Logo | Name | Σ | Employees | ||
---|---|---|---|---|---|
![]() | ![]() We don’t just do cyber security. We navigate you through cyber risk. Our approach to cyber security is more than just penetration testing or awareness-raising. We are experts in combining the technical, human and physical aspects of security best practice. We help some of the largest and most complicated organisations build resilience and sustainability in their risk management, not just their technical response. So how do we do it? First and foremost, we have front-line experience across all aspects of cyber security. We then support this with powerful tools to help analyse risks, identify weaknesses, strengthen defences and set … Type: | 8 | 0 | 4 | 4 |
![]() | ![]() Buying Intelligence for Enterprise Technology: Reviews, Discussions and Advice from Real Users PeerSpot’s Buying Intelligence Platform is where tech pros go to get practical, reliable information on enterprise tech, so they can be sure what they buy is exactly what they need. Powered by the world’s largest community of enterprise tech buyers, PeerSpot provides in-depth reviews, online forums, direct Q&A support and more, giving professionals the confidence to make the right decision and the happiness of reality meeting expectations. Software, Hardware, IT, Information Technology, Technology Product Reviews, B2B, Marketing, Cybersecurity, Cyber Security, DevOps, and B2B Product Reviews Type: | 17 | 0 | 17 | 112 |
![]() | ![]() Deterrence. Prevention. Reaction. By creating and implementing comprehensive solutions that targets each client’s needs, Global Operations Security Services Inc provides unparalleled physical and technological security threat mitigation solutions to governmental, organizational, educational, corporate, and individual entities. In 2009, Global Operations Security Services Inc’s founders - former leading members of the Israeli Security Agency (Shin Bet), Israeli Ministry of Defense and the Israeli Defense Forces, and later joined by top U.S. military and security operatives - applied their unique operational knowledge and expertise to create innovative solutions to address the constantly evolving security needs of our clients. To date, we have … Type: | 0 | 0 | 0 | 70 |
![]() | ![]() Securing your world through quantum innovation QuintessenceLabs is the leader in quantum-enhanced cybersecurity. We provide enterprises with the strongest data protection today, preparing them for a quantum-safe tomorrow. Products from QuintessenceLabs combine world class security expertise with advanced science to create high-value technology, including a quantum-based random number generator, a high-performance, interoperable key and policy manager and a broad range of strong encryption solutions. They support data in use, in motion or at rest, and for systems on-premise, in the cloud or hybrid infrastructure. For more information, visit www.quintessencelabs.com. Quantum cyber-security, Data security, High speed, true random number generation, Key … Type: | 6 | 0 | 6 | 48 |
![]() | ![]() The leader in OT and critical infrastructure security We protect the world’s critical infrastructure from cyber threats. Our platform uniquely combines network and endpoint visibility, threat detection, and AI-powered analysis for faster, more effective incident response. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com Cybersecurity, OT Security, IoT Security, OT Cybersecurity, SaaS-Powered Security, Cloud-based Security, Digital Transformation, Cyber Threats, OT Network Visibility, Scalable IoT Security, Threat Detection, Anomaly Detection, IoT Network Security, Scalable Security Platform, IoT Device Security, OT Asset Security, Vulnerability Assessment, OT Network Monitoring, SCADA Security, and ICS Security Type: | 16 | 2 | 12 | 282 |
![]() | bnetwork we provide accommodation | you deliver experiences bnetwork is a SaaS accommodation management company based in Barcelona, Cannes, London & Paris. our bespoke & proprietary software, combined with our customer centric approach & philosophy have helped position us as the leading accommodation management company for b2b events in EMEA. we have worked for prestigious & high-volume events, from institutional events (French Presidency of the European Union, Africa - France 2021 Summit, G7 Biarritz 2019, ...), to B2B professional events (Mobile World Congress, Equip Auto, Jec World, International Cybersecurity Forum) or sporting events & festivals (Roland Garros). bnetwork provides accommodation solutions … Type: | 1 | 0 | 0 | 106 |
![]() | SimonsVoss Technologies GmbH | Allegion The pioneer and expert in keyless security - Made in Germany 𝗦𝗲𝗰𝘂𝗿𝗲, 𝘁𝗿𝗮𝗻𝘀𝗽𝗮𝗿𝗲𝗻𝘁 𝗮𝗻𝗱 𝗰𝗼𝗻𝘃𝗲𝗻𝗶𝗲𝗻𝘁 𝘄𝗶𝘁𝗵 𝗦𝗶𝗺𝗼𝗻𝘀𝗩𝗼𝘀𝘀 𝗹𝗼𝗰𝗸𝗶𝗻𝗴 𝘀𝘆𝘀𝘁𝗲𝗺𝘀 Rapid digitisation, growing security requirements and increasingly more flexible working time models: mechanical locking systems are no longer able to keep pace with developments in today's world. Modern, secure, flexible locking is digital in its operation, preferably using a SimonsVoss locking system. Digital locking systems can easily replace mechanical locking devices anywhere and no need for cabling. 𝗠𝗼𝗿𝗲 𝗰𝗼𝗻𝘁𝗿𝗼𝗹 𝗮𝗻𝗱 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 At SimonsVoss, security implies much more than being able to deactivate lost keys instantly. It also means that our electronic … Type: | 5 | 0 | 6 | 203 |
![]() | Olympus IMS Test. Measure. Image. Analyze. Olympus delivers the world’s leading-edge nondestructive inspection and measurement solutions by developing tools and technologies that enhance safety, security, quality, and productivity. Our most popular offerings include ultrasound, phased array, microscopy, optical metrology, remote visual inspection, eddy current and XRF and XRD analyzers. We’re looking to share solutions, news, and insights about test, analytical, measurement, and imaging instruments with other industry professionals from the worlds of aerospace, power generation, petrochemical, manufacturing, automotive, consumer products, and many more. Connect with us today. Remote visual inspection, Thickness Measurement, Ultrasound Phased Array, Eddy Current, XRF & XRD Analyzers, Microscopy, … Type: | 1 | 0 | 1 | 472 |
![]() | OPNS True Solutions for Real Challenges OPNS, located in Brussels near the Midi-station, is a dynamic, independent IT company with almost 30 years of activity. We specialize in "niche" areas that allow us to provide targeted solutions and services to clients of all sizes, from SMEs to multinationals, from different sectors like banks, insurances, retail, industries, health care and public institutions. Our specializations are: • Implementation of Identity and Access Management (IAM) solutions, single sign-on (SSO), security monitoring of IT applications, auditing and consulting in areas related to IT security • The development of tailor-made applications in the context of IT … Type: | 1 | 1 | 0 | 29 |
![]() | VGD [Automatic translation follows] Let's talk business! Let's talk! VGD has been the knowledge partner of Flemish entrepreneurs for 40 years. With fourteen offices across Flanders and more than 350 advisors, we support entrepreneurs with every issue they have. Whether it concerns questions about audit, tax and accountancy, or more specific questions about subsidies, the environment, corporate finance, asset planning or other questions, our advisors are ready. Our goal: to have a solution ready before the question is asked! We do this by proactively deploying our entire knowledge network. This gives entrepreneurs more time to focus on what is important, entrepreneurship. … Type: | 1 | 1 | 0 | 553 |
![]() | NEXT avocats Digital & Creative Business Law - www.next-law.fr NEXT is an independent French law firm specializing in all areas of digital and creative law. NEXT avocats has been founded by Etienne Papin and Stéphanie Foulgoc. The legal solutions around digital and creative law are based on the same sources: contract law, intellectual property law and liability law. NEXT's lawyers have significant and recognized expertise in these areas, both in consulting and litigation. The firm is organized around four practice areas: IT & NETWORKS, IP & ENTERTAINMENT, DATA & PRIVACY, DIGITAL ASSETS & TRANSFORMATION. NEXT's lawyers work for a wide range of … Type: | 7 | 0 | 7 | 4 |
![]() | Guiltek [Automatic translation follows] The right IT partner for your VSE-SME. IT company working in the areas of consulting, web development, security, sales of professional equipment and its installation. web, fleet management, IT maintenance, prestashop, wordpress, and website Type: | 3 | 0 | 2 | 9 |
![]() | ECIA [Automatic translation follows] Our Engineering at the Heart of Your Performance... Engineering company, ECIA, a brand of EQUANS, is a player in the nuclear sector in the field of risk management. Specialist in utilities, in the low and high current electricity trades, mechanical engineering & calculations, climate engineering, control-command and maintenance and dismantling engineering, ECIA intervenes throughout the life cycle of installations (design, construction, operation, deconstruction). Our studies, advice and assistance support industrial projects, mastering regulatory and technical requirements. ECIA, our engineering at the heart of your performance! Positions are available within our agencies: Don't wait any longer, choose a … Type: | 3 | 1 | 2 | 236 |
