Search 1
Entities
LogoName Σ Employees
Illumio Illumio

Illumio, the Zero Trust Segmentation company, stops breaches from spreading across the hybrid attack surface. Illumio, the Zero Trust Segmentation company, stops breaches from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes all traffic flows between workloads, devices, and the internet, automatically sets granular segmentation policies to control communications, and isolates high-value assets and compromised systems proactively or in response to active attacks. Illumio protects organizations of all sizes, from Fortune 100 to small business, by stopping breaches and ransomware in minutes, saving millions of dollars in application downtime, and accelerating cloud and digital transformation projects.

Type: Startup Activities: IT Services Technologies: Cybersecurity

14 1 3 656
Optimal IdM Optimal IdM

A global provider of Identity and Access Management Solutions Optimal IdM is a global provider of innovative and affordable identity access management solutions. We partner with our clients to provide comprehensive, fully customizable enterprise level solutions that meet the specific security and scalability needs of their organizations. Customers include Fortune 1000 companies, as well as Federal, State and Local Government agencies all over the world. Founded in 2005, Optimal IdM is privately held and has been profitable in every quarter since inception. Visit www.optimalidm.com for more information. Identity management software and consulting, Virtual Directory Server, Identity and Access Management as …

Type: SMB Activities: IT Services Technologies: Cybersecurity

3 0 3 11
Open Information Security Foundation Open Information Security Foundation

Open Information Security Foundation (OISF) is the US non-profit that owns and manages Suricata. The Open Information Security Foundation (OISF) is a non-profit foundation organized to build a next-generation IDS/IPS engine. The OISF has formed a multi-national group of leading software developers in the security industry. In addition to developers and a consortium consisting of leading cyber security companies, OISF has engaged the open source security community to identify current and future IDS/IPS needs and desires. OISF’s primary goal is to remain on the leading edge of open source IDS/IPS development, community needs, and objectives. This is only attainable if …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

3 0 3 14
Escape Escape

We help your business stay secure with automated API discovery and security testing We help Application Security teams automate API discovery, inventory, and security testing through agentless scanning. With Escape, quickly inventory all your APIs, detect OWASP Top 10 and complex logic flaws at scale and empower your developers to adopt security in CI/CD.

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 3 3 21
ThreatFabric ThreatFabric

Peace of mind for you and your customers We enable safe & frictionless online customer journeys by integrating industry-leading threat intel, behavioural analytics, advanced device fingerprinting and over 10.000 adaptive fraud indicators. This will give you and your customers peace of mind in an age of ever-changing fraud. Cyber Threat Intelligence, Malware analysis, Malware detection, Cyber Security, Fraud prevention, Fraud detection, Mobile protection, Online channels security, Mobile malware, Customer device protection, Online Fraud Detection, Mobile Threat Intelligence, and Hybrid Fraud

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 0 3 59
OASYS NOW OASYS NOW

Bringing precise treatments to patients faster, by putting people in control. At OASYS NOW, we are on a mission to make personalised health accessible to all, no matter where, or how rare. We are an interdisciplinary and diverse team, specialising in secure and ethical health data reuse. Our solutions put people in control of their most sensitive health data, including their DNA. You can gain personal health insights and see if there are relevant clinical trials available for you. You can also choose to donate your data to research of your choice, thereby helping patients to get a treatment faster. …

Type: Startup Activities: healthtech privacytech Technologies: Cybersecurity Data Analytics

3 0 3 9
Picus Security Picus Security

The Complete Security Validation Platform Picus Security is the pioneer of Breach and Attack Simulation (BAS) and the Security Validation company. The Picus Security Control Validation Platform is trusted by leading organizations worldwide to consistently validate the effectiveness of security controls against cyber-attacks and supply actionable mitigation insights to optimize them. Picus has offices globally and is supported by a network of channel and alliance partners. The company is dedicated to helping security professionals become more threat-centric and via its Purple Academy offers free online training to share the latest offensive and defensive cybersecurity strategies. Find more here: https://www.picussecurity.com/ Network …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 3 232
AuthenTrend Technology Inc. AuthenTrend Technology Inc.

No More Password! Bringing FIDO2 biometrics authenticator, cloud and on-premise server to partners AuthenTrend is the world's leading brand of fingerprint FIDO security keys (ATKey), and a certified member of Microsoft Information Security Alliance (MISA), also a recommended partner for Windows 10/11 and Azure AD Passwordless login. In addition to fido key, we also provide on-demand fido2 cloud (AT.AuthFi) that helps partners to convert their cloud into passwordless or multi-factor authentication to ensure account security; for on-premise AD environment, we are releasing new AT.fido server for enterprises (AT.LogOn), which enables the use of AD in the company domain users Passwordles …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 3 11
Holistic Cyber (HolistiCyber) Holistic Cyber (HolistiCyber)

Defend What Matters. HolistiCyber’s mission is to assist corporations in defending themselves from the new phase of evolution in Cyber threats - not only in volume, but in the level of sophistication. Hackers, backed by Nation-States in many cases, use tools that were developed by the NSA and other Nation-State agencies that have leaked into the Darknet. HolistiCyber’s holistic approach includes a comprehensive understanding of business processes and identification of organizations’ critical and strategic assets - all from the view point of potential highly sophisticated attackers. We help organizations manage cybersecurity risks and demonstrate the impact a cyber-attack will have …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

3 0 3 22
BZHunt BZHunt

[Automatic translation follows] Ethical #hacking for your security Eat🟢Sleep🟢Hack🟢Repeat🟢 The first French company to participate in live hacking events (Bug Bounty), BZHunt pushes the limits to defend and promote the culture of ethical hacking in France and around the world. Far from the Hollywood cliché, our ethical hackers have turned their passion into a profession with the aim of capitalizing on their research and development work to support the security of businesses. Our values ​​: #TryHarder Leaving our comfort zone and developing BZHunt's technical track record, thus attesting to cutting-edge know-how. #SharingIsCaring Actively contribute to the cyber community by sharing …

Type: Startup Activities: IT Services Technologies: Cybersecurity

19 8 3 12
CLUSIR Nord de France CLUSIR Nord de France

[Automatic translation follows] CLUB FOR REFLECTIONS AND EXCHANGES ON GOOD PRACTICES FOR IMPROVING BUSINESS SECURITY in HAUTS-DE-FRANCE CLUSIR Nord de France is a club for reflection, exchanges on good practices, awareness-raising, meetings and contributions to the improvement of digital security. To keep in touch : - Website: https://www.clusir-ndf.fr/ - Twitter: https://twitter.com/ClusirNdf - Youtube: https://www.youtube.com/channel/UCSl0HqWoPqXaWthn7yh6QwA

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

6 3 3 1
IDnomic IDnomic

IDnomic is digital identity management and PKI (Public Key Infrastructure) solutions of Atos Group IDnomic is the leading European provider of software and cloud trust services. IDnomic develops software that protects the identities of people and devices, and for securing electronic documents and transactions. Our role as an internationally recognized Certificate Authority is the guarantee of the reliability of our solutions. Every day, millions of people around the world use IDnomic technologies with their corporate badges, their passports or ID cards, when exchanging data or digitally signing contracts. Since 2004, over 200 large international organizations have placed their trust in …

Type: SMB Activities: IT Services Technologies: Cybersecurity

7 1 4 59
Atempo for Small & Medium Businesses Atempo for Small & Medium Businesses

