Search in entities 1
Entities
LogoName Σ Employees
 Alta Associates | Diversified Search Group Alta Associates | Diversified Search Group

Let us build your leadership team in Information Security, IT Risk Management and Transformational Technology Since 1986, Alta Associates has been widely acknowledged as the leading boutique executive search firm specializing in Information Security, Cybersecurity, and IT Risk Management, thus helping companies build resilient workforces. In 2022, Alta Associated became part of Diversified Search Group. Learn more at https://diversifiedsearchgroup.com/alta-associates/. Cyber Security, GRC, IT Risk Management, Privacy and IT Governance, Information Security, Technology, Transformational Technology, CISO, and Diversity

37 similar entities Type: SMB Activities: hrtech privacytech Technologies: Cybersecurity

16 5
Dashlane Dashlane

Intelligent Credential Security Dashlane provides complete credential security, protecting businesses against the threat of human risk. Our intelligent OmnixTM platform unifies credential protection and password management, equipping security teams with proactive intelligence, real-time response, and protected access to secure every employee. Over 25,000 brands worldwide, including leading enterprises such as Michelin, Sephora, Air France, and Forrester, trust Dashlane for industry-leading innovations, patented zero-knowledge security, and an unmatched user experience. internet, InfoSec, information security, data protection, and information technology

Type: Startup Activities: privacytech fintech Technologies: Cybersecurity

23 311
ACESO-Conseil ACESO-Conseil

Aceso Conseil supports its customers on various subjects around cyber security and data protection: - Cyber / GDP awareness - Cyber maturity audit - CYBER PROGRAMS - RSSI or DPO support - Popularization of European regulations to come and identification of the strategy to be deployed (DSA / DMA / DA / Cyber Security Act / Cyber Resilience Act ...) Cybersecurity, GDPR, and governance

417 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 1
Eternilab Eternilab

Cybersecurity for and by humans. Eternilab offers advice, expertise and training in the security of networks and information systems. IT security, computer networks, and reliable and secure software development

444 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 7
GreenLock Advisory GreenLock Advisory

Offensive security & Threat Intelligence GreenLock Advisory is an independant consulting firm created in 2015. We are offering several expertises on cyber-security: - Penetration testing - Architecture review - Threat intelligence/hunting - Automation of Security Operations - Vulnerability management cybersecurity, audit, security, threat intelligence, vulnerability management, and Automation

308 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 1
Technica Corporation Technica Corporation

Innovation in Action Technica supports the defense of the nation’s critical networks and systems through the application of advanced solutions for cyber operations that improve the speed and effectiveness of cyber missions. Since 1991, Technica has been providing high-end system engineering services to Defense, Intelligence, Law Enforcement, and Federal civilian agencies. With groundbreaking R&D, Technica’s senior scientists and engineers find new, innovative ways to solve complex problems to address today’s Cyber Warfare challenges by leveraging Systems Architecture & Integration, DevSecOps, IT Service Management, AIOps, Machine Learning, Artificial Intelligence, and high-performance computing to support its customers. Systems Engineering, Software Development, Product …

59 similar entities Type: SMB Activities: it services military Technologies: A.I. A.I. - Machine Learning Cybersecurity

7 226
Shape Security Shape Security

Now part of F5, Shape Security protects web & mobile apps of top companies against bots, fraud, and unwanted automation. Shape Security was acquired by F5 in January 2020, joining forces to transform how we defend the world’s applications against abuse and fraud, prevent reputational damage, and stop disruptions to critical online services. Follow F5 for the latest updates. cybersecurity, infosec, fraud, cybercrime, AI, artificial intelligence, machine learning, credential stuffing, account takeover, and security

6 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I. A.I. - Machine Learning

0 47
Unit21 Unit21

The Customizable No-Code Risk & Compliance Platform Unit21 helps protect businesses against adversaries through a simple API and dashboard for detecting and managing money laundering, fraud, and other sophisticated risks across multiple industries. Fraud Prevention, Fraud Detection, Anti-Money Laundering, Transaction Monitoring, Case Management, SAR filing, CTR filing, AI Risk Scores, and No-Code Rules Engine

36 similar entities Type: Startup Activities: regtech Technologies: A.I. SaaS

1 109
Actuate Actuate

Actuate turns any security camera into a smart camera to keep people safe. Actuate employs artificial intelligence to turn any security camera into a smart camera that automatically identifies threats like intruders, firearms crowds, and more in real-time. security, artificial intelligence, software, and machine learning

58 similar entities Type: Startup Activities: it services Technologies: A.I. A.I. - Machine Learning Cybersecurity

3 43
Bastion Technologies Bastion Technologies

Security-first Compliance At Bastion, we're changing the way modern companies secure their software. We enable fast-moving tech teams to build secure, compliant applications from day one—without sacrificing speed. By combining automated compliance, built-in security tooling, and expert guidance, Bastion delivers an all-in-one solution tailored for startups and scale-ups. Designed by security engineers for today’s engineering teams, Bastion is trusted by some of the fastest-growing companies to stay secure and audit-ready—without slowing down. Build fast. Stay secure. Security, Cybersecurity, Technology, and SaaS

118 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

8 19
LunConnect LunConnect

From a single platform allowing the verification of the identity of the Net surfers & the security of the transactions, LUNConnect drives several commercial brands destined to various sectors of activity allowing to improve the connection between the people .: - LUNConnect for sharing, dating and classified ads websites - MySweetSilver for Silver Economy - LUNConnectPRO for security and multi-service companies LUNConnect is a trademark of LUNC SAS

Type: Startup Activities: it services silvertech Technologies: Cybersecurity

0 N/A
Secureware France Secureware France

Secureware est une société spécialisée dans la cybersécurité : Firewalls Next Gen, EDR, IPv6, anti-phishing, ... Secureware is a company dedicated to protecting companies of all sizes from emerging threats. We are also active in the fields of hyperconvergence. Secureware has a wolrdwide coverage and in fact is doing most of its business in Africa. Firewalls and Hyperconvergence

55 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 26
Network Intelligence Network Intelligence

Cybersecurity service provider specializing in Security Assessments,ISO27001,PCI DSS,MSS, ICS Security & Cloud Security Leading provider of digital security services to clients across the globe. Our service portfolio covers Managed Detection and Response, Vulnerability Management, Risk Management, Privacy and Compliance, as well as an expansive portfolio of training programs. Information Rights Management, Penetration Testing, Vulnerability Assessment, Web application security, DLP, PCI DSS, ISO 27001, SCADA Assessment, Risk Assessment, Breach Response, Compliance, CoBIT, PA DSS, Sharepoint Security, DDos, MDM, 2FA, WAF, DAM, SOC, Managed Security Services (MSS), SWIFT CSP Audit, Cloud Security, and ICS security

