Entities
LogoName Σ Employees
Senrio Senrio

When hearing the buzz-word “Internet of Things,” we typically think of consumer devices: smart toasters and connected fridges. However, there is a staggering number of networked embedded devices that perform life- and mission-critical tasks that our daily lives depend on. What all these devices have in common is that they are ubiquitous and adoption is growing at a staggering rate while security is often an afterthought. As an IoT cybersecurity platform, Senrio provides visibility and analytics for networked embedded devices (aka The Internet of Things) where traditional, signature-based security technologies fail to deliver actionable insights. Senrio uses patented technology to …

Type: Startup Activities: IT Services Technologies: IoT Cybersecurity

2 1 0 3
CertifID CertifID

CertifID is a wire fraud protection company. CertifID helps to create a world without wire fraud. Started after our co-founder was hit by fraud – we’re the only company dedicated to fighting fraud for the real estate industry with an identity verification SaaS platform, insurance, and proven recovery services. Security, Identity Verification, Digital Verification, Two Factor Authentication, Wire Fraud Prevention, Real Estate, Title, Identity Theft, Bank Account Certification, SAAS, and B2B Security Tools

Type: Startup Activities: IT Services proptech regtech Technologies: Cybersecurity

1 1 0 80
Lastline, Inc. Lastline, Inc.

AI-powered Network Security to Defeat Advanced Threats Lastline, Inc. provides innovative AI-powered network security products that detect and defeat advanced cyberattacks attempting to enter and operating within your network. We protect network, email, cloud, and web infrastructures, minimizing the risk of damaging and costly data breaches with fewer resources and at lower cost. We uniquely apply AI to the combination of network traffic and malware behaviors – what we call “AI Done Right” – delivering a single, comprehensive incident that identifies all malicious activity and affected systems across the compromised network, with minimal false positives. The result is improved efficiency …

Type: Startup Activities: IT Services Technologies: A.I. Cybersecurity

0 0 0 7
Fyde Fyde

Fyde is now Barracuda CloudGen Access. Secure zero trust access to all your apps and data from any device and location. Fyde is now Barracuda CloudGen Access. Secure zero trust access to all your apps and data from any device and location. Security starts with access. The CloudGen Access zero trust model establishes unparalleled access control across users and devices without the performance pitfalls of a traditional VPN. It provides remote, conditional, and contextual access to resources and reduces over-privileged access and associated third-party risks. With CloudGen Access, employees and partners can access corporate apps and cloud workloads without creating …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 4
nsKnox nsKnox

nsKnox is a cyber-fintech company focused on Corporate Payment Security nsKnox is a cybersecurity company focused on Corporate Payment Security, founded and led by Alon Cohen, Founder & former CEO of CyberArk (NASDAQ: CYBR). nsKnox solutions protect corporations and banks against cyber-fraud carried out by insiders or outsiders, preventing significant financial losses and reputational damage. Leveraging its groundbreaking Cooperative Cyber SecurityTM (CCS) technology to combine the cyber strength of multiple organizations, nsKnox’s solutions detect and prevent finance & ops infrastructure attacks, social engineering, business email compromise (BEC) and other Advanced Persistent Fraud attacks. Backed by Microsoft Ventures, Viola Ventures and …

Type: Startup Activities: IT Services fintech Technologies: Cybersecurity

5 2 2 47
Armis Armis

The Asset Intelligence Cybersecurity Company Armis is THE asset intelligence cybersecurity company. Assets are personal devices like mobiles, laptops etc as well as corporate owned assets like medical MRI machines or industrial plants, building systems, CCTV cameras or mobiles and laptops etc. They represent the attack surface within an organization that bad actors go after to disrupt business. We protect organizations across the world in all industry verticals as well as federal and state and local governments to protect the entire attack surface of an organization and manage cyber risk. We have built partnerships and integrations with the world's leading …

Type: Startup Activities: IT Services Technologies: 5G Cybersecurity IoT Wireless

3 0 3 803
Qualys Qualys

Security and compliance for your global IT assets. Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of disruptive cloud-based security, compliance and IT solutions with more than 10,000 subscription customers worldwide, including a majority of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and automate their security and compliance solutions onto a single platform for greater agility, better business outcomes, and substantial cost savings. The Qualys Cloud Platform leverages a single agent to continuously deliver critical security intelligence while enabling enterprises to automate the full spectrum of vulnerability detection, compliance, and protection for IT systems, …

Type: Large company Activities: IT Services

0 0 0 2,599
Kauz Informatik Medien AG Kauz Informatik Medien AG

[Automatic translation follows] Computer science is a made-up word consisting of information and automation. You have information, we automate. As much computer science as necessary, not as much as possible... Under this motto, we have been creating customized solutions since 1994. Whether this is in the area of ​​infrastructure (networks, hardware, printers, SmartHome, embedded systems, etc), whether this is in software development (programming, web developments, websites), whether this is in... The area of ​​cloud solutions (Acronis Solution, DropBox, Microsoft SilverPartner, CCleanerCloud, WebHosting, Logmein, etc) is or is in consultation. As a certified company, we can also take on help desk …

Type: SMB Activities: IT Services Technologies: Embedded Systems

4 1 3 19
SECUDE SECUDE

Protect design drawings (CAD) and SAP data exports always and everywhere |Automate data security with HaloCAD & HaloCORE Do you exchange confidential data and are looking for a secure system that makes it impossible for external parties to misuse your intellectual property? Do you want to automate your data security and technically enforce your security standards? ​​We have the solution: HaloCAD and HaloCORE are unique security solutions that allow you to protect CAD files and SAP data outside of PLM systems and beyond corporate boundaries. Furthermore, you can easily use Microsoft Purview Information Protection in CAD applications. Based on data …

Type: SMB Activities: privacytech IT Services Technologies: Cybersecurity

2 0 2 113
Open Systems Open Systems

Your Secure Connectivity is Our Business Backed by the Service Experience Promise, Open Systems simply and cost-effectively connects and secures hybrid environments and thus ensures your organization can meet business objectives. Open Systems uniquely focuses on a superior user experience when helping organizations reduce risk, improve efficiency, and accelerate innovation. The Open Systems SASE Experience delivers on the promise of ZTNA with a comprehensive, unified and easy-to-implement and use SASE platform that combines SD-WAN and Security Service Edge delivered as a Service. We provide 24x7 operational management and engineering support from assigned engineering teams and ensure affordable and predictable costs. …

Type: SMB Activities: IT Services regtech Technologies: A.I. Cybersecurity

5 0 2 436
N8 Identity Inc. N8 Identity Inc.

Award-winning Identity-as-a-Service (IDaaS) governance platform on Microsoft Azure N8 Identity, Inc. has re-imagined identity governance with an agile, cloud-based and mobile-first solution that brings security and value to organizations of all sizes. N8 Identity addresses the changing needs of modern businesses by intelligently managing access across all devices, in the cloud, and in the data center through both its Managed Identity Services and TheAccessHubTM, its award-winning Identity-as-a-Service (IDaaS) governance platform. Founded in 2000, N8 Identity has always been focused exclusively on building scalable, agile identity governance solutions, and has deployed nearly one billion identities to date. Our goal is to …

Type: SMB Activities: IT Services regtech Technologies: Cybersecurity

0 0 0 10
Eviden BDS Canada Eviden BDS Canada

Protection breeds performance Since April 2023, In Fidem became part of Eviden, an Atos business. Eviden is a next-gen technology leader in data-driven, trusted and sustainable digital transformation with a strong portfolio of patented technologies. With worldwide leading positions in advanced computing, security, AI, cloud and digital platforms, it provides deep expertise for all industries in more than 53 countries. Bringing together 57,000 world-class talents, Eviden expands the possibilities of data and technology across the digital continuum, now and for generations to come. Eviden is an Atos Group company with an annual revenue of c. € 5 billion. Visit www.eviden.com …

