET, specializes in supporting digital transformation. The Soluceo service offer revolves around four main stages which are evaluation, design, integration and operation, covering the whole of a virtualization, consolidation, storage, messaging project. or archiving. Soluceo was born from the desire and involvement of people with experience in the field of IT to offer a set of local services with high added value. We offer our customers a new approach to IT, based on a global vision of …

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 0 1 16
Club 27001 Club 27001

[Automatic translation follows] Association for sharing and exchange on ISO 27000 standards in information security. Club 27001 is a 1901 law association whose objective is to bring together stakeholders, professionals and all people interested in the ISO 27000 series of standards, in the form of a working, reflection and exchange group. . Groups are present in different cities in France. They meet to discuss standards. Their participation is free. Since 2007, Club 27001 has organized an annual conference to share feedback on the use of standards and present perspectives. The Club organizes working and study groups in different areas. In …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

10 0 9 14
Alias Robotics Alias Robotics

Robot cybersecurity Alias Robotics is a robot cybersecurity company. Grounded upon prior experiences in robotics, we help groups improve their robot security posture via services including professional threat models, penetration testing or red teaming activities. Alias is also the firm behind RIS, the Robot Immune System, a security certified software solution that protects robots and robot components against malware. robotics, security, cybersecurity, safety, pentesting, red teaming, and robot consulting

Type: Startup Activities: IT Services Technologies: Robotics

6 3 2 14
Paubox Paubox

HIPAA compliant email made easy. Start for free: https://www.paubox.com/pricing HIPAA compliant email and texting made easy. Start for free: www.paubox.com/pricing Email security, Cloud computing, Email encryption, HIPAA compliant email, Email API, HIPAA compliance, Data Loss Prevention, Secure Email, Email Security, HIPAA email marketing, Email DLP, Email Archiving, cybersecurity, Healthcare Marketing, Healthcare IT, and Healthcare Cybersecurity

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 0 52
Sift Sift

Sift is the AI-powered fraud platform securing digital trust for leading global businesses. Sift is the AI-powered fraud platform securing digital trust for leading global businesses. Our deep investments in machine learning and user identity, a data network scoring 1 trillion events per year, and a commitment to long-term customer success empower more than 700 customers to grow fearlessly. Brands including DoorDash, Yelp, and Poshmark rely on Sift to unlock growth and deliver seamless consumer experiences. Visit us at sift.com. Machine Learning, Software as a Service (SaaS), Fraud Detection, Predictive Analytics, Big Data, Data Visualization, Digital Trust, Digital Trust & …

Type: Startup Activities: IT Services Technologies: A.I. - Machine Learning A.I. Data Analytics SaaS

14 2 4 370
Quantstamp, Inc. Quantstamp, Inc.

The leader in web3 security | YC W18 | quantstamp.com Quantstamp is the leader in blockchain security. We secured blockchain applications that manage over $200 billion dollars worth of digital assets for the best projects in the space including OpenSea, ETH2.0, Solana, and Maker. We are securing the financial infrastructure of tomorrow. We are a remote 1st company spread across 5 continents and 16 countries. We have an intellectually stimulating work environment and team members who truly care for each other. In order to deliver high quality services to our clients, our engineers have a direct communication style and respectfully …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

7 1 7 82
Pistachio Pistachio

Empowering digital freedom of movement New threats demand new solutions. Pistachio is a platform that works for you, keeping your organization safe in the modern world. Our tailored cybersecurity training ensures your team stays protected from evolving threats while gaining the confidence to navigate with freedom. Cybersecurity, Security, Security Awareness, Information Security, Security Awareness Training, Cyber Attack Simulations, Phishing Training, IT Sikkerhet, Sikkerhetsopplæring, Internet Security Awareness Training, Cybercrime Prevention, Network Security, and Simulated Phishing

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 41
Ermes Browser Security Ermes Browser Security

Here to secure your next click. Web and Browser protection made effective for you and your company 🌐 Ermes Cyber Security S.p.A. is a leading italian company recognized as one of the most influentials worldwide in the AI-powered cybersecurity sector and founded by a team of Web Security experts and Artificial Intelligent researchers. We believe that an informed online navigation is a social asset that can generate multiple values: to individuals, to communities and to the companies. Therefore, our mission is to protect professionals who navigate and engage online by implementing strategies and making information accessible. That's not easy, as …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I.

2 0 2 44
TrustedSec TrustedSec

End-to-end cybersecurity consulting team leading the industry, supporting organizations, and giving back. We are TrustedSec, a security consulting team that combines high-level talent and advanced tools to help our partners achieve their security objectives. Organized by practice areas and specialty teams, we empower organizations to mature their security programs effectively with impactful recommendations. IT Security Consulting, Information Security, Application Security, Network Security, Security Consulting Services, Corporate Security, Attack and Penetration Testing, Governance, Risk, PCI, IT General Controls, HIPAA, GLBA, Vendor Risk Management, Penetration Testing, Red Team, and Business Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 1 110
Wandera, a Jamf company Wandera, a Jamf company

The way enterprises work has changed. Data is stored beyond corporate walls, and limitless connections have given rise to remote working. The perimeter has been redefined. This evolving new environment requires a new security model that is cloud centric. Wandera provides a zero trust cloud security solution to protect the modern workplace. We enable zero-trust access to all your applications, secure your data and devices against cyber threats and help you apply policies to filter internet access and reduce risk exposure. We believe in making security simple. This is why we created a unified offering, managed through a single console …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 52
Binary Defense Binary Defense

Real people detecting real threats in real time. Founded in 2014 by the industry’s top cybersecurity experts, Binary Defense is on a mission to change the security industry for the better and help organizations defend against threats of all kinds. We believe that the best defense against cyber threats uses a human-driven, technology-assisted approach. We protect businesses of all sizes through our advanced cybersecurity solutions including Managed Detection and Response, Threat Hunting, Digital Risk Protection, Incident Response, Phishing Response, and Analysis on Demand. Binary Defense was spawned from the need for better monitoring and detection capabilities in companies. The founder …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 0 204
CynjaTech CynjaTech

The status quo of identity is broken. Bring your identity into the future with CynjaTech. Home of CynjaTech - a data security firm utilizing next-generation microcloud infrastructure to power the new CynjaTrust platform. With this revolutionary technology, any digital entity gains a competitive advantage by meeting a growing consumer and regulatory demand for data control and ownership, privacy, and security in a cost-effective, simple package. CyberSecurity Will Never Look The Same Again! cybersecurity, education, publishing, technology, EdTech, blockchain, Selfsovereignidentity, Sovrin, and Hyperledgerindy

Type: Startup Activities: edtech IT Services Technologies: Blockchain/Cryptocurrency Cybersecurity

11 0 7 3
AlienVault AlienVault

Join the Alien Nation! We're on a mission to provide organizations throughout the universe with highly intelligent security that is affordable and simple to use. We founded AlienVault to help organizations of all shapes and sizes achieve world-class security without the headaches and huge expense of other solutions. And we are passionate about our mission! Interested in joining our Alien Nation? We're a peace-loving bunch of extraterrestrials interested in nothing less than changing the world of security to be attainable to organizations. Besides having the opportunity to work for an award-winning company, offering an award-winning product, you'll have a chance …

Type: Startup Activities: IT Services Technologies: Cybersecurity

16 1 3 61
Deep Instinct Deep Instinct

Prevention Without Compromise. Powered by Deep Learning. Deep Instinct is the first company to apply deep learning to cybersecurity. Deep learning is inspired by the brain’s ability to learn. Once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct’s artificial brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. As a result, zero-day and APT attacks are detected and prevented in real-time with unmatched accuracy. Deep Instinct brings a completely new approach to cybersecurity that is proactive and predictive. Deep Instinct provides comprehensive defense that is designed to …

Type: Startup Activities: IT Services Technologies: A.I. - Deep Learning Cybersecurity A.I.

