Search in entities 1
Entities
LogoName Σ Employees
WIDIP sas WIDIP sas

The solutions to grow digital ESMS and SMEs Widip has developed since 2005 expertise in the secure accommodation of servers - ISO 27001 and HDS certification (health data accommodation) - and digital processing projects. Our offer is based on three main axes: - Security, backup and integrity of data with a dedicated audit and expertise offer - The availability of data carried by our Cloud, Network and Over -site solutions (12 employees with our customers) - user satisfaction with a team of 15 people in the service and user support center (remote supervision, hot-line and telemainne) at the service of …

192 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity

12 32
Aryaka Aryaka

Aryaka transforms global secure networking with Unified SASE as a Service. At Aryaka Networks, we're a pioneering leader in cloud-first, software-defined networking and security solutions. Our innovative approach has transformed global secure networking with the launch of Aryaka Unified SASE as a Service, the first solution of its kind to deliver unparalleled performance, agility, simplicity, and security without compromise. Empowering Businesses Worldwide With operations in over 100 countries, we empower businesses to modernize, optimize, and transform their networking and security environments while maintaining existing investments. Our commitment to excellence and customer satisfaction has earned us recognition as a three-time Gartner …

53 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

21 671
August Schell August Schell

August Schell is dedicated to delivering agile and innovative cybersecurity solutions to proactively defend and protect organization’s data against cyber attacks. Through our proven expertise with cybersecurity services and solutions, we are masters at designing, deploying and implementing highly secure solutions for on-premise and cloud based computing environments. We offer a wide range of next-generation products and services for: - Enterprise-Scale Identity Management, including Derived Credentials for Mobility - Big Data, including Security and Visualization related to Big Data Network Security and Visibility - Operational Intelligence - Data Center Security, including Firewalls, Endpoint Awareness/Management, and Virtualization - Cloud Security and …

95 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

13 99
StackPath StackPath

Build your edge. Edge Computing - Edge Delivery - Edge Security StackPath is an edge cloud platform, providing cloud services that are physically closer to end users than core cloud providers’ services. StackPath edge compute—including Virtual Machines and Containers—and edge applications—including CDN and WAF—are strategically located in the world’s most densely populated areas, and united by a secure private network fabric and a single management system. Customers ranging from Fortune 50 enterprises to one-person startups trust StackPath to give their latency-sensitive workloads and applications the speed, security and efficiency they require. SECaaS, CDN, WAF, Cloud Computing, DDoS, Monitoring, DNS, Containers, …

34 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

17 45
Bastion Technologies Bastion Technologies

Security-first Compliance At Bastion, we're changing the way modern companies secure their software. We enable fast-moving tech teams to build secure, compliant applications from day one—without sacrificing speed. By combining automated compliance, built-in security tooling, and expert guidance, Bastion delivers an all-in-one solution tailored for startups and scale-ups. Designed by security engineers for today’s engineering teams, Bastion is trusted by some of the fastest-growing companies to stay secure and audit-ready—without slowing down. Build fast. Stay secure. Security, Cybersecurity, Technology, and SaaS

118 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

8 19
BlueVoyant BlueVoyant

A cloud-native cyber defense platform that delivers positive security outcomes that drive results. BlueVoyant's Cyber Defense Platform (CDP) integrates internal, external, and third-party defense into a seamless, scalable solution. Our cloud-native platform offers real-time threat monitoring for networks, endpoints, and supply chains, extending to the clear, deep, and dark web. Combining advanced AI technology with expert human insight, we deliver extensive protection and swift threat mitigation. Trusted by more than 1,000 clients around the globe and recognized as the 2024 Microsoft Worldwide Partner of the Year, BlueVoyant sets the standard for modern cyber defense. Cybersecurity, MDR, 3rd Party Cyber Risk, …

63 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

17 682
GTXSERV S.A.S. GTXSERV S.A.S.

