Search 1
Entities
LogoName Σ Employees
CyVaultTM CyVaultTM

Protect | Engage | Defend CyVaultTM has emerged as a global, cyber defense leader offering the most advanced comprehensive protection for companies and organizations of any industry and size. Our innovation, at “CyVaultTM | Labs”, focuses on Critical Infrastructure (OT / ICS), Information Technology (IT), Internet of Things (xIoT) and the Cloud, safeguarding against existing and emerging threats, leveraging its advanced battle-tested cyber defense models Our platform “CyVaultTM | DOME” enhances your digital presence with an innovative Automated Cyber-Defensive Ecosystem, supported by an expert-managed real-time threat protection, detection and response, 24/7/365.

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT Sensors

3 2 1 8
Ontrack Ontrack

The Global Leader in Data Recovery Ontrack, a KLDiscovery business, is the global leader in data recovery. Offering data management, disaster recovery, email extraction and restoration, data destruction, erasure verification, and tape management, Ontrack serves clients with in-lab, remote, and do-it-yourself options. With cleanroom facilities worldwide and engineering expertise in every major global region, Ontrack has developed hundreds of proprietary solutions over the past three decades to recover data from enterprise storage, tapes, HHDs, SSDs, flash media, mobile devices, and virtual environments. In addition, Ontrack's PowerControls software suite enables search, recovery, and restoration of data from Exchange, SharePoint, and SQL …

Type: Startup Activities: IT Services Technologies: Data Analytics

7 2 6 816
Board of Cyber Board of Cyber

Beyond Rating In 2022, in our ultra-connected world, cyber risk is one of the main concerns of companies and public organizations. Their leaders are realizing that cyber attacks threaten the very existence of their organizations and that of their partners. "Cybersecurity is in the TOP 3 risks to address for a company in 2021." Because cybersecurity begins with objective knowledge of one's own performance, Board of Cyber offers a fast, non-intrusive solution to continuously, and automatically, assess organizations' exposure to cyber risks. Security Rating, Cybersecurity Assessment, notation cyber, cybersécurité, and évaluation risque cyber

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

28 2 27 26
TrustHQ TrustHQ

TrustHQ, helping CISO save time and risk mitigation and compliance TrustHQ is the 1st Solution for CISO to drive and track cybersecurity compliance and Risk mitigation progress. -- Map internal information security and compliance requirements to any standard (ISO 2700x, II901, ISA, NIST, GDPR, PCI...), -- Assign compliance tasks to internal teams, -- Fill in and visualize progress across the company, collect and centralize proofs of compliance, -- Check at any point in time your compliance maturity and risk mitigation (ISSP, ISO...) via intuitive dashboards. TrustHQ provides CISO with an efficient and adapted cybersecurity compliance management solution to seamlessly drive …

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity

11 2 8 16
IT and Cybersecurity Meetings IT and Cybersecurity Meetings

The One to One Meetings for networks, cloud, mobility and cybersecurity IT & Cybersecurity Meetings: your business meeting place on 20 and 21 March 2024 in Cannes! IT & Cybersecurity Meetings, the business meeting place for IT and cybersecurity, is a business exhibition dedicated to IT professionals (manufacturers, publishers, telecoms operators), infrastructure suppliers, mobility professionals and IT security experts. The aim is to encourage direct face-to-face meetings between top decision-makers and exhibitors, through pre-organised, highly-qualified meetings ahead of the event, in a relaxed, friendly atmosphere. IT & Cybersecurity Meetings is a privileged forum for exchange and an instant business platform, …

Type: Event

4 2 2 2
ATHENE Digital Hub Cybersecurity ATHENE Digital Hub Cybersecurity

Located in Germany's cyber hot-spot, we are Germany’s leading innovation community of cybersecurity start-ups, founders, coders, investors and scientists. The hub is a project of ATHENE, the National Research Center for Applied Cybersecurity. It is also part of the German Federal Ministry of Economic Affairs and Energy's Digital Hub Initiative to promote digital innovation in Germany. If you are interested to learn more about how we can support you, don't hesitate to reach out or check out our homepage: https://www.athene-center.de/gruenden. Imprint: https://www.athene-center.de/impressum Privacy Statement: https://www.athene-center.de/en/privacy-statement

Type: Public Activities: IT Services

4 2 1 1
EONA-X EONA-X

Transforming data into services Mobility, Transport & Tourism data space. EONA-X is a great place for data-sharing on Mobility, Transport and Tourism. We facilitate data-sharing in a secure and standardized way to enhance seamless travel, multi/intermodality and apply a sustainable approach to smart cities. datasharing, dataspace, cloud, mobility, transport, and Tourism

Type: Startup Activities: IT Services transporttech Smart City Technologies: Data Analytics

17 2 15 7
DigiCert DigiCert

Digital trust at work in the real world. DigiCert is the digital trust provider of choice for leading companies around the globe, enabling individuals, businesses, governments, and consortia to engage online with confidence, knowing their digital footprint is secure. Internet Security, SSL Certificates, Extended Validation SSL, Internet of Things, EV SSL Certificates, Website Security, Managed PKI, Certificate Management, Device Certificates, Mobile Certificates, Encryption Technology, Identity Assurance, and Digital Trust

Type: Large company

11 2 16 1,387
Skybox Security Skybox Security

Secure more. Limit less. Prevent breaches before they happen. Get the intelligence and context you need to reduce cyber exposure at speed and scale. Skybox Security is the only platform that collectively visualizes and analyzes hybrid and multi-cloud networks, providing full context and understanding of the attack surface. Security Analytics, Firewall Auditing, Vulnerability Management, Network Auditing, Threat Intelligence Management, Firewall Change Management, Attack Surface Visibility, Modeling and Simulation, Rule Lifecycle Management, Vulnerability Assessment, and Attack Simulation

Type: SMB Activities: IT Services Technologies: Cybersecurity

3 2 1 292
v6Protect v6Protect

Analyze I Fix I Protect your web applications - SaaS v6Protect - Web Application Security v6Protect revolutionizes vulnerability monitoring and protection of Internet-exposed applications. Get powerful, intuitive, and automated solutions to secure your applications in a timely manner. The solution manages daily priorities: ✔️ Attack surface monitoring ✔️ Vulnerabilities management ✔️ Prioritization and vulnerabilities remediation plan ✔️ Compliance improvement ✔️ Web applications protection How it works ❓ Scoring View your Security Score daily, your vulnerabilities and simply track your risk. Easily define your priorities, get the key indicators. Alerting Stay informed daily about Zero Day vulnerabilities, receive targeted alerts of …

Type: Startup Activities: IT Services Technologies: Cybersecurity

11 2 10 14
Nybble Security Nybble Security

The world's first Threat Bounty platform. Nybble provides an alert triage and incident management service thanks to the world’s first qualified analyst network. Clients, let our analysts categorize and answer your security alerts. Raise your defense level by engaging a Threat Bounty campaign. Get an immediate ROI on your detection platform. You’re an analyst or a hunter? Join our Blue Team community and get rewarded for your skills and hard work.