[Automatic translation follows] 0 data loss - 0 business interruption! Solutions for Preserving Data Ecosystems Atempo, French software publisher, European leader in professional data protection and management solutions. A specialist in the preservation of digital ecosystems and instant disaster recovery, Atempo supports organizations of all sizes with trusted, sovereign solutions to meet the major challenges of cybersecurity. An active member of the government program Cybermalveillance.gouv.fr and the French Tech 120, Atempo is committed on a daily basis to sustaining the activity of organizations around a simple but essential promise: zero loss of data, zero interruption of activity. “Our wish is …

Type: Startup Activities: IT Services Technologies: Data Analytics

7 3 4 15
Siemplify (Now Part of Google Cloud) Siemplify (Now Part of Google Cloud)

Our product is now Chronicle SOAR. Follow us at Chronicle on LinkedIn to stay updated! We're now Chronicle SOAR, part of Google Cloud! Chronicle’s cloud-native security, orchestration, automation and response product empowers security teams to respond to cyber threats in minutes--not hours or days Cyber Security, Security Analytics, Security Operations, Threat Management, Incident Response, Security Orchestration, Security Automation, and Information Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

10 3 4 48
Device Authority Device Authority

Automating Zero Trust For IoT Device Authority is a global leader in Identity and Access Management (IAM) for the Internet of Things (IoT) and Blockchain. Our KeyScalerTM platform provides trust for IoT devices and the IoT ecosystem, to address the challenges of securing the Internet of Things. KeyScaler uses breakthrough technology including Dynamic Device Key Generation (DDKG) and PKI Signature+ that delivers unrivalled simplicity and trust to IoT devices. This solution delivers automated device provisioning, authentication, credential management and policy based end-to-end data security/encryption. With offices in Fremont, California and Reading, UK, Device Authority partners with the leading IoT ecosystem …

Type: Startup Activities: IT Services privacytech Technologies: IoT Blockchain/Cryptocurrency

4 1 4 33
Whistic Whistic

Whistic is the best way to assess, publish, and share your vendor security information. Whistic is a leading provider of proactive vendor security and an innovator in changing the way that companies publish and evaluate security posture to build trust. Whistic is the single source of trust for both buyers and sellers, helping companies speed up the pace of business. The Whistic Trust Catalog® now contains nearly 15,000 company profiles that can be assessed on-demand, and notable customers include Airbnb, Okta, Betterment, Vonage, Qualtrics, and other world-leading brands within healthcare, manufacturing, energy, and education. Risk Assessments, IT Security, SaaS, Vendor …

Type: Startup Activities: IT Services Technologies: Cybersecurity SaaS

6 0 4 80
Think Cyber Security Ltd Think Cyber Security Ltd

Next generation security awareness A UK company developing products that reinvent the delivery of end-user security education and awareness training. info@thinkcyber.co.uk @thinkcyberuk Cyber Security, Security Education, and Security Awareness Training

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 2 4 21
Wallarm. API & App Security Integrated Wallarm. API & App Security Integrated

End-to-end API security. Securing REST, GraphQL, gRPC, WebSockets, and web apps at scale. Protect any API. In any environment. Against any threat. Built by security practitioners for practitioners, Wallarm products provide robust protection for APIs, apps, and serverless workloads running in cloud-native environments. Hundreds of Security and DevOps teams chose Wallarm to get unique visibility into malicious traffic, robust protection across the whole application portfolio, and automated incident response for appsec programs. The company is committed to supporting modern tech stacks, offering dozens of deployment options in cloud and Kubernetes-based environments, and also provides a full cloud solution. Founded in …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 4 115
Uniware Systems Uniware Systems

Moving IT to the Cloud Uniware Systems help businesses become Cloud-First & Data-Driven on Cloud. For over 25 years, we empower Businesses with modern cloud infrastructure, cloud security, cloud storage and cloud consulting services. Certified and partnered with leading cloud platforms like AWS, Azure, Google Cloud and all Leading Enterprise Information Systems companies, Uniware Systems offers best of the breed computing solutions. Continuous Learning is key at Uniware which forms as the base for offering technology service excellence to our clients. Today Uniware Systems is positioned as one of the preferred IT Solution Partners for many brands in Chennai, India …

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 1 4 54
TypingDNA TypingDNA

AI based Authentication and Fraud detection. Recognize people by the way they type. AI based Authentication and Fraud Detection. Biometric Typing Pattern, Predictive User Profile, Keystroke Dynamics, Biometric Authentication, Biometric Security, Fraud Detection, Behavioral Biometrics, Typing Biometrics, Account Takeover Prevention, Continuous Authentication, Zero trust, and Prevent device sharing

Type: Startup Activities: IT Services Technologies: Cybersecurity

11 1 4 148
Radiflow Radiflow

Taking the guesswork out of OT security We believe there should be no compromise on ICS or OT security. You don’t want to realize the importance of cybersecurity after the fact. We believe that you can’t protect what you can’t see, and you can’t manage what you don’t know. Radiflow is on a mission to take the guesswork out of OT security. We empower our customers to prioritize their actions with our industrial threat detection and risk management solutions. With Radiflow CISO’s can make decisions and take action based on data. Radiflow’s team is known for its cybersecurity expertise and …

Type: Startup Activities: IT Services Technologies: Cybersecurity

5 1 4 69
Threatpost Threatpost

Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world. Follow Threatpost to stay up to date on the latest cybersecurity news: Twitter: @Threatpost Facebook: https://www.facebook.com/Threatpost/ Cybersecurity, Privacy, Vulnerabilities, and Breaches

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

11 2 4 2
Cavirin Systems, Inc. Cavirin Systems, Inc.

The First Line of Defense for Your Cloud Security Cavirin protects your digital assets across the enterprise hybrid cloud by delivering CyberPosture Intelligence. We permit enterprises to maintain their ‘golden security posture’ via continuous visibility, automated scoring against the widest set of industry best practices, regulations, and benchmarks, and remediation leveraging predictive analytics and by integrating security into the DevOps cycle. Cloud Security, Regulatory compliance, DevSecOps, Docker, AWS, CIS CSC 6.1, PCI DSS 3.2, CIS Benchmark, DISA STIG, Secure Host Baseline Configuration, Risk Assessment, FedRamp, Google Cloud, HIPAA, SOC2, Cybersecurity, Microsoft Azure, ISO27002, Hybrid Cloud, and CyberPosture Intelligence

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity Data Analytics

4 0 4 15
BCD BCD

Purpose-built, Performance Driven With a focus on proactive response and personal service, BCD is the most trusted source for purpose-built and performance-driven IP video data infrastructure solutions. The company’s innovative and award-winning products include video surveillance recording and storage servers, access control servers, virtualized solutions, harsh environment appliances, client viewing stations, networking solutions, and professional on-site services. All BCD appliances come standard with its exclusive software integration, Harmonize Bridge, powered by Tiger Technology, for hybrid cloud connectivity and disaster recovery. Each system is validated and tested by BCD’s certified technicians to ensure the appliances meet and exceed the specifications and …

Type: SMB Activities: IT Services Technologies: Cybersecurity

4 1 4 276
Mohatra Mohatra

[Automatic translation follows] Mohatra at the service of professionals: IT, GDPR, Consulting, ERP and Project management MOHATRA has been Qualiopi certified since January 2022 to guarantee you the greatest professionalism for your training. All our training can be covered by your OPCO. Do not hesitate to contact us for further information. GDPR, CyberSecurity, our team supports you in your efforts to protect personal data. In 2024, become a business provider!! Mohatra is recruiting to expand its intervention network nationally. Find out more about the offer: https://mohatra.fr/devenir-apporteur-daffaires/ Business Development, Real Estate, Renewable Energy, GDPR, and GDPR Audit

Type: Startup Activities: proptech cleantech greentech IT Services privacytech Technologies: Solar Technologies Decarbonization