5 0 5 248
Preempt, A CrowdStrike Company Preempt, A CrowdStrike Company

Preempt, A CrowdStrike Company Preempt secures all workforce identities to accelerate digital transformation. Since 80% of all breaches involve compromised credentials, Preempt unifies security visibility and control for on-premises and cloud identities. Threats are preempted and IT policy enforced in real-time using identity, behavioral, and risk analytics. Preempt protects 4M+ workforce identities across 400+ enterprises. Customers have reduced the cost required to stop advanced threats and accelerate Zero Trust and Conditional Access initiatives. Founded in 2014, Preempt is headquartered in Silicon Valley, with R&D in Israel and sales offices worldwide. IT Security, Conditional Access, Identity, Authentication, Active Directory Security, Privileged …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 10
BigID BigID

Security • Compliance • Privacy • AI • Risk • AI Data Management BigID is a leader in data security, privacy, compliance, and governance: enabling organizations to proactively discover, manage, protect, and get more value from their data in a single platform for data visibility and control. Customers use BigID to reduce their data risk, automate security and privacy controls, achieve compliance, and understand their data across their entire data landscape: including multicloud, hybrid cloud, IaaS, PaaS, SaaS, and on-prem data sources Identity Protection, Privacy Governance, PII Risk Management, Privacy Analytics, Security, Privacy Compliance, Data Governance, Data Protection, GDPR, Data …

Type: Startup Activities: privacytech IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity Data Analytics SaaS

6 0 6 586
Kriptos Kriptos

Automatic Data Classification : Kriptos is the ultimate solution for data security, regulatory compliance, and effective information management. We empower companies to remove the blindfold and leverage data for enhanced decision-making in data security and governance, protecting their most valuable assets while complying with regulations. Software accelerated at the Barclays Accelerator Program powered by Techstars in Tel Aviv, Israel. www.kriptos.io Cybersecurity, Security, Data Classification, Data Leakage, AI, Machine Learning, Software, and Risk Management

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I. A.I. - Machine Learning

3 2 0 55
Private Communications Corp. Private Communications Corp.

Built to partner... Founded in 2010 by serial entrepreneur Kent Lawson, Private Communications Corporation (PCC) is a leading provider of Internet security and utilities that give consumers an optimized and secured online experience. PCC partners with a wide range of companies to enable them to make available to their customers and partners VPN encryption, video compression, ad blocking, as well as a variety of customized services. Our innovative, patented technologies can be deployed as standalone products, co-branded or private labeled products, or integrated into existing offerings. In addition, PCCs network infrastructure also serves as the backbone for numerous partner services. …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 1 0 11
Identiv Identiv

YOUR WORLD, VERIFIED. Identiv is a global leader in seamless authentication and security solutions. We verify frictionless access and anywhere operations, protect identities from malicious attacks, secure intellectual property, and drive IoT innovation. Our platform encompasses RFID and NFC, cybersecurity, and the full spectrum of physical access, video, and audio security. We digitally secure the physical world. Sign up for our monthly newsletter: https://go.identiv.com/newsletter RFID, NFC, Access Control, Physical Access Control, Logical Access Control, Credentials, RFID Inlays and Tags, FICAM, FIDO, CPNI, Smart Card Readers, Video and Data Analytics, Telephone Entry Systems, IoT, Mobile Security, Identity Management, Security, High Frequency …

Type: Startup Activities: IT Services Technologies: Wireless Cybersecurity Data Analytics IoT NFC

14 1 10 284
Indegy Indegy

Leader in Industrial Cyber Security - Protecting SCADA, ICS and OT Networks of Critical Infrastructure. Indegy, a leader in industrial cyber security, protects industrial control system (ICS) networks from cyber threats, malicious insiders and human error. The Indegy Industrial Cybersecurity Suite with Indegy CIRRUS cloud service (ICSaaS), is powered by patented technology that arms security and operations teams with full visibility, security and control of ICS activity and threats. Indegy combines policy-based monitoring, network anomaly detection and signature detection with unique device integrity checks powered by active technology threat detection. Indegy solutions are installed in manufacturing, pharmaceutical, automotive, power and …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

1 0 0 6
Luta Security Luta Security

Identifying Gaps | Addressing Weaknesses | Advancing Security Maturity Luta Security is transforming the way governments and organizations are managing people, processes, and technology to improve vulnerability coordination and security overall. We understand that there is not a one-size-fits-all approach to security. Every organization needs to assess its process maturity and operational capacity to determine what actions are needed to enhance its security, including which strategies and solutions make sense today and in the future. Luta Security advises organizations across all phases of vulnerability coordination. Whether your organization is just getting started, or if you have already launched a vulnerability …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 1 4
Cyberhaven Cyberhaven

Trace your data to protect it like never before Your important data is always in motion, spreading to new people, applications, and devices that are outside traditional security controls. We protect data anywhere it goes in the extended enterprise. You can't protect what you can't see. We classify data by analyzing billions of events, not just patterns in the content, assembling a data lineage to identify and protect what other tools can’t. DLP, data protection, insider threat, data tracing, and data lineage

Type: Startup Activities: privacytech IT Services Technologies: Data Analytics Cybersecurity

2 0 2 115
Constella Intelligence Constella Intelligence

AI-Driven Identity Risk Intelligence from a Constellation of One Trillion Compromised Assets Constella Intelligence is a leading global Digital Risk Protection business that works in partnership with some of the world’s largest organizations to safeguard what matters most and defeat digital risk. Its solutions are broad, collaborative and scalable, powered by a unique combination of proprietary data, technology and human expertise—including the largest breach data collection on the planet, with over 100 billion attributes and 45 billion curated identity records spanning 125 countries and 53 languages.

Type: Startup Activities: IT Services Technologies: Data Analytics

4 2 8 137
Threatpost Threatpost

Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world. Follow Threatpost to stay up to date on the latest cybersecurity news: Twitter: @Threatpost Facebook: https://www.facebook.com/Threatpost/ Cybersecurity, Privacy, Vulnerabilities, and Breaches

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

11 2 4 2
S21sec S21sec

The biggest iberian company of cybersecurity services S21Sec, Cyber Solutions by Thales, is a leading European Cybersecurity pure-player, with more than 400 security experts and an Iberian SOC. S21Sec works with its clients globally to enable their business transformation by managing their cybersecurity risks and protecting our client’s people and assets. We can cover organization’s needs across all the NIST Framework, from Defining their Cybersecurity Strategy to Responding to the most complex cybersecurity incidents. S21sec is part of the defense unit of Thales Group, with a presence in more than 68 countries. Cybersecurity experts, Cybersecurity, Cybersecurity services, Ciberseguridad, Servicios de …

Type: SMB Activities: IT Services Technologies: Cybersecurity

6 0 6 468
Tenable Tenable

Cloud Security | Operational Technology | Identity Security | and more Tenable® is the Exposure Management company. Approximately 40,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies. Learn more at tenable.com. Exposure Management, Cloud Security, Operational Technology, Vulnerability Management, Application Security, Kubernetes, Web Application Scanning, Generative …

