Search 1
Entities
LogoName Σ Employees
Ingecom Ingecom

[Automatic translation follows] Are you sure you want to do business? Well, start by making your business secure. Ingecom is a Value Added Distributor (VAD) specialized in cybersecurity solutions, OT/ICS cybersecurity, IToT and IoT cyber intelligence and cyber intelligence solutions, founded in 1996 in Bilbao. We provide tested and approved solutions to security and networking integrators. We are constantly in contact with new technologies that appear on the market, so that any technological evolution can be applied to our clients as soon as possible. With headquarters in Bilbao, Ingecom has offices in Madrid, Lisbon (Portugal) and Milan (Italy), as well …

Type: SMB Activities: IT Services Technologies: Cybersecurity IoT

3 0 2 107
Guardicore Guardicore

Guardicore is the segmentation company disrupting the legacy firewall market. Our software-only approach is decoupled from the physical network, providing a faster alternative to firewalls. Built for the agile enterprise, we offer greater security and visibility in the cloud, data-center and endpoint. Cloud Security, Data Center Security, Legacy Firewall Alternative, Hybrid Cloud Security, Micro-Segmentation, Software-Defined Segmentation, Network Security, and Network Segmentation

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 2 5 109
TrustedSec TrustedSec

End-to-end cybersecurity consulting team leading the industry, supporting organizations, and giving back. We are TrustedSec, a security consulting team that combines high-level talent and advanced tools to help our partners achieve their security objectives. Organized by practice areas and specialty teams, we empower organizations to mature their security programs effectively with impactful recommendations. IT Security Consulting, Information Security, Application Security, Network Security, Security Consulting Services, Corporate Security, Attack and Penetration Testing, Governance, Risk, PCI, IT General Controls, HIPAA, GLBA, Vendor Risk Management, Penetration Testing, Red Team, and Business Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 1 110
Core Security Core Security

Leading-edge cyber threat prevention and identity governance solutions to help prevent, detect, test, and monitor risk. Core Security is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra's Core Security delivers market-leading, threat-aware, vulnerability, identity and access management solutions that provide the actionable intelligence and context needed to manage security risks across the enterprise. penetration testing, security intelligence, software solutions, vulnerability research, threat expertise, threat modeling, identity governance, privileged access management, and identity and access management

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 0 0 111
Telesoft Telesoft

Providing up-to-date Cyber Threat Intelligence, Security News, Trends, Insights, Analysis & Cyber Security News. Telesoft Technologies is a trusted global provider of government infrastructure, cyber security and telecom products and services. Headquartered in the UK, we are an engineering-led company that continuously strives to produce cutting-edge technologies, providing world-leading network monitoring solutions for network visibility and threat detection at carrier scale. Recently, we have expanded our capabilities to tailor our solutions to enterprise grade customers, offering a 24/7 Managed Detection and Response (MDR) service to help meet the needs of businesses with limited cyber security resources. Gain access to our …

Type: SMB Activities: IT Services Technologies: Cybersecurity

19 0 18 111
Kasada Kasada

Transcending bot management by countering the human minds behind automated threats. Kasada has developed a radical approach to defeating automated security threats based on its unmatched understanding of the human minds behind them. The Kasada platform overcomes the shortcomings of traditional bot management to provide immediate and enduring protection for web, mobile, and API channels. Its invisible, dynamic defenses provide a seamless user experience and eliminate the need for ineffective, annoying CAPTCHAs. Our team handles the bots so our customers have freedom to focus on growing their businesses, not defending it. Web Security, Automated Attack Mitigation, Bot Mitigation, Application Security, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 1 112
SECUDE SECUDE

Protect design drawings (CAD) and SAP data exports always and everywhere |Automate data security with HaloCAD & HaloCORE Do you exchange confidential data and are looking for a secure system that makes it impossible for external parties to misuse your intellectual property? Do you want to automate your data security and technically enforce your security standards? ​​We have the solution: HaloCAD and HaloCORE are unique security solutions that allow you to protect CAD files and SAP data outside of PLM systems and beyond corporate boundaries. Furthermore, you can easily use Microsoft Purview Information Protection in CAD applications. Based on data …

Type: SMB Activities: privacytech IT Services Technologies: Cybersecurity

2 0 2 113
Tessian Tessian

Cloud Email Security that intelligently prevents advanced email threats and protects against data loss Tessian was acquired by Proofpoint. View the press release: https://www.proofpoint.com/us/newsroom/press-releases/proofpoint-closes-acquisition-tessian. To see what’s new, visit https://www.linkedin.com/company/proofpoint/. Tessian is a leading cloud email security platform that intelligently protects organizations against advanced threats and data loss on email, while coaching people about security threats in-the-moment. Using machine learning and behavioral data science, Tessian automatically stops threats that evade legacy Secure Email Gateways, including advanced phishing attacks, business email compromise, accidental data loss and insider threats. Tessian’s intelligent approach not only strengthens email security but also builds smarter security …

Type: SMB Startup Activities: IT Services Technologies: A.I. - Machine Learning Cybersecurity A.I. Data Analytics

2 0 2 115
Wallarm. API & App Security Integrated Wallarm. API & App Security Integrated

End-to-end API security. Securing REST, GraphQL, gRPC, WebSockets, and web apps at scale. Protect any API. In any environment. Against any threat. Built by security practitioners for practitioners, Wallarm products provide robust protection for APIs, apps, and serverless workloads running in cloud-native environments. Hundreds of Security and DevOps teams chose Wallarm to get unique visibility into malicious traffic, robust protection across the whole application portfolio, and automated incident response for appsec programs. The company is committed to supporting modern tech stacks, offering dozens of deployment options in cloud and Kubernetes-based environments, and also provides a full cloud solution. Founded in …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 4 115
Cyberhaven Cyberhaven

Trace your data to protect it like never before Your important data is always in motion, spreading to new people, applications, and devices that are outside traditional security controls. We protect data anywhere it goes in the extended enterprise. You can't protect what you can't see. We classify data by analyzing billions of events, not just patterns in the content, assembling a data lineage to identify and protect what other tools can’t. DLP, data protection, insider threat, data tracing, and data lineage

Type: Startup Activities: privacytech IT Services Technologies: Data Analytics Cybersecurity

2 0 2 115
RiskRecon, A Mastercard Company RiskRecon, A Mastercard Company

Enabling you to easily achieve better risk outcomes for your enterprise and your supply chain. RiskRecon by Mastercard enables you to easily achieve better risk outcomes for your enterprise and your supply chain. RiskRecon’s cybersecurity ratings and assessments make it easy for you to understand and act on your risks, delivering accurate, risk prioritized action plans custom tuned to match your risk priorities. As a leading provider of cybersecurity ratings, RiskRecon continuously monitors the cybersecurity risk of over 19 million companies across even the most highly regulated industries from finance and insurance to aerospace and healthcare. RiskRecon provides deep, risk-contextualized, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 2 115
Hexnode Hexnode

One-stop solution to make all devices managed and secured Hexnode UEM is an industry-leading endpoint management solution that offers a rich set of features aimed at securing, managing, and remotely monitoring devices within the enterprise. Evolving to accommodate the latest technologies and industry trends, Hexnode serves businesses of all sizes, from start-ups to Fortune 100 companies, with the best business mobility experience. Its reputation is concreted with success stories from satisfied customers across the globe, spanning almost a decade. Hexnode hosts its annual events such as partner summits and user conferences building a global community of IT professionals, enthusiasts and …

Type: Startup Activities: IT Services Technologies: SaaS

1 0 1 115
Xage Security Xage Security

Global leader in zero trust access and protection Xage is a global leader in zero trust access and protection on a mission to pioneer a secure tomorrow. Control access and prevent attacks in the cloud, in the data center, at the remote operational edge anywhere on Earth, and even in orbit with the Xage Fabric Platform. Xage is easy to manage and can be deployed in a day, giving users easy and secure access to the assets they need from anywhere, while preventing advanced adversaries and insider threats at every stage of the attack chain. Learn why organizations like the …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

