Search 1
Entities
LogoName Σ Employees
Smart Protection Smart Protection

Making the internet a safer place for online businesses and consumers alike. We are experts in brand and content protection online. Thanks to our team of cybersecurity experts and our AI technology, we protect the intellectual property for our clients worldwide. As Member of Google’s Trusted Copyright Removal Program (TCRP), and thanks to our special agreements with the main digital marketplaces and social networks, we are able to delist infringing URLs, and remove illicit products and content quickly and efficiently. This allows brands and content owners to focus resources on their individual business needs. Protection of intellectual and industrial property …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

7 1 5 91
Threatcare Threatcare

The leader in proactive attack simulations. Recently acquired by ReliaQuest. Threatcare is the leader in proactive attack simulations, helping companies measure the effectiveness of their cybersecurity programs through their software. Their real-time insights and actionable recommendations enable companies to secure more faster, while having greater confidence in their current security controls. ReliaQuest’s recent acquisition of Threatcare will enhance the power of the ReliaQuest GreyMatter platform by enabling enterprise customers to vastly increase the quality and efficacy of their detection and response capabilities. Breach and Attack Simulation, Penetration Testing, Incident Response, Vulnerability Scans, BAS Technology, Cybersecurity, and Information Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 0 1
Identiv Identiv

YOUR WORLD, VERIFIED. Identiv is a global leader in seamless authentication and security solutions. We verify frictionless access and anywhere operations, protect identities from malicious attacks, secure intellectual property, and drive IoT innovation. Our platform encompasses RFID and NFC, cybersecurity, and the full spectrum of physical access, video, and audio security. We digitally secure the physical world. Sign up for our monthly newsletter: https://go.identiv.com/newsletter RFID, NFC, Access Control, Physical Access Control, Logical Access Control, Credentials, RFID Inlays and Tags, FICAM, FIDO, CPNI, Smart Card Readers, Video and Data Analytics, Telephone Entry Systems, IoT, Mobile Security, Identity Management, Security, High Frequency …

Type: Startup Activities: IT Services Technologies: Wireless Cybersecurity Data Analytics IoT NFC

14 1 10 284
NetFoundry NetFoundry

Reinvent Secure Networking Embed secure networking into your applications and solutions, as code. Use our open source or leverage our turnkey SaaS. zero trust, cybersecurity, security as code, open source zero trust platform, secure by design, programmable networking, application specific networking, secure IoT, secure IIoT, and secure edge

Type: Startup Activities: IT Services Consulting Technologies: IoT Cybersecurity SaaS

17 1 14 76
ZYMBIT ZYMBIT

Secure edge compute and IoT solutions for zero trust environments. Trusted by professionals for lifetime immunity. Zymbit builds secure edge compute and IoT solutions that operate in zero trust environments. Thousands of developers choose Zymbit products to protect critical data, software and credentials onboard Linux compute devices. Leading enterprise customers trust Zymbit technology to protect IoT devices and edge infrastructure. Zymbit primary products are Secure Compute Modules, Secure Edge Nodes and Hardware Security Modules. All products feature the tamper-resistant Verified Hardware Agent that supports encrypted file system, secure boot, cryptographic engine, key manager, root of trust and more. Zymbit’s Lifetime-Immunity …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency IoT

11 1 10 12
Ockam Ockam

Trust for Data-in-Motion. Build apps that can Trust data-in-motion. Modern applications are distributed, interconnected, and have Zero-Trust in network boundaries. These applications must exchange data with Trust across complex, variable, and hostile networks. Ockam has a simple developer experience so that every engineer can build end-to-end encryption, key management, authorization policy enforcement, and mutual authentication into their applications. Identity, Trust, IoT, Internet of Things, Developer Tools, Security, Connected Devices, Internet Security, Open Source, Enterprise Security, Edge, Cryptography, Encryption, and Zero-Trust

Type: Startup Activities: IT Services Smart City Consulting transporttech Technologies: IoT

9 1 6 22
milliBANK Systems AG milliBANK Systems AG

[Automatic translation follows] milliPay Systems AG is developing a simple, secure and precise micro-payment process for online money transactions of all kinds. For the first time, transparency and security are guaranteed for transactions in the range of fractions of cents. Micro-Payment, Online Payment, Online Payment Systems, and Micro-Payment Systems

Type: Startup Activities: fintech IT Services Technologies: Cybersecurity

8 1 2 N/A
Quarkslab Quarkslab

[Automatic translation follows] Securing every bit of your data Founded in 2011 by Fred Raynal, Quarkslab is a French company specializing in cybersecurity and more specifically in software protection and analysis. Research and development are the fundamental pillars of Quarkslab. Its goal has always been to promote innovation by creating a function between academic research and concrete implementation. His expertise combines offensive and defensive security in protecting applications and data, and helps businesses and government organizations adopt a new security posture: forcing attackers, not defenders, to continually adapt. Through these consulting services and through its Lab's R&D work and through …

Type: Startup Activities: IT Services deeptech Technologies: Cybersecurity

10 1 10 96
Cloudnine Realtime Cloudnine Realtime

Have Your Business Rise Above The Cloud! Application cloud hosting gives your business a way to instantly increase capacity and add capabilities without a large investment in new infrastructure. Why pay for resources that you don’t use when you easily can move into Cloudnine Realtime services? You only pay for what you need in a more secure, easy-to-access and scalable infrastructure. Instant Access: "Anytime, Anywhere."​ Whether you are looking for accessibility and security for your data, your business software applications, collaborative tools, or email, Cloudnine Realtime delivers dynamic virtual office and application cloud hosting solutions. Cloudnine Realtime easily integrates all …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 1 1 5
HYAS HYAS

The world-leading authority on detecting & identifying threat adversary infrastructure in networks to stop cyberattacks. HYAS is a world-leading authority on cyber adversary infrastructure and communication to that infrastructure. HYAS is dedicated to protecting organizations and solving intelligence problems through detection of adversary infrastructure and anomalous communication patterns. We help businesses see more, do more, and understand more in real time about the nature of the threats they face. HYAS turns meta-data into actionable threat intelligence, actual adversary visibility, and protective DNS that renders malware inoperable. Reverse Whois, Cybercrime Attribution, Malware Network Analysis, Rare Data, information security, attribution intelligence, threat …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 1 2 40
Cobalt Cobalt

Modern pentesting for security and development teams. Cobalt combines talent and technology to provide transformative offensive security solutions for organizations to remediate risk across a dynamically changing attack surface. The innovators of Pentest as a Service, Cobalt empowers businesses to optimize their existing resources, access an on-demand community of trusted security experts, expedite remediation cycles, and share real-time updates and progress with internal teams to mitigate future risk. Web security, Vulnerability management, Application security, Web Application Security, Mobile Application Security, API Security, pentesting, and pentesting as a service

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 1 5 448
Fox-IT Fox-IT

For a more secure society Fox-IT prevents, solves and mitigates the most serious cyber threats with innovative solutions for government, defense, law enforcement, critical infrastructure, banking, and commercial enterprise clients worldwide. Our approach combines human intelligence and technology into innovative solutions that ensure a more secure society. We develop custom and packaged solutions that maintain the security of sensitive government systems, protect industrial control networks, defend online banking systems, and secure highly confidential data and networks. Intelligence, Cyber security, Forensic investigation, Threat monitoring, Managed services, Red teaming, Pentesting, Education, Fraud detection, Detection, Incident Response, Security Operations Center, and Crypto technlogy

