Logo | Name | Σ | Employees |
---|---|---|---|
![]() | ![]() Secure Content Collaboration and File Transfer. Try idgard for FREE now - register at www.idgard.com/test-growth idgard - a DriveLock company idgard combines highly secure data exchange and virtual data rooms in one product - for efficient and legally compliant digital collaboration. The highest security and compliance requirements are met, ensuring GDPR-compliant processing of sensitive data. idgard's vision is to become the most trusted global platform for secure digital collaboration, offering its customers full data sovereignty: thanks to the patented and certified Sealed Cloud Technology, information remains under full user control at all times. Unauthorized access is reliably ruled out. Thus, … 23 similar entities Type: Startup Activities: it services regtech Technologies: Cybersecurity | 17 | 82 |
![]() | ![]() Authentification de tous les types de données de votre entreprise Woleet is the ideal solution to protect your critical data. All of your sensitive files can be secured with electronic signature, electronic seal or time stamping. Public Blockchain, Cybersecurity, Timestamping, Notary solutions, Certification, Electronic signature, and Electronic seal Type: Startup Activities: it services Technologies: Blockchain/Cryptocurrency Cybersecurity | 24 | 1 |
![]() | ![]() Sensitive Data Requires Premium Protection OneVisage is a Swiss cyber-security company registered in 2016 by 3D computer vision experts, software veterans and executive managers. We aim to become a leading ethical, transversal Strong Authentication solution provider to help large OEM integrators and IAM providers eliminate digital identity theft. Strong Customer Authentication, 3D Facial Biometry, 2-FA, Multi-Factor Authentication, GDPR, CCPA, CNIL, Data Privacy, Data Protection, and ZERO Trust 84 similar entities Type: Startup Activities: it services privacytech Technologies: A.I. A.I. - Image Processing Cybersecurity | 20 | 7 |
![]() | ![]() It is a trading company that focuses on security. It is widely supported in the security field. Based on my previous experience, I am working on digital end-of-life services (Mamoree) as a security for my life. www.mamowle.com 83 similar entities Type: SMB Activities: telecommunications Technologies: Cybersecurity | 1 | 27 |
![]() | ![]() CISO & IT-Governance Helping you guarding your valuable digital information today and for the future. • CISO • CISO-as-a-service • IT-Governance • ISO-27001 • NIST • GRC: Governance, Risk and Compliance iGuards offers a full service in gaining & keeping the trust in your Digital world. Are you in need of a CISO or further protection of your valuable digital information? Our professionals supervise complex security and privacy assignments from diagnosis to implementation. Let us be the guardians of your digital trust ! iGuards – Keeping your data safe. Information Security, Governance, CISO, CISO-as-a-service, Security Audit, NIST, ISO 27001, and … 57 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity | 0 | 2 |
![]() | ![]() The best defense is the hack. Torii Security is an expertise firm specializing in information systems safety. Our mission: protect your digital heritage! We intervene all over the chain, to guarantee a real improvement in your protection: - Evaluation: by carrying out safety audits and intrusion tests (Pentses), - Training: Technical training and risk awareness for all, - Improvement: by technical supports, advice services, integration of open source solutions with added value More information to come on www.torii-security.fr Safety of information systems, open source, audits, intrusion tests, advice, management, advice, cybersecurity, computer security, and cyber awareness 151 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 4 |
![]() | ![]() The privacy-centric technologies company. Secure and privacy-preserving data sharing will be the most impactful accelerator of business success. We are building the toolsets to enable transformational trust-worthy technologies. Come and join us on this journey. data privacy and data security 74 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity | 7 | 41 |
![]() | ![]() Intelligent Data Security. Powered by AI. Safetica protects companies all over the world against data leaks and internal threats. We believe data protection should make running your business easier, not harder. Thanks to our expertise, our solution is simple and effective. Enterprise Internal IT Security, Employee Failure Protection, Endpoint DLP, Employee Productivity Monitoring, Data Security, Insider Threat Management, and Cloud Security Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 0 | 123 |
![]() | Alice and Bob Securing identies and exhanges : - SSL certificates - strong authentication - digital signature - encryption - digital certificates - network security, BOYD, Cloud Electronic signatures have the same legal value as handwritten signatures. Save time and money and improve the confidence in your company. Protect your web sites, extranets and intranets with SSL certificates. Don't exchange your documents and emails unencrypted on the Internet. Use simple and cost-effective solutions to protect your management and your employees. Protect the access to your coporate network based on who requires to access on on which computer, tablet or smartphone. It is easy … Type: Startup Activities: it services Technologies: Cybersecurity | 0 | N/A |
![]() | ![]() Arcansecurity develops an innovative authentication solution without passwords to simplify the connection path of a user while improving the level of security. Security, Authentication, Cryptography, Software Development, and Cloud 234 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 4 | 1 |
