Search 1
Entities
LogoName Σ Employees
Secure Ideas, LLC Secure Ideas, LLC

Professionally Evil Founded in 2010, Secure Ideas is a woman-owned, small-business consulting firm. An industry leader in security consulting, training, and penetration testing, Secure Ideas is continually striving to improve the state of the art and practice of information security. Our focus is collaborating with clients to improve their security management, and reduce the risk of potential losses through a proactive approach. Having architected security solutions for large enterprises, and performed penetration testing for numerous industries from government agencies to Fortune 100 companies, we are adept at assessing client needs, comprehending complex details on new technologies, and identifying risks to …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 27
Triskele Labs Triskele Labs

When Experience Matters Triskele Labs is one of Australia’s fastest growing cybersecurity companies. We deliver services including traditional projects such as Penetration Testing, Compliance and Risk Management through to new breed services including 24*7*365 Security Operations and outsourced Cybersecurity Managers to ensure we are a complete cybersecurity solution centre. Our team of experts leverage elite threat intelligence to provide the highest level of cybersecurity professional services. We go the extra mile to demystify cybersecurity and become your trusted partner by developing customised programs that deliver on your specific needs to meet your budget. Our holistic approach allows us to achieve …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 75
WEBGAP WEBGAP

Remote Browser Isolation | Between You & The Malware WEBGAP is a proprietary browser isolation platform designed to physically isolate its users from web based cyberattacks. Put a WEBGAP between your users and malware using our fully hosted remote browsing service for complete internet peace of mind. #BrowserIsolation #Cybersecurity #RemoteBrowsing Browser Isolation, Remote Browsing, Cybersecurity, Infosec, and Information Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 0 3 1
VMRay VMRay

Turn complexity into clarity with the most advanced malware & phishing analysis solution At VMRay, our purpose is to liberate the world from undetectable digital threats. Led by reputable cyber security pioneers, we develop best-in-class technologies to help organizations distinguish genuine threats from the noise and obtain additional context and insights into those threats. Based on the world's most advanced malware and phishing analysis platform, we enable enterprises, government organizations, and MSSPs to automate security operations, accelerate analysis and response, and build reliable threat intelligence. In times of uncertainty and complexity, we create room for clarity and productivity to help …

Type: Startup Activities: IT Services Technologies: Cybersecurity

5 0 2 118
Sword & Shield Enterprise Security, Inc. Sword & Shield Enterprise Security, Inc.

Follow us at our new page for cybersecurity news and updates! See the link in the banner above. Securing business for more than 20 years, Sword & Shield Enterprise Security, Inc. partners with our customers to meet the needs of their dynamic cybersecurity and compliance landscape. We work closely with companies to become tightly integrated with their enterprise operations in the areas of managed security, risk and compliance, enterprise security consulting, security incident response and forensics, and security training. Recognized nationally and headquartered in Knoxville, Tennessee, Sword & Shield has offices throughout the US. Sword & Shield services a broad …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 34
TrustedSec TrustedSec

End-to-end cybersecurity consulting team leading the industry, supporting organizations, and giving back. We are TrustedSec, a security consulting team that combines high-level talent and advanced tools to help our partners achieve their security objectives. Organized by practice areas and specialty teams, we empower organizations to mature their security programs effectively with impactful recommendations. IT Security Consulting, Information Security, Application Security, Network Security, Security Consulting Services, Corporate Security, Attack and Penetration Testing, Governance, Risk, PCI, IT General Controls, HIPAA, GLBA, Vendor Risk Management, Penetration Testing, Red Team, and Business Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 1 110
Wandera, a Jamf company Wandera, a Jamf company

The way enterprises work has changed. Data is stored beyond corporate walls, and limitless connections have given rise to remote working. The perimeter has been redefined. This evolving new environment requires a new security model that is cloud centric. Wandera provides a zero trust cloud security solution to protect the modern workplace. We enable zero-trust access to all your applications, secure your data and devices against cyber threats and help you apply policies to filter internet access and reduce risk exposure. We believe in making security simple. This is why we created a unified offering, managed through a single console …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 52
Binary Defense Binary Defense

Real people detecting real threats in real time. Founded in 2014 by the industry’s top cybersecurity experts, Binary Defense is on a mission to change the security industry for the better and help organizations defend against threats of all kinds. We believe that the best defense against cyber threats uses a human-driven, technology-assisted approach. We protect businesses of all sizes through our advanced cybersecurity solutions including Managed Detection and Response, Threat Hunting, Digital Risk Protection, Incident Response, Phishing Response, and Analysis on Demand. Binary Defense was spawned from the need for better monitoring and detection capabilities in companies. The founder …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 0 204
Samurai Digital Security Limited Samurai Digital Security Limited

Cyber Security, Red Team Attack Simulation & Penetration Testing | "To defeat your enemy, become your enemy" – Sun Tzu We are a cyber and Information security services provider. Founded by university academics and consultants we develop and provide system penetration, network intrusion, incident response, user awareness, and information governance solutions, strategies, and services. Our employees are a combination of Ph.D. qualified researchers, Crest Registered Testers, and BSI 27001 lead auditors. Through our combined and academic research, we have a thorough understanding of the problem domain, ideally placing us to use applied research to mitigate the real-world risks of cybercrime. …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

0 0 0 13
tpx Security tpx Security

[Automatic translation follows] Hacking, Cybersecurity and Intelligence. TPX MX SA DE CV. (Mexico) tpx Security LLC. (USES) More than a company, we are a great team of passionate experts in the design, development and implementation of IT Solutions, cybersecurity infrastructure, through new technologies, focusing on all those companies that ultimately use them as a productivity, commerce or means of communication tool. interaction. We offer all our clients a complete service in the chain of IT and cyber security solutions, establishing innovative solutions tailored to the specific needs of our clients. [+] https://tpx.mx Courses, Workshops, Software Development, Computer Security, Conferences, Consulting, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 17
Clavister Clavister

Clavister is a specialised European cybersecurity company, protecting complex digital businesses for more than two decades. Founded and headquartered in Örnsköldsvik, Sweden, Clavister pioneered one of the first firewalls and continues to build robust and adaptive cybersecurity solutions since. Empowering a growing ecosystem of partners and resellers, we have been serving customers in more than 100 countries with 125,000+ deployments across public sector, service provider and defence sectors. Network, cloud, mobile, end points - we secure them all. The company is, since 2014, listed on Nasdaq First North. For more information, visit www.Clavister.com Network Security, Next Generation Firewalls, UTM, Information …

Type: SMB Activities: IT Services Technologies: Cybersecurity

8 0 8 121
IPGenius IPGenius

[Automatic translation follows] IPGenius is an IT services company that offers solutions adapted to all the needs encountered by VSEs/SMEs and liberal professions. ◾Have you just created your business and need to set up a computer network? ◾Do you have an existing network and you have a specific IT need? ◾Do you need to host your server or site? We suggest that we study your needs together to provide you with a concrete response in line with your expectations, the size of your company and your activity. This can range from a simple recommendation for the purchase of computer equipment, …

Type: Startup Activities: IT Services

1 0 1 2
FIVE STRATEGY FIVE STRATEGY

[Automatic translation follows] We are a company specialized in services and products in the areas of Management Systems, Computer and Information Security, Business Architecture, security in school environments and digital transformation. We generate differential values ​​by helping our clients overcome their challenges through cutting-edge technology and best practices worldwide. Our experience and methodology is aimed at providing easy and comprehensive but also innovative solutions, in very attractive times and deadlines for your company and with costs that ensure a quick return on investment. We have a multidisciplinary team of professionals who have individual experience of more than 20 years in …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 5
Sysdream Sysdream

