Entities
LogoName Σ Employees
Kaizen Advisory Kaizen Advisory

. #infosec, #cybersecurity, #ddos, #phishing, #DFIR, managed services, GDPR, innovation, and consulting

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

0 0 0 3
Cloudflare Area 1 Security Cloudflare Area 1 Security

The preemptive, comprehensive, contextual, and continuous Cloud Email Security service. Acquired by Cloudflare Cloudflare Area 1 is a cloud-native email security service that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email Compromise (BEC), and other advanced threats that evade existing defenses. Area 1 is part of the Cloudflare Zero Trust platform. Acquired by Cloudflare in April 2022 Security, Big Data, Phishing, Social Engineering, Cybersecurity, Threat Intelligence, BEC, Email Security, Cloud Security, Threat and Malware Protection, Web Security, Network Security, Services for Office 365, Services for Gmail, and email protection

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics

0 0 0 30
CopSonic CopSonic

Universal and secure ultrasound communication Launched in September 2013, CopSonic is developing and marketing a technology which allows communication between electronic devices based on ultrasounds as a way to interact or transmit data. This patented technology is distributed as an SDK which allows B2B partners to integrate this new communication channel within their existing vertical activities and environments. The CopSonic technology is a new universal contactless communication protocol for digital security, smart detection and IoT connectivity. It is already available for the billions of smart devices existing worldwide: feature phones, smartphones, tablets, TV-box, computers, vocal assistants, game consoles, Internet of …

Type: Startup Activities: IT Services Technologies: Wireless Sensors IoT

0 0 0 6
SecBI - Universal XDR (Acquired by LogPoint) SecBI - Universal XDR (Acquired by LogPoint)

eXtended Detection and Response SecBI has evolved the traditional siloed approach in cybersecurity to an XDR Platform for a cross-product integration of network, endpoints, and cloud security tools to deliver automated smart threat detection and response. Without the need for agents, SecBI’s XDR maximizes organizations’ investment in their existing security tools and provides end-to-end protection, including against stealthy, low and slow attacks that cost organizations dearly. SecBI is currently used by financial institutions, telecoms, retailers, and manufacturing enterprises worldwide. For more information, visit: www.secbi.com or write: info@secbi.com Security Operations Centre SOC, Investigation, Cyber Security, start up, Advanced Threat, Threat Detection, …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

0 0 0 2
Secucloud GmbH - An Aryaka Company Secucloud GmbH - An Aryaka Company

Secucloud - an Aryaka company - is a worldwide provider of a cloud-based security-as-a-service platform. Secucloud GmbH, a proven SASE platform provider, delivering network security from the cloud is a wholly-owned subsidiary of Aryaka Networks. Based in Hamburg, Germany, Secucloud GmbH offers an innovative platform designed to provide an all-in-one, global, cloud-based firewall-as-a-service, secure web gateway with advanced threat protection capabilities. The platform is engineered to connect all edges including WAN, Cloud, Mobile and IoT securely together. The Elastic Cloud Security System of Secucloud is unique of its kind on the market. By combining a wide variety of security systems …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

0 0 0 32
APrivacy APrivacy

Securing the digital world. Combining seamless data security with convenience for the financial services industry. APrivacy provides the banking and finance industry with an information security and tracking service anywhere, any time and on any device. APrivacy’s enabling technology allows banks to drive new revenues, reduce risk and support compliance efforts. APrivacy’s patented solution empowers bankers to communicate and share information with their clients using the devices they prefer (iPhone, Android, etc.) via the channels they prefer (Gmail, Outlook, Dropbox, etc. ) and the medium they prefer (Email, PDF, PPT, Word, Excel, etc. ). With APrivacy financial institutions achieve a …

Type: Startup Activities: IT Services Technologies: Data Analytics

0 0 0 2
MOBIQUANT TECHNOLOGIES | Mobile Security Management MOBIQUANT TECHNOLOGIES | Mobile Security Management

Cybersecurity Everywhere, on every embedded platform MOBIQUANT TECHNOLOGIES is the leader in enterprise-grade mobile security management, covering the concepts of (MSM) Mobile Security Management and (m-UTM) Mobile Unified Threat Management. Its innovative mobile management platform allows unprecedented feature-rich capabilities for IT teams daily operations. It includes NXSafeWave VPN, NXSafevoice, NXDefender Suite, NXOffice a BYOD container, NXTrustPKI and many others unique mobile IT patented technologies. Those solutions conver the management of any device based on Apple iOS iPhones, iPad , Google Android, RIM Blackberry, Samsung Tizen, Knox, Microsoft Windows Phone smartphones and TabletPC. Mobiquant Technologies was the first company in the …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 4
SecludIT - Ahead of Security SecludIT - Ahead of Security

Founded by security experts together with EURECOM, a French research institute in telecom and network security, SecludIT has developed Elastic Security, a set of products and services specifically designed to help cloud infrastructure providers and users to safely migrate to the cloud. Since its creation in 2011, SecludIT has become a recognized industry player, one of the Cloud Security Alliance founders and active member, co-author of Security Best Practices 2.1. SecludIT is a technology partner of Amazon Web Services, HP Cloud, VMware and Eucalyptus. Cloud Computing, Security, IaaS, Monitoring, Automation, Vulnerability Assessment, Audit, Amazon Web Services (AWS EC2 & VPC), …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
VUPEN VUPEN

VUPEN is the leading provider of defensive and offensive cyber security intelligence and advanced vulnerability research. While other companies in the vulnerability intelligence industry mainly act as brokers who buy vulnerabilities from third-party researchers and then sell them to their customers, all VUPEN's vulnerability intelligence results exclusively from our internal and in-house research efforts conducted by our team of world-class researchers. VUPEN's offensive IT intrusion solutions and government grade exploits enable the Intelligence community and government agencies to achieve their offensive cyber operations and lawful intercept missions using VUPEN's industry-recognized vulnerability research and intelligence. VUPEN's defensive security research enables governments …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
Rohde & Schwarz Cybersecurity Rohde & Schwarz Cybersecurity

We are your trustworthy European IT security specialist. Imprint: bit.ly/2nOH9KC Rohde & Schwarz Cybersecurity is a leading IT security company that protects companies and public institutions around the world against cyberattacks. The company develops and produces technologically leading solutions for information and network security, including highly secure encryption solutions, next-generation firewalls and firewalls for business-critical web applications, innovative approaches for working in the cloud securely as well as desktop and mobile security. The award-winning and certified IT security solutions range from compact, all-in-one products to customized solutions for critical infrastructures. To prevent cyberattacks proactively, rather than reactively, the trusted IT …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 140
Cypheme Cypheme

The Breakthrough Anti-counterfeit Technology Cypheme is an anti-counterfeit service provider that uses artificial intelligence to detect counterfeit products by analyzing the product's packaging with a neural network, using only a cellphone camera. Cypheme is a smartphone-based anti-counterfeit system. A mobile app using machine-learning powered pattern-recognition, it will allow anyone, anywhere, to verify the authenticity of the products adopting the technology. To know more about us : Website - https://cypheme.com/ Twitter - https://twitter.com/cypheme Facebook - https://www.facebook.com/cypheme YouTube: https://www.youtube.com/channel/UC-GeYZVUJuvodHograYDTtQ Anti-Counterfeit Technology, Brand Protection, Artificial Intelligence, and Artificial Neural Network