![]() | ![]() True Secrecy CyferAll is a cybersecurity startup focused on securing application data for the millions of apps deployed worldwide that were not built with security in mind. Focused on data security and data sovereignty, our solution, QRshield, will empower any application with comprehensive data "in use," "in transit," and "at rest" protection and automated local key management for secure storage anywhere, even with third party hyper scalers. Leveraging secure software enclaves, post-quantum encryption and zero-trust technologies, QRshield defends against AI-driven cyber-attacks and the emerging quantum computing threat. CyferAll. Protect Digital Assets Forever. Cyber Security 20 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 13 | 15 |
![]() | ![]() Securely unlock your most sensitive, siloed data risk-free and fully compliant. Securely unlock your most sensitive, siloed data risk-free and fully compliant. Confidential computing, Data collaboration, Confidential AI, Privacy enhancement technologies, AI, Responsible AI, Trusted AI, and Confidential Analytics 66 similar entities Type: Startup Activities: it services privacytech Technologies: Data Analytics | 29 | 13 |
![]() | ![]() We didn’t reinvent cybersecurity, we just made it simpler and smarter. Our unified platform simplifies security management by combining device protection, reputation monitoring, domain security, and more. Designed with ease of use and affordability in mind, we empower users to stay protected without breaking the bank. AI, Cybersecurity, and Social Media 302 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I. | 0 | 2 |
![]() | ![]() We are specialists in protecting sensitive information More than a technological solution, we are a strategic decision for organizations. Our mission is to redefine the relationship between enterprises and cyber-security and the user experience in the process of authentication and access to technology assets. We deliver robust, multi-layered solutions, with advanced technology and focus on preventing security issues, protecting government and corporate information. We ensure secure communication between people (H2H), between machines (M2M), and between people and machines (H2M) with end-to-end encryption. We prevent: - Data breaches - Financial losses - Impact on productivity - Intrusion in IoT devices - … 130 similar entities Type: Startup Activities: it services privacytech Technologies: IoT Cybersecurity | 2 | 22 |
![]() | ![]() We bring security to the public cloud. We offer a unique, comprehensive data protection suite powered by next-generation cryptography to secure your data in use and protect what matters most. And, what’s most important, is that you’re in control. cryptography, multi-party computation, FHE, functional encryption, secure enclave, datasecurity, dataprivacy, managed services, confidentialcomputing, cybersecurity, confidential VM, confidential GenAI, and post-quantum 92 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity Data Analytics Generative A.I. A.I. | 45 | 18 |
![]() | ![]() Secure data enablement via Data-In-Use Encryption to unlock businesses' full data potential. Vaultree is revolutionising data enablement and security through our pioneering Data-In-Use Encryption solutions. Our industry-leading technology ensures that data remains encrypted throughout its entire lifecycle, enabling businesses with previously inhibited use cases and growth opportunities via in-use encrypted searches, analyses, sharing and collaboration, AI/ML modelling, and data visualisation. Vaultree’s solutions and approach to data enablement empower organisations to unlock and harness their data, driving compliant innovation while drastically reducing cyber threats. Data protection, Encryption, Data security, Compliance, GDPR, LGPD, CCPA, Audit logging, Access management, Sensitive data, Multi-factor authentication, … 38 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity | 11 | 60 |
![]() | ![]() Controlled data exchange IT & Amp; Ot -& gt; Protection of material and intangible assets -& gt; Forted electronic hardware partitions, therefore no zerodays without flaws possible. Permanently and sustainably protect your critical assets and your ultimate backups from ransomware -type protocol attacks. Ot, networks, cybersecurity, appliances, and security if 94 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 9 | 5 |
![]() | ![]() Stop data loss BEFORE it becomes a breach ZORB Security is an information risk and data breach specialist. We've developed a revolutionary approach to prioritizing zero-trust for data theft prevention, for businesses whose reputation is their differentiator. Our software stands guard over outgoing data, safeguarding proprietary information and intellectual property. We ensure that only verified data from trusted applications, to trusted destinations via trusted channels is transmitted. Helping you protect your valuable, sensitive business data and application data from theft and compliance breaches. Our innovative method has established us as leaders in the field of protecting digital assets against theft … 61 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 7 |
![]() | ![]() Founding the New Web of Trust. 🔒 Vaultys, leader in cybersecurity, is the 1st authentication solution resistant to AIA assigned attacks. The employees, owners of their identifier, connect without password safely, simplicity and sovereignty. 🔒 cybersecurity, decentralized identity, and sovereignty 108 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 18 | 4 |
![]() | ![]() Modern collaboration for security conscious teams. Persistent security for sensitive data through decentralized crypto. The global leader in secure collaboration, cloud storage and data access management. HighSide enables the modern business, addressing challenges in productivity, data sharing and engagement typically stymied by data security, compliance and data access requirements 19 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 3 | 6 |