![]() | ORSYS [Automatic translation follows] Train with the best experts! ORSYS is the leading training institute for new digital technologies and one of the most important players in the fields of management, personal development and professional skills. Its offering represents more than 2,000 training courses, seminars and practical courses, professional courses and certification cycles, approved by national or international organizations. Legal notices: https://www.orsys.com/nouvelleslegales To follow ORSYS Training: - Facebook: http://www.facebook.com/ORSYS.formation - Instagram: https://www.instagram.com/orsysformation - Twitter: http://twitter.com/ORSYS - Pinterest: https://www.pinterest.fr/orsysformation - Our expert blog “Les Carnets d’ORSYS”: http://blogs.orsys.fr/les-carnets/ training, management, IT, HR management, project management, personal development, marketing, sales, information systems, productivity, human … Type: | 35 | 5 | 32 | 589 |
![]() | REXOR Innovative functions on flexible substrates Rexor has specialised in converting plastic films such as polyester and bi-oriented polypropylene for nearly 60 years, .. Rexor is known across the world , and exports more than half of its output. The company’s expertise in the fields of coating/lamination, metallising, cutting and formulation means that it can provide specific and innovative functions including vacuum insulation laminates, Caress varnishes, oxygen barriers... \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ OUR VISION : To develop, transform and commercialize, in partnership, flexible substrate, that brings you innovative solutions Specializing in the following markets : - Food packaging - Luxury - Security - Buildings … Type: | 0 | 0 | 0 | 56 |
![]() | axenet [Automatic translation follows] Since 2004, AxeNet has been creating fluid, efficient websites, high-performance e-commerce, and reliable and secure extranets. Our relationships with our customers are close, even in a virtual universe we are humanly available. Is this what you expect from a web agency? If the answer is "yes", then let's work together! Custom development, Graphic design, SEO on Google, Security audit (sites and servers), SEO audit, Site hosting, Server outsourcing, and E-commerce design Type: | 2 | 0 | 0 | 3 |
![]() | Itancia Eco-friendly group specialised in business communication, collaboration, networks and security solutions. Eco-responsible group specialising in business communication, collaboration, network and security solutions, Itancia has been supporting its partner resellers, integrators and operators in adopting responsible practices through bespoke solutions and services that strike the perfect balance between technology, economy and ecology. The Itancia group’s business is based on 3 complementary pillars, which in combination allow the group to offer unique strengths on its markets: - Itancia Technology: Itancia Technology, the group’s distribution business, selects and offers innovative technology solutions from over 70 market-leading brands to meet all needs - Itancia … Type: | 11 | 3 | 9 | 397 |
![]() | ERCOM Société du groupe Thales, Ercom sécurise vos communications, données et terminaux. Ercom, a Thales company, is a reference company with 30 years of combined expertise in two key areas: cybersecurity and communication networks. Being a reference company means providing clients with cutting edge solutions for their industry, combining certified security and simplicity in order to accelerate end-user adoption over a large range of devices. Ercom presents : - Cryptosmart, the only “Restricted” French, EU & NATO certified solution, jointly developed with Samsung, to secure devices and end-to-end mobile communications (voice, SMS and data) on consumer smartphones and tablets. - Cryptobox, … Type: | 2 | 0 | 2 | 152 |
![]() | Montsegur Finance [Automatic translation follows] INVEST. CREATE. BUILD Montségur Finance is an independent Portfolio Management Company, approved by the Financial Markets Authority and authorized to operate in all transferable securities. Drawing on the experience of its managers and concerned with the preservation of the assets entrusted to it, Montségur Finance offers individual clients personalized management favoring absolute performance, with a true heritage approach. Products adapted to direct and collective management, monitoring and quality services allow Montségur Finance to go well beyond a simple management mandate. Type: | 8 | 0 | 6 | 29 |
![]() | SILLINGER [Automatic translation follows] The specialist in foldable and semi-rigid inflatable boats for military and professional use. Since 1962, the Sillinger shipyard, named after its founder Tibor Sillinger, has been the specialist in folding and semi-rigid inflatable boats for military and professional use. From the outset, Sillinger decided to develop boats dedicated to international civil and military professionals, known to be very demanding. Boats whose performance, reliability and unsinkability will be fundamental. The decision to use hypalon-neoprene fabric is the most telling expression of this. Over the years, in a quest for excellence, the shark brand has constantly innovated and implemented … Type: | 2 | 0 | 1 | 29 |
![]() | Feeder [Automatic translation follows] Provider of cutting-edge IT solutions to reseller partners and integrators Since 1984, Feeder has been more than an IT distributor. By offering personalized and quality services, Feeder makes its experience available to manufacturers, publishers, specifiers and resellers who place quality and reliability at the center of their product selection process. Graphics, Medical, Industry, Aeronautics, Maritime, Video Surveillance... Whatever the market, our main objective? Support you from before to after sales on each sale. Our positioning pushes us to guarantee speed and quality in each of our services. We offer our partners the assurance of a human relationship … Type: | 1 | 0 | 1 | 87 |
![]() | Proximit, écosystème Numérique [Automatic translation follows] 3 areas of activity (IT Services / Digital / Tourism) supported by 40 employees who listen to your projects. Digital ecosystem, IT services company, Communication agency, Tourism, Outsourcing, Digital ecosystem, IT services company, Communication agency, Tourism, Outsourcing services, Digital ecosystem, IT services company, Communication agency, Tourism, Outsourcing management, Digital ecosystem, IT services company, Communication agency, Tourism, Outsourcing, Mobile apps, interface design, print & web design, development, websites, e-tourism, outsourcing, GDPR, hosting, IT security, and UX Type: | 3 | 0 | 3 | 37 |
![]() | ALTHING [Automatic translation follows] Security advice for businesses and communities Althing advises its clients in the areas of risk management and the collection of strategic information. Our teams, trained in the best French establishments, have built a renewed approach to security consulting. They work with a concern for ethics and efficiency, involving their clients in all strategic stages of their mission, from diagnosis to recommendations. Our consultants, rigorous and dynamic, treat each file with the same energy and the same conviction. Type: | 4 | 0 | 4 | 14 |
![]() | XEFI Saint-Quentin-en-Yvelines 78 [Automatic translation follows] XEFI SQY The IT, Cloud & Telecoms for VSEs and SMEs since 1986. Call us on 01 30 49 31 10 Since 1986, XEFI Saint Quentin en Yvelines has been the IT & preferred telecom of companies, anything but a coincidence. XEFI is a company specializing in IT, Cloud and Telecoms solutions for businesses. Our service offering covers all needs in terms of IT maintenance and outsourcing, but also installation and deployment. XEFI is also the approved partner of the best manufacturers and software publishers such as HP, HPE, Microsoft, Sophos, EBP. Our scalable rental offer allows … Type: | 12 | 0 | 11 | 10 |
![]() | Swiss Life Banque Privée [Automatic translation follows] And your dreams take on another dimension With Swiss tradition and French heritage, our approach consists of managing your assets and your assets in accordance with your objectives, prioritizing risk management, to reconcile prudence and performance, serenity and profitability. Built over time, your assets are above all the result of a story and the reflection of your personal investment. By placing your trust in us, we will share this story with you and you will benefit from all the know-how of our financial institution, focused on a single business: private banking. The diversity of our centers of … Type: | 2 | 0 | 2 | 260 |