Type: SMB Activities: IT Services edtech Technologies: Cybersecurity

5 1 4 440
AlienVault AlienVault

Join the Alien Nation! We're on a mission to provide organizations throughout the universe with highly intelligent security that is affordable and simple to use. We founded AlienVault to help organizations of all shapes and sizes achieve world-class security without the headaches and huge expense of other solutions. And we are passionate about our mission! Interested in joining our Alien Nation? We're a peace-loving bunch of extraterrestrials interested in nothing less than changing the world of security to be attainable to organizations. Besides having the opportunity to work for an award-winning company, offering an award-winning product, you'll have a chance …

Type: Startup Activities: IT Services Technologies: Cybersecurity

16 1 3 61
vArmour vArmour

Complete visibility for every app, user, and environment. Control risk, increase app resiliency, and achieve compliance. vArmour helps enterprises around the world be more resilient by understanding the behavior of their application infrastructure and services. Customers trust vArmour to provide continuous observability of their hybrid-cloud applications to accelerate their critical initiatives while reducing risk and improving confidence. vArmour is based in Los Altos, CA. Cybersecurity , Hybrid Cloud, Cyber Resilience, Compliance, Operational Risk, Security , Cloud, Public Cloud, Private Cloud, On-Premise, AWS, Azure, Tanium, and Cloud Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 1 0 79
Detectify Detectify

The External Attack Surface Management platform powered by elite ethical hackers. Go hack yourself. Detectify sets the standard for External Attack Surface Management (EASM), providing 99.7% accurate vulnerability assessments. Product security and AppSec teams trust Detectify to expose exactly how attackers will exploit their Internet-facing applications. The Detectify platform automates continuous real-world, payload-based attacks crowdsourced through its global community of elite ethical hackers, exposing critical weaknesses before it’s too late. Go hack yourself. Web Security, OWASP Top 10, XSS, Ethical Hacking, Web scanner, Web vulnerabilities, appsec, Web applications, attack surface, and cybersecurity

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 3 123
IDKA AB IDKA AB

Idka enables simple, private communication and collaboration across modern teams and organizations. Idka means productivity and simplicity. Idka is a clean, uncluttered, noise free and easy-to-implement, yet very functional collaboration tool. On Idka you can communicate, share and work undisturbed with colleagues and friends. There is no advertising, no trolling, no fake news, and you own your data. Period. Idka provides functionality that is otherwise spread across several services, all integrated in a super simple and effective user experience. Set up a free account today for effective, secure, simple and ad-free communication and collaboration.­­ Your privacy is our business. For …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 2 2
nextAuth nextAuth

Best in mobile user authentication | No trade-off between usability and security Best in mobile user authentication | No trade-off between usability and security user authentication, security, cryptography, IAM, mobile authentication, two factor, second factor, strong authentication, cyber security, authentication, user experience, UX, multi factor authentication, mfa, 2fa, sca, strong customer authentication, mobile security, infosecurity, advanced electronic signatures, e-Signatures, electronic signing, frictionless authentication, seamless login, and two factor authentication

Type: Startup Activities: IT Services uxtech Technologies: Cybersecurity

2 1 2 5
CertifID CertifID

CertifID is a wire fraud protection company. CertifID helps to create a world without wire fraud. Started after our co-founder was hit by fraud – we’re the only company dedicated to fighting fraud for the real estate industry with an identity verification SaaS platform, insurance, and proven recovery services. Security, Identity Verification, Digital Verification, Two Factor Authentication, Wire Fraud Prevention, Real Estate, Title, Identity Theft, Bank Account Certification, SAAS, and B2B Security Tools

Type: Startup Activities: IT Services proptech regtech Technologies: Cybersecurity

1 1 0 84
Menlo Security Inc. Menlo Security Inc.

Menlo Security makes every browser an enterprise browser. Browsers are the application enterprises can’t live without, how we work with SaaS and private web applications. But browsers are a security blind spot. They operate without the necessary protection and security controls, exposing enterprises to attack. Browsers are the entry point for internet borne attacks, the exit point for data leakage. Menlo Security secures enterprise browsers. Menlo Browser Security manages browsers, protects your users, and secures application access and enterprise data, providing a complete enterprise browser solution from any browser. Menlo Security secures browsers while preserving user choice and providing a …

Type: Startup Activities: IT Services Technologies: Cybersecurity

18 1 6 410
WISeKey SA WISeKey SA

WISeKey is a leading information security and identity management company, and provides specialized security technologies for data protection, and effective identification and authentication of people and objects, over physical infrastructures, networks and the Internet to ensure secure communications and e-transactions, without compromising trust. Our Mission As a fully-autonomous and independent organization, WISeKey creates protected and trusted digital identities for individuals, groups, organizations and communities around the world. To facilitate and enable the mass-use of secure digital identities in everyday life. Our Vision At WISeKey, we see the internet moving towards specialized, customized, “branded” platforms. In the near future, we see …

Type: SMB Activities: IT Services Technologies: NFC

5 1 2 106
Biometric Signature ID Biometric Signature ID

Protecting business' most valuable digital assets. We are a biometrics cyber security company. Our technology creates and manages online access credentials that are PII free and impossible to replicate by any other human or machine. Our patented behavioral biometric technology protects your online and real world identity. It links online digital access to the presence of a single authorized user, not to their credentials. It does this without collecting, transferring, or storing any personal identifiable information. It provides Complex Multi-Factor Authentication (CMFA) in a simple and reliable authorized user experience that no AI/ML algorithm or cyber criminal can replicate. About …

Type: Startup Activities: regtech Technologies: A.I. Cybersecurity

1 1 1 15
Group-IB Group-IB

Global Threat Hunting and Adversary-Centric Cyber Intelligence Company Founded in 2003 and headquartered in Singapore, Group-IB is a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime. Combating cybercrime is in the company’s DNA, shaping its technological capabilities to defend businesses, citizens, and support law enforcement operations. Group-IB’s Digital Crime Resistance Centers (DCRCs) are located in the Middle East, Europe, and Asia-Pacific to help critically analyze and promptly mitigate regional and country-specific threats. These mission-critical units help Group-IB strengthen its contribution to global cybercrime prevention and continually expand its threat-hunting capabilities. Group-IB’s decentralized and autonomous operational structure …

Type: SMB Activities: IT Services Technologies: Cybersecurity

11 1 7 193
Cybertonica Ltd Cybertonica Ltd

Our products provide real-time automated decisioning based on machine learning and enhanced behavioural insights. Cybertonica uses Machine Learning and Artificial Intelligence to manage risk and fraud, increasing trust and growing frictionless banking and m/e-payments globally. Cybertonica’s service increases conversion and sales by up to 25% while managing card-not-present and other categories of fraud at world-class compliant standards. Our goal is to build Trust in Transaction. Cybertonica has won numerous distinctions and awards since its product came to market, including the “Best Use of Payments Data Award” at Emerging Payments Awards 2018 and the “Best Data Analytics and Science Award” at …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity Data Analytics

9 1 9 13
NanoLock Security NanoLock Security

Taking Zero Trust to the Device NanoLock Security protects the operational integrity of industrial devices, machines and manufacturing lines against cyber events and human errors to maintain business continuity, improve safety and safeguard revenues. NanoLock is the only zero-trust, device-level solution that prevents outsiders as well as insiders and supply chain cyber events and even human errors in legacy and new devices, regardless of attack origin or exploited vulnerability and without affecting functionality and performance. Cybersecurity, Embedded security, Smart city, Device-level security , Zero Trust , and Zero trust device-level protection

Type: Startup Activities: Smart City IT Services Technologies: Cybersecurity IoT Sensors

6 1 6 42
Forescout Technologies Inc. Forescout Technologies Inc.