6 0 4 115
VMRay VMRay

Turn complexity into clarity with the most advanced malware & phishing analysis solution At VMRay, our purpose is to liberate the world from undetectable digital threats. Led by reputable cyber security pioneers, we develop best-in-class technologies to help organizations distinguish genuine threats from the noise and obtain additional context and insights into those threats. Based on the world's most advanced malware and phishing analysis platform, we enable enterprises, government organizations, and MSSPs to automate security operations, accelerate analysis and response, and build reliable threat intelligence. In times of uncertainty and complexity, we create room for clarity and productivity to help …

Type: Startup Activities: IT Services Technologies: Cybersecurity

5 0 2 118
Cyberfort Cyberfort

Combining technology, people, and expertise to create a cybersecurity capability that is second to none. Cyberfort exists to provide our clients with the peace-of-mind about the security of their data and the compliance of their business, which is much needed in our increasingly data hungry world. Since we were established in 2017, we have brought together technology, people, expertise, facilities and leaders in cybersecurity to create a capability that is second to none. Our vision is to create a safer world for us all to live, by creating safer organisations. To do this we want to be recognised and trusted …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity IoT Robotics

0 0 0 118
Penten Penten

Penten offers world-leading Secure Mobility, Applied AI and Tactical Communications Security solutions. Penten is an Australian-owned, cyber technology business, delivering new future cyber technologies to enable defence and government. Our work is important and essential, not only for the people we’re building it for, but for the people whose safety and security it protects. We are proud to be recognised as a world leader and innovator of cyber security products and services in Australia and are leaders in secure mobility, cyber deception and cyber engineering services. Winner – 2018 Telstra Business of the Year (National and ACT awards winner) Winner …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I.

1 0 1 118
GATEWATCHER GATEWATCHER

Highlight cyber threats before they darken your business European leader in intrusion detection and advanced threat detection, Gatewatcher has been protecting the critical networks of large companies as well as public institutions since 2015. Its model combines multiple technologies with A.I. to provide consistent, optimal protection and meet the current and future cybersecurity challenges of organizations. cybersecurity, sécurité informatique, cyberdéfense, cyberdefense, cyberattacks, IT, advanced persistent threats, networks security, exploits, malware, intrusion detection system, threat protection, IDS, APT, Trackwatch technology, NDR, CTI, Threat hunting, and Threat forensics

Tags: FrenchTech2030 Type: Startup Activities: IT Services Technologies: Cybersecurity

48 12 38 119
ESCRYPT ESCRYPT

ESCRYPT — ETAS security solutions ESCRYPT - Trusted Security Solutions For more than 15 years, ESCRYPT has stood for technologically pioneering, holistic cybersecurity solutions in the automotive sector. Today, millions of ESCRYPT automotive security solutions are safeguarding vehicle systems around the world – and setting standards for the cybersecurity of software-defined vehicles, intelligent traffic systems, and connected vehicle fleets. In addition, the ESCRYPT brand brings together dedicated security services for corporate IT and Bosch Group products, as well as qualified incident response services. ESCRYPT is a brand of ETAS GmbH, a member of the Bosch Group. ESCRYPT automotive security solutions …

Type: SMB Activities: IT Services Technologies: Cybersecurity Embedded Systems IoT

8 1 5 119
Corero Network Security (LSE: CNS) (OTCQB: DDOSF) Corero Network Security (LSE: CNS) (OTCQB: DDOSF)

Securing your peace of mind with over a decade of expertise in flexible, automatic, hybrid and on-prem #DDoS protection. We are Corero Network Security (LSE: CNS) (OTCBQ: DDOSF), and for over a decade, our customers' needs have sculpted our SmartWall ONE DDoS protection platform. From just DDoS detection to offering DDoS protection-as-a-service, we meet you exactly where you are, providing precisely the protection you need. We believe no customer should alter their environment for a vendor; instead, we flexibly mold our robust, automatic, on-prem solutions to safeguard your business against the evolving DDoS threats. We know that organizations face continued …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 119
Sekoia.io Sekoia.io

One view. Total control. Sekoia.io is a European cybersecurity SaaS company, whose mission is to develop the best protection capabilities against cyber attacks. The company created in France provides modern field-proven technologies, to enable operational cybersecurity teams and service providers to neutralize cyber threats before impact. The founders of Sekoia.io have been recognized security professionals for more than 15 years. Today, 100 Sekoia.io collaborators are following our vision and our strategy and contributes to the defensive cybersecurity in France and Europe. cybersecurity, Innovation, RedTeam, BlueTeam, sekoia.io, XDR, TIP, CTI, Threat Intelligence, CERT, Security Analytics, SOAR, SIEM, XDR Back end, SaaS, …

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics SaaS

38 9 28 119
Clavister Clavister

Clavister is a specialised European cybersecurity company, protecting complex digital businesses for more than two decades. Founded and headquartered in Örnsköldsvik, Sweden, Clavister pioneered one of the first firewalls and continues to build robust and adaptive cybersecurity solutions since. Empowering a growing ecosystem of partners and resellers, we have been serving customers in more than 100 countries with 125,000+ deployments across public sector, service provider and defence sectors. Network, cloud, mobile, end points - we secure them all. The company is, since 2014, listed on Nasdaq First North. For more information, visit www.Clavister.com Network Security, Next Generation Firewalls, UTM, Information …

Type: SMB Activities: IT Services Technologies: Cybersecurity

8 0 8 121
HYPR | The Identity Assurance Company HYPR | The Identity Assurance Company

Creating Trust in the Identity Lifecycle as The Identity Assurance Company HYPR is on a mission to improve the lives of security-minded leaders, their employees and customers by helping organizations create trust in the identity lifecycle. HYPR provides the strongest end-to-end identity security, combining modern passwordless authentication with adaptive risk mitigation, automated identity verification and a simple, intuitive user experience. With a third-party validated ROI of 324%, HYPR easily integrates with existing identity and security tools and can be rapidly deployed at scale in the most complex environments. Cybersecurity, Mobile Security, Infrastrucure, Data Security, Security, Wireless, Privacy, SaaS, Software, Cloud, …

Type: Startup Activities: IT Services privacytech regtech Technologies: Cybersecurity IoT SaaS Wireless

16 3 5 122
Morphisec Morphisec

30% of attacks bypass EDR & NGAV. Stop attacks others don’t and slash false positives. Morphisec’s Anti-Ransomware Assurances Suite provides distinct layers of protection to pre-emptively reduce the organization’s exposure, and proactively prevent attacks at multiple phases, from early infiltration attempts to protecting critical system resources and data when ransomware attempts to execute. Powered by Automated Moving Target Defense (AMTD), this streamlined solution effortlessly integrates with your current endpoint protection array, enhancing existing protection capabilities or standing strong independently when necessary. Endpoint Threat Prevention, Zero Day Prevention, Cyber Security, Stopping APTs, Moving Target Defense, Endpoint Security, Zero Trust, Security, Information …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 122
Trustonic Trustonic

We embed world-leading trusted cybersecurity technology into smart devices and connected vehicles. Trustonic a world leader in hardware backed mobile device security, app protection and secures a range of mission critical in vehicle systems. Trustonic has over 100 employees, with its headquarters in Cambridge, UK and offices across 7 international locations. Trustonic counts the worlds leading car manufacturers, financial institutions and mobile operators as customers, as well as every tier 1 Android handset manufacturer. Our patented security technology is embedded in c.2 billion devices worldwide – created initially from a joint venture between ARM & Gemalto, Trustonic is now an …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT Sensors