![]() | ![]() Upsignon, a 100 % French solution integrated into the Septeo group, simplifies password management to make cybersecurity accessible to everyone including the most vulnerable users. Designed to meet the needs of the public, private and MSP (Managed Service Providers) sectors, Upsignon places digital security within everyone's reach, without compromise on simplicity or data sovereignty. Authentication, SSO, Privacy, Privacy, Connection, Cyber Security, Payment, Web Trust, Passwords, Sovereign, and Software Publisher 67 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 4 | 2 |
![]() | ![]() #SecurityRiskmanagement #Cybersecurity #EbiosRisqueManager #OligoRiskManager #DORA #NIS2 Reciproc-it is an Information Security System Consulting Firm. Our main activities are based on giving guidance to protect the data and information, by ensuring their integrity, confidentiality, availability and auditability It’s also a matter of helping our customers in managing and processing their IT projects in well framed way by using the adequate methodology Information System Security, IT Projects management, Cybersecurity, risk management, consulting, and Compliance 413 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 5 | 9 |
![]() | ![]() Empowering the development of a secure digital future. Cryptomathic helps businesses and governments to deliver trust and confidence in the digital world. We’ve mastered the science of encryption so you can focus on the art of delivering beautiful digital experiences. Our cryptographic solutions protect sensitive personal information from unauthorised access. We help governments, banks and businesses understand their vulnerabilities, take action to keep regulators happy, and keep digital assets safe. Our solutions fall into four main areas: KEY MANAGEMENT The cornerstone of data encryption: securely create, store, exchange and refresh the cryptographic keys that protect valuable data. DIGITAL IDENTITIES & … 29 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 12 | 102 |
![]() | ![]() Our mission is to make the Internet safer by securing everyone’s email. Fraudmarc's unique approach combines the power of DMARC reporting with our hosted SPF CompressionTM solution to give you the power to manage policies without the risk of tedious DNS changes. Our enterprise plans support some of the Internet's most influential senders and our free plans make security accessible to everyone. We make security easy so you can get back to work. Email Security, Email Authentication, SPF, DMARC, DKIM, and Cyber Security 46 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 5 |
![]() | ![]() Personalized support for companies in their digital protection strategy Founded in 2010 by Malik Dahman and Didier Sammaritano, Phosphorus Technologies is responsible for simplifying access to computer technologies and cloud, backup and data protection for very small businesses and PMEs. Today, IT security is a priority issue for companies: their digital data represents a real heritage, essential for their sustainability. It thus becomes essential to set up reliable backup systems allowing the recovery of data in the event of a claim. To meet this need, Phosphorus Technologies has developed complete data security solutions guaranteeing the implementation of a rapid and … 54 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 6 | 10 |
![]() | ![]() Protect your data in any environment while respecting legal constraints Fruit of 5 years of work of our Lab of IT security research, the protection of the fact that we offer represents a new approach to digital security: instead of securing its transmission or storage, Difenso directly protects the data by encrypting it from its design and takes care of "the right to be forgotten". We thus meet European data confidentiality requirements (GDPR). Our innovative technology, certified by ANSSI, guarantees companies control and exclusive property of their data encryption, applicable to a multitude of cloud infrastructure and application platforms. Its … 83 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 1 | 8 |
![]() | ![]() Deepfake proof digital services Deep fake proof digital services. We are developing a technology to protect you from attacks using deepfakes. Our first product is https://sealf.ie/en/ which protects you from the fake CEO (Business email compromise fraud). privacy, trust, businessemailcompromise, FOVI, BEC, and protection Type: Startup Activities: it services | 4 | 2 |
![]() | ![]() The embedded protection for documents Empathy. Honesty. Playfulness. Craftsmanship. Solidarity — these are some of the values we live by, as a company. We work by them too: we’re building a product we believe in — we bring security and control over your company's data, wherever it's sent or stored. See https://www.seald.io cybersecurity, encryption, data security, end-to-end encryption, and data protection 104 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 19 | 8 |
![]() | ![]() We provide easy and secure access to information anywhere, anytime. Our services: - Managed Services - Engineering - Consulting Our Focus: - Cybersecurity - End User - Modern Workplace Management Our uniques: - Cybersecurity at its best - Outstanding User Experience - Operational Excellence Security, Mobility, Mobile Security, Integration, Managed Services, Enterprise Mobility Management, App Management, Training & Education, Mobile Device Management, Unified Endpoint Management, Mobile Operations Center, iOS/Android/macOS/Windows10, Mobile Threat Defense, Cloud Security, Modern Workplace, Zero Trust, Microsoft M365, Device as a Service (DaaS), and End User Services 420 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 3 | 14 |
![]() | ![]() Defining a privacy respectful business model for digital engagement in places Krowdthink develops the Krowd - the first Personal Network, connecting people in places (without tracking or knowing location), answering two questions; Who's here and what's happening? We layer in services for venue owners to offer their visitors safety through direct connection to security, or to report cleanliness or maintenance worries by linking directly to operations and facilities management. Mobile Apps, Privacy, Social networking, eventtech, GDPR, facilities Management, Crowd Safety, Security, and CyberSecurity 52 similar entities Type: Startup Activities: privacytech Technologies: Cybersecurity | 23 | 0 |