The sovereign cloud par excellence! Cloud, Web, Telecom and security solutions... GTXSERV offers a wide range of solutions for managing your IT. Security, Web, and DAAS

90 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 3
Iomart Iomart

Iomart combines cutting-edge cloud technology with deep industry expertise to help organisations transform with confidence. From secure infrastructure and data protection to managed cloud services and modern work, we deliver tailored solutions that support resilience, agility, and growth. With over two decades of experience and a nationwide network of UK data centres, we’re trusted by businesses across a range of sectors to protect critical assets, modernise IT environments, and accelerate digital transformation. Whether you’re optimising your existing setup or building for the future, our team is here to support your journey - every step of the way. Managed Services, Consultancy, …

142 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity

26 443
JASK (now Sumo Logic) JASK (now Sumo Logic)

The Modern SOC Company JASK is modernizing security operations by delivering an advanced SIEM platform that provides better visibility, better automation and a better architecture. Built on cloud-native technologies, the JASK ASOC platform streamlines security analyst workflows by automating many of the repetitive tasks that restrict productivity, freeing them for higher-value roles like threat hunting and vulnerability management, while addressing the escalating talent shortage. Cyber Security, Security Analytics, Artificial Intelligence, Security Operations, SIEM, and Cloud

83 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I.

2 13
ArcanSecurity ArcanSecurity

Arcansecurity develops an innovative authentication solution without passwords to simplify the connection path of a user while improving the level of security. Security, Authentication, Cryptography, Software Development, and Cloud

234 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

4 1
SIKUR SIKUR

We are specialists in protecting sensitive information More than a technological solution, we are a strategic decision for organizations. Our mission is to redefine the relationship between enterprises and cyber-security and the user experience in the process of authentication and access to technology assets. We deliver robust, multi-layered solutions, with advanced technology and focus on preventing security issues, protecting government and corporate information. We ensure secure communication between people (H2H), between machines (M2M), and between people and machines (H2M) with end-to-end encryption. We prevent: - Data breaches - Financial losses - Impact on productivity - Intrusion in IoT devices - …

130 similar entities Type: Startup Activities: it services privacytech Technologies: IoT Cybersecurity

2 22
Tiempo Secure Tiempo Secure

We are a Deeptech Cybersecurity Enabler Embedded security systems will pave the way for data privacy and application protection in an ever-evolving connected world. In a world where technological progress is increasing and connectivity possibilities are infinite, the associated cyberattacks are increasing in number and intensity. Managing threats to data privacy and application protection has never been so critical or strategic. We believe that vulnerabilities can be reduced by adopting a security-by-design approach, with embedded security solutions. We endeavor to provide silicon/ASIC providers with world-class innovative embedded security solutions, in the form of certified Secure Enclaves & IP, to create …

88 similar entities Type: Startup Activities: it services Technologies: Cybersecurity Semiconductors IoT

11 6
Hitachi Cyber Hitachi Cyber

Global Leader in Cybersecurity, Privacy, GRC & Performance Analytics Hitachi Systems Trusted Cyber Management Inc. DBA Hitachi Cyber is a leading provider of advanced cybersecurity and performance analytics solutions, dedicated to safeguarding businesses against the ever-evolving threat landscape. With a strong focus on innovation and excellence, we offer a comprehensive suite of services designed to enhance cybersecurity and performance maturity, address emerging compliance requirements, and mitigate risks associated with digital transformation. For the past 25 years, Hitachi Cyber has been at the forefront of the industry, delivering 24/7 Managed Security Services, Cybersecurity, Privacy and GRC Professional Services, Cyber Threat Intelligence …

152 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity IoT

7 170
Tufin Tufin

The Security Policy Company That Makes Security Manageable. Tufin simplifies and automates the security policy management of some of the largest, most complex networks in the world, centralizing control across thousands of firewall and network devices and hybrid cloud infrastructures. Network security policy orchestration, Firewall policy management, Enterprise security, Compliance, Governance, NGFW, Network, NERC CIP, Optimization, PCI DSS, Risk assessment, Cloud platforms, Application connectivity management, Hybrid Cloud Security Management, DevSecOps, Security Policy Automation, and Digital Transformation