![]() | Benett Portage - Portage salarial [Automatic translation follows] The Partner of the Independents Benett Portage is a Strasbourg-based umbrella company specializing in the fields of consulting, training and IT. It offers consultants, engineers, trainers and experts the opportunity to develop their activity by: - SIMPLIFYING THEIR ACTIVITY - SECURING THEIR OPERATION - MANAGE THEIR PROJECT We offer “autonomous” professionals or “project leaders” the opportunity to carry out their missions by integrating our company and becoming “supported” employees. Our consultants will be able to benefit from a network of consultants, a business space, thematic meetings on business opportunities, a management platform, etc. Finally, we are present … Type: | 1 | 1 | 0 | 15 |
![]() | SILICOM SAS [Automatic translation follows] Being the cybersecurity incubator for tomorrow's talents Created in 1983, Silicom (Pr0ph3cy group) is one of the oldest CyberSecurity consulting firms. 💻 Aware of future issues in the field of cybersecurity, Silicom was one of the first to guarantee cyber development and specialization to each of its consultants. Silicom's job is and has always been to support its consultants in their professional development journey. 📈 With more than 300 employees in France (5 regions) and internationally specialized in IT Security professions, Silicom aims to become the leading talent incubator in France, Europe and Canada. 🚀 Silicom is … Type: | 11 | 3 | 9 | 245 |
![]() | Endrix [Automatic translation follows] Expert strategic partners of the manager: Accounting Expertise, Audit, Law, Consulting, Headhunting… The SFC Group is: - A team of 200 employees supporting more than 5,000 customers on a daily basis - A policy focused on quality and customer satisfaction with our ISO 9001 certification - Mastery of technologies guaranteeing you the use of efficient and specialized solutions - Experts at the service of your performance, at all stages of the life of your business SFC Group 18 avenue Félix Faure 69007 Lyon Such. 04 78 17 17 17 www.groupesfc.fr Accounting Expertise, Audit, Consulting, Social, Legal, International, … Type: | 13 | 2 | 12 | 480 |
![]() | Links - portage salarial, réseau de consultants experts, outsourcing [Automatic translation follows] Become 100% employee & 100% independent, in complete security, with the pioneer of wage portage. Links* is a salary umbrella company - network of expert consultants - HR solutions. Created in 1998 by Antoine Catta, former lawyer and advisor for 30 years, Links has always aimed to offer a legal framework adapted to the provision of intellectual and technical services. Over the years, Links' know-how has developed and the company decided to join forces with the ACTUAL Group, one of the major employment specialists in France, to offer a range of reinforced and complementary HR solutions. This … Type: | 1 | 0 | 1 | 132 |
![]() | Trialog Enabling innovation for industries TRIALOG is a consulting company which provides expertise for innovative technologies in embedded and industrial systems. We help our clients to manage increasingly complex software and systems. In conjunction with the clients' needs, TRIALOG provides original solutions in engineering technology. Our domains of activity are: - Energy: Smart Metering, Smart Grids - Transports: E-Mobility, Intelligent Transport System (ITS) - Health and Social : Active Ageing Living (AAL) With also transversal expertises : - Internet of Things : PLC, RF Mesh, etc. - Cyber-security - Privacy by design IoT, Security and privacy, Architecture, Energy, Transport, E-mobility, and … Type: | 15 | 1 | 14 | 44 |
![]() | GEYVO ILE DE FRANCE Groupement d'Employeurs [Automatic translation follows] Provision of qualified personnel to member companies Recruitment Shared and/or full-time part-time The GEYVO ILE DE FRANCE Employers’ Group A solution to access the right skills in the right proportion of time, at an affordable cost - it makes available to companies and other member entities - qualified personnel recruited and employed by him. -It also carries out direct recruitment for its members In general: - the intervention is regular part-time per company / timeshare - the functions concerned are rather support and/or experts, from the manager to the M/F employee: the professions found in an Administration … Type: | 23 | 0 | 23 | 23 |
![]() | Laboratoire WatchFrog 1st privately owned laboratory in Europe 100 % dédicated to endocrine disruptor assessment Since 14 years Laboratoire Watchfrog helps you answering to your issues link with endocrine disruptor topics. Our mission is bringing you data which contribute to evaluate security of your compounds, products, packaging and water samples. In addition to our tests we help you buiding a tailormade evaluation stategy according to your needs and taking into account your specific context to provide you with the most adapted methodology and protocols. Perturbateur endocrinien, Endocrine disruptor, Micropolluants, Perturbateur oestrogénique, Test perturbateur endocrinien, Biosurveillance, Endocrine test, Test tyroïdien, Thyroid test, Test … Type: | 12 | 3 | 9 | 16 |
![]() | EVITECH Expert in Video Content Analytics for Security and Safety needs: perimeter protection, smart & safe city. EVITECH is specialised in video analytics for global security : sensitive sites protection, public spaces and transports, fire start detection, oil & gas process monitoring (leaks detection, fire starts). EVITECH owns a successful set of prestigious references, among which government premises, big defense security system providers, sensitive energy sites or big construction actors. For twelves years now, EVITECH develops and commercializes one of the most performant and robust video analytics solutions for sensitive sites protection and crowd management. Created out of a MinDef-funded project, … Type: | 1 | 0 | 1 | 20 |
![]() | SYLOÉ [Automatic translation follows] Devops & Cloud Linux outsourcing Syloé is an IT services company that provides secure solutions adapted to the needs of SMEs and public organizations. Specialist in information systems engineering, we cover all fields of SSLL: * installation, administration and security of GNU/Linux systems; * adaptation of software under GNU/Linux environment; * server hosting with quality of service and high availability; * system architecture and hosting advice, security audit, application load testing, and training. * migration of messaging and collaborative work solutions based on zimbra or open-xchange application load testing, Zimbra, Supervision, Monitoring, Audit of production servers, Linux … Type: | 3 | 1 | 2 | 9 |
![]() | SOGOREX - ORGECO - CAPA [Automatic translation follows] Accountants and auditors at your service! The accounting missions of social and tax declarations are complex and an entrepreneur, whether an Artisan, trader, real estate company (SCI), liberal profession (lawyer, doctor, dentist, artist, SME, SMI, industry... needs advice and accountants to carry them out. The Orgeco – Sogorex - Capa firms, based in Val d'Oise (95), near Cergy Pontoise, and in Epinay-sur-Seine in 93, are firms of chartered accountants and auditors who address to you as a company to provide you with financial and tax advice, carry out your audits and annual reports or even to support … Type: | 0 | 0 | 0 | 9 |
![]() | ![]() CapLinked virtual data rooms enable you to securely share files, conduct due diligence and close deals faster. CapLinked’s fintech platform is used to securely share information between firms and manage multi-party interactions during complex transactions and projects. Dubbed the “go-to place for setting up and closing deals” by the Wall Street Journal, the CapLinked platform includes three distinct product lines that serve the needs of its diverse client base: 1) an enterprise application for larger firms with complex needs and large quantities of data; 2) self-serve accounts for smaller clients who need to safeguard limited amounts of information; and 3) … Type: | 0 | 0 | 0 | 14 |
![]() | ![]() Security Analytics at the Speed of AI Anomali is the leader in modernizing security operations with the power of analytics, intelligence, automation, and AI to deliver breakthrough levels of visibility, threat detection and response, and cyber exposure management. Anomali helps customers and partners transform their SOCs by elevating security efficacy and reducing their costs with automated processes at the heart of everything. Founded in 2013, Anomali serves global B2B enterprise businesses, large public sector organizations, ISACs, ISAOs, service providers, and Global 1000 customers to help safeguard the world’s critical infrastructure, companies, and people. Cyber Threat Intelligence, Cyber Security, Open Source … Type: | 10 | 1 | 9 | 262 |
![]() | ![]() Optimize Investment. Minimize Cyber Risk. Axio is the leader in SaaS-based cyber management software, which empowers security leaders to build and optimize security programs and quantify risk in financial terms. Axio360 is the only cyber risk management platform to align security leaders, business leaders, and Boards of Directors around a single source of truth about their most critical corporate risks. Since 2016, Axio has been a trusted partner to many of the world’s leading critical infrastructure, energy, manufacturing, and financial services companies, helping drive better visibility and decision-making about cybersecurity priorities and investments. For more information visit axio.com Risk Management, … Type: | 2 | 0 | 1 | 89 |