[Automatic translation follows] 360° security expertise: Audit, Training, Cyber-training, IS security, SOC & CERT - www.sysdream.com SysDream, the Cybersecurity subsidiary of the Hub One group, supports you throughout the life cycle of securing your information system. A French pure player in IT security, SysDream offers a global offering and tailor-made solutions aligned with your challenges. It provides major accounts, public and private, in France and internationally, with a wide range of solutions focused on evaluation & the design of IS security, securing the information system as well as monitoring & IS remediation. SysDream relies on strong expertise in the areas …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 2 57
Expel Expel

An irreverent crew on a mission to make security easy to understand, easy to use, and easy to continuously improve. Expel is the leading managed detection and response (MDR) provider trusted by some of the world’s most recognizable brands to expel their adversaries, minimize risk, and build security resilience. Expel’s 24/7/365 coverage spans the widest breadth of attack surfaces, including cloud, with 100% transparency. We combine world-class security practitioners and our AI-driven platform, Expel WorkbenchTM, to ingest billions of events monthly and still achieve a 23-minute critical alert MTTR. Expel augments existing programs to help customers maximize their security investments …

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 0 8 493
Core Security Core Security

Leading-edge cyber threat prevention and identity governance solutions to help prevent, detect, test, and monitor risk. Core Security is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra's Core Security delivers market-leading, threat-aware, vulnerability, identity and access management solutions that provide the actionable intelligence and context needed to manage security risks across the enterprise. penetration testing, security intelligence, software solutions, vulnerability research, threat expertise, threat modeling, identity governance, privileged access management, and identity and access management

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 0 0 111
Shodan Shodan

Shodan is the world's first search engine for the Internet of Things and premier provider of Internet intelligence. The Shodan platform allows organizations to monitor their network, assess 3rd-party cyber risk, gather market intelligence and understand the global Internet landscape in real-time. Our data feeds are consumed by 80+ of the Fortune 100 companies, thousands of universities and millions of users around the world. Internet of Things Security, Threat Intelligence, External Network Monitoring, Third-Party Risk, and Internet Intelligence

Type: Startup Activities: IT Services Technologies: IoT

3 0 1 14
Array Networks Array Networks

Array offers a complete range of application delivery and security solutions. Array offers a complete range of application delivery and security solutions aimed at maximizing employee productivity, ensuring always-on availability, optimizing the end-user experience, and guarding business infrastructure against attack and data leakage. Application Delivery Controllers, SSL VPN, Secure Access Gateways, Remote Desktop, NFV, Network HCI, Load balancers, SSL Intercept, and Web Application Firewall

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 0 229
Entersoft Security Entersoft Security

Application security simplified. Entersoft is a leading application security provider helping organizations worldwide protect their products against malicious threats and compliance concerns. We believe that application security is a journey, not just a goal, and work with business leaders as partners and advisors to safeguard their applications with an integrated, proactive and forward-thinking approach. Entersoft was launched in 2012 and has its headquarters in Bangalore, R&D centre in Hyderabad and offices in Brisbane and Hong Kong. We provide application security assessments, DevSecOps solutions and consulting services to enhance performance through proactive, collaborative and cost-effective security practices. Going beyond penetration testing, …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency Cybersecurity IoT

2 0 0 62
Cianaa Technologies Cianaa Technologies

Simplify Compliance for Companies CIANAA a vision to assist organizations to achieve cybersecurity. CIANAA is a security acronym of Six Letters C. I. A. N. A. A. building the foundation on Confidentiality, Integrity, Availability, Nonrepudiation, Authentication and Auditing. CIANAA provides assurance via professional security auditing and attestation services. The company simplifies the compliance process and provides an assessment to help organizations to attain cybersecurity objectives and goals. Today, CIANAA offers various services including PCI DSS compliance, ISO 27001 Audit and certification, HIPAA attestation, Security governance reviews, Penetration testing, GDPR and Privacy compliance. Apart from this, CIANAA is a Silver partner …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 10
Codeproof Technologies Inc Codeproof Technologies Inc

Modern Endpoint Management Platform for SME. Dead Easy To Use. #CyberSecurity #MobileDeviceManagement #UEM #BYOD Embrace the power of mobility to grow your business as a mobile-first enterprise. The comprehensive Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more. The SaaS enterprise mobile security platform is built on the elastic cloud stack for flexible, scalable, secure and productive mobility operations. The Codeproof cloud console enables centralized Mobile Application Management, Mobile Content Management and Mobile Device Management. The platform boasts Geofencing and time-based policy enforcement to manage your …

Type: Startup Activities: IT Services Technologies: IoT Cybersecurity

8 0 8 18
TechGDPR TechGDPR

GDPR and privacy experts for the tech industry with an international and deep-tech focus. We help high-tech startups and companies become GDPR compliant. The General Data Protection Regulation (GDPR) is an European Union law that will apply EU-wide from the 25th of May 2018. If you or your company is storing or processing personal data of anyone in the EU this law applies. Compliance is important, not only because of the significant fines of up €20 million or 4% of annual group revenue, whichever is greater, but also to protect the Universal Human Right to Privacy. Compliance can only be …

Type: Startup Activities: privacytech IT Services Technologies: A.I. Blockchain/Cryptocurrency IoT

5 0 5 10
Hacken, Blockchain Security Auditor Hacken, Blockchain Security Auditor

We make Web3 a safer place Hacken is a blockchain security auditor with a vision of transforming Web3 into a more ethical place. We believe, cybersecurity is not only about hacks prevention, but the whole way of running business — without scamming investors, rug pulls, wash trading, circulation supply manipulations, etc. It’s about doing business ethically by respecting community, being honest with investors and partners, acting responsibly, and valuing reputation. We protect Web3 projects and their communities with the suite of cybersecurity services such as Smart Contract Audit, L1 Blockchain Protocol Audit, dApp Audit, Pentest, Bug Bounty Program running on …

Type: Startup Activities: IT Services Technologies: Cybersecurity Blockchain/Cryptocurrency

6 0 5 133
Corero Network Security (LSE: CNS) (OTCQB: DDOSF) Corero Network Security (LSE: CNS) (OTCQB: DDOSF)

Securing your peace of mind with over a decade of expertise in flexible, automatic, hybrid and on-prem #DDoS protection. We are Corero Network Security (LSE: CNS) (OTCBQ: DDOSF), and for over a decade, our customers' needs have sculpted our SmartWall ONE DDoS protection platform. From just DDoS detection to offering DDoS protection-as-a-service, we meet you exactly where you are, providing precisely the protection you need. We believe no customer should alter their environment for a vendor; instead, we flexibly mold our robust, automatic, on-prem solutions to safeguard your business against the evolving DDoS threats. We know that organizations face continued …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 119
DataEndure DataEndure

Helping organizations attain & maintain cyber resilience to survive and thrive in an ever-changing threat landscape. DataEndure helps companies build and maintain cyber resilience in an ever-evolving threat landscape, without draining IT resources and budget. We provide intelligent, leading-edge, and cost-effective IT solutions that help you not only survive but thrive in the face of attacks, failures or disruptions. Our horse in the race is not a specific technology, but our clients’ success – so we aren’t hindered by the limits of a particular toolset or method. This gives us the freedom to recommend and deploy what we truly believe …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 2 47
Mint Security Oy Mint Security Oy