59 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

6 479
Scalys Scalys

Security at the Edge. Improve security in information technology (IT) and operational technology (OT) environments. Scalys is a leading innovative company to improve security in information technology (IT) and operational technology (OT) environments. Core competences are Cybersecurity, end-to-end security, high-performance communication and secure networking. Scalys delivers enterprise class performance and quality for products like a broadband router, edge gateway, firewall, VPN and other networking communication solutions. Embedded Systems, IoT, Cybersecurity, Secure Networking, End to End Security, High Performance Communication, AI/ML, Confidential Computing, Edge Computing, Azure, IoT Edge, Open Enclave, Building Management Solutions, Security at the Edge, Zero Trust, Enclaves, and …

70 similar entities Type: Startup Activities: it services deeptech Technologies: Cybersecurity A.I. A.I. - Machine Learning IoT Embedded Systems

5 5
BullGuard BullGuard

BullGuard is part of Gen — a global company powering Digital Freedom with a family of trusted consumer brands. Learn more about us at GenDigital.com. internet security, antivirus, mobile security, mobile protection, identity protection, vpn, small office security, endpoint security, and antimalware

202 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

8 23
ProvenRun ProvenRun

Security for Good With the advent of low cost – high bandwidth- low latency connectivity, the increased use of digitization techniques to deliver end-to-end intelligence, many industrial sectors are combining microelectronics and embedded software to deliver real time interactions between the physical and the digital worlds leveraging on complex IT infrastructures of interconnected devices, systems, systems-of-systems, edge and cloud services. This creates attractive business opportunities for hackers that could exploit the large attack surface exposed by those complex infrastructures to extort money, potentially threatening to remotely cause physical damage to users or surrounding equipment. ProvenRun’s mission is to provide customers …

70 similar entities Type: Startup Activities: it services Technologies: IoT Semiconductors Embedded Systems Cybersecurity

16 56
NexTReT NexTReT

Guaranteed IT Solutions At NexTReT we are specialized in optimizing the ICT area of ​​our clients and we help them acquire a high level of security with specialized solutions and services in: Infrastructure, Cloud, Application Development, Big Data, Artificial Intelligence, Quality of Service and Cybersecurity. How do we do it? Reducing and making costs more flexible, improving the quality of its service, making the ICT area more agile and adaptable and with commitment and vocation for service. Since 1993, more than 6,000 successful projects, more than 300 professionals, certifications from the market's leading manufacturers and offices in Barcelona and Madrid. …

729 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

5 245
Ingram Micro Security - France Ingram Micro Security - France

Ingram Micro acquired, during 2019, the company Abbakan specializing in Cybersecurity. Thanks to this new feature, our Cybersecurity BU is expanding its range of products. Resellers will find a complete selection of suppliers, covering all IT security issues. SECURITY, NETWORK & ACCESS, STORAGE, WEB, CLOUD, and NETWORK

132 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

7 10
Guardicore Guardicore

Guardicore is the segmentation company disrupting the legacy firewall market. Our software-only approach is decoupled from the physical network, providing a faster alternative to firewalls. Built for the agile enterprise, we offer greater security and visibility in the cloud, data-center and endpoint. Cloud Security, Data Center Security, Legacy Firewall Alternative, Hybrid Cloud Security, Micro-Segmentation, Software-Defined Segmentation, Network Security, and Network Segmentation

74 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

15 82
Fraunhofer AISEC Fraunhofer AISEC

Innovating with security Fraunhofer AISEC is one of the leading institutions for applied research in the field of cyber security worldwide. More than 220 highly qualified researchers develop customized security concepts and solutions for businesses and public authorities, to protect their systems, infrastructures, products and services. The solutions include enhanced data security and effective protection against cybercrime such as industrial espionage and sabotage attacks. Learn more about IT security research on our #CybersecurityBlog: https://www.cybersecurity.blog.aisec.fraunhofer.de/en/ Imprint: https://www.aisec.fraunhofer.de/en/imprint.html IT Security, Embedded Security, Network Security, Cloud Security, Mobile Security, Automotive Security, Secure Operating Systems, Post Quantum Cryptography, Cybersecurity, Trusted Electronics, Artificial Intelligence, and …