Type: SMB Activities: IT Services regtech Technologies: Cybersecurity

2 0 2 52
eSentire eSentire

The Authority in Managed Detection and Response. eSentire, Inc. is the Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations in 80+ countries, representing 35 industries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk …

Type: SMB Activities: IT Services Technologies: Cybersecurity A.I. A.I. - Machine Learning

0 0 0 578
Manhattan sas Manhattan sas

[Automatic translation follows] Expert in cybersecurity and computer networks, Manhattan is attentive to your IS, on security and networks Founded in July 2001, Manhattan positions itself as a security and network integrator in the fields of business communication. Manhattan is CCSP Checkpoint certified. Cisco Network Integrator - EXTREME NETWORK - ARUBA Security integrator around Check Point, Sophos, Kaspersky, ProofPoint, Rapid7, Security Audit products. Our offers, packaged or made to measure according to your communication needs, are delivered with professional support: MANHATTAN provides maintenance and the hotline for all its solutions. Network integration: Enterprise connectivity: MANHATTAN advises and intervenes in the …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 6
JPA CONSULTANTS JPA CONSULTANTS

[Automatic translation follows] JPA Consultants, IT partner of SMEs / VSEs for 30 years Thanks to our 30 years of expertise in Lyon, Saint Etienne, and the entire Rhône-Alpes region, we have set up a support system adapted to each IT project entrusted by our clients. Thus, we operate in 2 areas of activity: Infrastructure and management software via SAGE and EBP editors. Today we have 300 clients, mainly SMEs and VSEs, who demonstrate the quality of our services by entrusting us with their IT projects. Thanks to a dynamic and efficient team, we offer a range of products to …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 20
IOL - Informatique On Line IOL - Informatique On Line

Partenaire informatique de proximité, certifié ISO 9001 et ISO 27001. Microsoft CSP Silver Partner B2B IT services. Microsoft Cloud Solutions Provider and Microsoft Partner Network. Stormshield Silver Partner, ISO 27001 and 9001 Hosting provider with privately managed IP / Backbone Hosting provider , Microsoft 365, Stormshield, Network Security, and IT Support

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 14
DB CyberTech DB CyberTech

DB CyberTech innovates privacy and security solutions for high value structured data. Stop data loss before it happens! DB CyberTech innovates predictive data loss prevention for structured data. Its customers include the world's largest financial institutions, healthcare providers, manufacturers, and governments. DB CyberTech's technology non-intrusively assesses client to data store conversations through deep protocol extraction, machine learning, and behavioral analysis. Customers gain insights by discovering information assets including sensitive data, identifying tables being accessed, and mapping the specific applications accessing the structured data stores. In addition, machine learning technology immediately pinpoints and alerts to insider threats before data is stolen. …

Type: Startup Activities: IT Services privacytech Technologies: A.I. Cybersecurity Data Analytics A.I. - Machine Learning

0 0 0 8
Medigate by Claroty Medigate by Claroty

Connect with Confidence Securing the clinical environment requires a new security strategy and coordinated approach as IT, OT, IoT and physical systems converge and the threat of bad actors exploiting vulnerabilities across new and old infrastructure is increasing. IT also requires detailed knowledge of each and every medical device, their proprietary protocols, and a comprehensive understanding of medical workflows. In a network with hundreds of different device types, thousands of devices from different manufacturers, and a mix of protocols and operational parameters it can be overwhelming to protect. Healthcare needs a solution that covers the entire risk spectrum they face …

Type: Startup Activities: deeptech healthtech IT Services Technologies: Cybersecurity IoT

2 0 2 99
Dragos, Inc. Dragos, Inc.

Industrial Cybersecurity Dragos has a global mission to safeguard civilization from those trying to disrupt the industrial infrastructure we depend on every day. The Dragos Platform offers the most effective industrial cybersecurity technology, giving customers visibility into their ICS/OT assets, vulnerabilities, threats, and response actions. The strength behind the Dragos Platform comes from our ability to codify Dragos's industry-leading OT threat intelligence, and insights from the Dragos services team, into the software. Our community-focused approach gives you access to the largest array of industrial organizations participating in collective defense, with the broadest visibility available. ​ Our solutions protect organizations across …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT SaaS

13 3 9 542
Shodan Shodan

Shodan is the world's first search engine for the Internet of Things and premier provider of Internet intelligence. The Shodan platform allows organizations to monitor their network, assess 3rd-party cyber risk, gather market intelligence and understand the global Internet landscape in real-time. Our data feeds are consumed by 80+ of the Fortune 100 companies, thousands of universities and millions of users around the world. Internet of Things Security, Threat Intelligence, External Network Monitoring, Third-Party Risk, and Internet Intelligence

Type: Startup Activities: IT Services Technologies: IoT

2 0 0 13
Expel Expel

An irreverent crew on a mission to make security easy to understand, easy to use, and easy to continuously improve. Security that makes sense and can be, dare we say, delightful. We're a secops provider that offers managed detection and response (MDR), remediation, phishing, and threat hunting. Our platform and people work together to make sense of your security signal—with your business in mind—to detect, understand, and fix issues fast. And be sure to subscribe to our blog for takes on the latest infosec trends, tech, attack vectors, along with tales from our SOC and so much more. Transparent managed …

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 0 8 498
Firestorm Cyber Firestorm Cyber

Managed Security Services Provider We believe that the Internet has become a crime scene. We were born from that belief and that the same knowledge and skills used by bad people to commit crimes should be used in defense of information, privacy, and security. Every practice we have and everything we do is centered around security. If a technology doesn't meet our highest standards of protecting the Confidentiality, Integrity, and Availability of information systems, it won't be a part of our offerings to our customers. We are proactive in analyzing emerging threats and deploying defensive measures against them in our …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 10
Adarma Security Adarma Security

TOGETHER WE'VE GOT THIS We are Adarma, independent leaders in detection and response services. We specialise in designing, building and managing cybersecurity operations that deliver a measurable reduction in business risk. We are on a mission to make cyber resilience a reality for organisations around the world. Our team of passionate cyber defenders work hand in hand with you to mitigate risk and maximise the value of your cybersecurity investments. Powered by the Adarma Threat Management Platform and optimised to your individual needs, we deliver an integrated set of services that improve your security posture including best in class Managed …

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 0 3 300
Quorum Cyber Quorum Cyber

We help good people win. Defending customers against cyber security attacks with a truly unified security ecosystem. At Quorum Cyber we help good people win. Founded in Edinburgh in 2016, our expert team of security analysts, incident responders, forensic specialists, and threat hunters leverage the latest Microsoft Security technologies to defend organisations worldwide and in all industry sectors against cyber security threats, breaches and attacks. As a Microsoft-only house, we provide a unified security ecosystem, offering a comprehensive portfolio of simple, innovative services, delivered through our unique customer platform, Clarity. Our main services are: • Managed Extended Detection & Response …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 1 2 243
Private Internet Access Private Internet Access

PRIVATE INTERNET ACCESS provides state of the art, multi-layered security with advanced privacy protection using VPN tunneling. Our services have been designed from the ground up to be able to operate using built-in technology pre-existing in your computer or smartphone device. The services operate at the TCP/IP interface level, which means all of your applications will be secured, not just your web browser. Several, easy to use and readily available software1 packages that allow spammers and criminals to intercept your data exist, with more emerging daily. It is becoming increasingly simpler to hijack and steal data and information from insecure …

Type: Startup Activities: IT Services privacytech Technologies: Wireless

5 1 5 21
Menlo Security Inc. Menlo Security Inc.

