Entities
LogoName Σ Employees
Yoroi Yoroi

#DefenceBelongsToHumans Yoroi is a managed security service provider. It provides cyber security solutions against industrial espionage, internal threats and advanced targeted attacks. Yoroi offers an high specialized Security Operation Center (SOC) to protect your company. Defence belongs to humans! Computer Security, Advanced Targeted Attack Prevention, Managed Security Service Provider, Couter Espionage, Penetration Testing, Vulnerability Management, SAP Penetration Testing, Cyber Security Operation Center, Digital Surveillance, Early Warnings, and Cyber Defence

Type: Startup Activities: IT Services Technologies: Cybersecurity

5 0 4 104
Swascan - Tinexta Group Swascan - Tinexta Group

NON ABBASSIAMO LA GUARDIA! Swascan is a Cyber Security Company founded by Pierguido Iezzi and Raoul Chiesa. It is the first Italian cyber security company to own a cyber security testing and threat intelligence platform, as well as a Cyber Security Research centre of excellence that has received several national and international awards from the most important players in the IT market and beyond. Since October 2020, Swascan srl has been an integral part of Tinexta Cyber (Tinexta S.P.A.), becoming an active leader in the first national cyber security centre. Therefore, it is more than one company: it’s an Italian …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

5 1 2 79
ThreatConnect ThreatConnect

ThreatConnect is the industry's leading threat intelligence operations and cyber risk quantification solutions provider ThreatConnect enables threat intelligence operations, security operations, and cyber risk management teams to work together for more effective, efficient, and collaborative cyber defense and protection. With ThreatConnect, organizations infuse ML and AI-powered threat intel and cyber risk quantification into their work, allowing them to orchestrate and automate processes to get the necessary insights and respond faster and more confidently than ever before. More than 200 enterprises and thousands of security professionals rely on ThreatConnect every day to protect their organizations' most critical assets. To learn more …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 4 168
DevSecCon Global Community DevSecCon Global Community

DevSecCon is the global community dedicated to DevSecOps to help implement security in the overall development process. DevSecCon is the global community dedicated to DevSecOps to help implement security in the overall development process. If you’re a security enthusiast & you want to learn more about how to better secure your team, then check out our community & resources. On top of our ever-growing DevSecCon conference series, we have live-streamed virtual events, blogs, and host an AppSec specific podcast called The Secure Developer. Our aim is to create one global community to educate and enable software engineers to integrate security …

Type: SMB Activities: IT Services Technologies: Cybersecurity

3 0 3 12
Silverfort Silverfort

Where Identity Protection Has Never Gone Before Silverfort is the Unified Identity Protection company that pioneered the first and only platform, enabling modern identity security everywhere. By connecting to the silos of the enterprise identity infrastructure, Silverfort unifies identity security across all on-prem and the cloud environments. With its unique architecture and vendor agnostic approach, Silverfort takes away the complexity of securing every identity, and extends protection to resources that cannot be protected by any other solution, such as legacy systems, command-line interfaces, service accounts (non-human identities), IT/OT infrastructure, amongst others. Silverfort is a Top Tier Microsoft partner and was …

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity

4 2 3 303
Orca Security Orca Security

The agentless cloud security pioneer for AWS, Azure, Google Cloud, Kubernetes and more. Orca Security is the pioneer of agentless cloud security, and is trusted by hundreds of enterprises globally. We're the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across your cloud estate spanning AWS, Azure, Google Cloud and Kubernetes. Amazon Web Services, Audit and Compliance, AWS Security, Breach Detection, Cloud Compliance, Cloud Native Architecture, Cloud Native Security, Cloud Security, Cloud Security Posture Management, CSPM, Cloud Workload Protection, Container Security, Cybersecurity, Google Cloud Platform, Host Security, Infrastructure as Code, Investigation Analysis, Kubernetes, Microsoft …

Type: Startup Activities: IT Services Technologies: Cybersecurity

13 4 9 435
Trimarc Trimarc

Securing the Enterprise | Trimarc performs Active Directory, Azure AD, & VMware security assessments. Trimarc is a professional services company based out of Washington, DC that helps organizations better secure their enterprise, specifically Active Directory (AD) & Azure AD, and VMware. Our team members have operational and security experience in enterprise environments & this expertise enables us to more quickly and effectively help improve our customers’ security posture. Trimarc’s methodology leverages our internal research and custom tooling which better discovers multiple security issues attackers could exploit. Our deep understanding of Microsoft & VMware technologies and typical security issues/misconfigurations enable us …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 14
CyberMDX - A Forescout Company CyberMDX - A Forescout Company

CyberMDX is an IoT security leader dedicated to protecting the quality care of health delivery worldwide. CyberMDX provides cloud-based cyber security solutions that support the advancement of The Internet of Medical Things. The CyberMDX solution identifies endpoints and assesses vulnerabilities to detect, respond to, and prevent cyber incidents. Deployed worldwide, CyberMDX is designed to integrate with our customers' existing environments through its scalable, easy-to-deploy and agentless solution. Follow us here for posts on the latest trends, technologies, and management techniques impacting healthcare administration. Healthcare IT Security, Medical Devices, Artificial Intelligence, Cyber Threats, Hacking, Information Security, Advanced Persistent Threats, Network Visibility, …

Type: Startup Activities: healthtech IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity IoT

5 1 3 14
Firedome Firedome

Democratizing Endpoint Protection for IoT Firedome protects enterprises against supply chain and insider threat attacks by securing the most vulnerable point of entry in organizations. Pioneering Endpoint Protection for IoT, Firedome works with IoT vendors, arming connected devices with Endpoint Protection, and enables CISO’s to secure the weakest links in their organizational network. The company was founded by top security veterans, with a globally distributed team of cyber, embedded, research and analysis experts. IoT Security, Internet of Things, Connected Devices, Cybersecurity, Endpoint Protection for IoT, Insider Threat Attack Protection, Supply Chain Attack Protection, and Network Security

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

5 0 2 26
The South East Cyber Resilience Centre The South East Cyber Resilience Centre

The SECRC is working with local businesses and supply chain to strengthen cyber resilience in the South East region. The South East Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third-sector organisations in the region against cybercrime. Working with local Universities and the Police forces in Thames Valley, Sussex, Surrey and Hampshire, provides us with access to the latest local as well as national information on emerging cyber threats, criminal trends, best practice for cyber resilience and new technology to provide you with timely advice to prepare and protect your business, staff and clients from …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

9 0 8 11
EuskalHack EuskalHack

[Automatic translation follows] EuskalHack Computer Security Association The EuskalHack Computer Security Association is a non-profit organization established in Donostia and made up of various professionals linked to computer security and computer forensics research. Our objective is to promote the community and culture regarding digital security to any type of interested public, whether public or private, through the promotion and dissemination of mainly technical knowledge. We work to promote activities such as the organization of seminars and conferences, where we disseminate and share advances and research achieved in the national and international sector. Likewise, we promote collaboration among the attending public, …

Tags: H2020 Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

2 1 2 1
IDPro® IDPro®

Globally fostering ethics, excellence, and engagement in the practice and profession of digital identity. IDPro® is the organization that: * helps define, support, and improve the digital identity profession globally * facilitates identity practitioners interacting with, learning from, and giving back to their professional community * enables identity technology and service providers to interact with identity professionals in thoughtful, respectful, and valuable ways *provides a collective voice for the digital identity and access management industry to policy makers identity management, professional development, and digital identity