183 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

29 149
Fortra's Digital Guardian Fortra's Digital Guardian

No-Compromise Data Protection That Stops Data Loss Digital Guardian is Fortra's solution for data loss prevention.​ ​ Our cloud-delivered platform is purpose-built to stop data loss by both insiders and outsiders on Windows, Mac and Linux operating systems. Fortra’s Digital Guardian Data Protection Platform performs across the corporate network, traditional endpoints, and cloud applications. We enable data-rich organizations to protect their most valuable assets with a choice of SaaS or fully managed deployment. Digital Guardian’s unique policy-less data visibility and flexible controls enable organizations to protect data without slowing the pace of their business. ​ Data Security, Data Protection, Managed …

36 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity Data Analytics

19 189
GATEWATCHER GATEWATCHER

Highlight cyber threats before they darken your business European leader in intrusion detection and advanced threat detection, Gatewatcher has been protecting the critical networks of large companies as well as public institutions since 2015. Its model combines multiple technologies with A.I. to provide consistent, optimal protection and meet the current and future cybersecurity challenges of organizations. cybersecurity, sécurité informatique, cyberdéfense, cyberdefense, cyberattacks, IT, advanced persistent threats, networks security, exploits, malware, intrusion detection system, threat protection, IDS, APT, Trackwatch technology, NDR, CTI, Threat hunting, and Threat forensics

419 similar entities Tags: FrenchTech2030 Type: Startup Activities: it services Technologies: Cybersecurity

63 128
BLOCKAPT BLOCKAPT

Centralised management and control, unified visibility, proactive quantum security in a single platform experience. BLOCKAPT was created in 2019 and has been highly recognised for its disruptive, agile technology which unifies disparate end point solutions into a simplified, centralised management platform with quantum secure technology. This enables vendor agnostic control with a single pane of glass view across digital ecosystems whether on premise, cloud or operating on hybrid environments. Our Mission is to empower businesses with a pioneering Central Command and Control Platform that brings together all your cybersecurity and technology needs into one seamless manageable viewpoint, creating a powerful, …

15 similar entities Type: Startup Activities: it services consulting Technologies: Cybersecurity

5 21
Appurity Limited Appurity Limited

We provide mobile and application security solutions. Improve security, enhance productivity, stay compliant. Appurity is a team of consultants who assess environments and business requirements to deliver specialised, best-in-class security solutions – endpoint to cloud. Built for the modern and dispersed workforce, Appurity’s solutions adhere to data protection and cybersecurity schemes and regulations such as Cyber Essentials and ISO. We work with businesses to develop and implement impenetrable security strategies that utilise the latest technologies and security frameworks including ZTNA, SSE, CASB, MTD, continuously validating security risks. Working with our technology partners that include Lookout, Pentera, Absolute, BlackBerry, Ivanti and …

95 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT

4 8
Stormshield Stormshield

The European Choice in Cybersecurity All around the world, companies, governmental institutions and defence organisations need to guarantee cybersecurity for their critical infrastructure, their sensitive data and their operational environments. Certified and qualified at the highest European levels, Stormshield’s technological solutions meet the challenges faced by IT and OT to protect their activities. Our mission: to provide cyber-serenity for our clients so they can concentrate on their core activities, something which is vital to the satisfactory operation of our institutions, our economy and the services provided to our populations. When you choose Stormshield, you are choosing a trusted European cybersecurity …

54 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity

31 398
ENVOLiiS ENVOLiiS

Managed IT performance Founded in 2008, Envoliis supports companies in their digital processing approach with the deployment of cloud solutions. Major player on managed services, virtualization, storage and the network; Envoliis designs, deploys, secures and maintains your IT tools in operational conditions. Our offer is simple and effective: more security, agility and productivity to allow you to stay focused on your core business. Advice & amp; Project engineering: • Piloting of the information system • Audit and performance monitoring Optimization & amp; SI transformation: • IT performance of infrastructure: virtualization, backups and networks • Centralized architecture, virtual offices and light …