Menlo Security makes every browser an enterprise browser. Browsers are the application enterprises can’t live without, how we work with SaaS and private web applications. But browsers are a security blind spot. They operate without the necessary protection and security controls, exposing enterprises to attack. Browsers are the entry point for internet borne attacks, the exit point for data leakage. Menlo Security secures enterprise browsers. Menlo Browser Security manages browsers, protects your users, and secures application access and enterprise data, providing a complete enterprise browser solution from any browser. Menlo Security secures browsers while preserving user choice and providing a …

Type: Startup Activities: IT Services Technologies: Cybersecurity

17 0 6 405
BlueVoyant BlueVoyant

A cloud-native cyber defense platform that delivers positive security outcomes that drive results. BlueVoyant combines internal and external cyber defense capabilities into outcomes-based, cloud-native cybersecurity solution by continuously monitoring your network, endpoints, attack surface, and supply chain, as well as the clear, deep, and dark web for threats. The full-spectrum cyber defense products and services illuminate, validate, and quickly remediate threats to protect your enterprise. BlueVoyant leverages both machine-learning-driven automation and human-led expertise to deliver industry-leading cybersecurity to more than 900 clients across the globe. Cybersecurity, MDR, 3rd Party Cyber Risk, Incident Response, SOC as a Service, Microsoft Security, Splunk …

Type: Startup Activities: IT Services Technologies: Cybersecurity

10 2 7 619
Red Canary Red Canary

24/7/365 threat detection and response across your cloud, identity, endpoints and everything in-between. We got you. Red Canary stops cyber threats no one else does, so organizations can fearlessly pursue their missions. We do it by delivering managed detection and response (MDR) across enterprise endpoints, cloud workloads, network, identities, and SaaS apps. As a security ally, we define MDR in our own terms with unlimited 24×7 support, deep threat expertise, hands-on remediation, and by doing what’s right for customers and partners. Threat Detection, Endpoint Detection & Response, Endpoint Security, Managed Security, Threat Hunting, Digital Forensics & Incident Response, Managed Detection …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 450
Hexnode Hexnode

One-stop solution to make all devices managed and secured Hexnode UEM is an industry-leading endpoint management solution that offers a rich set of features aimed at securing, managing, and remotely monitoring devices within the enterprise. Evolving to accommodate the latest technologies and industry trends, Hexnode serves businesses of all sizes, from start-ups to Fortune 100 companies, with the best business mobility experience. Its reputation is concreted with success stories from satisfied customers across the globe, spanning almost a decade. Hexnode hosts its annual events such as partner summits and user conferences building a global community of IT professionals, enthusiasts and …

Type: Startup Activities: IT Services Technologies: SaaS

1 0 1 115
Agari Agari

DMARC | Email Authentication | Phishing Defense | Phishing Incident Response | BEC Agari is the Trusted Email Identity CompanyTM, protecting brands and people from devastating phishing and socially-engineered attacks. Using applied data science and a diverse set of signals, Agari guards the workforce from inbound business email compromise, supply chain fraud, spear phishing, and account takeover-based attacks, reducing business risk and restoring trust to the inbox. Agari also prevents spoofing of outbound email from the enterprise to customers, increasing deliverability and preserving brand integrity. Learn more at agari.com. Email Security, Security, SaaS, Data Analytics, Anti-Phishing, cybersecurity, Artificial Intelligence, Machine …

Type: Startup Activities: IT Services Technologies: Data Analytics A.I. A.I. - Machine Learning Cybersecurity SaaS

13 2 7 67
Threatcare Threatcare

The leader in proactive attack simulations. Recently acquired by ReliaQuest. Threatcare is the leader in proactive attack simulations, helping companies measure the effectiveness of their cybersecurity programs through their software. Their real-time insights and actionable recommendations enable companies to secure more faster, while having greater confidence in their current security controls. ReliaQuest’s recent acquisition of Threatcare will enhance the power of the ReliaQuest GreyMatter platform by enabling enterprise customers to vastly increase the quality and efficacy of their detection and response capabilities. Breach and Attack Simulation, Penetration Testing, Incident Response, Vulnerability Scans, BAS Technology, Cybersecurity, and Information Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 0 1
Balbix Balbix

AI-powered Cyber Risk Management Balbix enables organizations to reduce cyber risk by identifying and mitigating their riskiest cybersecurity issues faster. The Balbix Security CloudTM platform ingests data from an organization’s security and IT tools to understand every aspect of cybersecurity posture and build a unified cyber risk model, then provides actionable insights for risk reduction. With Balbix, enterprises can automate inventory of their cloud and on-prem assets, conduct continuous risk-based vulnerability management and quantify cyber risk in dollars. Executives and operational teams can make cybersecurity decisions based on data not opinions. A rapidly growing set of Fortune 500 companies trust …

Type: Startup Activities: IT Services Technologies: Cybersecurity

11 1 6 151
1Kosmos 1Kosmos

Truly Know Who's Behind the Device - Confidently Phase Out Passwords 1Kosmos BlockID is a biometric-based identity verification and passwordless multi-factor authentication (MFA) platform with a privacy-by-design architecture centered around a private and permissioned distributed ledger. The platform generates a non-phishable multifactor authentication credential for employees, while giving customers a convenient passwordless option for strong authentication to prevent fraud. Because all personally identifiable information (PII) is public/private key encrypted and the user maintains sole possession and access to the private key with no third party intermediaries, PII is always stored and managed in compliance with data privacy mandates and is …

Type: Startup Activities: IT Services regtech Technologies: Blockchain/Cryptocurrency

9 1 8 99
Picus Security Picus Security

The Complete Security Validation Platform Picus Security is the pioneer of Breach and Attack Simulation (BAS) and the Security Validation company. The Picus Security Control Validation Platform is trusted by leading organizations worldwide to consistently validate the effectiveness of security controls against cyber-attacks and supply actionable mitigation insights to optimize them. Picus has offices globally and is supported by a network of channel and alliance partners. The company is dedicated to helping security professionals become more threat-centric and via its Purple Academy offers free online training to share the latest offensive and defensive cybersecurity strategies. Find more here: https://www.picussecurity.com/ Network …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 2 233
MCG MCG

[Automatic translation follows] Your Cyber-Security Trusted Partner Our collaboration allows you to defend yourself against various complex and structured cyberattacks to protect your assets, hosted internally or in the Cloud, and thus secure the sustainability of your activities. To secure your business (SME, organization, etc.), our team of cybersecurity experts acts with confidentiality and transparency. We implement solutions adapted to your needs, and preserve exchanges in an environment of trust which facilitates our long-term approach, and the creation of a real partnership for the sustainability of your activity.