Type: Startup Activities: IT Services Technologies: Cybersecurity

13 2 8 5
DSecBypass DSecBypass

Company specialized in information security. We offer pentesting services and develop Exaface. DSecBypass is an IT security company based in Lyon. We offer penetration testing and post-mortem audits. We are also developing Exaface: a SaaS tool for External Attack Surface Management. Cybersécurité, Pentest, Audit, OSINT, Informatique, and Conseil

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 2 1 4
Quantum Dice Quantum Dice

Securing a connected future. Quantum Dice is an award-winning, fast growing quantum technology and photonics developer backed by world leading innovation from the University of Oxford. Providing random number generation (QRNGs) which generate unbiased, true random numbers. RNGs are essential components of modern communication technologies which generate cryptographically secure keys for enterprise and user needs. Quantum Random Number Generator, Cybersecurity, Quantum, Photonics, and Hardware

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 2 4 24
Zygon Zygon

Offboard any user from every account. Even the accounts you don’t know about Get your SaaS stack under control. Sign up at www.zygon.tech

Type: Startup Activities: IT Services Technologies: Cybersecurity SaaS

4 2 2 6
Claroty Claroty

Securing Cyber-Physical Systems Across the Extended Internet of Things (XIoT) Claroty empowers organizations to secure cyber-physical systems across industrial (OT), healthcare (IoMT), and enterprise (IoT) environments: the Extended Internet of Things (XIoT). The company’s unified platform integrates with customers’ existing infrastructure to provide a full range of controls for visibility, risk and vulnerability management, threat detection, and secure remote access. Backed by the world’s largest investment firms and industrial automation vendors, Claroty is deployed by hundreds of organizations at thousands of sites globally. The company is headquartered in New York City and has a presence in Europe, Asia-Pacific, and Latin …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

17 3 11 532
Darktrace Darktrace

Helping over 9,000 organizations worldwide minimize cyber disruption. Darktrace's mission is to free the world from cyber disruption. Its AI technology is relied on by over 9,400 customers worldwide to prevent, detect, respond, and heal from cyber-attacks. Headquartered in Cambridge, UK, the company has over 2,200 employees and over 30 offices worldwide. Darktrace was named one of Fast Company’s ‘10 Most Innovative Companies in Artificial Intelligence’ for 2022 Cyber security, Cyber defense, Information security, Intelligence, Information technology, Machine learning, Artificial Intelligence, and ransomware protection

Type: Large company Technologies: Cybersecurity A.I. A.I. - Machine Learning

12 3 8 2,761
QEDIT QEDIT

Add security, privacy and scale to your blockchain infrastructure using Zero-Knowledge-Proofs and applied cryptography Founded in 2016 by a world-class team of accomplished tech entrepreneurs, researchers, and developers, QEDIT has emerged as a global leader in the field of Zero-Knowledge Proofs. The company comprises industry experts and professionals with a passion for applied maths and is overseen by a Scientific Advisory Board that includes world-renowned cryptographers from leading academic institutions all over the globe. QEDIT is leading the standardization of Zero-Knowledge Proofs through the ZKProof.org Workshops, and builds production-grade ZKP systems for blockchain. We are a growing startup and always …

Type: Startup Activities: IT Services privacytech Technologies: Blockchain/Cryptocurrency

7 3 0 13
Digitemis Digitemis

[Automatic translation follows] Unique expertise in cybersecurity and GDPR compliance | PASSI qualified ✅ Digitemis is an expert in cybersecurity and personal data protection consulting. Its value proposition combines triple expertise: • Technical cybersecurity: penetration testing, Red Team, phishing, code audit, configuration audit • Organizational cybersecurity: audits, risk analysis, cybersecurity support (ISO27001, DORA, NIS2), PCA/PRA, PSSI, outsourced CISO • GDPR compliance: audit, training and support, shared/outsourced DPO Our added value? A coherent support proposal and an excellent understanding of needs thanks to synergy between centers of expertise. ANSSI (National Authority for Information Systems Security and Defense), has issued a Security …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity IoT

11 3 10 36
Atempo for Small & Medium Businesses Atempo for Small & Medium Businesses

[Automatic translation follows] 0 data loss - 0 business interruption! Solutions for Preserving Data Ecosystems Atempo, French software publisher, European leader in professional data protection and management solutions. A specialist in the preservation of digital ecosystems and instant disaster recovery, Atempo supports organizations of all sizes with trusted, sovereign solutions to meet the major challenges of cybersecurity. An active member of the government program Cybermalveillance.gouv.fr and the French Tech 120, Atempo is committed on a daily basis to sustaining the activity of organizations around a simple but essential promise: zero loss of data, zero interruption of activity. “Our wish is …

Type: Startup Activities: IT Services Technologies: Data Analytics

7 3 4 15
HYPR | The Identity Assurance Company HYPR | The Identity Assurance Company

Creating Trust in the Identity Lifecycle as The Identity Assurance Company HYPR is on a mission to improve the lives of security-minded leaders, their employees and customers by helping organizations create trust in the identity lifecycle. HYPR provides the strongest end-to-end identity security, combining modern passwordless authentication with adaptive risk mitigation, automated identity verification and a simple, intuitive user experience. With a third-party validated ROI of 324%, HYPR easily integrates with existing identity and security tools and can be rapidly deployed at scale in the most complex environments. Cybersecurity, Mobile Security, Infrastrucure, Data Security, Security, Wireless, Privacy, SaaS, Software, Cloud, …

Type: Startup Activities: IT Services privacytech regtech Technologies: Cybersecurity IoT SaaS Wireless

16 3 5 122
WaToo WaToo

The invisible TAG that traces your sensitive data WaToo helps organizations reduce the risks and expenses associated with information leaks from internal sources (employees, partners, subcontractors, etc.). This is a major problem that can cause financial and customer losses, legal problems and even bankruptcy. Imagine a grandmother who uses tongue painter candy to find out which child has eaten it. WaToo does the same with your sensitive data and documents. For more information, you can visit https://watoo.tech. You can also contact us directly on contact@watoo.tech Watermarking, Lutte contre la fuite de données, Cybersecurity, Cybersécurité, and Marquage de documents

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 3 3 9
Siemplify (Now Part of Google Cloud) Siemplify (Now Part of Google Cloud)

Our product is now Chronicle SOAR. Follow us at Chronicle on LinkedIn to stay updated! We're now Chronicle SOAR, part of Google Cloud! Chronicle’s cloud-native security, orchestration, automation and response product empowers security teams to respond to cyber threats in minutes--not hours or days Cyber Security, Security Analytics, Security Operations, Threat Management, Incident Response, Security Orchestration, Security Automation, and Information Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

10 3 4 48
Venari Security Venari Security

Cryptographic Discovery Tool | Cryptographic Visibility | Internal and Regulatory Compliance Venari Security provides organisations with advanced visibility into their encrypted attack surface, ensuring regulatory compliance and privacy adherence through our cryptographic discovery tool. Our focus is on crypto agility which helps you assess both external and internal cryptographic risks, preparing your business now and for the quantum future. Advanced Analytics, Machine Learning, Fraud Detection, Cyber Security, Threat intelligence, Threat Detection, Metadata, Artificial Intelligence, Encrypted Traffic Visibility, Encryption, Next Generation, Data Privacy, Ransomware, Encrypted Traffic Analysis, Cryptographic Discovery Tool, Cryptographic Visibility, Regulatory Compliance, NIST, and NCSC

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity A.I. - Machine Learning Data Analytics A.I.

