Entities
LogoName Σ Employees
Kaizen Advisory Kaizen Advisory

. #infosec, #cybersecurity, #ddos, #phishing, #DFIR, managed services, GDPR, innovation, and consulting

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

0 0 0 3
Cloudflare Area 1 Security Cloudflare Area 1 Security

The preemptive, comprehensive, contextual, and continuous Cloud Email Security service. Acquired by Cloudflare Cloudflare Area 1 is a cloud-native email security service that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email Compromise (BEC), and other advanced threats that evade existing defenses. Area 1 is part of the Cloudflare Zero Trust platform. Acquired by Cloudflare in April 2022 Security, Big Data, Phishing, Social Engineering, Cybersecurity, Threat Intelligence, BEC, Email Security, Cloud Security, Threat and Malware Protection, Web Security, Network Security, Services for Office 365, Services for Gmail, and email protection

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics

0 0 0 30
CopSonic CopSonic

Universal and secure ultrasound communication Launched in September 2013, CopSonic is developing and marketing a technology which allows communication between electronic devices based on ultrasounds as a way to interact or transmit data. This patented technology is distributed as an SDK which allows B2B partners to integrate this new communication channel within their existing vertical activities and environments. The CopSonic technology is a new universal contactless communication protocol for digital security, smart detection and IoT connectivity. It is already available for the billions of smart devices existing worldwide: feature phones, smartphones, tablets, TV-box, computers, vocal assistants, game consoles, Internet of …

Type: Startup Activities: IT Services Technologies: Wireless Sensors IoT

0 0 0 6
SecBI - Universal XDR (Acquired by LogPoint) SecBI - Universal XDR (Acquired by LogPoint)

eXtended Detection and Response SecBI has evolved the traditional siloed approach in cybersecurity to an XDR Platform for a cross-product integration of network, endpoints, and cloud security tools to deliver automated smart threat detection and response. Without the need for agents, SecBI’s XDR maximizes organizations’ investment in their existing security tools and provides end-to-end protection, including against stealthy, low and slow attacks that cost organizations dearly. SecBI is currently used by financial institutions, telecoms, retailers, and manufacturing enterprises worldwide. For more information, visit: www.secbi.com or write: info@secbi.com Security Operations Centre SOC, Investigation, Cyber Security, start up, Advanced Threat, Threat Detection, …

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

0 0 0 2
Secucloud GmbH - An Aryaka Company Secucloud GmbH - An Aryaka Company

Secucloud - an Aryaka company - is a worldwide provider of a cloud-based security-as-a-service platform. Secucloud GmbH, a proven SASE platform provider, delivering network security from the cloud is a wholly-owned subsidiary of Aryaka Networks. Based in Hamburg, Germany, Secucloud GmbH offers an innovative platform designed to provide an all-in-one, global, cloud-based firewall-as-a-service, secure web gateway with advanced threat protection capabilities. The platform is engineered to connect all edges including WAN, Cloud, Mobile and IoT securely together. The Elastic Cloud Security System of Secucloud is unique of its kind on the market. By combining a wide variety of security systems …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

0 0 0 32
APrivacy APrivacy

Securing the digital world. Combining seamless data security with convenience for the financial services industry. APrivacy provides the banking and finance industry with an information security and tracking service anywhere, any time and on any device. APrivacy’s enabling technology allows banks to drive new revenues, reduce risk and support compliance efforts. APrivacy’s patented solution empowers bankers to communicate and share information with their clients using the devices they prefer (iPhone, Android, etc.) via the channels they prefer (Gmail, Outlook, Dropbox, etc. ) and the medium they prefer (Email, PDF, PPT, Word, Excel, etc. ). With APrivacy financial institutions achieve a …

Type: Startup Activities: IT Services Technologies: Data Analytics

0 0 0 2
MOBIQUANT TECHNOLOGIES | Mobile Security Management MOBIQUANT TECHNOLOGIES | Mobile Security Management

Cybersecurity Everywhere, on every embedded platform MOBIQUANT TECHNOLOGIES is the leader in enterprise-grade mobile security management, covering the concepts of (MSM) Mobile Security Management and (m-UTM) Mobile Unified Threat Management. Its innovative mobile management platform allows unprecedented feature-rich capabilities for IT teams daily operations. It includes NXSafeWave VPN, NXSafevoice, NXDefender Suite, NXOffice a BYOD container, NXTrustPKI and many others unique mobile IT patented technologies. Those solutions conver the management of any device based on Apple iOS iPhones, iPad , Google Android, RIM Blackberry, Samsung Tizen, Knox, Microsoft Windows Phone smartphones and TabletPC. Mobiquant Technologies was the first company in the …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 4
SecludIT - Ahead of Security SecludIT - Ahead of Security

Founded by security experts together with EURECOM, a French research institute in telecom and network security, SecludIT has developed Elastic Security, a set of products and services specifically designed to help cloud infrastructure providers and users to safely migrate to the cloud. Since its creation in 2011, SecludIT has become a recognized industry player, one of the Cloud Security Alliance founders and active member, co-author of Security Best Practices 2.1. SecludIT is a technology partner of Amazon Web Services, HP Cloud, VMware and Eucalyptus. Cloud Computing, Security, IaaS, Monitoring, Automation, Vulnerability Assessment, Audit, Amazon Web Services (AWS EC2 & VPC), …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
VUPEN VUPEN

VUPEN is the leading provider of defensive and offensive cyber security intelligence and advanced vulnerability research. While other companies in the vulnerability intelligence industry mainly act as brokers who buy vulnerabilities from third-party researchers and then sell them to their customers, all VUPEN's vulnerability intelligence results exclusively from our internal and in-house research efforts conducted by our team of world-class researchers. VUPEN's offensive IT intrusion solutions and government grade exploits enable the Intelligence community and government agencies to achieve their offensive cyber operations and lawful intercept missions using VUPEN's industry-recognized vulnerability research and intelligence. VUPEN's defensive security research enables governments …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
SKEYECODE SKEYECODE

Security technology for financial institutions, fintech companies and blockchains.

Type: Startup Activities: IT Services fintech Technologies: Blockchain/Cryptocurrency

1 1 0 0
Rohde & Schwarz Cybersecurity Rohde & Schwarz Cybersecurity

We are your trustworthy European IT security specialist. Imprint: bit.ly/2nOH9KC Rohde & Schwarz Cybersecurity is a leading IT security company that protects companies and public institutions around the world against cyberattacks. The company develops and produces technologically leading solutions for information and network security, including highly secure encryption solutions, next-generation firewalls and firewalls for business-critical web applications, innovative approaches for working in the cloud securely as well as desktop and mobile security. The award-winning and certified IT security solutions range from compact, all-in-one products to customized solutions for critical infrastructures. To prevent cyberattacks proactively, rather than reactively, the trusted IT …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 140
Cypheme Cypheme

The Breakthrough Anti-counterfeit Technology Cypheme is an anti-counterfeit service provider that uses artificial intelligence to detect counterfeit products by analyzing the product's packaging with a neural network, using only a cellphone camera. Cypheme is a smartphone-based anti-counterfeit system. A mobile app using machine-learning powered pattern-recognition, it will allow anyone, anywhere, to verify the authenticity of the products adopting the technology. To know more about us : Website - https://cypheme.com/ Twitter - https://twitter.com/cypheme Facebook - https://www.facebook.com/cypheme YouTube: https://www.youtube.com/channel/UC-GeYZVUJuvodHograYDTtQ Anti-Counterfeit Technology, Brand Protection, Artificial Intelligence, and Artificial Neural Network