4 0 4 2
SafeBreach SafeBreach

Validate Your Controls. Maximize their Effectiveness. Drive Risk Down. Combining the mindset of a CISO and the toolset of a hacker, SafeBreach is the pioneer in breach-and-attack simulation (BAS) and is the most widely used platform for continuous security validation. SafeBreach continuously executes attacks, correlates results to help visualize security gaps, and leverages contextual insights to highlight remediation efforts. With its Hacker’s PlaybookTM, the industry’s most extensive collection of attack data enabled by state-of-the-art threat intelligence research, SafeBreach empowers organizations to get proactive about security with a simple approach that replaces hope with data. We’re looking for hackers and trailblazers …

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 2 4 134
Angelbeat Angelbeat

Angelbeat organizes webinars and live events on Technology and Sustainability. Angelbeat organizes webinars and live seminars in 60 North American cities, featuring AWS, Microsoft, Google and other industry leaders. It has held over 1,500 seminars since its founding in 1999, drawing hundreds of thousands of attendees. Content is updated annually and focus top IT issues, including cloud, security, application, data and more. More information is available at www.angelbeat.com, plus use the #angelbeat hashtag on all social media platforms. www.twitter.com/angelbeat www.youtube.com/angelbeat, www.facebook.com/angelbeat, www.instagram.com/angelbeat Angelbeat also organizes programs on sustainability, EV Charging, Net Zero and related topics Events, Seminars, Public Speaking, IT, …

Type: Media

4 0 4 10
CLUSIT CLUSIT

Associazione Italiana per la Sicurezza Informatica Clusit is the Italian Association for Information Security, a nonprofit organization devoted to promoting every aspect of information security, including awareness among IT specialists and the general public, and government advisorship and lobbying for causes relevant to information security. Members of Clusit are security customer companies, security providers, security professional and interested individuals. Information Security

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

4 0 4 67
EXCITE EXCITE

EXCITE is where thousands of change-makers come together to advance the future of digital trust and ignite innovation. EXCITE brings together professionals and experts from both public and private sectors to collaborate, learn, and innovate on critical issues arising from the increasing digitization of our world: privacy, cybersecurity, inclusion, skills development, identity and access management, and data protection. Featuring thought leaders and topics at the forefront of change, EXCITE provides unique insights and perspectives for the digital future that cannot be found anywhere else. Identity Management, Data Sharing, Privacy, Digital ID and Authentication, Privacy by Design, technology, Digital Economy, E-Commerce, …

Type: NGO, Think-tanks, Ed, & Culture Activities: privacytech IT Services e-commerce healthtech regtech

4 0 4 5
SealPath - Full Information Protection Made Easy SealPath - Full Information Protection Made Easy

📁 Unparalleled Peace of Mind through Protection that Travels with your File 🚀 🛡📁 Unparalleled Peace of Mind through Persistent Protection that Travels with your Data 🚀Advanced Information Protection Simplified & State-of-the-art encryption and digital rights management for any file extension. With SealPath you will gain peace of mind, knowing that your digital data assets are encrypted. Our solutions deploy a layer of security that accompanies the data at all times, ensuring protection and controlling remotely the permissions on them. Minimal Resources and Time Needed, the most user-friendly solution on the market. SealPath is a European company based in Spain …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity

6 0 4 25
RSA Security RSA Security

Identity-first solutions for security-first leaders. From on-premises to cloud to hybrid, RSA provides identity-first solutions for security-first organizations to thrive in a digital world with modern authentication, lifecycle management, and identity governance. Security, Identity Assurance, Encryption, Security Analytics, Cybersecurity, Enterprise Security, Authentication, Identity and Access Management, Identity Governance and Administration, Zero Trust, Lifecycle Management, Access, Infosec, IAM, IGA, and Contextual Authentication

Type: Large company

27 2 4 2,800
Cygenta Cygenta

We don’t just do cyber security. We navigate you through cyber risk. Our approach to cyber security is more than just penetration testing or awareness-raising. We are experts in combining the technical, human and physical aspects of security best practice. We help some of the largest and most complicated organisations build resilience and sustainability in their risk management, not just their technical response. ​ So how do we do it? First and foremost, we have front-line experience across all aspects of cyber security. We then support this with powerful tools to help analyse risks, identify weaknesses, strengthen defences and set …

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 0 4 5
EfficientIP EfficientIP

Our Goal: Simplify modern key IT challenges and enable secure dynamic IP communication between users, apps, & services. EfficientIP is a network security and automation company, specializing in DNS-DHCP-IPAM (DDI). We promote business continuity by making your IP infrastructure foundation reliable, agile, and secure. Integrated solutions enable IP communication and simplify network management with end-to-end visibility and smart automation, while patented technology secures DNS services to safeguard data and ensure application access. Companies in all sectors rely on EfficientIP offerings to face the challenges of key IT initiatives such as cloud applications and mobility. IP Address Management, DNS-DHCP services management, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

4 0 4 226
Scalys Scalys

Security at the Edge. Improve security in information technology (IT) and operational technology (OT) environments. Scalys is a leading innovative company to improve security in information technology (IT) and operational technology (OT) environments. Core competences are Cybersecurity, end-to-end security, high-performance communication and secure networking. Scalys delivers enterprise class performance and quality for products like a broadband router, edge gateway, firewall, VPN and other networking communication solutions. Embedded Systems, IoT, Cybersecurity, Secure Networking, End to End Security, High Performance Communication, AI/ML, Confidential Computing, Edge Computing, Azure, IoT Edge, Open Enclave, Building Management Solutions, Security at the Edge, Zero Trust, Enclaves, and …

Type: Startup Activities: IT Services deeptech Technologies: Cybersecurity Embedded Systems A.I. A.I. - Machine Learning IoT

4 0 4 7
Mandiant (now part of Google Cloud) Mandiant (now part of Google Cloud)

Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Learn more at https://www.mandiant.com Check out Mandiant career opportunities at: https://www.linkedin.com/company/mandiant/jobs/ Network Security, Threat Intelligence, Computer Forensics, and Incident Response

Type: Large company Activities: IT Services

16 2 4 1,352
Probely Probely

Web Vulnerability Scanner designed to empower Security and DevOps teams working together to reduce the security risk Probely is the premier cloud-based application security testing solution designed to empower Security and DevOps teams working efficiently together on a DevSecOps approach built to reduce risk across web applications and RESTful APIs. Probely empowers Security and DevOps or Development teams to work together to secure their web applications and APIs. Our goal is to narrow the gap between development, security, and operations by making security an intrinsic characteristic of web applications development life-cycle. With over 30,000 vulnerabilities detection capabilities, including SQLi, XSS, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 4 38
Fox-IT Fox-IT

For a more secure society Fox-IT prevents, solves and mitigates the most serious cyber threats with innovative solutions for government, defense, law enforcement, critical infrastructure, banking, and commercial enterprise clients worldwide. Our approach combines human intelligence and technology into innovative solutions that ensure a more secure society. We develop custom and packaged solutions that maintain the security of sensitive government systems, protect industrial control networks, defend online banking systems, and secure highly confidential data and networks. Intelligence, Cyber security, Forensic investigation, Threat monitoring, Managed services, Red teaming, Pentesting, Education, Fraud detection, Detection, Incident Response, Security Operations Center, and Crypto technlogy

Type: SMB Activities: IT Services edtech Technologies: Cybersecurity

5 1 4 440
XM Cyber XM Cyber

Uncover attack paths to critical assets in cloud & on-prem, eradicate risk with a fraction of the effort #SeeAllWays XM Cyber is a leading hybrid cloud security company that’s changing the way organizations approach cyber risk. XM Cyber transforms exposure management by demonstrating how attackers leverage and combine misconfigurations, vulnerabilities, identity exposures, and more, across AWS, Azure, GCP and on-prem environments to compromise critical assets. With XM Cyber, you can see all the ways attackers might go, and all the best ways to stop them, pinpointing where to remediate exposures with a fraction of the effort. Founded by top executives …