15 3 11 49
biid biid

Your Mobile ID biid is a Mobile Identity platform helping international Banks to transform the customer experience across their most critical online journeys. We believe that in 2019 you don’t have to compromise between security, simplicity and peace of mind, when transacting online. To deliver on this promise, we employ our PKI-based mobile technology that transforms a mobile device into a secure hardware token, easy to use and always in your pocket. This certified device can be used to authenticate a user online, authorise payments (in compliance with PSD2’s strong customer authentication requirements) and legally sign documents. We also incorporate …

Type: Startup Activities: IT Services privacytech regtech fintech Consulting uxtech Technologies: Cybersecurity

5 3 1 9
BioCatch BioCatch

Unlocking the power of behavior to create a digital world where identity, trust and ease seamlessly co-exist. BioCatch is the leader in Behavioral Biometrics which analyzes an online user’s physical and cognitive digital behavior to protect individuals and their assets. Our mission is to unlock the power of behavior and deliver actionable insights to create a digital world where identity, trust and ease seamlessly co-exist. Leading financial institutions around the globe use BioCatch to more effectively fight fraud, drive digital transformation and accelerate business growth. With over a decade of analyzing data, over 60 patents and unparalleled experience, BioCatch continues …

Type: Startup Activities: IT Services Technologies: Cybersecurity

13 3 13 325
Intrinsec Intrinsec

Notre métier ? Protéger le vôtre Intrinsec is focused on Information Security. Delivering security services since 20 years, the company is focused on building services & offers for a better protection of its customers & partners business. Information Security, Audit, Penetration testing, Consultancy, SOC, CERT, MSSP, Threat Intelligence, Incident Response, Forensic, Red Team, Purple Team, MSSP, CISO, Shared-Time CISO, Awareness, FR/EU Compliance, Data leaks, CTI, Threat Hunting, Crisis management, EDR, MDR, and Vulnerability management

Type: SMB Activities: IT Services Technologies: Cybersecurity

7 3 3 248
CounterCraft​​ CounterCraft​​

The next generation of threat intelligence. Active defense powered by high-interaction deception technology. CounterCraft empowers organizations to strengthen their security posture more efficiently than ever before. Designed and developed by experts, the CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection using controlled, highly credible synthetic environments. CounterCraft accelerates threat detection earlier in the attack lifecycle, provides evidence of malicious activity and modus operandis and already protects leading organizations in the financial, trade and government sectors, as well as law enforcement agencies. The feature-rich CounterCraft Cyber Deception Platform delivers …

Type: Startup Activities: IT Services Technologies: Cybersecurity

18 3 9 44
KnowBe4 KnowBe4

Human Error. Conquered. KnowBe4 is the provider of the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering. The KnowBe4 platform is user-friendly and intuitive, and powerful. It was built to scale for busy IT pros that have 16 other fires to put out. Our goal was to design a full-featured, yet easy-to-use platform. Customers with businesses of all sizes can get the KnowBe4 platform deployed into production at least twice as fast as our competitors. Our Customer Success team gets you going in no time, without the need for …

Type: Large company Activities: IT Services Technologies: Cybersecurity

16 3 2 1,855
Rapid7 Rapid7

Organizations around the globe rely on Rapid7 technology, services, and research to securely advance. The visibility, analytics, and automation delivered through our Insight cloud simplifies the complex and helps security teams reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks. Information Security, Vulnerability Management, Penetration Testing, Compromised User Detection, Mobile Risk Management, Enterprise Control Monitoring, Strategic Services, Security Programs, Application Testing, Automation, Analytics, and Intrusion Detection

Type: Large company

6 3 3 2,925
AMOSSYS AMOSSYS

[Automatic translation follows] Expertise & Innovation in Cybersecurity Amossys is a French cybersecurity consulting and expertise firm created in 2007, specializing in strategic sectors: Defense & Aerospace, Energy, Telecoms, Health, Transport, Industry, Banking, Public actors. Its ultra-specialized teams make their unique know-how available to clients operating in sensitive contexts. Its Information Technology Security Assessment Center (CESTI) approved by ANSSI – and one of only two in France meeting common international criteria – makes Amossys a strategic partner of French digital sovereignty and European. Since 2023, Amossys has been part of the Almond group. This alliance offers a complete range of …

Type: SMB Startup Activities: IT Services Technologies: Cybersecurity

10 3 10 65
NEOWAVE NEOWAVE

Strong authentication and secure transactions NEOWAVE is an innovative company specializing in strong authentication and secure transactions. Our main mission is to protect companies’ and individuals’ digital assets through strong authentication technologies based on secure components and digital certificates. Our solutions address the cybersecurity, digital trust and identity management markets. NEOWAVE products combine the high level of security offered by smart cards with the advantages of storage and connectivity technologies: USB, RFID/NFC and Bluetooth Low Energy (BLE). Designed and manufactured in France, they meet the security requirements of European agencies. Clefs USB / Tokens USB, RFID / NFC, Chiffrement de …

Type: SMB Activities: IT Services Technologies: Cybersecurity NFC Wireless

6 3 3 8
Arkose Labs Arkose Labs

Bot management and account security. The mission of Arkose Labs is to create an online environment where all consumers are protected from spam and abuse. Recognized by G2 as the 2024 Leader in Bot Detection and Mitigation, with a high score in customer satisfaction and the largest market presence seven quarters running, Arkose Labs offers the world’s first $1M warranties for credential stuffing, SMS toll fraud, and card testing. With 20% of our customers being Fortune 500 companies, our AI-powered platform combines powerful risk assessments with dynamic threat response to undermine the strategy of attack, all while improving good user …

Type: Startup Activities: IT Services Technologies: Cybersecurity

13 3 7 231
F-Secure Corporation F-Secure Corporation

F-Secure exists to make every digital moment more secure, for everyone. We recruit the best minds in the industry. F-Secure makes every digital moment more secure, for everyone. We deliver brilliantly simple, frictionless security experiences that make life easier for tens of millions of people we protect and our 200+ partners. For more than 30 years, we’ve led the cyber security industry with first after first with a pioneering spirit born out of a shared commitment to do better by working together. Cyber security, Endpoint protection, Threat Intelligence, VPN, Internet Security, Antivirus, Consumer Cyber Security, Identity Theft Protection, Data Breach …

Type: Large company

13 3 8 1,649
Approach Cyber Approach Cyber

Delivering cyber serenity Approach Cyber is a pure-play cyber security and privacy company. At Approach, we believe that everyone deserves digital peace-of-mind. This is our vision, our aspiration for a society where each and every one is reassured, where there is confidence and security in the digital world. Therefore, our role is to bring cyber serenity to society. Every day, we take care of your cyber security while you focus on your business. We help you to prevent, withstand and recover from cyber security incidents and enable you to keep full attention on your core activities. We offer 360-degree solutions …

Type: SMB Activities: IT Services privacytech constructiontech regtech Technologies: Cybersecurity

4 3 3 86
NuCypher NuCypher

NuCypher is a data privacy layer for blockchain and decentralized applications. It gives developers a way to store, share, and manage private data on public blockchains. Big Data, Cybersecurity, and Encryption

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity Blockchain/Cryptocurrency Data Analytics

7 3 4 12
Lookout Lookout

We are a data-centric cloud security company, purpose-built for the intersection of enterprise and personal data. Lookout, Inc. is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack. Data is at the core of every organization, and our approach to cybersecurity is designed to protect that data within today’s evolving threat landscape no matter where or how it moves. People — and human behavior — are central to the challenge of protecting data, which is why organizations need total visibility into threats in real time. The Lookout Cloud Security …

Type: Large company Activities: IT Services privacytech Technologies: Cybersecurity

19 3 11 755
Netskope Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security. Netskope, a global SASE leader, helps organizations apply zero trust principles and AI/ML innovations to protect data and defend against cyber threats. Fast and easy to use, the Netskope platform provides optimized access and real-time security for people, devices, and data anywhere they go. Netskope helps customers reduce risk, accelerate performance, and get unrivaled visibility into any cloud, web, and private application activity. Thousands of customers trust Netskope and its powerful NewEdge network to address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory …

Type: Large company Activities: IT Services Technologies: Cybersecurity

14 3 8 2,616
Crypto Quantique Crypto Quantique

Crypto Quantique is a quantum driven cybersecurity company addressing the growing challenges of end-to-end IoT security. Crypto Quantique is building the most secure end-to-end IoT security platform. We are a transformative cybersecurity technology company, using the most advanced techniques in cryptography and quantum physics, designed to ensure that both device security becomes foundational and end-to-end IoT security standard practice. Crypto Quantique has proven the world's first quantum driven security on a chip and its IP can generate multiple, unique, unforgeable cryptographic keys that never need to be stored and used independently by multiple applications on demand. When combined with their …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

17 3 13 47
SatoshiLabs SatoshiLabs

The creator of Trezor, Invity, Tropic Square and Vexl. Innovations that empower independence. We are technology pioneers developing products that secure individual autonomy and privacy. Innovation drives our brand success, putting us in a unique position where we get to focus on projects that matter, without having to compromise. SatoshiLabs established the cryptocurrency hardware wallet industry in 2013 with Trezor and hasn’t stopped innovating since. Our pioneering team delivers secure solutions to real-world problems, with Tropic Square creating the first auditable secure chip, Invity bringing new ways to access crypto, and Trezor developing new secure hardware and interfaces. Trezor, the …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

6 3 0 67
Beauceron Security Beauceron Security

Empower People. Reduce Cyber Risk. A new start-up focused on tackling the human aspects of cybersecurity. Our platform is aimed at helping organizations of all types effectively address the growing risk from cybercrime by providing the tools necessary to measure, monitor and remediate threats to their most critical and exposed assets - their people. Cybersecurity, Cybersecurity Strategy, Cyber Threat Intelligence and Analysis, and Cyber Risk Management and Remediation

Type: Startup Activities: IT Services Technologies: Cybersecurity

13 3 11 44
Trustonic Trustonic

We embed world-leading trusted cybersecurity technology into smart devices and connected vehicles. Trustonic a world leader in hardware backed mobile device security, app protection and secures a range of mission critical in vehicle systems. Trustonic has over 100 employees, with its headquarters in Cambridge, UK and offices across 7 international locations. Trustonic counts the worlds leading car manufacturers, financial institutions and mobile operators as customers, as well as every tier 1 Android handset manufacturer. Our patented security technology is embedded in c.2 billion devices worldwide – created initially from a joint venture between ARM & Gemalto, Trustonic is now an …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT Sensors

18 3 14 122
Dragos, Inc. Dragos, Inc.

Industrial Cybersecurity Dragos has a global mission to safeguard civilization from those trying to disrupt the industrial infrastructure we depend on every day. The Dragos Platform offers the most effective industrial cybersecurity technology, giving customers visibility into their ICS/OT assets, vulnerabilities, threats, and response actions. The strength behind the Dragos Platform comes from our ability to codify Dragos's industry-leading OT threat intelligence, and insights from the Dragos services team, into the software. Our community-focused approach gives you access to the largest array of industrial organizations participating in collective defense, with the broadest visibility available. ​ Our solutions protect organizations across …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT SaaS

13 3 9 529
PQShield PQShield

Leading Experts in Post-Quantum Cryptography For Software and Hardware "Think openly, build securely" Our team is shaping the way our digital world is protected against the threats of tomorrow. In a time when quantum computers will soon be able to break current cryptography methods, we're focused on empowering organizations, industries, and nations, with the ultimate quantum-resistant cryptography solutions. PQShield was selected as a World Economic Forum Tech Pioneer in 2021, a FAST COMPANY winner 2022, WIRED Trailblazer 2023 and Bloomberg’s Startups to Watch 2023. Our expertise, clarity and care enable us to deliver new global standards alongside real-world, post-quantum hardware …

Type: Startup Activities: deeptech IT Services nanotech Technologies: Cybersecurity IoT

23 3 21 67
Seclab Seclab

Improving the security, the integrity and the availability needs of connected industries and critical infrastructures. Our robust solution, Secure XchangeTM (based on Electronic AirGap technology) has been proven by our customers using the most sophisticated test systems, including those used by NATO. The only hardware-based system enabling 2-way communications Secure XchangeTM allows you to give your users full bi-directional communications between systems on the IT and OT networks (SCADA, OT, IT, and DCS) while at the same time providing a greater level of protection against network-layers attacks than data diodes. We offer the best solution on the market to protect …

Type: Startup Activities: IT Services Technologies: Cybersecurity

8 3 2 23
ALL4TEC ALL4TEC

Cyber risk management software publisher. Our tools offer an agile and systemic approach to Cyber risk analysis, based on recognized methodologies and continuous feedback. Simplicity, openness and proximity are the main axes to which our approach is anchored. Our range of tools is both recognised by the ANSSI, through its Ebios RM labeling, and widely deployed and implemented: defence, aeronautics and space industries, institutions, medium-sized private players, etc. Safety, Model Based Testing, Cyber Security, Ebios RM, EBIOS, Analyse de risques, Développement logiciel, and Agilité

Type: SMB Activities: IT Services Technologies: Cybersecurity

13 3 10 25
Knock Knock Knock Knock

Deep AI technologies for offensive cyber security Knock Knock fournit des solutions d'intelligence artificielle et d'automatisation pour les équipes de cybersécurité offensive Notre Plateforme d'Orchestration et d'Automatisation de Pentest permet aux pentesters d'industrialiser leur savoir-faire, transmettre leurs compétences et gagner en disponibilité dans des contextes de tests d'intrusion de systèmes et réseaux On Premise. Vous déployez dur votre machine une VM intégrant : 👉 Notre Hacker Toolbox Nous y connectons les outils de pentest pour simplifier leur déploiement, automatiser leur exécution et unifier leurs données pour la génération de rapports Outils compatibles : Nmap, OpenVAS, NVD-NIST, Metasploit, THC-Hydra, Proxychains, LinPEAS, …

Type: Startup Activities: IT Services Technologies: A.I. Cybersecurity

25 3 13 12
Keyless Keyless

Simple, secure, private biometric authentication. The passwordless authentication platform that authenticates people, not just their devices. Keyless equips businesses with simple and secure privacy-preserving biometrics, elevating the user experience and assuring global compliance. Easily integrated, its patented Zero-Knowledge BiometricsTM technology distinguishes Keyless as the first biometric system that does not store biometric data anywhere. Proven to slash ATO fraud and help desk costs by up to 80%, Keyless delivers built-in multi-factor security that verifies a user’s genuine identity in addition to their device in 450ms or less. Compatible with over 1000 devices, Keyless is ISO27001 certified and uniquely has been …

Type: Startup Activities: privacytech IT Services regtech Technologies: Blockchain/Cryptocurrency Cybersecurity

14 3 4 60
Qontrol Qontrol

[Automatic translation follows] SMEs, Startups: Your cyber. A new pride. Qontrol is the first virtual cybersecurity assistant for SMEs & Startups that require no prior knowledge. Protection solutions already exist. The platform tells you what to use, when and how to protect your SME and prove it to your business partners. cybersecurity, cybersecurity, SMEs, security, information systems, business risk management, transformation, digital transformation, and artificial intelligence