![]() | ![]() Protect data and network with infoscuur solutions Protect your business data! Your data produced and stored is vital for the operation of your business. Every day this digital heritage is exposed. An adapted safeguard policy is essential to cover the whole of your computer fleet and ensure the continuity of your activity. data backup, computer network protection, cyber-resilience, cyber security, and VPN 105 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 1 |
![]() | ![]() Forensic watermarking solutions for Premium Content ContentArmor creates, develops, and commercializes security solutions for Entertainment content. In particular, it proposes audio and video watermarking technologies to deter piracy and cryptography-based digital rights management for premium multimedia content. As such ContentArmor provides a comprehensive offer to protect high-valued content all along the content creation and distribution workflows. Digital Watermarking, Anti Piracy, Content Protection, and forensic watermarking Type: Startup Activities: it services Technologies: Cybersecurity | 6 | 2 |
![]() | ![]() RGPD conformity & amp; Cybersecurity for VSEs and SMEs VSE/SMEs, Liberal professions & amp; Independent, Ataraxie-IT offers you: ▶ ︎ Personal data protection (RGPD, DPD/external compliance) ▶ ︎ Safety of your information system (SSI, ISO 27001/27002, EBIOS, Ansi guides) ▶ ︎ data backup Security of information systems, IT security, data backup, computer backup, RGPD compliance, personal data protection, external DPO, and RGPD advice 109 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 0 | 1 |
![]() | ![]() We're an easy to use, secure, information sharing ecosystem for organizations, large and small - anytime, anywhere. Easy to use, secure information sharing ecosystem for organizations, large and small, empowering teams to collaborate and service their clients creating peace of mind in the knowledge that the organization’s information is safe and accessible to them - anytime, and anywhere. We adhere to advanced compliance standards & data protection. You should be able to focus on your business knowing your information is safe. Cloud Storage, File Synchronization and Sharing, Mobile File Access, Hybrid Cloud Storage (Public and Private), End Point Backup, Secure … Type: Startup Activities: it services Technologies: SaaS | 10 | 24 |
![]() | ![]() Storage and security of professional data Cyber Security specialist: A complete solution to protect your business from the risk of data loss. Hybrid backup system, with local box and cloud space, your information will be protected. Qualiopi certified training organization, cybersecurity training for your employees. Satisfaction rate: 92%, 0%abandonment rate, 100%presence rate. 54 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 16 | 8 |
![]() | ![]() The solutions to grow digital ESMS and SMEs Widip has developed since 2005 expertise in the secure accommodation of servers - ISO 27001 and HDS certification (health data accommodation) - and digital processing projects. Our offer is based on three main axes: - Security, backup and integrity of data with a dedicated audit and expertise offer - The availability of data carried by our Cloud, Network and Over -site solutions (12 employees with our customers) - user satisfaction with a team of 15 people in the service and user support center (remote supervision, hot-line and telemainne) at the service of … 192 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 12 | 32 |
![]() | ![]() DATA PROTECTION AND DATA SECURITY FOR DIGITAL PRODUCTS AND COMPANIES - independent consultancy & approved privacy seals ePrivacy advises and supports companies in the digital economy with all aspects and challenges of data protection and data security. As an independent service provider, ePrivacy certifies companies and products with the privacy seal "ePrivacyseal". Furthermore, the experts from ePrivacy are accredited by the ULD (Landesdatenschutzzentrum Kiel), members of the working group Mobile Security of the "IT-Gipfel" and certifiers of the OBA Framework, voluntary self-regulation guidelines for online advertising to protect Internet users. Prof. Dr. Christoph Bauer works together with a team of … 28 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 2 | 17 |
![]() | ![]() LOCK DATA, UNLOCK SUCCESS! We encrypt all data in-transit and at-rest on mobile end-points, corporate servers, and cloud servers. Our technique only allows the user to generate encryption keys. Cloud and corporate systems administrators are masked from viewing your data. Cybersecurity, Data Encryption, and AI & ML Based 37 similar entities Type: Startup Activities: it services Technologies: A.I. Data Analytics | 0 | 5 |
![]() | ![]() Australia's cybersecurity experts Australia's phishing and cybersecurity experts. We offer a comprehensive range of cybersecurity services that protect your business from cyber criminals and digital threats. Cloud Security, Application Security, Infrastructure Security, PCI DSS, Phishing, and Email Security 546 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 3 |
![]() | ![]() Idenprotect. Security Simplified. Productivity Elevated Idenprotect is a leading cybersecurity company specialising in a range of phishing-resistant and passwordless authentication and secure browsing solutions. We help organisations of all sizes eliminate password risks, streamline operations, and foster a productive, secure digital environment. Authentication, Innovation, Information Security, Security, Mobility, Assurance, Cryptography, Multi-Factor Authentication, Digital Signing, TEE, TPM & SE, Identity Driven Browsing, Secure Browser, and Enterprise Browser 135 similar entities Type: Startup Activities: it services regtech Technologies: Cybersecurity | 2 | 24 |