235 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

14 23
Quarkslab Quarkslab

Securing Every bit of your data Founded in 2011 by Fred Raynal, Quarkslab is a French company specializing in cybersecurity and more specifically in the protection and analysis of software. Research and development are the fundamental pillars of Quartkslab. Its purpose has always been to promote innovation by creating a function between academic research and a concrete practice. Its expertise combines offensive and defensive security in the protection of applications and data, and helps government companies and organizations to adopt a new security posture: obliging attackers, not defenders, to adapt permanently. Thanks to these advice services and through the R …

34 similar entities Type: Startup Activities: it services deeptech Technologies: Cybersecurity

25 100
Perimeter 81, a Check Point Company Perimeter 81, a Check Point Company

A Radically Simple and Secure Corporate Network Perimeter 81 is a robust, yet easy-to-use, converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, or cloud. It is a cloud-native service that includes advanced capabilities such as Zero Trust remote access, Internet access control, malware protection and firewall as a service. It enables any business to build a secure corporate network over a private global backbone, without hardware and within minutes. The entire service is managed from a unified console and is backed by an award-winning global support team that …

100 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

9 109
Alice&Bob.Company Alice&Bob.Company

EMPOWERING YOUR DIGITAL FUTURE Data grows at an exponential speed. Data security has become crucial for digital companies and their products. Alice&Bob.Company shields what is key: your data. We transform and mature your cloud implementations to sensitive data production platforms. To make the digital world a safer place. Cloud, IT Security, AWS, Public Cloud, Kubernetes, DevOps, DevSecOps, Security Champions , Well Architected Framework, Shift Left , Container, Data Security, Big Data, Hadoop, Thread Modeling, Penetration Testing, Security Assessment, Security Champions Program, Managed Security Service, Data Protection, CISO, ISM, PCI DSS, Iso 27001, IT Grundschutz, and EU-US Privacy Shield

130 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity

5 18
Orca Security Orca Security

The agentless cloud security pioneer for AWS, Azure, Google Cloud, Kubernetes and more. Orca Security is the pioneer of agentless cloud security, and is trusted by hundreds of enterprises globally. We're the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across your cloud estate spanning AWS, Azure, Google Cloud and Kubernetes. Amazon Web Services, AWS Security, Breach Detection, Cloud Compliance, Cloud Native Security, Cloud Security, Cloud Security Posture Management, CSPM, Cloud Workload Protection, Container Security, Google Cloud Platform, Infrastructure as Code, Kubernetes, Microsoft Azure, Oracle Cloud Infrastructure, Serverless Security, Web Application & API Security, …

41 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

19 471
Cloudticity Cloudticity

Managed Cloud Services for Healthcare Organizations In the face of relentless cyber threats and growing compliance complexity, healthcare IT teams are stretched thin but still expected to innovate quickly. Cloudticity is a healthcare-only cloud enablement partner that makes rapid innovation possible. With decades of experience securing healthcare workloads in AWS, Azure, and Google Cloud, we deliver next-gen managed services that combine cloud security posture management (CSPM), automated compliance, and performance monitoring, all in one intuitive platform. We eliminate the overhead of cloud operations so your IT and SecOps teams gain full visibility and control, while developers stay focused on what …

26 similar entities Type: Startup Activities: healthtech it services Technologies: Cybersecurity

8 25
Twake Twake

The open digital workplace Secure opensource collaboration platform that improves your organizational productivity At Twake, we take the security of your data seriously and strive to ensure maximum protection for your business.