Type: Startup Activities: IT Services Technologies: A.I. Cybersecurity

23 3 25 12
STid STid

Smarter Security Answers STid is one of the leading developers of contactless identification solutions using RFID, NFC and Bluetooth® technologies, and the Internet of Things (IoT). For over 20 years, we have been inventing smart solutions designed to secure access and provide traceability for assets in testing environments such as the aeronautical, energy or defense sectors. As experts in our field, we are constantly striving for excellence, giving us an unrivalled command of cutting-edge technologies to safeguard digital identity. We give companies, industries and governments the means to identify, protect and supervise their assets to make their daily operations easier …

Type: SMB Activities: IT Services Technologies: Wireless IoT NFC

20 3 17 161
CYBERSECURITY Luxembourg CYBERSECURITY Luxembourg

Official account of the Luxembourg Cybersecurity Ecosystem Official account of the Luxembourg #Cybersecurity Ecosystem

Type: Startup Activities: IT Services Technologies: Cybersecurity

13 3 10 N/A
Cyber-way by Crédit Agricole Alpes Provence Cyber-way by Crédit Agricole Alpes Provence

[Automatic translation follows] Detect and act together for your digital security Digital transformation is today an essential growth lever for all companies, whatever their size or activity, but it is also a vector of new cyber threats. Crédit Agricole Alpes Provence, as a banking establishment, has invested in Cyber ​​Security for years and today has robust and proven means of protection as well as a network of experts in the field. With our subsidiary “CYBER-WAY By Crédit Agricole Alpes Provence”, our desire is now to share our know-how in Cyber ​​Security and thus, to help our customers in a different …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

5 3 4 3
kamaé kamaé

[Automatic translation follows] kamaé - your cybersecurity dojo Join the kamaé dojo ⛩️! Kamaé is the simple and gamified cyber risk awareness platform. Protect your data and activities by developing your security culture: 🛡️ Training designed by cybersecurity and GDPR experts 🎮 An ultra-gamified experience: belt passes like in judo! 🤩 A very easy to use platform for employees and the back office The Kamaé platform boosts your defense, by quickly strengthening employees and engaging them sustainably 👉 micro-learnings, phishing tests, reflex sheets and a dedicated dashboard to monitor your progress. Would you like to take a trial lesson? It’s …

Type: Startup Activities: IT Services Technologies: Cybersecurity

11 3 9 13
Parsec Parsec

[Automatic translation follows] Trust the cloud PARSEC is a Zero Trust solution for cybersecurity of sensitive data developed in partnership with the Directorate General of Armaments and the Bordeaux Computer Science Research Laboratory. Parsec is CSPN certified by ANSSI and a member of the LaPlace Stratégique business accelerator, an ecosystem supported by AID, the DGA, the National Gendarmerie, Thales and many other industrial groups. Functionally, the solution allows you to share, partition and store sensitive data in the cloud, whether private or public. Parsec relies on the technological innovations of Zero Trust and Zero knowledge. The objectives of PARSEC are: …

Type: Startup Activities: IT Services Technologies: Data Analytics

10 3 0 18
Alias Robotics Alias Robotics

Robot cybersecurity Alias Robotics is a robot cybersecurity company. Grounded upon prior experiences in robotics, we help groups improve their robot security posture via services including professional threat models, penetration testing or red teaming activities. Alias is also the firm behind RIS, the Robot Immune System, a security certified software solution that protects robots and robot components against malware. robotics, security, cybersecurity, safety, pentesting, red teaming, and robot consulting

Type: Startup Activities: IT Services Technologies: Robotics

6 3 2 14
Escape Escape

We help your business stay secure with automated API discovery and security testing We help Application Security teams automate API discovery, inventory, and security testing through agentless scanning. With Escape, quickly inventory all your APIs, detect OWASP Top 10 and complex logic flaws at scale and empower your developers to adopt security in CI/CD.

Type: Startup Activities: IT Services Technologies: Cybersecurity

7 3 3 21
PIIRATES PIIRATES

[Automatic translation follows] Ethical Hacking The PIIRATES company relies on a community of experienced Ethical Hackers to allow organizations to test the robustness of their information systems in the face of the risks of computer hacking. We specialize in pentesting (computer intrusion testing) on ​​different IT targets: • Infrastructure & network, • Web platforms and mobile applications, • Social engineering, • Wireless, Goals : • Evaluate the level of security of an organization’s information system • Check the implementation of usual good practices (compartmentalization, protection of administrators, etc.) • Identify and exploit possible vulnerabilities • Propose appropriate and prioritized corrective …

Type: Startup Activities: IT Services Technologies: Cybersecurity

5 3 4 2
ARC Data Shield ARC Data Shield

[Automatic translation follows] Controlled data exchange IT & Network Cybersecurity Appliances OT -> protection of tangible and intangible assets -> strong electronic hardware partitioning, therefore flawless zerodays possible. Permanently and sustainably protect your critical assets and ultimate backups from protocol-based ransomware attacks. OT, Networks, Cybersecurity, Appliances, and IS Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

6 3 5 3
CLUSIR Nord de France CLUSIR Nord de France

[Automatic translation follows] CLUB FOR REFLECTIONS AND EXCHANGES ON GOOD PRACTICES FOR IMPROVING BUSINESS SECURITY in HAUTS-DE-FRANCE CLUSIR Nord de France is a club for reflection, exchanges on good practices, awareness-raising, meetings and contributions to the improvement of digital security. To keep in touch : - Website: https://www.clusir-ndf.fr/ - Twitter: https://twitter.com/ClusirNdf - Youtube: https://www.youtube.com/channel/UCSl0HqWoPqXaWthn7yh6QwA

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

6 3 3 1
allpriv allpriv

Edge cybersecurity solutions based in Zero-trust endpoints managed by A.I. & Blockchain Next-gen cybersecurity Easier & Safer than ever before. Allpriv designs "Zero-trust Endpoints managed by A.I. secured by Blockchain" tackling all legacy pains, lacks & gaps! - "Medical Cyber-Brick" Mitigates dramatically cyberthreats on Hospitals, building a cyber-shield on each Medical Devices - "Telework Easier & Safer than ever before" increases as well security than Efficiency to remote workforce, IT & CISO

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency Cybersecurity

8 3 6 1
Alsid Alsid

A $1.5-trillion cybercrime industry is evolving faster than your defenses. They say there’s no gain without pain. We’re not buying that. Welcome to Alsid, the creators of the AD security solution built on 4 pillars: FIX existing weaknesses with intel-driven insights, threat scores, cost estimates, and custom step-by-step recommendations. HARDEN against future vulnerabilities to break attack paths and keep your threat exposure in check. DETECT attacks in real time with continuous IoE monitoring and empower your threat hunters with AD-native investigation capabilities. RESPOND to threats at machine-speed, replay attacks to hunt for patient zero, and kick persistence mechanisms out for …

Type: Startup Activities: IT Services Technologies: Cybersecurity

11 4 3 13
PCI Security Standards Council PCI Security Standards Council

Securing the future of payments together. The PCI Security Standards Council is a global open body formed to develop, enhance, disseminate and assist with the understanding of security standards for payment account security. The Council maintains, evolves, and promotes the Payment Card Industry Security Standards. It also provides critical tools needed for implementation of the standards such as assessment and scanning qualifications, self-assessment questionnaires, training and education, and product certification programs.