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Deep Learning

0 0 0 22
Pen Test Partners Pen Test Partners

Pen Test Partners has been providing cyber security expertise to a huge variety of industries and businesses since 2010. Pen Test Partners / PTP has been providing cyber security expertise to a huge variety of industries and businesses since 2010. We’re paid to hack and test the security of all sorts of things, as well as providing essential consultancy, incident response, accreditation, and forensics services. We’ve tested ships and rigs (while at sea!), connected and electric vehicles, the power grids and stations that keeps countries running, as well as the payment, transport, and fulfilment systems on which everybody is reliant. …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 128
DIFENSO DIFENSO

[Automatic translation follows] Protect your data in any environment while respecting legal constraints The result of 5 years of work by our IT security research lab, the data protection that we offer represents a new approach to digital security: instead of securing its transmission or storage, Difenso directly protects the data by encrypting it. from its conception and supports “the right to be forgotten”. We thus meet European data confidentiality requirements (GDPR). Our innovative technology, certified by ANSSI, guarantees companies control and exclusive ownership of their data encryption, applicable to a multitude of infrastructure platforms and Cloud application services. Its …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

0 0 0 4
Endgame Endgame

Military-grade endpoint protection that's as simple as anti-virus Endgame makes military-grade endpoint protection as simple as anti-virus. Leveraging the industry’s most advanced machine learning technology, Endgame enables security operators of any skill level to deliver full-force protection, stopping everything from ransomware, to phishing, and targeted attacks. Endgame is the only endpoint security platform to offer a unique hybrid architecture that delivers both cloud administration and data localization that meets all industry, regulatory, and global compliance requirements. Every branch of the US military as well as the world's largest commercial organizations rely on Endgame to protect their people, technology and mission, …

Type: Startup Activities: IT Services military Technologies: Cybersecurity A.I. A.I. - Machine Learning

0 0 0 20
NasOnlines data protection NasOnlines data protection

[Automatic translation follows] The NasOnlines software responds to a simple problem: how to easily secure computer data against any type of loss? What student has never had problems with their computer? What happens to the data stored on the computer: family photos, lessons, work due, etc. For a majority of students who lost their data, the value of the data was at least greater than that of the device containing it? even. Likewise, in business, what would happen if all the data stored on computers disappeared? Even for a few hours? What would be the impact on turnover? And how …

Type: Startup Activities: privacytech IT Services Technologies: Data Analytics

0 0 0 0
DB CyberTech DB CyberTech

DB CyberTech innovates privacy and security solutions for high value structured data. Stop data loss before it happens! DB CyberTech innovates predictive data loss prevention for structured data. Its customers include the world's largest financial institutions, healthcare providers, manufacturers, and governments. DB CyberTech's technology non-intrusively assesses client to data store conversations through deep protocol extraction, machine learning, and behavioral analysis. Customers gain insights by discovering information assets including sensitive data, identifying tables being accessed, and mapping the specific applications accessing the structured data stores. In addition, machine learning technology immediately pinpoints and alerts to insider threats before data is stolen. …

Type: Startup Activities: IT Services privacytech Technologies: A.I. Cybersecurity Data Analytics A.I. - Machine Learning

0 0 0 8
CyberTech Digital CyberTech Digital

At CyberTech Digital We provide the best in class managed IT services to SMEs. CyberTech is a team of IT professionals with many years of experience. Businesses are now more dependent upon IT systems than ever. Many cannot do business without their IT. A modern IT system depends upon many elements of technology working smoothly together – the network, the computers and the software. New systems are more likely to depend on cloud based technologies, such as Office 365, Xero accounts and numerous CRM systems. The software must also be mobile friendly by default, running seamlessly on mobile phones and …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 N/A
Hirmes Cybersécurité Hirmes Cybersécurité

[Automatic translation follows] Stay in control of your data. You help keep what is most precious to you is our leitmotif. Hirmes Cybersecurity is a company that works for digital trust. We offer consulting and audit services in the field of securing information systems. Based in Clermont-Ferrand, we are committed to securing and supporting all digital players in the Rhône Alpes Auvergne region. Our service offerings are adapted from VSEs to SMEs with several areas of expertise: - Website monitoring and security (e-commerce, business site, association site). - Security audit and intrusion test of your information systems. (GDPR compliance) - …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 0
DeepView DeepView

A privacy-focused platform to monitor and archive business communications DeepView protects companies from data leakage by staff. Real-time alerts to public data leaks and opt-in encrypted channel recording make personal devices in the workplace safer. DeepView’s unrivalled, patent-pending technology and AI algorithm is built to read photos. It is the only solution that allows companies to manage data leakage from photos, videos and text shared by employees, thereby protecting companies from inadvertent and intentional data leaks. The advanced, slick encryption recording is the only solution to meet GDPR and MiFID II standards. The platform instantly notifies you to confidential company …

Type: Startup Activities: IT Services fintech regtech Technologies: A.I.

0 0 0 8
Voatz Voatz

Voatz is a mobile elections platform powered by cutting edge technology making it safe and easy to vote from anywhere. Voatz is on a mission to make it safer and more accessible for people to participate in democracy. Backed by military grade technology, Voatz makes it possible and secure to vote from a smartphone. Voatz can be used in all kinds of voting events, including overseas citizen absentee voting, state political party conventions, town hall meetings, university student government elections, professional organizations and more. Depending on the election, Voatz leverages both high-security and low-security measures in order to protect both …

Type: Startup Activities: civictech IT Services regtech Technologies: Blockchain/Cryptocurrency

0 0 0 16
Atredis Partners Atredis Partners

Atredis Partners delivers advanced, research-driven security assessment and advisory services all over the world. With offices all around the United States and Canada, Atredis Partners was created by a number of security industry veterans who wanted to prioritize offering quality and client needs over the pressure to grow rapidly at the expense of delivery and execution. We wanted to build something better, for the long haul. Atredis Partners team members have written five books on information security topics, and have presented our research over fifty times at the BlackHat Briefings conference in Europe, Japan, and the United States, as well …

Type: Startup Activities: IT Services Technologies: Sensors Robotics IoT

0 0 0 32
Pwnie Express (now Outpost24) Pwnie Express (now Outpost24)

Detect and monitor every wireless and wired devices to mitigate the risk of rogue devices and access points Pwnie Express closes the IoT security gap exposed by the deployment of IoT in the enterprise. By continuously identifying and assessing all devices and IoT systems, our security platform prevents IoT based threats from disrupting business operations. All without the need for agents, or changes to network infrastructure. To learn more about Pwnie Express visit www.pwnieexpress.com. Network Security, Device Threat Detection, Cyber Security Research and Development, Rogue access point detection, WiFi security, Bluetooth Security, and IoT Security Assessment

Type: Startup Activities: IT Services Technologies: IoT Cybersecurity Wireless

0 0 0 1
digital.security digital.security

digital.security is now an Eviden business Founded in 2015 by a group of IT security experts with the support of the Econocom Group, digital.security (~ 230 experts) aims to offer companies and government organisations advanced audit and consulting services and a CERTTM dedicated to the IoT ecosystem. Our experts have strong expertise in providing Integration & Projects (SSO, IAM, IAG, PKI, privilege management, Logs collection, analysis and management Data compliance solutions), and also in Operational Security (outsourcing, security services center operations, SOC & SIEM management). Audit, IoT, IAM, SSO, Security, Pentesting, BugBounty, DLP, Consulting, CERT, CSIRT, RedTeam, SOC, SIEM, DFIR, …