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

3 1 2 18
The Media Trust The Media Trust

Digital trust & safety platform for safeguarding your customer experience across digital assets (web, mobile, apps, etc) Today’s digital ecosystem relies on The Media Trust to safeguard the consumer experience. We fix the issues that harm your customers, drive data breaches, violate regulations, impede revenue, and tarnish your brand. Acting as your audience, our digital safety platform protects the website/mobile app user experience so you can better monetize and govern your digital assets. Working with the world’s largest, most-heavily trafficked digital properties and their partners, The Media Trust delivers real-time security, data privacy, performance management, and quality assurance solutions that …

Type: SMB Activities: martech Technologies: Cybersecurity

3 0 2 66
Center for Internet Security Center for Internet Security

Leading the global community to secure our ever-changing connected world. The Center for Internet Security, Inc. (CIS®) makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovation. We are a community-driven nonprofit, responsible for the CIS Controls® and CIS BenchmarksTM, globally recognized best practices for securing IT systems and data. We lead a global community of IT professionals to continuously evolve these standards and provide products and services to proactively safeguard against emerging threats. Our CIS Hardened Images® provide secure, on-demand, scalable computing environments in the cloud. CIS is home …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

1 0 0 482
Network Intelligence Network Intelligence

Cybersecurity service provider specializing in Security Assessments,ISO27001,PCI DSS,MSS, ICS Security & Cloud Security Leading provider of digital security services to clients across the globe. Our service portfolio covers Managed Detection and Response, Vulnerability Management, Risk Management, Privacy and Compliance, as well as an expansive portfolio of training programs. Information Rights Management, Penetration Testing, Vulnerability Assessment, Web application security, DLP, PCI DSS, ISO 27001, SCADA Assessment, Risk Assessment, Breach Response, Compliance, CoBIT, PA DSS, Sharepoint Security, DDos, MDM, 2FA, WAF, DAM, SOC, Managed Security Services (MSS), SWIFT CSP Audit, Cloud Security, and ICS security

Type: SMB Activities: IT Services privacytech Technologies: Cybersecurity

1 0 1 683
Confidential Computing Consortium Confidential Computing Consortium

A community focused on projects securing data in use and accelerating the adoption of confidential computing. The Confidential Computing Consortium (CCC) brings together hardware vendors, cloud providers, and software developers to accelerate the adoption of Trusted Execution Environment (TEE) technologies and standards. CCC is a project community at the Linux Foundation dedicated to defining and accelerating the adoption of confidential computing. It will embody open governance and open collaboration that has aided the success of similarly ambitious efforts. The effort includes commitments from numerous member organizations and contributions from several open source projects. Confidential Computing protects data in use by …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

1 1 0 9
Cylus Cylus

Cybersecurity on Track Cylus provides rail operators with a specialized cybersecurity solution for operational rail technology systems, ensuring service availability and safety. Combining deep expertise in rail and cybersecurity, Cylus has pioneered a comprehensive rail tech security platform that delivers real-time asset visibility and threat detection and response capabilities across heterogeneous operational rail technology environments. Delivering deep rail context and rail framework compliance to customers across the globe, Cylus is leading the way with a cybersecurity solution that reduces risks and ensures compliance in the face of escalating cyber threats. Cybersecurity and Railways

Type: Startup Activities: IT Services Technologies: Cybersecurity

10 2 8 59
CYREBRO CYREBRO

The cloud-based interactive SOC platform CYREBRO is on a mission to completely revolutionize cybersecurity operations by putting the power of a full-fledged Security Operations Center (SOC) in the hands of any user in any organization. Our true 24/7/365 ML-backed Managed Detection & Response solution rapidly detects, analyzes, investigates and responds to cyber threats. From strategic monitoring to proactive threat hunting, accelerated incident response, and enhanced compliance, the full scope of needs is covered. This way, both Fortune 500 companies and SMBs alike can equally and profoundly improve their security posture with clarity, simplicity, and cost-efficiency. Cyber, Cyber Intelligence, Forensics, APT, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 1 5 143
Cyberint Cyberint

We turn intelligence into actions to proactively and effectively defend businesses against cyber threats Cyberint, the Impactful Intelligence company, fuses threat intelligence with attack surface management, providing organizations with extensive integrated visibility into their external risk exposure. Leveraging autonomous discovery of all external-facing assets, coupled with open, deep & dark web intelligence, the solution allows cybersecurity teams to uncover their most relevant known and unknown digital risks - earlier. Global customers, including Fortune 500 leaders across all major market verticals, rely on Cyberint to prevent, detect, investigate, and remediate phishing, fraud, ransomware, brand abuse, data leaks, external vulnerabilities and more, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 0 4 150
Upstream Security Upstream Security

Making Smart Mobility Safe and Secure. For Everyone. Upstream Security provides a cloud-based data management platform purpose-built for connected vehicles, delivering unparalleled automotive cybersecurity detection and response (V-XDR) and data-driven applications. The Upstream Platform unlocks the value of vehicle data, empowering customers to build connected vehicle applications by transforming highly distributed vehicle data into centralized, structured, contextualized data lakes. Coupled with AutoThreat® Intelligence, the first automotive cybersecurity threat intelligence solution, Upstream provides industry-leading cyber threat protection and actionable insights, seamlessly integrated into the customer’s environment and vehicle security operations centers (VSOC). Upstream’s customers include some of the world’s leading automotive …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity Data Analytics SaaS

16 2 15 132
QEDIT QEDIT

Add security, privacy and scale to your blockchain infrastructure using Zero-Knowledge-Proofs and applied cryptography Founded in 2016 by a world-class team of accomplished tech entrepreneurs, researchers, and developers, QEDIT has emerged as a global leader in the field of Zero-Knowledge Proofs. The company comprises industry experts and professionals with a passion for applied maths and is overseen by a Scientific Advisory Board that includes world-renowned cryptographers from leading academic institutions all over the globe. QEDIT is leading the standardization of Zero-Knowledge Proofs through the ZKProof.org Workshops, and builds production-grade ZKP systems for blockchain. We are a growing startup and always …

Type: Startup Activities: IT Services privacytech Technologies: Blockchain/Cryptocurrency

7 3 0 13
BioCatch BioCatch

Unlocking the power of behavior to create a digital world where identity, trust and ease seamlessly co-exist. BioCatch is the leader in Behavioral Biometrics which analyzes an online user’s physical and cognitive digital behavior to protect individuals and their assets. Our mission is to unlock the power of behavior and deliver actionable insights to create a digital world where identity, trust and ease seamlessly co-exist. Leading financial institutions around the globe use BioCatch to more effectively fight fraud, drive digital transformation and accelerate business growth. With over a decade of analyzing data, over 60 patents and unparalleled experience, BioCatch continues …

Type: Startup Activities: IT Services Technologies: Cybersecurity

13 3 13 319
C2A Security C2A Security

The only risk-driven DevSecOps provider that addresses the specific needs of automotive and mobility companies. C2A Security is the only risk-driven DevSecOps provider that addresses the specific needs of car makers and mobility companies. Cyber Security, Automotive, Cybersecurity lifecycle management , Embedded security solutions , TARA, and electric vehicles

Type: Startup Activities: transporttech Technologies: Cybersecurity

19 1 18 39
SecBI - Universal XDR (Acquired by LogPoint) SecBI - Universal XDR (Acquired by LogPoint)

eXtended Detection and Response SecBI has evolved the traditional siloed approach in cybersecurity to an XDR Platform for a cross-product integration of network, endpoints, and cloud security tools to deliver automated smart threat detection and response. Without the need for agents, SecBI’s XDR maximizes organizations’ investment in their existing security tools and provides end-to-end protection, including against stealthy, low and slow attacks that cost organizations dearly. SecBI is currently used by financial institutions, telecoms, retailers, and manufacturing enterprises worldwide. For more information, visit: www.secbi.com or write: info@secbi.com Security Operations Centre SOC, Investigation, Cyber Security, start up, Advanced Threat, Threat Detection, …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