18 3 14 122
Detectify Detectify

The External Attack Surface Management platform powered by elite ethical hackers. Go hack yourself. Detectify sets the standard for External Attack Surface Management (EASM), providing 99.7% accurate vulnerability assessments. Product security and AppSec teams trust Detectify to expose exactly how attackers will exploit their Internet-facing applications. The Detectify platform automates continuous real-world, payload-based attacks crowdsourced through its global community of elite ethical hackers, exposing critical weaknesses before it’s too late. Go hack yourself. Web Security, OWASP Top 10, XSS, Ethical Hacking, Web scanner, Web vulnerabilities, appsec, Web applications, attack surface, and cybersecurity

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 3 123
NowSecure NowSecure

Deliver Secure Mobile Apps Faster // Named 2X Market Leader for MAST by IDC // DevSecOps Trailblazer by Gartner Join Our Mission: To Save the World from Unsafe Mobile Apps! As the recognized experts in mobile security and privacy, NowSecure protects the global mobile app economy and safeguards the data of millions of mobile app users. Built on a foundation of standards, NowSecure empowers the world’s most demanding organizations with security automation to release and monetize 30% faster, reduce testing and deliver costs by 30% and reduce appsec risk by 40%. Only NowSecure offers a full solution suite of continuous …

Type: Startup Activities: IT Services Technologies: Cybersecurity

10 0 8 128
Team Cymru Team Cymru

Mission: To Save & Improve Human Lives Since 2005, Team Cymru’s mission has been to save and improve human lives by working with public and private sector analyst teams around the world, enabling them to track and take down bad actors of all kinds. The company delivers comprehensive visibility into global cyber threat activity and is a key source of intelligence for many cyber security and threat intelligence vendors. Its Community Services division provides no-cost threat detection, DDoS mitigation and threat intelligence to network operators, hosting providers and more than 143 CSIRT teams across 86+ countries. Enterprise security teams rely …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 1 0 129
Pen Test Partners Pen Test Partners

Pen Test Partners has been providing cyber security expertise to a huge variety of industries and businesses since 2010. Pen Test Partners / PTP has been providing cyber security expertise to a huge variety of industries and businesses since 2010. We’re paid to hack and test the security of all sorts of things, as well as providing essential consultancy, incident response, accreditation, and forensics services. We’ve tested ships and rigs (while at sea!), connected and electric vehicles, the power grids and stations that keeps countries running, as well as the payment, transport, and fulfilment systems on which everybody is reliant. …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 130
Glasswall Glasswall

We are a cybersecurity company that keeps organizations secure from file-based threats with leading CDR technology. Glasswall is a cybersecurity company that protects government agencies and commercial organizations from malicious files with its Content Disarm and Reconstruction (CDR) technology. Unlike traditional detection-based methods, Glasswall employs a zero-trust approach, which removes the ability for malware to exist in files altogether. Elimination of file-based threats, Malware risk removal, Metadata removal, Safe data migration, File uploads & downloads, Secure email, Content Disarm and Reconstruction, Preventive cybersecurity, Threat removal, Threat Intelligence, and Preventing Cybersecurity Attacks

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 130
Perception Point Perception Point

Perception Point provides cybersecurity solutions for the modern workspace, securing email, web browsers, and SaaS apps. Perception Point is a leading provider of AI-powered threat prevention solutions that safeguard the modern workspace against sophisticated threats. The unified security solution protects email, web browsers, and SaaS apps. By uniquely combining the most accurate threat detection platform with an all-included managed incident response service, Perception Point reduces customers’ IT overhead, improves user experience, and delivers deep-level cybersecurity insights. Deployed in minutes, with no change to the organization’s infrastructure, the cloud-native service is easy to use and replaces cumbersome, traditional point systems. Perception …

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 1 6 130
wizlynx group wizlynx group

Leave No Stone Unturned! wizlynx group is an ethical, trustworthy, and vendor-agnostic global Cyber Security provider. Headquartered in Switzerland, you can rely on us to effectively protect your business and trade secrets against any form of cybercrime. Our vision is to be a best-in-class global Cyber Security company, enabling customers to focus on their core business by providing high-quality, value added and innovative Cyber Security services. wizlynx group is one of the few globally accredited CREST Penetration Testing service providers, employing CREST registered Penetration Testers. This highly recognized certification is proof to our customers that wizlynx maintains the highest quality …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 130
Waterfall Security Solutions Waterfall Security Solutions

Unbreachable OT security, unlimited OT connectivity Since 2007, Waterfall Security Solutions has been providing the highest level of protection for critical infrastructure and vital industries. With headquarters in Israel and offices in UAE, Singapore, USA, Europe, and Australia, Waterfall delivers the highest level of OT protection while enabling safe connectivity and visibility for industrial control systems (ICS). Waterfall Security safeguards the most sensitive and critical infrastructures across a wide range of industries including Power, Oil & Gas, Water Utilities, Rail, Manufacturing, Facilities, and Minting & Metals. As cyber attacks on critical infrastructure are on the rise, software alone isn’t able …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 2 131
CYREBRO CYREBRO

Detect & Respond, Precisely CYREBRO is on a mission to completely revolutionize cybersecurity operations by putting the power of a full-fledged Security Operations Center (SOC) in the hands of any user in any organization. Our true 24/7/365 ML-backed Managed Detection & Response solution rapidly detects, analyzes, investigates and responds to cyber threats. From strategic monitoring to proactive threat hunting, accelerated incident response, and enhanced compliance, the full scope of needs is covered. This way, both Fortune 500 companies and SMBs alike can equally and profoundly improve their security posture with clarity, simplicity, and cost-efficiency. Cyber, Cyber Intelligence, Forensics, APT, Audit, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 1 5 132
Figment Figment

Figment is the leading provider of blockchain infrastructure. Figment is the leading provider of blockchain infrastructure. We provide the most comprehensive staking solution for over 250 institutional clients, including asset managers, exchanges, wallets, foundations, custodians, and large token holders, to earn rewards on their digital assets. On Ethereum, we are the largest non-custodial staking provider with nearly 5% of staked ETH on Figment validators. Figment’s institutional staking service offers seamless point-and-click staking dashboard, portfolio reward tracking, API integrations, audited infrastructure, and slashing protection. This all leads to our mission to support the adoption, growth, and long-term success of the digital …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

5 0 3 132
NetNordic Sverige NetNordic Sverige

[Automatic translation follows] We breathe technology and love smart solutions. NetNordic - The Best Companion. NetNordic's focus is to create and deliver smart/intelligent integrations specialized in solutions and services for critical infrastructure in the area of ​​cyber security, secure data centers, secure networks and secure collaboration. As a Nordic provider of cloud and infrastructure services, we improve and strengthen our customers' business-critical operations. NetNordic simplifies the complexity. We use innovative market-leading technology, tailored and specialized solutions to meet your needs – specific to your industry. Together with our competent technical advisors and highly certified IT consultants, we improve your business …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 132
Hacken, Blockchain Security Auditor Hacken, Blockchain Security Auditor

We make Web3 a safer place Hacken is a blockchain security auditor with a vision of transforming Web3 into a more ethical place. We believe, cybersecurity is not only about hacks prevention, but the whole way of running business — without scamming investors, rug pulls, wash trading, circulation supply manipulations, etc. It’s about doing business ethically by respecting community, being honest with investors and partners, acting responsibly, and valuing reputation. We protect Web3 projects and their communities with the suite of cybersecurity services such as Smart Contract Audit, L1 Blockchain Protocol Audit, dApp Audit, Pentest, Bug Bounty Program running on …

Type: Startup Activities: IT Services Technologies: Cybersecurity Blockchain/Cryptocurrency