![]() | ![]() Best in Class Solutions for National Security, Identity, and Intelligence National Security Solutions is the FOCI (Foreign Ownership, Control, and Influence)-mitigated subsidiary of IDEMIA Global that delivers identity credentials, biometric, and video analytic solutions to the Federal and Intelligence Communities to include U.S. Departments of Defense, Homeland Security, Justice, and State and prominent intelligence agencies. We enable some of the United States’ most sensitive programs. We are recognized experts in identity management, secure credentials, biometrics, video analytics, and access control solutions. Biometrics, Identity Management, Law Enforcement, Video Analytics, Fingerprint Algorithms, Credentialing, AFIS, Facial Recognition, Artificial Intelligence, ID Documents, Digital ID, … 126 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 4 | 173 |
![]() | ![]() The specific is our standard. Secure Systems & Amp; Services is a subsidiary of VINCI Energies specializing in technological solutions for cybersecized physical and digital safety. Secure contributes to a safer world by intervening on behalf of demanding orders, for OIVs, sovereign sites and critical sites. in France and internationally. Agile editor and a pragmatic integrator, Secure provides its customers with its teams of experts who shape keystand solutions: from the simplest to the most complex, the cutting edge of innovation. Secure develops and markets its own technologies: - Evolynxng: cybersecized access control and safety management solution, in accordance with … 58 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 11 | 55 |
![]() | ![]() Digital Trust Prese CECURITY.COM, editor of the communicating electronic safe (CFEC) Solution of data protection, dematerialization and legal archiving allows you to respond to these constraints and to keep all types of data in a secure and trust environment. Digital safe, electronic archiving system, dematerialization, personal data protection, digital confidence, electronic invoice, cryptography, encryption, communicating electronic safe, software, and reliable digital copies 137 similar entities Type: SMB Activities: it services privacytech Technologies: Data Analytics | 8 | 53 |
![]() | ![]() Encrypt your cloud, protect your privacy Skymatic is the company behind Cryptomator, an open-source client-side encryption solution for cloud storage. Our focus is on empowering users with simple, reliable tools to secure their data. While Cryptomator is our flagship product, Skymatic is committed to developing privacy-focused software that gives individuals and businesses control over their digital security. 8 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 7 |
![]() | ![]() Get your data protected and privacy ready https://www.secupi.com/ SecuPi Data Security Platform (DSP) and DSPM discovers, monitors, controls access and de-identifies (FPE Encryption/masking) sensitive data cross Cloud and on-prem. It uses agentless Enforcers to apply policies ensuring access to sensitive data is done on a “need-to-know" basis while protecting data at-rest using application/client-side encryption and masking. Top 3 US Banks, US Department of Defense, 4 largest Global Insurance companies, Vodafone and Swisscom to name a few have deployed SecuPi to protect critical data, address ever-growing privacy and sovereignty laws and mitigate the risk of data leaks and breaches. Our patented … 45 similar entities Type: Startup Activities: privacytech it services regtech Technologies: Cybersecurity | 3 | 63 |
![]() | ![]() Pioneering Privacy Enhancing Technology company protecting Data in Use #PrivacyEnhancingTechnologies #DataInUse Enveil is a pioneering Privacy Enhancing Technology company protecting Data in Use. Enveil’s business-enabling and privacy-preserving capabilities change the paradigm of how and where organizations can leverage data to unlock value. Defining the transformative category of Privacy Enhancing Technologies (PETs), Enveil’s award-winning ZeroReveal® solutions for secure data usage, collaboration, and monetization protect data while it's being used or processed. Customers can extract insights, cross-match, search, and analyze data assets at scale without ever revealing the content of the search itself, compromising the security or ownership of the underlying data, … 31 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 9 | 41 |
![]() | ![]() Empowering digital transformations while managing risk with cybersecurity intelligence. SEECRA focused on providing Cybersecurity consultancy and pioneer solutions in collaborations with the most excellent engineering universities and research centres to safeguard governments, financial institutions, and other enterprises from cyberthreats. OUR MISSION: - Enable businesses digital transformations while managing risk with cybersecurity intelligence - Achieve business advantage through improved customer experiences. - To exceed customer expectations for quality, responsiveness, and professional excellence. Cyber Security, Secure Communications, Mobile Application Security, ERP Security, ICS/OT Security, Security Awareness Training, ATM Security System, SCADA Security Assessments, SAP & Oracle Security, Cloud Container Security, SOC, Cybersecurity … 432 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 3 |
![]() | ![]() Build data security into your software or business operations, by default and by design Absio moves data security to the top of the stack with application-level data security solutions and consulting services. Our roots lie in battlefield information-sharing. We apply our military-grade security expertise helping businesses protect data at a time when users carry a wealth of private information in their pockets. PRODUCTS With our simple APIs, coders build privacy and security functionality directly into their software, by default and by design. Protections can be applied to any data created or processed by the application and follow the data anywhere … 72 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity IoT | 0 | 3 |