![]() | ![]() Helping Businesses Achieve Compliance and Mitigate Risks through Comprehensive Risk and Compliance Management At Noftek, we make integrated CyberRisk management accessible for organizations of all sizes. Our mission is to provide the clarity and control businesses need to navigate cybersecurity and compliance complexities confidently. Leveraging our faith-based values of integrity, trust, and service, we take a consultative approach focused on your business objectives. Our experienced team assesses your environment, quantifies risks, and implements tailored solutions - so you can focus on your core mission. The AI-powered platform delivers: Real-time threat prevention across your entire digital infrastructure Continuous compliance automation for … Type: | 0 | 0 | 0 | 2 |
![]() | ![]() Develop software fearlessly. The Sonatype journey started 15 years ago, just as the concept of “open source” software development was gaining steam. From our humble beginning as core contributors to Apache Maven, to supporting the world’s largest repository of open source components (Central), to distributing the world's most popular repository manager (Sonatype Nexus Repository), we’ve played a meaningful role in helping the world embrace the power of open innovation. Over time, we witnessed the staggering volume and variety of open source libraries that began flowing into every development environment in the world. We understood that when open source components are … Type: | 24 | 0 | 16 | 582 |
![]() | ![]() DataDome's bot and online fraud protection detects and mitigates attacks with unparalleled accuracy and zero compromise. DataDome’s bot and online fraud protection detects and mitigates attacks with unparalleled accuracy and zero compromise. Our machine learning solution analyzes 3 trillion signals per day to adapt to new threats in real time. Hundreds of enterprises worldwide—including Foot Locker, Patreon, and Reddit—trust DataDome’s solution and 24/7 SOC experts to protect their mobile apps, websites, and APIs against online fraud, ATO, carding, scraping, layer 7 DDoS, credential stuffing, and more. A force multiplier for IT and security teams, DataDome is fully transparent, easy to … Type: | 3 | 1 | 2 | 169 |
![]() | ![]() Enterprise healthcare tech content strategy support from an industry native I provide digital content strategy and content creation services supported by industry-native insight to healthcare tech companies around the world. Focusing exclusively on healthcare IT, revenue cycle, cybersecurity, and startups, I'm happy to provide my 20+ years' experience in B2B healthcare as a resource to all my clients. I help enterprise healthcare tech companies develop productive content strategy, sales collateral, and online content that generates leads and builds business. I also believe in leveraging an organization's internal knowledge and talent and getting the most possible out of existing content before … Type: | 0 | 0 | 0 | 1 |
![]() | ![]() Validate Your Controls. Maximize their Effectiveness. Drive Risk Down. Combining the mindset of a CISO and the toolset of a hacker, SafeBreach is the pioneer in breach-and-attack simulation (BAS) and is the most widely used platform for continuous security validation. SafeBreach continuously executes attacks, correlates results to help visualize security gaps, and leverages contextual insights to highlight remediation efforts. With its Hacker’s Playbook™, the industry’s most extensive collection of attack data enabled by state-of-the-art threat intelligence research, SafeBreach empowers organizations to get proactive about security with a simple approach that replaces hope with data. We’re looking for hackers and trailblazers … Type: | 8 | 2 | 4 | 138 |
![]() | ![]() Modern Endpoint Management Platform for SME. Dead Easy To Use. #CyberSecurity #MobileDeviceManagement #UEM #BYOD Embrace the power of mobility to grow your business as a mobile-first enterprise. The comprehensive Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more. The SaaS enterprise mobile security platform is built on the elastic cloud stack for flexible, scalable, secure and productive mobility operations. The Codeproof cloud console enables centralized Mobile Application Management, Mobile Content Management and Mobile Device Management. The platform boasts Geofencing and time-based policy enforcement to manage your … Type: | 3 | 0 | 3 | 18 |
![]() | ![]() The key to your competitive advantage Keypoint Intelligence is the global data and market intelligence leader for the digital imaging industry. The company is the authoritative provider of test based analytical information, competitive intelligence and sales enablement to the digital imaging industry. Its portfolio of products and services covers hardware, software, consumables and document management. Along with providing clients access to a range of SaaS tools and platforms, the company offers the most comprehensive independent research and data in the industry. Keypoint Intelligence supports the industry’s leading Original Equipment Manufacturers, Independent Software Vendors and more than 2,000 dealers and leasing … Type: | 4 | 0 | 4 | 82 |
![]() | ![]() Identify Unwanted Exposure Online: Data Loss Detection, Online Brand Security, Attack Surface Reduction Digital Shadows, a ReliaQuest company, minimizes digital risk by identifying unwanted exposure and protecting against external threats. Organizations can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital Shadows SearchLight™ helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface. To learn more and get free access to SearchLight, visit www.digitalshadows.com. Digital Risk, Reputational Risks, Cyber Security, Cyber Intelligence, Data Leakage, Cyber Monitoring, Threat Intelligence, Digital Risk Monitoring, Digital Risk Management, … Type: | 28 | 8 | 10 | 53 |
![]() | ![]() Intelligent Software Security Veracode is intelligent software security. The Veracode Software Security Platform continuously finds flaws and vulnerabilities at every stage of the modern software development lifecycle. Prompted by powerful AI trained by trillions of lines of code, Veracode customers fix flaws faster with high accuracy. Trusted by security teams, developers, and business leaders from thousands of the world’s leading organizations, Veracode is the pioneer, continuing to redefine what intelligent software security means. Application Security, Web Application Security, Binary Static Analysis, Vendor Application Security Testing, Runtime Application Self Protection, Software Composition Analysis, Dynamic Analysis, Application Security Programs, and DevSecOps Type: | 30 | 4 | 19 | 703 |
![]() | ![]() The preemptive, comprehensive, contextual, and continuous Cloud Email Security service. Acquired by Cloudflare Cloudflare Area 1 is a cloud-native email security service that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email Compromise (BEC), and other advanced threats that evade existing defenses. Area 1 is part of the Cloudflare Zero Trust platform. Acquired by Cloudflare in April 2022 Security, Big Data, Phishing, Social Engineering, Cybersecurity, Threat Intelligence, BEC, Email Security, Cloud Security, Threat and Malware Protection, Web Security, Network Security, Services for Office 365, Services for Gmail, and email protection Type: | 0 | 0 | 0 | 33 |
![]() | ![]() A suite of ai-powered security products that help compliance, HR, & security teams protect their company from bad actors Behavox is a security software company that specializes in communication surveillance: As a market leader in the application of Artificial Intelligence to monitoring of text and voice communications, Behavox’s software protects companies and their employees from bad actors engaged in illegal and malicious activities. Compliance, surveillance, legal and SOC teams rely on Behavox software to reduce false positives and increase detection rate across a broad range of risks. There are many solutions to protect companies from outside risks; Behavox protects companies … Type: | 10 | 0 | 5 | 192 |
![]() | ![]() [Automatic translation follows] ComputerWeekly en Español provides technology strategies for ICT and IT security professionals. ComputerWeekly en Español is part of the TechTarget network and covers all aspects of IT strategy and operations, including data centers, business applications, network configuration, information security, storage, cloud computing, virtualization and more . Business Intelligence and Analytics, Data Center Design, Operations and Infrastructure, Network Configuration, Cloud Computing, Big Data, Information Security Management, IT Management, IT Trends, and Automation Type: | 25 | 2 | 23 | 2 |
