Entities
LogoName Σ Employees
Kaizen Advisory Kaizen Advisory

. #infosec, #cybersecurity, #ddos, #phishing, #DFIR, managed services, GDPR, innovation, and consulting

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

0 0 0 3
Cloudflare Area 1 Security Cloudflare Area 1 Security

The preemptive, comprehensive, contextual, and continuous Cloud Email Security service. Acquired by Cloudflare Cloudflare Area 1 is a cloud-native email security service that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email Compromise (BEC), and other advanced threats that evade existing defenses. Area 1 is part of the Cloudflare Zero Trust platform. Acquired by Cloudflare in April 2022 Security, Big Data, Phishing, Social Engineering, Cybersecurity, Threat Intelligence, BEC, Email Security, Cloud Security, Threat and Malware Protection, Web Security, Network Security, Services for Office 365, Services for Gmail, and email protection

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics

0 0 0 30
MIRACL | The login you love MIRACL | The login you love

Secure, simple, affordable MFA in 2 seconds. MIRACL provides the world’s only user-friendly, single step Multi-Factor Authentication (MFA) and Digital Signing service. Secure MFA in 2 seconds. MIRACL Trust® ID blocks 98% of all attacks* and eliminates the need for outdated security practices such as passwords, SMS Texts, push notifications and key-cards. The use of true two-factor authentication coupled with the latest Zero Knowledge Proof (ZKP) technology means no personal data is stored or transmitted and there are no "honey-pots"​ of data exposed to attack keeping MIRACL Trust out of scope for GDPR. MIRACL Trust® Proof allows every user to …

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity

4 0 1 19
CopSonic CopSonic

Universal and secure ultrasound communication Launched in September 2013, CopSonic is developing and marketing a technology which allows communication between electronic devices based on ultrasounds as a way to interact or transmit data. This patented technology is distributed as an SDK which allows B2B partners to integrate this new communication channel within their existing vertical activities and environments. The CopSonic technology is a new universal contactless communication protocol for digital security, smart detection and IoT connectivity. It is already available for the billions of smart devices existing worldwide: feature phones, smartphones, tablets, TV-box, computers, vocal assistants, game consoles, Internet of …

Type: Startup Activities: IT Services Technologies: Wireless Sensors IoT

0 0 0 6
Cyberwatch Cyberwatch

Monitor your vulnerabilities - Check your compliance Cyberwatch - French cybersecurity company specialized in Vulnerability & Compliance Management Products: - Cyberwatch Vulnerability Manager - Cyberwatch Compliance Manager Services: - Penetration testing Job offers at https://cyberwatch.fr/recrutement/ Sécurité informatique, Test d'intrusion, Audit de sécurité, Software as a Service, Penetration testing, and Vulnerability Management

Type: Startup Activities: IT Services Technologies: Cybersecurity SaaS

16 0 15 30
Waterfall Security Solutions Waterfall Security Solutions

Stronger Than Firewalls Since 2007, Waterfall Security Solutions has been providing the highest level of protection for critical infrastructure and vital industries. With headquarters in Israel and offices in UAE, Singapore, USA, Europe, and Australia, Waterfall delivers the highest level of OT protection while enabling safe connectivity and visibility for industrial control systems (ICS). Waterfall Security safeguards the most sensitive and critical infrastructures across a wide range of industries including Power, Oil & Gas, Water Utilities, Rail, Manufacturing, Facilities, and Minting & Metals. As cyber attacks on critical infrastructure are on the rise, software alone isn’t able to deliver sufficient …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 2 127
SecBI - Universal XDR (Acquired by LogPoint) SecBI - Universal XDR (Acquired by LogPoint)

eXtended Detection and Response SecBI has evolved the traditional siloed approach in cybersecurity to an XDR Platform for a cross-product integration of network, endpoints, and cloud security tools to deliver automated smart threat detection and response. Without the need for agents, SecBI’s XDR maximizes organizations’ investment in their existing security tools and provides end-to-end protection, including against stealthy, low and slow attacks that cost organizations dearly. SecBI is currently used by financial institutions, telecoms, retailers, and manufacturing enterprises worldwide. For more information, visit: www.secbi.com or write: info@secbi.com Security Operations Centre SOC, Investigation, Cyber Security, start up, Advanced Threat, Threat Detection, …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

0 0 0 2
Secucloud GmbH - An Aryaka Company Secucloud GmbH - An Aryaka Company

Secucloud - an Aryaka company - is a worldwide provider of a cloud-based security-as-a-service platform. Secucloud GmbH, a proven SASE platform provider, delivering network security from the cloud is a wholly-owned subsidiary of Aryaka Networks. Based in Hamburg, Germany, Secucloud GmbH offers an innovative platform designed to provide an all-in-one, global, cloud-based firewall-as-a-service, secure web gateway with advanced threat protection capabilities. The platform is engineered to connect all edges including WAN, Cloud, Mobile and IoT securely together. The Elastic Cloud Security System of Secucloud is unique of its kind on the market. By combining a wide variety of security systems …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

0 0 0 31
Tessian Tessian

Cloud Email Security that intelligently prevents advanced email threats and protects against data loss Tessian was acquired by Proofpoint. View the press release: https://www.proofpoint.com/us/newsroom/press-releases/proofpoint-closes-acquisition-tessian. To see what’s new, visit https://www.linkedin.com/company/proofpoint/. Tessian is a leading cloud email security platform that intelligently protects organizations against advanced threats and data loss on email, while coaching people about security threats in-the-moment. Using machine learning and behavioral data science, Tessian automatically stops threats that evade legacy Secure Email Gateways, including advanced phishing attacks, business email compromise, accidental data loss and insider threats. Tessian’s intelligent approach not only strengthens email security but also builds smarter security …

Type: SMB Startup Activities: IT Services Technologies: A.I. - Machine Learning Cybersecurity A.I. Data Analytics

2 0 2 115
APrivacy APrivacy

Securing the digital world. Combining seamless data security with convenience for the financial services industry. APrivacy provides the banking and finance industry with an information security and tracking service anywhere, any time and on any device. APrivacy’s enabling technology allows banks to drive new revenues, reduce risk and support compliance efforts. APrivacy’s patented solution empowers bankers to communicate and share information with their clients using the devices they prefer (iPhone, Android, etc.) via the channels they prefer (Gmail, Outlook, Dropbox, etc. ) and the medium they prefer (Email, PDF, PPT, Word, Excel, etc. ). With APrivacy financial institutions achieve a …

Type: Startup Activities: IT Services Technologies: Data Analytics

0 0 0 2
ERCOM ERCOM

Société du groupe Thales, Ercom sécurise vos communications, données et terminaux. Ercom, a Thales company, is a reference company with 30 years of combined expertise in two key areas: cybersecurity and communication networks. Being a reference company means providing clients with cutting edge solutions for their industry, combining certified security and simplicity in order to accelerate end-user adoption over a large range of devices. Ercom presents : - Cryptosmart, the only “Restricted” French, EU & NATO certified solution, jointly developed with Samsung, to secure devices and end-to-end mobile communications (voice, SMS and data) on consumer smartphones and tablets. - Cryptobox, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

7 0 7 154
Kleverware by WALLIX Kleverware by WALLIX

The Key solution to Governance Kleverware provides solutions where helps companies answer questions from auditors. Help the Business to reduce the time for compliance. Mitigate Identity & Access risks. Kleverware IAG his flexible solutions. Kleverware has been a pioneer in IAG (Identity & Access Governance) since 2005, constantly focusing on innovation and its return on investments. Our goal is to help businesses mitigates the risks associated with managing their permissions. Kleverware solutions lets you see who has access to what and why. IAM - IAG, Role Management, Access review, access governance, gestion des habilitations, gouvernance des identités, and audit des …