Muut tekevät digitalisaatiosta kauniin ja käytettävän. Me lisäämme siihen luotettavan ja turvallisen. Mint Security Ltd offers consultation in 4 key areas important to all enterprises today: - Cyber Security and Risk Management - Information Security, Processes and Standards - Secure Software Development Lifecycle (SDLC) - SecDevOps & Architectures We also deliver a software solution for risk registers and incident management. Rent-a-CISO and Rent-a-Riskmanager services also available. Mint Security is lean, mean and highly effective. Do not hesitate to reach out if in need for cost-effective consultation, new ideas - or solutions to old problems. Mint Security provides its services in …

Type: Startup Activities: IT Services constructiontech Technologies: Cybersecurity

0 0 0 8
Cyberhaven Cyberhaven

Trace your data to protect it like never before Your important data is always in motion, spreading to new people, applications, and devices that are outside traditional security controls. We protect data anywhere it goes in the extended enterprise. You can't protect what you can't see. We classify data by analyzing billions of events, not just patterns in the content, assembling a data lineage to identify and protect what other tools can’t. DLP, data protection, insider threat, data tracing, and data lineage

Type: Startup Activities: privacytech IT Services Technologies: Data Analytics Cybersecurity

2 0 2 115
e92plus e92plus

We're e92plus: the leading cybersecurity VAD for the UK channel, with best in class tech and award winning services. e92plus is the leading cybersecurity VAD for the UK channel, going beyond traditional distribution to provide exceptional products and services that drive accelerated growth for our vendor and reseller partners. With an established track record of introducing disruptive and next-gen technologies and building successful channels, e92plus has grown to become an award winning, next generation VAD. Our services, delivered through in-house specialists, compliment and support our partners in their go-to-market strategy: encompassing technical, marketing, finance and operations, with our expertise in …

Type: SMB Activities: IT Services fintech martech Technologies: Cybersecurity

0 0 0 77
Alertra Alertra

Established April, 2000, Alertra has become a leading provider of Internet server monitoring and alerting services. Our U.S. headquarters is located in the historic W.E. Going (Town Center) building in downtown Stillwater, Oklahoma. Stillwater is 50 miles northeast of Oklahoma City and is the home of Oklahoma State University. Yahoo! Internet Life Magazine named Stillwater "One of America's Most Wired Cities." Our building is also home to a local Internet service provider and some other technology companies. Our monitoring servers are located around the world in Equinix, Telehouse and similar carrier-class data centers. Alertra monitors the availability, performance and security …

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 0 0 2
Angelbeat Angelbeat

Angelbeat organizes webinars and live events on Technology and Sustainability. Angelbeat organizes webinars and live seminars in 60 North American cities, featuring AWS, Microsoft, Google and other industry leaders. It has held over 1,500 seminars since its founding in 1999, drawing hundreds of thousands of attendees. Content is updated annually and focus top IT issues, including cloud, security, application, data and more. More information is available at www.angelbeat.com, plus use the #angelbeat hashtag on all social media platforms. www.twitter.com/angelbeat www.youtube.com/angelbeat, www.facebook.com/angelbeat, www.instagram.com/angelbeat Angelbeat also organizes programs on sustainability, EV Charging, Net Zero and related topics Events, Seminars, Public Speaking, IT, …

Type: Media

4 0 4 10
Webroot Webroot

Webroot, an OpenText company, was the first to harness the cloud and artificial intelligence to stop zero-day threats in real time. We provide endpoint protection, network protection, and security awareness training solutions purpose built for managed service providers and small businesses. Webroot BrightCloud® Threat Intelligence Services are used by market leading companies like Cisco, F5 Networks, Citrix, Aruba, A10 Networks, and more. Leveraging the power of machine learning to protect millions of businesses and individuals, Webroot secures the connected world. In 2019, Webroot and its parent company Carbonite were acquired by OpenText, a global leader in Enterprise Information Management. Together, …

Type: SMB Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

12 0 0 290
RunSafe Security Inc. RunSafe Security Inc.

Immunize Your Software. Protect embedded, open source, and IT systems from the most dangerous threats to software today. RunSafe Security is the pioneer of a patented cyberhardening transformation process designed to disrupt attackers and protect vulnerable embedded systems and devices. With the ability to make each device functionally identical but logically unique, RunSafe Security renders threats inert by eliminating attack vectors, significantly reducing vulnerabilities and denying malware the uniformity required to propagate. Headquartered in McLean, Virginia, with an office in Huntsville, Alabama, RunSafe Security’s customers span the critical infrastructure, IIoT, automotive, medical, and national security industries. Cyber hardening, Embedded systems, …

Type: Startup Activities: IT Services deeptech healthtech Technologies: Embedded Systems Cybersecurity IoT

5 0 3 22
Open Systems Open Systems

Your Secure Connectivity is Our Business Backed by the Service Experience Promise, Open Systems simply and cost-effectively connects and secures hybrid environments and thus ensures your organization can meet business objectives. Open Systems uniquely focuses on a superior user experience when helping organizations reduce risk, improve efficiency, and accelerate innovation. The Open Systems SASE Experience delivers on the promise of ZTNA with a comprehensive, unified and easy-to-implement and use SASE platform that combines SD-WAN and Security Service Edge delivered as a Service. We provide 24x7 operational management and engineering support from assigned engineering teams and ensure affordable and predictable costs. …

Type: SMB Activities: IT Services regtech Technologies: A.I. Cybersecurity

5 0 2 436
Yoroi Yoroi

#DefenceBelongsToHumans Yoroi is a managed security service provider. It provides cyber security solutions against industrial espionage, internal threats and advanced targeted attacks. Yoroi offers an high specialized Security Operation Center (SOC) to protect your company. Defence belongs to humans! Computer Security, Advanced Targeted Attack Prevention, Managed Security Service Provider, Couter Espionage, Penetration Testing, Vulnerability Management, SAP Penetration Testing, Cyber Security Operation Center, Digital Surveillance, Early Warnings, and Cyber Defence

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 0 5 105
Guden CyberSecurity Guden CyberSecurity

Our wide range of cyber security consulting and managed services are designed to give you the security support you need, as you need it. Guden CyberSecurity is a trusted Microsoft Partner, made up of highly-accredited cyber security professionals supporting customers across the UK. Gudens provides Microsoft subject matter expertise, guidance and deployment specialisation in the areas of AI, governance, security, collaboration & training, and application development. Our cyber security consultancy and managed services empower you to achieve your security goals with expert support every step of the way. Whether you have a security project in mind, want to know the …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 145
CLUSIT CLUSIT

Associazione Italiana per la Sicurezza Informatica Clusit is the Italian Association for Information Security, a nonprofit organization devoted to promoting every aspect of information security, including awareness among IT specialists and the general public, and government advisorship and lobbying for causes relevant to information security. Members of Clusit are security customer companies, security providers, security professional and interested individuals. Information Security