271 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity

2 665
Clinicmaster Clinicmaster

There for those who care Clinicmaster has all the tools you need to run and grow your business, while ensuring your clients’ data remains safe and confidential on Microsoft Azure servers – some of the most secure and compliant servers in the world. Scheduling, Financial, Document Management, Security & Audit, Stats & Analysis, EMR, Automation, Compensation, Security & Audit, Client Relationship Management, Patient File Management, Email Marketing, Text Messaging, Backups, Web Appointments, and Client Web Portal

58 similar entities Type: SMB Activities: martech Technologies: Cybersecurity

2 8
InfoWatch InfoWatch

InfoWatch is a European Software Company, Leader In Intellectual Data Protection Solutions. Once a small Kaspersky Lab project in Russia, it is now a group of companies with outstanding reputation for protecting global ogranisations against various information security threats. We have been active in the information security business for more than 10 years and have experience in implementing extremely complex solutions at the largest companies and in government agencies. Thousands of large businesses successfully use InfoWatch solutions in countries such as Southeast Asia, Western Europe, the Middle East, India, and Russia, CIS. DLP (Data Leakage Prevention), Encryption software, linguistic technologies …

59 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

2 215
Endpoint Protector - now part of Netwrix Endpoint Protector - now part of Netwrix

Easy to use, multi-OS Data Loss Prevention Endpoint Protector by CoSoSys (now part of Netwrix) is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks, protects from malicious data theft and offers seamless control of portable storage devices. Its content inspection capabilities for both data at rest and in motion range from predefined content based on dictionaries, regular expressions, and machine learning to profiles for data protection regulations such as GDPR, HIPAA, CCPA, PCI DSS, etc. network-endpoint-protection-solutions, applications-for-portable-storage-devices, data-loss-prevention, DLP, IT-Security, security, endpoints, device-control, Enterprise-Mobility-Management, Content-Aware-DLP, and eDiscovery

Type: SMB Activities: it services privacytech Technologies: A.I. A.I. - Machine Learning Cybersecurity

3 108
NEXECUR NEXECUR

Specialist in remote monitoring, alarm systems and remote assistance for almost 40 years, Nexecur is committed to your security based on experience and knowledge of your needs. A subsidiary of Crédit Agricole, Nexecur develops efficient solutions that ensure effective and continuous protection of your company, guaranteeing the security of your employees. Remote monitoring, video surveillance, video protection, access control, technical alarms, fire detection, intrusion detection, and fog generator

59 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

9 394
SecludIT - Ahead of Security SecludIT - Ahead of Security

Founded by security experts together with EURECOM, a French research institute in telecom and network security, SecludIT has developed Elastic Security, a set of products and services specifically designed to help cloud infrastructure providers and users to safely migrate to the cloud. Since its creation in 2011, SecludIT has become a recognized industry player, one of the Cloud Security Alliance founders and active member, co-author of Security Best Practices 2.1. SecludIT is a technology partner of Amazon Web Services, HP Cloud, VMware and Eucalyptus. Cloud Computing, Security, IaaS, Monitoring, Automation, Vulnerability Assessment, Audit, Amazon Web Services (AWS EC2 & VPC), …

73 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 1
Dedge Security Dedge Security

Web3 Security Posture Management Dedge is the first Web3 security posture management solution for the new ecosystem. Our unique approach integrates asset discovery, risk identification, and production monitoring, enabling enterprises and web3 digital-native companies to expand their security perimeter and accelerate their business with confidence.

53 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

14 10
Suspect Technologies Suspect Technologies

Law-Enforcement at the speed of life Suspect Technologies aims to continuously improve the security, safety of people by using computer vision technology. Its solutions enhance the collective values of security, safety, efficiency and convenience. Our AgentAI platform assists law enforcement agencies by accelerating and enhancing their ability to protect, investigate, alert, and report. Face Recognition, Video Analytics, Video Redaction, Deep Learning, Law Enforcement, Security and Surveillance, and Public Safety

66 similar entities Type: Startup Activities: it services Technologies: A.I. A.I. - Deep Learning A.I. - Image Processing

0 13
Kenna Security Kenna Security

Kenna is now Cisco Vulnerability Management Kenna is now Cisco Vulnerability Management. Learn more: https://www.cisco.com/site/us/en/products/security/vulnerability-management/index.html security, SaaS, vulnerability management, vulnerability intelligence, threat management, and information security

109 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 20
CrowdStrike Falcon Surface (formerly Reposify) CrowdStrike Falcon Surface (formerly Reposify)

A Gartner Emerging Vendor for EASM, Reposify’s external attack surface management (EASM) platform pinpoints unknown, exposed internet-facing assets so security teams can best secure their digital perimeter. Our intelligent internet mapping technology takes all environments of an organizations’ digital footprint into account for full-spectrum perimeter security, with no agents or deployment required. Having indexed billions of digital assets since 2016, Reposify’s proprietary internet mapping technology leverages big data to identify historical trends critical to an organizations’ security posture. Whether assets are on premise, in the cloud or housed across supply chains and subsidiaries, nothing is left unknown. All exposed assets …

52 similar entities Type: Startup Activities: it services Technologies: Cybersecurity Data Analytics IoT

0 13
IPVM IPVM

Security Technology Research IPVM is the world's leading authority on physical security technology covering video surveillance, access control, weapons detection and more; delivering unmatched reporting, research, and test results. Dedicated to independent and objective information, we uniquely refuse any and all advertisement, sponsorship and consulting from manufacturers. We provide the best physical security analysis, testing and training for thousands of subscribers globally. Video Surveillance, IP Cameras, Video Analytics, Facial Recognition, VSaaS, Fever Cameras, and Temperature Screening

69 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

4 53
BluVector, A Comcast Company BluVector, A Comcast Company

We’re continuing our commitment to advanced threat detection as part of Comcast Technology Solutions. We’re continuing our commitment to advanced threat detection as part of Comcast Technology Solutions. Discover how we’re working together to empower security teams to protect their network with better security data. Cybersecurity, Machine Learning, Incident Response, malware detection, network intrusion detection, ai, network security, and fileless malware

136 similar entities Type: Startup Activities: it services Technologies: A.I. A.I. - Machine Learning Cybersecurity

15 12
SEALSQ SEALSQ

Semiconductors, PKI & Post-Quantum Security Solutions SEALSQ develops the next generation quantum-resistant Semiconductors, PKI and Related Trust Services Semiconductors , Cybersecurity, PKI, Post-Quantum, Digital Security, Trust Services, Smart Card, and NFC