![]() | ![]() Manage, protect and monitor all your organization's passwords, secrets and remote connections with zero-trust security Manage, protect and monitor all your organization's passwords, secrets and remote connections with zero-trust security Password Management, Secure File Storage, Cyber Security, password security, cybersecurity, password vault, SSO, zero knowledge, secrets management, and remote access 139 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 21 | 538 |
![]() | ![]() Know, Protect & Control Your Data Wherever It Goes - Prevent data theft and achieve regulatory compliance. Protecting the world’s sensitive data wherever it goes. Seclore protects and controls digital assets to help enterprises close their data security gap to prevent data theft and achieve compliance. Our data-centric approach to security ensures that only authorized individuals have access to sensitive digital assets, inside and outside of their organization. Enterprises can set automated policies and enable users to control and revoke who has access, what access they have, and for how long. Learn why leading enterprises like American Express and Applied … 60 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 1 | 473 |
![]() | ![]() Ingram Micro acquired, during 2019, the company Abbakan specializing in Cybersecurity. Thanks to this new feature, our Cybersecurity BU is expanding its range of products. Resellers will find a complete selection of suppliers, covering all IT security issues. SECURITY, NETWORK & ACCESS, STORAGE, WEB, CLOUD, and NETWORK 132 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 7 | 10 |
![]() | ![]() Digitalize the profession of bailiff ADEC is an organization created in 2001 by the National Chamber of Bailiffs (CNHJ) in order to make available to all bailiffs access to dematerialization using IT data exchanges by pooling manufacturing costs. The exchange of computerized data allows institutional and others to communicate with studies, quickly and transparent. To allow these electronic information exchanges, standards have been developed. They cover all the elements exchanged in matters of amicable or judicial recovery, as well as for the transmission of acts and banking information. Secure links have been set up with all customers and partners with … 5 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 2 | 39 |
![]() | ![]() Security, wherever your data is Fortanix is a global leader in data security. We prioritize data exposure management, as traditional perimeter-defense measures leave your data vulnerable to malicious threats in hybrid multicloud environments. Our unified data security platform makes it simple to discover, assess, and remediate data exposure risks, whether it’s to enable a Zero Trust enterprise or to prepare for the post-quantum computing era. We empower enterprises worldwide to maintain the privacy and compliance of their most sensitive and regulated data, wherever it may be. At Fortanix, we bring together the very best people in service of our mission … 59 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 16 | 231 |
![]() | ![]() Eradicate identity theft and credential misuse whilst making it safer, simpler, and easier to manage. Forticode has developed Cipherise, a bi-directional secure digital engagement capability that establishes and maintains trust between customers and the organisations that serve them. Cipherise allows the organisation to prove who they are in every transaction before the user is required to do the same. A cloud-based product with an associated developer toolkit, it is designed to be embedded and owned by the organisation delivering data and transactional sovereignty. Organisations are becoming increasingly conscious of the risks and obligations they inherit in order to provide services … 38 similar entities Type: Startup Activities: it services regtech Technologies: Cybersecurity | 0 | 1 |
![]() | ![]() Silent Circle is a recognized innovator in enterprise privacy delivered through a revolutionary platform of devices, software and services. Our mission is to be the world’s most trusted secure communications company by delivering privacy without compromise. We enable enterprises to regain privacy with their employees, partners and customers in a mobile first world where privacy is nearly extinct. Silent Circle was co-founded by Mike Janke, security expert and former Navy SEAL; Phil Zimmermann, co-founder of PGP, developer of the ZRTP protocol and 2015 inductee into the Internet Hall of Fame; and Jon Callas, creator of Apple's whole disk encryption software … 26 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 11 | 24 |
![]() | Vera Security Always-on File Security that Protects Data Anywhere Vera is the security platform chosen by the Fortune 500 to secure, track, and control sensitive information that needs to be shared externally. With a keen focus on the user experience for employees and security pros alike, Vera can protect any kind of information, no matter how it's stored or shared, anywhere it travels - without affecting how work gets done. With robust policy enforcement, strong encryption, and strict access controls, Vera's data-centric security solution enables teams to collaborate freely while ensuring the highest levels of security, visibility and control. For more information, … Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 17 |
![]() | ![]() Directory and data security. Simplified. Lepide delivers the industry's most effective and affordable data security and governance solution - simple to implement, but powerful in protection. Unlike other vendors, our AI-driven audit reports, permissions analysis, and real-time threat remediation provides enterprise-grade security across file servers and Active Directory - without the enterprise price. Trusted by over 1,000 companies worldwide, Lepide combines cutting-edge technology with intuitive usability, keeping you ahead of risks and regulations with ease. With our Data Security Platform, you can locate and classify your sensitive data, govern access and track permission changes, analyze user behavior to spot anomalies, … 52 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 5 | 197 |