160 similar entities Type: Startup Activities: it services Technologies: Cybersecurity SaaS

14 1
Mithril Security Mithril Security

A simple privacy framework for data science collaboration. Mithril Security helps software vendors deploy AI SaaS to security-demanding organizations. We do it thanks to our secure enclave deployment tooling, which provides SaaS on-prem levels of security and control for customers. #DataSecurity #AIIntegration #SaaS #Enclaves #ConfidentialComputing #AISaaS Deep Tech, confidential computing, cybersecurity, and Data Science

87 similar entities Type: Startup Activities: it services Technologies: A.I. Cybersecurity

9 10
Obsidian Security Obsidian Security

Comprehensive Security for Your SaaS Applications Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS. The company is backed by Greylock Partners, Wing, GV and Norwest Venture Partners. Advanced Threat Protection, Insider Threat Protection, Threat Detection, Threat Response, Automated Intelligence, Machine Learning, Information Security Software, SaaS Security , Incident Response, Visibility and Monitoring, and compliance

167 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I. A.I. - Machine Learning

9 221
Resmo (acquired by JumpCloud) Resmo (acquired by JumpCloud)

Transform your SaaS adoption with a single platform that protects all users and applications. All in one platform for SaaS app and access management for modern IT teams. Streamline app discovery, identity security, user offboarding, access reviews, and cost tracking. security, compliance, SaaS, devops, security engineering, saas security, and IT security

99 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

6 3
ANEXITI ANEXITI

Cloud & amp; IT mobility Annexiti is the IT Cloud and Mobile specialist. Our job is to connect employees to the company's data in an efficient and secure manner. In terms of users, we offer solutions allowing them to be effective in their working environment, in office or mobility. On the business side, we deploy solutions to make their IT infrastructure meet the new challenges of performance, security, and activity recovery. Virtualization, Nutanix, Hyper-Congence, VMware, Backup, Audit, IT project management, System, Cloud, Managed Services, Resumption of activity, Google Workspace, Microsoft 365, Infogerance, Architecture, Desktop AS A Service, Mobility, IT security, …

309 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

2 2
F3C-Systems F3C-Systems

Concentrate on your business - we manage and secure your IT Cyber Security / Cloud Computing / IT Consulting / Staffing Solutions F3C Systems is specialized in providing, maintaining, and operating secure IT Infrastructure for its customers. We provide a 360° “Human-Centric” service thanks to an additional blend of IT Consulting and Staffing Solutions. Focus on your business - we take care of its digital assets: whether on premises or in the cloud, we’ve got you covered. fortinet, MSSP, Managed Security, Email security, Security Architectures, Sophos, EDR, Cloud, Azure, Office365, Skykick, checkpoint, and kaspersky

290 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

4 13
BlackfishID BlackfishID

We didn’t reinvent cybersecurity, we just made it simpler and smarter. Our unified platform simplifies security management by combining device protection, reputation monitoring, domain security, and more. Designed with ease of use and affordability in mind, we empower users to stay protected without breaking the bank. AI, Cybersecurity, and Social Media

302 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I.

0 2
HighSide, Inc. HighSide, Inc.

Modern collaboration for security conscious teams. Persistent security for sensitive data through decentralized crypto. The global leader in secure collaboration, cloud storage and data access management. HighSide enables the modern business, addressing challenges in productivity, data sharing and engagement typically stymied by data security, compliance and data access requirements

19 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

3 6
Skybox Security Skybox Security

Secure more. Limit less. Prevent breaches before they happen. Get the intelligence and context you need to reduce cyber exposure at speed and scale. Skybox Security is the only platform that collectively visualizes and analyzes hybrid and multi-cloud networks, providing full context and understanding of the attack surface. Security Analytics, Firewall Auditing, Vulnerability Management, Network Auditing, Threat Intelligence Management, Firewall Change Management, Attack Surface Visibility, Modeling and Simulation, Rule Lifecycle Management, Vulnerability Assessment, and Attack Simulation