Type: SMB Activities: IT Services

1 0 1 2
MOBIQUANT TECHNOLOGIES | Mobile Security Management MOBIQUANT TECHNOLOGIES | Mobile Security Management

Cybersecurity Everywhere, on every embedded platform MOBIQUANT TECHNOLOGIES is the leader in enterprise-grade mobile security management, covering the concepts of (MSM) Mobile Security Management and (m-UTM) Mobile Unified Threat Management. Its innovative mobile management platform allows unprecedented feature-rich capabilities for IT teams daily operations. It includes NXSafeWave VPN, NXSafevoice, NXDefender Suite, NXOffice a BYOD container, NXTrustPKI and many others unique mobile IT patented technologies. Those solutions conver the management of any device based on Apple iOS iPhones, iPad , Google Android, RIM Blackberry, Samsung Tizen, Knox, Microsoft Windows Phone smartphones and TabletPC. Mobiquant Technologies was the first company in the …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 4
inWebo inWebo

The Simple Key to High Security - our strong authentication solution protects B2B or B2C applications from phishing Founded in 2008, inWebo is a major international player in the cybersecurity industry that offers an Identity & Access Management solution including: - inWebo adaptive & passwordless MFA that secures access to B2B and B2C applications by combining the highest level of security on the market with a seamless user experience, freeing them from equipment constraints, thanks to its SaaS mode and multiple tokens. - A CIAM orchestrator to create frictionless, personalized and secure access journeys using a graphical interface or low …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 57
SecludIT - Ahead of Security SecludIT - Ahead of Security

Founded by security experts together with EURECOM, a French research institute in telecom and network security, SecludIT has developed Elastic Security, a set of products and services specifically designed to help cloud infrastructure providers and users to safely migrate to the cloud. Since its creation in 2011, SecludIT has become a recognized industry player, one of the Cloud Security Alliance founders and active member, co-author of Security Best Practices 2.1. SecludIT is a technology partner of Amazon Web Services, HP Cloud, VMware and Eucalyptus. Cloud Computing, Security, IaaS, Monitoring, Automation, Vulnerability Assessment, Audit, Amazon Web Services (AWS EC2 & VPC), …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
VUPEN VUPEN

VUPEN is the leading provider of defensive and offensive cyber security intelligence and advanced vulnerability research. While other companies in the vulnerability intelligence industry mainly act as brokers who buy vulnerabilities from third-party researchers and then sell them to their customers, all VUPEN's vulnerability intelligence results exclusively from our internal and in-house research efforts conducted by our team of world-class researchers. VUPEN's offensive IT intrusion solutions and government grade exploits enable the Intelligence community and government agencies to achieve their offensive cyber operations and lawful intercept missions using VUPEN's industry-recognized vulnerability research and intelligence. VUPEN's defensive security research enables governments …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
Rohde & Schwarz Cybersecurity Rohde & Schwarz Cybersecurity

We are your trustworthy European IT security specialist. Imprint: bit.ly/2nOH9KC Rohde & Schwarz Cybersecurity is a leading IT security company that protects companies and public institutions around the world against cyberattacks. The company develops and produces technologically leading solutions for information and network security, including highly secure encryption solutions, next-generation firewalls and firewalls for business-critical web applications, innovative approaches for working in the cloud securely as well as desktop and mobile security. The award-winning and certified IT security solutions range from compact, all-in-one products to customized solutions for critical infrastructures. To prevent cyberattacks proactively, rather than reactively, the trusted IT …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 140
Cypheme Cypheme

The Breakthrough Anti-counterfeit Technology Cypheme is an anti-counterfeit service provider that uses artificial intelligence to detect counterfeit products by analyzing the product's packaging with a neural network, using only a cellphone camera. Cypheme is a smartphone-based anti-counterfeit system. A mobile app using machine-learning powered pattern-recognition, it will allow anyone, anywhere, to verify the authenticity of the products adopting the technology. To know more about us : Website - https://cypheme.com/ Twitter - https://twitter.com/cypheme Facebook - https://www.facebook.com/cypheme YouTube: https://www.youtube.com/channel/UC-GeYZVUJuvodHograYDTtQ Anti-Counterfeit Technology, Brand Protection, Artificial Intelligence, and Artificial Neural Network

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Deep Learning

0 0 0 22
UCOPIA UCOPIA

Capitalize on the potential of wireless networks to transform the way you work, collaborate and communicate ... UCOPIA, the European leader in Wi-Fi connectivity, aims to capitalize on the great potential of wireless networks to transform the way of working, collaborating, communicating, learning and entertaining. Founded in 2002, the French company has reinvented itself to meet the demands of the markets and impose its vision of the customer experience as a guideline in the evolution of its products and services. With more than 15 years of experience in Wi-Fi access security, profiles and logs management, UCOPIA is a recognized partner …

Type: SMB Activities: uxtech Consulting IT Services Technologies: Wireless

3 0 2 23
Pen Test Partners Pen Test Partners

Pen Test Partners has been providing cyber security expertise to a huge variety of industries and businesses since 2010. Pen Test Partners / PTP has been providing cyber security expertise to a huge variety of industries and businesses since 2010. We’re paid to hack and test the security of all sorts of things, as well as providing essential consultancy, incident response, accreditation, and forensics services. We’ve tested ships and rigs (while at sea!), connected and electric vehicles, the power grids and stations that keeps countries running, as well as the payment, transport, and fulfilment systems on which everybody is reliant. …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 128
DIFENSO DIFENSO

[Automatic translation follows] Protect your data in any environment while respecting legal constraints The result of 5 years of work by our IT security research lab, the data protection that we offer represents a new approach to digital security: instead of securing its transmission or storage, Difenso directly protects the data by encrypting it. from its conception and supports “the right to be forgotten”. We thus meet European data confidentiality requirements (GDPR). Our innovative technology, certified by ANSSI, guarantees companies control and exclusive ownership of their data encryption, applicable to a multitude of infrastructure platforms and Cloud application services. Its …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

0 0 0 4
Morphisec Morphisec

Prevention-First Security: Stop ransomware and other attacks, from endpoint to the cloud, that NGAV, EDR and EPP can't. Morphisec's prevention-first security stops the cyberattacks others don’t, from endpoint to the cloud. Morphisec's software is powered by Automated Moving Target Defense (AMTD) technology, the next evolution of cybersecurity. AMTD stops ransomware, supply chain attacks, zero-days, and other advanced attacks. Gartner® research shows that AMTD is the future of cyber. AMTD augments NGAV, EPP and EDR/XDR to secure their runtime memory security gap with minimal false positives, no performance impact and no extra staff needed. Over 5,000 organizations trust Morphisec to protect …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 117
Endgame Endgame

Military-grade endpoint protection that's as simple as anti-virus Endgame makes military-grade endpoint protection as simple as anti-virus. Leveraging the industry’s most advanced machine learning technology, Endgame enables security operators of any skill level to deliver full-force protection, stopping everything from ransomware, to phishing, and targeted attacks. Endgame is the only endpoint security platform to offer a unique hybrid architecture that delivers both cloud administration and data localization that meets all industry, regulatory, and global compliance requirements. Every branch of the US military as well as the world's largest commercial organizations rely on Endgame to protect their people, technology and mission, …

Type: Startup Activities: IT Services military Technologies: Cybersecurity A.I. A.I. - Machine Learning

0 0 0 20
NasOnlines data protection NasOnlines data protection

[Automatic translation follows] The NasOnlines software responds to a simple problem: how to easily secure computer data against any type of loss? What student has never had problems with their computer? What happens to the data stored on the computer: family photos, lessons, work due, etc. For a majority of students who lost their data, the value of the data was at least greater than that of the device containing it? even. Likewise, in business, what would happen if all the data stored on computers disappeared? Even for a few hours? What would be the impact on turnover? And how …