![]() | ![]() The world's first non-profit computer security consultancy company. We believe in transparency and openness. Radically Open Security is the world's first not-for-profit computer security consultancy company! This is an initiative designed to run an ethical computer security consultancy company as a durable front-end for a back-end charitable Foundation (that financially supports Open Source projects, innovative security research, and Digital Rights organizations). 90% of our non-reinvested profits will go to the NLnet Foundation! :-) Radically Open Security was recognized by the Dutch Chamber of Commerce (KvK) as one of the Top 100 Most Innovative SMEs of 2016! For more information, see: … 54 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 3 | 16 |
![]() | ![]() Modern Identity and Access Management company. We provide a suite of products, starting from video identification to user authentication and transaction/document signing. Currently used by some of the largest telecommunication, healthacare, IT and financial service companies. 278 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 5 | 4 |
![]() | ![]() Online Redefined Founded in Luxembourg in 2017, OnePrivacy is a company specialised in the design of infrastructure and software that respects online privacy. Our goal is to build and commercialise products and solutions that confirm to the notion of Privacy By Design. The goal of our project is for the OnePrivacy brand to be the gold standard for protecting business and individual’s rights to privacy. Our innovative solutions show that there is an alternative to the current system, an alternative reality where one does not need to sacrifice one’s right to privacy when using the internet. Cybersecurity, Encrypted Communications, and … 38 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 9 | 4 |
![]() | ![]() Empowering organizations to effectively manage risk in every send, share, receive and save of sensitive content. Kiteworks' mission is to empower organizations to effectively manage risk in every send, share, receive, and save of sensitive data. To this end, we created a platform that delivers data governance, compliance, and protection to customers. The platform unifies, tracks, controls and secures sensitive data moving within, into, and out of their organization, significantly improving risk management and ensuring regulatory compliance on all sensitive data communications. Secure File Sharing, Enterprise Data Security, Regulatory Compliance, Secure BYOD, Private Cloud, Integration with Security Infrastructure, Encryption, Integration … 60 similar entities Type: SMB Activities: it services regtech Technologies: Cybersecurity | 4 | 299 |
![]() | ![]() securing data in motion totemo’s leading security solutions for companies and authorities of all sizes are categorized in the product families totemomail® for email encryption, totemodata® for secure managed file transfer and totemomobile® for secure mobile communication. Our innovative products ensure secure information exchanges via the Internet, and cover the functional areas of secure email, mobile security, secure managed file transfer, and data loss prevention (DLP). Our business success is founded on more than ten years of research and development, several international patents and the FIPS 140-2 validation of our cryptography module. Our security solutions are based on the same … 54 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 2 | 15 |
![]() | ![]() Your Data, Your Rules Using our proprietary process utilising encryption, fragmentation and multi-cloud distribution. To revolutionise data security through a platform to enable people and enterprises to take back control, and ownership and secure custody of their own and their stakeholder’s data. This is achieved through our UK & UK-US-patented process with involves encryption, fragmentation, and distribution across multi-cloud storage solutions that enable business continuity, risk mitigation and enterprises to uphold regulation and compliance. The secure storage of your data is proven through the world's first immutable ledger by providing the user a proof of record on the blockchain. Blockchain … Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 10 | 17 |
![]() | ![]() User-encrypted cloud services MEGA is a global technology company focused on security, privacy and performance for storage and sharing since 2013. Strong, user generated end-to-end encryption guarantees that nobody else will have unauthorised access to your data. Not even us. Our innovative and competitive service offerings have seen more than 250 million users join us. Check us out. You will like what you see. Privacy, Security, Cloud Storage, Encrypted, Communication, secure, collaboration, Chat, Business, Global, Technology, Cloud, MEGA, VPN, Password Manager, Chat, S4, Encryption, and Data Protection 27 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 2 | 181 |
![]() | ![]() Protect Identities. Secure Digital Services Curity is the leading supplier of API-driven identity management, providing unified security for digital services. Curity Identity Server offers a unique combination of API security and identity and access management. it is used for logging in and securing millions of users' access to the web and mobile apps over APIs and microservices. Curity is built upon open standards and designed for development and operations. We enjoy the trust of large organizations in financial services, telecom, retail, energy and government services with operations across many countries which have chosen Curity for their enterprise-grade API security needs. … 17 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 50 |