Type: Startup Activities: IT Services Technologies: A.I. A.I. - Deep Learning

0 0 0 22
QEDIT QEDIT

Add security, privacy and scale to your blockchain infrastructure using Zero-Knowledge-Proofs and applied cryptography Founded in 2016 by a world-class team of accomplished tech entrepreneurs, researchers, and developers, QEDIT has emerged as a global leader in the field of Zero-Knowledge Proofs. The company comprises industry experts and professionals with a passion for applied maths and is overseen by a Scientific Advisory Board that includes world-renowned cryptographers from leading academic institutions all over the globe. QEDIT is leading the standardization of Zero-Knowledge Proofs through the ZKProof.org Workshops, and builds production-grade ZKP systems for blockchain. We are a growing startup and always …

Type: Startup Activities: IT Services privacytech Technologies: Blockchain/Cryptocurrency

7 3 0 13
Pen Test Partners Pen Test Partners

Pen Test Partners has been providing cyber security expertise to a huge variety of industries and businesses since 2010. Pen Test Partners / PTP has been providing cyber security expertise to a huge variety of industries and businesses since 2010. We’re paid to hack and test the security of all sorts of things, as well as providing essential consultancy, incident response, accreditation, and forensics services. We’ve tested ships and rigs (while at sea!), connected and electric vehicles, the power grids and stations that keeps countries running, as well as the payment, transport, and fulfilment systems on which everybody is reliant. …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 128
Aircloak Aircloak

Privacy-preserving analytics for your data-driven business Aircloak enables organisations to gain flexible and secure insights into sensitive data sets through a smart, automatic, on-demand anonymization engine. It ensures compliance for both internal analysts and external partners or customers. Privacy, Analytics, Big Data, Data Masking, Anonymization, Pseudonymization, GDPR, Privacy Shield, Private Data Analysis, PII, Personally Identifiable Information, Data Analytics, and HIPAA

Type: Startup Activities: privacytech IT Services Technologies: Data Analytics

3 2 0 4
DIFENSO DIFENSO

[Automatic translation follows] Protect your data in any environment while respecting legal constraints The result of 5 years of work by our IT security research lab, the data protection that we offer represents a new approach to digital security: instead of securing its transmission or storage, Difenso directly protects the data by encrypting it. from its conception and supports “the right to be forgotten”. We thus meet European data confidentiality requirements (GDPR). Our innovative technology, certified by ANSSI, guarantees companies control and exclusive ownership of their data encryption, applicable to a multitude of infrastructure platforms and Cloud application services. Its …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

0 0 0 4
Endgame Endgame

Military-grade endpoint protection that's as simple as anti-virus Endgame makes military-grade endpoint protection as simple as anti-virus. Leveraging the industry’s most advanced machine learning technology, Endgame enables security operators of any skill level to deliver full-force protection, stopping everything from ransomware, to phishing, and targeted attacks. Endgame is the only endpoint security platform to offer a unique hybrid architecture that delivers both cloud administration and data localization that meets all industry, regulatory, and global compliance requirements. Every branch of the US military as well as the world's largest commercial organizations rely on Endgame to protect their people, technology and mission, …

Type: Startup Activities: IT Services military Technologies: Cybersecurity A.I. A.I. - Machine Learning

0 0 0 20
NasOnlines data protection NasOnlines data protection

[Automatic translation follows] The NasOnlines software responds to a simple problem: how to easily secure computer data against any type of loss? What student has never had problems with their computer? What happens to the data stored on the computer: family photos, lessons, work due, etc. For a majority of students who lost their data, the value of the data was at least greater than that of the device containing it? even. Likewise, in business, what would happen if all the data stored on computers disappeared? Even for a few hours? What would be the impact on turnover? And how …

Type: Startup Activities: privacytech IT Services Technologies: Data Analytics

0 0 0 0
Paubox Paubox

HIPAA compliant email made easy. Start for free: https://www.paubox.com/pricing HIPAA compliant email and texting made easy. Start for free: www.paubox.com/pricing Email security, Cloud computing, Email encryption, HIPAA compliant email, Email API, HIPAA compliance, Data Loss Prevention, Secure Email, Email Security, HIPAA email marketing, Email DLP, Email Archiving, cybersecurity, Healthcare Marketing, Healthcare IT, and Healthcare Cybersecurity

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 0 52
DB CyberTech DB CyberTech

DB CyberTech innovates privacy and security solutions for high value structured data. Stop data loss before it happens! DB CyberTech innovates predictive data loss prevention for structured data. Its customers include the world's largest financial institutions, healthcare providers, manufacturers, and governments. DB CyberTech's technology non-intrusively assesses client to data store conversations through deep protocol extraction, machine learning, and behavioral analysis. Customers gain insights by discovering information assets including sensitive data, identifying tables being accessed, and mapping the specific applications accessing the structured data stores. In addition, machine learning technology immediately pinpoints and alerts to insider threats before data is stolen. …

Type: Startup Activities: IT Services privacytech Technologies: A.I. Cybersecurity Data Analytics A.I. - Machine Learning

0 0 0 8
CyberTech Digital CyberTech Digital

At CyberTech Digital We provide the best in class managed IT services to SMEs. CyberTech is a team of IT professionals with many years of experience. Businesses are now more dependent upon IT systems than ever. Many cannot do business without their IT. A modern IT system depends upon many elements of technology working smoothly together – the network, the computers and the software. New systems are more likely to depend on cloud based technologies, such as Office 365, Xero accounts and numerous CRM systems. The software must also be mobile friendly by default, running seamlessly on mobile phones and …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 N/A
Hirmes Cybersécurité Hirmes Cybersécurité

[Automatic translation follows] Stay in control of your data. You help keep what is most precious to you is our leitmotif. Hirmes Cybersecurity is a company that works for digital trust. We offer consulting and audit services in the field of securing information systems. Based in Clermont-Ferrand, we are committed to securing and supporting all digital players in the Rhône Alpes Auvergne region. Our service offerings are adapted from VSEs to SMEs with several areas of expertise: - Website monitoring and security (e-commerce, business site, association site). - Security audit and intrusion test of your information systems. (GDPR compliance) - …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 0
cyberprotect cyberprotect

[Automatic translation follows] Reference brand of @inherent group, dedicated to managed cybersecurity services. Security of Digital Networks International (SDN International), is an independent company founded in 2005 by IT security experts. SDN International provides services for the management of IT intangible risks for companies. Digital Network Monitoring, Cybersecurity, Incident Tracing, Security Incident Detection, and Security Incident Response

Type: SMB Activities: IT Services Technologies: Cybersecurity

3 1 0 29
DeepView DeepView

A privacy-focused platform to monitor and archive business communications DeepView protects companies from data leakage by staff. Real-time alerts to public data leaks and opt-in encrypted channel recording make personal devices in the workplace safer. DeepView’s unrivalled, patent-pending technology and AI algorithm is built to read photos. It is the only solution that allows companies to manage data leakage from photos, videos and text shared by employees, thereby protecting companies from inadvertent and intentional data leaks. The advanced, slick encryption recording is the only solution to meet GDPR and MiFID II standards. The platform instantly notifies you to confidential company …

Type: Startup Activities: IT Services fintech regtech Technologies: A.I.