![]() | ![]() The first enterprise-grade blockchain built to handle big data and high-frequency transactions at scale with integrity In a world of social inequity and informational asymmetry, Web3 technologies like blockchain can help level the playing field. However, most blockchains weren't built to support the needs of today's business. ULedger is a data integrity platform that secures public trust for private data so parties can connect, interact, and transact with confidence. With multiple patents and uniquely advanced blockchain protocols, ULedger delivers a suite of affordable, scalable, easy-to-integrate, energy-efficient solutions that respond to real world challenges and drive real business value. By … Type: | 1 | 0 | 0 | 28 |
![]() | ![]() TAKING THE CLOUD BY STORM CloudNow helps companies find their path to the cloud, simplifies payment processing for e-commerce businesses, enhances the effectiveness of the SDLC through DevOps and builds powerful custom applications across a range of verticals. We solve real-world business problems with smart technology. What’s more, our cloud-based products - Akku for identity and access management, Data Prime for continuous data integration on the cloud and Chutti for attendance and leave management -help enterprises improve productivity, security and operational effectiveness. We provide custom application development & modernization of applications using DevOps, Cloud, Containerization and Microservices. We’re taking the … Type: | 2 | 0 | 2 | 86 |
![]() | ![]() AI-powered identity solutions intersecting biometrics, privacy & cybersecurity (Nasdaq: IDAI, Euronext Growth: AIID ID) Trust Stamp is a global provider of AI-powered identity services for use in multiple sectors including banking and finance, regulatory compliance, government, real estate, communications, and humanitarian services. Our technology empowers organisations with biometric identity solutions that reduce fraud, protect personal data privacy, increase operational efficiency and reach a broader base of users worldwide through unique data transformation and comparison capabilities. Identity Verification, Cybersecurity, Facial Biometrics, Artificial Intelligence, Cryptography, and Fintech Type: | 21 | 2 | 16 | 71 |
![]() | ![]() Global leader in AI-powered cybersecurity and device intelligence solutions for network providers and their subscribers CUJO AI is the global leader of cutting-edge cybersecurity and network intelligence solutions that enable network operators globally to improve the digital life protection of their customers in and outside the home. By pioneering AI-powered cybersecurity and empowering a growing ecosystem of OEM partners, CUJO AI helps major ISPs around the world to protect their subscribers. Mobile and fixed network operators use our holistic capabilities to improve their customer value proposition, monetize their networks, and reduce operating complexity and costs. The CUJO AI Platform powers … Type: | 5 | 1 | 3 | 171 |
![]() | ![]() AI Perfected for Business™️ SparkCognition’s award-winning AI solutions allow organizations to predict future outcomes, optimize processes, and prevent cyberattacks. We partner with the world’s industry leaders to analyze, optimize, and learn from data, augment human intelligence, drive profitable growth, and achieve operational excellence. To learn more about how SparkCognition’s AI applications can unlock the power in your data, visit www.sparkcognition.com. Security, Machine Learning, Big Data, Internet of Things (IoT), Cloud, Predictive Analytics, Cognitive, Industrial Internet, Artificial Intelligence, Endpoint Protection, IIoT, and Natural Language Processing Type: | 3 | 2 | 2 | 327 |
![]() | ![]() Helping companies successfully build diverse tech talent at scale. NMSDC Corporate Plus. Interapt Skills, our business line solely dedicated to workforce development, helps companies and cities build quality tech talent via our apprenticeship model. We are an NMSDC Corporate Plus recipient. We are a proven MBE IT Services firm, with expertise in software engineering, BPO, data science, cybersecurity, delivering projects as an extension of our client's delivery teams. We help the Fortune 2000 solve their tech talent problem, as well as their Diversity Equity & Inclusion problem by finding and upskilling the RIGHT talent typically overlooked by the tech community. … Type: | 0 | 0 | 0 | 174 |
![]() | ![]() Providing a Threat-Informed, Risk-Based Approach to Analysis, Preparedness and Operations, Gate 15 is a Virginia-based Veteran-Owned Small Business registered in the Commonwealth of Virginia as a Small, Women and Minority (SWaM) Vendor. We support our clients’ and partners' risk management and organizational security and resilience activities by providing expertise in threat analysis, operations and preparedness (planning, training, exercise and continuity) support. Our team maintains extensive relationships across the private and public sector critical infrastructure, homeland security and intelligence communities, and brings unique experience working with Information Sharing and Analysis Centers (ISACs) and Organizations (ISAOs). Also, unique to Gate 15 is … Type: | 9 | 0 | 9 | 12 |
![]() | ![]() Code security, redefined. Manage product and application code security at scale, supercharged by sensitive data context Bearer helps modern teams ship trustworthy products with the help of our code security solution built for security, privacy and engineering teams. We combine sensitive data context with static code analysis to make security and privacy engineering simpler and smarter to maximize the ROI for your DevSecOps and central security team driven programs. For enterprises, we offer Bearer Cloud to manage product and application security at scale with deep sensitive data context. This is powered by Bearer CLI, an open-source static code analysis product … Type: | 9 | 1 | 8 | 29 |
![]() | ![]() Defense and National Security focused entrepreneurship and innovation. SelectiveTRUST™. Zero Trust. Quantum Safe. KnectIQ is a privately owned cybersecurity technology innovator. With a uniquely unparalleled approach, we deliver a ZeroTrust-based enterprise-class secure access and data loss protection infrastructure that decreases successful intrusions by 80%. It is a patented, modern cybersecurity technology solution every company and organization can use to raise their security posture. Our solution fundamentally challenges the status quo assumption that attackers will always break through the perimeter, or that they have already successfully breached a device, system or network. Unauthorized identities gaining "silent" network access by using valid … Type: | 1 | 0 | 1 | 13 |
![]() | ![]() We know the future of critical infrastructure because we are building it. Ayyeka provides an end-to-end solution with the hardware, software, and artificial intelligence needed to create resilience in water, energy, and environmental infrastructure. Simple to launch, the plug-and-play solution is compatible with any sensor to deliver all essential data for each asset. Ayyeka's products feature the Wavelet™, a cyber-secure, fully autonomous, sensor agnostic, data creation device. Completed by the Field Assets Intelligence™ (FAI) software platform, a powerful suite of asset management and analytical tools for IoT data. Ayyeka's solution provides decision-makers with the visibility and situational awareness to convert … Type: | 2 | 1 | 1 | 37 |
![]() | ![]() Tetrate solves application networking and security, enabling innovation with speed and safety in hybrid environments. Tetrate provides the world’s leading application networking and security platform. Built on top of leading open source projects like Istio and Envoy, Tetrate offers a suite of products including service mesh, API gateway and more for enterprises increasing their rate of innovation in multicloud and hybrid environments and hybrid environments. Join the community @ tetr8.io/slack. cloud, servicemesh, istio, envoy, envoyproxy, DevSecOps, networking, Zero Trust, security, cloud native, service mesh, compliance, pci, fips, and hipaa Type: | 6 | 2 | 3 | 127 |
![]() | ![]() Jiobit is the first of its kind patented location sharing platform, enabling the longest lasting and smallest real-time location products (indoor or out) with best-in-class security. Featuring a host of encryption and security technologies, Jiobit is trusted pet owners and families, with usage in every populated continent in the world. Our mission is to provide the right information at the right time to the right people. We believe that caregivers should have a single source of helpful information to guide growth and reduce stress. We envision a world where families move forward with ease using a single source of helpful … Type: | 2 | 1 | 1 | 21 |