Type: Startup Activities: privacytech IT Services Technologies: Data Analytics

0 0 0 0
TeskaLabs TeskaLabs

Software products for cyber security and data privacy. SIEM, Log management, PKI TeskaLabs is a software vendor of cybersecurity and data privacy products. We builds and delivers products for: · Real-time security monitoring - SIEM and Log Management · Safe communication for smart transport systems (C-ITS) - Public Key Infrastructure (PKI) · Advanced cybersecurity technologies for mobile, PC, web and IoT applications Our mission is to build a safer world and to help others through creativity and hard work. TeskaLabs is an award-winning company committing to creating advanced software technologies. We are a proud member of Microsoft BizSpark Plus, a …

Type: Startup Activities: IT Services Technologies: IoT Cybersecurity

3 0 3 18
Axio Axio

Optimize Investment. Minimize Cyber Risk. Axio is the leader in SaaS-based cyber management software, which empowers security leaders to build and optimize security programs and quantify risk in financial terms. Axio360 is the only cyber risk management platform to align security leaders, business leaders, and Boards of Directors around a single source of truth about their most critical corporate risks. Since 2016, Axio has been a trusted partner to many of the world’s leading critical infrastructure, energy, manufacturing, and financial services companies, helping drive better visibility and decision-making about cybersecurity priorities and investments. For more information visit axio.com Risk Management, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 1 94
Callsign Callsign

Pioneering digital trust through proprietary technology that uniquely mimics the way humans identify each other. Callsign is pioneering digital trust through proprietary technology that uniquely mimics the way humans identify each other in the real world. Positive identification of genuine users delivers privacy, safety and minimal friction whilst ensuring that bad actors are blocked. Through a simple Swipe or Type, users can be personally recognized to a 99.999% accuracy, delivering the highest fidelity AI based user recognition for the digital world. Multi-factor Authentication (MFA), Cyber Security, Realtime Identification, Two-factor Authentication (2FA / TFA), Fraud and Security Prevention Plan, PSD2, Identity …

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity A.I.

7 0 7 228
ChainSecurity ChainSecurity

We build trust in the blockchain ecosystem and make it secure for corporations, governments and startups. ChainSecurity builds trust within the blockchain ecosystem, and makes it secure for established organizations, governments and blockchain companies alike. We provide blockchain security services such as smart contract audits, audits of new blockchains and DLTs, architecture recommendations and much more. Learn more on www.ChainSecurity.com or contact us on contact@ChainSecurity.com Blockchain Security, Smart Contracts, Automated Solutions, and protocols

Type: Spin-off Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

2 0 2 23
Paubox Paubox

HIPAA compliant email made easy. Start for free: https://www.paubox.com/pricing HIPAA compliant email and texting made easy. Start for free: www.paubox.com/pricing Email security, Cloud computing, Email encryption, HIPAA compliant email, Email API, HIPAA compliance, Data Loss Prevention, Secure Email, Email Security, HIPAA email marketing, Email DLP, Email Archiving, cybersecurity, Healthcare Marketing, Healthcare IT, and Healthcare Cybersecurity

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 0 52
DB CyberTech DB CyberTech

DB CyberTech innovates privacy and security solutions for high value structured data. Stop data loss before it happens! DB CyberTech innovates predictive data loss prevention for structured data. Its customers include the world's largest financial institutions, healthcare providers, manufacturers, and governments. DB CyberTech's technology non-intrusively assesses client to data store conversations through deep protocol extraction, machine learning, and behavioral analysis. Customers gain insights by discovering information assets including sensitive data, identifying tables being accessed, and mapping the specific applications accessing the structured data stores. In addition, machine learning technology immediately pinpoints and alerts to insider threats before data is stolen. …

Type: Startup Activities: IT Services privacytech Technologies: A.I. Cybersecurity Data Analytics A.I. - Machine Learning

0 0 0 8
AttackIQ AttackIQ

Testing for everyone. Your way, your budget, your needs. AttackIQ is the industry leading provider of breach and attack simulation products for security control validation. AttackIQ emulates adversary tactics, techniques, and procedures, aligned to the MITRE ATT&CK framework, and provides visibility into your security program performance with clear data-driven analysis and mitigation guidance. At AttackIQ, we get that every organization has different testing needs. That’s why we’ve designed products fit for your unique needs: Enterprise, Ready!, and Flex. So, whether you’re new to security testing, want someone to manage it for you, or just need some help running it yourself, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 149
CyberTech Digital CyberTech Digital

At CyberTech Digital We provide the best in class managed IT services to SMEs. CyberTech is a team of IT professionals with many years of experience. Businesses are now more dependent upon IT systems than ever. Many cannot do business without their IT. A modern IT system depends upon many elements of technology working smoothly together – the network, the computers and the software. New systems are more likely to depend on cloud based technologies, such as Office 365, Xero accounts and numerous CRM systems. The software must also be mobile friendly by default, running seamlessly on mobile phones and …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 N/A
NoLimitSecu NoLimitSecu

[Automatic translation follows] Weekly French-speaking podcast dedicated to cyber security NoLimitSecu is an independent podcast, hosted by passionate people who are involved in the field of cybersecurity in various roles and companies.

Type: Media

2 0 2 7
Hirmes Cybersécurité Hirmes Cybersécurité

[Automatic translation follows] Stay in control of your data. You help keep what is most precious to you is our leitmotif. Hirmes Cybersecurity is a company that works for digital trust. We offer consulting and audit services in the field of securing information systems. Based in Clermont-Ferrand, we are committed to securing and supporting all digital players in the Rhône Alpes Auvergne region. Our service offerings are adapted from VSEs to SMEs with several areas of expertise: - Website monitoring and security (e-commerce, business site, association site). - Security audit and intrusion test of your information systems. (GDPR compliance) - …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 0
Eviden BDS Canada Eviden BDS Canada

Protection breeds performance Since April 2023, In Fidem became part of Eviden, an Atos business. Eviden is a next-gen technology leader in data-driven, trusted and sustainable digital transformation with a strong portfolio of patented technologies. With worldwide leading positions in advanced computing, security, AI, cloud and digital platforms, it provides deep expertise for all industries in more than 53 countries. Bringing together 57,000 world-class talents, Eviden expands the possibilities of data and technology across the digital continuum, now and for generations to come. Eviden is an Atos Group company with an annual revenue of c. € 5 billion. Visit www.eviden.com …

Type: SMB Activities: IT Services regtech Technologies: Cybersecurity

2 0 2 52
SCASSI - Expert cybersécurité des systèmes critiques & embarqués SCASSI - Expert cybersécurité des systèmes critiques & embarqués

[Automatic translation follows] We are cybersecurity experts specializing in critical and embedded systems and qualified PASSI-LPM Our employees, experts in the fields of security and safety, are involved from carrying out risk analyzes to the security acceptance of the entrusted project in an approach mastering SSI standards (ISO 2700x, CC, AR methods) and in close proximity to operational realities. We are positioned in the following areas (FR, EU, Maghreb Zone): - Banking/Finance/Insurance - Local authorities and state organizations - Field of health - Industries including aeronautics SCASSI Conseil is one of the leading players specializing in security in the South …

Type: SMB Activities: edtech IT Services Technologies: Cybersecurity Embedded Systems

5 0 2 54
DeepView DeepView

A privacy-focused platform to monitor and archive business communications DeepView protects companies from data leakage by staff. Real-time alerts to public data leaks and opt-in encrypted channel recording make personal devices in the workplace safer. DeepView’s unrivalled, patent-pending technology and AI algorithm is built to read photos. It is the only solution that allows companies to manage data leakage from photos, videos and text shared by employees, thereby protecting companies from inadvertent and intentional data leaks. The advanced, slick encryption recording is the only solution to meet GDPR and MiFID II standards. The platform instantly notifies you to confidential company …

Type: Startup Activities: IT Services fintech regtech Technologies: A.I.