Type: SMB Activities: IT Services Technologies: IoT Cybersecurity

0 0 0 77
Exodata Cyberdefense Exodata Cyberdefense

[Automatic translation follows] Your secure information assets, everywhere, all the time! Find all our information on our website: www.exodata.fr Information Systems Security Consulting, External & Internal Penetration Testing, Vulnerability Assessments, and Web and Software Development

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 21
Chainspace Chainspace

Sharded smart contracts. Decentralised infrastructure on a planetary scale. The Chainspace platform is powering a community of makers. Makers committed to building decentralised services that allow us all to have greater ownership and control of how we interact with the digital world. We don't care about being the first, we care about being outstanding. Blockchain, Sharding, S-BAC, Atomicity, Decentralisation, User-Centred Design, and Open Source

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

0 0 0 2
Incloudio Incloudio

[Automatic translation follows] After 3 years of adventure between initial reflection, incubation and development, Incloudio ceased its activity in May 2017. A digital security technology company, Incloudio was developing an AppSec / DevSecOps consulting offering and SaaS security platforms 100% designed, operated and hosted in France: - CORE: Code review - VULNUS: Vulnerability management - CITADEL: Application protection Web application protection, Website protection, Code Review, Code Review, Vulnerability Management, Vulnerability Management, AppSec, DevSec, Digital Security, and Cloud

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
Qualys Qualys

Security and compliance for your global IT assets. Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of disruptive cloud-based security, compliance and IT solutions with more than 10,000 subscription customers worldwide, including a majority of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and automate their security and compliance solutions onto a single platform for greater agility, better business outcomes, and substantial cost savings. The Qualys Cloud Platform leverages a single agent to continuously deliver critical security intelligence while enabling enterprises to automate the full spectrum of vulnerability detection, compliance, and protection for IT systems, …

Type: Large company Activities: IT Services

0 0 0 2,599
HackMadrid %27 HackMadrid %27

[Automatic translation follows] we are a hacker community located in Madrid, Spain. Hacking culture community HackMadrid organizes a community for people who want to get started in the "hacking" culture and experienced hackers who have years of experience working on different projects for governments and companies. HackMadrid members must be at the forefront of research, experimentation and regularly attend community meetings. Being able to participate in international hacking conferences around the world (Defcon, BlackHat, HOPE, OWASP AppSec, Hacker Halted, among others). HackMadrid seeks to develop and drive the participation of the entire hacker community through regular meetings, presentations, workshops and …

Tags: H2020 Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 6
Cybelius Cybelius

Industrial Cyber Solutions Cybelius is the first industrial cybersecurity solutions provider, designed to ensure the operational continuity of SCADA and ICS networks for Critical Infrastructure (energy, water, transport...), Manufacturers and all the industry. Cybelius development team, made of experienced SCADA and Cybersecurity experts, can meet all your cybersecurity issues. Our 3 major strategic fields of activity: - risk analysis & operational security - IS diagnosis - cybersecurity solutions. Cybelius's passive solutions are: CyPRES (a cyber attack detection probe) and CyFENCE (a secure interface between IT and OT). They are designed to avoid downtime, process manipulation or theft of sensitive proprietary …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
GreenLock Advisory GreenLock Advisory

Offensive security & Threat Intelligence GreenLock Advisory is an independant consulting firm created in 2015. We are offering several expertises on cyber-security: - Penetration testing - Architecture review - Threat intelligence/hunting - Automation of Security Operations - Vulnerability management cybersecurity, audit, security, threat intelligence, vulnerability management, and Automation

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
CrowdStrike Falcon Surface (formerly Reposify) CrowdStrike Falcon Surface (formerly Reposify)

A Gartner Emerging Vendor for EASM, Reposify’s external attack surface management (EASM) platform pinpoints unknown, exposed internet-facing assets so security teams can best secure their digital perimeter. Our intelligent internet mapping technology takes all environments of an organizations’ digital footprint into account for full-spectrum perimeter security, with no agents or deployment required. Having indexed billions of digital assets since 2016, Reposify’s proprietary internet mapping technology leverages big data to identify historical trends critical to an organizations’ security posture. Whether assets are on premise, in the cloud or housed across supply chains and subsidiaries, nothing is left unknown. All exposed assets …

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics IoT

0 0 0 14
SANS Institute SANS Institute

SANS is the most trusted resource for information security training, cyber security certifications and research. SANS is the most trusted and by far the largest source for information and cybersecurity training and certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - Internet Storm Center. Information Security Training, Digital Forensics Courses, Cyber Security Training, Security Awareness Training, Penetration Testing Courses, Application Security Courses, Security Leadership Courses, Industrial Control Systems Security Courses, cloud security courses, blue …

Type: Large company

0 0 0 1,510
SAFECode.org SAFECode.org

The place where leading technology providers come together to work on today’s most pressing software security challenges The Software Assurance Forum for Excellence in Code (SAFECode) is a non-profit organization exclusively dedicated to increasing trust in information and communications technology products and services through the advancement of effective software assurance methods. SAFECode is a global, industry-led effort to identify and promote best practices for developing and delivering more secure and reliable software, hardware and services. Security, Software Security, Hardware Security, Technology, Software Assurance, Best Practices, and Industry Collaboration

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 4
Internet Security Auditors Internet Security Auditors

Your Security is Our Success Experts in #Cybersecurity. Leaders in #HackingEthics, #PCI standards, #ISO27001, #ISO27032 e #ISO22301, #ProtDatos, #RGPD, #Cyberintelligence and #SecuritySDLC Síguenos en: blog.isecauditors.com facebook.com/ISecAuditors twitter.com/ISecAuditors instagram.com/isecauditors Ethical Hacking (pen-test, application testing, source code review, technical reviews,...), Managed Security Services (IPS, WAFs, AntiMalware, Sec. Infrast. Mngt., forensics & expert witness...), and Compliance Implementation (27001, 22301, 27032, PCI DSS, PA DSS, LOPD, GDPR, Habéas Data)

Type: SMB Activities: IT Services privacytech Technologies: Cybersecurity

0 0 0 54
CounterTack CounterTack

"GoSecure - POWERED BY COUNTERTACK"​ is the leading provider of Predictive Endpoint Security for the enterprises. CounterTack delivers the one true Endpoint Threat Platform, (ETP) to enterprise customers globally. CounterTack provides a unique combination of threat context, organizational resiliency and broad visibility, to mitigate endpoint risk and reduce the impact of advanced attacks. Combining a robust suite of endpoint detection and analysis capabilities by leveraging a single endpoint sensor and an open, scalable multi-tenant infrastructure, CounterTack helps IR and security teams neutralize and prevent advanced threats from damaging the business. CounterTack delivers its next-generation technology to over 250 customers globally. …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 13
Attivo Networks®, a SentinelOne Company Attivo Networks®, a SentinelOne Company

The Leaders in Identity Security and Cyber Deception Technology SentinelOne, an autonomous cybersecurity platform company, has completed the acquisition of Attivo Networks. Attivo Networks was a leading identity security and lateral movement protection company. With this acquisition, SentinelOne extends Singularity XDR capabilities to identity-based threats across endpoint, cloud workloads, IoT devices, mobile, and data wherever it resides, setting the standard for XDR and accelerating enterprise zero trust adoption. Together, SentinelOne and Attivo Networks deliver comprehensive identity security as part of Singularity XDR for autonomous protection. Breach Detection System, Deception Technology , Threat Detection, Cloud Detection, Specialty Detection , Vulnerability and …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I. A.I. - Machine Learning