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

4 0 4 67
Authentise Authentise

Data-driven workflow management solutions for the world’s most agile engineering and manufacturing operations Authentise’s data-driven platform manages the manufacturing processes from design to part to increase efficiency and repeatability. Generate quotes, renders, material and time estimates, builds, and more on the fly. Connect to dozens of machines for automatic order status updates, traceability reports, KPI dashboards and improved estimates using machine learning. 3D printing, security, authentication, additive manufacturing, process automation, data, IIOT, manufacturing, Industry 4.0, Machine Learning, digital thread, mes, mom, workflow management, and engineering

Type: Startup Activities: IT Services Technologies: RPA 3D Printing A.I. A.I. - Machine Learning IoT

5 0 5 33
CyberSafe CyberSafe

CyberSafe is the original commercial provider of Kerberos-based security solutions, with over 20 years'​ experience, and focused on providing innovative security solutions for SAP business applications. The TrustBroker product family utilise your existing Active Directory infrastructure to offer user authentication, encryption, and Secure Single Sign-On (SSO). The products also have the flexibility to support many SAP business applications - whether on-premise or in a cloud, and being accessed from a user’s personal workstation, shared workstations, or mobile devices. The user only needs one identity (their Active Directory account) and one credential (such as a password). When users logon to SAP …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 10
CybExer Technologies CybExer Technologies

Empower Your Organization’s Cyber Resilience with Advanced Cyber Range Technology. CybExer Technologies provides comprehensive cyber security training solutions to increase organizational cyber resilience. Our platform offers a range of advanced cyber security training modules designed to enhance the cyber capabilities of organizations. With our cutting-edge cyber range, organizations can conduct highly realistic live-fire exercises that simulate real-world cyber attacks. This allows cyber security and IT teams to identify and mitigate vulnerabilities, thereby improving their prevention and response strategies. Cyber security, Security, Training, and Cyber Range platform

Type: Startup Activities: IT Services Technologies: Cybersecurity

5 0 5 40
Outpost24 Outpost24

The CTEM platform for smarter cybersecurity risk management Outpost24 empowers organizations to achieve cyber resilience with a complete range of continuous threat exposure management (CTEM) solutions. Our cloud platform unifies asset discovery and management, automates security testing, and quantifies risk in business context. Executives and security teams around the world trust Outpost24 to identify the attack surface and prioritize the most important security issues to accelerate risk reduction. Founded in 2001, Outpost24 is headquartered in Sweden, with additional offices in the US, the UK, the Netherlands, Belgium, Denmark, France, and Spain. To learn more about our products and services go …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 237
NIS. NIS.

[Automatic translation follows] Find all the latest cybersecurity news on the Itancia group page. NIS is recognized as a true Value Added Distributor (VAD). The company offers its partners (resellers, integrators and IT services companies) tailored solutions in the areas of health, loyalty, access control, digital security and M2M and IoT. NIS is also in charge of IoT technological and commercial monitoring, as well as relations with VSEs/SMEs and start-ups in this area. We aim to put our expertise at the service of our integrator and reseller partners in order to offer security and M2M solutions with high added value …

Type: SMB Activities: IT Services Technologies: Cybersecurity IoT NFC

0 0 0 5
SMESEC SMESEC

SMESEC is a project, consortium, and framework of tools and advice for turning cyber security into an opportunity for small and medium-sized enterprises. This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 740787 (SMESEC). This work is supported by the Swiss State Secretariat for Education‚ Research and Innovation (SERI) under contract number 17.00067. The opinions expressed and arguments employed herein reflect the author’s view. The European Commission and SERI are not responsible for any use that may be made of the information it contains. Cybersecurity, SME, IoT, SmartCities, E-.Voting, and …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

1 0 1 1
EXCITE EXCITE

EXCITE is where thousands of change-makers come together to advance the future of digital trust and ignite innovation. EXCITE brings together professionals and experts from both public and private sectors to collaborate, learn, and innovate on critical issues arising from the increasing digitization of our world: privacy, cybersecurity, inclusion, skills development, identity and access management, and data protection. Featuring thought leaders and topics at the forefront of change, EXCITE provides unique insights and perspectives for the digital future that cannot be found anywhere else. Identity Management, Data Sharing, Privacy, Digital ID and Authentication, Privacy by Design, technology, Digital Economy, E-Commerce, …

Type: NGO, Think-tanks, Ed, & Culture Activities: privacytech IT Services e-commerce healthtech regtech

4 0 4 5
SealPath - Full Information Protection Made Easy SealPath - Full Information Protection Made Easy

📁 Unparalleled Peace of Mind through Protection that Travels with your File 🚀 🛡📁 Unparalleled Peace of Mind through Persistent Protection that Travels with your Data 🚀Advanced Information Protection Simplified & State-of-the-art encryption and digital rights management for any file extension. With SealPath you will gain peace of mind, knowing that your digital data assets are encrypted. Our solutions deploy a layer of security that accompanies the data at all times, ensuring protection and controlling remotely the permissions on them. Minimal Resources and Time Needed, the most user-friendly solution on the market. SealPath is a European company based in Spain …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity

6 0 4 25
Bricata Bricata

Advanced network detection and response for the enterprise. Bricata, an OpenText company, is leading the next generation of advanced network detection and response for the enterprise. By fusing real-time visibility, advanced detection, analysis, forensics, incident response and threat hunting into a single platform, Bricata provides organizations with end-to-end visibility and full context for direct answers and powerful insight to take immediate action.

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 10
Red Canary Red Canary

24/7/365 threat detection and response across your cloud, identity, endpoints and everything in-between. We got you. Red Canary stops cyber threats no one else does, so organizations can fearlessly pursue their missions. Security leaders all share one goal: ‘Don’t get breached.’ Since day one at Red Canary, enterprises have relied on us to find and stop threats before they can cause harm. The most sophisticated security teams trust us for our intelligence-led Security Operations platform run by world-class security experts. We manage, detect and respond to prevalent threats across cloud, identity and endpoint so you can have more time to …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 466
ESET España ESET España

[Automatic translation follows] Founded in 1992, ESET is a global provider of security software for businesses and consumers. Ontinet is the exclusive distributor for Spain of the ESET NOD32 and ESET Smart Security solutions. About Ontinet.com Founded in 1992, Ontinet.com is the exclusive distributor for Spain of ESET security solutions. It has qualified professionals who follow all the latest developments in computer security every day and offer local technical support as well as personalized assistance to its network of more than 3,000 distributors in Spain and to its clients, both domestic and corporate. It is also a distributor of other …

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 0 1 47
Trend Micro AMEA Trend Micro AMEA

Let's make the world safe for exchanging digital information. The official LinkedIn page for Trend Micro Asia Pacific, ANZ, Middle East & Africa. Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fuelled by decades of security expertise, global threat research, and continuous innovation, our unified cybersecurity platform protects over 500,000 organisations and millions of individuals across clouds, networks, devices, and endpoints. The Trend Micro One unified cybersecurity platform delivers advanced threat defense techniques, extended detection and response (XDR), and integration across the IT ecosystem, including AWS, Microsoft, and Google, enabling organisations to better …

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity

2 0 2 96
Smart Cybersecurity Network Smart Cybersecurity Network

[Automatic translation follows] SERENE-RISC is... an integrated cybersecurity network that connects those who generate knowledge with those who put it into practice. SERENE-RISC supports collaboration between universities, industry, government and non-profit organizations across many sectors and disciplines. The network develops tools that facilitate the uptake and application of world-class research results. It's also... a network including more than 40 academics across 10 disciplines at 24 post-secondary institutions around Canada and more than 24 public and private sector members, and 6 NPO. Our key values: →Inclusive →Impartial →Empowering →Evidence-based ----- SERENE-RISC is... an integrated cybersecurity network that connects those who generate …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 1
Hacker House Hacker House