Type: Large company Activities: IT Services Technologies: Cybersecurity

28 4 15 2,202
Internet Security Auditors Internet Security Auditors

Your Security is Our Success Experts in #Cybersecurity. Leaders in #HackingEthics, #PCI standards, #ISO27001, #ISO27032 e #ISO22301, #ProtDatos, #RGPD, #Cyberintelligence and #SecuritySDLC Síguenos en: blog.isecauditors.com facebook.com/ISecAuditors twitter.com/ISecAuditors instagram.com/isecauditors Ethical Hacking (pen-test, application testing, source code review, technical reviews,...), Managed Security Services (IPS, WAFs, AntiMalware, Sec. Infrast. Mngt., forensics & expert witness...), and Compliance Implementation (27001, 22301, 27032, PCI DSS, PA DSS, LOPD, GDPR, Habéas Data)

Type: SMB Activities: IT Services privacytech Technologies: Cybersecurity

0 0 0 54
NortonLifeLock NortonLifeLock

NortonLifeLock and Avast have merged and are now GenTM. ​NortonLifeLock Inc. (NASDAQ: NLOK) is a global leader in consumer Cyber Safety with a growing portfolio of trusted and recognized brands. Our award-winning products and services help protect and empower people to live their digital lives safely. Nearly 80 million users in more than 150 countries trust us with their personal information. We’re dedicated to making it easy for them to keep their connected lives safer while helping to secure their devices, online privacy, identity, and home and family needs. ​ NortonLifeLock.com​ Norton.com​ Avira.com LifeLock.com​ ReputationDefender.com

Type: SMB Activities: IT Services Technologies: Cybersecurity

15 1 5 1,067
Simeio Simeio

We simplify IAM complexities for global organizations to ensure security goals are met, backed with right tech & people! Customers of all sizes globally rely on Simeio to help secure their organizations. An innovative and industry leader, Simeio offers professional services, Identity and Access Management (IAM) managed services and Identity as a Service (IDaaS). Its full range of services is powered by an industry-first IAM Virtualization Platform delivered via Simeio's Identity SOC. Simeio's Identity SOC is the first and only solution of its kind designed specifically to operate, monitor, and defend complex multi-vendor IAM infrastructures and deliver actionable business intelligence. …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 1 738
Next DLP Next DLP

Next is a leading provider of insider risk and data protection solutions. Next DLP ("Next") is a leading provider of insider risk and data protection solutions. The Reveal Platform by Next uncovers risk, stops data loss, educates employees, and fulfills security, compliance, and regulatory needs. The company's leadership brings decades of cyber and technology experience from Fortra (f.k.a. HelpSystems), DigitalGuardian, Crowdstrike, Forcepoint, Mimecast, IBM, Cisco, and Veracode. Next is trusted by organizations big and small, from the Fortune 100 to fast-growing healthcare and technology companies. With a user-centric, flexible, cloud-native, ML-powered solution, the Reveal platform by Next is built for …

Type: Startup Activities: IT Services privacytech Technologies: Data Analytics A.I. Cybersecurity Generative A.I.

0 0 0 85
Security Risk Advisors Security Risk Advisors

We Level-Up every day to protect our clients and their customers We deliver cybersecurity services to leading companies in the Financial Services, Healthcare, Pharmaceuticals, Technology and Retail industries. We are not a reseller/VAR. We write excellent freeware for everyone's benefit. Level Up | It's Personal | Punch Above Your Weight Security Assessments, Penetration Testing, Application Security, Managed Security Services, Threat Hunting, Cybersecurity Strategy, Purple Teams, Red Teams, MITRE ATT&CK, HIPAA, CyberSOC, CSOC, XDR, MDR, Attack Simulation, OT Security, and Cloud Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 1 242
TerraZone TerraZone

Advanced Cybersecurity Solutions for a Connected World TerraZone Ltd. (www.terrazone.io) is a global cyber security and privacy solutions provider to governments and enterprises. TerraZone’s software solutions protect industry-leading customers from cyber-attacks with industry-listed cyber patents. TerraZone offers a multilevel security architecture, leading in the "Zero Trust" combined product architecture that defends an enterprise’s cloud. TerraZone provides the most comprehensive one-point-of-control security management system. TerraZone solutions defend thousands of organizations of all sizes. Information Security, Cyber Security, MFA, Technology, and Cyber Defense

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 10
H2020 Caramel Project H2020 Caramel Project

CARAMEL: Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles CARAMEL: Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, increased environmental pollution due e.g., to traffic jams or malicious modifications in sensors’ firmware, and ultimately, the great danger for …

Type: Startup Activities: transporttech IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

0 0 0 N/A
SUSE NeuVector SUSE NeuVector

SUSE NeuVector, Full Lifecycle Container Security Full Lifecycle Container Security. SUSE NeuVector is the only 100% open source, Zero Trust container security platform. Continuously scan throughout the container lifecycle. Remove security roadblocks. Bake in security policies at the start to maximize developer agility. Docker, Security, Containers, Applications, Kubernetes, Container Firewall, East West Traffic, Host Protection, Image Vulnerability Scanning, Compliance and Audit, Container Network Security, Threat Detection, OpenShift Security, Kubernetes Security Automation, Application Security, Cloud Security, Rancher, and Open Source

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 18
Rezilion Rezilion

Secure in Time. Deliver on Time. Rezilion accelerates software security, clearing manual security clutter to help teams focus on what matters, eliminate risk quickly, and free up time to build.

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 31
Tilo cybersecurity services Tilo cybersecurity services

[Automatic translation follows] Cybersecurity Services TILO is a company dedicated to providing consulting services in cybersecurity management with a focus on risk management. We understand that cybersecurity includes various aspects in addition to technical solutions and must be addressed holistically by organizations to achieve an adequate understanding of their current posture. From that knowledge, we help organizations plan their target cybersecurity posture. cybersecurity, information security, risk management, security management, AGESIC Cybersecurity Framework, NIST CSF, ISO/IEC 27001:2013, and COBIT

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 2
ThreatQuotient ThreatQuotient

Data-driven security operations ThreatQuotient’s mission is to improve the efficiency and effectiveness of security operations with a platform that accelerates and simplifies investigations and collaboration within and across teams and tools. Integrating an organization’s existing processes and technologies into a unified workspace, ThreatQuotient’s solutions reduce noise, highlight top priority threats and automate processes to provide greater focus and decision support while maximizing limited resources. ThreatQuotient’s threat-centric approach supports multiple use cases including incident response, threat hunting, spear phishing, alert triage and vulnerability management, and also serves as a threat intelligence platform. ThreatQuotient is headquartered in Northern Virginia with international operations …

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 0 2 103
Spire Solutions Spire Solutions

The Middle East & Africa region''s preferred cybersecurity partner & leading VAD We Are Spire Solutions! The Middle East & Africa region's preferred cybersecurity partner & a leading value-added distributor (VAD), with exclusive distribution rights for some of the world’s best-known vendors (OEMs) that offer niche cyber security solutions and services. We engage, empower and enable channel partners across Middle East & Africa via various partnership models and programs. Driven by a strong dedication to customer success and solving problems without creating new ones, we have built a reputation of being the preferred security partner to CISOs of several government …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 1 63
SI | Sichere Industrie GmbH SI | Sichere Industrie GmbH