78 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

15 154
Nozomi Networks Nozomi Networks

We protect the world’s critical infrastructure from cyber threats. Our platform uniquely combines network and endpoint visibility, threat detection, and AI-powered analysis for faster, more effective incident response. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com Cybersecurity, OT Security, IoT Security, OT Cybersecurity, SaaS-Powered Security, Cloud-based Security, Digital Transformation, Cyber Threats, OT Network Visibility, Scalable IoT Security, Threat Detection, Anomaly Detection, IoT Network Security, Scalable Security Platform, IoT Device Security, OT Asset Security, Vulnerability Assessment, OT Network Monitoring, SCADA Security, and ICS Security

165 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT

29 355
Nomasis AG Nomasis AG

We provide easy and secure access to information anywhere, anytime. Our services: - Managed Services - Engineering - Consulting Our Focus: - Cybersecurity - End User - Modern Workplace Management Our uniques: - Cybersecurity at its best - Outstanding User Experience - Operational Excellence Security, Mobility, Mobile Security, Integration, Managed Services, Enterprise Mobility Management, App Management, Training & Education, Mobile Device Management, Unified Endpoint Management, Mobile Operations Center, iOS/Android/macOS/Windows10, Mobile Threat Defense, Cloud Security, Modern Workplace, Zero Trust, Microsoft M365, Device as a Service (DaaS), and End User Services

420 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

3 14
Kudelski Security Kudelski Security

Intelligent Cybersecurity | Follow us on X @KudelskiSec Kudelski Security is a premier cybersecurity solutions provider, working with the most security-conscious organizations in Europe and across the United States. Our long-term approach to client partnerships enables us to continuously evaluate their security posture to design and deliver solutions to reduce business risk, maintain compliance and increase overall security effectiveness. For more information about capabilities including consulting, technology, managed security services or custom innovation, visit: www.kudelskisecurity.com Managed security services and solutions, security incident response, threat monitoring, risk assessment and compliance, penetration testing, device security evaluation, identity and access management, security compliance …

443 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

21 432
CloudGuard CloudGuard

We help organisations proactively detect and automatically remediate cyber threats in real-time. Welcome to CloudGuard, where security is done different. UK-founded in 2020 by industry veterans Matt Lovell and Javid Khan. Our mission is clear, we want to provide SMEs with affordable, enterprise-grade security solutions. Recognising the escalating challenges faced by SMEs in securing their businesses, we started on a journey to develop an automated cybersecurity platform. Fast forward four years, CloudGuard is a leader in automating the Microsoft Sentinel security stack, providing services designed to improve and continuously update our customers’ cybersecurity posture. Our customers spans from 25 to …

49 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 27
Rohde & Schwarz Cybersecurity Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity is a leading IT security company that protects companies and public institutions around the world against cyberattacks. The company develops and produces technologically leading solutions for information and network security, including highly secure encryption solutions, next-generation firewalls and firewalls for business-critical web applications, innovative approaches for working in the cloud securely as well as desktop and mobile security. The award-winning and certified IT security solutions range from compact, all-in-one products to customized solutions for critical infrastructures. To prevent cyberattacks proactively, rather than reactively, the trusted IT solutions are developed following the security-by-design approach. More than 500 …

161 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

2 137
Cloudview Cloudview

PIONEERING CLOUD-BASED VIDEO SURVEILLANCE Pioneers of CLOUD VIDEO RECORDING, STORAGE and ANALYSIS Cloudview’s next generation video surveillance system unifies, manages and securely consolidates smart triggered events from IP cameras in any location, 24/7 – to one web interface. Our technology reduces uncertainty, increases compliance, improves responses and so generates significant cost efficiencies. Combined with our first class service, Cloudview’s system provides genuine peace of mind and enables users to focus on core business goals. Simple | Smart | Secure Visual Networking, Secure Connectivity, Cloud Technology, Cloud Video Recording, Visual Data Storage, Video surveillance system, and Video Alert Notifications

6 similar entities Type: Startup Activities: it services Technologies: SaaS

1 24
Iron Bastion Iron Bastion

Australia's cybersecurity experts Australia's phishing and cybersecurity experts. We offer a comprehensive range of cybersecurity services that protect your business from cyber criminals and digital threats. Cloud Security, Application Security, Infrastructure Security, PCI DSS, Phishing, and Email Security