72 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

6 46
IFSEC IFSEC

Fuelling security leaders with the expertise and innovation to keep people and assets safe #AnticipateLDN Fuelling security leaders with the expertise and innovation to keep people and assets safe #AnticipateLDN Security, Integrated Security, Access Control, Video Surveillance, Intelligent Buildings, Intruder Alarms, Perimeter Protection, Fire Safety, Cyber Security, Home Automation, and Safety

72 similar entities Type: SMB Activities: constructiontech smart home Technologies: Cybersecurity

7 6
B&G Entrance Control B&G Entrance Control

KEEP WORRIES OUT B&G is one of the European market leaders in site security and supplies its products to countries both inside and outside of Europe. We offer a complete package of products and services in the field of perimeter security. Every site – with its own unique security needs – can be secured based on your wishes. Terreinbeveiliging, Hekwerk, Poorten, Toegangscontrole, and Toegangsbeheer

71 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

1 121
JASK (now Sumo Logic) JASK (now Sumo Logic)

The Modern SOC Company JASK is modernizing security operations by delivering an advanced SIEM platform that provides better visibility, better automation and a better architecture. Built on cloud-native technologies, the JASK ASOC platform streamlines security analyst workflows by automating many of the repetitive tasks that restrict productivity, freeing them for higher-value roles like threat hunting and vulnerability management, while addressing the escalating talent shortage. Cyber Security, Security Analytics, Artificial Intelligence, Security Operations, SIEM, and Cloud

83 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I.

2 13
XBOW XBOW

Boosting offensive security with AI XBOW brings AI to offensive security, augmenting the work of bug hunters and security researchers. It autonomously finds, exploits and reports vulnerabilities in web applications. It is the first product that passes 75% of web security benchmarks with zero human intervention.

59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I.

2 43
Scytale.io, acquired by Hewlett Packard Enterprise company in 2020 Scytale.io, acquired by Hewlett Packard Enterprise company in 2020

Scytale, acquired by Hewlett Packard Enterprise company in 2020. Scytale was originally started in 2017 by seasoned engineers from Amazon Web Services, Google, Okta, PagerDuty, Splunk, and Duo Security who want to help enterprise engineers securely and easily build identity-driven, large-scale distributed software systems. Distributed Systems, Information Security, Networking, Cloud Computing, Containers, Identity, Authentication, and Authorization

57 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

3 4
QuoIntelligence QuoIntelligence

Our Finished Intelligence, tailor-made for your organization QuoIntelligence informs decision-makers of current and potential cyber and geopolitical threats by providing customized Finished Intelligence reports. Our team of experts provides full contextual analyses to produce top-quality Intelligence and to better enable organizations to mitigate risk. By prioritizing customer requirements, we ensure our products close real security gaps, support risk management, and facilitate early detection. Threat Intelligence , Digital Risk , Cybersecurity , Supply Chain Security , Network Security , Brand Abuse Monitoring , TIBER-EU, TIBER-DE, Security Risk Intelligence , Brand Protection, Data Leakage , Cyber Monitoring, Digital Risk Monitoring, Infrastructure Exposure, …

63 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

4 42
Vendict Vendict

GRC made simple Vendict revolutionizes GRC with cutting-edge security language expertise. We provide the best AI-native solutions for governance, risk and compliance by building trust through automating tasks like audit preparation, Third-Party Risk Management, Knowledge Management, and Response Automation. Discover how leading companies leverage AI to streamline workflows, simplify compliance, and effortlessly build trust with Vendict. Compliance, Data Protection, Data Privacy, Third-party Vendor risk, GRC, Security Questionnaires, and Cyber

94 similar entities Type: Startup Activities: it services regtech Technologies: Cybersecurity A.I.

3 49
ArcanSecurity ArcanSecurity

Arcansecurity develops an innovative authentication solution without passwords to simplify the connection path of a user while improving the level of security. Security, Authentication, Cryptography, Software Development, and Cloud

234 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

4 1
METABUG METABUG

A Machine Fuzzing Company Metabug designs algorithms to automatically search for vulnerabilities in software. cybersecurity, artificial intelligence, fuzzing, automation, IT, and technologies

60 similar entities Type: Startup Activities: it services Technologies: A.I. Cybersecurity A.I. - Machine Learning

1 3
defants defants

Collaborative & Automated Solutions We develop collaborative and automated solutions to accelerate DFIR and Threat Hunting missions through our semantic investigation-based approach. Cybersecurity, Software-as-a-Service, Incident Response, Digital Forensic, Incident Anticipation, Threat Intelligence, Managed Services, Threat Hunting, and Education

85 similar entities Type: Startup Activities: it services Technologies: Cybersecurity SaaS

37 17
PROTECPéO PROTECPéO

Manual / Automatic Customer Counters real time Protecpeo, actor of your safety on Perpignan and the Pyrenees Orientales, presents its intrusion alarm solutions in Perpignan and fire alarm or smoke detectors in Perpignan, video protection and video surveillance in Perpignan, anti -theft portico, emergency alert, access control, automatisms, interphonies and multi -mock. Intrusion alarm, fire alarm, smoke detectors, video protection, anti -theft gantry, home support, access control, automation, and interphonia

60 similar entities Type: SMB Startup Activities: connected commerce retail Technologies: Cybersecurity

8 4
Masergy Masergy

As a pioneer in software-defined networking, Masergy is a leading secure cloud networking platform for global businesses. Acquired by Comcast Business in 2021, Masergy leverages artificial intelligence to enable superior application performance, offering SD-WAN, Security, UCaaS, and CCaaS solutions. Managed WAN, MPLS, VPLS, Software Defined Networking, Bandwidth On Demand, Network Behavioral Analysis, Advanced Managed Security, Compliance Testing, Security Audits, Cloud Unified Communications, SIP trunking, Hosted Call Center, cloud contact center, Managed SD-WAN, UCaaS, Endpoint Detection and Response, Managed Detection and Response, Networking, Network, SASE, and SDWAN

58 similar entities Type: SMB Activities: it services Technologies: A.I. Cybersecurity

16 579
Tufin Tufin

The Security Policy Company That Makes Security Manageable. Tufin simplifies and automates the security policy management of some of the largest, most complex networks in the world, centralizing control across thousands of firewall and network devices and hybrid cloud infrastructures. Network security policy orchestration, Firewall policy management, Enterprise security, Compliance, Governance, NGFW, Network, NERC CIP, Optimization, PCI DSS, Risk assessment, Cloud platforms, Application connectivity management, Hybrid Cloud Security Management, DevSecOps, Security Policy Automation, and Digital Transformation