6 0 5 133
Upstream Security Upstream Security

Making Smart Mobility Safe and Secure. For Everyone. Upstream Security provides a cloud-based data management platform purpose-built for connected vehicles, delivering unparalleled automotive cybersecurity detection and response (V-XDR) and data-driven applications. The Upstream Platform unlocks the value of vehicle data, empowering customers to build connected vehicle applications by transforming highly distributed vehicle data into centralized, structured, contextualized data lakes. Coupled with AutoThreat® Intelligence, the first automotive cybersecurity threat intelligence solution, Upstream provides industry-leading cyber threat protection and actionable insights, seamlessly integrated into the customer’s environment and vehicle security operations centers (VSOC). Upstream’s customers include some of the world’s leading automotive …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity Data Analytics SaaS

16 2 15 133
DomainTools DomainTools

Detect. Investigate. Prevent. DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know. The world's most advanced security teams use our solutions to identify external risks, investigate threats, and proactively protect their organizations in a constantly evolving threat landscape. DomainTools constantly monitors the Internet and brings together the most comprehensive and trusted domain, website and DNS data to provide immediate context and machine-learning driven risk analytics delivered in near real-time. Visit domaintools.com to experience firsthand why DomainTools is the first stop for advanced security teams when they need to know. …

Type: SMB Activities: IT Services Technologies: Cybersecurity A.I. - Machine Learning A.I.

4 0 0 134
SafeBreach SafeBreach

Validate Your Controls. Maximize their Effectiveness. Drive Risk Down. Combining the mindset of a CISO and the toolset of a hacker, SafeBreach is the pioneer in breach-and-attack simulation (BAS) and is the most widely used platform for continuous security validation. SafeBreach continuously executes attacks, correlates results to help visualize security gaps, and leverages contextual insights to highlight remediation efforts. With its Hacker’s PlaybookTM, the industry’s most extensive collection of attack data enabled by state-of-the-art threat intelligence research, SafeBreach empowers organizations to get proactive about security with a simple approach that replaces hope with data. We’re looking for hackers and trailblazers …

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 2 4 134
Constella Intelligence Constella Intelligence

AI-Driven Identity Risk Intelligence from a Constellation of One Trillion Compromised Assets Constella Intelligence is a leading global Digital Risk Protection business that works in partnership with some of the world’s largest organizations to safeguard what matters most and defeat digital risk. Its solutions are broad, collaborative and scalable, powered by a unique combination of proprietary data, technology and human expertise—including the largest breach data collection on the planet, with over 100 billion attributes and 45 billion curated identity records spanning 125 countries and 53 languages.

Type: Startup Activities: IT Services Technologies: Data Analytics

4 2 8 137
Rohde & Schwarz Cybersecurity Rohde & Schwarz Cybersecurity

We are your trustworthy European IT security specialist. Imprint: bit.ly/2nOH9KC Rohde & Schwarz Cybersecurity is a leading IT security company that protects companies and public institutions around the world against cyberattacks. The company develops and produces technologically leading solutions for information and network security, including highly secure encryption solutions, next-generation firewalls and firewalls for business-critical web applications, innovative approaches for working in the cloud securely as well as desktop and mobile security. The award-winning and certified IT security solutions range from compact, all-in-one products to customized solutions for critical infrastructures. To prevent cyberattacks proactively, rather than reactively, the trusted IT …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 140
Novidy's Novidy's

[Automatic translation follows] Novidy’s, the integration subsidiary of the Novidy’s Group, was founded in 2009. Specializing in the network and security market, it operates in the following areas of expertise: - Consulting and audit - Integration / support for latest generation security solutions - Social Security Services on security architectures Our specificity lies in our responsiveness, our ability to adapt to the customer context and to make the link between functional aspects and technical aspects thanks to a pool of experts. An element of distinction which has already convinced many major accounts in the banking, insurance, industry, luxury and telecommunications …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 4 141
Endpoint Protector by CoSoSys (now part of Netwrix) Endpoint Protector by CoSoSys (now part of Netwrix)

Easy to use, multi-OS Data Loss Prevention Endpoint Protector by CoSoSys (now part of Netwrix) is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks, protects from malicious data theft and offers seamless control of portable storage devices. Its content inspection capabilities for both data at rest and in motion range from predefined content based on dictionaries, regular expressions, and machine learning to profiles for data protection regulations such as GDPR, HIPAA, CCPA, PCI DSS, etc. network-endpoint-protection-solutions, applications-for-portable-storage-devices, data-loss-prevention, DLP, IT-Security, security, endpoints, device-control, Enterprise-Mobility-Management, Content-Aware-DLP, and eDiscovery

Type: SMB Activities: IT Services privacytech Technologies: A.I. A.I. - Machine Learning Cybersecurity

2 0 0 143
Cylance Inc. Cylance Inc.

We've moved! Follow us at BlackBerry for the latest on BlackBerry Spark, Unified Endpoint Security, Unified Endpoint Management, and more! https://www.linkedin.com/company/blackberry/ Next Generation Anti-Virus, Penetration Testing, Malware Detection, Security Assessments, Machine Learning, Advanced Threat Protection, and Artificial Intelligence

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I. - Machine Learning A.I.

15 1 15 144
IOActive, Inc. IOActive, Inc.

Research-fueled Security Services IOActive is a trusted partner for Global 1000 enterprises, providing research-fueled security services across all industries. Our cutting-edge security teams provide highly specialized technical and programmatic services including full stack penetration testing, program efficacy assessments, and hardware hacking. IOActive brings a unique attacker’s perspective to every client engagement to maximize security investments and improve client’s overall security posture and business resiliency. Passion and pride through quality client work is something money simply can't buy. IOActive has spent more than a decade searching for the required blend of characteristics and work ethic that comprise a world-class, international security …

Type: SMB Activities: IT Services Technologies: Cybersecurity IoT

5 0 0 144
Futurex Futurex

Trusted provider of hardened, enterprise-class data security solutions. For over 40 years, Futurex has been an award-winning leader and innovator in the encryption market, delivering uncompromising enterprise-grade data security solutions. Over 15,000 organizations worldwide trust Futurex to provide groundbreaking hardware security modules, key management servers, and cloud HSM solutions. Futurex maintains an unyielding commitment to offering advanced, standards-compliant data encryption solutions, including: • Hardware security modules (HSM) for general purpose, payments, CloudHSM, and post-quantum environments • Enterprise key management and data protection including cloud key management (BYOK/EKM), IoT key injection, tokenization, database encryption, and file encryption • PKI and certificate …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 144
Guden CyberSecurity Guden CyberSecurity

Our wide range of cyber security consulting and managed services are designed to give you the security support you need, as you need it. Guden CyberSecurity is a trusted Microsoft Partner, made up of highly-accredited cyber security professionals supporting customers across the UK. Gudens provides Microsoft subject matter expertise, guidance and deployment specialisation in the areas of AI, governance, security, collaboration & training, and application development. Our cyber security consultancy and managed services empower you to achieve your security goals with expert support every step of the way. Whether you have a security project in mind, want to know the …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 145
TypingDNA TypingDNA

AI based Authentication and Fraud detection. Recognize people by the way they type. AI based Authentication and Fraud Detection. Biometric Typing Pattern, Predictive User Profile, Keystroke Dynamics, Biometric Authentication, Biometric Security, Fraud Detection, Behavioral Biometrics, Typing Biometrics, Account Takeover Prevention, Continuous Authentication, Zero trust, and Prevent device sharing

Type: Startup Activities: IT Services Technologies: Cybersecurity

11 1 4 148
PKWARE PKWARE

Data discovery and protection to locate and secure sensitive data on any device/environment, minimizing risks and costs PKWARE offers the only data discovery and protection solution that locates and secures sensitive data to minimize organizational risks and costs, regardless of device or environment. Our ultra-efficient, scalable software is simple to use on a broad range of data types and repositories, enabling precise, automated visibility and control of personal data, even in the fastest-moving, most complex IT environments. With more than 1,200 customers, including many of the world’s largest financial institutions, retailers, healthcare organizations, and government agencies, PKWARE continues to innovate …