0 0 0 8
BigID BigID

Security • Compliance • Privacy • AI • Risk • AI Data Management BigID is a leader in data security, privacy, compliance, and governance: enabling organizations to proactively discover, manage, protect, and get more value from their data in a single platform for data visibility and control. Customers use BigID to reduce their data risk, automate security and privacy controls, achieve compliance, and understand their data across their entire data landscape: including multicloud, hybrid cloud, IaaS, PaaS, SaaS, and on-prem data sources Identity Protection, Privacy Governance, PII Risk Management, Privacy Analytics, Security, Privacy Compliance, Data Governance, Data Protection, GDPR, Data …

Type: Startup Activities: privacytech IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity Data Analytics SaaS

6 0 6 586
PiaLab PiaLab

[Automatic translation follows] Practical and pragmatic GDPR compliance PiaLab, Practical and pragmatic GDPR compliance: ✔️External Dpo ✔️Compliance and advice ✔️Training and awareness Data protection, Definition of an action plan, GDPR, Training, Risk identification, GDPR, DPO, Processing register, Cybersecurity, and SSI

Type: SMB Activities: privacytech IT Services Technologies: Cybersecurity

9 0 0 4
Voatz Voatz

Voatz is a mobile elections platform powered by cutting edge technology making it safe and easy to vote from anywhere. Voatz is on a mission to make it safer and more accessible for people to participate in democracy. Backed by military grade technology, Voatz makes it possible and secure to vote from a smartphone. Voatz can be used in all kinds of voting events, including overseas citizen absentee voting, state political party conventions, town hall meetings, university student government elections, professional organizations and more. Depending on the election, Voatz leverages both high-security and low-security measures in order to protect both …

Type: Startup Activities: civictech IT Services regtech Technologies: Blockchain/Cryptocurrency

0 0 0 16
Independent Security Evaluators Independent Security Evaluators

Creating a community that rejects conventional thinking in order to make better, more secure technology. Companies come to ISE when they need to find and fix their security vulnerabilities and prove their tech is secure. They also come to ISE when they need help managing the complex and error prone process of managing security assessments. People come to work at ISE because it’s community, flexibility, and they are empowered to do meaningful work that helps others. Architecture review, Penetration testing, Source Code review, Cryptographic Protocol & Algorithm Review, Third Party Evaluation, Application Security, Software Development, Governance Risk and Compliance, and …

Type: SMB Activities: IT Services Technologies: Cybersecurity

9 0 7 42
Atredis Partners Atredis Partners

Atredis Partners delivers advanced, research-driven security assessment and advisory services all over the world. With offices all around the United States and Canada, Atredis Partners was created by a number of security industry veterans who wanted to prioritize offering quality and client needs over the pressure to grow rapidly at the expense of delivery and execution. We wanted to build something better, for the long haul. Atredis Partners team members have written five books on information security topics, and have presented our research over fifty times at the BlackHat Briefings conference in Europe, Japan, and the United States, as well …

Type: Startup Activities: IT Services Technologies: Sensors Robotics IoT

0 0 0 32
Pwnie Express (now Outpost24) Pwnie Express (now Outpost24)

Detect and monitor every wireless and wired devices to mitigate the risk of rogue devices and access points Pwnie Express closes the IoT security gap exposed by the deployment of IoT in the enterprise. By continuously identifying and assessing all devices and IoT systems, our security platform prevents IoT based threats from disrupting business operations. All without the need for agents, or changes to network infrastructure. To learn more about Pwnie Express visit www.pwnieexpress.com. Network Security, Device Threat Detection, Cyber Security Research and Development, Rogue access point detection, WiFi security, Bluetooth Security, and IoT Security Assessment

Type: Startup Activities: IT Services Technologies: IoT Cybersecurity Wireless

0 0 0 1
ERPScan ERPScan

ERPScan is the most respected and credible Business Application Security provider. Founded in 2010, the company operates globally and enables large Oil and Gas, Financial and Retail organizations to secure their mission-critical processes. Named as an ‘Emerging Vendor’ in Security by CRN, listed among “TOP 100 SAP Solution providers” and distinguished by 30+ other awards, ERPScan is the leading SAP SE partner in discovering and resolving security vulnerabilities. ERPScan consultants work with SAP SE in Walldorf to assist in improving the security of their latest solutions. ERPScan’s primary mission is to bridge the gap between technical and business security, and …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 1
Pindrop Pindrop

Security, Identity & Intelligence On Every Voice Pindrop® solutions are leading the way to the future of voice by establishing the standard for security, identity, and trust for every voice interaction. Pindrop solutions protect some of the biggest banks, insurers, and retailers in the world using patented technology that extracts an unrivaled amount of intelligence from every call encountered. Pindrop solutions help detect fraudsters and authenticate callers, reducing fraud and operational costs, while improving customer experience and protecting brand reputation. Pindrop solutions have been implemented in 8 of the top 10 US banks and 5 of the top 7 US …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 283
INFINY LINK INFINY LINK

[Automatic translation follows] Manage and secure the IT and Telecom infrastructures of SMEs for daily operational performance. At INFINY LINK, we offer a full range of IT services for SMEs, including outsourcing, cybersecurity, cloud hosting solutions, as well as backup and Disaster Recovery Plan (DRP) services. Founded in October 2005, we specialize in IT and telecoms, offering multidisciplinary expertise. Our skills extend from help desk to supervision, including network management, systems integration, cloud solutions, telecoms and outsourced backup. We personalize our offers to meet the specific needs of companies with 20 to 500 employees. As a responsible company, INFINY LINK …

Type: SMB Activities: IT Services Technologies: Cybersecurity

5 0 5 20
Yubico Yubico

Yubico sets new world standards for simple, secure login. Yubico (Nasdaq First North Growth Market Stockholm: YUBICO), the inventor of the YubiKey, offers the gold standard for phishing-resistant multi-factor authentication (MFA), stopping account takeovers in their tracks and making secure login easy and available for everyone. Since the company was founded in 2007, it has been a leader in setting global standards for secure access to computers, mobile devices, servers, browsers, and internet accounts. Yubico is a creator and core contributor to the FIDO2, WebAuthn, and FIDO Universal 2nd Factor (U2F) open authentication standards, and is a pioneer in delivering …

Type: Startup Activities: IT Services Technologies: Cybersecurity

5 0 5 473
Versasec Versasec

Managing Digital Identities Versasec is the leading provider of state-of-the-art highly secure identity and access management solutions. With its flagship product, vSEC:CMS, Versasec eases the deployment of physical and virtual smart cards for enterprises of any size. Versasec's solutions enable its customers to securely authenticate, issue and manage user credentials more cost effectively than other solutions on the market. Versasec maintains its mission of providing solutions that are affordable and easy to integrate, coupled with first-class support, maintenance, and training. Versasec customers include HSBC, Tieto, Raiffeisenbank, Hornbach, Daimler, Australia's Department of Defence, European Commission, Qualcomm, eBay, Saudi Aramco, IMF, L'Oreal …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 23
Endpoint Protector by CoSoSys (now part of Netwrix) Endpoint Protector by CoSoSys (now part of Netwrix)

Easy to use, multi-OS Data Loss Prevention Endpoint Protector by CoSoSys (now part of Netwrix) is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks, protects from malicious data theft and offers seamless control of portable storage devices. Its content inspection capabilities for both data at rest and in motion range from predefined content based on dictionaries, regular expressions, and machine learning to profiles for data protection regulations such as GDPR, HIPAA, CCPA, PCI DSS, etc. network-endpoint-protection-solutions, applications-for-portable-storage-devices, data-loss-prevention, DLP, IT-Security, security, endpoints, device-control, Enterprise-Mobility-Management, Content-Aware-DLP, and eDiscovery

Type: SMB Activities: IT Services privacytech Technologies: A.I. A.I. - Machine Learning Cybersecurity