Type: SMB Activities: IT Services Technologies: Cybersecurity

8 1 8 12
SecurityCurve SecurityCurve

Get Ahead of the Curve - Independent Consulting, Research, and Education for IT Security Success SecurityCurve helps companies succeed by providing strategic cybersecurity advisory services to large and small enterprises. And we provide competitive advantage to vendors that want to know what customers are really looking for in a product solution set. History The company was founded in April 2003 to formalize the business model our clients found most valuable: as-needed access to security experts who work as trusted advisors, understand the clients’ needs, the underlying application architecture and know how to bridge the gap between business and technology. There …

Type: SMB Activities: IT Services Technologies: Cybersecurity IoT

10 1 5 1
Secure Schools Secure Schools

Secure Schools offers schools and school groups software and services to support their cyber security. We only work with schools and everything we produce is school specific. We are Cyber Essentials accreditors Cyber Security, Schools, Multi-Academy Trusts, and Cyber Essentials

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 0 1 22
Women of Security Women of Security

Women of Security is a safe space for underrepresented individuals to network, form a community, learn, and have fun! WoSEC (Women of Security) was started by a lady from Ottawa (Canada) known as Tanya Janca because she saw the wonderful friendships that Cyber Ladies in Israel have, and she thought “I want that too, that’s a fantastic idea”. Activities differs in every chapter but the global goal is to create a safe and friendly environment for women in the cybersecurity community, with the goal of achieving greater diversity, representation, and equality in this vibrant field. Our vision: Make an Information …

Type: NGO, Think-tanks, Ed, & Culture Activities: edtech

0 0 0 4
Approach Cyber Approach Cyber

Delivering cyber serenity Approach Cyber is a pure-play cyber security and privacy company. At Approach, we believe that everyone deserves digital peace-of-mind. This is our vision, our aspiration for a society where each and every one is reassured, where there is confidence and security in the digital world. Therefore, our role is to bring cyber serenity to society. Every day, we take care of your cyber security while you focus on your business. We help you to prevent, withstand and recover from cyber security incidents and enable you to keep full attention on your core activities. We offer 360-degree solutions …

Type: SMB Activities: IT Services privacytech constructiontech regtech Technologies: Cybersecurity

4 3 3 86
Devicie Devicie

Devicie enables IT teams to deploy, control and maintain their entire device fleet securely, permanently and at scale. Devicie enables IT teams to deploy, control and maintain their entire device fleet securely, remotely and at scale. By automating historically monotonous, manual and disparate IT and security workflows, Devicie reduces the need for multiple point solutions, ultimately driving costs and time savings while enabling organisations to streamline and unify end-user device management. device management, digital transformation, cloud mdm, modern workplace, device security, and microsoft intune

Type: SMB Activities: IT Services Technologies: SaaS

2 0 2 26
EXPINFO EXPINFO

[Automatic translation follows] Expinfo, cybersecurity expert, aims to provide you with the best IT security. At Expinfo we are working to create a safer and more secure digital world. We believe in prevention to protect SMEs and mid-sized companies in our region. To this end, we provide quality cybersecurity services. We intervene on different levels of protection: proactive security with optimal and personalized protection, employee training, and crisis management in the event of a problem. For example, we offer: 24/7 emergency intervention (on site or remotely), search for evidence, vulnerability scans, intrusion tests (Pentest), GDPR - DPO compliance, false phishing …

Type: SMB Activities: legaltech Technologies: Cybersecurity

0 0 0 1
Cyber-way by Crédit Agricole Alpes Provence Cyber-way by Crédit Agricole Alpes Provence

[Automatic translation follows] Detect and act together for your digital security Digital transformation is today an essential growth lever for all companies, whatever their size or activity, but it is also a vector of new cyber threats. Crédit Agricole Alpes Provence, as a banking establishment, has invested in Cyber ​​Security for years and today has robust and proven means of protection as well as a network of experts in the field. With our subsidiary “CYBER-WAY By Crédit Agricole Alpes Provence”, our desire is now to share our know-how in Cyber ​​Security and thus, to help our customers in a different …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

5 3 4 3
UBIKA UBIKA

Protect your web applications and APIs anywhere, anytime Founded in 2001, with headquarters in Meudon, France and a research facility in Montpellier, UBIKA is a European cybersecurity vendor. Our mission is to help organizations secure their digital transformation by protecting their web applications and APIs against daily attacks. Our ubiquitous and cloud agnostic Web Application & API Protection (WAAP) technology can be deployed on-premises, in the Cloud, in SaaS mode or as a container, to secure both legacy and cloud native applications. More than 600 companies and public institutions in 35 counties entrust the security of their web applications and …

Type: SMB Activities: IT Services Technologies: Cybersecurity

6 2 6 73
MOBIQUANT TECHNOLOGIES | Mobile Security Management MOBIQUANT TECHNOLOGIES | Mobile Security Management

Cybersecurity Everywhere, on every embedded platform MOBIQUANT TECHNOLOGIES is the leader in enterprise-grade mobile security management, covering the concepts of (MSM) Mobile Security Management and (m-UTM) Mobile Unified Threat Management. Its innovative mobile management platform allows unprecedented feature-rich capabilities for IT teams daily operations. It includes NXSafeWave VPN, NXSafevoice, NXDefender Suite, NXOffice a BYOD container, NXTrustPKI and many others unique mobile IT patented technologies. Those solutions conver the management of any device based on Apple iOS iPhones, iPad , Google Android, RIM Blackberry, Samsung Tizen, Knox, Microsoft Windows Phone smartphones and TabletPC. Mobiquant Technologies was the first company in the …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 4
Aitivity Inc Aitivity Inc

A cybersecurity company, developing a more secure, faster and scalable blockchain solution for enterprises. A cybersecurity company, developing a more secure, faster and scalable blockchain solution for enterprises. blockchain, iot, hardware, and cybersecurity

Type: Startup Activities: IT Services Technologies: Cybersecurity Blockchain/Cryptocurrency IoT

2 2 0 1
SecurityScorecard SecurityScorecard

Secure your supply chain with risk intelligence, AI-powered analytics, and the world’s most trusted security ratings. Funded by world-class investors, including Evolution Equity Partners, Silver Lake Partners, Sequoia Capital, GV, Riverwood Capital, and others, SecurityScorecard is the global leader in cybersecurity ratings, response, and resilience, with more than 12 million companies continuously rated. Founded in 2013 by security and risk experts Dr. Aleksandr Yampolskiy and Sam Kassoumeh, SecurityScorecard's patented rating technology is used by over 25,000 organizations for enterprise risk management, third-party risk management, board reporting, due diligence, cyber insurance underwriting, and regulatory oversight. SecurityScorecard makes the world a safer …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 1 2 558
Altitude Networks Altitude Networks

Altitude Networks protects enterprise data in Office 365 and Google Workspace against accidental over sharing, malicious data theft, and modern cloud backdoors access.

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 3
CYBERSECURITY Luxembourg CYBERSECURITY Luxembourg

Official account of the Luxembourg Cybersecurity Ecosystem Official account of the Luxembourg #Cybersecurity Ecosystem

Type: Startup Activities: IT Services Technologies: Cybersecurity

13 3 10 N/A
Praetorian Secure Praetorian Secure

Cyber Security Consulting & Compliance Experts. Securing today, for a safer tomorrow! Praetorian Secure offers Cybersecurity Services and Regulatory Compliance Solutions. Trusted experts act as your advisor to reduce risk, meet requirements, and eliminate security vulnerabilities in an effective and efficient manner. Serving both the commercial and government sector, at Praetorian, we've got your six. Our team delivers the following professional services to its clients: - Compliance Support – PCI, NIST/FISMA, HIPAA, DoDI 8500, SOC II, NERC/CIP, FDA, ISO, NIST CSF and More. - Penetration Testing – Network, Web App, Cloud, and Social Engineering -Secure Development Operations – Includes Static …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 5
Kenna Security Kenna Security

Kenna is now Cisco Vulnerability Management Kenna is now Cisco Vulnerability Management. Learn more: https://www.cisco.com/site/us/en/products/security/vulnerability-management/index.html security, SaaS, vulnerability management, vulnerability intelligence, threat management, and information security

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 40
Nok Nok Nok Nok

The strongest, most scalable modern identity and customer authentication solutions. Nok Nok, Inc., based in San Jose, CA, was founded to replace legacy password-based authentication with next-level passwordless MFA for digital consumer companies. The company is backed by a team of security industry veterans from PGP, Netscape, PayPal & Phoenix, and has deep expertise in operationalizing Internet-scale customer passwordless authentication and transactions at the largest banks, telcos and fintech consumer brands around the globe. Nok Nok co-founded the FIDO global standards that have now been adopted by Apple, Google and Microsoft. The company’s passwordless software products transform authentication by enabling …