0 0 0 2
Cato Networks Cato Networks

Ready for Whatever’s Next. WE ARE SASE. SD-WAN, Firewall as a Service, Global Backbone, Converged Network and Security, MPLS Alternative, SASE, Multi Cloud Networking, Remote Access, ZTNA, SASE, Secure Access Service Edge, SSE, CASB, and ZTE

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 0 2 913
Kovrr Kovrr

Enabling risk professionals to financially quantify cyber risk. Kovrr financially quantifies cyber risk on demand. By leveraging Kovrr’s Cyber RIsk Quantification Platform, CISOs, CRO’s and Boards can make more intelligent data driven decisions about how to manage the companies' cyber risk (i.e., whether to accept, mitigate, or transfer the risk), prioritizing new technology investments, and measuring the ROI of those investments in specific controls or programs. Founded in 2017, Kovrr is led by a team of (re)insurance professionals, cyber intelligence experts, catastrophe modelers, and experienced software developers. Cyber Risk Modeling, Cyber Underwriting, Cyber Insurance Analytics, Artificial Intelligence, Threat Intelligence, financial …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I.

5 2 3 41
Radiflow Radiflow

Taking the guesswork out of OT security We believe there should be no compromise on ICS or OT security. You don’t want to realize the importance of cybersecurity after the fact. We believe that you can’t protect what you can’t see, and you can’t manage what you don’t know. Radiflow is on a mission to take the guesswork out of OT security. We empower our customers to prioritize their actions with our industrial threat detection and risk management solutions. With Radiflow CISO’s can make decisions and take action based on data. Radiflow’s team is known for its cybersecurity expertise and …

Type: Startup Activities: IT Services Technologies: Cybersecurity

5 1 4 70
ammune.ai ammune.ai

ammune.ai protects APIs & API-based apps, ammune.ai is a cybersecurity company (formerly "L7 Defense") providing an autonomous AI-based API security solution.

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity IoT

5 2 0 10
Guardicore Guardicore

Guardicore is the segmentation company disrupting the legacy firewall market. Our software-only approach is decoupled from the physical network, providing a faster alternative to firewalls. Built for the agile enterprise, we offer greater security and visibility in the cloud, data-center and endpoint. Cloud Security, Data Center Security, Legacy Firewall Alternative, Hybrid Cloud Security, Micro-Segmentation, Software-Defined Segmentation, Network Security, and Network Segmentation

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 2 5 110
XM Cyber XM Cyber

Uncover attack paths to critical assets in cloud & on-prem, eradicate risk with a fraction of the effort #SeeAllWays XM Cyber is a leading hybrid cloud security company that’s changing the way organizations approach cyber risk. XM Cyber transforms exposure management by demonstrating how attackers leverage and combine misconfigurations, vulnerabilities, identity exposures, and more, across AWS, Azure, GCP and on-prem environments to compromise critical assets. With XM Cyber, you can see all the ways attackers might go, and all the best ways to stop them, pinpointing where to remediate exposures with a fraction of the effort. Founded by top executives …

Type: Startup Activities: IT Services Technologies: Cybersecurity

9 2 4 327
Cymulate Cymulate

Empowering companies to manage, control, and optimize their cybersecurity posture end-to-end. Designed for companies that want to manage their security posture against the evolving threat landscape. Cymulate's SaaS-based platform deploys within an hour, enabling security professionals to continuously challenge, validate and optimize their cybersecurity posture end-to-end across the MITRE ATT&CK® framework. The platform provides threat intelligence-led risk assessments that are simple to deploy out-of-the-box, and for all maturity levels. It also provides an open framework to create and automate red and purple teaming by generating penetration scenarios and advanced attack campaigns tailored to their unique environments and security policies. Cymulate …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 3 231
Randori, an IBM Company Randori, an IBM Company

Your Trusted Adversary | Attack Surface Management | Continuous Red Teaming Randori, an IBM Company is your trusted adversary. Recognized as a leader in offensive security, Randori, an IBM Company combines attack surface management (ASM) and continuous automated red teaming (CART) in a single unified platform to provide a continuous, proactive, and authentic offensive security experience. Relied upon by Meijer, Greenhill Inc, FirstBank, NOV, Lionbridge and many more, Randori helps companies stay one step ahead of attackers by continuously discovering what's exposed and validating risks as they arise. Discover your true attack surface today at www.Randori.com Adversary Simulation, Red Team …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 70
Garrison Garrison

Ultra-secure isolation technology utilising hardsec principles to solve secure browsing, VDI and secure data transfer. Are you brave enough to click this link? http://bit.ly/2xdmVRw Malware and data loss: the web can be a dangerous place. You could just block access to everything except the trusted cloud services that the business relies on – great for security, but terrible for users. Ultra-secure browsing solves the problem. Security and enablement in a single package. Silicon Assured Video Isolation (Garrison SAVI®) is a Secure Remote Browsing technology that means risky web content is never processed on the user’s endpoint device. Designed with the …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 1 1 189
Cryptonite Cryptonite

At Cryptonite, our goal is to help enterprises regain the upper hand against attackers, by providing a platform that addresses fundamental weaknesses in today’s networks. After five years of research and development, Cryptonite was founded in 2015 with a focus on next-generation solutions that defend networks proactively—protecting enterprise networks and giving security professionals time to investigate and respond to cyber threats before it’s too late. Cryptonite’s security platform "CryptoniteNXT"​ establishes a Zero Trust protected environment by implementing an active defense that eliminates full categories of the most common tactics used by adversaries and malicious code.

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 2
Veracity Industrial Networks Veracity Industrial Networks

Veracity Industrial Network’s platform brings visibility, control, and resiliency to OT networks. Veracity delivers a resilient, secure industrial network that provides an on-premises, centralized configuration, control, and monitoring solution that tracks all connected devices and their communications. The Veracity OT Network Management Platform is a secure-by-default network that moves beyond the detection and alerting of cyber events into a resilient network that reduces the attack surface by design. Veracity Industrial Networks reduces the complexity of the OT network by repurposing the switch infrastructure to ensure communication between devices is determined by the system’s design. Veracity provides an innovative and comprehensive …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 1 7
Arcanum Cyber Security Arcanum Cyber Security

CAA & NCSC Certified Cyber Security Consultancy; CREST Approved Pen Testing Ensuring Cyber Space is a safe place for you to do business. For Defence. For Government. For Enterprise. For SME Arcanum Information Security are a specialist Cyber Security Consultancy formed in 2008. We work alongside companies of all sizes and our projects range from a single day to providing onsite customer support for 2 years. The diversity of our expertise means we can work with you both in the UK and abroad to ensure your security measures are in place. Arcanum Cyber Security have been accredited as a supplier …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

3 0 2 49
Penten Penten

Penten offers world-leading Secure Mobility, Applied AI and Tactical Communications Security solutions. Penten is an Australian-owned, cyber technology business, delivering new future cyber technologies to enable defence and government. Our work is important and essential, not only for the people we’re building it for, but for the people whose safety and security it protects. We are proud to be recognised as a world leader and innovator of cyber security products and services in Australia and are leaders in secure mobility, cyber deception and cyber engineering services. Winner – 2018 Telstra Business of the Year (National and ACT awards winner) Winner …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I.