[Automatic translation follows] Field-tested know-how for the implementation of your industrial security projects At our core, we are a smart, empathetic engineering office for demanding security projects in OT. We actively carry out customer projects and develop exciting digital content formats based on our experiences. With our heart project, the free knowledge platform “Secure Industry”, we help several hundred people every day with their security projects in operational technology (OT). In this way, we actively support our readership in the implementation of industrial security projects in their organizations. We work 100% remotely. All of our processes, meetings and customer projects …

Type: Startup Activities: IT Services Technologies: IoT Cybersecurity

0 0 0 15
Botdoc Botdoc

Transforming your customer experience Botdoc helps thousands of organizations worldwide give their customers a better experience with a simple, fast and secure way to exchange confidential information. With Botdoc’s globally-patented technology, companies can employ an encrypted channel with consumers to exchange documents, signatures, payments, and other capabilities without the traditional challenges of passwords, apps, logins, or plugins. Data Transportation and Cyber Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 3 17
Sentryo Sentryo

Cybersecurity for the Industrial Internet As of August 8, 2019, Sentryo was acquired by Cisco Systems. Sentryo is a software vendor providing cybersecurity and situation awareness solutions dedicated to industrial networks and the Internet of Things. Industrial networks are at the core of our daily lives. They operate smart cities, utilities, energy grids, and many key and critical infrastructures that we all depend on. Merged with IT technologies, they are the foundation of the upcoming Internet of Things where many different kind of smart devices will collaborate. Facing many new threats and punitive regulations, stakeholders must react and organize their …

Type: Startup Activities: IT Services Technologies: IoT Sensors Cybersecurity A.I.

4 1 3 4
Adallom Adallom

Founded in 2012 by cyber defense veterans, Adallom is a cloud access security broker delivering visibility, governance and protection for SaaS applications like Salesforce, Google Apps, Office 365 and Box. Our innovative platform is simple to deploy, seamless and extensible, and is available as a SaaS-based or on-prem solution. Powered by Adallom SmartEngineTM advanced heuristics and backed by Adallom Labs, our elite cybersecurity research team, we make it easy to secure corporate data, govern cloud application usage and protect against threats in the cloud. For more information, visit us at www.adallom.com or follow us on Twitter @adallom. SaaS security, cloud …

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity SaaS

2 0 1 6
CyberGRX CyberGRX

Sleep soundly with our TPRM platform. Pinpoint, measure, and prioritize third-party cyber risks for effective planning. CyberGRX = TPRM for the speed of your business. When assessments take weeks or months to complete, it impairs an InfoSec team's ability to speak into a vendor decision. With CyberGRX's library of 14,000 attested assessments, 250,000 company profiles, predictive risk insights and threat intelligence, you can make initial vendor decisions immediately. And, if deeper evaluation is needed, CyberGRX plus ProcessUnity's automated workflows streamline the process so you'll never chase assessments again. The risk of inaction is costly. The ROI of CyberGRX and ProcessUnity …

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics

0 0 0 61
WEBGAP WEBGAP

Remote Browser Isolation | Between You & The Malware WEBGAP is a proprietary browser isolation platform designed to physically isolate its users from web based cyberattacks. Put a WEBGAP between your users and malware using our fully hosted remote browsing service for complete internet peace of mind. #BrowserIsolation #Cybersecurity #RemoteBrowsing Browser Isolation, Remote Browsing, Cybersecurity, Infosec, and Information Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 3 1
NuCypher NuCypher

NuCypher is a data privacy layer for blockchain and decentralized applications. It gives developers a way to store, share, and manage private data on public blockchains. Big Data, Cybersecurity, and Encryption

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity Blockchain/Cryptocurrency Data Analytics

7 3 4 12
RunSafe Security Inc. RunSafe Security Inc.

Immunize Your Software. Protect embedded, open source, and IT systems from the most dangerous threats to software today. RunSafe Security is the pioneer of a patented cyberhardening transformation process designed to disrupt attackers and protect vulnerable embedded systems and devices. With the ability to make each device functionally identical but logically unique, RunSafe Security renders threats inert by eliminating attack vectors, significantly reducing vulnerabilities and denying malware the uniformity required to propagate. Headquartered in McLean, Virginia, with an office in Huntsville, Alabama, RunSafe Security’s customers span the critical infrastructure, IIoT, automotive, medical, and national security industries. Cyber hardening, Embedded systems, …

Type: Startup Activities: IT Services deeptech healthtech Technologies: Embedded Systems Cybersecurity IoT

5 0 3 20
MalCrawler MalCrawler

We protect computers in the ICS/SCADA world from malware. We Prevent, Analyze, and Destroy malware! MalCrawler is a next generation cyber security product that detects, analyzes, and destroys malware targeting critical infrastructure such as Power, Oil & Gas, Manufacturing, and more. MalCrawler also detects, analyzes, and destroys malware for the IT enterprise. Malware, SCADA, and Industrial Control System

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
Vericlave Vericlave

They can’t infect what they can’t access. At Vericlave we prevent cyberattacks on critical assets with a simple to deploy, proven solution that mitigates risks and addresses security challenges. With a unique integration of a hardware root of trust combined with software, encryption and key management algorithms, we create secure and concealed enclaves for any network architecture. Vericlave is not a start-up. We have more than 20 years of proven technology solutions deployed in high stakes governmental agency, enterprise and industrial environments that protect critical systems 24/7. Our management team brings high-level commercial, military, government, law enforcement, homeland security, intelligence …

Type: Startup Activities: military IT Services Technologies: Cybersecurity

0 0 0 3
JSOF JSOF

Exploring the Depths of Security JSOF is an Israeli boutique cyber consultancy and project firm. We understand software, low-level technologies and information security. Our expertise comes from years of experience in the best teams of the Israeli cyber world. We use our in-depth knowledge to provide cutting-edge cyber-security solutions and overcome the most challenging projects. IoT Research, Embedded Devices, IP protection, Mobile security, OS Internals, Fuzzing, SDL, Information security, Secure code review, Cyber Security, Automotive Cyber Security, Medical Devices Cyber Security, ICS Cyber Security, IoT Cyber Security, and product security

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

0 0 0 8
Xage Security Xage Security

Global leader in zero trust access and protection Xage is a global leader in zero trust access and protection on a mission to pioneer a secure tomorrow. Control access and prevent attacks in the cloud, in the data center, at the remote operational edge anywhere on Earth, and even in orbit with the Xage Fabric Platform. Xage is easy to manage and can be deployed in a day, giving users easy and secure access to the assets they need from anywhere, while preventing advanced adversaries and insider threats at every stage of the attack chain. Learn why organizations like the …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

6 0 4 114
Finite State Finite State

Protecting our connected world. Product security for embedded systems, including IoT, ICS, and OT. We enable product security teams – the guardians of the connected world – to protect the devices we rely on every day through market-leading software threat, vulnerability, and risk management. Finite State is the leading provider of product cyber security solutions for connected devices and embedded systems, including IoT, medical devices, and OT/ICS. cybersecurity, iot, vulnerability research, risk management, ICS, Supply Chain Security, and OT

Type: Startup Activities: deeptech IT Services Technologies: IoT Cybersecurity

2 0 2 59
CyberX CyberX

A Microsoft company CyberX accelerates digital innovation by delivering the simplest and most robust solution for reducing risk from unmanaged IoT/OT devices. The company was acquired by Microsoft in June 2020. Founded by blue-team experts with a track record of defending critical national infrastructure, CyberX was the only cybersecurity company with a patent for IoT/ICS-aware behavioral analytics and machine learning technology.