All computers are Broken. Let us show you how to secure them. Hacker House is the global portal for skills training, security services, cyber arms, and defense products. We train individuals and organizations to be self-sufficient in all things cyber security. Hacker House is a team of computer hackers seeking innovation within the information security industry. Hacker House provides offensive security solutions so you can understand the real-world risks that impact on your business. Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied. Hacker House's …

Type: Startup Activities: edtech Technologies: Cybersecurity

0 0 0 10
Intezer Intezer

Leave the SOC grunt work to technology. Keep noise, false positives, and alerts from overwhelming your security team. Leave the SOC grunt work to Intezer. Automatically triage alerts 24/7, respond faster, and cut out noise & false positives. Try free: analyze.intezer.com Malware Analysis, Threat Detection, Incident Response, Cybersecurity, Malware Classification, Threat Hunting, DFIR, Memory Forensics, Digital Forensics, Reverse Engineering, Security Operations, Memory Analysis, Attribution, Threat Research, Threat Intelligence, YARA, Disk Image Forensics, File Scanning, URL Scanning, Sandboxing, Attribution, Memory Dump Scanning, Alert Triage, and SOC Automation

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 43
Graphus Inc. Graphus Inc.

Simple, Powerful, Automated Phishing and Spam Defense Platform Graphus, a Kaseya company, provides an automated, AI-based email security solution for Microsoft 365 and Google Workspace that combines ironclad anti-phishing defense with personalized anti-spam protection -- with no manual IT admin intervention necessary. Using a powerful AI algorithm and machine learning, Graphus stops both known and zero-day email-borne threats, including phishing, business email compromise (BEC), account takeover (ATO) and ransomware attacks. Graphus takes just minutes to deploy via an API -- with no MX record changes, email rerouting or agent installation needed. Cybersecurity, Phishing, Social Engineering, Spear Phishing, Machine Learning, Email …

Type: Startup Activities: IT Services Technologies: Data Analytics Cybersecurity A.I. A.I. - Machine Learning

1 0 1 1
SINET SINET

Accelerating Cybersecurity innovation through global collaboration. SINET is a purpose-driven community that accelerates investments and innovation of early-stage and emerging growth Cybersecurity companies into the global market and has recently launched SINETConnect with 100 members. An invitation-only, highly curated Personal Trust Platform that connects: buyers, sellers, and investors and is changing the way trusted business dealings operate today and into the near future. SINET has brought its international community to life and personalized the experience for Risk Executives, VCs, and entrepreneurs within this virtual marketplace. SINET’s mission is to advance innovation and enable global collaboration between the public and private …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

19 0 19 22
Evolve Security Evolve Security

Technology enabled cybersecurity services company focused on Pentesting-as-a-Service (PTaaS). Evolve Security is a next generation offensive cybersecurity company powered by the Darwin Attack® Platform. We deliver Attack Surface Management (ASM), Pen-test as a Service (PTaSS) and cyber advisory. Evolve Security enables its clients to constantly monitor and effectively manage the cybersecurity vulnerabilities within their cloud, application, and network environments. The DARWIN Attack® platform combines cutting-edge methodologies and intelligence with real-time communication and reporting to decrease the ‘time to find’ and ‘time to fix’ cybersecurity vulnerabilities. Evolve Security is also an industry leader in cybersecurity training and its Evolve Academy has …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 68
Kenna Security Kenna Security

Kenna is now Cisco Vulnerability Management Kenna is now Cisco Vulnerability Management. Learn more: https://www.cisco.com/site/us/en/products/security/vulnerability-management/index.html security, SaaS, vulnerability management, vulnerability intelligence, threat management, and information security

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 38
Anomalix Anomalix

Next Generation Identity and Security Management Anomalix is a Gartner-recognized solutions and services company for Identity and Access Management. Anomalix provides Identity driven zero-trust security solutions that protect consumers, businesses and governments. Identity Management, Security Analytics, Information Security, IAG, Cloud Security, Third Party Risk Management, Audit & Compliance, Business Agility, and Identity Analytics

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity

0 0 0 8
Altitude Networks Altitude Networks

Altitude Networks protects enterprise data in Office 365 and Google Workspace against accidental over sharing, malicious data theft, and modern cloud backdoors access.

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 3
Upfort Upfort

Upfort unifies award-winning security and robust cyber insurance to deliver comprehensive cyber risk solutions Upfort is a leading platform for cyber security and insurance that provides holistic protection from evolving cyber threats. Founded in 2017 to expand global access to cyber resilience, Upfort makes cyber risk easy to manage and simple to insure. Upfort delivers turnkey security proven to proactively mitigate risk and comprehensive cyber insurance from leading insurers. With proprietary data and intelligent automation, Upfort’s AI anticipates risk and streamlines mitigation for hassle-free underwriting. Insurers, brokers, and risk advisors partner with Upfort to offer clients resilience and peace of …

Type: Startup Activities: insurtech Technologies: Cybersecurity

2 0 1 35
ReFirm Labs, Inc. ReFirm Labs, Inc.

Type: Startup Activities: IT Services transporttech regtech

4 0 1 1
Quantum Blocks Inc Quantum Blocks Inc

Quantum computing algorithm development for (Blockchain and other) cryptography and cryptoanalysis projects. Fusion of Quantum Computing and Blockchain Tech: "we let Schrodinger's cat play with blocks"​. Among other things, we are working on quNIX - to provide a workable Quantum Computer OS for algorithms and applications. Focus Areas: Algorithms - Cryptography and Crypto Analysis Applications - Military-Grade Blockchain Solutions & Enhancements Quantum Blocks Inc is a RLC, Delaware, Company Quantum Computing, Blockchain, Cryptography, Crypto Analysis, Digital Ledgers, quNIX, and MIL-TEC

Type: Startup Activities: IT Services deeptech Technologies: Blockchain/Cryptocurrency

0 0 0 3
Cygenta Cygenta

We don’t just do cyber security. We navigate you through cyber risk. Our approach to cyber security is more than just penetration testing or awareness-raising. We are experts in combining the technical, human and physical aspects of security best practice. We help some of the largest and most complicated organisations build resilience and sustainability in their risk management, not just their technical response. ​ So how do we do it? First and foremost, we have front-line experience across all aspects of cyber security. We then support this with powerful tools to help analyse risks, identify weaknesses, strengthen defences and set …

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 0 4 5
Revelock · A Feedzai Company Revelock · A Feedzai Company

Type: Startup Activities: IT Services

2 0 1 36
Fyde Fyde

Fyde is now Barracuda CloudGen Access. Secure zero trust access to all your apps and data from any device and location. Fyde is now Barracuda CloudGen Access. Secure zero trust access to all your apps and data from any device and location. Security starts with access. The CloudGen Access zero trust model establishes unparalleled access control across users and devices without the performance pitfalls of a traditional VPN. It provides remote, conditional, and contextual access to resources and reduces over-privileged access and associated third-party risks. With CloudGen Access, employees and partners can access corporate apps and cloud workloads without creating …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 4
Cervello | Rail Cybersecurity Cervello | Rail Cybersecurity