Type: Startup Activities: IT Services Technologies: Cybersecurity

9 2 4 335
NuCypher NuCypher

NuCypher is a data privacy layer for blockchain and decentralized applications. It gives developers a way to store, share, and manage private data on public blockchains. Big Data, Cybersecurity, and Encryption

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity Blockchain/Cryptocurrency Data Analytics

7 3 4 12
CERT- EU CERT- EU

Official account of the CERT for the EU institutions, bodies & agencies. Our mission is to contribute to the security of the ICT infrastructure of all European Union institutions, bodies and agencies and help our constituents prevent, detect, mitigate and respond to cyber-attacks. Please use secretariat@cert.europa.eu for interaction. Cyber Defense, Cyber Security, Cybercrime Investigation, Incident Investigation, Threat Intelligence, Cyber Operations, Threat & Vulnerability Management, and Security Incident Response

Type: Public

4 0 4 26
NVISO Security NVISO Security

NVISO is a cyber security services firm composed of outstanding security professionals - each has a specific field of expertise, ranging from security research and risk management to incident response and security testing. This unique "skill blend"​ allows them to analyse and respond to complex client challenges and help those companies prevent, detect and respond to security challenges with a positive business outcome. Built on values of Pride, Caring for our people, Breaking Barriers, and fostering a no-BS approach, our mission is to be an innovative, trusted and respected security partner for our clients. Penetration Testing, Digital Forensics & Incident …

Type: Startup Activities: IT Services deeptech Technologies: Cybersecurity

6 2 4 270
Sift Sift

Sift is the AI-powered fraud platform securing digital trust for leading global businesses. Sift is the AI-powered fraud platform securing digital trust for leading global businesses. Our deep investments in machine learning and user identity, a data network scoring 1 trillion events per year, and a commitment to long-term customer success empower more than 700 customers to grow fearlessly. Brands including DoorDash, Yelp, and Poshmark rely on Sift to unlock growth and deliver seamless consumer experiences. Visit us at sift.com. Machine Learning, Software as a Service (SaaS), Fraud Detection, Predictive Analytics, Big Data, Data Visualization, Digital Trust, Digital Trust & …

Type: Startup Activities: IT Services Technologies: A.I. - Machine Learning A.I. Data Analytics SaaS

14 2 4 370
SpyCloud SpyCloud

The leader in operationalizing Cybercrime Analytics to prevent ATO, ransomware, and online fraud. SpyCloud transforms recaptured darknet data to protect businesses from cyberattacks. Its products operationalize Cybercrime Analytics (C2A) to produce actionable insights that allow enterprises to proactively prevent ransomware and account takeover, protect their business from consumer fraud losses, and investigate cybercrime incidents. Its unique data from breaches, malware-infected devices, and other underground sources also powers many popular dark web monitoring and identity theft protection offerings. SpyCloud customers include half of the ten largest global enterprises, mid-size companies, and government agencies around the world. Headquartered in Austin, TX, SpyCloud …

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 1 4 221
Open Cybersecurity Alliance Open Cybersecurity Alliance

A global alliance to connect the fragmented cybersecurity landscape with common, open source code and practices. The Open Cybersecurity Alliance brings together vendors and end users in an open cybersecurity ecosystem where products can freely exchange information, insights, analytics, and orchestrated response. The OCA supports commonly developed code and tooling and the use of mutually agreed upon technologies, data standards, and procedures.

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

5 0 4 6
CyCognito CyCognito

External Attack Surface Management See Exactly What Attackers See. Take full control over your attack surface by uncovering and eliminating critical security risks – the ones you didn't know existed. Our botnet and discovery engine use graph data modeling to map and classify the assets across your attack surface. attacksurface, asset discovery, cloud security, cyber security threats, vulnerability management, attack surface, IT security, cyber threat intelligence, vulnerability assessment, attack surface management, network security, cyber posture, penetration testing, attack surface visibility, data security, data breach, pentesting, attack surface security, CISO, internet security, security posture, cybersecurity, cloud security, infosec, digital assets, shadow …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 4 160
Apheris Apheris

Governed, private, secure data access for ML and analytics Apheris enables governed, private, and secure access to data for ML and analytics. As model architectures become increasingly commoditized, data becomes an organization’s key differentiator. However, businesses need to safeguard their data assets and IP while leveraging it for ML. Our product, the Apheris Compute Gateway, ensures only approved computations can be launched on that data. It also enables federation across organizational boundaries, allowing ML-powered insights with no need to centralize data, while ensuring compliance with data privacy, security, and governance obligations. Founded in 2019, Apheris is backed by top investors …

Type: Startup Activities: privacytech IT Services Technologies: A.I. A.I. - Deep Learning A.I. - Natural Language Processing

5 0 4 37
Cado Security Cado Security

Cado Security provides the first cloud forensics and incident response platform Cado Security is the provider of the first cloud forensics and incident response platform. By leveraging the scale and speed of the cloud, the Cado platform automates forensic-level data capture and processing across cloud, container, and serverless environments. Only Cado empowers security teams to respond at cloud speed.

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 2 4 55
Transfertpro Transfertpro

The french and secure solution for sharing, coediting and protecting your documents. french solution of document transfer to perform all of your file uploads safely, quickly and easily. cybersécurité, saas, cloud, ANSSI, eIDAS, and RGPD

Type: Startup Activities: IT Services Technologies: Cybersecurity

5 1 4 10
Cyblex Technologies Cyblex Technologies

Nous sommes là pour vous aider. Ensemble, anticipons les risques cybers. At Cyblex Technologies, we believe that we must change the paradigm in cybersecurity management to reduce the gap between targets and attackers in order to allow organizations to be more resilient and durable. To achieve our vision, we are transforming the digital world of our customers to make it safer and smarter. Our consultants support our clients on various topics related to IT security and cybersecurity. Our R&D department develops decision-helping products to support our clients' IT security teams in order to implement automation and artificial intelligence into their …

Type: Startup Activities: IT Services Technologies: A.I. Cybersecurity

4 1 4 19
Fidesmo Fidesmo

Bringing security to the ever-growing world of contactless transactions. Fidesmo brings security to the ever-growing world of contactless transactions. We unite service providers and device manufacturers in a single, secure and scalable NFC platform on a global scale – opening up a world of opportunities to the untapped potential of contactless transactions. Fidesmo is a Swedish tech company founded in 2013, with headquarters in Stockholm and R&D offices in Madrid. Read more at fidesmo.com. Near Field Communications, Trusted Service Manager, Mobile security, SmartCard applications management, Mifare For Mobile, Wearable payments, Tokenization, Digital Wallets, Access Credenitals, and Mobile Access Credentials

Type: Startup Activities: fintech Technologies: NFC Wireless

4 0 4 26
Authy Authy

Simple & secure two-factor authentication via mobile & desktop app that's free to users. Authy's 2FA API is by Twilio. Authy provides strong authentication for the connected world, protecting people and the enterprise against malicious attacks. Our two-factor authentication (2FA) security solution enables organizations to minimize risk while enhancing the user experience. Authy 2FA provides a fast-to-implement, highly scalable and proven 99.999 % reliable alternative to passwords. Used by 11,000+ websites serving 2 million consumers worldwide, it's designed to give users the ability to self-service or easily manage their own 2FA experience. Coinbase, CloudFlare, Humble Bundle and Twitch.tv are just …