Type: SMB Activities: IT Services privacytech Technologies: Data Analytics

5 2 7 148
AttackIQ AttackIQ

Testing for everyone. Your way, your budget, your needs. AttackIQ is the industry leading provider of breach and attack simulation products for security control validation. AttackIQ emulates adversary tactics, techniques, and procedures, aligned to the MITRE ATT&CK framework, and provides visibility into your security program performance with clear data-driven analysis and mitigation guidance. At AttackIQ, we get that every organization has different testing needs. That’s why we’ve designed products fit for your unique needs: Enterprise, Ready!, and Flex. So, whether you’re new to security testing, want someone to manage it for you, or just need some help running it yourself, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 149
Praetorian Praetorian

The Leader in Offensive Security Praetorian, a trusted leader in offensive security services, empowers enterprises to thrive in a digital world without compromise. Enterprise security demands the ability to proactively detect vulnerabilities and threats, yet identifying signals from noise in today’s ever-expanding attack surfaces is increasingly difficult. Our cybersecurity experts provide the deep subject matter expertise needed to defend against persistent, sophisticated attacks. Praetorian professional and managed services cover all attack vectors - external, internal, cloud, web app, secrets, phishing, and supply chain and vendor risk. With Praetorian standing guard, CISOs of the world’s largest organizations rest assured that they …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity IoT

6 2 2 149
ERCOM ERCOM

Société du groupe Thales, Ercom sécurise vos communications, données et terminaux. Ercom, a Thales company, is a reference company with 30 years of combined expertise in two key areas: cybersecurity and communication networks. Being a reference company means providing clients with cutting edge solutions for their industry, combining certified security and simplicity in order to accelerate end-user adoption over a large range of devices. Ercom presents : - Cryptosmart, the only “Restricted” French, EU & NATO certified solution, jointly developed with Samsung, to secure devices and end-to-end mobile communications (voice, SMS and data) on consumer smartphones and tablets. - Cryptobox, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

7 0 7 154
NuHarbor Security NuHarbor Security

Cybersecurity services you want from a team of experts you can trust. NuHarbor Security is a leading national cybersecurity services firm, supporting the diverse needs of hundreds of clients with clear, comprehensive, and outcome-based solutions. We support only best-of-breed security technologies with thoroughly trained and vetted analysts. We make cybersecurity easier for our clients by integrating the most comprehensive set of security services in the market, from compliance and offensive testing to award-winning 24×7 managed security operations. What’s more, NuHarbor advisors analyze information from multiple sources to deliver the most well-informed strategies for building, improving, and maintaining your cybersecurity program. …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

2 0 2 154
PCI Security Standards Council PCI Security Standards Council

Securing the future of payments together. The PCI Security Standards Council is a global open body formed to develop, enhance, disseminate and assist with the understanding of security standards for payment account security. The Council maintains, evolves, and promotes the Payment Card Industry Security Standards. It also provides critical tools needed for implementation of the standards such as assessment and scanning qualifications, self-assessment questionnaires, training and education, and product certification programs.

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

12 4 5 155
Balbix Balbix

AI-powered Cyber Risk Management Balbix enables organizations to reduce cyber risk by identifying and mitigating their riskiest cybersecurity issues faster. The Balbix Security CloudTM platform ingests data from an organization’s security and IT tools to understand every aspect of cybersecurity posture and build a unified cyber risk model, then provides actionable insights for risk reduction. With Balbix, enterprises can automate inventory of their cloud and on-prem assets, conduct continuous risk-based vulnerability management and quantify cyber risk in dollars. Executives and operational teams can make cybersecurity decisions based on data not opinions. A rapidly growing set of Fortune 500 companies trust …

Type: Startup Activities: IT Services Technologies: Cybersecurity

11 1 6 155
Intercede Intercede

Digital trust for governments, corporations, citizens and employees. Intercede® is a cybersecurity company specialising in identity, credential management and secure mobility to enable digital trust. It provides software and services that help organisations ensure the safety and security of their people, facilities, networks and information in an increasingly mobile, digital world. Intercede has been delivering solutions to high profile customers, from the US and UK governments to some of the world’s largest corporations, telecommunications providers and information technology firms, for over 20 years. Intercede’s MyID software is an identity and credential management system that enables organisations to create and assign …

Type: SMB Activities: IT Services Technologies: Cybersecurity

3 0 1 155
Cyberint Cyberint

We turn intelligence into actions to proactively and effectively defend businesses against cyber threats Cyberint, the Impactful Intelligence company, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The Cyberint Argos platform’s patented technology provides superior visibility through continuous discovery of the evolving attack surface, combined with the automated collection and analysis of vast quantities of intelligence from across the open, deep and dark web. A team of global military-grade cybersecurity experts work alongside customers to rapidly detect, investigate, and disrupt relevant threats – before they have the chance to develop into …

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 0 5 156
IBO IBO

[Automatic translation follows] We simplify your digital life! Since its creation, IBO has developed a unique and proven managed IT services approach to support companies in the technical and financial optimization of their information systems. Our approach aims to increase the competitiveness of companies by relieving them partially or entirely of the daily management of their IT in order to allow them to concentrate on their business activity. IBO’s service offering is divided into 4 main families: - Accommodation services, - Outsourcing services, - Services related to IT security, - Services dedicated to Health. IBO has been approved since 2013 …

Type: SMB Activities: IT Services Technologies: Data Analytics

0 0 0 157
Perimeter 81, a Check Point Company Perimeter 81, a Check Point Company

A Radically Simple and Secure Corporate Network Perimeter 81 is a robust, yet easy-to-use, converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, or cloud. It is a cloud-native service that includes advanced capabilities such as Zero Trust remote access, Internet access control, malware protection and firewall as a service. It enables any business to build a secure corporate network over a private global backbone, without hardware and within minutes. The entire service is managed from a unified console and is backed by an award-winning global support team that …

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 2 1 157
Obsidian Security Obsidian Security

Comprehensive Security for Your SaaS Applications Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS. The company is backed by Greylock Partners, Wing, GV and Norwest Venture Partners. Advanced Threat Protection, Insider Threat Protection, Threat Detection, Threat Response, Automated Intelligence, Machine Learning, Information Security Software, SaaS Security , Incident Response, Visibility and Monitoring, and compliance

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I. A.I. - Machine Learning

6 2 2 158
OpenVPN Inc. OpenVPN Inc.