1 0 1 114
Onapsis Onapsis

Protecting the business applications that power the global economy. Onapsis protects the business-critical applications that power the global economy including ERP, CRM, PLM, HCM, SCM and BI applications from SAP®, Oracle® and leading SaaS providers. Onapsis proudly serves more than 300 of the world’s leading brands including 20% of the Fortune 100 and partners with leading consulting and audit firms such as Accenture, Deloitte, IBM, PwC, and KPMG. The Onapsis Research Labs is responsible for the discovery and mitigation of more than 800 zero-day business-critical application vulnerabilities. ERP security, SAP security, Oracle EBS security, cybersecurity, and business-critical application security

Type: Startup Activities: IT Services Technologies: Cybersecurity SaaS

13 2 9 311
Darktrace Darktrace

Helping over 9,000 organizations worldwide minimize cyber disruption. Darktrace's mission is to free the world from cyber disruption. Its AI technology is relied on by over 9,000 customers worldwide to prevent, detect, respond, and heal from cyber-attacks. Headquartered in Cambridge, UK, the company has over 2,200 employees and over 30 offices worldwide. Darktrace was named one of Fast Company’s ‘10 Most Innovative Companies in Artificial Intelligence’ for 2022 Cyber security, Cyber defense, Information security, Intelligence, Information technology, Machine learning, Artificial Intelligence, and ransomware protection

Type: Large company Technologies: Cybersecurity A.I. A.I. - Machine Learning

12 3 8 2,587
Chaincode Labs Chaincode Labs

Bitcoin research and development group Chaincode Labs is a bitcoin research and development center based in New York City. Chaincode Labs exists to support engineers and researchers making significant contributions to bitcoin and related technologies.

Type: SMB Activities: deeptech IT Services Technologies: Blockchain/Cryptocurrency

0 0 0 22
C4ISRNET C4ISRNET

Defense and government leaders rely on us for info on the modern battlefield. Daily updates @ c4isrnet.com/newsletters C4ISRNET (formerly C4ISR & Networks) is the media brand committed to dynamic and fast growing network-based defense community. We provide the most in-depth, focused and knowledgeable news, analysis and insight on defense IT, cyber defense, communications, GEOINT, unmanned systems, sensors and related C4ISR systems. These are the networked technologies enable situational awareness for warfighters and the DoD enterprise, transforming the world of defense. C4ISRNET offers a monthly magazine, a website - C4ISRNet.com - digital and custom media products, and events such as the …

Type: Media

1 1 0 5
Cyber Security Awards Cyber Security Awards

Award ceremony for the cybersecurity industry. Rewarding excellence and innovation for all in cybersecurity. The Cyber Security Awards were established in 2014 to reward the best individuals, teams, and companies within the cybersecurity industry. Excellence and innovation are core themes, throughout all categories. The Cyber Security Awards team reviews the industry, looking for the best possible applicants. We encourage all those, who are committed to progressing the industry, to apply. Our judges come from varied backgrounds and are some of the most well-regarded individuals within the industry. awards and cyber

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

1 0 0 5
RootedCON RootedCON

[Automatic translation follows] Bis vincit qui se vincit in victoria Rooted is the organization that supports the Rooted CON Security Congress, which is currently the Security and Technology Congress with the largest number of attendees in Spain. This congress takes place in Madrid once a year, generally in the first week of March, with very high-level speakers and exceptional sponsors from all market sectors. Rooted, as an organization, is responsible for coordinating all the necessary activities so that Rooted CON develops with the best quality, both in the management of the Congress itself, and in the content and speakers selected …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

10 0 9 12
Trustwave Trustwave

A global cybersecurity leader in managed detection and response (MDR) and managed security services (MSS). Trustwave is recognized as a global security leader in managed security services (MSS) and managed detection and response (MDR). With more than 2,000 world-class security professionals operating on behalf of clients across 96 countries, Trustwave helps organizations across the globe detect and respond to threats 24x7 in the hybrid multi-cloud world. The elite Trustwave SpiderLabs team provides award-winning threat research and intelligence, which is infused into Trustwave services and products to fortify cyber resilience in the age of advanced threats. . For more information, visit …

Type: Large company

14 2 1 1,153
Zscaler Zscaler

We make it easy to secure your cloud transformation. Get fast, secure, and direct access to apps without appliances. Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud first world. Its flagship services, Zscaler Internet Access and Zscaler Private Access, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100% cloud-delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances or hybrid solutions are unable to match. Used in more than 185 countries, Zscaler operates the world’s largest cloud …

Type: Large company Technologies: Cybersecurity

14 1 14 7,496
CrowdStrike CrowdStrike

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities. Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, …

Type: Large company Technologies: A.I. A.I. - Machine Learning Cybersecurity

16 7 11 7,871
Cloudflare Cloudflare

At Cloudflare, we have our eyes set on an ambitious goal — to help build a better Internet. Cloudflare, Inc. (NYSE: NET) is the leading connectivity cloud company. It empowers organizations to make their employees, applications and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare’s connectivity cloud delivers the most full-featured, unified platform of cloud-native products and developer tools, so any organization can gain the control they need to work, develop, and accelerate their business. Powered by one of the world’s largest and most interconnected networks, Cloudflare blocks billions of threats online for its customers every …

Type: Large company Technologies: Cybersecurity

69 20 30 4,147
Bishop Fox Bishop Fox

Outfox Attackers Bishop Fox is recognized as the leading authority in offensive security, providing solutions ranging from continuous penetration testing, red teaming, and attack surface management to product, cloud, and application security assessments. Enterprises have been told that breaches are inevitable. But we don’t accept that. We focus on offensive security because we believe securing modern organizations requires a "forward defense" approach that proactively uncovers and eliminates exposures before they are exploited. Over the past 16 years, we’ve worked with more than 25% of the Fortune 100, 8 of the top 10 global tech companies, and hundreds of other organizations …

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 0 1 377
LOCKCODE LOCKCODE

...empowering and protecting the C-Suite in cyber space About Lockcode Lockcode is a niche technology risk, information and cyber security consultancy, originally established in 2004 to provide certified professional security services to the HMG defence and intelligence community, now we both buy businesses and help business owners grow their businesses. About Our Founder Lockcode's female founder has worked in HMG Infosec, Information Assurance and Cyber Security for over 22 years, certified by the Authority at the highest level, and science, technology, engineering for over 40 years. Are You a Business Owner looking to sell? We are currently looking to purchase …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 1 0 1
Smart Cybersecurity Network Smart Cybersecurity Network

[Automatic translation follows] SERENE-RISC is... an integrated cybersecurity network that connects those who generate knowledge with those who put it into practice. SERENE-RISC supports collaboration between universities, industry, government and non-profit organizations across many sectors and disciplines. The network develops tools that facilitate the uptake and application of world-class research results. It's also... a network including more than 40 academics across 10 disciplines at 24 post-secondary institutions around Canada and more than 24 public and private sector members, and 6 NPO. Our key values: →Inclusive →Impartial →Empowering →Evidence-based ----- SERENE-RISC is... an integrated cybersecurity network that connects those who generate …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 1
EC-Council EC-Council

EC-Council is the leading IT and e-Business certification awarding body and the creator of the world famous Certified Ethical Hacker (#CEH), Computer Hacking Forensics Investigator (CHFI) and Certified Penetration Testing Professional (CPENT)/ Licensed Penetration Tester (Master). EC-Council has trained over 80,000 individuals and certified more than 30,000 security professionals from such fine organizations as the US Army, the FBI, Microsoft, IBM and the United Nations. EC-Council's certifications are recognized worldwide and have received endorsements from various government agencies including: - the US Federal Government via the GI Bill, - National Security Agency (NSA) and the Committee on National Security Systems …