Type: Startup Activities: IT Services Technologies: Cybersecurity

9 0 4 4
Agència de Ciberseguretat de Catalunya Agència de Ciberseguretat de Catalunya

CYBERSECURITY AGENCY OF CATALONIA Considering that cybersecurity is a key element for the digital society and the public, it is the duty of public authorities to take part in these affairs throughout Catalonia. The citizens, companies and institutions of this country must be given a public cybersecurity service with the responsibility to protect them. This public cybersecurity service must be able to perform the following duties, among others: - Develop and lead the implantation of a cybersecurity model in Catalonia from current threats; - Coordinate cybersecurity among the various stakeholders in Catalonia, as the body responsible for this area; - …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

5 1 4 64
FortifyData FortifyData

Comprehensive platform for continuous threat exposure management (CTEM). The FortifyData platform enables Enterprises to identify and manage their risk exposure across their entire attack surface – This includes external, internal, cloud configuration, and also third party risks. This information is then published as a Security Rating, translated into Cyber Risk Quantification and can further be customized with configurable risk models driving the most insightful cybersecurity risk indications on any company. Information Security Consulting, Security Policy Development, Application Security Consulting, Information Security Assessments, Vulnerability Assessments, Risk Assessments, Security Design and Architecture, IT Security Audits, cybersecurity, vendor assessment, Cyber Risk scoring, Vendor …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 4 19
Keyless Keyless

Simple, secure, private biometric authentication. The passwordless authentication platform that authenticates people, not just their devices. Keyless equips businesses with simple and secure privacy-preserving biometrics, elevating the user experience and assuring global compliance. Easily integrated, its patented Zero-Knowledge BiometricsTM technology distinguishes Keyless as the first biometric system that does not store biometric data anywhere. Proven to slash ATO fraud and help desk costs by up to 80%, Keyless delivers built-in multi-factor security that verifies a user’s genuine identity in addition to their device in 450ms or less. Compatible with over 1000 devices, Keyless is ISO27001 certified and uniquely has been …

Type: Startup Activities: privacytech IT Services regtech Technologies: Blockchain/Cryptocurrency Cybersecurity

14 3 4 60
Protegrity Protegrity

Empowering businesses with Secure Data Protegrity protects the world's most sensitive data wherever it resides. Our industry-leading solutions allow businesses to finally tap into the value of their data and accelerate digital transformation timelines – without jeopardizing individuals’ fundamental right to privacy. For more than 20 years, Protegrity has delivered innovative, data-centric protection for the most sensitive data of the largest brands on the planet. We free businesses from the constraints associated with accessing and leveraging data to create better customer experiences, make intelligence-supported decisions, and fuel innovation. Data knows no boundaries and Protegrity's technology is built for data ubiquity. …

Type: SMB Activities: privacytech IT Services Technologies: Cybersecurity

4 0 4 371
IT-Harvest IT-Harvest

Mining the cybersecurity industry for insights. IT-Harvest researches and reports on the cybersecurity industry, covering 3,284 vendors. Our Analyst Dashboard is coupled with concierge access to an industry expert who is on call to help with sorting an investment thesis, identifying prospective investments, partners, and acquisitions. dashboard.it-harvest.com industry research, analysis, and security

Type: SMB Activities: IT Services Technologies: Cybersecurity

7 2 4 13
ThreatConnect ThreatConnect

ThreatConnect is the industry's leading threat intelligence operations and cyber risk quantification solutions provider ThreatConnect enables threat intelligence operations, security operations, and cyber risk management teams to work together for more effective, efficient, and collaborative cyber defense and protection. With ThreatConnect, organizations infuse ML and AI-powered threat intel and cyber risk quantification into their work, allowing them to orchestrate and automate processes to get the necessary insights and respond faster and more confidently than ever before. More than 200 enterprises and thousands of security professionals rely on ThreatConnect every day to protect their organizations' most critical assets. To learn more …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 4 163
Cyber-way by Crédit Agricole Alpes Provence Cyber-way by Crédit Agricole Alpes Provence

[Automatic translation follows] Detect and act together for your digital security Digital transformation is today an essential growth lever for all companies, whatever their size or activity, but it is also a vector of new cyber threats. Crédit Agricole Alpes Provence, as a banking establishment, has invested in Cyber ​​Security for years and today has robust and proven means of protection as well as a network of experts in the field. With our subsidiary “CYBER-WAY By Crédit Agricole Alpes Provence”, our desire is now to share our know-how in Cyber ​​Security and thus, to help our customers in a different …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

5 3 4 3
Face-Alive Face-Alive

Startup specialized in biometric security enhancement which gather industrial experts and academic partner. FACE-ALIVE is a startup specialized in biometric security enhancement which gather experts coming from industries and academic partner. FACE-ALIVE’s liveness detection system performs instantly a 3D capture with a 2D Camera detecting any presentation attack. Our technology is reliable, portable and certified. FACE-ALIVE est une startup spécialisée dans l'amélioration de la sécurité biométrique qui rassemble des experts de l'industrie et de la recherche. Le système de détection du vivant de FACE-ALIVE effectue instantanément une capture 3D avec une caméra 2D détectant toute attaque de présentation. Notre technologie …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 4 1
Xage Security Xage Security

Global leader in zero trust access and protection Xage is a global leader in zero trust access and protection on a mission to pioneer a secure tomorrow. Control access and prevent attacks in the cloud, in the data center, at the remote operational edge anywhere on Earth, and even in orbit with the Xage Fabric Platform. Xage is easy to manage and can be deployed in a day, giving users easy and secure access to the assets they need from anywhere, while preventing advanced adversaries and insider threats at every stage of the attack chain. Learn why organizations like the …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

6 0 4 115
Continuity Continuity

The only solution provider that helps enterprises protect their data, by securing their storage & backup systems When a ransomware attack succeeds, your storage and backups are the last line of defense. Now’s the time to secure them – to protect your data, and ensure recoverability. Continuity’s StorageGuard complements existing data-protection solutions, by adding a layer of security that prevents attackers from penetrating your storage & backup systems, and reaching the mass of data that is stored there. Continuity brings the industry’s ONLY security posture management solution for storage & backup systems, helping you protect your most valuable data, and …

Type: SMB Activities: IT Services privacytech Technologies: Cybersecurity

4 0 4 62
Ground Labs Ground Labs

Streamlined Data Management For Privacy | Security | Compliance Ground Labs enables organizations to discover and remediate all of their data across multiple types and locations — on servers, on desktops and in the cloud. Ground Labs serves as the most comprehensive and trusted solution in the enterprise to confidently mitigate risk and find sensitive data. Ground Labs’ core focus is to develop technology to meet the increasing challenges of data management and regulatory compliance. This is shown with our flagship products of Enterprise Recon and Card Recon, along with our continued development of future solutions to address the complexities, …

Type: Startup Activities: IT Services privacytech Technologies: Data Analytics

6 0 4 42
4Secure Ltd 4Secure Ltd

#CONNECTINGTHEDISCONNECTED 4Secure is a leading provider of cross-domain and data diode network cybersecurity solutions across governments, defence, and critical infrastructure. HMG Information Assurance and Cyber Security, CLAS, CHECK and ITPC, Risk Assessment and Accreditation (RMADS), ISO27001 and regulatory compliance, Incident Response, Data Protection Act (DPA), Data diode and cross domain solutions, Digital forensics, Security Operations, Incident Response, Security Operations Centre, Cross-domain Solutions, Data Diodes, FPGA Technology, Cyber Essentials, Data Recovery, JOSCAR Registered, Virtual CISO, Secure Disk Erasure, Compliance, Audit & Security Testing, Secure Supply Chain, Cyber Security Training, and IASME Governance