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity

11 1 6 38
Upfort Upfort

Upfort unifies award-winning security and robust cyber insurance to deliver comprehensive cyber risk solutions Upfort is a leading platform for cyber security and insurance that provides holistic protection from evolving cyber threats. Founded in 2017 to expand global access to cyber resilience, Upfort makes cyber risk easy to manage and simple to insure. Upfort delivers turnkey security proven to proactively mitigate risk and comprehensive cyber insurance from leading insurers. With proprietary data and intelligent automation, Upfort’s AI anticipates risk and streamlines mitigation for hassle-free underwriting. Insurers, brokers, and risk advisors partner with Upfort to offer clients resilience and peace of …

Type: Startup Activities: insurtech Technologies: Cybersecurity

1 0 0 35
Sucuri Security Sucuri Security

• Web Application Firewall • DDoS Protection / Intrusion Prevention • Malware Removal Status Updates: status.sucuri.net We've offered holistic website security solutions since 2008 including malware removal, malware monitoring and website protection services. Our SiteCheck website security monitor is used by thousands of website owners every month to monitor their websites for malware, blacklist status and other security issues and our CloudProxy Firewall safeguards sites and those who visit them from attacks of all kinds. Our passion is growing awareness of website security issues and stamping out web-based attacks. Join us at https://sucuri.net Website Security Scanning, Website Malware Removal, Website …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 0 54
TypingDNA TypingDNA

AI based Authentication and Fraud detection. Recognize people by the way they type. AI based Authentication and Fraud Detection. Biometric Typing Pattern, Predictive User Profile, Keystroke Dynamics, Biometric Authentication, Biometric Security, Fraud Detection, Behavioral Biometrics, Typing Biometrics, Account Takeover Prevention, Continuous Authentication, Zero trust, and Prevent device sharing

Type: Startup Activities: IT Services Technologies: Cybersecurity

11 1 4 144
Ockam Ockam

Trust for Data-in-Motion. Build apps that can Trust data-in-motion. Modern applications are distributed, interconnected, and have Zero-Trust in network boundaries. These applications must exchange data with Trust across complex, variable, and hostile networks. Ockam has a simple developer experience so that every engineer can build end-to-end encryption, key management, authorization policy enforcement, and mutual authentication into their applications. Identity, Trust, IoT, Internet of Things, Developer Tools, Security, Connected Devices, Internet Security, Open Source, Enterprise Security, Edge, Cryptography, Encryption, and Zero-Trust

Type: Startup Activities: IT Services Smart City Consulting transporttech Technologies: IoT

9 1 6 22
SecuredTouch (acquired by Ping Identity) SecuredTouch (acquired by Ping Identity)

Adaptive Fraud Detection Throughout the Customer Journey SecuredTouch provides real-time, adaptive fraud detection throughout the customer journey to detect fraud early, with proven ROI from day 1. Our solution ensures accurate risk-based prevention for multiple use cases including ATO, bots and no-transaction fraud. SecuredTouch customers benefit from reduced overall fraud losses while maintaining a smooth customer experience. Mobile, Data Science, Fraud prevention, Cyber Security, biometrics, account takeover, bot detection, new account fraud, payment fraud, no-transaction fraud, loyalty fraud, coupon abuse, returns abuse, and emulator detection

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity Data Analytics

0 0 0 7
CrowdStrike Falcon Surface (formerly Reposify) CrowdStrike Falcon Surface (formerly Reposify)

A Gartner Emerging Vendor for EASM, Reposify’s external attack surface management (EASM) platform pinpoints unknown, exposed internet-facing assets so security teams can best secure their digital perimeter. Our intelligent internet mapping technology takes all environments of an organizations’ digital footprint into account for full-spectrum perimeter security, with no agents or deployment required. Having indexed billions of digital assets since 2016, Reposify’s proprietary internet mapping technology leverages big data to identify historical trends critical to an organizations’ security posture. Whether assets are on premise, in the cloud or housed across supply chains and subsidiaries, nothing is left unknown. All exposed assets …

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics IoT

0 0 0 14
CYSEC CYSEC

PRODUCTS FOR SECURITY VULNERABILITIES IN DATA ELABORATION & SPACE COMMUNICATIONS CYSEC is a European cybersecurity company, counting more than 35 employees, with offices in France, Switzerland and Italy. We ​help companies to securely deploy their applications with highly sensitive data in industries such as critical infrastructure, edge applications, healthcare, defence and space. Indeed, CYSEC is pioneering end-to-end, European and off-the-shelf cybersecurity products for newspace missions. For more information, please visit www.cysec.com. Hardware Security Module (HSM), Trusted Execution Environment (TEE), Hybrid Cloud, Virtual Machine, Cybersecurity, Post-Quantum Cryptography, Confidential Computing, Newspace, and Satcom

Type: Startup Activities: IT Services Technologies: Cybersecurity

13 4 8 51
Sysdig Sysdig

Cloud security powered by runtime insights. In the cloud, every second counts. Attacks move at warp speed, and security teams must protect the business without slowing it down. Sysdig stops cloud attacks in real time, instantly detecting changes in risk with runtime insights and open source Falco. Sysdig correlates signals across cloud workloads, identities, and services to uncover hidden attack paths and prioritize real risk. From prevention to defense, Sysdig helps enterprises focus on what matters: innovation. Sysdig. Secure Every Second. Monitoring, Troubleshooting, Docker, DevOps, Kubernetes, Containers, Containers, Security, Cybersecurity, Compliance, Vulnerability Management, Image Scanning, Threat Prevention, cloud security, container …

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity

17 1 8 880
ZYMBIT ZYMBIT

Secure edge compute and IoT solutions for zero trust environments. Trusted by professionals for lifetime immunity. Zymbit builds secure edge compute and IoT solutions that operate in zero trust environments. Thousands of developers choose Zymbit products to protect critical data, software and credentials onboard Linux compute devices. Leading enterprise customers trust Zymbit technology to protect IoT devices and edge infrastructure. Zymbit primary products are Secure Compute Modules, Secure Edge Nodes and Hardware Security Modules. All products feature the tamper-resistant Verified Hardware Agent that supports encrypted file system, secure boot, cryptographic engine, key manager, root of trust and more. Zymbit’s Lifetime-Immunity …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency IoT

11 1 10 12
Tokensoft Tokensoft

A fair launch platform for web3 projects and communities TokenSoft is the leading technology and security platform for companies seeking to issue assets on the blockchain, at scale, and within compliance. From startups and funds to enterprises and investment banks, TokenSoft's platform offers a bespoke suite of technology and consulting services to meet the needs of the entire lifecycle of a digital security, including onboarding, distribution, custody, and ongoing administration. TokenSoft supports the highest standards for regulation and compliance, regardless of jurisdiction. The firm’s clients have raised nearly $1bn in assets. token sale, digital assets, token issuance, compliance, blockchain, and …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

0 0 0 25
Kasada Kasada

Transcending bot management by countering the human minds behind automated threats. Kasada has developed a radical approach to defeating automated security threats based on its unmatched understanding of the human minds behind them. The Kasada platform overcomes the shortcomings of traditional bot management to provide immediate and enduring protection for web, mobile, and API channels. Its invisible, dynamic defenses provide a seamless user experience and eliminate the need for ineffective, annoying CAPTCHAs. Our team handles the bots so our customers have freedom to focus on growing their businesses, not defending it. Web Security, Automated Attack Mitigation, Bot Mitigation, Application Security, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 1 113
Synack, Inc. Synack, Inc.