59 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

6 479
OMVAPT OMVAPT

InfoSec by Consciousness OMVAPT OÜ is an Information Security company based out of Tallinn, Estonia – The Silicon Valley of Europe. We analyse the entire security posture of your organisation from the malicious adversary’s perspective with the intent to ensure business continuity and build resilience by remediating. We Perform Black Hat Penetration (PT) and Comprehensive Vulnerability Assessment (VA). Vulnerability Assessment, Penetration Testing, Digital Forensics, Vulnerability Management, Offensive Security, Information Security, OffSec, InfoSec, VAPT, VA, PT, Black Hat PenTest, Cyber Security, CyberSec, Network-Level Penetration Testing, Ethical Hacking, Web Application Penetration Testing, Dynamic Application Security Testing, Run-Time Application Security Testing, iOS Penetration …

68 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 5
Marmalade Box Marmalade Box

We are an information security practise, combining marketing skills and experience with behavioural science to deliver security awareness, behaviour and culture solutions which make a demonstrable difference. Information Security, Personal Development and Training, Governance, Risk and Compliance, and Employee Education and Awareness

232 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

5 N/A
ErediX ErediX

Eredix is ​​an IT security company based in Saint Omer offering training, security audit, and penses Eredix is ​​a computer security company based in Saint Omer in Hauts de France. We are specialized in training, audits and penses (intrusion test in your systems) for companies, public organizations and communities. Our consultants have recognized expertise and appreciated professionalism from our customers. Cybersecurity, IT security, and security of the IS

237 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

1 1
ANAVEO GROUPE ANAVEO GROUPE

Towards a new experience increased by your unified safety Pioneer of responsible security increased security, Anaveo creates intelligent perceptual systems that allow you to know the reality of your environments and to anticipate anomalies to make them places of confidence and efficiency: see, know, predict. Anaveo is more of: • 200 secure and valued data of data • 600 experts at your service and a network of local agencies • 15 000 clients dans tous les secteurs d'activité • 500,000 intelligent connected objects • 5,000 projects installed annually • 300,000 logistics flows per year • 100,000 annual interventions • 97% …

62 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

4 359
Scalys Scalys

Security at the Edge. Improve security in information technology (IT) and operational technology (OT) environments. Scalys is a leading innovative company to improve security in information technology (IT) and operational technology (OT) environments. Core competences are Cybersecurity, end-to-end security, high-performance communication and secure networking. Scalys delivers enterprise class performance and quality for products like a broadband router, edge gateway, firewall, VPN and other networking communication solutions. Embedded Systems, IoT, Cybersecurity, Secure Networking, End to End Security, High Performance Communication, AI/ML, Confidential Computing, Edge Computing, Azure, IoT Edge, Open Enclave, Building Management Solutions, Security at the Edge, Zero Trust, Enclaves, and …

70 similar entities Type: Startup Activities: it services deeptech Technologies: Cybersecurity A.I. A.I. - Machine Learning IoT Embedded Systems

5 5
Malizen Malizen

Software to reveal the dangers hiding in your data and teach AI to find them. Data visualization to better explore and understand complex cybersecurity data. Machine learning algorithms to support and multiply the capacities of teams. A full visual environment to boost your cybersecurity teams. Dataviz, Deeptech, Cybersecurity, Cyberinvestigation, Start up, Frenchtech, Threat Hunting, SOC, and CERT

56 similar entities Type: Startup Activities: deeptech it services Technologies: A.I. A.I. - Machine Learning Cybersecurity Data Analytics

28 8
BullGuard BullGuard

BullGuard is part of Gen — a global company powering Digital Freedom with a family of trusted consumer brands. Learn more about us at GenDigital.com. internet security, antivirus, mobile security, mobile protection, identity protection, vpn, small office security, endpoint security, and antimalware

202 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

8 23
Sysdream Sysdream

A 360 ° security expertise: audit, training, cyber-training, SAF security, SOC & AMP; CERT - www.sysdream.com About SYSDREAM: Founded over 20 years ago, Sysream, a cybersecurity subsidiary of the HUB One group, offers public and private accounts a global offer of sovereign solutions covering all the needs for securing the IS: training, audit & amp; The Council, the Soc managed 24/7. Thanks to its recognized expertise in critical environments, Sysream offers all organizations solutions to help them meet cybersecurity challenges, guaranteeing accessibility to the highest security standards (qualifications issued by ANSSI): PASSI qualification (providers of information security of information systems); …

59 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

2 58
Intrinsec Intrinsec

Notre métier ? Protéger le vôtre Intrinsec is focused on Information Security. Delivering security services since 20 years, the company is focused on building services & offers for a better protection of its customers & partners business. Information Security, Audit, Penetration testing, Consultancy, SOC, CERT, MSSP, Threat Intelligence, Incident Response, Forensic, Red Team, Purple Team, MSSP, CISO, Shared-Time CISO, Awareness, FR/EU Compliance, Data leaks, CTI, Threat Hunting, Crisis management, EDR, MDR, and Vulnerability management

148 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

9 246
Caribbean Solutions Lab Caribbean Solutions Lab

Global Intelligence - Regional Perspective Caribbean Solutions Lab (Cayman Islands), award-winning, purveyors of cybersecurity, training, professional and managed services to the English and Dutch Caribbean since 2007. McAfee, FireEye, Education, Training, System Security, Network Security, Data Security, Content Security, Mobile Security, Professional Services, Cybersecurity, EDR, NDR, XDR, Vulnerability Managment, Tenable, Meraki, Managed Services, SIEM, Audit, Cylance, MFA, Threat Intelligence, Compromise Assessment, BCDR, Vectra, MSSP, Zero Trust, Cloud Security, and Trellix

193 similar entities Type: Startup Activities: edtech it services Technologies: Cybersecurity

41 4
AUTOCRYPT AUTOCRYPT

Securing connected, autonomous mobility Began in 2007 as the automotive security division of Penta Security Systems Inc., AUTOCRYPT spun off in 2019 as it became a global leader in autonomous and connected mobility security technologies, paving the way for the new age of automobile and mobility through a multi-layered, holistic approach, with security solutions for V2X/C-V2X, V2G (including PnC security), in-vehicle system, and fleet management (including MaaS and DRT development). Recognized by Forbes Asia in its 100 to Watch list and by TU-Automotive as the Best Auto Cybersecurity Product/Solution, AUTOCRYPT ensures that security is prioritized before vehicles hit the road. …