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

12 4 5 155
Serenicity Serenicity

Precision cybersecurity for businesses of all sizes, communities and states. Tailor-made solutions in Precision Cybersecurity for ETI, SME / VSE, communities, large groups, States, companies from all sectors. Secure your information system from 49€ HT/month with our solutions -> DETOXIO, CYMEALOG, CLEANER : [Box and / or virtual machine]. _ 6 patents 100% Fr _ Over 100,000 equipments and 1,000 healthcare establishments in Europe, cyber protected by SERENICITY. TAKE BACK CONTROL OF YOUR COMPUTER NETWORK, EASILY. Cybersécurité, Cyberprotection, Cyberdéfense, TPE/PME, Collectivités, Grands Groupe, Souveraineté, and Sécurité des réseaux

Type: Startup Activities: IT Services Technologies: Cybersecurity

18 4 14 10
Northwave Cyber Security Northwave Cyber Security

We are your confident Cyber Security crew for a safe digital journey. Northwave Northwave offers an Intelligent combination of cyber security services to protect your information. We believe it is essential to our society and economy that we can rely on safe and trustworthy digital infrastructures. Therefore, we feel the need to make integrated ICT security services of the highest possible quality available to every organisation. Northwave integrates people, processes and technology into an Intelligent Security Operation: smart security that controls proactive and reactive measures based on a pragmatic (ISO certified) quality management structure. We combine Information Security, Privacy and …

Type: SMB Activities: IT Services privacytech Technologies: Cybersecurity

8 4 2 226
Veracode Veracode

Intelligent Software Security Veracode is intelligent software security. ​The Veracode Software Security Platform continuously finds flaws and vulnerabilities at every stage of the modern software development lifecycle.​ Using powerful AI trained on a carefully curated, trusted dataset from experience analyzing trillions of lines of code, Veracode customers fix flaws faster with high accuracy. ​ Trusted by security teams, developers, and business leaders from thousands of the world’s leading organizations, Veracode is the pioneer, continuing to redefine what intelligent software security means. Application Security, Web Application Security, Binary Static Analysis, Vendor Application Security Testing, Runtime Application Self Protection, Software Composition Analysis, …

Type: SMB Activities: IT Services Technologies: Cybersecurity

30 4 18 672
Malwarebytes Malwarebytes

Cyberprotection for every one. Malwarebytes believes that when people and organizations are free from threats, they are free to thrive. Founded in 2008, Malwarebytes CEO Marcin Kleczynski had one mission: to rid the world of malware. Today, that mission has expanded to provide cyberprotection for every one. Malwarebytes provides consumers and organizations with device protection, privacy, and prevention through effective, intuitive, and inclusive solutions in the home, on-the-go, at work, or on campus. A world-class team of threat researchers and security experts enable Malwarebytes to protect millions of customers and combat existing and never-before-seen threats using artificial intelligence and machine …

Type: Large company Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

20 4 11 743
Hack The Box Hack The Box

The #1 cybersecurity upskilling, certification, and assessment platform for hackers and organizations. Hack The Box is a leading gamified cybersecurity upskilling, certification, and talent assessment platform enabling individuals, businesses, government institutions, and universities to sharpen their offensive and defensive security expertise. Launched in 2017, Hack The Box brings together the largest global cybersecurity community of more than 2m platform members and is on a mission to create and connect cyber-ready humans and organizations through highly engaging hacking experiences that cultivate out-of-the-box thinking. By offering a fully guided and exploratory skills development environment, Hack The Box is the ideal solution for …

Type: Large company Activities: IT Services Technologies: Cybersecurity

19 4 12 1,665
SecurityWeek SecurityWeek

Leading Source of Cybersecurity News, Insights and Expert Analysis. Industry-leading events portfolio SecurityWeek helps cybersecurity professionals do their jobs better by providing timely news, information, analysis and insights from experts in the trenches. Created by industry professionals and a seasoned news team, SecurityWeek produces actionable content and a portfolio of industry-leading events to help cybersecurity professionals around the globe defend their organizations from increasingly complex cyber threats. (www.securityweek.com) cybersecurity, news, events, IT security, conferences, cyberdefense, and SCADA

Type: Startup Activities: IT Services Technologies: Cybersecurity

18 4 12 7
Tenable Tenable

Cloud Security | Operational Technology | Identity Security | and more Tenable® is the Exposure Management company. Approximately 40,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies. Learn more at tenable.com. Exposure Management, Cloud Security, Operational Technology, Vulnerability Management, Application Security, Kubernetes, Web Application Scanning, Generative …

Type: Large company Activities: IT Services Technologies: Cybersecurity

28 4 15 2,200
Snyk Snyk

Develop fast. Stay secure. Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams. Snyk is used by 2,500+ customers worldwide today, including industry …

Type: Large company Activities: IT Services

11 4 8 1,192
Avast Avast

Avast is dedicated to creating a world that provides safety and privacy for all. Cybersecurity • Business Security • Security Software • Mobile Security Avast is part of GenTM—a global company dedicated to powering Digital Freedom through a family of trusted consumer brands. (NortonLifeLock and Avast have merged and are now GenTM). We strive to give everyone the power to explore our shared digital world freely and safely. Our team is working to help shape the digital world to be a freer, fairer and safer place through the application of science, technology and human ingenuity, and we are looking for …

Type: Large company

24 4 12 1,021
Welcomr Welcomr

[Automatic translation follows] Connected access control that optimizes your time and makes you more profitable. Welcomr is the leading French manufacturer of building access management in the cloud. We automate and secure your access to make your life easier, free up more time and profitability. On the side of your customers & users, everything is done to create a unique and fluid experience. How ? There is a solution for each use! 💡Welcomr is the only system that offers you by default 4 access modes per opening for a unified experience: - Access by smartphone (bluetooth) - Access by badge …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity SaaS

24 4 23 24
Coralium Coralium

[Automatic translation follows] Cybersecurity for legal professions Coralium is your trusted partner for your company's cybersecurity: SSI audits, intrusion tests (pentest), training of your employees, etc. 🛡️

Type: SMB Activities: IT Services Technologies: Cybersecurity

7 4 3 13
MedStack MedStack

The Go-To Compliance Platform for Digital Health Built specifically for the needs of the healthcare industry, MedStack makes it easy for application innovators to build, launch and scale compliant applications that automatically meet the requirements of today's healthcare enterprise systems. We are the only solution that combines the power of a platform with built-in security and provable compliance, so you can confidently provide the assurance needed to sell your digital health application. Trusted by hundreds of digital health companies and validated by major healthcare systems across North America, MedStack is emerging as the de facto standard for delivering the highest …

Type: Startup Activities: privacytech healthtech Technologies: Cybersecurity

13 4 10 21
Avant de Cliquer Avant de Cliquer

[Automatic translation follows] Human at the heart of cybersecurity, for a drastic reduction in the risk of cyberattack. 80% of cyberattacks originate from a click on a fraudulent email. It is therefore essential to increase the skills of users. Avant de Cliquer allows CIOs, CISOs, DPOs and managers to divide the risk of cyberattacks by 10. Beyond the development of a global cybersecurity culture, this program helps protect organizations while complying with article 32 of the GDPR which requires the implementation of organizational measures to protect personal data. Program composed of 3 tools: - Vulnerability audit: in a real situation …

Type: Startup Activities: IT Services Technologies: Cybersecurity

31 4 27 51
Australian Cyber Security Centre Australian Cyber Security Centre

To help make Australia the most secure place to connect online. The Australian Cyber Security Centre (ACSC) is based within the Australian Signals Directorate (ASD). We provide advice and information about how to protect you, your family and your business online. We moderate our page to remove inappropriate posts. For more information about how we engage on social media, visit https://www.cyber.gov.au/social-terms This page is monitored during Australian business hours Monday to Friday between 9.00am and 5.00pm AEST. To report a crime or for general advice about local security and safety issues in your community, call your local police on 131444 …