![]() | ![]() 📁 Unparalleled Peace of Mind through Protection that Travels with your File 🚀 🛡📁 Unparalleled Peace of Mind through Persistent Protection that Travels with your Data 🚀Advanced Information Protection Simplified & State-of-the-art encryption and digital rights management for any file extension. With SealPath you will gain peace of mind, knowing that your digital data assets are encrypted. Our solutions deploy a layer of security that accompanies the data at all times, ensuring protection and controlling remotely the permissions on them. Minimal Resources and Time Needed, the most user-friendly solution on the market. SealPath is a European company based in Spain … 31 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 6 | 24 |
![]() | ![]() EMPOWERING YOUR DIGITAL FUTURE Data grows at an exponential speed. Data security has become crucial for digital companies and their products. Alice&Bob.Company shields what is key: your data. We transform and mature your cloud implementations to sensitive data production platforms. To make the digital world a safer place. Cloud, IT Security, AWS, Public Cloud, Kubernetes, DevOps, DevSecOps, Security Champions , Well Architected Framework, Shift Left , Container, Data Security, Big Data, Hadoop, Thread Modeling, Penetration Testing, Security Assessment, Security Champions Program, Managed Security Service, Data Protection, CISO, ISM, PCI DSS, Iso 27001, IT Grundschutz, and EU-US Privacy Shield 130 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 5 | 18 |
![]() | ![]() Leading the way in Confidential Computing for secure & trusted applications. MADANA – Leading the way in Confidential Computing for secure & trusted applications We are a Cyber Security company from Berlin utilizing various new technologies, such as Confidential Computing and Blockchain technology, in order to enable secure and trusted applications. Our patented solution enables privacy-preserving Data Processing, which is a major breakthrough in the encryption of “Data in Use” and allows participants to establish secure and trusted applications while in runtime. We enable companies to make better use of data and acquire more unique insights through the use of … 67 similar entities Type: Startup Activities: privacytech it services Technologies: Blockchain/Cryptocurrency Cybersecurity Data Analytics | 9 | 4 |
![]() | ![]() Empowering organizations to effectively manage risk in every send, share, receive and save of sensitive content. Kiteworks' mission is to empower organizations to effectively manage risk in every send, share, receive, and save of sensitive data. To this end, we created a platform that delivers data governance, compliance, and protection to customers. The platform unifies, tracks, controls and secures sensitive data moving within, into, and out of their organization, significantly improving risk management and ensuring regulatory compliance on all sensitive data communications. Secure File Sharing, Enterprise Data Security, Regulatory Compliance, Secure BYOD, Private Cloud, Integration with Security Infrastructure, Encryption, Integration … 70 similar entities Type: SMB Activities: it services regtech Technologies: Cybersecurity | 1 | 290 |
![]() | ![]() Security Without Compromise Strategic, tactical, and technical consulting services and the Eidola technical automation platform. Consented surveillance through transparency, reciprocity and proportionality - AuthC in concert with 0PN nee The Open Consent Group and Surveillance Trust Physical Security, Surveillance, Machine Vision, Automation, Intelligent Infrastructure, Privacy, Cybersecurity, and Identity and Access Management 118 similar entities Type: SMB Activities: privacytech Technologies: Cybersecurity | 1 | 2 |
![]() | ![]() Zero Trust Data Security and Privacy Fasoo provides zero trust data security and AI-powered enterprise content platforms that enable organizations to discover, classify, protect, control, trace, and analyze critical information assets while enhancing productivity. Since 2000, Fasoo has helped customers create a secure information-sharing environment and simplified secure collaboration internally and externally. Its advanced EDRM (Enterprise Digital Rights Management) and DSPM (Data Security Posture Management) solutions secure millions of users across more than 2,000 organizations worldwide, serving leading firms in various industries, including business services, energy, financial, healthcare, insurance, manufacturing, legal, retail and public sectors. Fasoo addresses today’s security challenges, … 95 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 4 | 118 |
![]() | ![]() Becrypt is a leading provider of high assurance cyber security products and services. With a heritage of creating National Cyber Security Centre certified products, Becrypt is a trusted provider of endpoint cybersecurity software solutions. We help the most security conscious organisations to protect their customer, employee and intellectual property data. Our client base includes governments (central and defence), public sector, critical national infrastructure organisations and SMEs. Learn more at www.becrypt.com. Please contact HR@becrypt.com, 0845 838 2050 if you are interested in joining a great team with competitive salary and benefits. IT security, Data protection, Encryption software, Secure remote access, Thin … 138 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 4 | 70 |
![]() | ![]() We connect you to the cloud - easy, secure, customizable, compliant! eperi – Privacy is the starting point We believe that data privacy is a fundamental human right. Our aim is to allow people to always stay in control over their data. Without compromises and with the best technology. With the customer at the center, we have created a solution that is invisible to the user while meeting the highest security standards. With the eperi solution, companies benefit from all the advantages of Cloud usage, e.g. efficient company-wide collaboration – while staying legally compliant according to worldwide data protection laws. … 34 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 4 | 26 |