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT A.I. A.I. - Machine Learning

10 2 2 37
Simility, A PayPal Service Simility, A PayPal Service

Adaptive Decisioning Platform built with a data-first approach to deliver continuous risk assurance. Simility offers real-time risk and fraud decisioning solutions to protect global businesses. Simility’s offerings are underpinned by the Adaptive Decisioning Platform built with a data first approach to deliver continuous risk assurance. By combining artificial intelligence (AI) and big data analytics Simility helps businesses orchestrate complex decisions to reduce friction, improve trust, and solve complex fraud problems. Built by industry veterans, Similty is trusted by some of the world’s leading consumer brands across Financial Services, Payment Processors and Commerce merchants. To learn more, visit www.Simility.com. Fraud Detection, …

Type: Startup Activities: IT Services Technologies: A.I. - Machine Learning Data Analytics A.I.

0 0 0 23
Biometric Signature ID Biometric Signature ID

Protecting business' most valuable digital assets. We are a biometrics cyber security company. Our technology creates and manages online access credentials that are PII free and impossible to replicate by any other human or machine. Our patented behavioral biometric technology protects your online and real world identity. It links online digital access to the presence of a single authorized user, not to their credentials. It does this without collecting, transferring, or storing any personal identifiable information. It provides Complex Multi-Factor Authentication (CMFA) in a simple and reliable authorized user experience that no AI/ML algorithm or cyber criminal can replicate. About …

Type: Startup Activities: regtech Technologies: A.I. Cybersecurity

1 1 1 15
Cybersafe Solutions Cybersafe Solutions

STATE-OF-THE-ART CYBERSECURITY SOLUTIONS & PROTECTION 24/7 Cybersafe Solutions was designed from the ground up to help organizations across multiple industries to defend against modern day cyber attacks. Our firm takes a proactive approach to your endpoint & network cybersecurity by focusing on people, processes and technologies to deliver our “Defense-In-Depth” cyber protection model. We believe there is no single solution or silver bullet that will prevent adversaries from compromising your business network. The Defense-In-Depth approach utilizes a bespoke cycle of risk assessments, prevention, continuous monitoring, detection and rapid incident response to minimize the probability and severity of any future cyber …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 57
Mesh - Email Security Redefined for MSPs Mesh - Email Security Redefined for MSPs

The ONLY Email Security Platform Built Exclusively for Managed Service Providers Mesh is the world's first email security platform built exclusively for managed service providers, empowering them to deploy, protect, and manage their clients more efficiently. While other solutions force MSPs to manage their clients individually, Mesh provides true-multi-tenancy, affording MSPs unparalleled visibility and control over email across their entire client base, from a single pane of glass - The MSP Hub. Compatible with all major email platforms including Office 365, Exchange, and Google Workspace, Mesh protects organizations against the full spectrum of email threats including Business Email Compromise, ransomware, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 0 17
Astra Security Astra Security

Rock Solid Security Simplified for Websites, Apps & Businesses. Astra Security is a privately held U.S. & India based cyber security company. Backed by Techstars, Astra offers a Pentest Platform that helps organizations become proactively secure. The Pentest Platform uncovers more than 30,000+ vulnerabilities for its customers every month, saving its customers millions of dollars in potential loss and thousands of developer hours. The company has earned several accolades including ‘The Most Innovative Security Company’ by Prime Minister Narendra Modi at the Global Conference on Cyber Security (2017), one of the top 50 emerging cybersecurity companies at ‘Emerge 50’ by …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 65
Mocana, now part of DigiCert Mocana, now part of DigiCert

Mocana Corp. is a developer of self-defending cybersecurity solutions that protect IoT devices & critical infrastructure Mocana provides cyber protection for IoT, operational technology (OT) and critical infrastructure. Our proven on-device cybersecurity software and lifecycle management platform enable manufacturers and industrial companies to build self-defending systems that are tamper-resistant. Mocana’s tightly integrated solutions help companies to minimize the risk of a cyber breach, comply with industry standards, and protect intellectual property by ensuring that devices and processes are trusted end-to-end, from device manufacturing to deployment. Unlike IT network security approaches, Mocana enables devices to protect themselves and prevent malware from …

Type: SMB Activities: IT Services military Technologies: Cybersecurity IoT

8 1 2 29
ESCRYPT ESCRYPT

ESCRYPT — ETAS security solutions ESCRYPT - Trusted Security Solutions For more than 15 years, ESCRYPT has stood for technologically pioneering, holistic cybersecurity solutions in the automotive sector. Today, millions of ESCRYPT automotive security solutions are safeguarding vehicle systems around the world – and setting standards for the cybersecurity of software-defined vehicles, intelligent traffic systems, and connected vehicle fleets. In addition, the ESCRYPT brand brings together dedicated security services for corporate IT and Bosch Group products, as well as qualified incident response services. ESCRYPT is a brand of ETAS GmbH, a member of the Bosch Group. ESCRYPT automotive security solutions …

Type: SMB Activities: IT Services Technologies: Cybersecurity Embedded Systems IoT

8 1 5 119
Open Cybersecurity Alliance Open Cybersecurity Alliance

A global alliance to connect the fragmented cybersecurity landscape with common, open source code and practices. The Open Cybersecurity Alliance brings together vendors and end users in an open cybersecurity ecosystem where products can freely exchange information, insights, analytics, and orchestrated response. The OCA supports commonly developed code and tooling and the use of mutually agreed upon technologies, data standards, and procedures.

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

5 0 4 6
Cloud Security Alliance Cloud Security Alliance

Building connections through online cloud security solutions. The Cloud Security Alliance is a non-profit organization formed to promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is comprised of many subject matter experts from a wide variety disciplines, united in our objectives: * Promote a common level of understanding between the consumers and providers of cloud computing regarding the necessary security requirements and attestation of assurance. * Promote independent research into best practices for cloud …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

1 0 1 489
AV-TEST GmbH AV-TEST GmbH

Well-informed on security! AV-TEST GmbH is an independent supplier of services in the fields of IT Security and Antivirus Research, focusing on the detection and analysis of the latest malicious software and its use in comprehensive comparative testing of security products. Due to the timeliness of the testing data, malware can instantly be analyzed and categorized, trends within virus development can be detected early, and IT-security solutions can be tested and certified. The AV-TEST Institute’s results provide an exclusive basis of information helping vendors to optimize their products, special interest magazines to publish research data, and end users to make …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 2 22
Cyber Threat Alliance Cyber Threat Alliance

Securing Our Digital Ecosystem By Working Together. Care to join us? The Cyber Threat Alliance (CTA) is a group of cybersecurity practitioners from organizations that have chosen to work together in good faith to share threat information for the purpose of improving defenses against advanced cyber adversaries across member organizations and their customers. The CTA will advance the cybersecurity of critical IT infrastructures and increase the security, availability, integrity, and efficiency of information systems by enabling the near real-time sharing of campaign-based cybersecurity information.