56 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 171
ISSROAD ISSROAD

Support companies and institutions in the informed and secure implementation of digital solutions. Passionate about technology and Cybersecurity, we offer high value-added services, from cyber governance to cyber managed services, including integration and training on cybersecurity technologies and solutions. IAM, PAM, Data Governance, Office 365 Security, SSO, MFA, ISO 27001, SIEM, EDR, ESET, MIM, BeyondTrust, Microsoft, SOC, Sensibilisation Cybersécurité, Scan de vulnérabilité, SOAR, Infogérance, and Infrastructure IT

642 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

2 6
Ingram Micro Security - France Ingram Micro Security - France

Ingram Micro acquired, during 2019, the company Abbakan specializing in Cybersecurity. Thanks to this new feature, our Cybersecurity BU is expanding its range of products. Resellers will find a complete selection of suppliers, covering all IT security issues. SECURITY, NETWORK & ACCESS, STORAGE, WEB, CLOUD, and NETWORK

132 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

7 10
SecBI - Universal XDR (Acquired by LogPoint) SecBI - Universal XDR (Acquired by LogPoint)

eXtended Detection and Response SecBI has evolved the traditional siloed approach in cybersecurity to an XDR Platform for a cross-product integration of network, endpoints, and cloud security tools to deliver automated smart threat detection and response. Without the need for agents, SecBI’s XDR maximizes organizations’ investment in their existing security tools and provides end-to-end protection, including against stealthy, low and slow attacks that cost organizations dearly. SecBI is currently used by financial institutions, telecoms, retailers, and manufacturing enterprises worldwide. For more information, visit: www.secbi.com or write: info@secbi.com Security Operations Centre SOC, Investigation, Cyber Security, start up, Advanced Threat, Threat Detection, …

53 similar entities Type: Startup Activities: it services Technologies: A.I. A.I. - Machine Learning Cybersecurity

0 3
Brightside AI Brightside AI

Brightside AI - Swiss cybersecurity SaaS that helps teams combat AI-enabled phishing threats. Protect your team today! We’re Brightside AI - A Swiss cybersecurity company that helps businesses protect themselves from personalized AI attacks and make employees aware of real-life threats that are applicable to them personally.

50 similar entities Type: Startup Activities: it services Technologies: A.I. Cybersecurity

3 9
SEON SEON

Your first line of defense against fraud & money laundering. Keep up-to-date with the latest threats and cutting-edge solutions to ensure sustainable growth and a secure future. Stay ahead of the curve with actionable strategies that build resilience and protect your business. fraud prevention, device fingerprinting, predictive analysis, cyber intelligence services, email analysis, risk scoring, machine learning, fraud detection, fraud management, and fraud API

69 similar entities Type: Startup Activities: it services Technologies: A.I. - Machine Learning Cybersecurity A.I. Data Analytics

16 275
CHACK - Protection informatique CHACK - Protection informatique

Cybersecurity solutions, services and training for SMEs /ETIs Chack is a service company offering computer security support solutions through, RSSI time in time shared or à la carte, safety audits, intrusions tests (Pentest), training, development of activity plans, from support and management to GDPR compliance as well as CYBER (EDR, XDR, SIEM) tools managed.

206 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

2 1
Giskard Giskard

Testing platform for securing AI Agents We provide a holistic testing platform for AI systems, for enterprise teams to control all risks related to AI. Founded in 2021, we’re backed by co-founders of HuggingFace and Mistral; and our product is trusted by major enterprises including AXA, Société Générale, BPCE and Michelin. AI, ML, Quality, Risk, LLM, Security, LLMOps, GenAI, and Safety

62 similar entities Type: Startup Activities: it services Technologies: A.I. Generative A.I. A.I. - Machine Learning A.I. - Natural Language Processing

51 26
neo InSys neo InSys

Neo Insys is an integrator specializing in the implementation of safety, security and video surveillance solutions. We customize our systems according to your needs and ensure their maintenance with passion, skill and quality of service. Neo Insys' core business is the integration of safety and security systems. Our internal design office designs network, hypervisor, access, anti-intrusion and video protection control systems most suited to your needs. We set up this equipment around your communication networks to ensure perfect interoperability between your different systems. Neo Insys provides you with a preventive, curative and scalable maintenance service to guarantee the optimal efficiency …

58 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 8
digital.security digital.security

digital.security is now an Eviden business Founded in 2015 by a group of IT security experts with the support of the Econocom Group, digital.security (~ 230 experts) aims to offer companies and government organisations advanced audit and consulting services and a CERTTM dedicated to the IoT ecosystem. Our experts have strong expertise in providing Integration & Projects (SSO, IAM, IAG, PKI, privilege management, Logs collection, analysis and management Data compliance solutions), and also in Operational Security (outsourcing, security services center operations, SOC & SIEM management). Audit, IoT, IAM, SSO, Security, Pentesting, BugBounty, DLP, Consulting, CERT, CSIRT, RedTeam, SOC, SIEM, DFIR, …

337 similar entities Type: SMB Activities: it services Technologies: IoT Cybersecurity

0 63
Panorays Panorays

Third-Party Cybersecurity, Shaped for Your Risk DNA Panorays is a leading provider of third-party cyber risk management solutions, helping businesses optimize their defenses for each unique third-party relationship. Trusted by the most complex supply chains in the world, Panorays provides businesses the tools to stay ahead of any emerging third-party threats and provides actionable remediations. Information Security, Security as a Service, third party security risk management, vendor cyber risk, third party security platform, cybersecurity risk ratings, vendor risk management, and third-party risk management

56 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

3 120
RECIPROC-IT RECIPROC-IT

#SecurityRiskmanagement #Cybersecurity #EbiosRisqueManager #OligoRiskManager #DORA #NIS2 Reciproc-it is an Information Security System Consulting Firm. Our main activities are based on giving guidance to protect the data and information, by ensuring their integrity, confidentiality, availability and auditability It’s also a matter of helping our customers in managing and processing their IT projects in well framed way by using the adequate methodology Information System Security, IT Projects management, Cybersecurity, risk management, consulting, and Compliance

413 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

6 9
Microsoft Security Microsoft Security

Protecting people and data against cyberthreats to give you peace of mind We are prioritizing security above all else through our Secure Future Initiative (SFI). Explore SFI principles, pillars, and progress here ⬇️ Security, Information protection, Identity, Compliance, Zero Trust, Remote Work, Threat protection, Access management, Microsoft Azure, Microsoft 365, Cloud app security, Secure application development, MCAS, CASB, Cloud access, Machine learning, and Cybersecurity

68 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity A.I. A.I. - Machine Learning