0 0 0 86
Preempt, A CrowdStrike Company Preempt, A CrowdStrike Company

Preempt, A CrowdStrike Company Preempt secures all workforce identities to accelerate digital transformation. Since 80% of all breaches involve compromised credentials, Preempt unifies security visibility and control for on-premises and cloud identities. Threats are preempted and IT policy enforced in real-time using identity, behavioral, and risk analytics. Preempt protects 4M+ workforce identities across 400+ enterprises. Customers have reduced the cost required to stop advanced threats and accelerate Zero Trust and Conditional Access initiatives. Founded in 2014, Preempt is headquartered in Silicon Valley, with R&D in Israel and sales offices worldwide. IT Security, Conditional Access, Identity, Authentication, Active Directory Security, Privileged …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 10
Secure Ideas, LLC Secure Ideas, LLC

Professionally Evil Founded in 2010, Secure Ideas is a woman-owned, small-business consulting firm. An industry leader in security consulting, training, and penetration testing, Secure Ideas is continually striving to improve the state of the art and practice of information security. Our focus is collaborating with clients to improve their security management, and reduce the risk of potential losses through a proactive approach. Having architected security solutions for large enterprises, and performed penetration testing for numerous industries from government agencies to Fortune 100 companies, we are adept at assessing client needs, comprehending complex details on new technologies, and identifying risks to …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 29
Triskele Labs Triskele Labs

When Experience Matters Triskele Labs is one of Australia’s fastest growing cybersecurity companies. We deliver services including traditional projects such as Penetration Testing, Compliance and Risk Management through to new breed services including 24*7*365 Security Operations and outsourced Cybersecurity Managers to ensure we are a complete cybersecurity solution centre. Our team of experts leverage elite threat intelligence to provide the highest level of cybersecurity professional services. We go the extra mile to demystify cybersecurity and become your trusted partner by developing customised programs that deliver on your specific needs to meet your budget. Our holistic approach allows us to achieve …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 75
Sword & Shield Enterprise Security, Inc. Sword & Shield Enterprise Security, Inc.

Follow us at our new page for cybersecurity news and updates! See the link in the banner above. Securing business for more than 20 years, Sword & Shield Enterprise Security, Inc. partners with our customers to meet the needs of their dynamic cybersecurity and compliance landscape. We work closely with companies to become tightly integrated with their enterprise operations in the areas of managed security, risk and compliance, enterprise security consulting, security incident response and forensics, and security training. Recognized nationally and headquartered in Knoxville, Tennessee, Sword & Shield has offices throughout the US. Sword & Shield services a broad …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 34
Wandera, a Jamf company Wandera, a Jamf company

The way enterprises work has changed. Data is stored beyond corporate walls, and limitless connections have given rise to remote working. The perimeter has been redefined. This evolving new environment requires a new security model that is cloud centric. Wandera provides a zero trust cloud security solution to protect the modern workplace. We enable zero-trust access to all your applications, secure your data and devices against cyber threats and help you apply policies to filter internet access and reduce risk exposure. We believe in making security simple. This is why we created a unified offering, managed through a single console …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 52
Samurai Digital Security Limited Samurai Digital Security Limited

Cyber Security, Red Team Attack Simulation & Penetration Testing | "To defeat your enemy, become your enemy" – Sun Tzu We are a cyber and Information security services provider. Founded by university academics and consultants we develop and provide system penetration, network intrusion, incident response, user awareness, and information governance solutions, strategies, and services. Our employees are a combination of Ph.D. qualified researchers, Crest Registered Testers, and BSI 27001 lead auditors. Through our combined and academic research, we have a thorough understanding of the problem domain, ideally placing us to use applied research to mitigate the real-world risks of cybercrime. …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

0 0 0 13
FIVE STRATEGY FIVE STRATEGY

[Automatic translation follows] We are a company specialized in services and products in the areas of Management Systems, Computer and Information Security, Business Architecture, security in school environments and digital transformation. We generate differential values ​​by helping our clients overcome their challenges through cutting-edge technology and best practices worldwide. Our experience and methodology is aimed at providing easy and comprehensive but also innovative solutions, in very attractive times and deadlines for your company and with costs that ensure a quick return on investment. We have a multidisciplinary team of professionals who have individual experience of more than 20 years in …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 5
Cianaa Technologies Cianaa Technologies

Simplify Compliance for Companies CIANAA a vision to assist organizations to achieve cybersecurity. CIANAA is a security acronym of Six Letters C. I. A. N. A. A. building the foundation on Confidentiality, Integrity, Availability, Nonrepudiation, Authentication and Auditing. CIANAA provides assurance via professional security auditing and attestation services. The company simplifies the compliance process and provides an assessment to help organizations to attain cybersecurity objectives and goals. Today, CIANAA offers various services including PCI DSS compliance, ISO 27001 Audit and certification, HIPAA attestation, Security governance reviews, Penetration testing, GDPR and Privacy compliance. Apart from this, CIANAA is a Silver partner …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 9
Corero Network Security (LSE: CNS) (OTCQB: DDOSF) Corero Network Security (LSE: CNS) (OTCQB: DDOSF)

Securing your peace of mind with over a decade of expertise in flexible, automatic, hybrid and on-prem #DDoS protection. We are Corero Network Security (LSE: CNS) (OTCBQ: DDOSF), and for over a decade, our customers' needs have sculpted our SmartWall ONE DDoS protection platform. From just DDoS detection to offering DDoS protection-as-a-service, we meet you exactly where you are, providing precisely the protection you need. We believe no customer should alter their environment for a vendor; instead, we flexibly mold our robust, automatic, on-prem solutions to safeguard your business against the evolving DDoS threats. We know that organizations face continued …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 119
Mint Security Oy Mint Security Oy

Muut tekevät digitalisaatiosta kauniin ja käytettävän. Me lisäämme siihen luotettavan ja turvallisen. Mint Security Ltd offers consultation in 4 key areas important to all enterprises today: - Cyber Security and Risk Management - Information Security, Processes and Standards - Secure Software Development Lifecycle (SDLC) - SecDevOps & Architectures We also deliver a software solution for risk registers and incident management. Rent-a-CISO and Rent-a-Riskmanager services also available. Mint Security is lean, mean and highly effective. Do not hesitate to reach out if in need for cost-effective consultation, new ideas - or solutions to old problems. Mint Security provides its services in …

Type: Startup Activities: IT Services constructiontech Technologies: Cybersecurity

0 0 0 8
e92plus e92plus

We're e92plus: the leading cybersecurity VAD for the UK channel, with best in class tech and award winning services. e92plus is the leading cybersecurity VAD for the UK channel, going beyond traditional distribution to provide exceptional products and services that drive accelerated growth for our vendor and reseller partners. With an established track record of introducing disruptive and next-gen technologies and building successful channels, e92plus has grown to become an award winning, next generation VAD. Our services, delivered through in-house specialists, compliment and support our partners in their go-to-market strategy: encompassing technical, marketing, finance and operations, with our expertise in …

Type: SMB Activities: IT Services fintech martech Technologies: Cybersecurity

0 0 0 77
Guden CyberSecurity Guden CyberSecurity

Our wide range of cyber security consulting and managed services are designed to give you the security support you need, as you need it. Guden CyberSecurity is a trusted Microsoft Partner, made up of highly-accredited cyber security professionals supporting customers across the UK. Gudens provides Microsoft subject matter expertise, guidance and deployment specialisation in the areas of AI, governance, security, collaboration & training, and application development. Our cyber security consultancy and managed services empower you to achieve your security goals with expert support every step of the way. Whether you have a security project in mind, want to know the …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 145
CyberSafe CyberSafe