Forescout Technologies, Inc., a global cybersecurity leader, continuously identifies, protects and helps ensure the compliance of all managed and unmanaged connected cyber assets – IT, IoT, IoMT and OT. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide vendor-agnostic, automated cybersecurity at scale. The Forescout® Platform delivers comprehensive capabilities for network security, risk and exposure management, and extended detection and response. With seamless context sharing and workflow orchestration via ecosystem partners, it enables customers to more effectively manage cyber risk and mitigate threats. IoT Security, IoT, Agentless Visibility, BYOD, Enterprise Security, Network Segmentation, …

Type: Large company

2 1 2 1,071
Entrust Data Protection Solutions Entrust Data Protection Solutions

Whether deployed physically on-premises or as-a-Service, Entrust nShield HSMs are among the highest-performing, most secure and easy-to-integrate HSM solutions available, facilitating regulatory compliance and delivering the highest levels of data and application security for enterprise, financial and government organizations. Entrust keeps the world moving safely by enabling trusted identities, payments and data protection around the globe. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, or accessing corporate networks. With our unmatched breadth of digital security and credential issuance solutions, it’s no wonder the world’s most entrusted organizations trust us.

Type: SMB Activities: privacytech IT Services Technologies: Blockchain/Cryptocurrency Cybersecurity

3 1 2 1
Hanko Hanko

Open source authentication and passkey infrastructure for developers Open-source authentication and user management for the passkey era. For better security, higher conversion rates, and happier users. #Passkeys #WebAuthn #ByeByePasswords Authentication-as-a-Service, WebAuthn, Web Authentication, 2FA, MFA, Passwordless Authentication, Biometric Authentication, FIDO2, and Passkeys

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 2 8
Secomba GmbH | Boxcryptor Secomba GmbH | Boxcryptor

We help you secure your company-data in the cloud, on NAS, file server, and local. Boxcryptor is the awarded encryption solution for your cloud with many satisfied customers worldwide. It's the market leader for security solutions in the area of cloud storage. Customers from over 190 countries and from all branches trust Boxcryptor and enjoy the advantages of the cloud without giving up privacy. Boxcryptor is optimized for the use with cloud storage providers such as Dropbox, iCloud, Microsoft OneDrive for Business and many more. It supports more than 30 providers on all platforms by today. The company was awarded …

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 1 5 10
Balbix Balbix

AI-powered Cyber Risk Management Balbix enables organizations to reduce cyber risk by identifying and mitigating their riskiest cybersecurity issues faster. The Balbix Security CloudTM platform ingests data from an organization’s security and IT tools to understand every aspect of cybersecurity posture and build a unified cyber risk model, then provides actionable insights for risk reduction. With Balbix, enterprises can automate inventory of their cloud and on-prem assets, conduct continuous risk-based vulnerability management and quantify cyber risk in dollars. Executives and operational teams can make cybersecurity decisions based on data not opinions. A rapidly growing set of Fortune 500 companies trust …

Type: Startup Activities: IT Services Technologies: Cybersecurity

11 1 6 155
SpyCloud SpyCloud

The leader in operationalizing Cybercrime Analytics to prevent ATO, ransomware, and online fraud. SpyCloud transforms recaptured darknet data to protect businesses from cyberattacks. Its products operationalize Cybercrime Analytics (C2A) to produce actionable insights that allow enterprises to proactively prevent ransomware and account takeover, protect their business from consumer fraud losses, and investigate cybercrime incidents. Its unique data from breaches, malware-infected devices, and other underground sources also powers many popular dark web monitoring and identity theft protection offerings. SpyCloud customers include half of the ten largest global enterprises, mid-size companies, and government agencies around the world. Headquartered in Austin, TX, SpyCloud …

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 1 4 221
DriveWare (Cyber) DriveWare (Cyber)

Cyber DriveWare protects organizations against malware & cyber attacks which currently they are vulnerable to, and other solutions can't protect. DriveWare has reinvented the I/O Layer, making new data and traffic visible for the very first time. In the I/O layer, DriveWare monitors traffic between the operating system and the hardware, as if DriveWare was the hardware itself. This gives DriveWare the advantage over the attacker. In the I/O Layer DriveWare blocks or detects Rootkits, Stealthy Malware, Ransomware, Firmware Virus, Destructive Malware, Espionage, and 0-day exploits. The DriveWare solution can be made available in the form of: 1. Service based …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 1 N/A
Risk Ledger Risk Ledger

Be confident in your supply chain security Over 60% of organisations have experienced a cyber incident caused by a compromised third-party. Recent data protection and business resilience laws and regulations globally have included specific obligations for organisations to actively manage supply chain security risks. Risk Ledger provides all the tools you need to run a comprehensive, security-led, third-party risk management programme against your supply chain. The platform moves away from point-in-time assessments by providing you with real-time, actionable data collected directly from suppliers - allowing you to continuously identify, measure and manage a comprehensive set of third-party risks at speed …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 1 2 41
Vicarius Vicarius

Leading the pack in vulnerability remediation. Vicarius helps security and IT teams protect their most critical apps and assets against software exploitation through vRx, a consolidated end-to-end vulnerability remediation platform. Headquartered in New York and backed by tier-one Silicon Valley investors, Vicarius was founded by security experts on a mission to provide problem-solving remediation solutions that proactively reduce risk wherever assets reside. Effortlessly find and eliminate threats while reducing the strain on internal security resources, freeing up personnel to focus on other mission-critical tasks without sacrificing security. Get started for free today or learn more at https://vicarius.io Cyber, CDS, Malwares, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 3 75
Hacknowledge SA Hacknowledge SA

Your Vendor Neutral Cybersecurity Partner Security Made Simple What is Hacknowledge? Hacknowledge is a Swiss security monitoring solution that will help you shorten the time between breach and detection. Our service is built on experience and intelligence gained from more than a decade of penetration test and mitigating advanced threats An innovative approach Searching the logs to find security issues is close to finding a needle in the haystack. This is why we will leverage the use of your existing security devices and fortify your logs with strong indicators of compromise generated by our custom sensors installed on your network. …

Type: Startup Activities: IT Services Technologies: Cybersecurity Sensors

8 1 2 54
Be ys Research International Be ys Research International

#Research_and_Innovation be ys Research International is a group of researchers, engineers, data experts and business specialists sharing the same vision: innovation as competitive advantage and business accelerator. First of all, we are specialized in the edition of sensitive data protection software. We support businesses in their digital transformation by deploying a set of solutions in their infrastructure or remotely to address sensitive data issues. Building on its strong expertise and skills in the area, be-ys Research International masters the state of the art in the field. Thus, we have developed innovative products, protecting millions of people in Europe and covering …

Type: Startup Activities: healthtech IT Services Technologies: A.I. Blockchain/Cryptocurrency

12 1 10 2
Alcees Alcees

[Automatic translation follows] GRC Consulting and Expertise Firm. Pure Player Cybersecurity & Digital trust since 2018. More than a consulting firm in Governance, Risks, Compliance, Alcees present in Paris, is a partner 🇫🇷 🇪🇺 of local digital trust serving VSE/SME clients, startups, Large Groups, professionals, Institutions, associations, communities, training centers... and a mission-driven digital services company. Our values: Ethics - Commitment - Innovation - Trust #alceesfr Why choose Alcees? Tools dedicated to financial institutions ▪ Quality ▪ Proximity ▪ 24/7 support ▪ Cross-functional experiences ▪ Versatility ▪ Expertise ▪ Team ▪ Internationality ▪ Feminization Alcees, for which sectors of activity? …

Type: SMB Activities: privacytech Consulting healthtech insurtech Technologies: A.I. Cybersecurity