2 N/A
OutThink OutThink

Cybersecurity human risk management platform for enterprises that reduces human-initiated security incidents by 78%. Move from traditional security awareness to high user engagement and adaptive security with the world’s first AI-native cybersecurity human risk management platform. Built by a team of visionary CISOs, security experts and researchers, OutThink protects enterprise organizations by putting humans at the heart of security operations. Cyber Security, Security Education, Information Security Awareness Training, Startup, Cyber Risk, Human Vulnerability Management, Human Risk Intelligence, Phishing, Cyber Security Awareness Training , IT Managed Services , SaaS, and Phishing Simulations

83 similar entities Type: Startup Activities: it services Technologies: Cybersecurity SaaS

18 54
SenseOn SenseOn

SenseOn hyperautomates threat detection and response, giving you unparalleled visibility and protection. SIEMLess Outcomes with the SenseOn Intelligence Cloud. Traditional SIEMs bury you in logs and hidden costs. SenseOn's AI-driven approach cuts through the noise - reducing risk, speeding up response, and slashing your security spend. Cyber, Cyber Defence, Information Security, Machine Learning, Artificial Intelligence, Digital Risk Monitoring, Al, Software, Artificial Intelligence, Threat Detection, AI Triangulation, Incident Response, 24/7 Managed SOC, and SIEMless

146 similar entities Type: Startup Activities: it services Technologies: A.I. A.I. - Machine Learning Cybersecurity

6 67
GATEWATCHER GATEWATCHER

Highlight cyber threats before they darken your business European leader in intrusion detection and advanced threat detection, Gatewatcher has been protecting the critical networks of large companies as well as public institutions since 2015. Its model combines multiple technologies with A.I. to provide consistent, optimal protection and meet the current and future cybersecurity challenges of organizations. cybersecurity, sécurité informatique, cyberdéfense, cyberdefense, cyberattacks, IT, advanced persistent threats, networks security, exploits, malware, intrusion detection system, threat protection, IDS, APT, Trackwatch technology, NDR, CTI, Threat hunting, and Threat forensics

419 similar entities Tags: FrenchTech2030 Type: Startup Activities: it services Technologies: Cybersecurity

63 128
INEOS Cyberdefense INEOS Cyberdefense

Protect Your Business CyberForces is an integrator specializing in IT security. Thanks to the expertise of our consultants but also to the ecosystem established with our partners, we are able to support and orient our customers in their security needs.

414 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

3 30
Plurilock Plurilock

Global cyber solutions provider and maker of Plurilock AI, leading platform for SSO, CASB, DLP, AI identity + AI safety. Plurilock sells cybersecurity solutions to the United States and Canadian Federal Governments and to Global 2000 companies. Through these relationships, Plurilock sells its Plurilock AI platform and its unique brand of critical services—leveraging our expertise to aid clients in defending against, detecting, and preventing costly data breaches and cyberattacks. Network Security, IT Security, Continuous Authentication, Multi-factor Authentication, Biometric security solutions, Critical Infrastructure Network Protection, Mouse/Keyboard Biometric Authentication, Behavioral Biometrics, Endpoint Security, Critical Services, Resilience Engineering, IT Solutions, and Cybersecurity

52 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I.

2 57
kyron solutions informatiques kyron solutions informatiques

Advise, support, defend and protect the assets of companies www.kyron.fr Audits & amp; Advice, governance, risks, compliance, IS optimization, PMO, AMOA, AMOE, Engineering - Architecture, Integration, Operation, Physical Security, Training, Infrastructure Systems and Networks, Bastion, Data Protection, Anti -Phising, Cybersecurity, and ISA62443

483 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

5 27
ARINC TECHNIQUES & SOLUTIONS - Groupe Arinc SA ARINC TECHNIQUES & SOLUTIONS - Groupe Arinc SA

Personalized support for the management of safety / security risks of people and goods Faced with a multifaceted, unpredictable and permanent evolution threat, companies must implement design and safety engineering expertise, in order to protect their staff, their facilities and their technologies. Newly created within the Arinc SA group, Arinc Techniques & amp; Solutions brings together experts specializing in safety engineering with the agility necessary for the management of complex projects. The multidisciplinary and complementary teams of Arinc T & amp; s are able to provide an appropriate response for each sector of activity by their knowledge of the processes, …

52 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

0 1
Venari Security Venari Security

Cryptographic Discovery Tool | Cryptographic Visibility | Internal and Regulatory Compliance Venari Security provides organisations with advanced visibility into their encrypted attack surface, ensuring regulatory compliance and privacy adherence through our cryptographic discovery tool. Our focus is on crypto agility which helps you assess both external and internal cryptographic risks, preparing your business now and for the quantum future. Cyber Security, Threat intelligence, Threat Detection, Metadata, Artificial Intelligence, Encrypted Traffic Visibility, Encryption, Next Generation, Data Privacy, Ransomware, Encrypted Traffic Analysis, Cryptographic Discovery Tool, Cryptographic Visibility, Regulatory Compliance, NIST, and NCSC

57 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity A.I. A.I. - Machine Learning Data Analytics

16 45
Allistic Allistic

Your cybersecurity partner! ☛ Governance ☛ RSSI Assistance ☛ Audits and Penses ☛ Secure architectures Specialist in the governance of information systems security and secure infrastructure architecture, Allistic supports its customers and their RSSIs in the definition of the cybersecurity strategy of their business. Cybersecurity, IT security, GDP, PSS, crisis management, awareness, secure architectures, Pentest, Audit, CC scan, SOC, Security, Security Advice, Cloud Security, Big Data security, Security Management, Risk Management, and Management of Compliance

377 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity Data Analytics

47 19
Unosecur Unosecur

Comprehensive identity security for your multi-cloud and hybrid environments Unosecur is a comprehensive identity security platform that addresses identity-related threats in multi-cloud and on-premise environments, providing end-to-end protection and identity management for human and non-human identities. The Unified Identity Fabric by Unosecur integrates automated least-privilege implementation, MITRE ATT&CK framework-based threat detection, AI-powered policy creation, and more. We seamlessly manage your organization’s human and non-human identities: from discovery and analysis to monitoring, control, remediation, and governance.

Type: Startup Activities: it services Technologies: Cybersecurity A.I.

1 33
Irys Irys

Securing the Future Today Irys is a San Antonio-based technology company specializing in innovative solutions for the U.S. Department of Defense (DoD). We provide advanced cybersecurity services, including penetration testing for private sector clients, alongside robust IT solutions, system modernization, and cloud migration. Our expertise spans communication, operations & maintenance, and quality of life enhancements for DoD missions. Leveraging AI and machine learning, we deliver predictive insights and optimized performance. Irys is dedicated to safeguarding national security and enhancing operational efficiency with cutting-edge technology.