![]() | ![]() Earned, Owned, and Social Media A boutique PR and communications firm in Chicago. 3Points' lean, carefully selected team has worked with a variety of clients to analyze, recommend, and implement customized programs around earned, owned, and social media. There's no room for mediocrity here. We emphasize independence, expertise, and execution. We have an abundance of expertise in the financial services industry, working with banks, exchanges, brokers, technology providers, and all things futures, options, forex, and securities. Our other passion is human resources & wellness. This is why employee benefits, HRIS, private healthcare exchanges, recruiting & staffing, 401(k) & payroll services, … Type: | 3 | 0 | 3 | 6 |
![]() | ![]() External Attack Surface Management See Exactly What Attackers See. Take full control over your attack surface by uncovering and eliminating critical security risks – the ones you didn't know existed. Our botnet and discovery engine use graph data modeling to map and classify the assets across your attack surface. attacksurface, asset discovery, cloud security, cyber security threats, vulnerability management, attack surface, IT security, cyber threat intelligence, vulnerability assessment, attack surface management, network security, cyber posture, penetration testing, attack surface visibility, data security, data breach, pentesting, attack surface security, CISO, internet security, security posture, cybersecurity, cloud security, infosec, digital assets, shadow … Type: | 3 | 1 | 3 | 172 |
![]() | ![]() Leading the pack in vulnerability remediation. Vicarius helps Security and IT teams protect their most critical apps and assets against software exploitation through vRx, a consolidated end-to-end vulnerability remediation platform. Headquartered in New York and backed by tier-one Silicon Valley investors, Vicarius was founded by security experts on a mission to provide problem-solving remediation solutions that proactively reduce risk wherever assets reside. Effortlessly find and eliminate threats while reducing the strain on internal security resources, freeing up personnel to focus on other mission-critical tasks without sacrificing security. Get started for free today or learn more at https://vicarius.io Cyber, CDS, Malwares, … Type: | 1 | 1 | 0 | 55 |
![]() | ![]() Fixing The Way The World Logs In with True Passwordless MFA HYPR fixes the way the world logs in by breaking the tradeoff between strong security and consumer-grade user experiences. Our approach shifts the economics of attack and risk in the enterprises' favor by replacing password-based MFA with Passwordless MFA. With HYPR, customers provide users with a consumer-grade experience while finally enabling cross-platform desktop MFA, stopping phishing, and virtually eliminating fraud associated with weak or stolen passwords. Cybersecurity, Mobile Security, Infrastrucure, Data Security, Security, Wireless, Privacy, SaaS, Software, Cloud, Enterprise, Authentication, Internet of Things, and Identity Type: | 16 | 3 | 5 | 143 |
![]() | ![]() Building the knowledge and intuition people need to stay safe online. NINJIO is an all-in-one solution that lowers human-based cybersecurity risk through engaging training, personalized testing, and insightful reporting. Our multi-pronged approach to training focuses on the latest attack vectors to build employee knowledge and the behavioral science behind human engineering to sharpen users’ intuition. The proprietary NINJIO Risk Algorithm™ identifies users’ social engineering vulnerabilities based on NINJIO Phish3D phishing simulation data and informs content delivery to provide a personalized experience that changes individual behavior. We serve some of the largest companies in the world and have changed the behavior … Type: | 0 | 0 | 0 | 65 |
![]() | ![]() Smart Cyber Insurance Solutions. Corvus Insurance is building a safer world through cyber insurance products and risk management tools that reduce risk, increase transparency, and improve resilience for policyholders and program partners. Corvus Insurance offers insurance products in the US, Middle East, Europe, Canada, and Australia. Current insurance program partners include AXIS Capital, Crum & Forster, Hudson Insurance Group, certain underwriters at Lloyd’s of London, R&Q Accredited, SiriusPoint, and The Travelers Companies, Inc. Corvus Insurance and Corvus London Markets are the marketing names used to refer to Corvus Insurance Agency, LLC and Corvus Agency Limited. Both entities are subsidiaries of … Type: | 7 | 0 | 4 | 258 |
![]() | ![]() The leader in operationalizing Cybercrime Analytics to prevent ATO, ransomware, and online fraud. SpyCloud transforms recaptured darknet data to protect businesses from cyberattacks. Its products operationalize Cybercrime Analytics (C2A) to produce actionable insights that allow enterprises to proactively prevent ransomware and account takeover, protect their business from consumer fraud losses, and investigate cybercrime incidents. Its unique data from breaches, malware-infected devices, and other underground sources also powers many popular dark web monitoring and identity theft protection offerings. SpyCloud customers include half of the ten largest global enterprises, mid-size companies, and government agencies around the world. Headquartered in Austin, TX, SpyCloud … Type: | 7 | 1 | 3 | 196 |
![]() | ![]() Phishing protection beyond the inbox Which cloud-based Anti-Phishing do you use? Pixm uses a popular one too. But there are critical gaps. 1. Did you know the typical failure rate of cloud-based anti-phishing services is about 15%? i.e., About 15% of all bad emails make it to users' Inboxes. 2. What keeps the CISO/CIO up at night? In spite of adding top-notch anti-phishing protection and training, about 25% of employees still click on phishing links and give away their passwords. 3. When was the last time you called someone and asked to check their Junk folder for an email you … Type: | 3 | 1 | 3 | 10 |
![]() | ![]() Home wherever you go Ukio’s mission is to empower individuals to live where they want, when they want. Since our founding in 2020, we’ve successfully turned the traditional real estate market upside down by providing fully furnished and artfully designed apartments for stays starting at one month. Our guests love that renting an apartment with Ukio is as easy as it looks. We take out the hassle surrounding finding a rental with no long-term contracts, security deposits, or broker fees, and we provide all furniture, making every apartment ready to use from the minute you walk in the front door. … Type: | 3 | 2 | 1 | 186 |
![]() | ![]() Helping publishers, schools, and businesses transition to digital textbooks and course materials. RedShelf is an EdTech company focused on helping publishers, schools, and businesses transition effortlessly to more affordable and efficient digital textbooks and course materials. In addition to digitizing and distributing content from thousands of publishers and content providers, we offer an end-to-end software platform (our "Content Delivery System") that streamlines every step in the course material acquisition and distribution process. We’ve become one of the nation’s fastest-growing education companies because we’re a true “one-stop-shop,” offering the most modern technology and unparalleled support to help our partners adapt and … Type: | 1 | 1 | 1 | 101 |
![]() | ![]() mxHERO is a digital bridge allowing customers to intelligently capture email-based content to their content clouds mxHERO's Mail2Cloud digital bridge supports the capture of email body and/or attachments from client legacy email archives, at-rest content within active employee email inboxes, or via inflight bi-directional capture based on outbound or inbound capture rules. Once captured - based on the centrally controlled set of business rules established in mxHERO's administrative control panel, the content is enriched with meta-data and placed into client or agency preferred cloud content management platforms. Email is a poor system of record and a poor system of engagement … Type: | 5 | 1 | 5 | 20 |
![]() | ![]() FlexWage provides employers with financial wellness and pay solutions that bring employees much needed peace of mind. FlexWage created the Earned Wage Access industry in 2010, our goal has been to provide workers with safe and responsible solutions to cash flow volatility and financial wellness. We believe financial security is a journey that begins most effectively at the workplace, and has generational impact. Utilizing earned wages to manage cash volatility, enables employees to avoid the high cost and stress induced by bank overdraft, late fees and short term loans. Once established on more solid footing, employees are more receptive to … Type: | 1 | 0 | 0 | 16 |
![]() | ![]() End-to-end API security. Securing REST, GraphQL, gRPC, WebSockets, and web apps at scale. Protect any API. In any environment. Against any threat. Built by security practitioners for practitioners, Wallarm products provide robust protection for APIs, apps, and serverless workloads running in cloud-native environments. Hundreds of Security and DevOps teams chose Wallarm to get unique visibility into malicious traffic, robust protection across the whole application portfolio, and automated incident response for appsec programs. The company is committed to supporting modern tech stacks, offering dozens of deployment options in cloud and Kubernetes-based environments, and also provides a full cloud solution. Founded in … Type: | 0 | 0 | 0 | 109 |