OpenVPN® helps businesses of all sizes create secure, virtualized, reliable networks that scale with your team. OpenVPN® solutions help organizations to easily create secure, virtualized, reliable networks that ensure secure communications between on-premise applications, SaaS applications, a remote workforce, business partners, IoT/IIoT devices, and specialized global applications. We offer two secure networking solutions for small, medium, and enterprise businesses. CloudConnexaTM, our managed solution, provides secure communication between an organization's distributed workforce, loT/lloT devices, and the online services they rely on daily with a secure virtualized network. Access Server, our self-hosted solution, simplifies the rapid deployment of a secure remote access …

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 1 2 159
CyCognito CyCognito

External Attack Surface Management See Exactly What Attackers See. Take full control over your attack surface by uncovering and eliminating critical security risks – the ones you didn't know existed. Our botnet and discovery engine use graph data modeling to map and classify the assets across your attack surface. attacksurface, asset discovery, cloud security, cyber security threats, vulnerability management, attack surface, IT security, cyber threat intelligence, vulnerability assessment, attack surface management, network security, cyber posture, penetration testing, attack surface visibility, data security, data breach, pentesting, attack surface security, CISO, internet security, security posture, cybersecurity, cloud security, infosec, digital assets, shadow …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 4 160
CybelAngel CybelAngel

Scan, Prioritize, Resolve External Threats CybelAngel is a global leader in cybersecurity solutions focused on External Attack Surface Protection and Management. As an early pioneer in ‘outside-in’ search technology, approaching cybersecurity just as an attacker would carry out infiltration, CybelAngel has developed the industry’s most extensive defense for external attack vectors, where the majority of cyber-attacks are initiated. Combining expanded discovery and analysis, CybelAngel finds unknown assets and exposures to preemptively diffuse attack vectors that cyber criminals use to breach systems and wreak havoc. CybelAngel proudly protects some of the largest global enterprises representing various sectors including the Pharmaceutical, Manufacturing, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

10 5 5 161
STid STid

Smarter Security Answers STid is one of the leading developers of contactless identification solutions using RFID, NFC and Bluetooth® technologies, and the Internet of Things (IoT). For over 20 years, we have been inventing smart solutions designed to secure access and provide traceability for assets in testing environments such as the aeronautical, energy or defense sectors. As experts in our field, we are constantly striving for excellence, giving us an unrivalled command of cutting-edge technologies to safeguard digital identity. We give companies, industries and governments the means to identify, protect and supervise their assets to make their daily operations easier …

Type: SMB Activities: IT Services Technologies: Wireless IoT NFC

20 3 17 161
Lepide Lepide

Protect Sensitive Data from Rogue Users and Compromised User Accounts with the Lepide Data Security Platform Lepide is a global provider of data security solutions. We help some of the world’s largest enterprises improve data protection, meet compliance, and detect/react to threats through our Data Security Platform. With our Data Security Platform, you can locate and classify your sensitive data, govern access and track permission changes, analyze user behavior to spot anomalies, and much more. Detect a wide range of threats, from ransomware to rogue insiders, and alert and respond automatically in real-time. Reduce your attack surface by identifying privileged …

Type: SMB Activities: privacytech IT Services Technologies: Cybersecurity

3 0 2 161
Cequence Security Cequence Security

Discover, comply, and protect APIs and applications against attack, business logic abuse, and fraud. Cequence Security is an API security and bot management company that protects customers’ applications and APIs against attacks, business logic abuse, and fraud. Our comprehensive Unified API Protection solution offers discovery, compliance, and protection across all internal and external APIs without needing any instrumentation, SDK, or JavaScript deployments. Cequence solutions scale to handle the most demanding government, Fortune and Global 500 organizations, securing more than 8 billion daily API interactions and protecting more than 3 billion user accounts across these customers. The company is led by …

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 2 5 162
Performanta Performanta

Aware - Secure - Safe | Cyber Security Performanta, the global purple tribe, delivering the bedrock of quality cyber security services to our customers, enabling them to do business safely. Founded in 2010 with Offices in the UK, North America, South Africa and Australia, Performanta employs over 140 people globally with an amalgamation of over 1,000 years of experience, servicing satisfied customers in more than 50 countries worldwide. At Performanta, we hire only the best people to join our Purple Tribe, a passionate group of highly motivated, empowered and successful employees. We work hard and are committed to the values …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 162
ThreatConnect ThreatConnect

ThreatConnect is the industry's leading threat intelligence operations and cyber risk quantification solutions provider ThreatConnect enables threat intelligence operations, security operations, and cyber risk management teams to work together for more effective, efficient, and collaborative cyber defense and protection. With ThreatConnect, organizations infuse ML and AI-powered threat intel and cyber risk quantification into their work, allowing them to orchestrate and automate processes to get the necessary insights and respond faster and more confidently than ever before. More than 200 enterprises and thousands of security professionals rely on ThreatConnect every day to protect their organizations' most critical assets. To learn more …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 4 163
DEF CON DEF CON

Computer Hacking Conference

Type: SMB Activities: IT Services Technologies: Cybersecurity

17 6 3 170
Uniken Inc. Uniken Inc.

Creating a secure world where identity is a certainty, not a vulnerability. At Uniken, we accelerate possibilities for client-centric organizations by creating certainty in identity and security while delivering amazing customer experiences. We believe identity shouldn’t be a question of trust, but a statement of certainty. With our award-winning REL-ID security platform, we raise identity from trust to certainty while enhancing customer experience. REL-ID enables organizations to drive fraud to zero by securing the customer journey end-to-end — from devices, applications, and network connections to customer authentication, transaction verification, and digital signing. Fast and frictionless, REL-ID removes the security burden …

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 0 5 171
Riscure Riscure

Driving Your Security Forward Riscure is an independent security laboratory founded in 2001 with customers in North America, Europe and Asia. We specialize in evaluating and improving the security of products that are designed to operate securely in an environment where attackers might attempt access by either physical or logical means, often without the risk of being detected. Our work includes endpoint, communication protocols as well as back-end security. Besides offering security evaluation and advisory services, Riscure develops and maintains security test products for organizations that wish to perform their own hardware or software testing. Riscure is market leader in …

Type: SMB Activities: deeptech IT Services Technologies: Cybersecurity Embedded Systems IoT

3 0 3 174
GoSecure GoSecure

Based in Montreal and San Diego, GoSecure is a leading provider of managed security solutions and advisory services. GoSecure is a recognized cybersecurity leader, delivering innovative managed Extended Detection and Response (MXDR) solutions and expert advisory services. GoSecure Titan® managed security solutions deliver multi-vector protection to counter modern cyber threats through a complete suite of offerings that extend the capabilities of our customers’ in-house teams. GoSecure Titan Managed Extended Detection and Response (MXDR) offers a best-in-class mean-time-to-respond, with comprehensive coverage across customers’ networks, endpoints, and inboxes. For over 10 years, GoSecure has been helping customers better understand their security gaps, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

6 1 5 177
CUJO AI CUJO AI

Global leader in AI-powered cybersecurity and device intelligence solutions for network providers and their subscribers CUJO AI is the global leader of cutting-edge cybersecurity and network intelligence solutions that enable network operators globally to improve the digital life protection of their customers in and outside the home. By pioneering AI-powered cybersecurity and empowering a growing ecosystem of OEM partners, CUJO AI helps major ISPs around the world to protect their subscribers. Mobile and fixed network operators use our holistic capabilities to improve their customer value proposition, monetize their networks, and reduce operating complexity and costs. The CUJO AI Platform powers …

Type: Startup Activities: IT Services Technologies: IoT Cybersecurity Data Analytics SaaS A.I. - Machine Learning A.I.

5 1 3 179
ETEK ETEK

Proactive Cybersecurity Etek International Corporation is the leading Information Security Solutions Provider in Latin America, with headquarters in the USA and offices in Colombia, Perú, India and Mexico. Etek offers a complete range of services and technologies in different areas like consulting, education, supply, deployment, support, monitoring, management, and operation of information security technologies. Etek partners with the best of breed InfoSec technology providers. To ensure the use of best practices and standard methodologies in all its processes and management procedures, ETEK holds the ISO 9001:2000, the ISO/IEC 27001: 2005, and ISO 20000 Information Security, Network Security, Information Security Professional …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 183
RedSeal, Inc. RedSeal, Inc.