Type: Public Activities: IT Services

9 4 6 71
France Cyber Maritime France Cyber Maritime

Safeguarding the digital maritime community. France Cyber Maritime is a non-profit organization created in November 2020. Its main purposes are to increase the resilience of maritime and port operations to cyber threats and to develop a network of expertise in maritime cyber security. To complete these tasks, France Cyber Maritime fosters the creation of tailored cyber security solutions and operates the M-CERT (Maritime Computer Emergency Response Team), a national centre which provides information and assistance to all maritime and port operators. With more than 70 members, France Cyber Maritime brings together within three membership boards public sector players and regional …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

27 4 24 13
Orca Security Orca Security

The agentless cloud security pioneer for AWS, Azure, Google Cloud, Kubernetes and more. Orca Security is the pioneer of agentless cloud security, and is trusted by hundreds of enterprises globally. We're the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across your cloud estate spanning AWS, Azure, Google Cloud and Kubernetes. Amazon Web Services, Audit and Compliance, AWS Security, Breach Detection, Cloud Compliance, Cloud Native Architecture, Cloud Native Security, Cloud Security, Cloud Security Posture Management, CSPM, Cloud Workload Protection, Container Security, Cybersecurity, Google Cloud Platform, Host Security, Infrastructure as Code, Investigation Analysis, Kubernetes, Microsoft …

Type: Startup Activities: IT Services Technologies: Cybersecurity

13 4 9 432
Thales Cloud Security Thales Cloud Security

Thales Cloud Security is the social name for Thales Cloud Protection & Licensing. The people you rely on to safeguard your privacy rely on Thales to protect the cloud, data, and trusted access. When it comes to data security, organisations are faced with an increasing amount of decisive moments. Whether the moment is building an encryption strategy, trusted access to the cloud, or meeting compliance mandates – you can rely on Thales to secure your digital transformation. For more information, visit cpl.thalesgroup.com Follow us on Twitter - @ThalesCloudSec Visit us on YouTube - www.youtube.com/ThalesCloudSec Data protection, Key management, Payment security, …

Type: Large company Activities: IT Services

20 4 14 668
Patrowl.io Patrowl.io

Simply faster than attackers Patrowl is an innovative product designed by cybersecurity experts. It automates the detection and remediation of your vulnerabilities to finally be faster and more efficient than cybercriminal organizations. It is built around 4 main principles: - Thanks to Artificial Intelligence coupled with our expertise, Patrowl automates continuous penetration tests. This allows us to identify your assets (known and shadow-it) and vulnerabilities in real time over a wide area. - At a glance, visualize your overall level of security and especially how to improve it. - Real adapted solutions appear on the Dashboard. You will be able …

Type: Startup Activities: IT Services Technologies: A.I. Cybersecurity

11 4 8 23
SecurIT Innosup SecurIT Innosup

Goal: identify security needs and usecases and support 63 best-in-class projects developped by 126 SMEs across Europe SecurIT is a European project (H2020-Innosup-01) aiming at supporting and co-financing the development of collaborative projects allowing prototyping and experimentation of top-notch technological solutions in the field of Security, with respect of the nowadays ethics, legal, and social challenges. The project is structured in three major axes: - Demand analyses (new use cases identification) on the Security market, with integrators and final users (including industrial players, public authorities, managers of critical infrastructures...) - Identification of technological solutions in Europe (solutions and services for …

Type: Public Activities: IT Services

10 4 9 1
CYSEC CYSEC

PRODUCTS FOR SECURITY VULNERABILITIES IN DATA ELABORATION & SPACE COMMUNICATIONS CYSEC is a European cybersecurity company, counting more than 35 employees, with offices in France, Switzerland and Italy. We ​help companies to securely deploy their applications with highly sensitive data in industries such as critical infrastructure, edge applications, healthcare, defence and space. Indeed, CYSEC is pioneering end-to-end, European and off-the-shelf cybersecurity products for newspace missions. For more information, please visit www.cysec.com. Hardware Security Module (HSM), Trusted Execution Environment (TEE), Hybrid Cloud, Virtual Machine, Cybersecurity, Post-Quantum Cryptography, Confidential Computing, Newspace, and Satcom

Type: Startup Activities: IT Services Technologies: Cybersecurity

13 4 8 50
Sekost Sekost

Your customers' cyber diagnostics Sekost offers companies an initial cybersecurity diagnostic to assess their situation, identify problems and make rapid progress. Audit de cybersécurité

Type: Startup Activities: IT Services Technologies: Cybersecurity

12 4 1 3
BehavioSec BehavioSec

Better Authentication. Better Experience. BehavioSec®, now LexisNexis® BehavioSec®, is the industry pioneer and technology leader for behavioral biometrics. We deliver actionable behavioral identity insight so businesses can provide customer-first digital experiences. Our behavioral biometrics technology helps passively establish identity trust and proactively target fraud as a transaction is happening. Find out more by visiting us at: https://risk.lexisnexis.com/ IT Security, Fraud detection, Information theft, Continious Authentication, authentication, digital transformation, behavioral biometrics, social engineering, fraud prevention, and fraud mitigation

Type: Startup Activities: IT Services Technologies: Cybersecurity

16 5 5 22
CybelAngel CybelAngel

Scan, Prioritize, Resolve External Threats CybelAngel is a global leader in cybersecurity solutions focused on External Attack Surface Protection and Management. As an early pioneer in ‘outside-in’ search technology, approaching cybersecurity just as an attacker would carry out infiltration, CybelAngel has developed the industry’s most extensive defense for external attack vectors, where the majority of cyber-attacks are initiated. Combining expanded discovery and analysis, CybelAngel finds unknown assets and exposures to preemptively diffuse attack vectors that cyber criminals use to breach systems and wreak havoc. CybelAngel proudly protects some of the largest global enterprises representing various sectors including the Pharmaceutical, Manufacturing, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

10 5 5 161
Guardtime Guardtime

If Google organizes the world's information and makes it universally available then Guardtime validates that information and makes it universally reliable. We are a team of over 150 cryptographers, developers and security architects, with decades of experience defending networks from nation-state attack. Our business model is to build partnerships with companies in every industry, build product and go to market.

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency Cybersecurity

9 5 1 96
Excellium Services Excellium Services

Your first call when it comes to cybersecurity & privacy Excellium Services is a cybersecurity services company established in Luxembourg since 2012 and more recently in Belgium, with activities and partnerships in Europe and Africa. We currently employ about 150 cybersecurity ninjas, willing to assist organizations to deal with evolving cybersecurity threats and challenges. Excellium’s main activities consist in : Cybersecurity Solutions, Security Operations Center Services 24x7, Incident Response and Security Infrastructure operations, training and formations. Excellium is a caring workplace where the culture is about diversity, inclusion and collaboration. We are continuously looking for passionate and talented people (who …

Type: Startup Activities: IT Services Technologies: Cybersecurity

15 5 8 189
Oxibox Oxibox

La première solution qui protège vos sauvegardes des cyberattaques 🛡️💻☁️🔐 Pour garantir votre continuité d'activité Oxibox is a plug-and-protect cyber-resilience solution: you only need one simple installation to fully guarantee your capacity to recover after any disaster. Nothing to configure, no storage to allocate, no throttling due to limited network bandwidth. Our auto classification tools detect and prioritize critical data. Backups are isolated from the production network making them invisible to ransomwares but also to complex attacks. Oxibox aims to solve data protection once and for all - we bring together backup, disaster recovery, distributed storage and artificial intelligence to …