0 0 0 8
PiaLab PiaLab

[Automatic translation follows] Practical and pragmatic GDPR compliance PiaLab, Practical and pragmatic GDPR compliance: ✔️External Dpo ✔️Compliance and advice ✔️Training and awareness Data protection, Definition of an action plan, GDPR, Training, Risk identification, GDPR, DPO, Processing register, Cybersecurity, and SSI

Type: SMB Activities: privacytech IT Services Technologies: Cybersecurity

9 0 0 4
Voatz Voatz

Voatz is a mobile elections platform powered by cutting edge technology making it safe and easy to vote from anywhere. Voatz is on a mission to make it safer and more accessible for people to participate in democracy. Backed by military grade technology, Voatz makes it possible and secure to vote from a smartphone. Voatz can be used in all kinds of voting events, including overseas citizen absentee voting, state political party conventions, town hall meetings, university student government elections, professional organizations and more. Depending on the election, Voatz leverages both high-security and low-security measures in order to protect both …

Type: Startup Activities: civictech IT Services regtech Technologies: Blockchain/Cryptocurrency

0 0 0 16
Atredis Partners Atredis Partners

Atredis Partners delivers advanced, research-driven security assessment and advisory services all over the world. With offices all around the United States and Canada, Atredis Partners was created by a number of security industry veterans who wanted to prioritize offering quality and client needs over the pressure to grow rapidly at the expense of delivery and execution. We wanted to build something better, for the long haul. Atredis Partners team members have written five books on information security topics, and have presented our research over fifty times at the BlackHat Briefings conference in Europe, Japan, and the United States, as well …

Type: Startup Activities: IT Services Technologies: Sensors Robotics IoT

0 0 0 32
Pwnie Express (now Outpost24) Pwnie Express (now Outpost24)

Detect and monitor every wireless and wired devices to mitigate the risk of rogue devices and access points Pwnie Express closes the IoT security gap exposed by the deployment of IoT in the enterprise. By continuously identifying and assessing all devices and IoT systems, our security platform prevents IoT based threats from disrupting business operations. All without the need for agents, or changes to network infrastructure. To learn more about Pwnie Express visit www.pwnieexpress.com. Network Security, Device Threat Detection, Cyber Security Research and Development, Rogue access point detection, WiFi security, Bluetooth Security, and IoT Security Assessment

Type: Startup Activities: IT Services Technologies: IoT Cybersecurity Wireless

0 0 0 1
Senrio Senrio

When hearing the buzz-word “Internet of Things,” we typically think of consumer devices: smart toasters and connected fridges. However, there is a staggering number of networked embedded devices that perform life- and mission-critical tasks that our daily lives depend on. What all these devices have in common is that they are ubiquitous and adoption is growing at a staggering rate while security is often an afterthought. As an IoT cybersecurity platform, Senrio provides visibility and analytics for networked embedded devices (aka The Internet of Things) where traditional, signature-based security technologies fail to deliver actionable insights. Senrio uses patented technology to …

Type: Startup Activities: IT Services Technologies: IoT Cybersecurity

2 1 0 3
Deceptive Bytes Deceptive Bytes

Active Endpoint Cyber Defense - Prevention by Deception Deceptive Bytes' patented malware and ransomware prevention technology is provided as part of its Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome, by creating deceptive information based on the current detected stage of compromise through the entire Endpoint Kill Chain. The preemptive solution covers the evolving nature of advanced threat landscape & sophisticated malware techniques, stopping all threats without relying on signatures, patterns or the need for constant updates. Recognized as a Gartner Cool Vendor in Security Operations and Threat Intelligence. For more information, …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 1 0 8
Private Communications Corp. Private Communications Corp.

Built to partner... Founded in 2010 by serial entrepreneur Kent Lawson, Private Communications Corporation (PCC) is a leading provider of Internet security and utilities that give consumers an optimized and secured online experience. PCC partners with a wide range of companies to enable them to make available to their customers and partners VPN encryption, video compression, ad blocking, as well as a variety of customized services. Our innovative, patented technologies can be deployed as standalone products, co-branded or private labeled products, or integrated into existing offerings. In addition, PCCs network infrastructure also serves as the backbone for numerous partner services. …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 1 0 11
Endpoint Protector by CoSoSys (now part of Netwrix) Endpoint Protector by CoSoSys (now part of Netwrix)

Easy to use, multi-OS Data Loss Prevention Endpoint Protector by CoSoSys (now part of Netwrix) is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks, protects from malicious data theft and offers seamless control of portable storage devices. Its content inspection capabilities for both data at rest and in motion range from predefined content based on dictionaries, regular expressions, and machine learning to profiles for data protection regulations such as GDPR, HIPAA, CCPA, PCI DSS, etc. network-endpoint-protection-solutions, applications-for-portable-storage-devices, data-loss-prevention, DLP, IT-Security, security, endpoints, device-control, Enterprise-Mobility-Management, Content-Aware-DLP, and eDiscovery

Type: SMB Activities: IT Services privacytech Technologies: A.I. A.I. - Machine Learning Cybersecurity

2 0 0 143
CISO COUNCIL CISO COUNCIL

A Global Platform for Security, Risk & Assurance Leaders. Connect - Collaborate -Contribute - Learn CISO COUNCIL is an initiative connecting global Cyber Security, Risk & Assurance Leaders as a community. This community allows them to network, discuss and deliberate certain matters related to business, Information and digital technology risks. CISO Council provides members with a trusted platform to share & learn their domain knowledge and experience with other members through a structured approach of Events and Thought Leadership Series, Guidance and implementation documents, Research reports & Tool-kits. CISO COUNCIL is Hosted on CISOCONNECTTM (Technology Platform connecting the Cyber-security community …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

1 0 0 2
digital.security digital.security

digital.security is now an Eviden business Founded in 2015 by a group of IT security experts with the support of the Econocom Group, digital.security (~ 230 experts) aims to offer companies and government organisations advanced audit and consulting services and a CERTTM dedicated to the IoT ecosystem. Our experts have strong expertise in providing Integration & Projects (SSO, IAM, IAG, PKI, privilege management, Logs collection, analysis and management Data compliance solutions), and also in Operational Security (outsourcing, security services center operations, SOC & SIEM management). Audit, IoT, IAM, SSO, Security, Pentesting, BugBounty, DLP, Consulting, CERT, CSIRT, RedTeam, SOC, SIEM, DFIR, …

Type: SMB Activities: IT Services Technologies: IoT Cybersecurity

0 0 0 77
Exodata Cyberdefense Exodata Cyberdefense

[Automatic translation follows] Your secure information assets, everywhere, all the time! Find all our information on our website: www.exodata.fr Information Systems Security Consulting, External & Internal Penetration Testing, Vulnerability Assessments, and Web and Software Development

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 21
Chainspace Chainspace

Sharded smart contracts. Decentralised infrastructure on a planetary scale. The Chainspace platform is powering a community of makers. Makers committed to building decentralised services that allow us all to have greater ownership and control of how we interact with the digital world. We don't care about being the first, we care about being outstanding. Blockchain, Sharding, S-BAC, Atomicity, Decentralisation, User-Centred Design, and Open Source

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency

0 0 0 2
Sucuri Security Sucuri Security

• Web Application Firewall • DDoS Protection / Intrusion Prevention • Malware Removal Status Updates: status.sucuri.net We've offered holistic website security solutions since 2008 including malware removal, malware monitoring and website protection services. Our SiteCheck website security monitor is used by thousands of website owners every month to monitor their websites for malware, blacklist status and other security issues and our CloudProxy Firewall safeguards sites and those who visit them from attacks of all kinds. Our passion is growing awareness of website security issues and stamping out web-based attacks. Join us at https://sucuri.net Website Security Scanning, Website Malware Removal, Website …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 0 0 54
Incloudio Incloudio