CyberSafe is the original commercial provider of Kerberos-based security solutions, with over 20 years'​ experience, and focused on providing innovative security solutions for SAP business applications. The TrustBroker product family utilise your existing Active Directory infrastructure to offer user authentication, encryption, and Secure Single Sign-On (SSO). The products also have the flexibility to support many SAP business applications - whether on-premise or in a cloud, and being accessed from a user’s personal workstation, shared workstations, or mobile devices. The user only needs one identity (their Active Directory account) and one credential (such as a password). When users logon to SAP …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 10
Outpost24 Outpost24

The CTEM platform for smarter cybersecurity risk management Outpost24 empowers organizations to achieve cyber resilience with a complete range of continuous threat exposure management (CTEM) solutions. Our cloud platform unifies asset discovery and management, automates security testing, and quantifies risk in business context. Executives and security teams around the world trust Outpost24 to identify the attack surface and prioritize the most important security issues to accelerate risk reduction. Founded in 2001, Outpost24 is headquartered in Sweden, with additional offices in the US, the UK, the Netherlands, Belgium, Denmark, France, and Spain. To learn more about our products and services go …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 237
NIS. NIS.

[Automatic translation follows] Find all the latest cybersecurity news on the Itancia group page. NIS is recognized as a true Value Added Distributor (VAD). The company offers its partners (resellers, integrators and IT services companies) tailored solutions in the areas of health, loyalty, access control, digital security and M2M and IoT. NIS is also in charge of IoT technological and commercial monitoring, as well as relations with VSEs/SMEs and start-ups in this area. We aim to put our expertise at the service of our integrator and reseller partners in order to offer security and M2M solutions with high added value …

Type: SMB Activities: IT Services Technologies: Cybersecurity IoT NFC

0 0 0 5
Bricata Bricata

Advanced network detection and response for the enterprise. Bricata, an OpenText company, is leading the next generation of advanced network detection and response for the enterprise. By fusing real-time visibility, advanced detection, analysis, forensics, incident response and threat hunting into a single platform, Bricata provides organizations with end-to-end visibility and full context for direct answers and powerful insight to take immediate action.

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 10
Smart Cybersecurity Network Smart Cybersecurity Network

[Automatic translation follows] SERENE-RISC is... an integrated cybersecurity network that connects those who generate knowledge with those who put it into practice. SERENE-RISC supports collaboration between universities, industry, government and non-profit organizations across many sectors and disciplines. The network develops tools that facilitate the uptake and application of world-class research results. It's also... a network including more than 40 academics across 10 disciplines at 24 post-secondary institutions around Canada and more than 24 public and private sector members, and 6 NPO. Our key values: →Inclusive →Impartial →Empowering →Evidence-based ----- SERENE-RISC is... an integrated cybersecurity network that connects those who generate …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 1
Hacker House Hacker House

All computers are Broken. Let us show you how to secure them. Hacker House is the global portal for skills training, security services, cyber arms, and defense products. We train individuals and organizations to be self-sufficient in all things cyber security. Hacker House is a team of computer hackers seeking innovation within the information security industry. Hacker House provides offensive security solutions so you can understand the real-world risks that impact on your business. Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied. Hacker House's …

Type: Startup Activities: edtech Technologies: Cybersecurity

0 0 0 10
Intezer Intezer

Leave the SOC grunt work to technology. Keep noise, false positives, and alerts from overwhelming your security team. Leave the SOC grunt work to Intezer. Automatically triage alerts 24/7, respond faster, and cut out noise & false positives. Try free: analyze.intezer.com Malware Analysis, Threat Detection, Incident Response, Cybersecurity, Malware Classification, Threat Hunting, DFIR, Memory Forensics, Digital Forensics, Reverse Engineering, Security Operations, Memory Analysis, Attribution, Threat Research, Threat Intelligence, YARA, Disk Image Forensics, File Scanning, URL Scanning, Sandboxing, Attribution, Memory Dump Scanning, Alert Triage, and SOC Automation

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 43
Anomalix Anomalix

Next Generation Identity and Security Management Anomalix is a Gartner-recognized solutions and services company for Identity and Access Management. Anomalix provides Identity driven zero-trust security solutions that protect consumers, businesses and governments. Identity Management, Security Analytics, Information Security, IAG, Cloud Security, Third Party Risk Management, Audit & Compliance, Business Agility, and Identity Analytics

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity

0 0 0 8
Altitude Networks Altitude Networks

Altitude Networks protects enterprise data in Office 365 and Google Workspace against accidental over sharing, malicious data theft, and modern cloud backdoors access.

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 3
Quantum Blocks Inc Quantum Blocks Inc

Quantum computing algorithm development for (Blockchain and other) cryptography and cryptoanalysis projects. Fusion of Quantum Computing and Blockchain Tech: "we let Schrodinger's cat play with blocks"​. Among other things, we are working on quNIX - to provide a workable Quantum Computer OS for algorithms and applications. Focus Areas: Algorithms - Cryptography and Crypto Analysis Applications - Military-Grade Blockchain Solutions & Enhancements Quantum Blocks Inc is a RLC, Delaware, Company Quantum Computing, Blockchain, Cryptography, Crypto Analysis, Digital Ledgers, quNIX, and MIL-TEC

Type: Startup Activities: IT Services deeptech Technologies: Blockchain/Cryptocurrency

0 0 0 3
Fyde Fyde

Fyde is now Barracuda CloudGen Access. Secure zero trust access to all your apps and data from any device and location. Fyde is now Barracuda CloudGen Access. Secure zero trust access to all your apps and data from any device and location. Security starts with access. The CloudGen Access zero trust model establishes unparalleled access control across users and devices without the performance pitfalls of a traditional VPN. It provides remote, conditional, and contextual access to resources and reduces over-privileged access and associated third-party risks. With CloudGen Access, employees and partners can access corporate apps and cloud workloads without creating …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 4
KYND KYND

Cyber risk management for every business. Simple to understand, quick to monitor and easy to prevent. Organisations of all sizes have or will be impacted by cyber risks and whilst this threat is well publicised it is not always well understood. KYND is about to change that. KYND's innovative, industry first and proprietary cyber risk management technology enables all businesses to easily monitor and understand the cyber risks they face, take action when necessary and be alerted to future risks as they arise. KYND's cyber risk products provides businesses of all sizes a simple, easy to use and cost-effective solution …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 45
CyberGRX CyberGRX

Sleep soundly with our TPRM platform. Pinpoint, measure, and prioritize third-party cyber risks for effective planning. CyberGRX = TPRM for the speed of your business. When assessments take weeks or months to complete, it impairs an InfoSec team's ability to speak into a vendor decision. With CyberGRX's library of 14,000 attested assessments, 250,000 company profiles, predictive risk insights and threat intelligence, you can make initial vendor decisions immediately. And, if deeper evaluation is needed, CyberGRX plus ProcessUnity's automated workflows streamline the process so you'll never chase assessments again. The risk of inaction is costly. The ROI of CyberGRX and ProcessUnity …

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics

0 0 0 61
Simility, A PayPal Service Simility, A PayPal Service

Adaptive Decisioning Platform built with a data-first approach to deliver continuous risk assurance. Simility offers real-time risk and fraud decisioning solutions to protect global businesses. Simility’s offerings are underpinned by the Adaptive Decisioning Platform built with a data first approach to deliver continuous risk assurance. By combining artificial intelligence (AI) and big data analytics Simility helps businesses orchestrate complex decisions to reduce friction, improve trust, and solve complex fraud problems. Built by industry veterans, Similty is trusted by some of the world’s leading consumer brands across Financial Services, Payment Processors and Commerce merchants. To learn more, visit www.Simility.com. Fraud Detection, …

Type: Startup Activities: IT Services Technologies: A.I. - Machine Learning Data Analytics A.I.