Type: SMB Activities: IT Services privacytech Technologies: Cybersecurity

4 1 4 18
Novidy's Novidy's

[Automatic translation follows] Novidy’s, the integration subsidiary of the Novidy’s Group, was founded in 2009. Specializing in the network and security market, it operates in the following areas of expertise: - Consulting and audit - Integration / support for latest generation security solutions - Social Security Services on security architectures Our specificity lies in our responsiveness, our ability to adapt to the customer context and to make the link between functional aspects and technical aspects thanks to a pool of experts. An element of distinction which has already convinced many major accounts in the banking, insurance, industry, luxury and telecommunications …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 4 141
EVERTRUST EVERTRUST

We manage your certificates wisely! Managing manually thousands of certificates is time consuming and without added value, moreover it is prone to errors. This is why we have designed two software programs to solve your different problems: Horizon and OCSP. The Horizon governance platform helps to avoid these operational risks. By using our tools, it will be possible to monitor non-compliance and future expirations as well as to gain responsiveness in the event of an incident or compromise. This platform makes it possible to centralize, automate and secure the certificate life cycle (enrollment, renewal, revocation, recovery) independently of the PKI …

Type: Startup Activities: IT Services Technologies: SaaS Cybersecurity

5 0 4 31
nSure.ai nSure.ai

Payment Fraud Prevention for High-Risk Digital Merchants nSure.ai is the payment fraud prevention provider of choice for Gaming, Prepaid and Gift Cards, and Crypto. We offer a managed service based on adaptive AI that deploys, for each customer, a dedicated model trained on their data. Focusing on behavior patterns - the most accurate and uniquely effective way to mitigate modern scalable fraud - our solution takes a fundamentally different approach to detecting fraud and preventing it from happening. Our customers benefit from the highest-efficacy decisions delivered in under 300 ms, with up to 98% approval rates and a chargeback guarantee, …

Type: Startup Activities: fintech IT Services Technologies: A.I. A.I. - Machine Learning

5 1 4 59
PIIRATES PIIRATES

[Automatic translation follows] Ethical Hacking The PIIRATES company relies on a community of experienced Ethical Hackers to allow organizations to test the robustness of their information systems in the face of the risks of computer hacking. We specialize in pentesting (computer intrusion testing) on ​​different IT targets: • Infrastructure & network, • Web platforms and mobile applications, • Social engineering, • Wireless, Goals : • Evaluate the level of security of an organization’s information system • Check the implementation of usual good practices (compartmentalization, protection of administrators, etc.) • Identify and exploit possible vulnerabilities • Propose appropriate and prioritized corrective …

Type: Startup Activities: IT Services Technologies: Cybersecurity

5 3 4 2
SECQAI SECQAI

Security · Quantum · AI Quantum & AI Cyber Security Cyber Security, Quantum, and AI

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I.

4 0 4 6
Quantum Dice Quantum Dice

Securing a connected future. Quantum Dice is an award-winning, fast growing quantum technology and photonics developer backed by world leading innovation from the University of Oxford. Providing random number generation (QRNGs) which generate unbiased, true random numbers. RNGs are essential components of modern communication technologies which generate cryptographically secure keys for enterprise and user needs. Quantum Random Number Generator, Cybersecurity, Quantum, Photonics, and Hardware

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 2 4 24
BehavioSec BehavioSec

Better Authentication. Better Experience. BehavioSec®, now LexisNexis® BehavioSec®, is the industry pioneer and technology leader for behavioral biometrics. We deliver actionable behavioral identity insight so businesses can provide customer-first digital experiences. Our behavioral biometrics technology helps passively establish identity trust and proactively target fraud as a transaction is happening. Find out more by visiting us at: https://risk.lexisnexis.com/ IT Security, Fraud detection, Information theft, Continious Authentication, authentication, digital transformation, behavioral biometrics, social engineering, fraud prevention, and fraud mitigation

Type: Startup Activities: IT Services Technologies: Cybersecurity

16 5 5 22
CybelAngel CybelAngel

Scan, Prioritize, Resolve External Threats CybelAngel is a global leader in cybersecurity solutions focused on External Attack Surface Protection and Management. As an early pioneer in ‘outside-in’ search technology, approaching cybersecurity just as an attacker would carry out infiltration, CybelAngel has developed the industry’s most extensive defense for external attack vectors, where the majority of cyber-attacks are initiated. Combining expanded discovery and analysis, CybelAngel finds unknown assets and exposures to preemptively diffuse attack vectors that cyber criminals use to breach systems and wreak havoc. CybelAngel proudly protects some of the largest global enterprises representing various sectors including the Pharmaceutical, Manufacturing, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

10 5 5 161
HYPR | The Identity Assurance Company HYPR | The Identity Assurance Company

Creating Trust in the Identity Lifecycle as The Identity Assurance Company HYPR is on a mission to improve the lives of security-minded leaders, their employees and customers by helping organizations create trust in the identity lifecycle. HYPR provides the strongest end-to-end identity security, combining modern passwordless authentication with adaptive risk mitigation, automated identity verification and a simple, intuitive user experience. With a third-party validated ROI of 324%, HYPR easily integrates with existing identity and security tools and can be rapidly deployed at scale in the most complex environments. Cybersecurity, Mobile Security, Infrastrucure, Data Security, Security, Wireless, Privacy, SaaS, Software, Cloud, …

Type: Startup Activities: IT Services privacytech regtech Technologies: Cybersecurity IoT SaaS Wireless

16 3 5 122
INFINY LINK INFINY LINK

[Automatic translation follows] Manage and secure the IT and Telecom infrastructures of SMEs for daily operational performance. At INFINY LINK, we offer a full range of IT services for SMEs, including outsourcing, cybersecurity, cloud hosting solutions, as well as backup and Disaster Recovery Plan (DRP) services. Founded in October 2005, we specialize in IT and telecoms, offering multidisciplinary expertise. Our skills extend from help desk to supervision, including network management, systems integration, cloud solutions, telecoms and outsourced backup. We personalize our offers to meet the specific needs of companies with 20 to 500 employees. As a responsible company, INFINY LINK …

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 0 5 20
Yubico Yubico

Yubico sets new world standards for simple, secure login. Yubico (Nasdaq First North Growth Market Stockholm: YUBICO), the inventor of the YubiKey, offers the gold standard for phishing-resistant multi-factor authentication (MFA), stopping account takeovers in their tracks and making secure login easy and available for everyone. Since the company was founded in 2007, it has been a leader in setting global standards for secure access to computers, mobile devices, servers, browsers, and internet accounts. Yubico is a creator and core contributor to the FIDO2, WebAuthn, and FIDO Universal 2nd Factor (U2F) open authentication standards, and is a pioneer in delivering …

Type: Startup Activities: IT Services Technologies: Cybersecurity

5 0 5 473
PCI Security Standards Council PCI Security Standards Council

Securing the future of payments together. The PCI Security Standards Council is a global open body formed to develop, enhance, disseminate and assist with the understanding of security standards for payment account security. The Council maintains, evolves, and promotes the Payment Card Industry Security Standards. It also provides critical tools needed for implementation of the standards such as assessment and scanning qualifications, self-assessment questionnaires, training and education, and product certification programs.