The Premier Security Testing Platform. Synack is the premier security testing platform harnessing a vetted community of the world’s most talented security researchers to deliver continuous penetration testing and vulnerability management. We help our customers build and augment their security testing capabilities and capacity to deliver transformational results better than traditional pentesting methods. We are committed to reducing cybersecurity risk for our customers by bridging the cybersecurity talent gap and giving organizations on-demand access to the most trusted network of researchers in a secure way, all on one platform. Security Testing, Cybersecurity, Penetration Testing, and Vulnerability Management

Type: Startup Activities: IT Services Technologies: Cybersecurity

18 7 5 266
ERPScan ERPScan

ERPScan is the most respected and credible Business Application Security provider. Founded in 2010, the company operates globally and enables large Oil and Gas, Financial and Retail organizations to secure their mission-critical processes. Named as an ‘Emerging Vendor’ in Security by CRN, listed among “TOP 100 SAP Solution providers” and distinguished by 30+ other awards, ERPScan is the leading SAP SE partner in discovering and resolving security vulnerabilities. ERPScan consultants work with SAP SE in Walldorf to assist in improving the security of their latest solutions. ERPScan’s primary mission is to bridge the gap between technical and business security, and …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 1
SentinelOne SentinelOne

Secure your enterprise with the autonomous cybersecurity platform. Endpoint. Cloud. Identity. XDR. Now. SentinelOne is a leading provider of autonomous security solutions for endpoint, cloud, and identity environments. Founded in 2013 by a team of cybersecurity and defense experts, SentinelOne revolutionized endpoint protection with a new, AI-powered approach. Our platform unifies prevention, detection, response, remediation, and forensics in a single, easy-to-use solution. Our endpoint security product is designed to protect your organization's endpoints from known and unknown threats, including malware, ransomware, and APTs. It uses artificial intelligence to continuously learn and adapt to new threats, providing real-time protection and automated …

Type: Large company Activities: IT Services Technologies: Cybersecurity A.I.

34 11 23 2,357
Prolateral Consulting Ltd Prolateral Consulting Ltd

Internet & Messaging Service Provider to End-Users and White label Partner/Resellers. Prolateral Consulting Ltd was founded in 2003 with its head office based in Luton, UK. Prolateral specialises in Email Messaging Solutions and Internet Security. With data centres in the UK, Europe, USA & Australia we have a global presence to service direct customers and channel partners/resellers. What we do. ‾‾‾‾‾‾‾‾‾‾‾ ✔ outMail – outbound SMTP SmartHost service ✔ proFilter – inbound hosted SMTP SPAM filtering solution ✔ backupMX – secondary mail server for those days the primary mail goes offline ✔ fakeMX – additional SPAM combatting tools ✔ masterDNS …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 6
OwnBackup OwnBackup

No company operating in the cloud should ever lose data. OwnBackup believes that no company operating in the cloud should ever lose data. With comprehensive backup, visual compare, and fast recovery capabilities, we have helped hundreds of organizations through data loss and corruption crises. Our solution also provides enterprises with the performance and reporting required to meet compliance regulations in a number of industries. We provide secure, automated, daily backups of SaaS and PaaS data, including Salesforce. The company was co-founded by technology veterans with deep experience in data-recovery, data-protection and information-security. OwnBackup’s solutions provide built-in protection against data loss …

Type: Large company Activities: privacytech IT Services

5 1 5 2,177
SAFECode.org SAFECode.org

The place where leading technology providers come together to work on today’s most pressing software security challenges The Software Assurance Forum for Excellence in Code (SAFECode) is a non-profit organization exclusively dedicated to increasing trust in information and communications technology products and services through the advancement of effective software assurance methods. SAFECode is a global, industry-led effort to identify and promote best practices for developing and delivering more secure and reliable software, hardware and services. Security, Software Security, Hardware Security, Technology, Software Assurance, Best Practices, and Industry Collaboration

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 4
Cybereason Cybereason

Hunt, Detect, Protect. An end-to-end cybersecurity solution built to empower defenders. Cybereason is the champion for today’s cyber defenders providing future-ready attack protection that unifies security from the endpoint, to the enterprise, to everywhere the battle moves. The Cybereason Defense Platform combines the industry’s top-rated detection and response (EDR and XDR), next-gen anti-virus (NGAV), and proactive threat hunting to deliver context-rich analysis of every element of a MalOp (malicious operation). The result: defenders can end cyber attacks from endpoints to everywhere. Cybereason is a privately held, international company headquartered in Boston with customers in more than 40 countries. Security, Cybersecurity, …

Type: Large company Activities: IT Services Technologies: Cybersecurity A.I. A.I. - Machine Learning Data Analytics

2 0 1 793
Discernible Inc Discernible Inc

Distinct. Specialized. Discernible is a highly specialized, multidisciplinary team led by social scientists and corporate anthropologists supporting security and privacy organizations. We’re experts in communication strategies that build productive relationships, improve operations, and earn influence with stakeholders. Our programs are tailored to the specific needs of your team based on contemporary communication research, scholarship, and real-world experience working inside security and privacy teams. Security Communications, Privacy Communications, Influence & Reputation, Leadership Development, Organizational Coach, Negotiation Training, De-escalation Training, and Incident Preparedness & Response

Type: SMB Activities: Consulting Technologies: Cybersecurity

2 0 2 5
AVA6 Lyon (ex Actilan) AVA6 Lyon (ex Actilan)

[Automatic translation follows] Your local IT service since 1998 Your local IT service since 1998

Type: SMB Activities: IT Services

5 0 5 7
Adeo-informatique Adeo-informatique

[Automatic translation follows] Adeo, your IT partner & telephony. Based in the Pyrénées-Orientales in Perpignan (Tecnosud 2), we meet all the IT needs of businesses, communities and liberal professions. Created in 2007, the company focuses on the professional market. Every year, our employees participate in an ongoing training plan in order to always stay up to date with technological developments. Our team is now made up of 23 people, which makes Adeo-informatique the leading IT service and engineering company (SSII) in the department.

Type: SMB Activities: IT Services

3 1 2 21
PiaLab PiaLab

[Automatic translation follows] Practical and pragmatic GDPR compliance PiaLab, Practical and pragmatic GDPR compliance: ✔️External Dpo ✔️Compliance and advice ✔️Training and awareness Data protection, Definition of an action plan, GDPR, Training, Risk identification, GDPR, DPO, Processing register, Cybersecurity, and SSI

Type: SMB Activities: privacytech IT Services Technologies: Cybersecurity

9 0 0 4
CounterTack CounterTack

"GoSecure - POWERED BY COUNTERTACK"​ is the leading provider of Predictive Endpoint Security for the enterprises. CounterTack delivers the one true Endpoint Threat Platform, (ETP) to enterprise customers globally. CounterTack provides a unique combination of threat context, organizational resiliency and broad visibility, to mitigate endpoint risk and reduce the impact of advanced attacks. Combining a robust suite of endpoint detection and analysis capabilities by leveraging a single endpoint sensor and an open, scalable multi-tenant infrastructure, CounterTack helps IR and security teams neutralize and prevent advanced threats from damaging the business. CounterTack delivers its next-generation technology to over 250 customers globally. …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 13
Sepio Sepio

Sepio's Asset Risk Management sees, assesses and mitigates risk for all known and shadow IT assets. Sepio is the leading asset risk management platform that operates on asset existence rather than activity. Using physical layer asset DNA profiling, our solution provides customers with actionable visibility, policy enforcement and mitigation capabilities. These allow our customers to gain better control of all assets at scale. With trafficless monitoring, our solution is asset agnostic - whether your infrastructure is connected to IT/OT/IOT. Within 24 hours, Sepio's solution will report what assets you actually have with their respective asset risk factor and help you …

Type: Startup Activities: IT Services transporttech Technologies: Cybersecurity IoT