0 0 0 23
ObservePoint ObservePoint

Complete Digital Governance. Websites are complex. They are essential to the image and growth of your company, and to the privacy and trust of your customers. But websites have so many dynamic parts and pages that it’s nearly impossible to keep up with all of them all the time. Until now. ObservePoint’s Web Governance platform automates the scanning of your website; from the highest traffic pages and user paths to the dark corners of your company’s web presence. We give you the ability to see what’s performing below acceptable standards, trace it back to the source, and quickly see a …

Type: Startup Activities: IT Services martech Technologies: Data Analytics Cybersecurity

0 0 0 88
Eur'Net Eur'Net

[Automatic translation follows] Since 1997, Eur'Net has been made up of teams of professionals specializing in the security of IT services & Internet. Kaspersky Gold Partner

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 5
(ISC)2 Quad Cities Chapter (ISC)2 Quad Cities Chapter

(ISC)2 Quad Cities Chapter is a local chapter of (ISC)2, an international information security association Our mission is to support and provide members and constituents with credentials, resources, and leadership to address cyber, information, software and infrastructure security to deliver value to society. (ISC)2 is the largest not-for-profit leader in educating and certifying cyber, information, software, and infrastructure security professionals throughout their careers. President: Shadrack Roberts - https://www.shadrackroberts.com/ Member Chair: Dr. John D. Johnson - https://johndjohnson.com/ cybersecurity, information security, privacy, cyber, infosec, and information assurance

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 N/A
N8 Identity Inc. N8 Identity Inc.

Award-winning Identity-as-a-Service (IDaaS) governance platform on Microsoft Azure N8 Identity, Inc. has re-imagined identity governance with an agile, cloud-based and mobile-first solution that brings security and value to organizations of all sizes. N8 Identity addresses the changing needs of modern businesses by intelligently managing access across all devices, in the cloud, and in the data center through both its Managed Identity Services and TheAccessHubTM, its award-winning Identity-as-a-Service (IDaaS) governance platform. Founded in 2000, N8 Identity has always been focused exclusively on building scalable, agile identity governance solutions, and has deployed nearly one billion identities to date. Our goal is to …

Type: SMB Activities: IT Services regtech Technologies: Cybersecurity

0 0 0 10
iGuards - Keeping your data safe. iGuards - Keeping your data safe.

CISO & IT-Governance Helping you guarding your valuable digital information today and for the future. • CISO • CISO-as-a-service • IT-Governance • ISO-27001 • NIST • GRC: Governance, Risk and Compliance iGuards offers a full service in gaining & keeping the trust in your Digital world. Are you in need of a CISO or further protection of your valuable digital information? Our professionals supervise complex security and privacy assignments from diagnosis to implementation. Let us be the guardians of your digital trust ! iGuards – Keeping your data safe. Information Security, Governance, CISO, CISO-as-a-service, Security Audit, NIST, ISO 27001, and …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity

0 0 0 3
Cybersprint Cybersprint

Cybersprint offers automated discovery of the assets in your attack surface, and detect and monitor the risks within. Cybersprint maps the attack surface of organisations and brands, offering full visibility using continuous and automated digital asset discovery. Cybersprint’s zero-scope AI-driven approach to Attack Surface Management provides an outside-in perspective, eliminating blind spots and detecting and preventing threats including data leaks, brand abuse, supply chain risk, phishing. Darktrace completed the acquisition of Cybersprint in March 2022. Darktrace (DARK:L), a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I.

0 0 0 2
IntSights, a Rapid7 company IntSights, a Rapid7 company

IntSights delivers best-in-class, cloud-native external threat detection to further extend Rapid7’s industry-leading security operations platform, providing customers with end-to-end external and internal threat detection, automation and remediation. Cyber Intelligence, Threat Remediation, Threat Intelligence, and Cyber Threat Intelligence

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 41
The Diana Initiative The Diana Initiative

A conference focused on Women, Diversity, and Inclusion in Information Security The Diana Initiative is a 501c3 non-profit corporation registered in Las Vegas Nevada. Our mission is to Elevate, Inspire, and Support women and non-binary people of all races, cultures, and backgrounds through every stage of their Information Security career with Education, Collaboration, and Resources offered online and at inclusive & welcoming conferences. During "Hacker Summer Camp", The Diana Initiative hosts a two day conference celebrating diversity, women in security, and how to pursue a career in information security and technology. We are a conference focused on Women, Diversity, and …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 13
Myra Security GmbH Myra Security GmbH

Myra technology monitors, analyzes, and filters malicious internet traffic before virtual attacks can do any real harm. The German technology manufacturer Myra offers a secure, certified Security-as-a-Service platform for protecting digital business processes. Our highly certified Security-as-a-Service platform protects your digital business processes against a wide range of risks such as DDoS attacks, bot networks and attacks on databases. We are specialized in protecting critical infrastructure, especially in the finance, insurance, healthcare and public sectors. The Myra technology is certified by the German Federal Office for Information Security (BSI) according to the ISO 27001 certification based on IT-Grundschutz (Basic IT …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 63
NOFTEK LLC NOFTEK LLC

Fortifying Healthcare SMBs with Human-Centric Cyber Resilience Empowering Cyber Resilience for Healthcare Organizations At NOFTEK, we empower healthcare organizations to build cyber resilience through our human-centric, integrated risk management approach. Our mission is to provide clarity and control, enabling businesses to navigate cybersecurity and compliance complexities confidently. We're confident in our core values of integrity, trust, and service, and we'll take a consultative approach that aligns with your unique business objectives. Our experienced team conducts comprehensive assessments, quantifies risks, and implements tailored solutions, allowing you to focus on your core mission. Our AI-powered platform delivers: - Real-time threat prevention across …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 3
AimBrain AimBrain

Award-winning fraud detection & user authentication platform, based on Deep Learning. AimBrain is a #BIDaaS (Biometric Identity as-a-Service) platform. Connectivity to the platform is via open-source SDKs and an API; businesses and developers can go trial-to-deployment with 1,000 free API calls a month, on our free platform AimBrain On Demand. Our approach combines 100% proprietary passive (anomaly detection and behavioural) and active (voice, facial and combined face/audio/lip movement) authentication modules to verify the user, not the device. The cloud model lets companies authenticate their users across any channel and any device, to reduce fraud and improve the security experience. Biometrics, …

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity A.I. A.I. - Deep Learning

0 0 0 2
SecuredTouch (acquired by Ping Identity) SecuredTouch (acquired by Ping Identity)

Adaptive Fraud Detection Throughout the Customer Journey SecuredTouch provides real-time, adaptive fraud detection throughout the customer journey to detect fraud early, with proven ROI from day 1. Our solution ensures accurate risk-based prevention for multiple use cases including ATO, bots and no-transaction fraud. SecuredTouch customers benefit from reduced overall fraud losses while maintaining a smooth customer experience. Mobile, Data Science, Fraud prevention, Cyber Security, biometrics, account takeover, bot detection, new account fraud, payment fraud, no-transaction fraud, loyalty fraud, coupon abuse, returns abuse, and emulator detection