59 similar entities Type: Startup Activities: it services military Technologies: Cybersecurity

12 128
ORNA ORNA

Award-winning AI tool offering cyberattack response, recovery, and training automation across all business functions ORNA is a cyber incident response and case management platform for small teams that detects cyberattacks and uses AI to guide response, reporting, compliance and prevention efforts through an innovative real-time collaborative environment. cybersecurity, digital forensics, SaaS, and crisis management

263 similar entities Type: Startup Activities: it services Technologies: A.I. Cybersecurity

3 42
Agarri Agarri

Advice, training and service in offensive IT security: Intrusion test, Burp training PRO suite, code audit, black-box testing, awareness, risk analysis, fuzzing, vulnerability search, application audit, ... Since the magnificent setting that is the Luberon, Agarri satisfies its customers located around the world. Security, Hacking, Pentest, feat, testing, and risk

83 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

2 1
OGO SECURITY OGO SECURITY

Smart Web Application & API Protection + International CDN ! Start-up which revolutionizes the security of your websites and applications. cybersecurité, simplicité, innovation, analyse comportementale, machine learning, intelligence artificielle, WAAP, and CDN

167 similar entities Type: Startup Activities: it services Technologies: A.I. A.I. - Machine Learning Cybersecurity

15 17
Arsen Cybersecurity Arsen Cybersecurity

Human risk managed the right way Arsen is a phishing training and awareness solution, leveraging realistic simulation, microlearning and reporting. Cybersécurité, SaaS, Phishing, Cybersecurity Awareness, and human risks

249 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

8 19
Yagaan Yagaan

Application Security Made Simple Yagaan is a suite of complementary, modular application security tools designed to help every organization adopt a security strategy in line with its challenges. From code analysis to real-time protection, security is integrated at every stage in the life of your applications. SAST, Sécurité applicative, Cybersécurité, RGPD, Data privacy, DevSecOps, Maîtrise des risques, OWASP, audit de code, CI/CD, SAAS, On Premise, Secure coding, Code Mining, AST, MAST, RASP, and Application Shielding

61 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity

6 1
Airbus Protect Airbus Protect

Airbus Protect - enabling a trusted future. Airbus Protect is an Airbus subsidiary bringing together expertise in cybersecurity, safety and sustainability-related services. As a risk management company, the aim of this entity is to offer end-to-end advisory, consulting services, training programmes and software solutions.

17 similar entities Type: SMB Activities: it services greentech Technologies: Cybersecurity Decarbonization

7 1,416
Nucleaus Nucleaus

NucleausTM is an application security platform that continuously monitors your code repositories #SAST #spellcheckforcode NucleausTM continuously monitors your code repositories and reports back vulnerabilities and dependencies before that code causes risks. Offering a consistent platform process with minimal learning curve, simple to use interface, remediation strategy reports and NIST conformance status, NucleausTM enables transparency and risk management to code repositories. Security as a Service, Application Security Programs, Application Security Testing, Application Security, and Web Application Security

57 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 10
Orca Security Orca Security

The agentless cloud security pioneer for AWS, Azure, Google Cloud, Kubernetes and more. Orca Security is the pioneer of agentless cloud security, and is trusted by hundreds of enterprises globally. We're the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across your cloud estate spanning AWS, Azure, Google Cloud and Kubernetes. Amazon Web Services, AWS Security, Breach Detection, Cloud Compliance, Cloud Native Security, Cloud Security, Cloud Security Posture Management, CSPM, Cloud Workload Protection, Container Security, Google Cloud Platform, Infrastructure as Code, Kubernetes, Microsoft Azure, Oracle Cloud Infrastructure, Serverless Security, Web Application & API Security, …

41 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

19 471
Elandis Elandis

An ESN made up of consultants, engineers specializing in computer project management, network architecture and information systems management. Cybersecurity, IT networks, compliance, high debt, servers, firewall, wifi, IT parks management, intranet, extranet, backup, GDPR, software supports, MOA/MOE, and Multi Factors Authentication

352 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity

0 5
Brain-Networks Brain-Networks

Services: conseil, intégration, services managés, support IT Solutions: Antispam, Antivirus, Authentification forte, Chiffrement, Corrélation de logs, Firewall, IPS, NAC, QOS, Supervision, Virtualisation, VPN SSL, WAFS

403 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 5
Cybersolutions.fr Cybersolutions.fr

Votre guichet unique pour vos besoins en Cybersécurité. For 10 years we have supported our clients in protecting their information assets: SIEM / SOC / SOAR; Threat Intelligence / UBA / IAM / API Security SOC Managé, Cyber Threat Intelligence, Surveillance du Deep & Dark Web, Test d'intrusion, Sécurité des API, SIEM / SOAR, NIS-2, Formation Cyber, and Microsoft MXDR

271 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 55
Mithril Security Mithril Security

A simple privacy framework for data science collaboration. Mithril Security helps software vendors deploy AI SaaS to security-demanding organizations. We do it thanks to our secure enclave deployment tooling, which provides SaaS on-prem levels of security and control for customers. #DataSecurity #AIIntegration #SaaS #Enclaves #ConfidentialComputing #AISaaS Deep Tech, confidential computing, cybersecurity, and Data Science

87 similar entities Type: Startup Activities: it services Technologies: A.I. Cybersecurity

9 10
CSCC LABS PVT LTD CSCC LABS PVT LTD

We provide 360 Cyber Security Services We provide End to End Cyber Security Services Breach Investigations, Incident Handling, Forensics, Risk Assessment, End point security, WAPT, Incident Response, Mobile (Android, iOS), Source Code Review, Training, SOC, and VAPT

325 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 19
Yourax Yourax

Your expert in IT solutions: consulting, cybersecurity, infrastructure, networks, wifi, connectivity & amp; Cloud Since April 2023, Yourax has definitely joined the ACESI group by becoming Acesi Lille! IT security, IT solution, IT consultant, Cloud, Infrastructure, Managed, SaaS, Connectivity, Analytics, Hypercongence, RGPD, Audit, and Cybersecurity

329 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

8 17
Resmo (acquired by JumpCloud) Resmo (acquired by JumpCloud)

Transform your SaaS adoption with a single platform that protects all users and applications. All in one platform for SaaS app and access management for modern IT teams. Streamline app discovery, identity security, user offboarding, access reviews, and cost tracking. security, compliance, SaaS, devops, security engineering, saas security, and IT security

99 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

6 3
NOTHREAT NOTHREAT

Proactive AI Cybersecurity for IoT and Web businesses Nothreat unlocks unparalleled IoT security with its patented AIoTDefend solution. Our leading-edge adaptive AI technology not only anticipates and neutralises any threats in real-time but also evolves, offering proactive protection against unforeseen events. With unique embedded traps to outwit attackers, we're not just defending but setting new global standards! cybersecurity, online security, software development , IoT, and AI

Type: Startup Activities: it services Technologies: Cybersecurity IoT A.I.