Type: Large company

0 0 0 1,307
HackMadrid %27 HackMadrid %27

[Automatic translation follows] we are a hacker community located in Madrid, Spain. Hacking culture community HackMadrid organizes a community for people who want to get started in the "hacking" culture and experienced hackers who have years of experience working on different projects for governments and companies. HackMadrid members must be at the forefront of research, experimentation and regularly attend community meetings. Being able to participate in international hacking conferences around the world (Defcon, BlackHat, HOPE, OWASP AppSec, Hacker Halted, among others). HackMadrid seeks to develop and drive the participation of the entire hacker community through regular meetings, presentations, workshops and …

Tags: H2020 Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 6
Telefónica Tech Cyber Security & Cloud Telefónica Tech Cyber Security & Cloud

Will you join the conversation? #WeAreTelefónicaTech We accelerate tech adoption through our services of Cyber Security, Cloud, IoT, Big Data, AI and Blockchain. Follow on our social media channels: • Twitter: https://twitter.com/TefTech_EN • Linkedin Telefónica Tech: https://www.linkedin.com/company/telefonicatech • LinkedIn Telefónica Tech AI of Things: https://www.linkedin.com/showcase/telefonicatech-aiofthings • Youtube: https://www.youtube.com/user/telefonicatech • Instagram: https://www.instagram.com/telefonicatech • Twitch : https://www.twitch.tv/telefonicatech • Blog: https://business.blogthinkbig.com/telefonica-tech/ Security, Identity and Privacy, Threats and Vulnerabilities, Secure Infrastructure, Confidence on the Internet, Seguridad, Identidad y Privacidad, Amenazas y Vulnerabilidades, Infraestructuras Seguras, Confianza en Internet, cybersecurity, ciberseguridad, cloud, nube, and cloud computing

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity A.I. Blockchain/Cryptocurrency Data Analytics IoT

20 2 14 5
Outpost24 Spain (ex-Blueliv) Outpost24 Spain (ex-Blueliv)

[Automatic translation follows] You reduce your cyber risk with targeted, dynamic and actionable threat intelligence Outpost24 is a European multinational of Swedish origin that helps organizations improve their cyber resilience with a wide range of Continuous Threat Exposure Management (CTEM) solutions. Our intelligent cloud-based platform unifies asset management, automates threat assessment, and quantifies cyber risks in the specific context of each business. More than 2,500 customers in more than 60 countries trust us to detect their security risks before cybercriminals do. Cyber ​​Threat Intelligence, Data and credential theft, Malware and APTs, Fraud Detection, Botnets, Credit Card Fraud Detection, Threat Intelligence, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

5 1 2 36
NetNordic Sverige NetNordic Sverige

[Automatic translation follows] We breathe technology and love smart solutions. NetNordic - The Best Companion. NetNordic's focus is to create and deliver smart/intelligent integrations specialized in solutions and services for critical infrastructure in the area of ​​cyber security, secure data centers, secure networks and secure collaboration. As a Nordic provider of cloud and infrastructure services, we improve and strengthen our customers' business-critical operations. NetNordic simplifies the complexity. We use innovative market-leading technology, tailored and specialized solutions to meet your needs – specific to your industry. Together with our competent technical advisors and highly certified IT consultants, we improve your business …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 132
PwnDefend PwnDefend

cyber - eat - sleep - repeat! PwnDefend is a cyber security awareness, advisory and educational organisation with a mission to spread cyber security knowledge throughout the world. PwnDefends does this to empower people and organisations to protect, detect and respond to current and emerging cyber threats in the modern technology driven age. With a unique approach of using offensive capabilities as a learning mechanism such as Capture the Flag games! Ultimately our aim is to help current and future generations live in a world not ruled by digital fear, uncertainty and doubt.

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 2
Ericom Software Ericom Software

Cybersecurity Unit of Cradlepoint and leading provider of Zero Trust cloud security solutions. Ericom Security and Cradlepoint, part of Ericsson, are expanding the scope and impact of zero trust security services to protect organizations from advanced threats. Ericom’s flagship Security Service Edge (SSE) cloud platform leverages innovative remote browser isolation, application isolation, microsegmentation, and virtualization technologies. remote access, secure browsing, VDI, cloud computing, enterprise mobility, web security, virtual desktops, desktop access, application delivery, RDP optimization, RDS / Terminal Services, browser-based access, virtualization, terminal emulation, secure connectivity, business continuity, mobile workforce, BYOD, clientless, browser isolation, zero trust browsing, software-defined perimeter, SASE, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 90
Protegrity Protegrity

Empowering businesses with Secure Data Protegrity protects the world's most sensitive data wherever it resides. Our industry-leading solutions allow businesses to finally tap into the value of their data and accelerate digital transformation timelines – without jeopardizing individuals’ fundamental right to privacy. For more than 20 years, Protegrity has delivered innovative, data-centric protection for the most sensitive data of the largest brands on the planet. We free businesses from the constraints associated with accessing and leveraging data to create better customer experiences, make intelligence-supported decisions, and fuel innovation. Data knows no boundaries and Protegrity's technology is built for data ubiquity. …

Type: SMB Activities: privacytech IT Services Technologies: Cybersecurity

4 0 4 371
شركة موالج لأنظمة المعلومات شركة موالج لأنظمة المعلومات

We are continuously sourcing products, which we feel have the potential to impact on Saudi Arabia market. . With more than 15 years of experiences, MISCO is an independent Information and Communications Technology (ICT) services provider. From the outset the decision was made to focus purely on the ICT services as well as ICT and electronic products importing and distributing; and since that time we have built a reputation in providing leading-edge, tailored ICT solutions and products for clients drawn from field experience of our Engineers and Consultants. Our people have the knowledge, expertise and know-how that simply cannot be …

Type: SMB Activities: IT Services

0 0 0 7
Integrated Computer Systems ( ICS ) Integrated Computer Systems ( ICS )

INTEGRATED COMPUTER SYSTEMS (ICS) is a Saudi Company established year 2000 to provide integrated solutions to the Saudi Market. ICS is a fast-growing information technology services and multidisciplinary business services provider in the Kingdom. ICS integrates a broad range of capabilities to help organizations of all sizes realize the full value of information technology for their organization’s utmost benefit. ICS provides the necessary skills to provide a comprehensive assessment of how an entire organization measures up against the 'world-class'​ yardstick on the information technology environment. ICS range of internationally accredited security solutions and services covers the whole spectrum of security …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 87
Secucloud GmbH - An Aryaka Company Secucloud GmbH - An Aryaka Company

Secucloud - an Aryaka company - is a worldwide provider of a cloud-based security-as-a-service platform. Secucloud GmbH, a proven SASE platform provider, delivering network security from the cloud is a wholly-owned subsidiary of Aryaka Networks. Based in Hamburg, Germany, Secucloud GmbH offers an innovative platform designed to provide an all-in-one, global, cloud-based firewall-as-a-service, secure web gateway with advanced threat protection capabilities. The platform is engineered to connect all edges including WAN, Cloud, Mobile and IoT securely together. The Elastic Cloud Security System of Secucloud is unique of its kind on the market. By combining a wide variety of security systems …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

0 0 0 32
Secomba GmbH | Boxcryptor Secomba GmbH | Boxcryptor

We help you secure your company-data in the cloud, on NAS, file server, and local. Boxcryptor is the awarded encryption solution for your cloud with many satisfied customers worldwide. It's the market leader for security solutions in the area of cloud storage. Customers from over 190 countries and from all branches trust Boxcryptor and enjoy the advantages of the cloud without giving up privacy. Boxcryptor is optimized for the use with cloud storage providers such as Dropbox, iCloud, Microsoft OneDrive for Business and many more. It supports more than 30 providers on all platforms by today. The company was awarded …

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 1 5 10
Netenrich, Inc. Netenrich, Inc.