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity Data Analytics

0 0 0 7
Tokensoft Tokensoft

A fair launch platform for web3 projects and communities TokenSoft is the leading technology and security platform for companies seeking to issue assets on the blockchain, at scale, and within compliance. From startups and funds to enterprises and investment banks, TokenSoft's platform offers a bespoke suite of technology and consulting services to meet the needs of the entire lifecycle of a digital security, including onboarding, distribution, custody, and ongoing administration. TokenSoft supports the highest standards for regulation and compliance, regardless of jurisdiction. The firm’s clients have raised nearly $1bn in assets. token sale, digital assets, token issuance, compliance, blockchain, and …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

0 0 0 25
Cyberfort Group Cyberfort Group

Combining technology, people, and expertise to create a cybersecurity capability that is second to none. Cyberfort exists to provide our clients with the peace-of-mind about the security of their data and the compliance of their business, which is much needed in our increasingly data hungry world. Since we were established in 2017, we have brought together technology, people, expertise, facilities and leaders in cybersecurity to create a capability that is second to none. Our vision is to create a safer world for us all to live, by creating safer organisations. To do this we want to be recognised and trusted …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity IoT Robotics

0 0 0 117
Virgil Security, Inc. Virgil Security, Inc.

Data and password security developer toolkits for HIPAA and GDPR compliance, liability transfer, and peace of mind. Virgil Security, Inc., makes every software developer into an applied cryptologist. Virgil provides password-free authentication, encryption, distributed immutable data storage via Blockchain, and verification of data, devices, and identities that is quickly and easily integrated into developer products. Virgil provides this via a cloud-based service in combination with open sourced libraries that are available for desktop, embedded (IoT), mobile, and cloud / web applications with support for a wide variety of modern programming languages. • Finalist for Red Herring's Top 100 North America …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity Blockchain/Cryptocurrency IoT SaaS

0 0 0 15
cironet cloud data security gmbh.co.kg cironet cloud data security gmbh.co.kg

Cybersecurity . Information Security . Data Protection Audits, Expert Opinion, Webinars und Research cironet offers services in the area of cloud data security (data protection, / cybersecurity) and blockchain technologies. Our focus is on analyses, expert opinions and audits (pentest / ISO27001 / DSGVO) in complex infrastructure, decentralized blockchain and cloud environments. and use of agile methods and data science models. Our team consists of certified lecturers, analysts and auditors in the area of ISO 27001, DSGVO, ISO20000, ITIL 4 and agile methods (SCRUM). and technology expertise in Microsoft Cloud OS - (Azure OS, Azure DevOps, MS365 platform), Open Source …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity Blockchain/Cryptocurrency Data Analytics

0 0 0 1
Centre for Cyber Security Centre for Cyber Security

Vi arbejder for et sikkert digitalt Danmark The Centre for Cyber Security was set up in December 2012 within the Danish Defence Intelligence Service (DDIS). As a part of the DDIS, the Centre has access to the special intelligence-based knowledge about cyber issues available to the DDIS while the attachment also creates a number of synergies. The Centre for Cyber Security is the national IT security authority, Network Security Service and National Centre for Excellence within cyber security. The Centre’s mission is to advise Danish public authorities and private companies that support functions vital to society on how to prevent, …

Type: Public

0 0 0 41
Zerado Limited Zerado Limited

Zerado is a process consultancy. We provide expert advice to a wide range of organisations on the latest technologies, including Blockchain, cryptography and cloud computing. We deliver tailor-made solutions that utilise these technologies to meet diverse business needs. The founders of Zerado have over 15 years of experience working in finance, regulation and software development for major banks. They have been developing solutions with Blockchain since 2009, including for a major European Clearing House and international organisations, such as the World Health Organisation. The latter included implementation and issuance of medical certificates as part of the Ebola response. Zerado’s latest …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

0 0 0 2
eSentire eSentire

The Authority in Managed Detection and Response. eSentire, Inc. is the Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations in 80+ countries, representing 35 industries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk …

Type: SMB Activities: IT Services Technologies: Cybersecurity A.I. A.I. - Machine Learning

0 0 0 578
NINJIO Cybersecurity Awareness Training NINJIO Cybersecurity Awareness Training

Building the knowledge and intuition people need to stay safe online. NINJIO is an all-in-one solution that lowers human-based cybersecurity risk through engaging training, personalized testing, and insightful reporting. Our multi-pronged approach to training focuses on the latest attack vectors to build employee knowledge and the behavioral science behind human engineering to sharpen users’ intuition. The proprietary NINJIO Risk AlgorithmTM identifies users’ social engineering vulnerabilities based on NINJIO Phish3D phishing simulation data and informs content delivery to provide a personalized experience that changes individual behavior. We serve some of the largest companies in the world and have changed the behavior …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 62
SonicWall SonicWall

Delivering real-time breach detection and prevention solutions backed by SonicWall Capture Threat Network. About SonicWall SonicWall has been fighting the cyber-criminal industry for over 30 years defending small, medium-size businesses and enterprises worldwide. Backed by research from the Global Response Intelligent Defense (GRID) Threat Network, our award-winning real-time breach detection and prevention solutions, coupled with the formidable resources of over 10,000 loyal channel partners around the globe, are the backbone securing more than a million business and mobile networks and their emails, applications and data. This combination of products and partners has enabled a real-time cyber defense solution tuned to …

Type: Large company

0 0 0 1,957
Infosecure Infosecure

[Automatic translation follows] Protect data and network with Infosecure solutions Protect your company data! Your data produced and stored is vital to the operation of your business. Every day this digital heritage is exposed. A suitable backup policy is essential to cover your entire IT fleet and ensure the continuity of your business. data backup, computer network protection, cyber resilience, cyber security, and VPN

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
QSearch (MIND MODELING INC.) QSearch (MIND MODELING INC.)

Reading the Global Mind BigData Analytics for Social Media. We make Socia Media Useful to the world by creating deeper understanding of user behaviors, insight into social nework behavior, and analytic to engage and motivate people. Current Enterprise Offering: Powerlist, Google Adwords for Facebook Ads (16 times more effective than native Facebook ads. We find potential customers with high interest in your produt/service category already. This results in higher conversion rate and at least 25% more clicks for branding.) BigData Analytics, Social Network Analysis, and Social Media Marketing

Type: Startup Activities: IT Services martech Technologies: Data Analytics

0 0 0 30
SIMBA Chain SIMBA Chain

SIMBA Chain makes it easy to build and deploy blockchain systems across multiple blockchains and data stores. Incubated at the University of Notre Dame in 2017 after winning a DARPA grant, SIMBA Chain has grown to be the trusted name in decentralized data exchange in Government and Enterprise. SIMBA Chain’s platform allows for secure, reliable and verifiable data interactions across any system. Our comprehensive solution suite marries the power of decentralized identifiers (DIDs) and verifiable credentials (VCs) with the security assurance of blockchain transactions - delivering low-cost data exchange that is secure, portable and third party verified. SIMBA allows for …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

0 0 0 66
Lastline, Inc. Lastline, Inc.