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

2 0 2 17
Montimage Montimage

Provider of tools and services to protect your networks and critical assets. Montimage provides tools and services to protect your networks and critical assets. It offers a security and performance monitoring and management framework adapted to your needs. Services of the company: MMT network monitoring framework. Cyber Threat Intelligence services. Secure portable 4G/5G mobile network platform. Added value : We offer highly innovative solutions that have been built in-house resulting from more than 10 years of research. They integrate advanced AI techniques and multi-source Cyber Threat Intelligence that allow preventing zero-day security breaches. Our solutions have been certified for protecting …

Type: SMB Activities: IT Services Technologies: Cybersecurity A.I.

1 1 0 10
Pôle d'excellence cyber Pôle d'excellence cyber

[Automatic translation follows] Your trusted partner Cyberdefense / Cybersecurity The creation of the Cyber ​​Center of Excellence under the aegis of the Ministry of the Armed Forces and the Brittany Region, has the ambition to accelerate the construction of a sovereign cybersecurity-cyberdefense sector by promoting the achievements of the local Breton ecosystem. and by breaking down barriers and uniting structured universes (military/civilian, training-research/contractors, large groups/SME-ETI, etc.). The Cyber ​​Center of Excellence stimulates the provision of cyber training (whether initial, continuing or higher) so that each player has the necessary skills to meet the development needs of the sector. It promotes …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

41 17 24 34
Xygeni Xygeni

Software Supply-Chain Security: Protect your software ecosystem throughout the entire SDLC. We protect the security of your software ecosystem throughout the entire DevOps. Xygeni defends your CI/CD pipeline against software supply-chain attacks, providing security and integrity across all phases of the software life cycle. Our solution integrates with DevOps tools and infrastructure to reduce risk by reinforcing security policies and identifying hard-coded secrets, code leaks, or misconfigurations. Cybersecurity, Appsec, DevOpsSecurity, Pipeline Security, DevSecOps, Application Security, Software Supply Chain, SBOMs, and Risk Management

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 25
Evolve Security Evolve Security

Technology enabled cybersecurity services company focused on Pentesting-as-a-Service (PTaaS). Evolve Security is a next generation offensive cybersecurity company powered by the Darwin Attack® Platform. We deliver Attack Surface Management (ASM), Pen-test as a Service (PTaSS) and cyber advisory. Evolve Security enables its clients to constantly monitor and effectively manage the cybersecurity vulnerabilities within their cloud, application, and network environments. The DARWIN Attack® platform combines cutting-edge methodologies and intelligence with real-time communication and reporting to decrease the ‘time to find’ and ‘time to fix’ cybersecurity vulnerabilities. Evolve Security is also an industry leader in cybersecurity training and its Evolve Academy has …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 71
Perception Point Perception Point

A Prevention-as-a-Service company, offering fast interception of any content-based attack across all channels Perception Point is a Prevention-as-a-Service company for the fastest and most accurate next-generation detection, investigation, and remediation of all threats across an organization’s main attack vectors - email, web browsers, and cloud collaboration apps. The solution's natively integrated and fully managed incident response service acts as a force multiplier to the SOC team, reducing management overhead, improving user experience and delivering continuous insights; providing proven best protection for all organizations. Deployed in minutes, with no change to the enterprise’s infrastructure, the patented, cloud-native and easy-to-use service replaces …

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 1 5 129
Endgame Endgame

Military-grade endpoint protection that's as simple as anti-virus Endgame makes military-grade endpoint protection as simple as anti-virus. Leveraging the industry’s most advanced machine learning technology, Endgame enables security operators of any skill level to deliver full-force protection, stopping everything from ransomware, to phishing, and targeted attacks. Endgame is the only endpoint security platform to offer a unique hybrid architecture that delivers both cloud administration and data localization that meets all industry, regulatory, and global compliance requirements. Every branch of the US military as well as the world's largest commercial organizations rely on Endgame to protect their people, technology and mission, …

Type: Startup Activities: IT Services military Technologies: Cybersecurity A.I. A.I. - Machine Learning

0 0 0 20
Authentise Authentise

Data-driven workflow management solutions for the world’s most agile engineering and manufacturing operations Authentise’s data-driven platform manages the manufacturing processes from design to part to increase efficiency and repeatability. Generate quotes, renders, material and time estimates, builds, and more on the fly. Connect to dozens of machines for automatic order status updates, traceability reports, KPI dashboards and improved estimates using machine learning. 3D printing, security, authentication, additive manufacturing, process automation, data, IIOT, manufacturing, Industry 4.0, Machine Learning, digital thread, mes, mom, workflow management, and engineering

Type: Startup Activities: IT Services Technologies: RPA 3D Printing A.I. A.I. - Machine Learning IoT

4 0 4 33
Cequence Security Cequence Security

Protect APIs and web apps from application fraud and data loss caused by bot attacks and vulnerability exploits. Cequence Security is an API security and bot management company that protects customers’ applications and APIs against attacks, business logic abuse, and fraud. Our comprehensive Unified API Protection solution offers discovery, compliance, and protection across all internal and external APIs without needing any instrumentation, SDK, or JavaScript deployments. Cequence solutions scale to handle the most demanding government, Fortune and Global 500 organizations, securing more than 8 billion daily API interactions and protecting more than 3 billion user accounts across these customers. The …

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 2 5 161
odix odix

Advanced malware prevention solutions based on patented Deep File Analysis technologies. odix develops and markets advanced preventive Anti-Malware tools based on Deep File Analysis technology. odix solutions analyze all commonly used files in a unique process that includes: File type and structure validation, Content Disarm and Reconstruction (CDR) and advanced filtering capabilities based on the organization's security policy. odix's patented technology is effective against unknown malware hidden inside innocent-looking files where legacy solutions fall short. odix solutions are trusted by global leading enterprises from diverse sectors such as finance, energy, government, hi-tech etc. Content Disarm & Reconstruction, Cyber Security, Information …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 0 21
Cybellum Cybellum

Dedicated platform and services for everything product security, designed for device manufacturers. Cybellum is where teams do product security. Device manufacturers such as Jaguar Land Rover, Supermicro, Arthrex, Danaher, and Faurecia use Cybellum's Product Security Platform and services to manage the main aspects of their cybersecurity operations across business units and lifecycle stages. From SBOM to Vulnerability Management, Compliance Validation, and Incident Response, teams ensure their connected products are fundamentally secure and compliant – and stay that way. Powered by Cyber Digital TwinsTM technology, Cybellum creates a live digital replica of every software component inside the devices, allowing product security …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

7 0 6 85
Spyderbat Spyderbat

Secure your cloud native workloads from first line to runtime Spyderbat ensures security and resilience across your Software Development Lifecycle (SDLC) in Linux VMs and Kubernetes clusters. Using eBPF, Spyderbat arms your platform engineering, site reliability, and security teams with four core capabilities: - Flashback reveals the step-by-step sequence of activities within and across your containers at the earliest warning signs of trouble. - Guardian stops application drift and accelerates your releases by continuously comparing running applications against prior versions, all with the insight to take instant action. - Scout Instantly identifies attacks based on chained suspicious behaviors - Interceptor …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 26
NordVPN NordVPN

Cutting-edge security for your data traffic, complete privacy online, and internet with no borders with NordVPN. Ensure your privacy online — NordVPN protects you from any third-party snoopers, including your ISP or advertisers. Secure your traffic and connect to public Wi-Fi hotspots without worrying about hackers stealing your data. Surf the net without restrictions — connect to any of our 5600+ servers available in 60 countries.