Type: Startup Activities: IT Services Technologies: Data Analytics

23 5 20 24
Malizen Malizen

The all-in-one platform to accelerate your cybersecurity operations. Data visualization to better explore and understand complex cybersecurity data. Machine learning algorithms to support and multiply the capacities of teams. A full visual environment to boost your cybersecurity teams. Dataviz, Deeptech, Cybersecurity, Cyberinvestigation, Start up, Frenchtech, Threat Hunting, SOC, and CERT

Type: Startup Activities: deeptech IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity Data Analytics

25 5 22 7
CyberTaskForce CyberTaskForce

[Automatic translation follows] High Level Group on Cyberspace Security Challenges. Private initiative financed by French cyber SMEs. CyberTaskForce is a private sector initiative. This is an operational workforce that projects in France and Europe to support the digital transformation of society. This work force is an agile tool for mobilizing high-level decision-makers and involving those who have not yet integrated new threats. It makes it possible to strengthen operational and productive dialogue between public and private actors, all impacted by cyber. The work program is not designed as a discussion platform, an information cycle or a forward-looking think tank. It …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

56 5 50 6
ShareID ShareID

Strong Authentication with Official Identity ShareID is the next generation of multi-factor authentication software that detects the authenticity of government-issued IDs in the digital world, guarantees the liveness of the person behind the screen, and validates all the personal data shared with a simple smile. We are compliant with the international laws of data privacy and protection as we never store users' data or biometrics. We aim to provide businesses & individuals with a unique and authenticated digital identity.

Type: SMB Activities: IT Services Technologies: Data Analytics

18 5 11 22
CLUSIR Auvergne-Rhône-Alpes CLUSIR Auvergne-Rhône-Alpes

[Automatic translation follows] Information Security Club in the Auvergne-Rhône-Alpes Region The CLUSIR Rhône-Alpes was created in 2004 on the initiative of Yannick BOUCHET by those involved in the promotion and development of Information and Communication Technologies in Rhône-Alpes who were ADIRA, Lyon Infocité, Espace Numérique Entreprises and the Rhône Alpes Digital Agency. CLUSIR Auvergne-Rhône-Alpes is an association affiliated with the “French Information Security Club – CLUSIF” association.

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

18 5 0 11
CyberTour CyberTour

[Automatic translation follows] Cybersecurity near you. Explore, Learn, Discover. The CyberTour is: 📣 Conferences At the heart of our mission, our conferences aim to acculturate and raise awareness among public and private actors about digital issues. Each event is an opportunity to dive into the latest trends, challenges and innovations presented by experts in the field. 📜 The Cyber ​​Journal The Cyber ​​Journal is our voice in the world of cybersecurity, a periodic publication that complements our conferences and training. Each edition is rich in analyses, feedback, case studies, portraits, and tips offering our readers valuable insights into practices and …

Type: Event

20 5 17 1
OneWave OneWave

[Automatic translation follows] OneWave radically simplifies enterprise authentication. OneWave radically simplifies enterprise authentication. Humans are the primary vector of cyberattacks, yet effectively blocked by strong authentication. And you, have you activated it on your sensitive services? No way ? Not enough ? OneWave removes the complexity of strong authentication to democratize it. With our innovative biometric card, authenticating securely has never been easier for teams. Administration becomes a formality for the IT department. OneWave is: 🔹 The end of cybersecurity reserved for experts: basic use thanks to technologies mastered by everyone (Bluetooth, Biometrics, card format). The complexity of the most …

Type: Startup Activities: consumer services Technologies: Cybersecurity IoT SaaS Sensors Wireless

22 6 13 20
Bugcrowd Bugcrowd

Ingenuity UnleashedTM We are a crowdsourced security company that safeguards organizations' assets from sophisticated threat actors before they can strike—by uniting our customers with trusted hackers via our AI-powered platform to take back control and stay ahead of attackers. Bugcrowd is backed by Blackbird Ventures, Costanoa Ventures, Industry Ventures, Paladin Capital Group, Rally Ventures, Salesforce Ventures and Triangle Peak Partners. Application security, Mobile application security, Penetration testing, Bug bounty programs, Bug bounty, crowdsourced security, and vulnerability disclosure

Type: Large company Activities: IT Services Technologies: Cybersecurity

57 6 48 2,645
PixelPin PixelPin

Lock in at Login - Increase Marketing ROI - Improve customer's Digital Experience If you could remove the friction from your customer's digital journey across any digital channel, suddenly the pain and awkwardness of meaningless and insecure passwords becomes a huge opportunity. PixelPin helps you retain the loyalty of your existing customers, cost effectively attract new customers and in doing so make your customers journey simple and secure. Designed to benefit Chief Marketing Officers, Digital Innovators, Customer Experience and Security Leaders. PixelPin specialises in Retail, Entertainment, Travel & Leisure industries, helping their customers fully engage through all digital channels across …

Type: Startup Activities: IT Services Technologies: Data Analytics

11 6 8 1
Stormshield Stormshield

The European Choice in Cybersecurity All around the world, companies, governmental institutions and defence organisations need to guarantee cybersecurity for their critical infrastructure, their sensitive data and their operational environments. Certified and qualified at the highest European levels, Stormshield’s technological solutions meet the challenges faced by IT and OT to protect their activities. Our mission: to provide cyber-serenity for our clients so they can concentrate on their core activities, something which is vital to the satisfactory operation of our institutions, our economy and the services provided to our populations. When you choose Stormshield, you are choosing a trusted European cybersecurity …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

8 6 2 380
Caribbean Solutions Lab Caribbean Solutions Lab

Global Intelligence - Regional Perspective Caribbean Solutions Lab (Cayman Islands), award-winning, purveyors of cybersecurity, training, professional and managed services to the English and Dutch Caribbean since 2007. McAfee, FireEye, Education, Training, System Security, Network Security, Data Security, Content Security, Mobile Security, Professional Services, Cybersecurity, EDR, NDR, XDR, Vulnerability Managment, Tenable, Meraki, Managed Services, SIEM, Audit, Cylance, MFA, Threat Intelligence, Compromise Assessment, BCDR, Vectra, and MSSP

Type: Startup Activities: edtech IT Services Technologies: Cybersecurity

31 6 11 4
Lybero Lybero

Stocker et partager des données chiffrées de bout en bout ! Le chiffrement des données facile à utiliser et à manager ! Lybero.net is a cybersecurity software editor specialised in cryptography. We provide easy to use, easy to deploy and easy to manage cryptography, with a very high level of security. We have 3 products : CryptNDrive a web encrypted file sharing server software, a LybCrypt SDK and LEMS a fully digital escrow system. CryptNDrive allows anybody in an organisation to share encrypted files inside or outside of the organisation without any sotware. Only a web browser is required. CryptNDrive …

Type: Startup Activities: IT Services Technologies: Cybersecurity

15 6 12 2
DEF CON DEF CON

Computer Hacking Conference

Type: SMB Activities: IT Services Technologies: Cybersecurity

17 6 3 170
Intigriti Intigriti

Global crowdsourced security provider, trusted by world's largest organizations Intigriti provides continuous, realistic security testing to help companies protect their assets and their brand. Our community of ethical hackers challenge our customers’ security against realistic threats — we test in precisely the same way malicious hackers do. Intigriti goes beyond traditional pentesting or bug bounty programs; our customers publicly acknowledge our advanced guidance and unmatched agility. Our interactive platform features real-time reports of current vulnerabilities and commonly identifies crucial vulnerabilities within 48 hours. Ethical hacking, Responsible disclosure, Bug bounty, Penetration Testing, Security, Security Testing, and vulnerability disclosure

Type: Startup Activities: IT Services Technologies: Cybersecurity

11 6 6 465