4 1 3 67
Illusive Illusive

Illusive was acquired by Proofpoint. View the announcement: https://www.proofpoint.com/us/blog/corporate-news/proofpoint-closes-acquisition-illusive-1. To see what’s new, visit https://www.linkedin.com/company/proofpoint/. lllusive continuously discovers and automatically remediates privileged identity risks that are exploited in all ransomware and other cyberattacks. Despite best-practice investments to protect identities, including deployment of PAM and MFA, 1 in 6 enterprise endpoints holds exploitable identity risks. Illusive makes it easy for security teams to get visibility into the vulnerable identities sprawled across an organi Illusive reduces cyber risk by shrinking the attack surface and stopping attacker movement. Illusive creates a hostile environment for attackers, depriving them of the means to progress towards …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 54
JASK (now Sumo Logic) JASK (now Sumo Logic)

The Modern SOC Company JASK is modernizing security operations by delivering an advanced SIEM platform that provides better visibility, better automation and a better architecture. Built on cloud-native technologies, the JASK ASOC platform streamlines security analyst workflows by automating many of the repetitive tasks that restrict productivity, freeing them for higher-value roles like threat hunting and vulnerability management, while addressing the escalating talent shortage. Cyber Security, Security Analytics, Artificial Intelligence, Security Operations, SIEM, and Cloud

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I.

2 1 0 12
Whistic Whistic

Whistic is the best way to assess, publish, and share your vendor security information. Whistic is a leading provider of proactive vendor security and an innovator in changing the way that companies publish and evaluate security posture to build trust. Whistic is the single source of trust for both buyers and sellers, helping companies speed up the pace of business. The Whistic Trust Catalog® now contains nearly 15,000 company profiles that can be assessed on-demand, and notable customers include Airbnb, Okta, Betterment, Vonage, Qualtrics, and other world-leading brands within healthcare, manufacturing, energy, and education. Risk Assessments, IT Security, SaaS, Vendor …

Type: Startup Activities: IT Services Technologies: Cybersecurity SaaS

6 0 4 79
Morphisec Morphisec

Prevention-First Security: Stop ransomware and other attacks, from endpoint to the cloud, that NGAV, EDR and EPP can't. Morphisec's prevention-first security stops the cyberattacks others don’t, from endpoint to the cloud. Morphisec's software is powered by Automated Moving Target Defense (AMTD) technology, the next evolution of cybersecurity. AMTD stops ransomware, supply chain attacks, zero-days, and other advanced attacks. Gartner® research shows that AMTD is the future of cyber. AMTD augments NGAV, EPP and EDR/XDR to secure their runtime memory security gap with minimal false positives, no performance impact and no extra staff needed. Over 5,000 organizations trust Morphisec to protect …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 117
Uniken Inc. Uniken Inc.

Creating a secure world where identity is a certainty, not a vulnerability. At Uniken, we accelerate possibilities for client-centric organizations by creating certainty in identity and security while delivering amazing customer experiences. We believe identity shouldn’t be a question of trust, but a statement of certainty. With our award-winning REL-ID security platform, we raise identity from trust to certainty while enhancing customer experience. REL-ID enables organizations to drive fraud to zero by securing the customer journey end-to-end — from devices, applications, and network connections to customer authentication, transaction verification, and digital signing. Fast and frictionless, REL-ID removes the security burden …

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 0 5 164
QSearch (MIND MODELING INC.) QSearch (MIND MODELING INC.)

Reading the Global Mind BigData Analytics for Social Media. We make Socia Media Useful to the world by creating deeper understanding of user behaviors, insight into social nework behavior, and analytic to engage and motivate people. Current Enterprise Offering: Powerlist, Google Adwords for Facebook Ads (16 times more effective than native Facebook ads. We find potential customers with high interest in your produt/service category already. This results in higher conversion rate and at least 25% more clicks for branding.) BigData Analytics, Social Network Analysis, and Social Media Marketing

Type: Startup Activities: IT Services martech Technologies: Data Analytics

0 0 0 30
IDKA AB IDKA AB

Idka enables simple, private communication and collaboration across modern teams and organizations. Idka means productivity and simplicity. Idka is a clean, uncluttered, noise free and easy-to-implement, yet very functional collaboration tool. On Idka you can communicate, share and work undisturbed with colleagues and friends. There is no advertising, no trolling, no fake news, and you own your data. Period. Idka provides functionality that is otherwise spread across several services, all integrated in a super simple and effective user experience. Set up a free account today for effective, secure, simple and ad-free communication and collaboration.­­ Your privacy is our business. For …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 2 2
Versasec Versasec

Managing Digital Identities Versasec is the leading provider of state-of-the-art highly secure identity and access management solutions. With its flagship product, vSEC:CMS, Versasec eases the deployment of physical and virtual smart cards for enterprises of any size. Versasec's solutions enable its customers to securely authenticate, issue and manage user credentials more cost effectively than other solutions on the market. Versasec maintains its mission of providing solutions that are affordable and easy to integrate, coupled with first-class support, maintenance, and training. Versasec customers include HSBC, Tieto, Raiffeisenbank, Hornbach, Daimler, Australia's Department of Defence, European Commission, Qualcomm, eBay, Saudi Aramco, IMF, L'Oreal …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 23
Cybersprint Cybersprint

Cybersprint offers automated discovery of the assets in your attack surface, and detect and monitor the risks within. Cybersprint maps the attack surface of organisations and brands, offering full visibility using continuous and automated digital asset discovery. Cybersprint’s zero-scope AI-driven approach to Attack Surface Management provides an outside-in perspective, eliminating blind spots and detecting and preventing threats including data leaks, brand abuse, supply chain risk, phishing. Darktrace completed the acquisition of Cybersprint in March 2022. Darktrace (DARK:L), a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I.

0 0 0 2
Axonius Axonius

Control complexity with Axonius. Get an always up-to-date asset inventory, uncover security gaps, and automate action. Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy. With solutions for both cyber asset attack surface management (CAASM) and SaaS management, Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically validate and enforce policies. Cited as one of the fastest-growing cybersecurity startups, with accolades from CNBC, Forbes, and Fortune, Axonius covers millions of assets, including devices and cloud assets, …

Type: Startup Activities: IT Services Technologies: Cybersecurity SaaS

4 1 2 582
Probely Probely

Web Vulnerability Scanner designed to empower Security and DevOps teams working together to reduce the security risk Probely is the premier cloud-based application security testing solution designed to empower Security and DevOps teams working efficiently together on a DevSecOps approach built to reduce risk across web applications and RESTful APIs. Probely empowers Security and DevOps or Development teams to work together to secure their web applications and APIs. Our goal is to narrow the gap between development, security, and operations by making security an intrinsic characteristic of web applications development life-cycle. With over 30,000 vulnerabilities detection capabilities, including SQLi, XSS, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 4 39
McAfee McAfee

We’re creating what’s next in online protection. As technologists, creatives, and people who thrive on looking forward, we make life online safe, so everyone can enjoy it with confidence—in all the ever-shifting forms it will take. Just as life online is full of possibility, life at McAfee is as well. You’ll have the freedom to explore challenges, take smart risks, and reach your potential in one of the fastest-growing industries in the world—backed by a team that supports and inspires you. ​

Type: Large company

8 0 7 5,633
TripleBlind TripleBlind

Privacy-Enhancing Computation Solution | Combining Data & Algorithms While Preserving Privacy & Ensuring Compliance TripleBlind has created the most complete and scalable solution for privacy enhancing computation. The TripleBlind solution is software-only and delivered via a simple API. It solves for a broad range of use cases, with current focus on healthcare and financial services. The company is backed by Accenture, General Catalyst and The Mayo Clinic. TripleBlind’s innovations build on well understood principles, such as federated learning and multi-party compute. Our innovations radically improve the practical use of privacy preserving technologies, by adding true scalability and faster processing, with …