25 1 12 2
Coalfire Coalfire

Cybersecurity for the world’s innovators. The world’s leading organizations – including the top five cloud service providers and leaders in financial services, healthcare, and retail – trust Coalfire to elevate their cyber programs and secure the future of their business. #1 in compliance, FedRAMP®, and cloud penetration testing, Coalfire is the world’s largest firm dedicated to cybersecurity services, providing unparalleled technology-enabled professional and managed services. To learn more, visit coalfire.com. IT Audits and Risk Asessments, Penetration Testing, PCI-DSS / PA-DSS Compliance Assessments, HIPAA / HITECH / HITRUST Assessments, Internal / External Vulnerability Scans (ASV Services), FISMA / FedRAMP 3PAO Advisory …

Type: Large company Activities: IT Services Technologies: Cybersecurity

18 1 14 1,003
Menaya Menaya

A Turnkey pre-breach virtual hacker cybersecurity services to detect and prevent cyber vulnerability exposures Menaya utilizes the newest and most advanced technologies to stop cyber-attacks via websites. Our insurance partners reduce exposure and increase brand awareness by bundling our technology with their Cyber Insurance Policies, and reduces loss ratios, by increasing cyber risk transparency with cyber portfolio intelligence data and risk score. We use cutting edge virtual hacker technology to identify and eradicate dangerous malware threats and website application vulnerabilities, a pre-breach tool designed to detect and prevent cyber-attacks. Our focus is on proactive loss prevention and minimizing the exposures …

Type: SMB Activities: IT Services Technologies: Cybersecurity SaaS

7 1 7 10
OutThink OutThink

Cybersecurity Human Risk Management Platform (SaaS) OutThink brings the world's first cybersecurity human risk management platform (SaaS). An innovative, disruptive solution, OutThink is the evolution of traditional security awareness training. Used by large, complex organisations (incl. FTSE 100) around the world, the OutThink SaaS platform has been developed specifically to identify, measure human risk and affect behaviour change. OutThink was purpose-built by a team of visionary CISOs, security experts and researchers, for security professionals who are looking to build more effective, usable security and make people their strongest defense mechanism. Headquartered in the City of London with development in UK, …

Type: Startup Activities: IT Services Technologies: Cybersecurity SaaS

10 1 10 43
AuthN by IDEE AuthN by IDEE

IDEE is the technology company behind AuthN. AuthN is a passwordless, phish-proof MFA solution deployed in just 15 min. AuthN is an award-winning, client-less, passwordless multi-factor authentication (MFA) that can be deployed in minutes across the entire estate. It prevents every single credential phishing and password-based attack including adversary-in-the-middle (AiTM). It can be used with or without a phone. Cyber security, Digital identity, Identity and access management, Blockchain, Blockchain Identity, two-factor authentication, strong authentication, fraud prevention, authentication, device security, phishing prevention, stop phishing, and blockchain

Type: Startup Activities: IT Services regtech Technologies: Blockchain/Cryptocurrency Cybersecurity

6 1 5 20
SYLink Technologie SYLink Technologie

[Automatic translation follows] SYLink designs innovative Soft and Hard cybersecurity solutions for digital protection of businesses! SYLink Technology offers products and services to secure networks, connected objects and business data via its patented SYLink AI Artificial Intelligence technology. Our products are easy to use, user-friendly and configuration-free. SYLink produces products designed to improve the user experience thanks to its understandable interfaces and unique design. We support and secure the digital transformation of companies by providing complete protection of low-level networks, while respecting compliance with the new data confidentiality rules (RGDP) and controlling your costs. SOCable solutions via API (#SOC) CyberDefense, …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Deep Learning Cybersecurity Data Analytics IoT

11 1 8 25
Oppida Oppida

[Automatic translation follows] Our job, allowing you to practice yours in complete safety For more than 20 years, Oppida has been providing expertise, evaluation and consulting services in the field of Information Systems Security (ISS). These services are carried out both for the benefit of administrations (Defence, Prime Minister's Service, Ministries) and private organizations (operators, banks, insurance, mass distribution, industries, SMEs-SMIs, etc.). Positioned as an independent consulting firm, Oppida works more specifically on the following main types of missions: - Advice to security managers / risk managers, as well as project owners: development of security approaches, risk analysis, drafting of …

Type: SMB Activities: IT Services Technologies: Cybersecurity

3 1 2 61
Fortanix Fortanix

Security, wherever your data is Fortanix is a global leader in data security. We prioritize data exposure management, as traditional perimeter-defense measures leave your data vulnerable to malicious threats in hybrid multicloud environments. Our unified data security platform makes it simple to discover, assess, and remediate data exposure risks, whether it’s to enable a Zero Trust enterprise or to prepare for the post-quantum computing era. We empower enterprises worldwide to maintain the privacy and compliance of their most sensitive and regulated data, wherever it may be. At Fortanix, we bring together the very best people in service of our mission …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

15 1 5 284
NortonLifeLock NortonLifeLock

NortonLifeLock and Avast have merged and are now GenTM. ​NortonLifeLock Inc. (NASDAQ: NLOK) is a global leader in consumer Cyber Safety with a growing portfolio of trusted and recognized brands. Our award-winning products and services help protect and empower people to live their digital lives safely. Nearly 80 million users in more than 150 countries trust us with their personal information. We’re dedicated to making it easy for them to keep their connected lives safer while helping to secure their devices, online privacy, identity, and home and family needs. ​ NortonLifeLock.com​ Norton.com​ Avira.com LifeLock.com​ ReputationDefender.com

Type: SMB Activities: IT Services Technologies: Cybersecurity

15 1 5 1,067
CyCognito CyCognito

External Attack Surface Management See Exactly What Attackers See. Take full control over your attack surface by uncovering and eliminating critical security risks – the ones you didn't know existed. Our botnet and discovery engine use graph data modeling to map and classify the assets across your attack surface. attacksurface, asset discovery, cloud security, cyber security threats, vulnerability management, attack surface, IT security, cyber threat intelligence, vulnerability assessment, attack surface management, network security, cyber posture, penetration testing, attack surface visibility, data security, data breach, pentesting, attack surface security, CISO, internet security, security posture, cybersecurity, cloud security, infosec, digital assets, shadow …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 4 160
TAG Infosphere TAG Infosphere

TAG serves the global cybersecurity, sustainability, and artificial intelligence industries. TAG serves the global cybersecurity, sustainability, and artificial intelligence industries, working primarily with enterprise teams and commercial vendors. We do so through a revolutionary new approach to professional research and advisory. We employ only seasoned experts as our analysts. We are available to customers on a 24/7 basis through an on-line portal where we focus on addressing your specific challenges. Cybersecurity, Climate Science, and Artificial Intelligence

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 1 6 27
ProHacktive ProHacktive

🦊 Automate your cyber risk protection 24/7 🇫🇷 Prohacktive is a French software vendor specialised in the conception and development of cybersecurity softwares. 🦊 Sherlock® is an innovative technology enabling the automation of network auditing that contributes in the long term protection and maintenance strategy of the security of an organisation information system to prevent cyber attacks 24/7. Easy to use, Sherlock® allows the permanent detection of vulnerabilities in real time and performs a complete inventory of your IT assets. A patch management and task scheduling module is integrated to configure necessary patches while taking into account time constraints. 🦊 …

Type: Startup Activities: IT Services Technologies: Cybersecurity

26 1 22 7
IDECSI IDECSI

Data Access Governance for Microsoft 365 & file server. Empower employee through user-centric technology, MyDataSecurity French startup in cybersecurity, IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection. Immediately operational, Idecsi now offers a complete range of solutions allowing you to protect all your resources on all key applications: Microsoft Teams, SharePoint Online, Exchange, Onedrive,... You benefit from continuous protection that detects in real time every malicious access or setting (internal or external). With MyDataSecurity, users have the means to control and monitor the security of their data and that of …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

10 1 9 30
#MaSolutionIT avec Olisys & Olihost #MaSolutionIT avec Olisys & Olihost