2 0 0 143
Shifra Shifra

Cyber security-focused value-added distributor covering the Middle East region. Shifra is an information security solutions provider based out of Dubai Internet City in the United Arab Emirates. With a focus on Data Security, Identity and Access Management and Vulnerability Management, Shifra provides expertise to enterprises around the region in securing their most valuable asset: information. The name Shifra originates from the word “sifr”, the Arabic numeral zero which was later used to describe a cipher that then created a coded message, thus forming the basis of encryption as we know it today. Encryption today is at the core of most …

Type: Media Startup Activities: legaltech Technologies: Cybersecurity

1 0 1 39
CISO COUNCIL CISO COUNCIL

A Global Platform for Security, Risk & Assurance Leaders. Connect - Collaborate -Contribute - Learn CISO COUNCIL is an initiative connecting global Cyber Security, Risk & Assurance Leaders as a community. This community allows them to network, discuss and deliberate certain matters related to business, Information and digital technology risks. CISO Council provides members with a trusted platform to share & learn their domain knowledge and experience with other members through a structured approach of Events and Thought Leadership Series, Guidance and implementation documents, Research reports & Tool-kits. CISO COUNCIL is Hosted on CISOCONNECTTM (Technology Platform connecting the Cyber-security community …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

1 0 0 2
HACERA HACERA

HACERA - Unbounded Web3 Data Economies HACERA is a US-based technology company which focuses on web3, identity, privacy and secure multi-party information exchange. We started by building a security framework that significantly simplifies the Access Control Management (who can see what, who can do what, who did what, etc.) on blockchains. Its speciality and focus is highly secure Authentication, Authorization and Auditing/Accounting (AAA) services on blockchains and moved on to extend our offerings to multi-cloud deployments. HACERA is focused on regulated deployment environments, where institutions that must comply with stringent policies regarding privacy, sensitive data processing and service availability. Built …

Type: Startup Activities: privacytech IT Services Technologies: Blockchain/Cryptocurrency

1 0 1 8
Whistic Whistic

Whistic is the best way to assess, publish, and share your vendor security information. Whistic is a leading provider of proactive vendor security and an innovator in changing the way that companies publish and evaluate security posture to build trust. Whistic is the single source of trust for both buyers and sellers, helping companies speed up the pace of business. The Whistic Trust Catalog® now contains nearly 15,000 company profiles that can be assessed on-demand, and notable customers include Airbnb, Okta, Betterment, Vonage, Qualtrics, and other world-leading brands within healthcare, manufacturing, energy, and education. Risk Assessments, IT Security, SaaS, Vendor …

Type: Startup Activities: IT Services Technologies: Cybersecurity SaaS

6 0 4 79
1Password 1Password

Productive businesses use 1Password to secure employees at scale. Trusted by more than 100,000 businesses to protect their data, 1Password gives you complete control over passwords and other sensitive business information. As an integral layer of the Identity and Access Management (IAM) stack, 1Password protects all employee accounts – even those you aren’t aware of. Give employees secure access to any app or service and safely share everything you need to work together – including logins, documents, credit cards, and more – while keeping everything else private. 1Password is easy to deploy and integrates with Azure AD, Okta, OneLogin, and …

Type: Large company Activities: IT Services Technologies: Cybersecurity

7 0 7 1,972
CyberQ Group CyberQ Group

Award Winning Global Cyber Security Services & Consultancy. CyberQ Group - We Make Your Business Cyber Resilient. CyberQ Group is an award winning UK-based cyber security services provider with a global reach, having offices in UK, US and Philippines. We provide CREST approved Penetration Testing/Security Operations Center(SOC)/ Threat Monitoring and Cyber Risk Assessments, including Digital Human Reconnaissance / Cyber Due Diligence and Smart Building Cyber Assurance (SBCA). We are ISO27001 certified for all our services and registered on the G-Cloud as a accredited supplier. CyberQ Group - We Make Your Business Cyber Resilient. Web: www.cyberqgroup.com Email: TheTeam@cyberqgroup.com Twitter: @CyberQ_Group Google …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I.

9 0 7 46
Bearer Bearer

Redefining what code security can do for you. Developer-first modern SAST solution. Bearer helps modern teams ship trustworthy products with the help of our code security solution built for security, privacy and engineering teams. We combine sensitive data context with static code analysis to make security and privacy engineering simpler and smarter to maximize the ROI for your DevSecOps and central security team driven programs. For enterprises, we offer Bearer Cloud to manage product and application security at scale with deep sensitive data context. This is powered by Bearer CLI, an open-source static code analysis product with sensitive data context …

Type: Startup Activities: IT Services Technologies: Cybersecurity

12 0 12 24
Wallarm. API & App Security Integrated Wallarm. API & App Security Integrated

End-to-end API security. Securing REST, GraphQL, gRPC, WebSockets, and web apps at scale. Protect any API. In any environment. Against any threat. Built by security practitioners for practitioners, Wallarm products provide robust protection for APIs, apps, and serverless workloads running in cloud-native environments. Hundreds of Security and DevOps teams chose Wallarm to get unique visibility into malicious traffic, robust protection across the whole application portfolio, and automated incident response for appsec programs. The company is committed to supporting modern tech stacks, offering dozens of deployment options in cloud and Kubernetes-based environments, and also provides a full cloud solution. Founded in …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 4 115
Acorus Networks - Merger was done with Volterra in 2019 Acorus Networks - Merger was done with Volterra in 2019

Acorus Networks gives opportunity to enterprise to grow their revenue with complete peace of mind and with clear visibility and control of the threats to which they may be exposed. Acorus Networks provides a Cloud infrastructure service to guarantee high availability of its customers like government, defense, media, e-commerce, retail, transport, healthcare, gaming etc. by protecting them against increasing sophisticated denial of service attacks. DDoS Protection, DDoS, Website Protection, and Cybersecurity

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 2 3
HackerOne HackerOne

Peace of mind from security's greatest minds. Together We Hit Harder ® HackerOne is the global leader in human-powered security. We leverage human ingenuity to pinpoint the most critical security flaws across your attack surface to outmatch cybercriminals. HackerOne’s Attack Resistance Platform combines the most creative human intelligence with the latest artificial intelligence to reduce threat exposure at all stages of the software development lifecycle. From meeting compliance requirements with pentesting to finding novel and elusive vulnerabilities through bug bounty, HackerOne’s elite community of ethical hackers helps organizations transform their businesses with confidence. HackerOne has helped find and fix more …

Type: Large company

3 0 3 4,514
digital.security digital.security

digital.security is now an Eviden business Founded in 2015 by a group of IT security experts with the support of the Econocom Group, digital.security (~ 230 experts) aims to offer companies and government organisations advanced audit and consulting services and a CERTTM dedicated to the IoT ecosystem. Our experts have strong expertise in providing Integration & Projects (SSO, IAM, IAG, PKI, privilege management, Logs collection, analysis and management Data compliance solutions), and also in Operational Security (outsourcing, security services center operations, SOC & SIEM management). Audit, IoT, IAM, SSO, Security, Pentesting, BugBounty, DLP, Consulting, CERT, CSIRT, RedTeam, SOC, SIEM, DFIR, …

Type: SMB Activities: IT Services Technologies: IoT Cybersecurity

0 0 0 77
Secret Double Octopus Secret Double Octopus

The Complete Passwordless Solution - 360° Phishing Resistance for Enterprise Employees Secret Double Octopus provides the only passwordless MFA solution for all enterprise authentication needs. From workstations & SSOs to on-premises infrastructure & legacy applications – with zero employee-managed passwords and a highly secure yet user-friendly interface.