[Automatic translation follows] After 3 years of adventure between initial reflection, incubation and development, Incloudio ceased its activity in May 2017. A digital security technology company, Incloudio was developing an AppSec / DevSecOps consulting offering and SaaS security platforms 100% designed, operated and hosted in France: - CORE: Code review - VULNUS: Vulnerability management - CITADEL: Application protection Web application protection, Website protection, Code Review, Code Review, Vulnerability Management, Vulnerability Management, AppSec, DevSec, Digital Security, and Cloud

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
Qualys Qualys

Security and compliance for your global IT assets. Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of disruptive cloud-based security, compliance and IT solutions with more than 10,000 subscription customers worldwide, including a majority of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and automate their security and compliance solutions onto a single platform for greater agility, better business outcomes, and substantial cost savings. The Qualys Cloud Platform leverages a single agent to continuously deliver critical security intelligence while enabling enterprises to automate the full spectrum of vulnerability detection, compliance, and protection for IT systems, …

Type: Large company Activities: IT Services

0 0 0 2,599
HackMadrid %27 HackMadrid %27

[Automatic translation follows] we are a hacker community located in Madrid, Spain. Hacking culture community HackMadrid organizes a community for people who want to get started in the "hacking" culture and experienced hackers who have years of experience working on different projects for governments and companies. HackMadrid members must be at the forefront of research, experimentation and regularly attend community meetings. Being able to participate in international hacking conferences around the world (Defcon, BlackHat, HOPE, OWASP AppSec, Hacker Halted, among others). HackMadrid seeks to develop and drive the participation of the entire hacker community through regular meetings, presentations, workshops and …

Tags: H2020 Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 6
Aitivity Inc Aitivity Inc

A cybersecurity company, developing a more secure, faster and scalable blockchain solution for enterprises. A cybersecurity company, developing a more secure, faster and scalable blockchain solution for enterprises. blockchain, iot, hardware, and cybersecurity

Type: Startup Activities: IT Services Technologies: Cybersecurity Blockchain/Cryptocurrency IoT

2 2 0 1
ArcanSecurity ArcanSecurity

[Automatic translation follows] ArcanSecurity is developing an innovative password-free authentication solution to simplify a user's connection process while improving the level of security. Security, Authentication, Cryptography, Software Development, and Cloud

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 1 0 1
Indegy Indegy

Leader in Industrial Cyber Security - Protecting SCADA, ICS and OT Networks of Critical Infrastructure. Indegy, a leader in industrial cyber security, protects industrial control system (ICS) networks from cyber threats, malicious insiders and human error. The Indegy Industrial Cybersecurity Suite with Indegy CIRRUS cloud service (ICSaaS), is powered by patented technology that arms security and operations teams with full visibility, security and control of ICS activity and threats. Indegy combines policy-based monitoring, network anomaly detection and signature detection with unique device integrity checks powered by active technology threat detection. Indegy solutions are installed in manufacturing, pharmaceutical, automotive, power and …

Type: Startup Activities: IT Services Technologies: Cybersecurity IoT

1 0 0 6
Cybelius Cybelius

Industrial Cyber Solutions Cybelius is the first industrial cybersecurity solutions provider, designed to ensure the operational continuity of SCADA and ICS networks for Critical Infrastructure (energy, water, transport...), Manufacturers and all the industry. Cybelius development team, made of experienced SCADA and Cybersecurity experts, can meet all your cybersecurity issues. Our 3 major strategic fields of activity: - risk analysis & operational security - IS diagnosis - cybersecurity solutions. Cybelius's passive solutions are: CyPRES (a cyber attack detection probe) and CyFENCE (a secure interface between IT and OT). They are designed to avoid downtime, process manipulation or theft of sensitive proprietary …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
GreenLock Advisory GreenLock Advisory

Offensive security & Threat Intelligence GreenLock Advisory is an independant consulting firm created in 2015. We are offering several expertises on cyber-security: - Penetration testing - Architecture review - Threat intelligence/hunting - Automation of Security Operations - Vulnerability management cybersecurity, audit, security, threat intelligence, vulnerability management, and Automation

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 1
CrowdStrike Falcon Surface (formerly Reposify) CrowdStrike Falcon Surface (formerly Reposify)

A Gartner Emerging Vendor for EASM, Reposify’s external attack surface management (EASM) platform pinpoints unknown, exposed internet-facing assets so security teams can best secure their digital perimeter. Our intelligent internet mapping technology takes all environments of an organizations’ digital footprint into account for full-spectrum perimeter security, with no agents or deployment required. Having indexed billions of digital assets since 2016, Reposify’s proprietary internet mapping technology leverages big data to identify historical trends critical to an organizations’ security posture. Whether assets are on premise, in the cloud or housed across supply chains and subsidiaries, nothing is left unknown. All exposed assets …

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics IoT

0 0 0 14
LICENS3D LICENS3D

Barcelona based startup that is focused on resolving the challenges that exist in protecting intellectual property thoughts the entire product design and manufacturing process. Current team members are Viktor Nordstrom, founder of CL3VER, Josep Lluis de la Rosa, professor of the University of Girona and David Belgoff, entrepreneur and business developer. The company has its origins in “The Collider”, an innovative venture builder program that combines best of breed from the Spanish scientific and entrepreneurial communities in order to launch highly innovative technological startups. The program was created by Mobile World Capital, consortium backed by the Spanish Ministry of Industry, …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

2 1 0 2
miwim miwim

Type: Startup Activities: retail

1 1 0 N/A
SANS Institute SANS Institute

SANS is the most trusted resource for information security training, cyber security certifications and research. SANS is the most trusted and by far the largest source for information and cybersecurity training and certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - Internet Storm Center. Information Security Training, Digital Forensics Courses, Cyber Security Training, Security Awareness Training, Penetration Testing Courses, Application Security Courses, Security Leadership Courses, Industrial Control Systems Security Courses, cloud security courses, blue …

Type: Large company

0 0 0 1,510
SAFECode.org SAFECode.org

The place where leading technology providers come together to work on today’s most pressing software security challenges The Software Assurance Forum for Excellence in Code (SAFECode) is a non-profit organization exclusively dedicated to increasing trust in information and communications technology products and services through the advancement of effective software assurance methods. SAFECode is a global, industry-led effort to identify and promote best practices for developing and delivering more secure and reliable software, hardware and services. Security, Software Security, Hardware Security, Technology, Software Assurance, Best Practices, and Industry Collaboration

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 4
MaadixZone S.L. MaadixZone S.L.