[Automatic translation follows] Your tailor-made cybersecurity launched in 24 hours for a protected IS in our own secure data centers in France 👉 Discover #MyITSolution with Olisys & Olihost Responsible Digital & Sovereign serving ETIs/VSEs/SMEs A major player in the integration of 360° digital solutions in Hauts-de-France, MaSolutionIT has created, in more than 30 years, a real collaboration with companies and institutions in the region. ​Resolutely oriented Consulting & Service, MaSolutionIT aims to be the preferred partner of VSEs/SMEs in terms of collaborative solutions, cybersecurity, mobility & connectivity, French cloud hosting, back up & Web development. 👉 “Business” IT solutions …

Type: SMB Activities: IT Services Technologies: Cybersecurity

12 1 12 20
HACK-IT-N HACK-IT-N

[Automatic translation follows] Cybersecurity Conference #FrenchTech #Bordeaux #Aquitaine The HACK-IT-N conference is organized by the company TEHTRIS, an expert in Cybersecurity, in partnership with the ENSEIRB-MATMECA engineering school and its RSR option [cybeR-security, Systems & Networks] of the IT sector. The themes of cyberdefense and cyberattack are at the heart of concerns, to stick to technical reality and current threats: hacking, cyber-espionage, cyber-surveillance, etc. Every year, come and discover the new challenges of cybersecurity, as well as the offensive and defensive techniques of the moment! cyberdefense, cyberattack, IT security, CISO, SSI, Information Systems, Endpoints, SAAS, On Premise, Cloud, IT Engineering, …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

7 1 6 2
Transfertpro Transfertpro

The french and secure solution for sharing, coediting and protecting your documents. french solution of document transfer to perform all of your file uploads safely, quickly and easily. cybersécurité, saas, cloud, ANSSI, eIDAS, and RGPD

Type: Startup Activities: IT Services Technologies: Cybersecurity

5 1 4 10
Quadri-Concept Quadri-Concept

[Automatic translation follows] Outsourcing, Cybersecurity, IS Architecture, Hosting, Backup and PRA, Services Quadri-Concept has been supporting companies in all sectors in all their IT projects for 30 years: - Strategic support for the implementation of an adapted IT infrastructure - Architecture, installation, administration and outsourcing of information systems (computer systems and networks) -Audit/Advice -Awareness/Training -Cloud hosting of IS and PRA -Cybersecurity and incident response -GED

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 1 0 14
ÉHO.LINK ÉHO.LINK

[Automatic translation follows] A new vision of cybersecurity | Network protection • Audit • Secure means of communication ⚓️ ÉHO.LINK is a team of 25 people based in Marseille. For 8 years, it has been developing cybersecurity solutions to provide organizations with a simple and comprehensive response to cyber issues: network protection, auditing and secure means of communication. The co-founders participated in the development of B2C (9Box/SFRBox) and B2B solutions for more than 5 million customers, notably by being at the head of the R&D managerial team of 9Cegetel/SFR for nearly 10 years. 🚀 From the design to the industrialization …

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 1 5 16
Cyblex Technologies Cyblex Technologies

Nous sommes là pour vous aider. Ensemble, anticipons les risques cybers. At Cyblex Technologies, we believe that we must change the paradigm in cybersecurity management to reduce the gap between targets and attackers in order to allow organizations to be more resilient and durable. To achieve our vision, we are transforming the digital world of our customers to make it safer and smarter. Our consultants support our clients on various topics related to IT security and cybersecurity. Our R&D department develops decision-helping products to support our clients' IT security teams in order to implement automation and artificial intelligence into their …

Type: Startup Activities: IT Services Technologies: A.I. Cybersecurity

4 1 4 19
Wiconnect_ Wiconnect_

[Automatic translation follows] A global approach to your digital environment! Wiconnect has been working for more than 15 years on the commissioning and operation of digital services. Drawing on extensive experience obtained during the deployment of infrastructure for more than 200 shopping centers in France and Europe, for numerous communities and businesses, Wiconnect offers its services in the following areas: - IT: Supply and deployment of equipment, Server and Cloud solutions, Microsoft 365, Outsourcing, Backup - Network Infrastructure: Engineering and commissioning of equipment, Internal Wi-Fi integration, Public Wi-Fi services, captive portals - Cybersecurity: Firewall IDS security solution, Antivirus, EDR, One-off …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 3 13
C4ISRNET C4ISRNET

Defense and government leaders rely on us for info on the modern battlefield. Daily updates @ c4isrnet.com/newsletters C4ISRNET (formerly C4ISR & Networks) is the media brand committed to dynamic and fast growing network-based defense community. We provide the most in-depth, focused and knowledgeable news, analysis and insight on defense IT, cyber defense, communications, GEOINT, unmanned systems, sensors and related C4ISR systems. These are the networked technologies enable situational awareness for warfighters and the DoD enterprise, transforming the world of defense. C4ISRNET offers a monthly magazine, a website - C4ISRNet.com - digital and custom media products, and events such as the …

Type: Media

1 1 0 5
IDPro® IDPro®

Globally fostering ethics, excellence, and engagement in the practice and profession of digital identity. IDPro® is the organization that: * helps define, support, and improve the digital identity profession globally * facilitates identity practitioners interacting with, learning from, and giving back to their professional community * enables identity technology and service providers to interact with identity professionals in thoughtful, respectful, and valuable ways *provides a collective voice for the digital identity and access management industry to policy makers identity management, professional development, and digital identity

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

3 1 2 18
SheeldS (Formerly Arilou Automotive Cybersecurity) SheeldS (Formerly Arilou Automotive Cybersecurity)

Pioneers automotive cybersecurity, SheeldS is providing the premier solution for the heavy commercial fleet industry. SheeldS (formerly Arilou), an automotive cybersecurity pioneer, has developed multi patent technology, with award-winning products. SheeldS offers the first cloud-based cyber security solution built specifically for heavy commercial and bus fleets management specifications. Based on the experience and deep industry knowledge of the team, SheeldS has both the vision and the technology to provide the best platform for protecting commercial vehicles from cyberthreats The team is led by Israeli cyber defense forces veterans and highly experienced automotive software professionals. Cyber Security, Automotive Security, Industrial Control …

Type: Startup Activities: IT Services transporttech Technologies: Cybersecurity IoT

1 1 1 8
Argus Cyber Security Ltd. Argus Cyber Security Ltd.

Shifting gears in automotive cyber security. Argus, a global leader in automotive cyber security, provides DevSecOps, vehicle security and fleet protection technologies and services for automakers and their suppliers. Our solutions ensure that vehicle components, networks and fleets are secured and compliant throughout their life cycle. Argus’ innovative methods and solutions are based on decades of cyber security and automotive research and have culminated in over 100 granted and pending patents. Founded in 2014, Argus is headquartered in Israel, with offices in USA, Germany, France, Japan, and Korea. Cyber Security, Automotive, Penetration Testing, connected vehicles, smart mobility, UNR 155, electric …

Type: Startup Activities: IT Services transporttech Technologies: Cybersecurity Embedded Systems IoT

14 1 12 213
AlgoSec AlgoSec

Secure application connectivity and cloud-native applications throughout your multi-cloud and hybrid network. AlgoSec, a global cybersecurity leader, empowers organizations to secure application connectivity and cloud-native applications throughout their multi-cloud and hybrid network. Trusted by more than 1,800 of the world’s leading organizations, AlgoSec’s application-centric approach enables to securely accelerate business application deployment by centrally managing application connectivity and security policies across the public clouds, private clouds, containers, and on-premises networks. Using its unique vendor-agnostic deep algorithm for intelligent change management automation, AlgoSec enables acceleration of digital transformation projects, helps prevent business application downtime and substantially reduces manual work and exposure …