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 1 38
Exodata Cyberdefense Exodata Cyberdefense

[Automatic translation follows] Your secure information assets, everywhere, all the time! Find all our information on our website: www.exodata.fr Information Systems Security Consulting, External & Internal Penetration Testing, Vulnerability Assessments, and Web and Software Development

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 21
CIV by Etix Everywhere CIV by Etix Everywhere

[Automatic translation follows] CIV becomes CIV by Etix Everywhere! A pioneer in the creation of server rooms and a recognized player for its green data center solutions, CIV joined the Etix group, leader in edge data centers and became CIV by Etix Everywhere. Proximity, availability, innovation, these are the values ​​of CIV by Etix Everywhere to support you on a daily basis in your projects. Our commitment ? Bring you a secure, sovereign hosting offer while enhancing your energy impact for the benefit of a committed eco-responsible approach. All of our expertise, certifications, allow us to deliver the highest level …

Type: SMB Activities: IT Services Technologies: Data Analytics

3 0 3 17
Checkmarx Checkmarx

Checkmarx. Make Shift Happen. Checkmarx is the Enterprise Application Security provider, offering the industry leading cloud-native platform that builds DevSecTrust – Checkmarx OneTM. Fueled by intelligence from our industry leading AppSec security research team, our AI driven technology and services enable CISO, AppSec and Development leaders to prioritize their teams on what impacts their business. Our offering secures every phase of development for every application from the very first line of code until production (Shift Everywhere) while simultaneously balancing the dynamic needs of security and development teams. We are honored to serve more than 1,800 customers, including 60 percent of …

Type: Large company Activities: IT Services

5 0 5 937
Chainspace Chainspace

Sharded smart contracts. Decentralised infrastructure on a planetary scale. The Chainspace platform is powering a community of makers. Makers committed to building decentralised services that allow us all to have greater ownership and control of how we interact with the digital world. We don't care about being the first, we care about being outstanding. Blockchain, Sharding, S-BAC, Atomicity, Decentralisation, User-Centred Design, and Open Source

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

0 0 0 2
Sucuri Security Sucuri Security

• Web Application Firewall • DDoS Protection / Intrusion Prevention • Malware Removal Status Updates: status.sucuri.net We've offered holistic website security solutions since 2008 including malware removal, malware monitoring and website protection services. Our SiteCheck website security monitor is used by thousands of website owners every month to monitor their websites for malware, blacklist status and other security issues and our CloudProxy Firewall safeguards sites and those who visit them from attacks of all kinds. Our passion is growing awareness of website security issues and stamping out web-based attacks. Join us at https://sucuri.net Website Security Scanning, Website Malware Removal, Website …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 0 54
Unbound Security Unbound Security

Cryptography Orchestration Reimagined for the Enterprise Unbound Security empowers enterprise customers worldwide to confidently secure, manage and authenticate all critical business transactions, information, identity, and digital assets – anywhere, anytime. As organizations engage in digital transformation, deploy remote workforce environments, and move towards hybrid and multi cloud environments, they rely on Unbound Security CORE to protect, manage, and secure all the secrets, certificates and keys used across their organizations. The Unbound Security CORE leverages MPC to ensure best in defense cryptography and enables the management of all keys in all environments from a single place. As organizations engage in digital …

Type: Startup Activities: IT Services Technologies: Cybersecurity Blockchain/Cryptocurrency

3 0 3 15
Incloudio Incloudio

[Automatic translation follows] After 3 years of adventure between initial reflection, incubation and development, Incloudio ceased its activity in May 2017. A digital security technology company, Incloudio was developing an AppSec / DevSecOps consulting offering and SaaS security platforms 100% designed, operated and hosted in France: - CORE: Code review - VULNUS: Vulnerability management - CITADEL: Application protection Web application protection, Website protection, Code Review, Code Review, Vulnerability Management, Vulnerability Management, AppSec, DevSec, Digital Security, and Cloud

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
Redborder Redborder

The Open Source based Next Generation Intrusion Prevention System platform (NGIPS). Manage your network at a glance. Since our inception, at redborder we wanted insure the security for our clients by shaping open source solution into a business solution. Beside the fact that is one of the most secure solution, we wanted to develop our solution in open source because we share and believe the values it conveys: collaboration, transparency and exchange. And it is philosophy that inspires us to meet the needs of our customers day by day and help them to get secure and focus on their core …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 2 12
Crypta Labs Crypta Labs

Compact, low power and affordable hardware quantum random number generator design solutions for OEM partners. (QRNG) Crypta Labs is a cyber security company developing Quantum seeded random number generator designs specifically aimed at the security OEM hardware manufacturer sector. Our patented portfolio of solutions uses the quantum properties of light to detect photons which are in turned used to generate a quantum seed. We have a low power USB quantum hardware security module perfect for satellite communications. Twitter: @cryptalabs Cyber Security, Quantum Random Number Generator, Authentication, Security Software, monte carlo, and fintech

Type: Startup Activities: IT Services Technologies: Cybersecurity 5G

11 0 9 13
eShard eShard

Empowering companies to control their cyber risks. Sensitive data in mobile and IoT are increasingly exposed to more and more sophisticated threats. Compromising security can lead to severe reputation damage and your customers losing trust in your product. And ultimately your customers can be subjected to fraud, identity theft or other forms of cybercrime. eShard aims to be a trusted partner to developers and solution providers for understanding and analysing the risks in those complex technical areas. Together with you, we find the right measures to apply to ensure you maintain a strong and adequate level of security for your …

Type: Startup Activities: IT Services fintech Technologies: Cybersecurity Embedded Systems IoT

9 0 6 37
Qualys Qualys

Security and compliance for your global IT assets. Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of disruptive cloud-based security, compliance and IT solutions with more than 10,000 subscription customers worldwide, including a majority of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and automate their security and compliance solutions onto a single platform for greater agility, better business outcomes, and substantial cost savings. The Qualys Cloud Platform leverages a single agent to continuously deliver critical security intelligence while enabling enterprises to automate the full spectrum of vulnerability detection, compliance, and protection for IT systems, …

Type: Large company Activities: IT Services

0 0 0 2,599
HackMadrid %27 HackMadrid %27

[Automatic translation follows] we are a hacker community located in Madrid, Spain. Hacking culture community HackMadrid organizes a community for people who want to get started in the "hacking" culture and experienced hackers who have years of experience working on different projects for governments and companies. HackMadrid members must be at the forefront of research, experimentation and regularly attend community meetings. Being able to participate in international hacking conferences around the world (Defcon, BlackHat, HOPE, OWASP AppSec, Hacker Halted, among others). HackMadrid seeks to develop and drive the participation of the entire hacker community through regular meetings, presentations, workshops and …

Tags: H2020 Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 6
ExaTrack ExaTrack

[Automatic translation follows] Find and neutralize the attacker In recent years, the number of computer attacks has increased significantly, targeting both governments and private companies. The complexity of these attacks has also increased significantly, regardless of the type of target. Current state-of-the-art attacks and operating methods (often called APT) show that an attacker can invade an IS and remain active there for years without being detected. In this current context of computer threats, it is recommended for any entity concerned about its security to be proactive and to look for a possible compromise even before having proof that it exists. …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 4
Code42 Code42

Data + insider threat protection to secure modern collaboration without compromising the speed of innovation Code42 offers an alternative approach to DLP that helps organizations protect data more effectively and stop insider threats efficiently. Native to the cloud, Code42’s Incydr product rapidly detects data loss, leak, theft, and sabotage while speeding incident response – all without lengthy deployments, complex policy management, or blocking employee productivity. With Code42, security professionals can protect corporate data and reduce insider risk while fostering a collaborative culture for employees. Today, our team is focused on helping organizations stop IP theft, protect customer data, get better …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 2 272
Indegy Indegy