Type: SMB Activities: IT Services privacytech Technologies: A.I. A.I. - Deep Learning Data Analytics

5 1 5 48
Security Innovation Security Innovation

Create Secure Software Security Innovation is a pioneer in software security and literally wrote the book on How to Break Software Security. Since 2002, organizations have relied on our assessment and training solutions to secure software wherever it runs. Our training solutions combine interactive modules, scenario-based labs, and hands-on cyber ranges to build skills that stick. Visit securityinnovation.com to learn how we can help you launch a best-in-class security program. Global technology vendors and enterprise IT organizations such as Microsoft, IBM, FedEx, ING, Symantec, Coca-Cola and GE rely on our expertise to understand the security risks in their software systems …

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 0 0 223
QuoIntelligence QuoIntelligence

Our Finished Intelligence, tailor-made for your organization QuoIntelligence informs decision-makers of current and potential cyber and geopolitical threats by providing customized Finished Intelligence reports. Our team of experts provides full contextual analyses to produce top-quality Intelligence and to better enable organizations to mitigate risk. By prioritizing customer requirements, we ensure our products close real security gaps, support risk management, and facilitate early detection. Threat Intelligence , Digital Risk , Cybersecurity , Supply Chain Security , Network Security , Brand Abuse Monitoring , TIBER-EU, TIBER-DE, Security Risk Intelligence , Brand Protection, Data Leakage , Cyber Monitoring, Digital Risk Monitoring, Infrastructure Exposure, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 49
Cianaa Technologies Cianaa Technologies

Simplify Compliance for Companies CIANAA a vision to assist organizations to achieve cybersecurity. CIANAA is a security acronym of Six Letters C. I. A. N. A. A. building the foundation on Confidentiality, Integrity, Availability, Nonrepudiation, Authentication and Auditing. CIANAA provides assurance via professional security auditing and attestation services. The company simplifies the compliance process and provides an assessment to help organizations to attain cybersecurity objectives and goals. Today, CIANAA offers various services including PCI DSS compliance, ISO 27001 Audit and certification, HIPAA attestation, Security governance reviews, Penetration testing, GDPR and Privacy compliance. Apart from this, CIANAA is a Silver partner …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 9
Crypho (part of Techstep) Crypho (part of Techstep)

Crypho is group chat and file sharing with end-to-end encryption. What sets it apart from similar systems is the uncompromising focus on security. All messages and files are encrypted before they are transferred over the network. They can only be decrypted when they reach their intended recipient. Since only the users themselves hold the encryption keys, no-one else can access the data, not even Crypho's staff. To offer the highest possible security, Crypho uses a combination of proven encryption schemes and key management techniques, all hidden from the end-user. This allows for an application that is user-friendly while still maintaining …

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 1 6 1
Radically Open Security Radically Open Security

The world's first non-profit computer security consultancy company. We believe in transparency and openness. Radically Open Security is the world's first not-for-profit computer security consultancy company! This is an initiative designed to run an ethical computer security consultancy company as a durable front-end for a back-end charitable Foundation (that financially supports Open Source projects, innovative security research, and Digital Rights organizations). 90% of our non-reinvested profits will go to the NLnet Foundation! :-) Radically Open Security was recognized by the Dutch Chamber of Commerce (KvK) as one of the Top 100 Most Innovative SMEs of 2016! For more information, see: …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 2 0 15
itm8 | Improsec A/S itm8 | Improsec A/S

Improving security and working for a SAFER and BETTER future Improsec is a fully independent Cyber Security advisory company - we provide knowledge, experience and both strategic and deep technical expertise to our clients. Many of our projects test and analyse our client's defensive capabilities, such as their cyber security maturity or ability to withstand, detect and respond to a cyber security incident. The most important part of our business is not just to test, analyse and deliver reports with findings and remarks. We stand shoulder to shoulder with our clients and take responsibility for actually improving their security - …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 49
HackerOne HackerOne

Peace of mind from security's greatest minds. Together We Hit Harder ® HackerOne is the global leader in human-powered security. We leverage human ingenuity to pinpoint the most critical security flaws across your attack surface to outmatch cybercriminals. HackerOne’s Attack Resistance Platform combines the most creative human intelligence with the latest artificial intelligence to reduce threat exposure at all stages of the software development lifecycle. From meeting compliance requirements with pentesting to finding novel and elusive vulnerabilities through bug bounty, HackerOne’s elite community of ethical hackers helps organizations transform their businesses with confidence. HackerOne has helped find and fix more …

Type: Large company

3 0 3 4,514
Scalys Scalys

Security at the Edge. Improve security in information technology (IT) and operational technology (OT) environments. Scalys is a leading innovative company to improve security in information technology (IT) and operational technology (OT) environments. Core competences are Cybersecurity, end-to-end security, high-performance communication and secure networking. Scalys delivers enterprise class performance and quality for products like a broadband router, edge gateway, firewall, VPN and other networking communication solutions. Embedded Systems, IoT, Cybersecurity, Secure Networking, End to End Security, High Performance Communication, AI/ML, Confidential Computing, Edge Computing, Azure, IoT Edge, Open Enclave, Building Management Solutions, Security at the Edge, Zero Trust, Enclaves, and …

Type: Startup Activities: IT Services deeptech Technologies: Cybersecurity Embedded Systems A.I. A.I. - Machine Learning IoT

4 0 4 7
tpx Security tpx Security

[Automatic translation follows] Hacking, Cybersecurity and Intelligence. TPX MX SA DE CV. (Mexico) tpx Security LLC. (USES) More than a company, we are a great team of passionate experts in the design, development and implementation of IT Solutions, cybersecurity infrastructure, through new technologies, focusing on all those companies that ultimately use them as a productivity, commerce or means of communication tool. interaction. We offer all our clients a complete service in the chain of IT and cyber security solutions, establishing innovative solutions tailored to the specific needs of our clients. [+] https://tpx.mx Courses, Workshops, Software Development, Computer Security, Conferences, Consulting, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 17
Excellium Services Excellium Services

Your first call when it comes to cybersecurity & privacy Excellium Services is a cybersecurity services company established in Luxembourg since 2012 and more recently in Belgium, with activities and partnerships in Europe and Africa. We currently employ about 150 cybersecurity ninjas, willing to assist organizations to deal with evolving cybersecurity threats and challenges. Excellium’s main activities consist in : Cybersecurity Solutions, Security Operations Center Services 24x7, Incident Response and Security Infrastructure operations, training and formations. Excellium is a caring workplace where the culture is about diversity, inclusion and collaboration. We are continuously looking for passionate and talented people (who …

Type: Startup Activities: IT Services Technologies: Cybersecurity

15 5 8 186
Caribbean Solutions Lab Caribbean Solutions Lab

Global Intelligence - Regional Perspective Caribbean Solutions Lab (Cayman Islands), award-winning, purveyors of cybersecurity, training, professional and managed services to the English and Dutch Caribbean since 2007. McAfee, FireEye, Education, Training, System Security, Network Security, Data Security, Content Security, Mobile Security, Professional Services, Cybersecurity, EDR, NDR, XDR, Vulnerability Managment, Tenable, Meraki, Managed Services, SIEM, Audit, Cylance, MFA, Threat Intelligence, Compromise Assessment, BCDR, Vectra, and MSSP

Type: Startup Activities: edtech IT Services Technologies: Cybersecurity

31 6 11 4
Secret Double Octopus Secret Double Octopus

The Complete Passwordless Solution - 360° Phishing Resistance for Enterprise Employees Secret Double Octopus provides the only passwordless MFA solution for all enterprise authentication needs. From workstations & SSOs to on-premises infrastructure & legacy applications – with zero employee-managed passwords and a highly secure yet user-friendly interface.

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 1 38