MaadixZone S.L is a company based in Barcelona and dedicated to the development of IT solutions for companies and professionals focusing on the protection of their privacy and digital autonomy. Every time we use "free"​ services provided by large companies, we are providing them with extremely valuable information. In order to access these services, we must subscribe to certain terms of use, which oblige us to accept practices that undermine our privacy. We lose control over our data, which is caged in closed platforms controlled by companies whose business is, in most cases, based on the marketing of our personal …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity

1 1 0 1
Internet Security Auditors Internet Security Auditors

Your Security is Our Success Experts in #Cybersecurity. Leaders in #HackingEthics, #PCI standards, #ISO27001, #ISO27032 e #ISO22301, #ProtDatos, #RGPD, #Cyberintelligence and #SecuritySDLC Síguenos en: blog.isecauditors.com facebook.com/ISecAuditors twitter.com/ISecAuditors instagram.com/isecauditors Ethical Hacking (pen-test, application testing, source code review, technical reviews,...), Managed Security Services (IPS, WAFs, AntiMalware, Sec. Infrast. Mngt., forensics & expert witness...), and Compliance Implementation (27001, 22301, 27032, PCI DSS, PA DSS, LOPD, GDPR, Habéas Data)

Type: SMB Activities: IT Services privacytech Technologies: Cybersecurity

0 0 0 54
CounterTack CounterTack

"GoSecure - POWERED BY COUNTERTACK"​ is the leading provider of Predictive Endpoint Security for the enterprises. CounterTack delivers the one true Endpoint Threat Platform, (ETP) to enterprise customers globally. CounterTack provides a unique combination of threat context, organizational resiliency and broad visibility, to mitigate endpoint risk and reduce the impact of advanced attacks. Combining a robust suite of endpoint detection and analysis capabilities by leveraging a single endpoint sensor and an open, scalable multi-tenant infrastructure, CounterTack helps IR and security teams neutralize and prevent advanced threats from damaging the business. CounterTack delivers its next-generation technology to over 250 customers globally. …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 13
Attivo Networks®, a SentinelOne Company Attivo Networks®, a SentinelOne Company

The Leaders in Identity Security and Cyber Deception Technology SentinelOne, an autonomous cybersecurity platform company, has completed the acquisition of Attivo Networks. Attivo Networks was a leading identity security and lateral movement protection company. With this acquisition, SentinelOne extends Singularity XDR capabilities to identity-based threats across endpoint, cloud workloads, IoT devices, mobile, and data wherever it resides, setting the standard for XDR and accelerating enterprise zero trust adoption. Together, SentinelOne and Attivo Networks deliver comprehensive identity security as part of Singularity XDR for autonomous protection. Breach Detection System, Deception Technology , Threat Detection, Cloud Detection, Specialty Detection , Vulnerability and …

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I. A.I. - Machine Learning

0 0 0 86
Preempt, A CrowdStrike Company Preempt, A CrowdStrike Company

Preempt, A CrowdStrike Company Preempt secures all workforce identities to accelerate digital transformation. Since 80% of all breaches involve compromised credentials, Preempt unifies security visibility and control for on-premises and cloud identities. Threats are preempted and IT policy enforced in real-time using identity, behavioral, and risk analytics. Preempt protects 4M+ workforce identities across 400+ enterprises. Customers have reduced the cost required to stop advanced threats and accelerate Zero Trust and Conditional Access initiatives. Founded in 2014, Preempt is headquartered in Silicon Valley, with R&D in Israel and sales offices worldwide. IT Security, Conditional Access, Identity, Authentication, Active Directory Security, Privileged …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 10
DomainTools DomainTools

Detect. Investigate. Prevent. DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know. The world's most advanced security teams use our solutions to identify external risks, investigate threats, and proactively protect their organizations in a constantly evolving threat landscape. DomainTools constantly monitors the Internet and brings together the most comprehensive and trusted domain, website and DNS data to provide immediate context and machine-learning driven risk analytics delivered in near real-time. Visit domaintools.com to experience firsthand why DomainTools is the first stop for advanced security teams when they need to know. …

Type: SMB Activities: IT Services Technologies: Cybersecurity A.I. - Machine Learning A.I.

4 0 0 134
Secure Ideas, LLC Secure Ideas, LLC

Professionally Evil Founded in 2010, Secure Ideas is a woman-owned, small-business consulting firm. An industry leader in security consulting, training, and penetration testing, Secure Ideas is continually striving to improve the state of the art and practice of information security. Our focus is collaborating with clients to improve their security management, and reduce the risk of potential losses through a proactive approach. Having architected security solutions for large enterprises, and performed penetration testing for numerous industries from government agencies to Fortune 100 companies, we are adept at assessing client needs, comprehending complex details on new technologies, and identifying risks to …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 29
Triskele Labs Triskele Labs

When Experience Matters Triskele Labs is one of Australia’s fastest growing cybersecurity companies. We deliver services including traditional projects such as Penetration Testing, Compliance and Risk Management through to new breed services including 24*7*365 Security Operations and outsourced Cybersecurity Managers to ensure we are a complete cybersecurity solution centre. Our team of experts leverage elite threat intelligence to provide the highest level of cybersecurity professional services. We go the extra mile to demystify cybersecurity and become your trusted partner by developing customised programs that deliver on your specific needs to meet your budget. Our holistic approach allows us to achieve …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 75
Sword & Shield Enterprise Security, Inc. Sword & Shield Enterprise Security, Inc.

Follow us at our new page for cybersecurity news and updates! See the link in the banner above. Securing business for more than 20 years, Sword & Shield Enterprise Security, Inc. partners with our customers to meet the needs of their dynamic cybersecurity and compliance landscape. We work closely with companies to become tightly integrated with their enterprise operations in the areas of managed security, risk and compliance, enterprise security consulting, security incident response and forensics, and security training. Recognized nationally and headquartered in Knoxville, Tennessee, Sword & Shield has offices throughout the US. Sword & Shield services a broad …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 34
Wandera, a Jamf company Wandera, a Jamf company

The way enterprises work has changed. Data is stored beyond corporate walls, and limitless connections have given rise to remote working. The perimeter has been redefined. This evolving new environment requires a new security model that is cloud centric. Wandera provides a zero trust cloud security solution to protect the modern workplace. We enable zero-trust access to all your applications, secure your data and devices against cyber threats and help you apply policies to filter internet access and reduce risk exposure. We believe in making security simple. This is why we created a unified offering, managed through a single console …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 52
Binary Defense Binary Defense

Real people detecting real threats in real time. Founded in 2014 by the industry’s top cybersecurity experts, Binary Defense is on a mission to change the security industry for the better and help organizations defend against threats of all kinds. We believe that the best defense against cyber threats uses a human-driven, technology-assisted approach. We protect businesses of all sizes through our advanced cybersecurity solutions including Managed Detection and Response, Threat Hunting, Digital Risk Protection, Incident Response, Phishing Response, and Analysis on Demand. Binary Defense was spawned from the need for better monitoring and detection capabilities in companies. The founder …

Type: Startup Activities: IT Services Technologies: Cybersecurity

1 0 0 204
Samurai Digital Security Limited Samurai Digital Security Limited

Cyber Security, Red Team Attack Simulation & Penetration Testing | "To defeat your enemy, become your enemy" – Sun Tzu We are a cyber and Information security services provider. Founded by university academics and consultants we develop and provide system penetration, network intrusion, incident response, user awareness, and information governance solutions, strategies, and services. Our employees are a combination of Ph.D. qualified researchers, Crest Registered Testers, and BSI 27001 lead auditors. Through our combined and academic research, we have a thorough understanding of the problem domain, ideally placing us to use applied research to mitigate the real-world risks of cybercrime. …

Type: Startup Activities: IT Services privacytech Technologies: Cybersecurity

0 0 0 13
FIVE STRATEGY FIVE STRATEGY

[Automatic translation follows] We are a company specialized in services and products in the areas of Management Systems, Computer and Information Security, Business Architecture, security in school environments and digital transformation. We generate differential values ​​by helping our clients overcome their challenges through cutting-edge technology and best practices worldwide. Our experience and methodology is aimed at providing easy and comprehensive but also innovative solutions, in very attractive times and deadlines for your company and with costs that ensure a quick return on investment. We have a multidisciplinary team of professionals who have individual experience of more than 20 years in …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 5
Team Cymru Team Cymru