AI-powered Network Security to Defeat Advanced Threats Lastline, Inc. provides innovative AI-powered network security products that detect and defeat advanced cyberattacks attempting to enter and operating within your network. We protect network, email, cloud, and web infrastructures, minimizing the risk of damaging and costly data breaches with fewer resources and at lower cost. We uniquely apply AI to the combination of network traffic and malware behaviors – what we call “AI Done Right” – delivering a single, comprehensive incident that identifies all malicious activity and affected systems across the compromised network, with minimal false positives. The result is improved efficiency …

Type: Startup Activities: IT Services Technologies: A.I. Cybersecurity

0 0 0 7
NICE Actimize Xceed NICE Actimize Xceed

Cloud-based fincrime and compliance coverage for mid-market, regional, community banks and credit unions. Powered by the cloud, NICE Actimize Xceed brings together best-in-class AML and fraud solutions, offering complete financial crime and compliance on a single platform - tailored to mid-market, regional, community banks and credit unions. Through unique self-learning abilities, Xceed adapts to new attacks and changes in customer behavior. Prevent Online & Mobile banking Fraud, Detect fraudulent ACH payments, Behavioral analytics, Detect suspicious wire payments, Detect unauthorized portal access, FFIEC Compliance, Anti Money Laundering Software, Fraud Detection Software, Machine Learning, and Risk Scoring

Type: SMB Activities: IT Services Technologies: A.I. A.I. - Machine Learning Data Analytics

0 0 0 35
SkyRecon Systems SkyRecon Systems

SkyRecon® Systems is a leading global provider of endpoint protection platforms. With its award-winning single-policy endpoint security solutions, organizations are able to ensure protection, control access, and enforce policy for the network resources, endpoint systems, applications, data and users upon which their business relies. The company is a contributing member of Microsoft's SecureIT Alliance, has received the prestigious Red Herring 100 Award, and has been named "Entrepreneurial Security Company of the Year” by Frost & Sullivan. The StormShieldTM Security Suite (http://skyrecon.com/stormshield) has again received 4 stars in the SC Magazine Endpoint Security Group Test, has been nominated as a finalist …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 6
Astra Security Astra Security

Rock Solid Security Simplified for Websites, Apps & Businesses. Astra Security is a privately held U.S. & India based cyber security company. Backed by Techstars, Astra offers a Pentest Platform that helps organizations become proactively secure. The Pentest Platform uncovers more than 30,000+ vulnerabilities for its customers every month, saving its customers millions of dollars in potential loss and thousands of developer hours. The company has earned several accolades including ‘The Most Innovative Security Company’ by Prime Minister Narendra Modi at the Global Conference on Cyber Security (2017), one of the top 50 emerging cybersecurity companies at ‘Emerge 50’ by …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 65
Ravel Technologies Ravel Technologies

[Automatic translation follows] . .

Type: Startup Activities: IT Services

0 0 0 10
IBO IBO

[Automatic translation follows] We simplify your digital life! Since its creation, IBO has developed a unique and proven managed IT services approach to support companies in the technical and financial optimization of their information systems. Our approach aims to increase the competitiveness of companies by relieving them partially or entirely of the daily management of their IT in order to allow them to concentrate on their business activity. IBO’s service offering is divided into 4 main families: - Accommodation services, - Outsourcing services, - Services related to IT security, - Services dedicated to Health. IBO has been approved since 2013 …

Type: SMB Activities: IT Services Technologies: Data Analytics

0 0 0 155
Manhattan sas Manhattan sas

[Automatic translation follows] Expert in cybersecurity and computer networks, Manhattan is attentive to your IS, on security and networks Founded in July 2001, Manhattan positions itself as a security and network integrator in the fields of business communication. Manhattan is CCSP Checkpoint certified. Cisco Network Integrator - EXTREME NETWORK - ARUBA Security integrator around Check Point, Sophos, Kaspersky, ProofPoint, Rapid7, Security Audit products. Our offers, packaged or made to measure according to your communication needs, are delivered with professional support: MANHATTAN provides maintenance and the hotline for all its solutions. Network integration: Enterprise connectivity: MANHATTAN advises and intervenes in the …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 6
MegaO Informatique MegaO Informatique

[Automatic translation follows] Expert in business IT solutions - Specific and tailor-made software development in B to B in Valencia. The company MEGAO INFORMATIQUE has existed since 1986 and over time has become a reference in management IT. MEGAO now employs more than 20 people and continues its development to meet strong market demand. Our experience and dynamism allow us to be a key local player in our two specialties: management software publisher and network infrastructure integrator. We are experts in business IT solutions as well as specific and tailor-made B to B software development. We attach great importance to …

Type: SMB Activities: IT Services Technologies: SaaS

0 0 0 24
JPA CONSULTANTS JPA CONSULTANTS

[Automatic translation follows] JPA Consultants, IT partner of SMEs / VSEs for 30 years Thanks to our 30 years of expertise in Lyon, Saint Etienne, and the entire Rhône-Alpes region, we have set up a support system adapted to each IT project entrusted by our clients. Thus, we operate in 2 areas of activity: Infrastructure and management software via SAGE and EBP editors. Today we have 300 clients, mainly SMEs and VSEs, who demonstrate the quality of our services by entrusting us with their IT projects. Thanks to a dynamic and efficient team, we offer a range of products to …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 20
IOL - Informatique On Line IOL - Informatique On Line

Partenaire informatique de proximité, certifié ISO 9001 et ISO 27001. Microsoft CSP Silver Partner B2B IT services. Microsoft Cloud Solutions Provider and Microsoft Partner Network. Stormshield Silver Partner, ISO 27001 and 9001 Hosting provider with privately managed IP / Backbone Hosting provider , Microsoft 365, Stormshield, Network Security, and IT Support

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 14
CALYPT CALYPT

Calypt est une société spécialisée dans la sécurité des systèmes d'informations offrant des prestations sur mesure. Calypt is an IT Security Company which provides services for protecting your assets. We love to get involved in exciting projects. No matter what size we're happy to talk about a new idea, solution, or application. Feel free to contact us to discuss about security. IT Security, Consulting, Developments, Security Solutions, Penetration Testing, Software assessment, Research & development, Vulnerability assessment, Computer forensics, and Reverse engineering

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 13
Certilience Certilience

[Automatic translation follows] IT Security Expert Agency Certilience, Your IT security, our priority! Our approach : - Advise you: Risk management - preventive actions - Defend yourself: Risk management - reactive actions - Guide you: Infrastructure management - daily actions Our jobs : 1. Security audits 2. Solution integration 3. Services and support 24/7 4. Training center 5. Private accommodation What if security constraints helped to enhance the value of your business? Faced with the complexity of information systems, the risk of attack increases. A real IT security management policy is required. By evaluating and testing your company's information systems, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 27
Cosipé Cosipé

[Automatic translation follows] 🍀Ready to turn all the lights green?🍀 Cosipé is an independent consulting firm in Auvergne Rhône-Alpes offering support missions towards GDPR compliance and providing an external DPO service to public, private and associative organizations of all sizes. DPO-Cosipé offers regulatory compliance using a very pragmatic approach adapted to its clients. Cosipé benefits from extensive experience in the medico-social sector and in communities. Cosipé also specializes in #GDPR compliance for ski resorts that are members of the Domaines Skiables de France. GDPR, GDPR compliance, Cybersecurity, Personal data, Website audit, DPO, Data Protection Officer, CNIL, AMOA, Data protection, AFCDP, …

Type: SMB Activities: privacytech Consulting legaltech Technologies: Cybersecurity

0 0 0 2
HIUMA | Gestion, maintenance informatique HIUMA | Gestion, maintenance informatique

[Automatic translation follows] Finally, IT support without obligation! 🙋🏻‍♂️ Cyber ​​Security Partner of Major Accounts since 2011, we position ourselves as experts in Cyber-security, networks, Cloud, infrastructures. We see digital technology as a tool serving people and not the other way around. One of the keys to progress in cybersecurity cybersecurity, managed services, networks, and cybersecurity audit

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 5