Type: SMB Activities: IT Services regtech Technologies: Cybersecurity

5 1 3 523
Agència de Ciberseguretat de Catalunya Agència de Ciberseguretat de Catalunya

CYBERSECURITY AGENCY OF CATALONIA Considering that cybersecurity is a key element for the digital society and the public, it is the duty of public authorities to take part in these affairs throughout Catalonia. The citizens, companies and institutions of this country must be given a public cybersecurity service with the responsibility to protect them. This public cybersecurity service must be able to perform the following duties, among others: - Develop and lead the implantation of a cybersecurity model in Catalonia from current threats; - Coordinate cybersecurity among the various stakeholders in Catalonia, as the body responsible for this area; - …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

5 1 4 64
GREYCORTEX GREYCORTEX

Security for Professionals GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable. GREYCORTEX Mendel is a network detection and response tool that combines advanced artificial intelligence, machine learning, and data mining methods with unique network visibility to visualize network communication, detect risks and threats, and respond quickly and effectively to threats from misconfigurations, performance problems, or policy violations, as well as new advanced threats and hacker activities that are able to bypass existing security tools. Network Security, Network Visibility, Network Traffic Analysis, Artificial Intelligence, Machine Learning, Data Analytics, …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity Data Analytics

3 1 1 34
I-TRACING I-TRACING

CYBERSECURITY SERVICES I-TRACING, pure player and cybersecurity service provider leader in France, supports over 400 clients around the world in managing their cyber risks, from anticipating threats to maintain the highest level of security for their systems and assets, to the ability to respond in case of attacks to minimize consequences. I-TRACING generated a revenue of 90 million euros in 2022 and has 450 employees in France, as well as in London, Hong Kong, and Montreal. Through a broad range of cybersecurity services, from consulting to integration to managed services, SOC, and CERT, I-TRACING brings together all the technical expertise …

Type: SMB Activities: privacytech IT Services Technologies: Cybersecurity

9 1 9 510
Windscribe Windscribe

Browse the web privately, as it was meant to be. Windscribe is a leading internet security and privacy company. Our goal is to transform the internet with easy to use yet powerful tools, that allow anyone to circumvent censorship, access geographically restricted content, and minimize their exposure to marketers, criminals and surveillance dragnets. Our well-received applications have appeared on Lifehacker, Techradar and CNET. Do you want to help to do something about internet tracking and surveillance? If so, why not join us in our downtown Toronto office. Windscribe launched in April 2016 and has already accumulated 25 million users. Being …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 1 0 36
Foreseeti (now part of Google Cloud) Foreseeti (now part of Google Cloud)

Empowering you to act on cyber risks instead of incidents foreseeti is now part of Google Cloud

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 1 1
Swimlane Swimlane

The leader in low-code security automation. Swimlane is the leader in AI-enabled, low-code security automation. Swimlane unifies security operations in-and-beyond the SOC into a single system of record to reduce process and data fatigue while quantifying business value and security effectiveness. The cloud-scale Turbine platform combines human and machine data into actionable intelligence for security leaders.

Type: Startup Activities: IT Services Technologies: Cybersecurity

5 1 5 240
Cyberdian Groupe Cyberdian Groupe

[Automatic translation follows] WE ARE COMMITTED TO BEING ONE OF THE FRANCE'S LEADING PROACTIVE CYBERSECURITY CONSULTING COMPANY Created in January 2017, Cyberdian is a cybersecurity consultancy specializing in support, risk analysis, strategy and the implementation of technical and human resources to deal with internal and external IT threats. Bringing together a team of 5 employees, Cyberdian aims to remain a Digital Service Company (ESN) on a human scale. “We work on the two main aspects of cybersecurity: strategy and operational. Our values ​​are excellence, quality, customer satisfaction as well as the loyalty of our customers and associated consultants” IT security, …

Type: SMB Activities: Consulting Technologies: Cybersecurity

9 1 8 15
TripleBlind TripleBlind

Privacy-Enhancing Computation Solution | Combining Data & Algorithms While Preserving Privacy & Ensuring Compliance TripleBlind has created the most complete and scalable solution for privacy enhancing computation. The TripleBlind solution is software-only and delivered via a simple API. It solves for a broad range of use cases, with current focus on healthcare and financial services. The company is backed by Accenture, General Catalyst and The Mayo Clinic. TripleBlind’s innovations build on well understood principles, such as federated learning and multi-party compute. Our innovations radically improve the practical use of privacy preserving technologies, by adding true scalability and faster processing, with …

Type: SMB Activities: IT Services privacytech Technologies: A.I. A.I. - Deep Learning Data Analytics

5 1 5 34
Thinkst Applied Research Thinkst Applied Research

We build the much loved Thinkst Canary - https://canary.tools Thinkst is an Applied Research company with a deep focus on information security. We build the much loved Thinkst Canary https://canary.tools

Type: Startup Activities: deeptech Technologies: Cybersecurity

1 1 0 28
CyberMDX - A Forescout Company CyberMDX - A Forescout Company

CyberMDX is an IoT security leader dedicated to protecting the quality care of health delivery worldwide. CyberMDX provides cloud-based cyber security solutions that support the advancement of The Internet of Medical Things. The CyberMDX solution identifies endpoints and assesses vulnerabilities to detect, respond to, and prevent cyber incidents. Deployed worldwide, CyberMDX is designed to integrate with our customers' existing environments through its scalable, easy-to-deploy and agentless solution. Follow us here for posts on the latest trends, technologies, and management techniques impacting healthcare administration. Healthcare IT Security, Medical Devices, Artificial Intelligence, Cyber Threats, Hacking, Information Security, Advanced Persistent Threats, Network Visibility, …

Type: Startup Activities: healthtech IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity IoT

5 1 3 14
FilingBox FilingBox

Ransomware In-Advance Prevention Storage FilingBox protects your data against ransomware and data breach malware from the storage standpoint. FilingBox uses the storage protection technology that protects data in a network drive against ransomware and data breach malware attacks while using data. The technology of FilingBox is part of the international technology standardization process in ITU-T. Website: FilingBox: http://www.filingbox.com Contact Us Boston Office Tel: +1-813-445-7472 Email: sales@filingbox.com Seoul Office Tel: +82-2-6925-0290 Email: sales@filingbox.com Ransomware prevention, ransomware protection, cybersecurity, Data breach prevention, storage protection, and storage security

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 1 0 2
SecurityCurve SecurityCurve

Get Ahead of the Curve - Independent Consulting, Research, and Education for IT Security Success SecurityCurve helps companies succeed by providing strategic cybersecurity advisory services to large and small enterprises. And we provide competitive advantage to vendors that want to know what customers are really looking for in a product solution set. History The company was founded in April 2003 to formalize the business model our clients found most valuable: as-needed access to security experts who work as trusted advisors, understand the clients’ needs, the underlying application architecture and know how to bridge the gap between business and technology. There …

Type: SMB Activities: IT Services Technologies: Cybersecurity IoT

10 1 5 1
Cerby Cerby

Securely manage access to all your apps, no exceptions, with the first and only comprehensive access management platform Cerby is the first and only comprehensive access management platform for nonstandard applications. Harnessing the power of identity providers, Cerby makes passwordless authentication an immediate reality for any application by extending single sign-on (SSO) and lifecycle management capabilities. Onboard, offboard, and manage users at scale, with just a few clicks. Cerby makes it possible to securely extend access, minimize risk, and lower costs. With Cerby, your team can: ✔ Go passwordless (and ditch your password manager) ✔ Automate offboarding ✔ Securely manage …