Turn Data Into Operational Security Insights Cervello is the world’s leading cybersecurity platform designed to protect the critical environment of heavy transport infrastructure from cyber threats (across OT/ICS, IT/IoT, Signaling, Rolling Stock, and proprietary technologies). Cervello Platform is used by some of the world’s most known operators and infrastructure managers as their go-to tool for risk management - delivering comprehensive visibility, deep asset and threat intelligence, and proactive operational resilience capabilities. Recognized by Fast Company and Forbes, Cervello provides transport teams the contextual understanding to efficiently manage and control their operations, as well as take action to maintain safe and …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

1 0 2 36
EfficientIP EfficientIP

Our Goal: Simplify modern key IT challenges and enable secure dynamic IP communication between users, apps, & services. EfficientIP is a network security and automation company, specializing in DNS-DHCP-IPAM (DDI). We promote business continuity by making your IP infrastructure foundation reliable, agile, and secure. Integrated solutions enable IP communication and simplify network management with end-to-end visibility and smart automation, while patented technology secures DNS services to safeguard data and ensure application access. Companies in all sectors rely on EfficientIP offerings to face the challenges of key IT initiatives such as cloud applications and mobility. IP Address Management, DNS-DHCP services management, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

4 0 4 226
Rubicon Labs, Inc Rubicon Labs, Inc

Rubicon Labs is a cybersecurity startup founded by veterans of Apple and Broadcom with offices in San Francisco, California and Austin, Texas. Cyberwarfare is widespread in the cloud and now going kinetic. A quarter of a billion cars and some 25 billion devices will join the IoT by 2020. That means that cars, homes, and public spaces will join credit cards and PCs on the list of things that speak the same language. It also means they’ll join the list of things that can be hacked. Rubicon Labs is solving that problem with an IoT identity platform. Zero-knowledge keys are …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

1 0 1 2
Riscure Riscure

Driving Your Security Forward Riscure is an independent security laboratory founded in 2001 with customers in North America, Europe and Asia. We specialize in evaluating and improving the security of products that are designed to operate securely in an environment where attackers might attempt access by either physical or logical means, often without the risk of being detected. Our work includes endpoint, communication protocols as well as back-end security. Besides offering security evaluation and advisory services, Riscure develops and maintains security test products for organizations that wish to perform their own hardware or software testing. Riscure is market leader in …

Type: SMB Activities: deeptech IT Services Technologies: Cybersecurity Embedded Systems IoT

3 0 3 174
Scalys Scalys

Security at the Edge. Improve security in information technology (IT) and operational technology (OT) environments. Scalys is a leading innovative company to improve security in information technology (IT) and operational technology (OT) environments. Core competences are Cybersecurity, end-to-end security, high-performance communication and secure networking. Scalys delivers enterprise class performance and quality for products like a broadband router, edge gateway, firewall, VPN and other networking communication solutions. Embedded Systems, IoT, Cybersecurity, Secure Networking, End to End Security, High Performance Communication, AI/ML, Confidential Computing, Edge Computing, Azure, IoT Edge, Open Enclave, Building Management Solutions, Security at the Edge, Zero Trust, Enclaves, and …

Type: Startup Activities: IT Services deeptech Technologies: Cybersecurity Embedded Systems A.I. A.I. - Machine Learning IoT

4 0 4 7
NetVPro NetVPro

Your IT easy button Our services are geared towards helping medium to large sized companies meet their productivity goals. NetVPro can provide an I.T. solution that addresses your exact requirements, leveraging your existing infrastructure where possible. Your initial consultation and quote is free. NetVPro can design a solution or provide staff augmentation services for both short or long term. Disaster Recovery as a Service (DRaaS) We replicate and host in our data-centers physical or virtual servers to provide failover in the event of a man-made or natural catastrophe. Cloud Storage Backup Subscription plans provide diverse offsite storage at affordable monthly …

Type: Startup Activities: IT Services Technologies: Data Analytics

3 0 3 16
Armis Armis

The Asset Intelligence Cybersecurity Company Armis is THE asset intelligence cybersecurity company. Assets are personal devices like mobiles, laptops etc as well as corporate owned assets like medical MRI machines or industrial plants, building systems, CCTV cameras or mobiles and laptops etc. They represent the attack surface within an organization that bad actors go after to disrupt business. We protect organizations across the world in all industry verticals as well as federal and state and local governments to protect the entire attack surface of an organization and manage cyber risk. We have built partnerships and integrations with the world's leading …

Type: Startup Activities: IT Services Technologies: 5G Cybersecurity IoT Wireless

3 0 3 818
ActZero ActZero

24/7 Ransomware Defense You Can Measure. Designed for smaller businesses, ActZero Managed Detection & Response (MDR) service provides a powerful full-stack cybersecurity solution at a fair price. We wrapped enterprise-grade technology combined with our expert threat hunters into a service with 24/7 protection across endpoints, network, mobile devices, cloud, identity, and email accounts. Cloud Security, CMMC, Cybersecurity Maturity Model, Data Security, Info Sec, Information Security, Malware Analysis, Malware Defense, Malware Protection, Managed Detection and Response, MDR, MDR for Mobile, Ransomware, Ransomware Defense, Ransomware Protection, and Ransomware Readiness Assessment

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I. A.I. - Machine Learning

3 0 2 62
Cloud Security Alliance Cloud Security Alliance

Building connections through online cloud security solutions. The Cloud Security Alliance is a non-profit organization formed to promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is comprised of many subject matter experts from a wide variety disciplines, united in our objectives: * Promote a common level of understanding between the consumers and providers of cloud computing regarding the necessary security requirements and attestation of assurance. * Promote independent research into best practices for cloud …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

1 0 1 489
Adallom Adallom

Founded in 2012 by cyber defense veterans, Adallom is a cloud access security broker delivering visibility, governance and protection for SaaS applications like Salesforce, Google Apps, Office 365 and Box. Our innovative platform is simple to deploy, seamless and extensible, and is available as a SaaS-based or on-prem solution. Powered by Adallom SmartEngineTM advanced heuristics and backed by Adallom Labs, our elite cybersecurity research team, we make it easy to secure corporate data, govern cloud application usage and protect against threats in the cloud. For more information, visit us at www.adallom.com or follow us on Twitter @adallom. SaaS security, cloud …

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity SaaS

2 0 1 6
RiskRecon, A Mastercard Company RiskRecon, A Mastercard Company

Enabling you to easily achieve better risk outcomes for your enterprise and your supply chain. RiskRecon by Mastercard enables you to easily achieve better risk outcomes for your enterprise and your supply chain. RiskRecon’s cybersecurity ratings and assessments make it easy for you to understand and act on your risks, delivering accurate, risk prioritized action plans custom tuned to match your risk priorities. As a leading provider of cybersecurity ratings, RiskRecon continuously monitors the cybersecurity risk of over 19 million companies across even the most highly regulated industries from finance and insurance to aerospace and healthcare. RiskRecon provides deep, risk-contextualized, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 2 115
KYND KYND

Cyber risk management for every business. Simple to understand, quick to monitor and easy to prevent. Organisations of all sizes have or will be impacted by cyber risks and whilst this threat is well publicised it is not always well understood. KYND is about to change that. KYND's innovative, industry first and proprietary cyber risk management technology enables all businesses to easily monitor and understand the cyber risks they face, take action when necessary and be alerted to future risks as they arise. KYND's cyber risk products provides businesses of all sizes a simple, easy to use and cost-effective solution …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 49
Probely Probely