1 35
Onlayer Onlayer

Business Risk & Performance Management Our powerful solutions suite streamlines onboarding, compliance, monitoring and insights to mitigate risk and secure growth at every stage of the digital business lifecycle. fintech security, SaaS, PCI-DSS, VISA, MasterCard, Payment Card Industry, I.T. Security, Fintech, Merchant Risk Management, Risk Management, Fraud, Risk Prediction, and Merchant Security

599 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

4 27
Beauceron Security Beauceron Security

Empower People. Reduce Cyber Risk. The best software for MSSPs & MSPs to deliver anti-fraud, anti-phishing, e-mail analysis and security awareness training that motivates behavior change. Cybersecurity, Cybersecurity Strategy, Cyber Threat Intelligence and Analysis, and Cyber Risk Management and Remediation

444 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

18 48
Tracebit Tracebit

Expect the unexpected with cloud canaries Tracebit generates and maintains tailored canary resources in your cloud environments, closing gaps in stock protection without time and cost intensive detection engineering. security, cloud, aws, terraform, detection, and response

55 similar entities Type: Startup Activities: it services Technologies: Cybersecurity SaaS

3 19
PRIAM CYBER AI PRIAM CYBER AI

Making your Cyber Security Operations Scalable, Cost Effective and Efficient. Measure and Improve Your Security Operations via our AI driven Next-Gen Incident Response Platform, AVA (Advanced Virtual Analyst)

103 similar entities Type: Startup Activities: it services Technologies: A.I. Cybersecurity

0 10
SAS SourcITEC SAS SourcITEC

All Breton Cybersecurity Partner in Governance, Risks and Compliance Sourcitec is a company that offers governance, risks and compliance advice and services: -Cybermarime -Cyberprotection -Cyberdefense -CyberResilience She supports professionals for: -Définir functions and responsibilities in terms of cyber risk management -Define security strategies -Mesure the risks and set up suitable prevention devices -Define the activity continuity plan, the crisis management process -Sensitize employees on threats and good practices to adopt Safety of information system, governance, risks, compliance, cybermaritime, cyberprotection, cyberresilience, awareness, PCA, PRA, crisis management, ISO 27001 Li, ISO 27001 La, Ebios RM, and cyberefense

235 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

12 10
VeriClouds (acquired by Enzoic) VeriClouds (acquired by Enzoic)

Stronger Authentication with Identity Threat Intelligence VeriClouds provides a credential-centric solution to stop preventable data breaches. CredVerify APIs work with popular authentication services to block account takeover and credential stuffing attacks that rely on compromised, stolen, or weak credentials.

53 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 1
Attivo Networks®, a SentinelOne Company Attivo Networks®, a SentinelOne Company

The Leaders in Identity Security and Cyber Deception Technology SentinelOne, an autonomous cybersecurity platform company, has completed the acquisition of Attivo Networks. Attivo Networks was a leading identity security and lateral movement protection company. With this acquisition, SentinelOne extends Singularity XDR capabilities to identity-based threats across endpoint, cloud workloads, IoT devices, mobile, and data wherever it resides, setting the standard for XDR and accelerating enterprise zero trust adoption. Together, SentinelOne and Attivo Networks deliver comprehensive identity security as part of Singularity XDR for autonomous protection. Breach Detection System, Deception Technology , Threat Detection, Cloud Detection, Specialty Detection , Vulnerability and …

4 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I. A.I. - Machine Learning

0 73
Veriom Veriom

The AI-powered control tower for tech risk - automating security, tech compliance, and risk remediation at scale. Companies are drowning in fragmented security tools, manual audits, and compliance bottlenecks, leading to blind spots, escalating risks, and costly failures. Tech teams waste 40% of their time firefighting instead of innovating, while compliance delays block revenue and slow enterprise growth. Veriom solves this at scale by unifying security, compliance, and risk intelligence into a single AI-powered platform. We connect directly to an organisation’s cloud, CI/CD, security tools, and compliance frameworks, delivering real-time visibility, automated risk detection, and instant remediations - eliminating inefficiencies …

79 similar entities Type: Startup Activities: it services Technologies: SaaS Data Analytics A.I.

3 6
Groupe Protec Groupe Protec

Groupe Protec offers a global security offer that meets quality certification standards Groupe Protec is 8 agencies and nearly 600 agents deployed in the territory, 7 activities dedicated to safety, safety, training or at the reception of your business, an interlocutor, a global offer in order to offer the greatest reactivity and fluidity in your services. We offer security and safety solutions to companies, from training to security, television and video surveillance, APSAD P3 Certified Risks Certified as well as reception in business, events and concierge Protec Security - Protec Téléturvence - Protec Service - Horus Training www.protecsecurité.com www.protec-telesurveillance.fr www.protec-services.fr …

127 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

1 44
Nozomi Networks Nozomi Networks

We protect the world’s critical infrastructure from cyber threats. Our platform uniquely combines network and endpoint visibility, threat detection, and AI-powered analysis for faster, more effective incident response. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com Cybersecurity, OT Security, IoT Security, OT Cybersecurity, SaaS-Powered Security, Cloud-based Security, Digital Transformation, Cyber Threats, OT Network Visibility, Scalable IoT Security, Threat Detection, Anomaly Detection, IoT Network Security, Scalable Security Platform, IoT Device Security, OT Asset Security, Vulnerability Assessment, OT Network Monitoring, SCADA Security, and ICS Security

165 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT

29 355
HacWare HacWare

HacWare helps Developers & MSPs build security awareness solutions in minutes with a 100% automated cybersecurity API. HacWare is an award winning security training platform that allows organizations to build hyper custom security training solutions in minutes. It reduces training labor costs by 40%. Enterprise Software, artifical intelligence, data analytics, cybersecurity, software, machinelearning, deeplearning, securityawareness, msp, API, mssp, channel, developers, and securityawarenesstraining

20 similar entities Type: Startup Activities: it services Technologies: A.I. A.I. - Deep Learning A.I. - Machine Learning Cybersecurity Data Analytics

10 4
Veracity Protocol Veracity Protocol

The Standard of Trust for Physical Objects. Protect anything with Vision AI. We provide access to the most advanced Vision AI Standard for protecting people and products in the digital world. trust, security, protection, traceability, verification, identification, authentication, Vision AI, machine learning, computer vision, and neural networks

50 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

16 25