Cloud security solutions and services that show what’s on all network environments and where resources are exposed. RedSeal delivers actionable insights to close defensive gaps across the entire network, on premises and in the cloud. Hundreds of Fortune 1000 companies and more than 75 government agencies, including five branches of the U.S. military, depend on RedSeal for exceptionally secure environments. Visit www.redseal.net to learn more. Network Security, Network Modeling, Risk Scoring & Analytics, Incident Response, Network Situational Awareness, Vulnerability Prioritization, Continuous Monitoring, Security Metrics, Cybersecurity, Continuous Compliance, Cyber Resilience, Digital Resilience, and Cloud

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 1 3 184
Information Systems Security Association (ISSA) Information Systems Security Association (ISSA)

Developing and Connecting Cybersecurity Leaders Globally The Voice of the Information Security Professional Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications and peer interaction opportunities that enhance the knowledge, skill and professional growth of its members. Developing and Connecting Cybersecurity Leaders Globally

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 184
Excellium Services Excellium Services

Your first call when it comes to cybersecurity & privacy Excellium Services is a cybersecurity services company established in Luxembourg since 2012 and more recently in Belgium, with activities and partnerships in Europe and Africa. We currently employ about 150 cybersecurity ninjas, willing to assist organizations to deal with evolving cybersecurity threats and challenges. Excellium’s main activities consist in : Cybersecurity Solutions, Security Operations Center Services 24x7, Incident Response and Security Infrastructure operations, training and formations. Excellium is a caring workplace where the culture is about diversity, inclusion and collaboration. We are continuously looking for passionate and talented people (who …

Type: Startup Activities: IT Services Technologies: Cybersecurity

15 5 8 189
Turnkey Consulting Turnkey Consulting

Turnkey Consulting is the leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security. Built on nearly two decades of expertise, we help leading organisations around the world to safeguard their critical business applications to ensure the associated risks are minimised and controlled. Our culture is built upon quality, satisfaction, and knowledge sharing to ensure that your company’s need is at the forefront of our offerings. We are a group of passionate individuals with a shared purpose to help the world’s leading companies act with integrity and embrace best practices for Risk Management, Identity …

Type: SMB Activities: IT Services Technologies: Cybersecurity

3 0 3 189
Ministerio de Economia y Competitividad Ministerio de Economia y Competitividad

[Automatic translation follows] Ministry of Economy and Competitiveness................................................. .................................................. .................................................. .................................................. .................................................. ...

Type: NGO, Think-tanks, Ed, & Culture Activities: cleantech greentech

0 0 0 190
CYMOTIVE Technologies CYMOTIVE Technologies

Trusted Smart Mobility Founded in 2016 by top tier Israeli security experts, CYMOTIVE Technologies designs, develops and deploys cybersecurity solutions to solve the most complex challenges in the smart mobility market. With teams working from Israel, Germany, Sweden, and the U.S, CYMOTIVE offers a full lifecycle platform of solutions for secured development to post-production stages in the smart mobility ecosystem. The company’s customers include several manufacturers, smart cities and top tier suppliers of vehicles, fleets and other embedded solutions. Cybersecurity, Automotive, Cyber, Security, Risk, Architecture, Embedded, Software, Hardware, Analysis, Research, Vehicle, Development, SOC, PRD, System, Penetration, Testing, Requirements, and Smart …

Type: Startup Activities: Smart City transporttech IT Services Technologies: IoT

0 0 0 191
Salt Security Salt Security

Providing end-to-end API security, so businesses can innovate safely and accelerate digital transformation initiatives. Salt Security protects the APIs that form the core of every modern application. Its patented API Protection Platform is the only API security solution that combines the power of cloud-scale big data and time-tested ML/AI to detect and prevent API attacks. By correlating activities across millions of APIs and users over time, Salt delivers deep context and actionable intelligence with real-time analysis and continuous insights for API discovery, attack prevention, and shift-left practices. Deployed quickly and seamlessly integrated within existing systems, the Salt Security platform gives …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I.

15 2 12 192
Group-IB Group-IB

Global Threat Hunting and Adversary-Centric Cyber Intelligence Company Founded in 2003 and headquartered in Singapore, Group-IB is a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime. Combating cybercrime is in the company’s DNA, shaping its technological capabilities to defend businesses, citizens, and support law enforcement operations. Group-IB’s Digital Crime Resistance Centers (DCRCs) are located in the Middle East, Europe, and Asia-Pacific to help critically analyze and promptly mitigate regional and country-specific threats. These mission-critical units help Group-IB strengthen its contribution to global cybercrime prevention and continually expand its threat-hunting capabilities. Group-IB’s decentralized and autonomous operational structure …

Type: SMB Activities: IT Services Technologies: Cybersecurity

11 1 7 193
DataDome DataDome

DataDome's bot and online fraud protection detects and mitigates attacks with unparalleled accuracy and zero compromise. DataDome’s bot and online fraud protection detects and mitigates attacks with unparalleled accuracy and zero compromise. Our machine learning solution analyzes 5 trillion signals per day to adapt to new threats in real time. Hundreds of enterprises worldwide—including Rakuten, AllTrails, Scentbird and Helly Hansen—trust DataDome’s solution and 24/7 SOC and Threat Research experts to protect their mobile apps, websites, and APIs against online fraud, ATO, carding, scraping, layer 7 DDoS, credential stuffing, and more. A force multiplier for IT and security teams, DataDome is …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I. A.I. - Machine Learning

5 2 2 194
SERMA SAFETY & SECURITY SERMA SAFETY & SECURITY

Secure Your Future SERMA Safety & Security is your single point of contact for the security and dependability of your products and systems. Because Cybersecurity and Dependability are intricately linked, and the Security of connected objects has to be managed at system level, SERMA Safety & Security has developed a one-stop comprehensive offer incorporating Expertise, Evaluation,Consultancy and Training , covering hardware, software and information systems. Created in 2015, SERMA Safety & Security, known as S3, is renowned for its expertise in the field of safety and security – the result of over 20 years’ experience: ► The security lab, created …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

12 2 5 196
Garrison Garrison

Ultra-secure isolation technology utilising hardsec principles to solve secure browsing, VDI and secure data transfer. Are you brave enough to click this link? http://bit.ly/2xdmVRw Malware and data loss: the web can be a dangerous place. You could just block access to everything except the trusted cloud services that the business relies on – great for security, but terrible for users. Ultra-secure browsing solves the problem. Security and enablement in a single package. Silicon Assured Video Isolation (Garrison SAVI®) is a Secure Remote Browsing technology that means risky web content is never processed on the user’s endpoint device. Designed with the …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 1 1 197
Cisco Talos Intelligence Group Cisco Talos Intelligence Group

Fighting the good fight every day to keep our customers, and the internet at large, safe. Cisco Talos is one of the largest and most trusted providers of cutting-edge security research globally. We provide the data Cisco Security products and services use to take action. The key differentiator of Talos is our process — seeing what is happening broadly across the threat landscape, acting on that data rapidly and meaningfully, and driving protection. Integral to that process is that Talos has more visibility than any other security vendor in the world and unique capabilities and scale in intelligence. The core …

Type: Startup Activities: IT Services Technologies: Cybersecurity

12 2 12 200
InfoWatch InfoWatch

InfoWatch is a European Software Company, Leader In Intellectual Data Protection Solutions. Once a small Kaspersky Lab project in Russia, it is now a group of companies with outstanding reputation for protecting global ogranisations against various information security threats. We have been active in the information security business for more than 10 years and have experience in implementing extremely complex solutions at the largest companies and in government agencies. Thousands of large businesses successfully use InfoWatch solutions in countries such as Southeast Asia, Western Europe, the Middle East, India, and Russia, CIS. DLP (Data Leakage Prevention), Encryption software, linguistic technologies …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 201
Binary Defense Binary Defense

Real people detecting real threats in real time. Founded in 2014 by the industry’s top cybersecurity experts, Binary Defense is on a mission to change the security industry for the better and help organizations defend against threats of all kinds. We believe that the best defense against cyber threats uses a human-driven, technology-assisted approach. We protect businesses of all sizes through our advanced cybersecurity solutions including Managed Detection and Response, Threat Hunting, Digital Risk Protection, Incident Response, Phishing Response, and Analysis on Demand. Binary Defense was spawned from the need for better monitoring and detection capabilities in companies. The founder …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 0 204
TEHTRIS TEHTRIS