Web Vulnerability Scanner designed to empower Security and DevOps teams working together to reduce the security risk Probely is the premier cloud-based application security testing solution designed to empower Security and DevOps teams working efficiently together on a DevSecOps approach built to reduce risk across web applications and RESTful APIs. Probely empowers Security and DevOps or Development teams to work together to secure their web applications and APIs. Our goal is to narrow the gap between development, security, and operations by making security an intrinsic characteristic of web applications development life-cycle. With over 30,000 vulnerabilities detection capabilities, including SQLi, XSS, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 0 4 38
CyberGRX CyberGRX

Sleep soundly with our TPRM platform. Pinpoint, measure, and prioritize third-party cyber risks for effective planning. CyberGRX = TPRM for the speed of your business. When assessments take weeks or months to complete, it impairs an InfoSec team's ability to speak into a vendor decision. With CyberGRX's library of 14,000 attested assessments, 250,000 company profiles, predictive risk insights and threat intelligence, you can make initial vendor decisions immediately. And, if deeper evaluation is needed, CyberGRX plus ProcessUnity's automated workflows streamline the process so you'll never chase assessments again. The risk of inaction is costly. The ROI of CyberGRX and ProcessUnity …

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics

0 0 0 59
Simility, A PayPal Service Simility, A PayPal Service

Adaptive Decisioning Platform built with a data-first approach to deliver continuous risk assurance. Simility offers real-time risk and fraud decisioning solutions to protect global businesses. Simility’s offerings are underpinned by the Adaptive Decisioning Platform built with a data first approach to deliver continuous risk assurance. By combining artificial intelligence (AI) and big data analytics Simility helps businesses orchestrate complex decisions to reduce friction, improve trust, and solve complex fraud problems. Built by industry veterans, Similty is trusted by some of the world’s leading consumer brands across Financial Services, Payment Processors and Commerce merchants. To learn more, visit www.Simility.com. Fraud Detection, …

Type: Startup Activities: IT Services Technologies: A.I. - Machine Learning Data Analytics A.I.

0 0 0 23
CounterFlow AI, Inc. (Now LiveAction Software) CounterFlow AI, Inc. (Now LiveAction Software)

AI-Driven Network Visibility - Now LiveAction Software Check out our new LinkedIn Page here: https://www.linkedin.com/company/liveaction/

Type: Startup Activities: IT Services Technologies: A.I.

1 0 1 7
Pipl Pipl

Stop fake profiles at signup with easy-to-implement and affordable trust decisioning tools Pipl is the identity trust company. Our solutions allow organizations to provide frictionless customer experiences and approve more transactions with greater confidence and speed. We use multivariate linking to establish deep connections among more than 330 billion trust signals—email, mobile phone and social media data that spans the globe—and then look at the big picture to derive identity trust. Learn more at pipl.com. Identity Verification, Fraud Prevention, Identity Resolution, Business Intelligence, Contact Enrichment, Identity Trust, Digital Trust & Safety, Digital Trust Policy, Stopping Fake Profiles, and Trust at …

Type: SMB Activities: IT Services regtech Technologies: Data Analytics

10 0 10 93
ObservePoint ObservePoint

Complete Digital Governance. Websites are complex. They are essential to the image and growth of your company, and to the privacy and trust of your customers. But websites have so many dynamic parts and pages that it’s nearly impossible to keep up with all of them all the time. Until now. ObservePoint’s Web Governance platform automates the scanning of your website; from the highest traffic pages and user paths to the dark corners of your company’s web presence. We give you the ability to see what’s performing below acceptable standards, trace it back to the source, and quickly see a …

Type: Startup Activities: IT Services martech Technologies: Data Analytics Cybersecurity

0 0 0 87
Eur'Net Eur'Net

[Automatic translation follows] Since 1997, Eur'Net has been made up of teams of professionals specializing in the security of IT services & Internet. Kaspersky Gold Partner

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 5
Liquidity Network Liquidity Network

Decentralized Trustless Finance LiquidChain builds the Liquidity.Network (http://liquidity.network), a practical global blockchain micropayment system, built on top of Ethereum, supporting millions of users securely, reducing transaction costs significantly and enabling the mainstream adoption of blockchain. As a global settlement system, the Liquidity.Network offers an API to developers to build their applications on top of and allowing payment processors to benefit from the secure and fast transmission of digital cash. The Liquidity.Network has no access to the assets of the participants/users, those funds are secured by the underlying blockchain. The secret sauce of the Liquidity.Network are novel hubs, which are significantly …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

1 0 0 1
(ISC)2 Quad Cities Chapter (ISC)2 Quad Cities Chapter

(ISC)2 Quad Cities Chapter is a local chapter of (ISC)2, an international information security association Our mission is to support and provide members and constituents with credentials, resources, and leadership to address cyber, information, software and infrastructure security to deliver value to society. (ISC)2 is the largest not-for-profit leader in educating and certifying cyber, information, software, and infrastructure security professionals throughout their careers. President: Shadrack Roberts - https://www.shadrackroberts.com/ Member Chair: Dr. John D. Johnson - https://johndjohnson.com/ cybersecurity, information security, privacy, cyber, infosec, and information assurance

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 N/A
Cryptium Labs Cryptium Labs

Swiss-made Security-Oriented Staking Services Cryptium Labs offers secure and highly available digital signatures for Proof-of-Stake networks, such as Tezos, Cøsmos, and Polkadot from the Swiss Alps We publish educational, research-oriented, and data-driven analysis on Blockchain and all the disciplines the underlying technology requires, such as Cryptography, Computer Science, Hardware, or Security. We also wish to bring down the barriers to entry for people who struggle with technical jargon by writing easy-to-read and highly comprehensive content, suitable for audience with diverse backgrounds. Our aim is to make it as simple and secure as possible for all the stakeholders to participate and …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

2 0 1 1
Eperi GmbH Eperi GmbH

We connect you to the cloud - easy, secure, customizable, compliant! eperi – Privacy is the starting point We believe that data privacy is a fundamental human right. Our aim is to allow people to always stay in control over their data. Without compromises and with the best technology. With the customer at the center, we have created a solution that is invisible to the user while meeting the highest security standards. With the eperi solution, companies benefit from all the advantages of Cloud usage, e.g. efficient company-wide collaboration – while staying legally compliant according to worldwide data protection laws. …

Type: SMB Activities: IT Services privacytech Technologies: Cybersecurity

3 0 3 27
SPARTA SPARTA

Cybersecurity Competence Network pilot to ensure Security Union and Strategic Autonomy of the EU. H2020 SPARTA is a novel Cybersecurity Competence Network, supported by the EU’s H2020 program, with the objective to develop and implement top-tier research and innovation collaborative actions to ensure digital security and strategic autonomy of the EU. The SPARTA consortium, led by CEA, assembles a balanced set of 44 actors from 14 EU Member States at the intersection of scientific excellence, technological innovation, and societal sciences in cybersecurity. With one of the greatest and most multicultural research ecosystem in the world we are ready to make …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 1 2
CERT- EU CERT- EU

Official account of the CERT for the EU institutions, bodies & agencies. Our mission is to contribute to the security of the ICT infrastructure of all European Union institutions, bodies and agencies and help our constituents prevent, detect, mitigate and respond to cyber-attacks. Please use secretariat@cert.europa.eu for interaction. Cyber Defense, Cyber Security, Cybercrime Investigation, Incident Investigation, Threat Intelligence, Cyber Operations, Threat & Vulnerability Management, and Security Incident Response

Type: Public

4 0 4 26
Metomic Metomic

Helping you detect and protect sensitive data across your SaaS apps. Metomic protects sensitive data in SaaS applications like Slack, Jira, Microsoft Teams, and ChatGPT. data privacy, gdpr, ccpa, data quality, data management, pci, soc ii, iso 27001, and data infrastructure

Type: Startup Activities: privacytech IT Services Technologies: A.I. Data Analytics Generative A.I.