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

12 4 5 155
HackerOne HackerOne

Peace of mind from security's greatest minds. Together We Hit Harder ® HackerOne is the global leader in human-powered security. We leverage human ingenuity to pinpoint the most critical security flaws across your attack surface to outmatch cybercriminals. HackerOne’s Attack Resistance Platform combines the most creative human intelligence with the latest artificial intelligence to reduce threat exposure at all stages of the software development lifecycle. From meeting compliance requirements with pentesting to finding novel and elusive vulnerabilities through bug bounty, HackerOne’s elite community of ethical hackers helps organizations transform their businesses with confidence. HackerOne has helped find and fix more …

Type: Large company

5 1 5 4,712
Checkmarx Checkmarx

Checkmarx. Make Shift Happen. Checkmarx is the Enterprise Application Security provider, offering the industry leading cloud-native platform that builds DevSecTrust – Checkmarx OneTM. Fueled by intelligence from our industry leading AppSec security research team, our AI driven technology and services enable CISO, AppSec and Development leaders to prioritize their teams on what impacts their business. Our offering secures every phase of development for every application from the very first line of code until production (Shift Everywhere) while simultaneously balancing the dynamic needs of security and development teams. We are honored to serve more than 1,800 customers, including 60 percent of …

Type: Large company Activities: IT Services

5 0 5 937
Duo Security Duo Security

Duo provides the best of both worlds: an MFA solution that is strong and easy-to use We are Duo, and we’re here to democratize security. We were born from a hacker ethos and a desire to make the Internet a secure place. Our mission is to protect the mission of our customers by making security simple for everyone. Our team is our secret weapon. We’re a diverse crew of makers and builders, skaters and coders, filmmakers and DJ’s, teachers and students brought together by a shared belief in adding value to the world. That diversity allows us to bring an …

Type: Startup Activities: IT Services Technologies: Cybersecurity

15 1 5 611
ESCRYPT ESCRYPT

ESCRYPT — ETAS security solutions ESCRYPT - Trusted Security Solutions For more than 15 years, ESCRYPT has stood for technologically pioneering, holistic cybersecurity solutions in the automotive sector. Today, millions of ESCRYPT automotive security solutions are safeguarding vehicle systems around the world – and setting standards for the cybersecurity of software-defined vehicles, intelligent traffic systems, and connected vehicle fleets. In addition, the ESCRYPT brand brings together dedicated security services for corporate IT and Bosch Group products, as well as qualified incident response services. ESCRYPT is a brand of ETAS GmbH, a member of the Bosch Group. ESCRYPT automotive security solutions …

Type: SMB Activities: IT Services Technologies: Cybersecurity Embedded Systems IoT

8 1 5 119
Deep Instinct Deep Instinct

Prevention Without Compromise. Powered by Deep Learning. Deep Instinct is the first company to apply deep learning to cybersecurity. Deep learning is inspired by the brain’s ability to learn. Once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct’s artificial brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. As a result, zero-day and APT attacks are detected and prevented in real-time with unmatched accuracy. Deep Instinct brings a completely new approach to cybersecurity that is proactive and predictive. Deep Instinct provides comprehensive defense that is designed to …

Type: Startup Activities: IT Services Technologies: A.I. - Deep Learning Cybersecurity A.I.

5 0 5 248
Guardicore Guardicore

Guardicore is the segmentation company disrupting the legacy firewall market. Our software-only approach is decoupled from the physical network, providing a faster alternative to firewalls. Built for the agile enterprise, we offer greater security and visibility in the cloud, data-center and endpoint. Cloud Security, Data Center Security, Legacy Firewall Alternative, Hybrid Cloud Security, Micro-Segmentation, Software-Defined Segmentation, Network Security, and Network Segmentation

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 2 5 109
GoSecure GoSecure

Based in Montreal and San Diego, GoSecure is a leading provider of managed security solutions and advisory services. GoSecure is a recognized cybersecurity leader, delivering innovative managed Extended Detection and Response (MXDR) solutions and expert advisory services. GoSecure Titan® managed security solutions deliver multi-vector protection to counter modern cyber threats through a complete suite of offerings that extend the capabilities of our customers’ in-house teams. GoSecure Titan Managed Extended Detection and Response (MXDR) offers a best-in-class mean-time-to-respond, with comprehensive coverage across customers’ networks, endpoints, and inboxes. For over 10 years, GoSecure has been helping customers better understand their security gaps, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

6 1 5 177
CYREBRO CYREBRO

Detect & Respond, Precisely CYREBRO is on a mission to completely revolutionize cybersecurity operations by putting the power of a full-fledged Security Operations Center (SOC) in the hands of any user in any organization. Our true 24/7/365 ML-backed Managed Detection & Response solution rapidly detects, analyzes, investigates and responds to cyber threats. From strategic monitoring to proactive threat hunting, accelerated incident response, and enhanced compliance, the full scope of needs is covered. This way, both Fortune 500 companies and SMBs alike can equally and profoundly improve their security posture with clarity, simplicity, and cost-efficiency. Cyber, Cyber Intelligence, Forensics, APT, Audit, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 1 5 132
Private Internet Access Private Internet Access

PRIVATE INTERNET ACCESS provides state of the art, multi-layered security with advanced privacy protection using VPN tunneling. Our services have been designed from the ground up to be able to operate using built-in technology pre-existing in your computer or smartphone device. The services operate at the TCP/IP interface level, which means all of your applications will be secured, not just your web browser. Several, easy to use and readily available software1 packages that allow spammers and criminals to intercept your data exist, with more emerging daily. It is becoming increasingly simpler to hijack and steal data and information from insecure …

Type: Startup Activities: IT Services privacytech Technologies: Wireless

5 1 5 20
TechGDPR TechGDPR

GDPR and privacy experts for the tech industry with an international and deep-tech focus. We help high-tech startups and companies become GDPR compliant. The General Data Protection Regulation (GDPR) is an European Union law that will apply EU-wide from the 25th of May 2018. If you or your company is storing or processing personal data of anyone in the EU this law applies. Compliance is important, not only because of the significant fines of up €20 million or 4% of annual group revenue, whichever is greater, but also to protect the Universal Human Right to Privacy. Compliance can only be …

Type: Startup Activities: privacytech IT Services Technologies: A.I. Blockchain/Cryptocurrency IoT

5 0 5 10
Hacken, Blockchain Security Auditor Hacken, Blockchain Security Auditor

We make Web3 a safer place Hacken is a blockchain security auditor with a vision of transforming Web3 into a more ethical place. We believe, cybersecurity is not only about hacks prevention, but the whole way of running business — without scamming investors, rug pulls, wash trading, circulation supply manipulations, etc. It’s about doing business ethically by respecting community, being honest with investors and partners, acting responsibly, and valuing reputation. We protect Web3 projects and their communities with the suite of cybersecurity services such as Smart Contract Audit, L1 Blockchain Protocol Audit, dApp Audit, Pentest, Bug Bounty Program running on …

Type: Startup Activities: IT Services Technologies: Cybersecurity Blockchain/Cryptocurrency

6 0 5 133
Yoroi Yoroi

#DefenceBelongsToHumans Yoroi is a managed security service provider. It provides cyber security solutions against industrial espionage, internal threats and advanced targeted attacks. Yoroi offers an high specialized Security Operation Center (SOC) to protect your company. Defence belongs to humans! Computer Security, Advanced Targeted Attack Prevention, Managed Security Service Provider, Couter Espionage, Penetration Testing, Vulnerability Management, SAP Penetration Testing, Cyber Security Operation Center, Digital Surveillance, Early Warnings, and Cyber Defence

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 0 5 105
Authentise Authentise

Data-driven workflow management solutions for the world’s most agile engineering and manufacturing operations Authentise’s data-driven platform manages the manufacturing processes from design to part to increase efficiency and repeatability. Generate quotes, renders, material and time estimates, builds, and more on the fly. Connect to dozens of machines for automatic order status updates, traceability reports, KPI dashboards and improved estimates using machine learning. 3D printing, security, authentication, additive manufacturing, process automation, data, IIOT, manufacturing, Industry 4.0, Machine Learning, digital thread, mes, mom, workflow management, and engineering