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

0 0 0 81
KnowBe4 KnowBe4

Human Error. Conquered. KnowBe4 is the provider of the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. The KnowBe4 platform is user-friendly and intuitive, and powerful. It was built to scale for busy IT pros that have 16 other fires to put out. Our goal was to design a full-featured, yet easy-to-use platform. Customers with businesses of all sizes can get the KnowBe4 platform deployed into production at least twice as fast as our competitors. Our Customer Success team gets you going in no time, without the need for …

Type: Large company Activities: IT Services Technologies: Cybersecurity

16 3 2 1,829
Malwarebytes Malwarebytes

Cyberprotection for every one. Malwarebytes believes that when people and organizations are free from threats, they are free to thrive. Founded in 2008, Malwarebytes CEO Marcin Kleczynski had one mission: to rid the world of malware. Today, that mission has expanded to provide cyberprotection for every one. Malwarebytes provides consumers and organizations with device protection, privacy, and prevention through effective, intuitive, and inclusive solutions in the home, on-the-go, at work, or on campus. A world-class team of threat researchers and security experts enable Malwarebytes to protect millions of customers and combat existing and never-before-seen threats using artificial intelligence and machine …

Type: Large company Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

20 4 11 761
Netskope Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security. Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. Fast and easy to use, the Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory …

Type: Large company Activities: IT Services Technologies: Cybersecurity

14 3 8 2,518
Bugcrowd Bugcrowd

Ingenuity UnleashedTM We are a crowdsourced security company that safeguards organizations' assets from sophisticated threat actors before they can strike—by uniting our customers with trusted hackers via our AI-powered platform to take back control and stay ahead of attackers. Bugcrowd is backed by Blackbird Ventures, Costanoa Ventures, Industry Ventures, Paladin Capital Group, Rally Ventures, Salesforce Ventures and Triangle Peak Partners. Application security, Mobile application security, Penetration testing, Bug bounty programs, Bug bounty, crowdsourced security, and vulnerability disclosure

Type: Large company Activities: IT Services Technologies: Cybersecurity

57 6 48 2,505
genua gmbh genua gmbh

Über 30 Jahre Excellence in Digital Security. Made in Germany. genua ist ein Unternehmen der Bundesdruckerei-Gruppe. The more connected we become, the greater the importance of IT security: Your IT systems and communication paths have to function flawlessly, and at the same time your data must be reliably protected. We strive to help you achieve this goal. genua is a German specialist for IT security and a member of Bundesdruckerei Group. Our goal is clearly defined: developing top-quality solutions that provide our customers with reliable IT security. Our business activities range from securing sensitive interfaces in public authorities and industry …

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 0 1 226
Eperi GmbH Eperi GmbH

We connect you to the cloud - easy, secure, customizable, compliant! eperi – Privacy is the starting point We believe that data privacy is a fundamental human right. Our aim is to allow people to always stay in control over their data. Without compromises and with the best technology. With the customer at the center, we have created a solution that is invisible to the user while meeting the highest security standards. With the eperi solution, companies benefit from all the advantages of Cloud usage, e.g. efficient company-wide collaboration – while staying legally compliant according to worldwide data protection laws. …

Type: SMB Activities: IT Services privacytech Technologies: Cybersecurity

3 0 3 27
Fortra's Digital Guardian Fortra's Digital Guardian

No-Compromise Data Protection That Stops Data Loss Digital Guardian is Fortra's solution for data loss prevention.​ ​ Our cloud-delivered platform is purpose-built to stop data loss by both insiders and outsiders on Windows, Mac and Linux operating systems. Fortra’s Digital Guardian Data Protection Platform performs across the corporate network, traditional endpoints, and cloud applications. We enable data-rich organizations to protect their most valuable assets with a choice of SaaS or fully managed deployment. Digital Guardian’s unique policy-less data visibility and flexible controls enable organizations to protect data without slowing the pace of their business. ​ Data Security, Data Protection, Managed …

Type: SMB Activities: privacytech IT Services Technologies: Cybersecurity Data Analytics

0 0 0 206
EXCITE EXCITE

EXCITE is where thousands of change-makers come together to advance the future of digital trust and ignite innovation. EXCITE brings together professionals and experts from both public and private sectors to collaborate, learn, and innovate on critical issues arising from the increasing digitization of our world: privacy, cybersecurity, inclusion, skills development, identity and access management, and data protection. Featuring thought leaders and topics at the forefront of change, EXCITE provides unique insights and perspectives for the digital future that cannot be found anywhere else. Identity Management, Data Sharing, Privacy, Digital ID and Authentication, Privacy by Design, technology, Digital Economy, E-Commerce, …

Type: NGO, Think-tanks, Ed, & Culture Activities: privacytech IT Services e-commerce healthtech regtech

4 0 4 5
FEITIAN Technologies Co., Ltd. FEITIAN Technologies Co., Ltd.

Trusted Security Established in 1998, FEITIAN Technologies is a leading global provider of cyber security products and solutions. Our customers are located in more than 100 countries and regions. 5 oversea branches in Asia, Europe, North America, and a professional international team enable us to serve our customers all over the world. FEITIAN has over 1,000 employees, more than half are R&D engineers. The continuous high investment in R&D and the deep understanding of customer needs over the past 20 years have enabled FEITIAN to continuously develop diversified types of innovative products with international patent rights and certifications. We offer: …

Type: SMB Activities: IT Services Technologies: Cybersecurity Wireless

6 0 3 103
NetSecure Day NetSecure Day

[Automatic translation follows] See you on December 12 for #NSD19 // #Cybersecurity day in #Normandy See you on December 12 for #NSD19 // #Cybersecurity day in #Normandy -------------------- -------------------- The #NSD event is the annual cybersecurity meeting in Normandy. Organized since 2013 by the NetSecure Day association, this annual event has already brought together more than 1,700 people around 56 conferences over the 6 previous editions. With the support of public organizations and private companies, each year the association offers technical, strategic and legal conferences as well as feedback on the field of cybersecurity to an ever-growing audience. Free and …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

11 1 11 1
ObservePoint ObservePoint

Complete Digital Governance. Websites are complex. They are essential to the image and growth of your company, and to the privacy and trust of your customers. But websites have so many dynamic parts and pages that it’s nearly impossible to keep up with all of them all the time. Until now. ObservePoint’s Web Governance platform automates the scanning of your website; from the highest traffic pages and user paths to the dark corners of your company’s web presence. We give you the ability to see what’s performing below acceptable standards, trace it back to the source, and quickly see a …

Type: Startup Activities: IT Services martech Technologies: Data Analytics Cybersecurity

0 0 0 88
NowSecure NowSecure

Deliver Secure Mobile Apps Faster // Named 2X Market Leader for MAST by IDC // DevSecOps Trailblazer by Gartner Join Our Mission: To Save the World from Unsafe Mobile Apps! As the recognized experts in mobile security and privacy, NowSecure protects the global mobile app economy and safeguards the data of millions of mobile app users. Built on a foundation of standards, NowSecure empowers the world’s most demanding organizations with security automation to release and monetize 30% faster, reduce testing and deliver costs by 30% and reduce appsec risk by 40%. Only NowSecure offers a full solution suite of continuous …

Type: Startup Activities: IT Services Technologies: Cybersecurity

10 0 8 131
Fortanix Fortanix

Security, wherever your data is Fortanix is a data-first multi-cloud security company and a pioneer in Confidential Computing. Today, data is spread across clouds, SaaS, applications, storage systems and data centers. Fortanix decouples security from infrastructure to address the challenges of securing sensitive data, wherever it may be located, across its entire life cycle, whether it is at-rest, in-motion or in-use. Fortanix customers include organizations of all sizes and a wide range of verticals, including some of the biggest global brands and Fortune 50 companies. Fortanix is a founding member of the Confidential Computing Consortium and has a strong ecosystem …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

13 1 3 284
Salt Security Salt Security

Providing end-to-end API security, so businesses can innovate safely and accelerate digital transformation initiatives. Salt Security protects the APIs that form the core of every modern application. Its patented API Protection Platform is the only API security solution that combines the power of cloud-scale big data and time-tested ML/AI to detect and prevent API attacks. By correlating activities across millions of APIs and users over time, Salt delivers deep context and actionable intelligence with real-time analysis and continuous insights for API discovery, attack prevention, and shift-left practices. Deployed quickly and seamlessly integrated within existing systems, the Salt Security platform gives …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I.