Mission: To Save & Improve Human Lives Since 2005, Team Cymru’s mission has been to save and improve human lives by working with public and private sector analyst teams around the world, enabling them to track and take down bad actors of all kinds. The company delivers comprehensive visibility into global cyber threat activity and is a key source of intelligence for many cyber security and threat intelligence vendors. Its Community Services division provides no-cost threat detection, DDoS mitigation and threat intelligence to network operators, hosting providers and more than 143 CSIRT teams across 86+ countries. Enterprise security teams rely …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 1 0 129
Core Security Core Security

Leading-edge cyber threat prevention and identity governance solutions to help prevent, detect, test, and monitor risk. Core Security is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra's Core Security delivers market-leading, threat-aware, vulnerability, identity and access management solutions that provide the actionable intelligence and context needed to manage security risks across the enterprise. penetration testing, security intelligence, software solutions, vulnerability research, threat expertise, threat modeling, identity governance, privileged access management, and identity and access management

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 0 0 111
Shodan Shodan

Shodan is the world's first search engine for the Internet of Things and premier provider of Internet intelligence. The Shodan platform allows organizations to monitor their network, assess 3rd-party cyber risk, gather market intelligence and understand the global Internet landscape in real-time. Our data feeds are consumed by 80+ of the Fortune 100 companies, thousands of universities and millions of users around the world. Internet of Things Security, Threat Intelligence, External Network Monitoring, Third-Party Risk, and Internet Intelligence

Type: Startup Activities: IT Services Technologies: IoT

2 0 0 13
Array Networks Array Networks

Array offers a complete range of application delivery and security solutions. Array offers a complete range of application delivery and security solutions aimed at maximizing employee productivity, ensuring always-on availability, optimizing the end-user experience, and guarding business infrastructure against attack and data leakage. Application Delivery Controllers, SSL VPN, Secure Access Gateways, Remote Desktop, NFV, Network HCI, Load balancers, SSL Intercept, and Web Application Firewall

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 0 0 229
Entersoft Security Entersoft Security

Application security simplified. Entersoft is a leading application security provider helping organizations worldwide protect their products against malicious threats and compliance concerns. We believe that application security is a journey, not just a goal, and work with business leaders as partners and advisors to safeguard their applications with an integrated, proactive and forward-thinking approach. Entersoft was launched in 2012 and has its headquarters in Bangalore, R&D centre in Hyderabad and offices in Brisbane and Hong Kong. We provide application security assessments, DevSecOps solutions and consulting services to enhance performance through proactive, collaborative and cost-effective security practices. Going beyond penetration testing, …

Type: Startup Activities: IT Services Technologies: Blockchain/Cryptocurrency Cybersecurity IoT

2 0 0 62
Cianaa Technologies Cianaa Technologies

Simplify Compliance for Companies CIANAA a vision to assist organizations to achieve cybersecurity. CIANAA is a security acronym of Six Letters C. I. A. N. A. A. building the foundation on Confidentiality, Integrity, Availability, Nonrepudiation, Authentication and Auditing. CIANAA provides assurance via professional security auditing and attestation services. The company simplifies the compliance process and provides an assessment to help organizations to attain cybersecurity objectives and goals. Today, CIANAA offers various services including PCI DSS compliance, ISO 27001 Audit and certification, HIPAA attestation, Security governance reviews, Penetration testing, GDPR and Privacy compliance. Apart from this, CIANAA is a Silver partner …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 9
LOCKCODE LOCKCODE

...empowering and protecting the C-Suite in cyber space About Lockcode Lockcode is a niche technology risk, information and cyber security consultancy, originally established in 2004 to provide certified professional security services to the HMG defence and intelligence community, now we both buy businesses and help business owners grow their businesses. About Our Founder Lockcode's female founder has worked in HMG Infosec, Information Assurance and Cyber Security for over 22 years, certified by the Authority at the highest level, and science, technology, engineering for over 40 years. Are You a Business Owner looking to sell? We are currently looking to purchase …

Type: SMB Activities: IT Services Technologies: Cybersecurity

2 1 0 1
JASK (now Sumo Logic) JASK (now Sumo Logic)

The Modern SOC Company JASK is modernizing security operations by delivering an advanced SIEM platform that provides better visibility, better automation and a better architecture. Built on cloud-native technologies, the JASK ASOC platform streamlines security analyst workflows by automating many of the repetitive tasks that restrict productivity, freeing them for higher-value roles like threat hunting and vulnerability management, while addressing the escalating talent shortage. Cyber Security, Security Analytics, Artificial Intelligence, Security Operations, SIEM, and Cloud

Type: Startup Activities: IT Services Technologies: Cybersecurity A.I.

2 1 0 12
Corero Network Security (LSE: CNS) (OTCQB: DDOSF) Corero Network Security (LSE: CNS) (OTCQB: DDOSF)

Securing your peace of mind with over a decade of expertise in flexible, automatic, hybrid and on-prem #DDoS protection. We are Corero Network Security (LSE: CNS) (OTCBQ: DDOSF), and for over a decade, our customers' needs have sculpted our SmartWall ONE DDoS protection platform. From just DDoS detection to offering DDoS protection-as-a-service, we meet you exactly where you are, providing precisely the protection you need. We believe no customer should alter their environment for a vendor; instead, we flexibly mold our robust, automatic, on-prem solutions to safeguard your business against the evolving DDoS threats. We know that organizations face continued …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 119
Mint Security Oy Mint Security Oy

Muut tekevät digitalisaatiosta kauniin ja käytettävän. Me lisäämme siihen luotettavan ja turvallisen. Mint Security Ltd offers consultation in 4 key areas important to all enterprises today: - Cyber Security and Risk Management - Information Security, Processes and Standards - Secure Software Development Lifecycle (SDLC) - SecDevOps & Architectures We also deliver a software solution for risk registers and incident management. Rent-a-CISO and Rent-a-Riskmanager services also available. Mint Security is lean, mean and highly effective. Do not hesitate to reach out if in need for cost-effective consultation, new ideas - or solutions to old problems. Mint Security provides its services in …

Type: Startup Activities: IT Services constructiontech Technologies: Cybersecurity

0 0 0 8
e92plus e92plus

We're e92plus: the leading cybersecurity VAD for the UK channel, with best in class tech and award winning services. e92plus is the leading cybersecurity VAD for the UK channel, going beyond traditional distribution to provide exceptional products and services that drive accelerated growth for our vendor and reseller partners. With an established track record of introducing disruptive and next-gen technologies and building successful channels, e92plus has grown to become an award winning, next generation VAD. Our services, delivered through in-house specialists, compliment and support our partners in their go-to-market strategy: encompassing technical, marketing, finance and operations, with our expertise in …

Type: SMB Activities: IT Services fintech martech Technologies: Cybersecurity

0 0 0 77
Alertra Alertra

Established April, 2000, Alertra has become a leading provider of Internet server monitoring and alerting services. Our U.S. headquarters is located in the historic W.E. Going (Town Center) building in downtown Stillwater, Oklahoma. Stillwater is 50 miles northeast of Oklahoma City and is the home of Oklahoma State University. Yahoo! Internet Life Magazine named Stillwater "One of America's Most Wired Cities." Our building is also home to a local Internet service provider and some other technology companies. Our monitoring servers are located around the world in Equinix, Telehouse and similar carrier-class data centers. Alertra monitors the availability, performance and security …