Type: Startup Activities: IT Services Technologies: Robotics RPA

2 1 2 97
Women in CyberSecurity (WiCyS) Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field. Founded through a National Science Foundation grant to Tennessee Tech University in 2012, WiCyS (pronounced Wee-Sis) is the brainchild of Dr. Ambareen Siraj, who grew the initiative into a vibrant and active community of women and supportive men from academia, industry, government and research. The organization is working to improve diversity and pipeline in the cybersecurity workforce, and it does so through numerous initiatives, together with Strategic Partners and an army of energetic volunteers. WiCyS'​ Founding Partners are Cisco, …

Type: NGO, Think-tanks, Ed, & Culture Activities: edtech

16 1 12 255
ThreatConnect ThreatConnect

ThreatConnect is the industry's leading threat intelligence operations and cyber risk quantification solutions provider ThreatConnect enables threat intelligence operations, security operations, and cyber risk management teams to work together for more effective, efficient, and collaborative cyber defense and protection. With ThreatConnect, organizations infuse ML and AI-powered threat intel and cyber risk quantification into their work, allowing them to orchestrate and automate processes to get the necessary insights and respond faster and more confidently than ever before. More than 200 enterprises and thousands of security professionals rely on ThreatConnect every day to protect their organizations' most critical assets. To learn more …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 4 163
Axonius Axonius

Control complexity with Axonius. Get an always up-to-date asset inventory, uncover security gaps, and automate action. Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy. With solutions for both cyber asset attack surface management (CAASM) and SaaS management, Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically validate and enforce policies. Cited as one of the fastest-growing cybersecurity startups, with accolades from CNBC, Forbes, and Fortune, Axonius covers millions of assets, including devices and cloud assets, …

Type: Startup Activities: IT Services Technologies: Cybersecurity SaaS

4 1 2 595
Quorum Cyber Quorum Cyber

We help good people win. Defending customers against cyber security attacks with a truly unified security ecosystem. At Quorum Cyber, we're on a mission to help good people win. Founded in Edinburgh in 2016, we're one of the fastest growing cyber security companies in the UK and North America, serving over 150 customers on four continents. We protect private, public and not-for-profit organisations against the rising threat of cyber-attacks, enabling them to thrive in an increasingly unpredictable and inhospitable digital landscape. Our team of experienced security analysts, incident responders, forensic specialists, and threat hunters utilise the most advanced Microsoft Security …

Type: Startup Activities: IT Services Technologies: Cybersecurity

3 1 2 251
Luta Security Luta Security

Identifying Gaps | Addressing Weaknesses | Advancing Security Maturity Luta Security is transforming the way governments and organizations are managing people, processes, and technology to improve vulnerability coordination and security overall. We understand that there is not a one-size-fits-all approach to security. Every organization needs to assess its process maturity and operational capacity to determine what actions are needed to enhance its security, including which strategies and solutions make sense today and in the future. Luta Security advises organizations across all phases of vulnerability coordination. Whether your organization is just getting started, or if you have already launched a vulnerability …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 1 4
UBIWIZZ UBIWIZZ

[Automatic translation follows] Solution for housing & connected buildings A complete ecosystem from building infrastructure to connected objects. Solutions for connected living Collective housing – Residential housing – Individual house Maritime – hotel industry Smart building solutions Teaching – Industrial construction – Civil construction Tertiary office sector – Architecture project

Type: Startup Activities: smart home Smart City constructiontech Technologies: IoT

2 1 0 2
Firmalyzer Firmalyzer

Automated, proactive and effective OT/IoT/connected device discovery and vulnerability assessment Firmalyzer brings in-depth visibility of OT/IoT/connected device assets and their vulnerabilities into your vulnerability management program. It can be deployed as a standalone solution or integrated with your existing IT asset management and vulnerability assessment solution, providing continuous risk monitoring of IoT assets in enterprise networks without requiring network traffic collection or installation of software agents on IoT devices. Firmalyzer analysis dashboard will present security posture of all IoT devices across different departments of your organization that includes devices with critical and high risk vulnerabilities, devices with outdated firmware and …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT Sensors

1 1 0 1
PROCSIMA-GROUP PROCSIMA-GROUP

[Automatic translation follows] WE PROTECT WHAT IS MOST VALUABLE TO YOUR BUSINESS! OUR VISION In an increasingly complex world, cyberspace threats have become legion and their number is growing every day. PROCSIMA-GROUP aims to become the Belgian leader in cyber protection by providing services, consultancy and high value-added solutions. OUR MISSION We protect what is precious to you! Your information, your data, the availability of your business services, the good performance of your systems, these are vital elements for your business. We help your business protect itself against external and internal attacks of all kinds. Information Risk and Security, IT …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity

1 1 0 7
MCG MCG

[Automatic translation follows] Your Cyber-Security Trusted Partner Our collaboration allows you to defend yourself against various complex and structured cyberattacks to protect your assets, hosted internally or in the Cloud, and thus secure the sustainability of your activities. To secure your business (SME, organization, etc.), our team of cybersecurity experts acts with confidentiality and transparency. We implement solutions adapted to your needs, and preserve exchanges in an environment of trust which facilitates our long-term approach, and the creation of a real partnership for the sustainability of your activity.

Type: SMB Activities: IT Services Technologies: Cybersecurity

8 1 8 12
spotit spotit

Your security & network layer Spotit is the trusted advisor for its customers and collaborates with them on innovative security & networking architectures that bring a big strategic advantage and insight. Spotit starts a journey with each customer and builds a long-term relationship based on vision, highly specialized knowledge, commitment and trust. Networking, Security, Audit, Pen testing, Data Classification, Security Awareness, Threat Intelligence, Converged Networking, Ethical Hacking, Social Engineering, Industrial SCADA networking, Identity Control, SIEM, Mobile device management, GDPR, and Data Protection

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity

2 1 1 98
Adeo-informatique Adeo-informatique

[Automatic translation follows] Adeo, your IT partner & telephony. Based in the Pyrénées-Orientales in Perpignan (Tecnosud 2), we meet all the IT needs of businesses, communities and liberal professions. Created in 2007, the company focuses on the professional market. Every year, our employees participate in an ongoing training plan in order to always stay up to date with technological developments. Our team is now made up of 23 people, which makes Adeo-informatique the leading IT service and engineering company (SSII) in the department.

Type: SMB Activities: IT Services

3 1 2 22
APHELIO APHELIO

[Automatic translation follows] The cybersecurity of your installations, without compromise for industries and communities We support companies and cities in their development, from the industry of the future to the smart city, including transport, by building safer digital infrastructures. To do this, we have developed a patented platform, CyberSmartLearn, which protects production systems by detecting cyberattacks, maintaining the level of security and encrypting your data. In addition, we provide cybersecurity auditing, consulting and integration services. Industrial cybersecurity and safety

Type: Startup Activities: IT Services Smart City Technologies: Cybersecurity

9 1 8 15
Perception Point Perception Point

Perception Point provides cybersecurity solutions for the modern workspace, securing email, web browsers, and SaaS apps. Perception Point is a leading provider of AI-powered threat prevention solutions that safeguard the modern workspace against sophisticated threats. The unified security solution protects email, web browsers, and SaaS apps. By uniquely combining the most accurate threat detection platform with an all-included managed incident response service, Perception Point reduces customers’ IT overhead, improves user experience, and delivers deep-level cybersecurity insights. Deployed in minutes, with no change to the organization’s infrastructure, the cloud-native service is easy to use and replaces cumbersome, traditional point systems. Perception …

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 1 6 130
Fidens by TVH Consulting Fidens by TVH Consulting