Type: Startup Activities: IT Services Technologies: RPA 3D Printing A.I. A.I. - Machine Learning IoT

5 0 5 33
CybExer Technologies CybExer Technologies

Empower Your Organization’s Cyber Resilience with Advanced Cyber Range Technology. CybExer Technologies provides comprehensive cyber security training solutions to increase organizational cyber resilience. Our platform offers a range of advanced cyber security training modules designed to enhance the cyber capabilities of organizations. With our cutting-edge cyber range, organizations can conduct highly realistic live-fire exercises that simulate real-world cyber attacks. This allows cyber security and IT teams to identify and mitigate vulnerabilities, thereby improving their prevention and response strategies. Cyber security, Security, Training, and Cyber Range platform

Type: Startup Activities: IT Services Technologies: Cybersecurity

5 0 5 40
Cequence Security Cequence Security

Discover, comply, and protect APIs and applications against attack, business logic abuse, and fraud. Cequence Security is an API security and bot management company that protects customers’ applications and APIs against attacks, business logic abuse, and fraud. Our comprehensive Unified API Protection solution offers discovery, compliance, and protection across all internal and external APIs without needing any instrumentation, SDK, or JavaScript deployments. Cequence solutions scale to handle the most demanding government, Fortune and Global 500 organizations, securing more than 8 billion daily API interactions and protecting more than 3 billion user accounts across these customers. The company is led by …

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 2 5 162
Smart Protection Smart Protection

Making the internet a safer place for online businesses and consumers alike. We are experts in brand and content protection online. Thanks to our team of cybersecurity experts and our AI technology, we protect the intellectual property for our clients worldwide. As Member of Google’s Trusted Copyright Removal Program (TCRP), and thanks to our special agreements with the main digital marketplaces and social networks, we are able to delist infringing URLs, and remove illicit products and content quickly and efficiently. This allows brands and content owners to focus resources on their individual business needs. Protection of intellectual and industrial property …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

7 1 5 91
Cobalt Cobalt

Modern pentesting for security and development teams. Cobalt combines talent and technology to provide transformative offensive security solutions for organizations to remediate risk across a dynamically changing attack surface. The innovators of Pentest as a Service, Cobalt empowers businesses to optimize their existing resources, access an on-demand community of trusted security experts, expedite remediation cycles, and share real-time updates and progress with internal teams to mitigate future risk. Web security, Vulnerability management, Application security, Web Application Security, Mobile Application Security, API Security, pentesting, and pentesting as a service

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 1 5 448
SERMA SAFETY & SECURITY SERMA SAFETY & SECURITY

Secure Your Future SERMA Safety & Security is your single point of contact for the security and dependability of your products and systems. Because Cybersecurity and Dependability are intricately linked, and the Security of connected objects has to be managed at system level, SERMA Safety & Security has developed a one-stop comprehensive offer incorporating Expertise, Evaluation,Consultancy and Training , covering hardware, software and information systems. Created in 2015, SERMA Safety & Security, known as S3, is renowned for its expertise in the field of safety and security – the result of over 20 years’ experience: ► The security lab, created …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

12 2 5 196
Cyberint Cyberint

We turn intelligence into actions to proactively and effectively defend businesses against cyber threats Cyberint, the Impactful Intelligence company, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The Cyberint Argos platform’s patented technology provides superior visibility through continuous discovery of the evolving attack surface, combined with the automated collection and analysis of vast quantities of intelligence from across the open, deep and dark web. A team of global military-grade cybersecurity experts work alongside customers to rapidly detect, investigate, and disrupt relevant threats – before they have the chance to develop into …

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 0 5 156
Secomba GmbH | Boxcryptor Secomba GmbH | Boxcryptor

We help you secure your company-data in the cloud, on NAS, file server, and local. Boxcryptor is the awarded encryption solution for your cloud with many satisfied customers worldwide. It's the market leader for security solutions in the area of cloud storage. Customers from over 190 countries and from all branches trust Boxcryptor and enjoy the advantages of the cloud without giving up privacy. Boxcryptor is optimized for the use with cloud storage providers such as Dropbox, iCloud, Microsoft OneDrive for Business and many more. It supports more than 30 providers on all platforms by today. The company was awarded …

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 1 5 10
Uniken Inc. Uniken Inc.

Creating a secure world where identity is a certainty, not a vulnerability. At Uniken, we accelerate possibilities for client-centric organizations by creating certainty in identity and security while delivering amazing customer experiences. We believe identity shouldn’t be a question of trust, but a statement of certainty. With our award-winning REL-ID security platform, we raise identity from trust to certainty while enhancing customer experience. REL-ID enables organizations to drive fraud to zero by securing the customer journey end-to-end — from devices, applications, and network connections to customer authentication, transaction verification, and digital signing. Fast and frictionless, REL-ID removes the security burden …

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 0 5 171
ARKHINEO ARKHINEO

[Automatic translation follows] Arkhineo, a solution from the Docaposte group, is the first French electronic archiving solution with probative value. Created in 2001, CDC Arkhinéo, Caisse des Dépôts group, trusted third-party archiver, is the first French archiving company with probative value for electronic data (120 million documents archived in 2011). Thanks to its unique Electronic Safe® solution in SaaS mode, CDC Arkhinéo ensures the integrity and long-term conservation of all types of electronic documents (invoices, pay slips, loan contracts, employment contracts, emails, tokens timestamps, evidence files, etc.). CDC Arkhinéo is committed to all stages of the process: guarantee of data …

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 0 5 11
Cloudi-Fi Cloudi-Fi

Cloudi-Fi offers Internet connectivity for guests on top of existing infrastructures. Cloudi-Fi provides security, compliance and marketing services at an unmatched international scale. Its 100% cloud delivery service allows instantaneous deployments on all sites worldwide without additional investment. Cloudi-Fi is used by large corporations who want to simplify their Wi-Fi onboarding for guests, IOT, employees.. but also by brands, retailers and hospitality companies who want to leverage their physical presence to improve their digital campaigns. Let's connect with your guests! www.cloudi-fi.com International services, Social Wi-Fi, Customer Analytics, Marketing automation, and Marketing analytics

Type: Startup Activities: IT Services martech Technologies: IoT

5 0 5 23
AuthN by IDEE AuthN by IDEE

IDEE is the technology company behind AuthN. AuthN is a passwordless, phish-proof MFA solution deployed in just 15 min. AuthN is an award-winning, client-less, passwordless multi-factor authentication (MFA) that can be deployed in minutes across the entire estate. It prevents every single credential phishing and password-based attack including adversary-in-the-middle (AiTM). It can be used with or without a phone. Cyber security, Digital identity, Identity and access management, Blockchain, Blockchain Identity, two-factor authentication, strong authentication, fraud prevention, authentication, device security, phishing prevention, stop phishing, and blockchain

Type: Startup Activities: IT Services regtech Technologies: Blockchain/Cryptocurrency Cybersecurity

6 1 5 20
Moabi.com Moabi.com

Industrial Reverse Engineering Our mission : design, develop and deliver solutions for better product and supply chain cybersecurity. Cloud, Edge Computing, IOT, Industry Operations, Software Defined Networking and 5G : software is everywhere. However, does this mean that your software is security-ready ? Do you monitor and control your software supply chain in order to raise security awareness? Moabi helps corporate and institutional organizations to analyze, measure and improve any software security to succeed their digital transformation. Moabi SAAS platform is a scalable, cost efficient and pro-active security solution that performs analysis relying on security standards and tests software, binaries …

Type: Startup Activities: IT Services Technologies: 5G Cybersecurity IoT SaaS

34 10 5 8