Type: SMB Activities: IT Services Technologies: Cybersecurity

1 0 0 2
Webroot Webroot

Webroot, an OpenText company, was the first to harness the cloud and artificial intelligence to stop zero-day threats in real time. We provide endpoint protection, network protection, and security awareness training solutions purpose built for managed service providers and small businesses. Webroot BrightCloud® Threat Intelligence Services are used by market leading companies like Cisco, F5 Networks, Citrix, Aruba, A10 Networks, and more. Leveraging the power of machine learning to protect millions of businesses and individuals, Webroot secures the connected world. In 2019, Webroot and its parent company Carbonite were acquired by OpenText, a global leader in Enterprise Information Management. Together, …

Type: SMB Activities: IT Services Technologies: A.I. A.I. - Machine Learning Cybersecurity

12 0 0 290
Guden CyberSecurity Guden CyberSecurity

Our wide range of cyber security consulting and managed services are designed to give you the security support you need, as you need it. Guden CyberSecurity is a trusted Microsoft Partner, made up of highly-accredited cyber security professionals supporting customers across the UK. Gudens provides Microsoft subject matter expertise, guidance and deployment specialisation in the areas of AI, governance, security, collaboration & training, and application development. Our cyber security consultancy and managed services empower you to achieve your security goals with expert support every step of the way. Whether you have a security project in mind, want to know the …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 145
CyberSafe CyberSafe

CyberSafe is the original commercial provider of Kerberos-based security solutions, with over 20 years'​ experience, and focused on providing innovative security solutions for SAP business applications. The TrustBroker product family utilise your existing Active Directory infrastructure to offer user authentication, encryption, and Secure Single Sign-On (SSO). The products also have the flexibility to support many SAP business applications - whether on-premise or in a cloud, and being accessed from a user’s personal workstation, shared workstations, or mobile devices. The user only needs one identity (their Active Directory account) and one credential (such as a password). When users logon to SAP …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 10
COGICEO COGICEO

Passionate consultants to achieve your cybersecurity COGICEO is an independent company, founded in 2012, whose core business is based on technical expertise in IT security and penetration tests (pentest). Our head office is based in Paris and COGICEO Ltd., our subsidiary, is based in London. We operate both in France and internationally, in the following areas: ** SECURITY AUDITS: Penetration Test; Penetration test; Configuration review; Architecture review; Physical & organizational review; Source code review ** REDTEAM: Phishing campaign; Social Engineering; Physical intrusion test; Internet exposure pentest; Internal network pentest ** FORENSIC: Incident handling; Digital forensic; Malware analysis; Network tracking ** …

Type: Startup Activities: IT Services Technologies: Cybersecurity

2 2 0 25
Security Network Munich Security Network Munich

One of Europe’s leading networks for information and cyber security Security Network Munich (Sicherheitsnetzwerk München) is an association of leading players, organisations and research institutes in the field of information and cyber security in the greater Munich area. Our goal is to foster industry cooperation through joint research and innovation projects. Our members meet regularly to discuss pressing industry challenges with government and research institutions. We also convey the industry ́s insights and concerns to a political and broader societal audience, through education and communication, spreading awareness of the importance of information security. Information Security and Cyber Security

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

1 1 0 4
Outpost24 Outpost24

The CTEM platform for smarter cybersecurity risk management Outpost24 empowers organizations to achieve cyber resilience with a complete range of continuous threat exposure management (CTEM) solutions. Our cloud platform unifies asset discovery and management, automates security testing, and quantifies risk in business context. Executives and security teams around the world trust Outpost24 to identify the attack surface and prioritize the most important security issues to accelerate risk reduction. Founded in 2001, Outpost24 is headquartered in Sweden, with additional offices in the US, the UK, the Netherlands, Belgium, Denmark, France, and Spain. To learn more about our products and services go …

Type: SMB Activities: IT Services Technologies: Cybersecurity

0 0 0 237
Cyberwings Cyberwings

[Automatic translation follows] Hacking and Strategic Information Management Cyberwings is a French company of experts in ethical hacking and strategic information management since 2001. Follow you on Twitter: @cyberwings_pub IT Security, Ethical Hacking, and Security Audits

Type: Startup Activities: deeptech Technologies: Cybersecurity

3 1 0 9
NIS. NIS.

[Automatic translation follows] Find all the latest cybersecurity news on the Itancia group page. NIS is recognized as a true Value Added Distributor (VAD). The company offers its partners (resellers, integrators and IT services companies) tailored solutions in the areas of health, loyalty, access control, digital security and M2M and IoT. NIS is also in charge of IoT technological and commercial monitoring, as well as relations with VSEs/SMEs and start-ups in this area. We aim to put our expertise at the service of our integrator and reseller partners in order to offer security and M2M solutions with high added value …

Type: SMB Activities: IT Services Technologies: Cybersecurity IoT NFC

0 0 0 5
CyberFish CyberFish

Making Teams Crisis - Ready Through the Resilience Dojo Incident Exercising and Learning Platform We help businesses and government teams prepare to better handle business disruptions, by improving effectiveness and resilience of crisis management teams. crisis team resilience, incident exercisising, decision-making for crisis response, crisis communications, crisis team effectiveness, cyber resilience, cyberpsychology, and team resilience

Type: Startup Activities: IT Services Technologies: SaaS

3 2 0 8
Bricata Bricata

Advanced network detection and response for the enterprise. Bricata, an OpenText company, is leading the next generation of advanced network detection and response for the enterprise. By fusing real-time visibility, advanced detection, analysis, forensics, incident response and threat hunting into a single platform, Bricata provides organizations with end-to-end visibility and full context for direct answers and powerful insight to take immediate action.

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 10
Smart Cybersecurity Network Smart Cybersecurity Network

[Automatic translation follows] SERENE-RISC is... an integrated cybersecurity network that connects those who generate knowledge with those who put it into practice. SERENE-RISC supports collaboration between universities, industry, government and non-profit organizations across many sectors and disciplines. The network develops tools that facilitate the uptake and application of world-class research results. It's also... a network including more than 40 academics across 10 disciplines at 24 post-secondary institutions around Canada and more than 24 public and private sector members, and 6 NPO. Our key values: →Inclusive →Impartial →Empowering →Evidence-based ----- SERENE-RISC is... an integrated cybersecurity network that connects those who generate …

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

0 0 0 1
Cuckoo Sandbox Cuckoo Sandbox

Cuckoo Sandbox is the leading open source automated malware analysis system. We specialize in sandboxing and making these resources available to anyone in need of such - being it malware researches, CERTs & SOCs, banks, or governments.