[Automatic translation follows] French publisher and expert in cybersecurity. Created in 2002 and joining the TVH Consulting group in 2022, FIDENS is a French publisher and expert in cybersecurity and supports you from security audits to the implementation of protection measures, including advice and user awareness. To support our customers' compliance, we have been publishing our own Security Objectives Management Assistance (APOS) technological solution for 3 years. It allows the implementation of an information security management system (CISO and ISMS project managers) compliant with the ISO 27001 standard, with the main missions: - To provide a transversal vision of the …

Type: SMB Activities: IT Services Technologies: Cybersecurity

9 1 8 83
CVC-IT CVC-IT

[Automatic translation follows] The solution for your IT projects With extensive experience in Carve-in and Carve-out, CVC-IT has been supporting its clients since 2013 in securing their data and infrastructures. In this sense, we have the skills and experience necessary to respond to the problems of our customers (Industrial / Pharma / Agricultural / Local Authorities / etc.) As an agile, responsive and pragmatic partner, we are driven by the desire to ensure the performance of your Information Systems while controlling costs. We are involved in the management of applications and infrastructures and favor innovative and scalable technical responses focused …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 1 3
Face-Alive Face-Alive

Startup specialized in biometric security enhancement which gather industrial experts and academic partner. FACE-ALIVE is a startup specialized in biometric security enhancement which gather experts coming from industries and academic partner. FACE-ALIVE’s liveness detection system performs instantly a 3D capture with a 2D Camera detecting any presentation attack. Our technology is reliable, portable and certified. FACE-ALIVE est une startup spécialisée dans l'amélioration de la sécurité biométrique qui rassemble des experts de l'industrie et de la recherche. Le système de détection du vivant de FACE-ALIVE effectue instantanément une capture 3D avec une caméra 2D détectant toute attaque de présentation. Notre technologie …

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 4 1
Montimage Montimage

Provider of tools and services to protect your networks and critical assets. Montimage provides tools and services to protect your networks and critical assets. It offers a security and performance monitoring and management framework adapted to your needs. Services of the company: MMT network monitoring framework. Cyber Threat Intelligence services. Secure portable 4G/5G mobile network platform. Added value : We offer highly innovative solutions that have been built in-house resulting from more than 10 years of research. They integrate advanced AI techniques and multi-source Cyber Threat Intelligence that allow preventing zero-day security breaches. Our solutions have been certified for protecting …

Type: SMB Activities: IT Services Technologies: Cybersecurity A.I.

1 1 0 12
TYREX CYBER (ex KUB) TYREX CYBER (ex KUB)

[Automatic translation follows] TYREX, LEADER IN DECONTAMINATION OF USB DEVICES Born from the French Defense industry, TYREX is the leader in antivirus and antimalware white station solutions for all removable USB devices. TYREX stations feature rugged hardware and software: designed to be ergonomic, reliable and secure, the solution adapts to all uses, all IT or OT architectures and all regulations. Every day, our customers use the approximately 3,000 TYREX stations in production on their offshore platforms, their ships, their industrial facilities and in their offices, to operate with confidence in sensitive and critical environments. White Station, Terminal Antivirus, Security, Cybersecurity, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 1 3 19
LOCKSIGHT LOCKSIGHT

[Automatic translation follows] Locksight is a human-sized structure specializing in the field of cybersecurity. Locksight combines functional and technical expertise to support and provide high value-added services throughout the life cycle of its clients' information systems. Locksight offers a 360° cybersecurity vision thanks to new generation technologies and a transversal structure, allowing teams to intervene at all stages of the project with an efficient and pragmatic approach. We are here to help you best meet your cybersecurity needs.

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 1 0 4
CASD CASD

[Automatic translation follows] CASD markets the VisiMAXTM software suite, video protection solutions for communities and industry. CASD: • Company from industrial vision (image processing), created to develop high-performance digital video surveillance solutions • Located in Grenoble: an environment favorable to the development of cutting-edge technologies • Significant references and partnerships Our skills : • Design of digital recording and graphic supervision solution • Audio and video transmission via IP network • Study and development of interfacing software Our forces : • Proven technical solutions • Multi-codec (MPEG4, H264), multi-format (4CIF and Megapixels), and multi-brand recording and display solution (management of …

Type: SMB Activities: IT Services Technologies: SaaS

3 1 2 101
Merox Merox

DNS Security & DMARC Implement DMARC and many other protocols. Strengthen your DNS security posture, improve deliverability, reduce phishing, stop identity fraud... and much more. Mentioned by Gartner. Made in France, Europe. cybersecurity, cybersecurite, dmarc, dns, bimi, bec, business email compromise, tls, dnssec, dkim, spf, email security, and dns security

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 1 6 5
scredIn software scredIn software

Cybersecurity dedicated to Digital Engineering 4.0 : Industry + Building + City Stemming from the Innovation and Incubation Lab of Ingérop conseil et Ingénierie, scredIn Software proposes a cybersecurity application brick, associated with services, dedicated, for Digital Engineering 4.0 #PT4T > Protect today for tomorrow #Cybersecurity #DigitalEngineering #Industry #Building #City #BIM #PLM #SmartData cybersécurité, BIM, Ingénierie Numérique, Formation, Conseil, and Data Management

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 0 5
Torii Security Torii Security

[Automatic translation follows] To protect yourself from threats from the internet and elsewhere Torii Security is an expertise firm specializing in Information Systems Security. Our mission: protect your digital assets! We intervene throughout the chain, to guarantee a real improvement in your protection: - Evaluation: by carrying out security audits and intrusion tests (pentests), - Training: technical training and risk awareness for all, - Improvement: through technical support, consulting services, integration of open source solutions with added value More information to come on www.torii-security.fr Information Systems Security, Open Source, Audits, Penetration Testing, Advice, Management, Advice, Cybersecurity, IT Security, and Cyber …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 1 3
NANO Corp. NANO Corp.

Hybrid IT infrastructure security IT infrastructure is changing, always. From on-premise to the cloud, from server to edge, computer to IOT. One segment remains constant: the network. At NANO Corp we keep the network visible, understandable, operational and secure. Undisputed European Leader in network probes, NANO Corp. is the only french company to have developed its own in-house network probe. Certified at 100Gbit/s by Spirent Communications, our network probe, running in full-CPU at L2/L7, is the only technology to achieve such a high level of performance in Europe and in the world, while also being light. Our team's high level …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

16 1 16 21
Keyfactor Keyfactor

Identity-first security for every machine. Keyfactor brings digital trust to the hyper-connected world with identity-first security for every machine and human. By simplifying PKI, automating certificate lifecycle management, and securing every device, workload, and thing, Keyfactor helps organizations move fast to establish digital trust at scale — and then maintain it. In a zero-trust world, every machine needs an identity and every identity must be managed. For more, visit keyfactor.com or follow @keyfactor. Identity & Access Management, SaaS, IoT Security, Public Key Infrastructure, cybersecurity, software, enterprise software, enterprise cybersecurity, PKI, PKIaaS, IIoT Security, CLA, and Certificate Lifecycle Automation

Type: SMB Activities: IT Services Technologies: Cybersecurity

8 1 6 437
NAVISTA NAVISTA

Virtual Operator Company. Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company .Virtual Operator Company Operador de Seguridad and Creación de redes privadas en Internet

Type: SMB Activities: IT Services

1 1 0 21
Hadrian Hadrian

Digital security insights from a hacker’s perspective Hadrian’s digital security model focuses on automated event-based scanning. Our approach maps vulnerabilities in an organisations’ entire attack surface infrastructure, and provides the critical insights to fortify them. Unlike traditional security which relies on scheduled testing, Hadrian proactively strikes to deliver accurate information. Developed by a team of expert hackers, our unique approach to digital security allows for continuous security validation, running tests on 1000s of digital assets. Follow Hadrian on LinkedIn and Twitter to find out how our Legion is disrupting the digital security landscape!

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 3 77