![]() | ![]() The creators of EVC® Dynamic Security Code, the future of smart cards. Creators of EVC® (Ellipse Verification Code), the technology that generates a Dynamic Card Security Code every time the payment card is swiped, dipped, tapped, or triggered with an app. Ellipse is a FinTech company shaping the future of smart cards. Our mission is to address the payment ecosystem’s varied needs with our solutions and to make digital payment safer. Founded in 2017, Ellipse is based in Los Angeles, with a global team. Card Module, Smartcard, Complex card, Display card, EVC, EVC All-In-One, Card component, Smart card, Fintech, EMV, … Type: | 5 | 0 | 5 | 21 |
![]() | ![]() CoinList's mission is to accelerate the advancement of blockchain technology. We do this by finding the best emerging blockchain projects and helping them succeed. We have become the global leader in new token issuance, helping blue chip projects like Filecoin, Solana, Celo, Algorand, Dapper, and others connect with hundreds of thousands of new token holders. And we now support the full lifecycle of crypto investment, from token sales through token distribution, trading, lending, and crypto-specific services such as staking and access to decentralized-finance opportunities. CoinList users trade and store Bitcoin, Ether, and many other popular crypto assets through our full-service … Type: | 0 | 0 | 0 | 97 |
![]() | ![]() 🧠 e-Learning services for the future of work 🧠 ComSkills are experts in collaborating with clients to create customised learning and development programs focused on achieving client requirements. ComSkills offer four learning and development services: 🧠 Video e-Learning Services 🧠 Private Training Webinars 🧠 Public Training Webinars 🧠 Face-to-Face Training Courses ComSkills primary business is the creation, delivery and support of video e-learning services. We are a G-Cloud12 approved supplier of e-learning cloud services to the UK Government and have extensive experience in building cloud services. The ComSkills video e-learning service is a cloud-based software as a service (SaaS) platform … Type: | 3 | 0 | 3 | 4 |
![]() | ![]() Celedon Partners has become Ardalyst! This is an exciting time for us, and our clients. The name change is reflective of a number of investments we have made in our business in recent months. Over the last year we have brought together expertise in line of business applications, cloud infrastructure, and cyber defense. These investments have allowed us to further develop invaluable new capabilities across all spectrums of our business, while continuing to embrace a customer obsessed approach in our everyday operations. The name Ardalyst conveys the combination of our core values "ardent" [passion] and "catalyst" [change agent]. An Ardalyst … Type: | 1 | 1 | 0 | 9 |
![]() | ![]() Data and password security developer toolkits for HIPAA and GDPR compliance, liability transfer, and peace of mind. Virgil Security, Inc., makes every software developer into an applied cryptologist. Virgil provides password-free authentication, encryption, distributed immutable data storage via Blockchain, and verification of data, devices, and identities that is quickly and easily integrated into developer products. Virgil provides this via a cloud-based service in combination with open sourced libraries that are available for desktop, embedded (IoT), mobile, and cloud / web applications with support for a wide variety of modern programming languages. • Finalist for Red Herring's Top 100 North America … Type: | 0 | 0 | 0 | 16 |
![]() | ![]() Yubico sets new world standards for simple, secure login. Yubico, the inventor of the YubiKey (security key), makes secure login easy and available for everyone. Backed by major investors like Andreessen Horowitz, Meritech Capital, AMF, and Marc Benioff, CEO of Salesforce, the company was created by an inspirational female founder. Millions of individuals in over 160+ countries rely on the YubiKey to protect their accounts, and companies like Google, Facebook, Twitter, and the U.S. State Government rely on our technology to keep their employees secure. We are a multinational, fast-growing company offering an opportunity to bring your ideas to life … Type: | 5 | 0 | 5 | 452 |
![]() | ![]() TRUSTID helps call centers cut costs, improve the customer experience, and combat phone fraud by identifying trusted callers before they ever hear "Hello." Rather than relying on personal information—which may be readily available to criminals—TRUSTID uses the caller’s phone as an ownership-based authentication token. It can’t be spoofed or manipulated and is entirely invisible to customers. This automatic, highly accurate pre-answer caller authentication technology quickly separates callers who should move into an expedited Trusted Caller Flow™, where you can focus on solving problems instead of interrogating your best customers. Some of the world’s largest enterprise call centers rely on TRUSTID … Type: | 0 | 0 | 0 | 3 |
![]() | ![]() The Most Comprehensive OT & IoT Cyber Security Platform. A Gartner Cool Vendor. SCADAfence is the global technology leader in OT & IoT cybersecurity. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access, and IoT device security. A Gartner “Cool Vendor” in 2020, SCADAfence delivers proactive security and visibility to some of the world's most complex OT networks, including the largest manufacturing facility in Europe. SCADAfence enables organizations in critical infrastructure, manufacturing, and building management industries to operate securely, reliably, and efficiently. OT Security, … Type: | 8 | 0 | 7 | 57 |
![]() | ![]() Succeeds where Malware Detection Disappoints, Add AppGuard AppGuard, Inc., a Blue Planet-Works company, provides endpoint protection software that blocks malware in real-time, before endpoints are compromised, without having to detect or recognize it. AppGuard was founded on the belief that prevention is a critical component of an effective defense-in-depth strategy and complements detection-based tools that often are unable to detect new malware variants. Today, over 6,000 organizations leverage AppGuard’s patented technology to outsmart malicious actors by disrupting known and unknown, fileless, and Zero-day exploits before they cause harm. Cyber Security, Computer Security, IT Security, Network Security, and Mobile Security Type: | 3 | 0 | 0 | 25 |
![]() | ![]() Testing for everyone. Your way, your budget, your needs. AttackIQ is the industry leading provider of breach and attack simulation products for security control validation. AttackIQ emulates adversary tactics, techniques, and procedures, aligned to the MITRE ATT&CK framework, and provides visibility into your security program performance with clear data-driven analysis and mitigation guidance. At AttackIQ, we get that every organization has different testing needs. That’s why we’ve designed products fit for your unique needs: Enterprise, Ready!, and Flex. So, whether you’re new to security testing, want someone to manage it for you, or just need some help running it yourself, … Type: | 2 | 0 | 2 | 147 |
![]() | ![]() Sustainable Ecosystem, that's is our mission ! #tprm #grc #cybersecurity Since our founding in 2016, we've been providing cutting-edge cybersecurity services to businesses of all sizes. But we didn't stop there - we developed our own product, IMMUNE X-TPRM, to revolutionize the way companies manage third-party risk. We are passionately devoted to the development of a cyber environment that is not only safe and secure but also responsibly maintained for long-term sustainability. We stand at the forefront of cybersecurity innovation with the introduction of two pioneering AI-powered products: IMMUNE X-TPRM and IMMUNE GRC. We're proud to be part of the … Type: | 18 | 2 | 14 | 16 |
![]() | ![]() Technology Recruitment Specialists Serving The Asia Pacific Market Established in 2011, we have over 10 years of successful recruitment experience specialising within the technology industry in the Asia Pacific region. SearchElect’s platform of market knowledge and experience, proven talent research and deep network connections support startup and multinational companies achieve scale. We provide value through digitalization and new technologies to maintain a future-proof versatile methodology to a constantly evolving and highly competitive economy. Our client and candidate relationship continually expand within Telecommunications, Principal Vendors, Advisory, and System Integration industries. Our experienced team of recruiters aligns both candidates and clients expectations … Type: | 0 | 0 | 0 | 4 |