We deliver adaptive operations at petabyte scale and efficiency Netenrich boosts the effectiveness of organizations’ security and digital operations so they can avoid disruption and manage risk. Resolution Intelligence Cloud is our native-cloud data analytics platform for enterprises and services providers that need highly scalable, multitenant security operations and/or digital operations management. Resolution Intelligence Cloud transforms security and operations data into intelligence that organizations can act on before critical issues occur. More than 3,000 customers and managed service providers rely on Netenrich to deliver secure operations at scale. IT Infrastructure management, NOC services for MSPs, IT Operations Management, IT-as-a-service provider, …

Type: Large company Activities: Consulting IT Services Technologies: A.I. Data Analytics Cybersecurity A.I. - Machine Learning

5 0 2 882
WatchGuard Technologies WatchGuard Technologies

Smart Security, Simply Done WatchGuard® Technologies, Inc. is a global leader in unified cybersecurity. Our Unified Security Platform® approach is uniquely designed for managed service providers to deliver world-class security that increases their business scale and velocity while also improving operational efficiency. Trusted by more than 17,000 security resellers and service providers to protect more than 250,000 customers, the company’s award-winning products and services span network security and intelligence, advanced endpoint protection, multi-factor authentication, and secure Wi-Fi. Together, they offer five critical elements of a security platform: comprehensive security, shared knowledge, clarity & control, operational alignment, and automation. The company …

Type: Large company Activities: IT Services

4 1 6 1,016
CLUSIT CLUSIT

Associazione Italiana per la Sicurezza Informatica Clusit is the Italian Association for Information Security, a nonprofit organization devoted to promoting every aspect of information security, including awareness among IT specialists and the general public, and government advisorship and lobbying for causes relevant to information security. Members of Clusit are security customer companies, security providers, security professional and interested individuals. Information Security

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

4 0 4 67
Cyber Ireland Cyber Ireland

Providing a collective voice for Ireland's Cyber Security community. Cyber Ireland is the national cyber security cluster organisation. Launched in 2019, Cyber Ireland represents the needs of the Irish cyber security ecosystem and supports its growth. The cluster is industry-led, hosted at Munster Technological University and supported by the government through Enterprise Ireland’s Regional Technology Cluster Fund. Our Cluster Mission is to strengthen productivity and competitiveness in companies through cooperation on innovation and the transfer of knowledge between companies, academic institutions and other support actors in the cluster. Our Cluster Vision is to be the driving force that supports world-class …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

3 0 3 19
SonicWall SonicWall

Delivering real-time breach detection and prevention solutions backed by SonicWall Capture Threat Network. About SonicWall SonicWall has been fighting the cyber-criminal industry for over 30 years defending small, medium-size businesses and enterprises worldwide. Backed by research from the Global Response Intelligent Defense (GRID) Threat Network, our award-winning real-time breach detection and prevention solutions, coupled with the formidable resources of over 10,000 loyal channel partners around the globe, are the backbone securing more than a million business and mobile networks and their emails, applications and data. This combination of products and partners has enabled a real-time cyber defense solution tuned to …

Type: Large company

0 0 0 1,957
Centre for Cyber Security Centre for Cyber Security

Vi arbejder for et sikkert digitalt Danmark The Centre for Cyber Security was set up in December 2012 within the Danish Defence Intelligence Service (DDIS). As a part of the DDIS, the Centre has access to the special intelligence-based knowledge about cyber issues available to the DDIS while the attachment also creates a number of synergies. The Centre for Cyber Security is the national IT security authority, Network Security Service and National Centre for Excellence within cyber security. The Centre’s mission is to advise Danish public authorities and private companies that support functions vital to society on how to prevent, …

Type: Public

0 0 0 41
Forescout Technologies Inc. Forescout Technologies Inc.

Forescout Technologies, Inc., a global cybersecurity leader, continuously identifies, protects and helps ensure the compliance of all managed and unmanaged connected cyber assets – IT, IoT, IoMT and OT. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide vendor-agnostic, automated cybersecurity at scale. The Forescout® Platform delivers comprehensive capabilities for network security, risk and exposure management, and extended detection and response. With seamless context sharing and workflow orchestration via ecosystem partners, it enables customers to more effectively manage cyber risk and mitigate threats. IoT Security, IoT, Agentless Visibility, BYOD, Enterprise Security, Network Segmentation, …

Type: Large company

2 1 2 1,071
Imperva Imperva

Imperva helps organizations protect critical applications, APIs, and data, anywhere, at scale, and with the highest ROI. Imperva is the cybersecurity leader that helps organizations protect critical applications, APIs, and data, anywhere, at scale, and with the highest ROI. With an integrated approach combining edge, application security, and data security, Imperva protects companies through all stages of their digital journey. Imperva Threat Research and our global intelligence community enable Imperva to stay ahead of the threat landscape and seamlessly integrate the latest security, privacy, and compliance expertise into our solutions. Cyber Security, Data Security, Regulatory and Industry Compliance, Application Security, …

Type: Large company

9 2 6 1,740
Cyber Resilience Centre for London Cyber Resilience Centre for London

Providing advice and support for London based businesses. Part of a national network of police-led, not for profit CRCs. The Cyber Resilience Centre for London was launched in October 2022 to help SMEs and third sector organisations reduce their vulnerability to common cyber threats. Part of a national network of Centres, we are a collaboration between policing, academia and industry to make London the safest City in the world to do business online. Cyber, Information Security, Business Resilience, Cyber Security, Enterprise, cyberresilience, london, SMEs, businesses, and charities

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

6 0 7 23
European Union Agency for Cybersecurity (ENISA) European Union Agency for Cybersecurity (ENISA)

European Union Agency for Cybersecurity The European Union Agency for Network and Information Security (ENISA) is a centre of network and information security expertise for the EU, its Member States, the private sector and Europe’s citizens. ENISA works with these groups to develop advice and recommendations on good practice in information security. It assists EU Member States in implementing relevant EU legislation and works to improve the resilience of Europe’s critical information infrastructure and networks. ENISA seeks to enhance existing expertise in EU Member States by supporting the development of cross-border communities committed to improving network and information security throughout …

Type: Public

36 12 3 294
CERT- EU CERT- EU

Official account of the CERT for the EU institutions, bodies & agencies. Our mission is to contribute to the security of the ICT infrastructure of all European Union institutions, bodies and agencies and help our constituents prevent, detect, mitigate and respond to cyber-attacks. Please use secretariat@cert.europa.eu for interaction. Cyber Defense, Cyber Security, Cybercrime Investigation, Incident Investigation, Threat Intelligence, Cyber Operations, Threat & Vulnerability Management, and Security Incident Response

Type: Public

4 0 4 26
(ISC)2 Quad Cities Chapter (ISC)2 Quad Cities Chapter

(ISC)2 Quad Cities Chapter is a local chapter of (ISC)2, an international information security association Our mission is to support and provide members and constituents with credentials, resources, and leadership to address cyber, information, software and infrastructure security to deliver value to society. (ISC)2 is the largest not-for-profit leader in educating and certifying cyber, information, software, and infrastructure security professionals throughout their careers. President: Shadrack Roberts - https://www.shadrackroberts.com/ Member Chair: Dr. John D. Johnson - https://johndjohnson.com/ cybersecurity, information security, privacy, cyber, infosec, and information assurance