15 2 12 193
NetVPro NetVPro

Your IT easy button Our services are geared towards helping medium to large sized companies meet their productivity goals. NetVPro can provide an I.T. solution that addresses your exact requirements, leveraging your existing infrastructure where possible. Your initial consultation and quote is free. NetVPro can design a solution or provide staff augmentation services for both short or long term. Disaster Recovery as a Service (DRaaS) We replicate and host in our data-centers physical or virtual servers to provide failover in the event of a man-made or natural catastrophe. Cloud Storage Backup Subscription plans provide diverse offsite storage at affordable monthly …

Type: Startup Activities: IT Services Technologies: Data Analytics

3 0 3 16
Unbound Security Unbound Security

Cryptography Orchestration Reimagined for the Enterprise Unbound Security empowers enterprise customers worldwide to confidently secure, manage and authenticate all critical business transactions, information, identity, and digital assets – anywhere, anytime. As organizations engage in digital transformation, deploy remote workforce environments, and move towards hybrid and multi cloud environments, they rely on Unbound Security CORE to protect, manage, and secure all the secrets, certificates and keys used across their organizations. The Unbound Security CORE leverages MPC to ensure best in defense cryptography and enables the management of all keys in all environments from a single place. As organizations engage in digital …

Type: Startup Activities: IT Services Technologies: Cybersecurity Blockchain/Cryptocurrency

3 0 3 15
Uplevel Security Uplevel Security

Uplevel has been acquired by McAfee. Please follow McAfee for future updates from us. Uplevel Security, acquired by McAfee, provides an adaptive system of intelligence that uses graph theory and machine learning to dynamically inform the handling of cyber threats. Uplevel ingests and contextualizes current and historical security alerts, threat intelligence and incident data to uncover hidden threats and track patterns that can predict how attacks may manifest in the future. Enterprises rely on Uplevel to extract insights from the overwhelming amount of data generated by security stacks and provide the context and analysis needed to resolve threats faster and …

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics A.I. A.I. - Machine Learning

4 2 2 1
Siemplify (Now Part of Google Cloud) Siemplify (Now Part of Google Cloud)

Our product is now Chronicle SOAR. Follow us at Chronicle on LinkedIn to stay updated! We're now Chronicle SOAR, part of Google Cloud! Chronicle’s cloud-native security, orchestration, automation and response product empowers security teams to respond to cyber threats in minutes--not hours or days Cyber Security, Security Analytics, Security Operations, Threat Management, Incident Response, Security Orchestration, Security Automation, and Information Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

10 3 4 37
Vectra AI Vectra AI

Vectra AI is the leader in AI-driven threat detection and response for hybrid and multi-cloud enterprises. Vectra AI is the leader in AI-driven threat detection and response for hybrid and multi-cloud enterprises. The Vectra AI Platform delivers the integrated signal powering XDR, SIEM, SOAR — whatever your pane of glass. This powerful platform equips SOC teams with hybrid attack surface coverage and real-time Attack Signal Intelligence, along with integrated, automated and co-managed response. Companies can choose the modules they need to achieve full coverage across identity, public cloud, SaaS and data center networks. For more information, visit vectra.ai. cybersecurity, Threat …

Type: Startup Activities: IT Services Technologies: A.I. Cybersecurity IoT

15 2 7 622
vArmour vArmour

Complete visibility for every app, user, and environment. Control risk, increase app resiliency, and achieve compliance. vArmour helps enterprises around the world be more resilient by understanding the behavior of their application infrastructure and services. Customers trust vArmour to provide continuous observability of their hybrid-cloud applications to accelerate their critical initiatives while reducing risk and improving confidence. vArmour is based in Los Altos, CA. Cybersecurity , Hybrid Cloud, Cyber Resilience, Compliance, Operational Risk, Security , Cloud, Public Cloud, Private Cloud, On-Premise, AWS, Azure, Tanium, and Cloud Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 1 0 81
NetFoundry NetFoundry

Reinvent Secure Networking Embed secure networking into your applications and solutions, as code. Use our open source or leverage our turnkey SaaS. zero trust, cybersecurity, security as code, open source zero trust platform, secure by design, programmable networking, application specific networking, secure IoT, secure IIoT, and secure edge

Type: Startup Activities: IT Services Consulting Technologies: IoT Cybersecurity SaaS

17 1 14 77
Cylera Cylera

Pioneering the future of Healthcare IoT Cybersecurity & Intelligence Cylera is pioneering IoT Security and Intelligence to protect what matters most - people, safety, privacy, and business continuity. We deliver richer data, stronger security and faster reaction times in order to safeguard what matters most: people, data and privacy. Unlike others who use “first-generation” approaches that fall short, Cylera’s Platform is next-generation, patented technology, with a unique digital twin method that has zero disruption and can assess true risk within a healthcare and clinical workflow context. Cylera’s insights and recommendations simplify response playbooks when incidents arise, decrease time to remediate, …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity IoT

3 1 0 40
Graphus Inc. Graphus Inc.

Simple, Powerful, Automated Phishing and Spam Defense Platform Graphus, a Kaseya company, provides an automated, AI-based email security solution for Microsoft 365 and Google Workspace that combines ironclad anti-phishing defense with personalized anti-spam protection -- with no manual IT admin intervention necessary. Using a powerful AI algorithm and machine learning, Graphus stops both known and zero-day email-borne threats, including phishing, business email compromise (BEC), account takeover (ATO) and ransomware attacks. Graphus takes just minutes to deploy via an API -- with no MX record changes, email rerouting or agent installation needed. Cybersecurity, Phishing, Social Engineering, Spear Phishing, Machine Learning, Email …

Type: Startup Activities: IT Services Technologies: Data Analytics Cybersecurity A.I. A.I. - Machine Learning

1 0 1 1
Pwnie Express (now Outpost24) Pwnie Express (now Outpost24)

Detect and monitor every wireless and wired devices to mitigate the risk of rogue devices and access points Pwnie Express closes the IoT security gap exposed by the deployment of IoT in the enterprise. By continuously identifying and assessing all devices and IoT systems, our security platform prevents IoT based threats from disrupting business operations. All without the need for agents, or changes to network infrastructure. To learn more about Pwnie Express visit www.pwnieexpress.com. Network Security, Device Threat Detection, Cyber Security Research and Development, Rogue access point detection, WiFi security, Bluetooth Security, and IoT Security Assessment

Type: Startup Activities: IT Services Technologies: IoT Cybersecurity Wireless

0 0 0 1