Leader in Industrial Cyber Security - Protecting SCADA, ICS and OT Networks of Critical Infrastructure. Indegy, a leader in industrial cyber security, protects industrial control system (ICS) networks from cyber threats, malicious insiders and human error. The Indegy Industrial Cybersecurity Suite with Indegy CIRRUS cloud service (ICSaaS), is powered by patented technology that arms security and operations teams with full visibility, security and control of ICS activity and threats. Indegy combines policy-based monitoring, network anomaly detection and signature detection with unique device integrity checks powered by active technology threat detection. Indegy solutions are installed in manufacturing, pharmaceutical, automotive, power and …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

1 0 0 6
Cybelius Cybelius

Industrial Cyber Solutions Cybelius is the first industrial cybersecurity solutions provider, designed to ensure the operational continuity of SCADA and ICS networks for Critical Infrastructure (energy, water, transport...), Manufacturers and all the industry. Cybelius development team, made of experienced SCADA and Cybersecurity experts, can meet all your cybersecurity issues. Our 3 major strategic fields of activity: - risk analysis & operational security - IS diagnosis - cybersecurity solutions. Cybelius's passive solutions are: CyPRES (a cyber attack detection probe) and CyFENCE (a secure interface between IT and OT). They are designed to avoid downtime, process manipulation or theft of sensitive proprietary …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
GreenLock Advisory GreenLock Advisory

Offensive security & Threat Intelligence GreenLock Advisory is an independant consulting firm created in 2015. We are offering several expertises on cyber-security: - Penetration testing - Architecture review - Threat intelligence/hunting - Automation of Security Operations - Vulnerability management cybersecurity, audit, security, threat intelligence, vulnerability management, and Automation

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
Cyber Ireland Cyber Ireland

Providing a collective voice for Ireland's Cyber Security community. Cyber Ireland is the national cyber security cluster organisation. Launched in 2019, Cyber Ireland represents the needs of the Irish cyber security ecosystem and supports its growth. The cluster is industry-led, hosted at Munster Technological University and supported by the government through Enterprise Ireland’s Regional Technology Cluster Fund. Our Cluster Mission is to strengthen productivity and competitiveness in companies through cooperation on innovation and the transfer of knowledge between companies, academic institutions and other support actors in the cluster. Our Cluster Vision is to be the driving force that supports world-class …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

3 0 3 19
CoESSI CoESSI

[Automatic translation follows] Expert in Cybersecurity and Privacy Protection The company CoESSI, created in 2010, specializes in information systems security. Our teams carry out organizational consulting missions but also technical expertise missions. It is aimed at structures of all sizes and in all sectors of activity. CoESSI is strongly involved in customer relations and is committed to offering excellent service, in particular by responding effectively to customer requirements and offering solutions adapted to their needs. With its consultants and engineers in the field of IT security, we have won the trust of key account clients. CoESSI, a dynamic and innovative …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 3 11
CrowdStrike Falcon Surface (formerly Reposify) CrowdStrike Falcon Surface (formerly Reposify)

A Gartner Emerging Vendor for EASM, Reposify’s external attack surface management (EASM) platform pinpoints unknown, exposed internet-facing assets so security teams can best secure their digital perimeter. Our intelligent internet mapping technology takes all environments of an organizations’ digital footprint into account for full-spectrum perimeter security, with no agents or deployment required. Having indexed billions of digital assets since 2016, Reposify’s proprietary internet mapping technology leverages big data to identify historical trends critical to an organizations’ security posture. Whether assets are on premise, in the cloud or housed across supply chains and subsidiaries, nothing is left unknown. All exposed assets …

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics IoT

0 0 0 14
genua gmbh genua gmbh

Über 30 Jahre Excellence in Digital Security. Made in Germany. genua ist ein Unternehmen der Bundesdruckerei-Gruppe. The more connected we become, the greater the importance of IT security: Your IT systems and communication paths have to function flawlessly, and at the same time your data must be reliably protected. We strive to help you achieve this goal. genua is a German specialist for IT security and a member of Bundesdruckerei Group. Our goal is clearly defined: developing top-quality solutions that provide our customers with reliable IT security. Our business activities range from securing sensitive interfaces in public authorities and industry …

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 0 1 226
S21sec S21sec

The biggest iberian company of cybersecurity services S21Sec, Cyber Solutions by Thales, is a leading European Cybersecurity pure-player, with more than 400 security experts and an Iberian SOC. S21Sec works with its clients globally to enable their business transformation by managing their cybersecurity risks and protecting our client’s people and assets. We can cover organization’s needs across all the NIST Framework, from Defining their Cybersecurity Strategy to Responding to the most complex cybersecurity incidents. S21sec is part of the defense unit of Thales Group, with a presence in more than 68 countries. Cybersecurity experts, Cybersecurity, Cybersecurity services, Ciberseguridad, Servicios de …

Type: SMB Activities: IT Services Technologies: Cybersecurity

6 0 6 468
Cybereason Cybereason

Hunt, Detect, Protect. An end-to-end cybersecurity solution built to empower defenders. Cybereason is the champion for today’s cyber defenders providing future-ready attack protection that unifies security from the endpoint, to the enterprise, to everywhere the battle moves. The Cybereason Defense Platform combines the industry’s top-rated detection and response (EDR and XDR), next-gen anti-virus (NGAV), and proactive threat hunting to deliver context-rich analysis of every element of a MalOp (malicious operation). The result: defenders can end cyber attacks from endpoints to everywhere. Cybereason is a privately held, international company headquartered in Boston with customers in more than 40 countries. Security, Cybersecurity, …

Type: Large company Activities: IT Services Technologies: Cybersecurity A.I. A.I. - Machine Learning Data Analytics

2 0 1 793
Deep Instinct Deep Instinct

Prevention Without Compromise. Powered by Deep Learning. Deep Instinct is the first company to apply deep learning to cybersecurity. Deep learning is inspired by the brain’s ability to learn. Once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct’s artificial brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. As a result, zero-day and APT attacks are detected and prevented in real-time with unmatched accuracy. Deep Instinct brings a completely new approach to cybersecurity that is proactive and predictive. Deep Instinct provides comprehensive defense that is designed to …

Type: Startup Activities: IT Services Technologies: A.I. - Deep Learning Cybersecurity A.I.

5 0 5 248
AV-TEST GmbH AV-TEST GmbH

Well-informed on security! AV-TEST GmbH is an independent supplier of services in the fields of IT Security and Antivirus Research, focusing on the detection and analysis of the latest malicious software and its use in comprehensive comparative testing of security products. Due to the timeliness of the testing data, malware can instantly be analyzed and categorized, trends within virus development can be detected early, and IT-security solutions can be tested and certified. The AV-TEST Institute’s results provide an exclusive basis of information helping vendors to optimize their products, special interest magazines to publish research data, and end users to make …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 2 22
CREST CREST

Building capability, capacity, consistency and collaboration in the global cyber security industry. CREST is an international not-for-profit, membership body representing the global cyber security industry. Our goal is to help create a secure digital world for all by quality assuring our members and delivering professional certifications to the cyber security industry. We accredit 300+ member companies, operating across dozens of countries, and certify thousands of professionals worldwide. We work with governments, regulators, academe, training partners, professional bodies and other stakeholders around the world. Our members undergo a rigorous quality assurance process and employ competent professionals. Organisations buying their cyber security …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

2 0 2 273
Cortex by Palo Alto Networks Cortex by Palo Alto Networks

The industry’s most comprehensive product suite for security operations. The industry’s most comprehensive product suite for security operations empowering enterprises with the best-in-class detection, investigation, automation and response capabilities. Incident Response, Computer Security, Security Orchestration, Security Automation, Threat Hunting, SOAR, and Security Orchestration Automation and Response

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 75
NowSecure NowSecure

Deliver Secure Mobile Apps Faster // Named 2X Market Leader for MAST by IDC // DevSecOps Trailblazer by Gartner Join Our Mission: To Save the World from Unsafe Mobile Apps! As the recognized experts in mobile security and privacy, NowSecure protects the global mobile app economy and safeguards the data of millions of mobile app users. Built on a foundation of standards, NowSecure empowers the world’s most demanding organizations with security automation to release and monetize 30% faster, reduce testing and deliver costs by 30% and reduce appsec risk by 40%. Only NowSecure offers a full solution suite of continuous …