Unified & Automated Cybersecurity | TEHTRIS XDR Platform, Extended Detection Response >> Face the unpredictable! TEHTRIS is the software editor of the TEHTRIS XDR Platform, the world leader in automatic, real-time, non-human neutralization of cyber attacks. With its "Security & Ethics by design" engineering, this solution provides cybersecurity specialists with a holistic view of their infrastructure, while guaranteeing the confidentiality of their data. Thanks to its technology, the company is positioned as a 🇪🇺 trusted third party. TEHTRIS XDR Platform monitors, analyzes, detects, & neutralizes threats worldwide for the benefit of major players & administrations. It is interoperable with existing …

Type: Startup Activities: IT Services Technologies: Cybersecurity

104 21 93 205
Fortra's Digital Guardian Fortra's Digital Guardian

No-Compromise Data Protection That Stops Data Loss Digital Guardian is Fortra's solution for data loss prevention.​ ​ Our cloud-delivered platform is purpose-built to stop data loss by both insiders and outsiders on Windows, Mac and Linux operating systems. Fortra’s Digital Guardian Data Protection Platform performs across the corporate network, traditional endpoints, and cloud applications. We enable data-rich organizations to protect their most valuable assets with a choice of SaaS or fully managed deployment. Digital Guardian’s unique policy-less data visibility and flexible controls enable organizations to protect data without slowing the pace of their business. ​ Data Security, Data Protection, Managed …

Type: SMB Activities: privacytech IT Services Technologies: Cybersecurity Data Analytics

0 0 0 206
Yogosha Yogosha

Offensive Security Testing Platform Yogosha is an Offensive Security Platform enabling you to identify your most critical vulnerabilities—that are difficult to uncover. Bug Bounty, Pentest, Security, Private bug bounty, crowdsourced security, crowdsourced pentest, hacking, ethical hacking, hackers, cybersecurity, and vulnerability management

Type: Startup Activities: IT Services Technologies: Cybersecurity

32 7 27 211
Argus Cyber Security Ltd. Argus Cyber Security Ltd.

Shifting gears in automotive cyber security. Argus, a global leader in automotive cyber security, provides DevSecOps, vehicle security and fleet protection technologies and services for automakers and their suppliers. Our solutions ensure that vehicle components, networks and fleets are secured and compliant throughout their life cycle. Argus’ innovative methods and solutions are based on decades of cyber security and automotive research and have culminated in over 100 granted and pending patents. Founded in 2014, Argus is headquartered in Israel, with offices in USA, Germany, France, Japan, and Korea. Cyber Security, Automotive, Penetration Testing, connected vehicles, smart mobility, UNR 155, electric …

Type: Startup Activities: IT Services transporttech Technologies: Cybersecurity Embedded Systems IoT

14 1 12 213
SpyCloud SpyCloud

The leader in operationalizing Cybercrime Analytics to prevent ATO, ransomware, and online fraud. SpyCloud transforms recaptured darknet data to protect businesses from cyberattacks. Its products operationalize Cybercrime Analytics (C2A) to produce actionable insights that allow enterprises to proactively prevent ransomware and account takeover, protect their business from consumer fraud losses, and investigate cybercrime incidents. Its unique data from breaches, malware-infected devices, and other underground sources also powers many popular dark web monitoring and identity theft protection offerings. SpyCloud customers include half of the ten largest global enterprises, mid-size companies, and government agencies around the world. Headquartered in Austin, TX, SpyCloud …

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 1 4 221
Security Innovation Security Innovation

Create Secure Software Security Innovation is a pioneer in software security and literally wrote the book on How to Break Software Security. Since 2002, organizations have relied on our assessment and training solutions to secure software wherever it runs. Our training solutions combine interactive modules, scenario-based labs, and hands-on cyber ranges to build skills that stick. Visit securityinnovation.com to learn how we can help you launch a best-in-class security program. Global technology vendors and enterprise IT organizations such as Microsoft, IBM, FedEx, ING, Symantec, Coca-Cola and GE rely on our expertise to understand the security risks in their software systems …

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 0 0 223
genua gmbh genua gmbh

Über 30 Jahre Excellence in Digital Security. Made in Germany. genua ist ein Unternehmen der Bundesdruckerei-Gruppe. The more connected we become, the greater the importance of IT security: Your IT systems and communication paths have to function flawlessly, and at the same time your data must be reliably protected. We strive to help you achieve this goal. genua is a German specialist for IT security and a member of Bundesdruckerei Group. Our goal is clearly defined: developing top-quality solutions that provide our customers with reliable IT security. Our business activities range from securing sensitive interfaces in public authorities and industry …

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 0 1 226
Northwave Cyber Security Northwave Cyber Security

We are your confident Cyber Security crew for a safe digital journey. Northwave Northwave offers an Intelligent combination of cyber security services to protect your information. We believe it is essential to our society and economy that we can rely on safe and trustworthy digital infrastructures. Therefore, we feel the need to make integrated ICT security services of the highest possible quality available to every organisation. Northwave integrates people, processes and technology into an Intelligent Security Operation: smart security that controls proactive and reactive measures based on a pragmatic (ISO certified) quality management structure. We combine Information Security, Privacy and …

Type: SMB Activities: IT Services privacytech Technologies: Cybersecurity

8 4 2 226
EfficientIP EfficientIP

Our Goal: Simplify modern key IT challenges and enable secure dynamic IP communication between users, apps, & services. EfficientIP is a network security and automation company, specializing in DNS-DHCP-IPAM (DDI). We promote business continuity by making your IP infrastructure foundation reliable, agile, and secure. Integrated solutions enable IP communication and simplify network management with end-to-end visibility and smart automation, while patented technology secures DNS services to safeguard data and ensure application access. Companies in all sectors rely on EfficientIP offerings to face the challenges of key IT initiatives such as cloud applications and mobility. IP Address Management, DNS-DHCP services management, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

4 0 4 226
Cymulate Cymulate

Empowering companies to manage, control, and optimize their cybersecurity posture end-to-end. Designed for companies that want to manage their security posture against the evolving threat landscape. Cymulate's SaaS-based platform deploys within an hour, enabling security professionals to continuously challenge, validate and optimize their cybersecurity posture end-to-end across the MITRE ATT&CK® framework. The platform provides threat intelligence-led risk assessments that are simple to deploy out-of-the-box, and for all maturity levels. It also provides an open framework to create and automate red and purple teaming by generating penetration scenarios and advanced attack campaigns tailored to their unique environments and security policies. Cymulate …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 3 227
Callsign Callsign

Pioneering digital trust through proprietary technology that uniquely mimics the way humans identify each other. Callsign is pioneering digital trust through proprietary technology that uniquely mimics the way humans identify each other in the real world. Positive identification of genuine users delivers privacy, safety and minimal friction whilst ensuring that bad actors are blocked. Through a simple Swipe or Type, users can be personally recognized to a 99.999% accuracy, delivering the highest fidelity AI based user recognition for the digital world. Multi-factor Authentication (MFA), Cyber Security, Realtime Identification, Two-factor Authentication (2FA / TFA), Fraud and Security Prevention Plan, PSD2, Identity …

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity A.I.

7 0 7 228
Array Networks Array Networks

Array offers a complete range of application delivery and security solutions. Array offers a complete range of application delivery and security solutions aimed at maximizing employee productivity, ensuring always-on availability, optimizing the end-user experience, and guarding business infrastructure against attack and data leakage. Application Delivery Controllers, SSL VPN, Secure Access Gateways, Remote Desktop, NFV, Network HCI, Load balancers, SSL Intercept, and Web Application Firewall

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 0 229