![]() | ![]() Stay ahead of rapidly evolving threats and outmaneuver your adversaries with Intelligence at the core™ of your defenses. EclecticIQ is a global provider of threat intelligence technology and services. The most targeted organizations in the world – including governments and large enterprises – use our platform to automate intelligence management at scale and accelerate collaboration across security teams. With our open and extensible cybersecurity platform and ecosystem, they are able to stay ahead of rapidly evolving threats and outmaneuver adversaries by embedding Intelligence at the core™ of their cyberdefenses. Founded in 2014, EclecticIQ is a leading European cybersecurity vendor operating … Type: | 13 | 3 | 4 | 85 |
![]() | ![]() The leading enterprise application security platform empowered by world’s best ethical hackers Working as ethical hackers and security researchers over the past decade we learned that online security became a Wild West for companies. Trying to get control of risk levels by assigning security teams, hiring security companies at scheduled intervals and licensing multiple expensive solutions, but eventually, ending up with a security flow that is not insightful and with reports scattered all over the place. Online security isn’t just about implementing smart technology, it is also about including the right people, gathering insider intelligence and the ability to align … Type: | 2 | 0 | 0 | 47 |
![]() | ![]() [Automatic translation follows] Public affairs consultancy in the field of climate, energy, agriculture Companies want investment security, the government wants to be a reliable partner. All too often these worlds seem unable to reach each other. Public Affairs helps companies do business in the public domain by connecting you with politics and government. You want to consult with the government, political players or other social organizations, but you do not know the right way or you do not have the right contacts. Sometimes you want to know what is going on in Brussels or The Hague. And you want to … Type: | 2 | 0 | 0 | 26 |
![]() | ![]() [Automatic translation follows] ICT for collaborators Detron is the independent IT & Telecom partner with a focus on the workplace, including the underlying infrastructure, connectivity and security. ICT is of great importance for all organizations where people want to achieve more together. This includes a reliable IT partner. Someone who is always one step ahead, who can point the way to the best and most efficient solutions. An ICT partner that can advise, integrate and manage independently. That 'partner' is us! Cloud services, ICT management, Maintenance, Telephony services, Renting, Secondment, End User Management, Unified Communication & Collaboration, Security Services, Modern … Type: | 3 | 0 | 3 | 355 |
![]() | ![]() [Automatic translation follows] Development of Innovative Solutions for Asset Encapsulation & Toxicological Risk Assessment Strategies 𝗡𝗼𝘀 𝗼𝗿𝗶𝗴𝗶𝗻𝗲𝘀: ✔ Toxicologist and expert in endocrine disruption Franck Chuzel decided to launch a human-sized company aimed at “doing its part” in the collective effort to improve the well-being and health of people while respecting our planet. After 20 years spent in large industrial groups in the life sciences industry as head of security evaluation units, and having matured his business plan during his Executive MBA at EMLyon, he founded in 2015 the innovative company LifeScientis to offer two complementary services. On the one … Type: | 1 | 0 | 1 | 6 |
![]() | ![]() Leveraging science to help you solve problems that matter. Will Strategy Consulting helps its clients tacle complex, high stakes, challenges where human and digital science are often combined: ethics of algorithms and artificial intelligence, digital transformation, cybersecurity and information security, fake news and influence, privacy and personal data, democracy and transparency in a digital age, new business models, disruptive innovation…… Will was founded in 2011 by Lancelot Pecquet, consultant since 2006, researcher and lecturer (Inria, Polytechnique, CentraleSupélec, Sciences Po, ENA, ESSEC Business School, Bell Labs, University of Sydney, Sorbonne Université…) since 1998, who works at the junction of several disciplines … Type: | 0 | 0 | 0 | 0 |
![]() | ![]() See Beyond CybelAngel is a global leader in cybersecurity solutions focused on External Attack Surface Protection and Management. As an early pioneer in ‘outside-in’ search technology, approaching cybersecurity just as an attacker would carry out infiltration, CybelAngel has developed the industry’s most extensive defense for external attack vectors, where the majority of cyber-attacks are initiated. Combining expanded discovery and analysis, CybelAngel finds unknown assets and exposures to preemptively diffuse attack vectors that cyber criminals use to breach systems and wreak havoc. CybelAngel proudly protects some of the largest global enterprises representing various sectors including the Pharmaceutical, Manufacturing, Retail, and Financial … Type: | 5 | 2 | 3 | 156 |
![]() | ![]() Vulnerability Operations Center Yogosha was born out of our deepest belief: the approach and understanding of cybersecurity needs a change. A big one. By nature, cybersecurity will always be complex, tricky. But security solutions shouldn’t make it more difficult. If anything, they should make it easier. There are too many tools and solutions. Too many time-consuming processes. Too many vulnerabilities to find, and not enough skilled people to do it. And this needs to stop. We have designed Yogosha as a VOC – a Vulnerability Operations Center. A hub to detect, manage and fix vulnerabilities. A platform to bring together … Type: | 17 | 5 | 13 | 182 |
![]() | ![]() [Automatic translation follows] Securing every bit of your data Founded in 2011 by Fred Raynal, Quarkslab is a French company specializing in cybersecurity and more specifically in software protection and analysis. Research and development are the fundamental pillars of Quarkslab. Its goal has always been to promote innovation by creating a function between academic research and concrete implementation. His expertise combines offensive and defensive security in protecting applications and data, and helps businesses and government organizations adopt a new security posture: forcing attackers, not defenders, to continually adapt. Through these consulting services and through its Lab's R&D work and through … Type: | 6 | 0 | 7 | 92 |
![]() | ![]() Configuration & security management Rudder is an easy to use, web-driven, role-based solution for IT Infrastructure Automation and Compliance. With a focus on continuously checking configurations and centralising real-time status data, Rudder can show a high-level summary (“ISO 27001 rules are at 100%!”) and break down noncompliance issues to a deep technical level (“Host prod-web-03: SSH server configuration allows root logins”). A few things that make Rudder stand out: - Simple framework to extend built-in rules to implement specific low-level configuration patterns, however complex they may be, using simple building blocks (“ensure package installed in version X,” “ensure file content,” … Type: | 2 | 0 | 2 | 46 |
![]() | ![]() [Automatic translation follows] GDPR Compliance & Cybersecurity VSE/SME, Liberal Professions & Independents, Ataraxie-IT offers you: ▶︎ Protection of personal data (GDPR compliance, External DPD/DPO) ▶︎ Security of your Information System (SSI, ISO 27001/27002, Ebios, ANSSI Guides) ▶︎ Data backup Information Systems Security, IT Security, Data Backup, IT Backup, GDPR Compliance, Personal Data Protection, External DPO, and GDPR Advice Type: | 0 | 0 | 0 | 1 |
![]() | ![]() European tech school offering career changing programs at 20+ campuses Our blended, project-based, hands-on teaching approach brings together the power of our online learning platform and the network of 50+ full-time dedicated instructors. We believe that learning will become the major human occupation. We support that vision by encouraging a supportive & joyful learning environment. Passion, innovation and humanity are the values dear to our international community of 6.500+ students and alumni Développement web, PHP, Javascript, Android, Formation , JS , Numérique, Data, Product management, tech, application mobile, ruby, html, css, digital, algorithme, big data, data analyst, cybersecurity, web development, … Type: | 39 | 5 | 33 | 589 |
![]() | ![]() Source code vulnerability detection and remediation made simple and efficient with YAGAAN Code Mining technology. At the confluence of software development and cyber risk management, application security is a major challenge for companies whose activities include software development, integration and/or auditing. Indeed, it is a proven fact that the use of Application vulnerabilities as a vector of entry or propagation during cyber-attacks has increased and is now almost systematically used. Within this context, we believe that an upfront optimization of the Application security which is introduced at the earliest stage of the development process is key. Not only it helps … Type: | 5 | 1 | 3 | 2 |