3 0 3 49
Ubisecure Ubisecure

Identity management that improves security, streamlines user experiences, meets compliance, & lowers operational costs. Ubisecure is a Europe-based Identity Services specialist and offers a comprehensive CIAM (Customer Identity & Access Management) & LEI (Legal Entity Identifier) platform to manage the digital identities of customers, citizens, workforce and organisations. Through our RapidLEI service, the company is the largest accredited LEI issuer globally and has issued verified organisation identities to over 200k organisations. Ubisecure works with enterprises, banks, fintech/regtech, and Government for internal and client use of digital identity in digital identity management, KYC/KYB, and legal entity regulatory requirements, and delivering on …

Type: SMB Activities: IT Services Technologies: Cybersecurity

25 0 24 61
Firestorm Cyber Firestorm Cyber

Managed Security Services Provider We believe that the Internet has become a crime scene. We were born from that belief and that the same knowledge and skills used by bad people to commit crimes should be used in defense of information, privacy, and security. Every practice we have and everything we do is centered around security. If a technology doesn't meet our highest standards of protecting the Confidentiality, Integrity, and Availability of information systems, it won't be a part of our offerings to our customers. We are proactive in analyzing emerging threats and deploying defensive measures against them in our …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 10
Flare Flare

Attackers Shouldn’t Have The Information Advantage. Enabling organizations to continuously monitor threats caused by human error and malicious actors to protect their data, financial resources, and reputation. Dark Web, External Threat Intelligence, Data Analysis, Web Crawling, CTI, Darknet, Intelligence, cybersecurity, Big data, and Fraud

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics

1 0 1 72
NetDiligence® NetDiligence®

Serving today's cyber insurance community with world-class solutions and programming. NetDiligence® is a Cyber Risk Assessment and Data Breach Services company. Since 2001, we have conducted thousands of enterprise-level cyber risk assessments for a broad variety of corporate clients, including well-known names in banking, brokerage, mortgage, insurance, clearinghouse, and other financial service sectors. We have also assessed major Internet-based retailers, online auctions, B2B service providers, software companies, medical providers, universities, and a significant percentage of the Fortune 2000. NetDiligence services are used by leading insurers in the US and UK that offer "cyber risk insurance"​ for businesses. Insurers like ACE, …

Type: SMB Activities: insurtech IT Services Technologies: Data Analytics

2 0 2 16
N8 Identity Inc. N8 Identity Inc.

Award-winning Identity-as-a-Service (IDaaS) governance platform on Microsoft Azure N8 Identity, Inc. has re-imagined identity governance with an agile, cloud-based and mobile-first solution that brings security and value to organizations of all sizes. N8 Identity addresses the changing needs of modern businesses by intelligently managing access across all devices, in the cloud, and in the data center through both its Managed Identity Services and TheAccessHubTM, its award-winning Identity-as-a-Service (IDaaS) governance platform. Founded in 2000, N8 Identity has always been focused exclusively on building scalable, agile identity governance solutions, and has deployed nearly one billion identities to date. Our goal is to …

Type: SMB Activities: IT Services regtech Technologies: Cybersecurity

0 0 0 10
iGuards - Keeping your data safe. iGuards - Keeping your data safe.

CISO & IT-Governance Helping you guarding your valuable digital information today and for the future. • CISO • CISO-as-a-service • IT-Governance • ISO-27001 • NIST • GRC: Governance, Risk and Compliance iGuards offers a full service in gaining & keeping the trust in your Digital world. Are you in need of a CISO or further protection of your valuable digital information? Our professionals supervise complex security and privacy assignments from diagnosis to implementation. Let us be the guardians of your digital trust ! iGuards – Keeping your data safe. Information Security, Governance, CISO, CISO-as-a-service, Security Audit, NIST, ISO 27001, and …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity

0 0 0 3
Sweepatic, an Outpost24 Company Sweepatic, an Outpost24 Company

We discover, analyze and monitor the external attack surface of organizations. Sweepatic, an Outpost24 Company is the European leader in External Attack Surface Management. Our cloud-based platform automates the continuous mapping, monitoring, and managing of all internet-connected assets and risks. Running 24/7, the Sweepatic Platform delivers attack surface observations via high-impact notifications and an easy-to-use dashboard. In this way, Sweepatic supports organizations in structuring and reducing their external attack surface – making them more cyber resilient and an unpopular target for bad actors. Passive reconnaissance, Cyber security, Data leakage, Cyber Threat Intelligence, Digital footprint, Digital Risk monitoring, Counterintelligence, Asset management, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 2 15
Cybersprint Cybersprint

Cybersprint offers automated discovery of the assets in your attack surface, and detect and monitor the risks within. Cybersprint maps the attack surface of organisations and brands, offering full visibility using continuous and automated digital asset discovery. Cybersprint’s zero-scope AI-driven approach to Attack Surface Management provides an outside-in perspective, eliminating blind spots and detecting and preventing threats including data leaks, brand abuse, supply chain risk, phishing. Darktrace completed the acquisition of Cybersprint in March 2022. Darktrace (DARK:L), a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I.

0 0 0 2
IntSights, a Rapid7 company IntSights, a Rapid7 company

IntSights delivers best-in-class, cloud-native external threat detection to further extend Rapid7’s industry-leading security operations platform, providing customers with end-to-end external and internal threat detection, automation and remediation. Cyber Intelligence, Threat Remediation, Threat Intelligence, and Cyber Threat Intelligence

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 41
The Diana Initiative The Diana Initiative

A conference focused on Women, Diversity, and Inclusion in Information Security The Diana Initiative is a 501c3 non-profit corporation registered in Las Vegas Nevada. Our mission is to Elevate, Inspire, and Support women and non-binary people of all races, cultures, and backgrounds through every stage of their Information Security career with Education, Collaboration, and Resources offered online and at inclusive & welcoming conferences. During "Hacker Summer Camp", The Diana Initiative hosts a two day conference celebrating diversity, women in security, and how to pursue a career in information security and technology. We are a conference focused on Women, Diversity, and …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 13
Cyber Resilience Centre for London Cyber Resilience Centre for London

Providing advice and support for London based businesses. Part of a national network of police-led, not for profit CRCs. The Cyber Resilience Centre for London was launched in October 2022 to help SMEs and third sector organisations reduce their vulnerability to common cyber threats. Part of a national network of Centres, we are a collaboration between policing, academia and industry to make London the safest City in the world to do business online. Cyber, Information Security, Business Resilience, Cyber Security, Enterprise, cyberresilience, london, SMEs, businesses, and charities

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

6 0 7 23