Type: Startup Activities: IT Services Technologies: Cybersecurity

10 0 8 131
Illusive Illusive

Illusive was acquired by Proofpoint. View the announcement: https://www.proofpoint.com/us/blog/corporate-news/proofpoint-closes-acquisition-illusive-1. To see what’s new, visit https://www.linkedin.com/company/proofpoint/. lllusive continuously discovers and automatically remediates privileged identity risks that are exploited in all ransomware and other cyberattacks. Despite best-practice investments to protect identities, including deployment of PAM and MFA, 1 in 6 enterprise endpoints holds exploitable identity risks. Illusive makes it easy for security teams to get visibility into the vulnerable identities sprawled across an organi Illusive reduces cyber risk by shrinking the attack surface and stopping attacker movement. Illusive creates a hostile environment for attackers, depriving them of the means to progress towards …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 54
SANS Institute SANS Institute

SANS is the most trusted resource for information security training, cyber security certifications and research. SANS is the most trusted and by far the largest source for information and cybersecurity training and certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - Internet Storm Center. Information Security Training, Digital Forensics Courses, Cyber Security Training, Security Awareness Training, Penetration Testing Courses, Application Security Courses, Security Leadership Courses, Industrial Control Systems Security Courses, cloud security courses, blue …

Type: Large company

0 0 0 1,510
SAFECode.org SAFECode.org

The place where leading technology providers come together to work on today’s most pressing software security challenges The Software Assurance Forum for Excellence in Code (SAFECode) is a non-profit organization exclusively dedicated to increasing trust in information and communications technology products and services through the advancement of effective software assurance methods. SAFECode is a global, industry-led effort to identify and promote best practices for developing and delivering more secure and reliable software, hardware and services. Security, Software Security, Hardware Security, Technology, Software Assurance, Best Practices, and Industry Collaboration

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 4
Cavirin Systems, Inc. Cavirin Systems, Inc.

The First Line of Defense for Your Cloud Security Cavirin protects your digital assets across the enterprise hybrid cloud by delivering CyberPosture Intelligence. We permit enterprises to maintain their ‘golden security posture’ via continuous visibility, automated scoring against the widest set of industry best practices, regulations, and benchmarks, and remediation leveraging predictive analytics and by integrating security into the DevOps cycle. Cloud Security, Regulatory compliance, DevSecOps, Docker, AWS, CIS CSC 6.1, PCI DSS 3.2, CIS Benchmark, DISA STIG, Secure Host Baseline Configuration, Risk Assessment, FedRamp, Google Cloud, HIPAA, SOC2, Cybersecurity, Microsoft Azure, ISO27002, Hybrid Cloud, and CyberPosture Intelligence

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity Data Analytics

4 0 4 15
Internet Security Auditors Internet Security Auditors

Your Security is Our Success Experts in #Cybersecurity. Leaders in #HackingEthics, #PCI standards, #ISO27001, #ISO27032 e #ISO22301, #ProtDatos, #RGPD, #Cyberintelligence and #SecuritySDLC Síguenos en: blog.isecauditors.com facebook.com/ISecAuditors twitter.com/ISecAuditors instagram.com/isecauditors Ethical Hacking (pen-test, application testing, source code review, technical reviews,...), Managed Security Services (IPS, WAFs, AntiMalware, Sec. Infrast. Mngt., forensics & expert witness...), and Compliance Implementation (27001, 22301, 27032, PCI DSS, PA DSS, LOPD, GDPR, Habéas Data)

Type: SMB Activities: IT Services privacytech Technologies: Cybersecurity

0 0 0 54
CounterTack CounterTack

"GoSecure - POWERED BY COUNTERTACK"​ is the leading provider of Predictive Endpoint Security for the enterprises. CounterTack delivers the one true Endpoint Threat Platform, (ETP) to enterprise customers globally. CounterTack provides a unique combination of threat context, organizational resiliency and broad visibility, to mitigate endpoint risk and reduce the impact of advanced attacks. Combining a robust suite of endpoint detection and analysis capabilities by leveraging a single endpoint sensor and an open, scalable multi-tenant infrastructure, CounterTack helps IR and security teams neutralize and prevent advanced threats from damaging the business. CounterTack delivers its next-generation technology to over 250 customers globally. …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 13
McAfee McAfee

We’re creating what’s next in online protection. As technologists, creatives, and people who thrive on looking forward, we make life online safe, so everyone can enjoy it with confidence—in all the ever-shifting forms it will take. Just as life online is full of possibility, life at McAfee is as well. You’ll have the freedom to explore challenges, take smart risks, and reach your potential in one of the fastest-growing industries in the world—backed by a team that supports and inspires you. ​

Type: Large company

8 0 7 5,633
Attivo Networks®, a SentinelOne Company Attivo Networks®, a SentinelOne Company

The Leaders in Identity Security and Cyber Deception Technology SentinelOne, an autonomous cybersecurity platform company, has completed the acquisition of Attivo Networks. Attivo Networks was a leading identity security and lateral movement protection company. With this acquisition, SentinelOne extends Singularity XDR capabilities to identity-based threats across endpoint, cloud workloads, IoT devices, mobile, and data wherever it resides, setting the standard for XDR and accelerating enterprise zero trust adoption. Together, SentinelOne and Attivo Networks deliver comprehensive identity security as part of Singularity XDR for autonomous protection. Breach Detection System, Deception Technology , Threat Detection, Cloud Detection, Specialty Detection , Vulnerability and …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I. A.I. - Machine Learning

0 0 0 86
Preempt, A CrowdStrike Company Preempt, A CrowdStrike Company

Preempt, A CrowdStrike Company Preempt secures all workforce identities to accelerate digital transformation. Since 80% of all breaches involve compromised credentials, Preempt unifies security visibility and control for on-premises and cloud identities. Threats are preempted and IT policy enforced in real-time using identity, behavioral, and risk analytics. Preempt protects 4M+ workforce identities across 400+ enterprises. Customers have reduced the cost required to stop advanced threats and accelerate Zero Trust and Conditional Access initiatives. Founded in 2014, Preempt is headquartered in Silicon Valley, with R&D in Israel and sales offices worldwide. IT Security, Conditional Access, Identity, Authentication, Active Directory Security, Privileged …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 10
Mohatra Mohatra

[Automatic translation follows] Mohatra at the service of professionals: IT, GDPR, Consulting, ERP and Project management MOHATRA has been Qualiopi certified since January 2022 to guarantee you the greatest professionalism for your training. All our training can be covered by your OPCO. Do not hesitate to contact us for further information. GDPR, CyberSecurity, our team supports you in your efforts to protect personal data. In 2024, become a business provider!! Mohatra is recruiting to expand its intervention network nationally. Find out more about the offer: https://mohatra.fr/devenir-apporteur-daffaires/ Business Development, Real Estate, Renewable Energy, GDPR, and GDPR Audit

Type: Startup Activities: proptech cleantech greentech IT Services privacytech Technologies: Solar Technologies Decarbonization

4 0 4 2
DomainTools DomainTools

Detect. Investigate. Prevent. DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know. The world's most advanced security teams use our solutions to identify external risks, investigate threats, and proactively protect their organizations in a constantly evolving threat landscape. DomainTools constantly monitors the Internet and brings together the most comprehensive and trusted domain, website and DNS data to provide immediate context and machine-learning driven risk analytics delivered in near real-time. Visit domaintools.com to experience firsthand why DomainTools is the first stop for advanced security teams when they need to know. …

Type: SMB Activities: IT Services Technologies: Cybersecurity A.I. - Machine Learning A.I.

4 0 0 134