Type: NGO, Think-tanks, Ed, & Culture Activities: IT Services

1 1 0 1
Hacker House Hacker House

All computers are Broken. Let us show you how to secure them. Hacker House is the global portal for skills training, security services, cyber arms, and defense products. We train individuals and organizations to be self-sufficient in all things cyber security. Hacker House is a team of computer hackers seeking innovation within the information security industry. Hacker House provides offensive security solutions so you can understand the real-world risks that impact on your business. Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied. Hacker House's …

Type: Startup Activities: edtech Technologies: Cybersecurity

0 0 0 10
Intezer Intezer

Leave the SOC grunt work to technology. Keep noise, false positives, and alerts from overwhelming your security team. Leave the SOC grunt work to Intezer. Automatically triage alerts 24/7, respond faster, and cut out noise & false positives. Try free: analyze.intezer.com Malware Analysis, Threat Detection, Incident Response, Cybersecurity, Malware Classification, Threat Hunting, DFIR, Memory Forensics, Digital Forensics, Reverse Engineering, Security Operations, Memory Analysis, Attribution, Threat Research, Threat Intelligence, YARA, Disk Image Forensics, File Scanning, URL Scanning, Sandboxing, Attribution, Memory Dump Scanning, Alert Triage, and SOC Automation

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 43
Cylera Cylera

Pioneering the future of Healthcare IoT Cybersecurity & Intelligence Cylera is pioneering IoT Security and Intelligence to protect what matters most - people, safety, privacy, and business continuity. We deliver richer data, stronger security and faster reaction times in order to safeguard what matters most: people, data and privacy. Unlike others who use “first-generation” approaches that fall short, Cylera’s Platform is next-generation, patented technology, with a unique digital twin method that has zero disruption and can assess true risk within a healthcare and clinical workflow context. Cylera’s insights and recommendations simplify response playbooks when incidents arise, decrease time to remediate, …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity IoT

3 1 0 40
Anomalix Anomalix

Next Generation Identity and Security Management Anomalix is a Gartner-recognized solutions and services company for Identity and Access Management. Anomalix provides Identity driven zero-trust security solutions that protect consumers, businesses and governments. Identity Management, Security Analytics, Information Security, IAG, Cloud Security, Third Party Risk Management, Audit & Compliance, Business Agility, and Identity Analytics

Type: Startup Activities: IT Services regtech Technologies: Cybersecurity

0 0 0 8
Altitude Networks Altitude Networks

Altitude Networks protects enterprise data in Office 365 and Google Workspace against accidental over sharing, malicious data theft, and modern cloud backdoors access.

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 3
Upfort Upfort

Upfort unifies award-winning security and robust cyber insurance to deliver comprehensive cyber risk solutions Upfort is a leading platform for cyber security and insurance that provides holistic protection from evolving cyber threats. Founded in 2017 to expand global access to cyber resilience, Upfort makes cyber risk easy to manage and simple to insure. Upfort delivers turnkey security proven to proactively mitigate risk and comprehensive cyber insurance from leading insurers. With proprietary data and intelligent automation, Upfort’s AI anticipates risk and streamlines mitigation for hassle-free underwriting. Insurers, brokers, and risk advisors partner with Upfort to offer clients resilience and peace of …

Type: Startup Activities: insurtech Technologies: Cybersecurity

1 0 0 35
Quantum Blocks Inc Quantum Blocks Inc

Quantum computing algorithm development for (Blockchain and other) cryptography and cryptoanalysis projects. Fusion of Quantum Computing and Blockchain Tech: "we let Schrodinger's cat play with blocks"​. Among other things, we are working on quNIX - to provide a workable Quantum Computer OS for algorithms and applications. Focus Areas: Algorithms - Cryptography and Crypto Analysis Applications - Military-Grade Blockchain Solutions & Enhancements Quantum Blocks Inc is a RLC, Delaware, Company Quantum Computing, Blockchain, Cryptography, Crypto Analysis, Digital Ledgers, quNIX, and MIL-TEC

Type: Startup Activities: IT Services deeptech Technologies: Blockchain/Cryptocurrency

0 0 0 3
Data Theorem, Inc. Data Theorem, Inc.

Prevent AppSec Data Breaches Data Theorem prevents AppSec data breaches. We provide SAST, DAST, & RASP for API Security, Web Security, Mobile Security, and Cloud Security. Our products provide Inventory (Discovery), Security Testing (SAST/DAST), and Active Protection (RASP) for APIs (RESTful, GraphQL, gRPC, and SOAP), mobile apps (iOS, Android, React Native, Flutter), Web Apps (Web 2.0 & Single Page Apps), & Cloud Apps + CSPM (Serverless Lambda, Google Cloud Functions, Azure Functions). Data Theorem is headquartered in Palo Alto, CA., with offices in New York, Chicago, Boston, Paris, and London. For more information visit https://www.datatheorem.com. Mobile Security, Data Privacy, Android, …

Type: Startup Activities: privacytech IT Services Technologies: Cybersecurity

1 1 0 94
Fyde Fyde

Fyde is now Barracuda CloudGen Access. Secure zero trust access to all your apps and data from any device and location. Fyde is now Barracuda CloudGen Access. Secure zero trust access to all your apps and data from any device and location. Security starts with access. The CloudGen Access zero trust model establishes unparalleled access control across users and devices without the performance pitfalls of a traditional VPN. It provides remote, conditional, and contextual access to resources and reduces over-privileged access and associated third-party risks. With CloudGen Access, employees and partners can access corporate apps and cloud workloads without creating …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 4
Threatcare Threatcare

The leader in proactive attack simulations. Recently acquired by ReliaQuest. Threatcare is the leader in proactive attack simulations, helping companies measure the effectiveness of their cybersecurity programs through their software. Their real-time insights and actionable recommendations enable companies to secure more faster, while having greater confidence in their current security controls. ReliaQuest’s recent acquisition of Threatcare will enhance the power of the ReliaQuest GreyMatter platform by enabling enterprise customers to vastly increase the quality and efficacy of their detection and response capabilities. Breach and Attack Simulation, Penetration Testing, Incident Response, Vulnerability Scans, BAS Technology, Cybersecurity, and Information Security

Type: Startup Activities: IT Services Technologies: Cybersecurity

4 1 0 1
KYND KYND

Cyber risk management for every business. Simple to understand, quick to monitor and easy to prevent. Organisations of all sizes have or will be impacted by cyber risks and whilst this threat is well publicised it is not always well understood. KYND is about to change that. KYND's innovative, industry first and proprietary cyber risk management technology enables all businesses to easily monitor and understand the cyber risks they face, take action when necessary and be alerted to future risks as they arise. KYND's cyber risk products provides businesses of all sizes a simple, easy to use and cost-effective solution …

Type: Startup Activities: IT Services Technologies: Cybersecurity

0 0 0 45
CyberGRX CyberGRX

Sleep soundly with our TPRM platform. Pinpoint, measure, and prioritize third-party cyber risks for effective planning. CyberGRX = TPRM for the speed of your business. When assessments take weeks or months to complete, it impairs an InfoSec team's ability to speak into a vendor decision. With CyberGRX's library of 14,000 attested assessments, 250,000 company profiles, predictive risk insights and threat intelligence, you can make initial vendor decisions immediately. And, if deeper evaluation is needed, CyberGRX plus ProcessUnity's automated workflows streamline the process so you'll never chase assessments again. The risk of inaction is costly. The ROI of CyberGRX and ProcessUnity …

Type: Startup Activities: IT Services Technologies: Cybersecurity Data Analytics

0 0 0 61
Simility, A PayPal Service Simility, A PayPal Service

Adaptive Decisioning Platform built with a data-first approach to deliver continuous risk assurance. Simility offers real-time risk and fraud decisioning solutions to protect global businesses. Simility’s offerings are underpinned by the Adaptive Decisioning Platform built with a data first approach to deliver continuous risk assurance. By combining artificial intelligence (AI) and big data analytics Simility helps businesses orchestrate complex decisions to reduce friction, improve trust, and solve complex fraud problems. Built by industry veterans, Similty is trusted by some of the world’s leading consumer brands across Financial Services, Payment Processors and Commerce merchants. To learn more, visit www.Simility.com. Fraud Detection, …

Type: Startup Activities: IT Services Technologies: A.I. - Machine Learning Data Analytics A.I.

0 0 0 23