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 N/A
Fortinet Fortinet

Fortinet makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the world’s largest enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey. Network Security, Enterprise Firewall, Firewall, Intrusion Prevention System (IPS), VPN, Antivirus, Email security, Web filtering and Web Security Gateway, Antispam, Application Control and Visibility, Next Generation Firewall (NGFW), network firewall, threat research, threat intelligence, artificial intelligence, cloud security, SASE, SIEM, SD-WAN, Zero Trust Access, Cybersecurity Training, Cybersecurity Certification, Switching, Wireless, Endpoint security, SOAR, Deception Security, Sandboxing, EDR, XDR, UEBA, …

Type: Large company

9 8 1 2
Palo Alto Networks Palo Alto Networks

Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands …

Type: Large company

24 8 18 15
SINET SINET

Accelerating Cybersecurity innovation through global collaboration. SINET is a purpose-driven community that accelerates investments and innovation of early-stage and emerging growth Cybersecurity companies into the global market and has recently launched SINETConnect with 100 members. An invitation-only, highly curated Personal Trust Platform that connects: buyers, sellers, and investors and is changing the way trusted business dealings operate today and into the near future. SINET has brought its international community to life and personalized the experience for Risk Executives, VCs, and entrepreneurs within this virtual marketplace. SINET’s mission is to advance innovation and enable global collaboration between the public and private …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

19 0 19 22
Open Information Security Foundation Open Information Security Foundation

Open Information Security Foundation (OISF) is the US non-profit that owns and manages Suricata. The Open Information Security Foundation (OISF) is a non-profit foundation organized to build a next-generation IDS/IPS engine. The OISF has formed a multi-national group of leading software developers in the security industry. In addition to developers and a consortium consisting of leading cyber security companies, OISF has engaged the open source security community to identify current and future IDS/IPS needs and desires. OISF’s primary goal is to remain on the leading edge of open source IDS/IPS development, community needs, and objectives. This is only attainable if …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

3 0 3 14
The Diana Initiative The Diana Initiative

A conference focused on Women, Diversity, and Inclusion in Information Security The Diana Initiative is a 501c3 non-profit corporation registered in Las Vegas Nevada. Our mission is to Elevate, Inspire, and Support women and non-binary people of all races, cultures, and backgrounds through every stage of their Information Security career with Education, Collaboration, and Resources offered online and at inclusive & welcoming conferences. During "Hacker Summer Camp", The Diana Initiative hosts a two day conference celebrating diversity, women in security, and how to pursue a career in information security and technology. We are a conference focused on Women, Diversity, and …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 13
Security Network Munich Security Network Munich

One of Europe’s leading networks for information and cyber security Security Network Munich (Sicherheitsnetzwerk München) is an association of leading players, organisations and research institutes in the field of information and cyber security in the greater Munich area. Our goal is to foster industry cooperation through joint research and innovation projects. Our members meet regularly to discuss pressing industry challenges with government and research institutions. We also convey the industry ́s insights and concerns to a political and broader societal audience, through education and communication, spreading awareness of the importance of information security. Information Security and Cyber Security

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

1 1 0 4
Corero Network Security (LSE: CNS) (OTCQB: DDOSF) Corero Network Security (LSE: CNS) (OTCQB: DDOSF)

Securing your peace of mind with over a decade of expertise in flexible, automatic, hybrid and on-prem #DDoS protection. We are Corero Network Security (LSE: CNS) (OTCBQ: DDOSF), and for over a decade, our customers' needs have sculpted our SmartWall ONE DDoS protection platform. From just DDoS detection to offering DDoS protection-as-a-service, we meet you exactly where you are, providing precisely the protection you need. We believe no customer should alter their environment for a vendor; instead, we flexibly mold our robust, automatic, on-prem solutions to safeguard your business against the evolving DDoS threats. We know that organizations face continued …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 119
Angelbeat Angelbeat

Angelbeat organizes webinars and live events on Technology and Sustainability. Angelbeat organizes webinars and live seminars in 60 North American cities, featuring AWS, Microsoft, Google and other industry leaders. It has held over 1,500 seminars since its founding in 1999, drawing hundreds of thousands of attendees. Content is updated annually and focus top IT issues, including cloud, security, application, data and more. More information is available at www.angelbeat.com, plus use the #angelbeat hashtag on all social media platforms. www.twitter.com/angelbeat www.youtube.com/angelbeat, www.facebook.com/angelbeat, www.instagram.com/angelbeat Angelbeat also organizes programs on sustainability, EV Charging, Net Zero and related topics Events, Seminars, Public Speaking, IT, …

Type: Media

4 0 4 10
Rapid7 Rapid7

Organizations around the globe rely on Rapid7 technology, services, and research to securely advance. The visibility, analytics, and automation delivered through our Insight cloud simplifies the complex and helps security teams reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks. Information Security, Vulnerability Management, Penetration Testing, Compromised User Detection, Mobile Risk Management, Enterprise Control Monitoring, Strategic Services, Security Programs, Application Testing, Automation, Analytics, and Intrusion Detection

Type: Large company

6 3 3 2,925
SANS Institute SANS Institute

SANS is the most trusted resource for information security training, cyber security certifications and research. SANS is the most trusted and by far the largest source for information and cybersecurity training and certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - Internet Storm Center. Information Security Training, Digital Forensics Courses, Cyber Security Training, Security Awareness Training, Penetration Testing Courses, Application Security Courses, Security Leadership Courses, Industrial Control Systems Security Courses, cloud security courses, blue …

Type: Large company

0 0 0 1,510
Smart Human Capital Smart Human Capital

[Automatic translation follows] We are a Spanish consulting firm with specialized international implementation in Security, Intelligence and IT. We are a Spanish consulting firm with international development specialized in Security, Intelligence, Digital Detection and New Information Technologies. Our professionalism is backed by more than 20 years of experience in the IT sector, offering solutions adapted to each client with the guarantee of a service based on quality, efficiency and the commitment of our team. Our 5 major business areas are: • Security: Cybersecurity services aimed at obtaining the best conditions for protecting infrastructure against possible threats. • Intelligence: Intelligence Services …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 46
Nord Security Nord Security

Nord Security is the leader in providing digital security and privacy solutions for individuals and businesses. Nord Security is one of the world’s leading providers of digital security and privacy solutions for businesses and individuals. We are a home for advanced security solutions that share the Nord brand and values. Today, our products are used by millions of customers worldwide and praised by all the major cybersecurity experts and top media outlets. Since 2012, we have been creating and building award-winning products: NordVPN - the fastest VPN on the planet, built to protect your online traffic and privacy with next-generation …

Type: Large company

5 0 5 1,448
UITSEC Corporation UITSEC Corporation

More Secure Than Ever UITSEC International, which has been among the leading companies in Turkey in the field of product-independent cybersecurity for many years, is a technology company that leads the development of cybersecurity technologies while providing cybersecurity solutions to many institutions worldwide with its expert staff. UITSEC International contributes to the progress of the sector by working together with technology institutes around the world. Accordingly, UITSEC International, which participates in the workshops and supports many international associations and organizations, has participated among the numbered companies listed in the Trusted Introducer "UITSEC Cyber Incident Response Team (UITSEC-CERT)" by meeting all …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 11
Information Systems Security Association (ISSA) Information Systems Security Association (ISSA)

Developing and Connecting Cybersecurity Leaders Globally The Voice of the Information Security Professional Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications and peer interaction opportunities that enhance the knowledge, skill and professional growth of its members. Developing and Connecting Cybersecurity Leaders Globally

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 184
Skybox Security Skybox Security

Secure more. Limit less. Prevent breaches before they happen. Get the intelligence and context you need to reduce cyber exposure at speed and scale. Skybox Security is the only platform that collectively visualizes and analyzes hybrid and multi-cloud networks, providing full context and understanding of the attack surface. Security Analytics, Firewall Auditing, Vulnerability Management, Network Auditing, Threat Intelligence Management, Firewall Change Management, Attack Surface Visibility, Modeling and Simulation, Rule Lifecycle Management, Vulnerability Assessment, and Attack Simulation

Type: SMB Activities: IT Services Technologies: Cybersecurity

3 2 1 292
Panda Security Panda Security

Reinventing Cybersecurity to lead the European market for EDR systems Since its inception in 1990, headquartered in Spain, Panda Security has become one of the foremost European company in advanced cybersecurity solutions and services, as well as management and monitoring tools. Consistently maintaining a spirit of innovation, Panda has marked a number of historical milestones in the industry. Today, Panda Security is the leading European vendor of EDR systems, with European shareholders, headquarters, technology and cloud platform. Thanks to our visionary concept of the advanced cybersecurity model that combines solutions and services, we are able to provide a highly detailed …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 399
Africa Cyber Defense Forum, ACDF® Africa Cyber Defense Forum, ACDF®

The Africa Cyber Defense Forum is a continental platform for public -Private sector cooperation. The Africa Cyber Defense Forum is a continental platform for public-private sector cooperation. The forum through its well curated and world class content, engages top level government, Technology experts, business leaders and other leaders of society to shape the continental, regional and industry agendas in the African cyber space. Our activities are anchored in our passionate pursuit of better and safer technology and we are seeking to shape the future of information security through progressive and inspiring conversations in technology and offering thought leadership to governments, …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

1 0 1 14
Futurex Futurex

Trusted provider of hardened, enterprise-class data security solutions. For over 40 years, Futurex has been an award-winning leader and innovator in the encryption market, delivering uncompromising enterprise-grade data security solutions. Over 15,000 organizations worldwide trust Futurex to provide groundbreaking hardware security modules, key management servers, and cloud HSM solutions. Futurex maintains an unyielding commitment to offering advanced, standards-compliant data encryption solutions, including: • Hardware security modules (HSM) for general purpose, payments, CloudHSM, and post-quantum environments • Enterprise key management and data protection including cloud key management (BYOK/EKM), IoT key injection, tokenization, database encryption, and file encryption • PKI and certificate …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 144
DigiCert DigiCert

Digital trust at work in the real world. DigiCert is the digital trust provider of choice for leading companies around the globe, enabling individuals, businesses, governments, and consortia to engage online with confidence, knowing their digital footprint is secure. Internet Security, SSL Certificates, Extended Validation SSL, Internet of Things, EV SSL Certificates, Website Security, Managed PKI, Certificate Management, Device Certificates, Mobile Certificates, Encryption Technology, Identity Assurance, and Digital Trust

Type: Large company

11 2 16 1,387
UCL Centre for Blockchain Technologies (CBT) UCL Centre for Blockchain Technologies (CBT)

Promoting the adoption of Distributed Ledger Technologies in our socio-economic systems. Leading European research hub focused on: The impact of blockchain technologies on socio-economic systems. The promotion of a safe and organic development and adoption of blockchain-based platforms. Three main lines of work: • Academic Research Centre, supported by eight departments and more than thirty scientists • A Centre of Excellence, with multidisciplinary expertise, providing consultancy services to industry partners • A neutral think-tank working to foster open dialogue and sharing of platforms, resources, and ideas amongst the Centre’s industry partners ------------------------------------------------------------------------------------------------------------------------------------------- The CBT Student Division is the first and …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

14 2 10 97
OpenVPN Inc. OpenVPN Inc.

OpenVPN® helps businesses of all sizes create secure, virtualized, reliable networks that scale with your team. OpenVPN® solutions help organizations to easily create secure, virtualized, reliable networks that ensure secure communications between on-premise applications, SaaS applications, a remote workforce, business partners, IoT/IIoT devices, and specialized global applications. We offer two secure networking solutions for small, medium, and enterprise businesses. CloudConnexaTM, our managed solution, provides secure communication between an organization's distributed workforce, loT/lloT devices, and the online services they rely on daily with a secure virtualized network. Access Server, our self-hosted solution, simplifies the rapid deployment of a secure remote access …

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 1 2 159
Telos Corporation Telos Corporation

Cyber, cloud, and enterprise security. Telos empowers and protects the world’s most security-conscious organizations with solutions for continuous security assurance of individuals, systems, and information. Telos’ offerings include cybersecurity solutions for IT risk management and information security; cloud security solutions to protect cloud-based assets and enable continuous compliance with industry and government security standards; and enterprise security solutions for identity and access management, secure mobility, organizational messaging, and network management and defense. The company serves commercial enterprises, regulated industries and government customers around the world. At Telos, we realize that our success as a company stems directly from our success …

Type: SMB Activities: IT Services Technologies: Cybersecurity

3 0 1 725
Veracode Veracode

Intelligent Software Security Veracode is intelligent software security. ​The Veracode Software Security Platform continuously finds flaws and vulnerabilities at every stage of the modern software development lifecycle.​ Using powerful AI trained on a carefully curated, trusted dataset from experience analyzing trillions of lines of code, Veracode customers fix flaws faster with high accuracy. ​ Trusted by security teams, developers, and business leaders from thousands of the world’s leading organizations, Veracode is the pioneer, continuing to redefine what intelligent software security means. Application Security, Web Application Security, Binary Static Analysis, Vendor Application Security Testing, Runtime Application Self Protection, Software Composition Analysis, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

30 4 18 672
Northwave Cyber Security Northwave Cyber Security

We are your confident Cyber Security crew for a safe digital journey. Northwave Northwave offers an Intelligent combination of cyber security services to protect your information. We believe it is essential to our society and economy that we can rely on safe and trustworthy digital infrastructures. Therefore, we feel the need to make integrated ICT security services of the highest possible quality available to every organisation. Northwave integrates people, processes and technology into an Intelligent Security Operation: smart security that controls proactive and reactive measures based on a pragmatic (ISO certified) quality management structure. We combine Information Security, Privacy and …

Type: SMB Activities: IT Services privacytech Technologies: Cybersecurity

8 4 2 228
Waterfall Security Solutions Waterfall Security Solutions

Stronger Than Firewalls Since 2007, Waterfall Security Solutions has been providing the highest level of protection for critical infrastructure and vital industries. With headquarters in Israel and offices in UAE, Singapore, USA, Europe, and Australia, Waterfall delivers the highest level of OT protection while enabling safe connectivity and visibility for industrial control systems (ICS). Waterfall Security safeguards the most sensitive and critical infrastructures across a wide range of industries including Power, Oil & Gas, Water Utilities, Rail, Manufacturing, Facilities, and Minting & Metals. As cyber attacks on critical infrastructure are on the rise, software alone isn’t able to deliver sufficient …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 2 127
ON2IT Cybersecurity ON2IT Cybersecurity

24/7 Cybersecurity-as-a-Service. Always based on Zero Trust. ON2IT is a global pure-play cybersecurity service provider. We offer worldwide managed cybersecurity services for organizations with complex and dynamic IT infrastructures. Our managed services are modular, scalable, and cost-effective, and always based on Zero Trust. Information security, Data security, Zero Trust, and Managed Security Services

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 0 5 87