546 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 3
Flow Flow

The smart choice for secure cloud transformation Our expert team provide secure datacentre, network and cloud native solutions as well as industry leading managed services. We focus on providing efficient solutions to organisations enabling them to do business in confidence, with seamless transition and without fear of a cybersecurity attack. Bringing over 12 years of experience at the highest level, building trusted relationships with customers’, and supporting them wherever they are on their digital journey. Cybersecurity is built into the fabric of all our solutions, enabling secure and confident business operations. Cloud Transformation, Cyber Security, Infrastructure, Networking, Penetration Testing, Cyber …

351 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

7 29
Skymatic GmbH | Cryptomator Skymatic GmbH | Cryptomator

Encrypt your cloud, protect your privacy Skymatic is the company behind Cryptomator, an open-source client-side encryption solution for cloud storage. Our focus is on empowering users with simple, reliable tools to secure their data. While Cryptomator is our flagship product, Skymatic is committed to developing privacy-focused software that gives individuals and businesses control over their digital security.

8 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 7
Cavirin Systems, Inc. Cavirin Systems, Inc.

The First Line of Defense for Your Cloud Security Cavirin protects your digital assets across the enterprise hybrid cloud by delivering CyberPosture Intelligence. We permit enterprises to maintain their ‘golden security posture’ via continuous visibility, automated scoring against the widest set of industry best practices, regulations, and benchmarks, and remediation leveraging predictive analytics and by integrating security into the DevOps cycle. Cloud Security, Regulatory compliance, DevSecOps, Docker, AWS, CIS CSC 6.1, PCI DSS 3.2, CIS Benchmark, DISA STIG, Secure Host Baseline Configuration, Risk Assessment, FedRamp, Google Cloud, HIPAA, SOC2, Cybersecurity, Microsoft Azure, ISO27002, Hybrid Cloud, and CyberPosture Intelligence

90 similar entities Type: Startup Activities: it services regtech Technologies: Cybersecurity Data Analytics

8 20
Cortex by Palo Alto Networks Cortex by Palo Alto Networks

The industry’s most comprehensive product suite for security operations. The industry’s most comprehensive product suite for security operations empowering enterprises with the best-in-class detection, investigation, automation and response capabilities. Incident Response, Computer Security, Security Orchestration, Security Automation, Threat Hunting, SOAR, and Security Orchestration Automation and Response

237 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

5 64
Indeni (Acquired by BlueCat) Indeni (Acquired by BlueCat)

The world’s best practices, automated. Indeni provides security infrastructure automation with unprecedented visibility that’s up and running in minutes. We’ve automated the world’s best practices to deliver predictive, prioritized, and actionable insights that help you prevent costly disruptions. We dramatically reduce chaos and risk to improve agility, giving you the confidence to accelerate mission-critical projects that drive new business. Our new product, Cloudrail, also helps companies manage infrastructure-as-code security: https://www.linkedin.com/company/indeni-cloudrail security automation, network automation, Intent Based Networking, Crowdsourced, Analytics, Check Point, Palo Alto Networks, Cisco ASA, Juniper, Fortinet, F5 Networks, Radware, Terraform, AWS, Azure, infrastructure-as-code, DevSecOps, and Continuous Compliance

42 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

10 24
RAD Security RAD Security

The Future of Security: AI-Driven, Real-Time Defense RAD Security offers a complete AI-driven platform that empowers organizations to secure their AI workloads and cloud infrastructure with real-time, behavior-driven defense. Building on its battle-tested Cloud Detection and Response (CDR) platform, RAD enhances its capabilities to help enterprises safeguard their AI systems as they grow and adapt. With a focus on proactive security and continuous adaptation, RAD Security enables businesses to confidently navigate the complexities of AI security while maintaining seamless, scalable protection. Cloud-Native Security, Kubernetes, AWS, Microsoft Azure, Google Cloud Platform, Docker, Security, cloud security, Kubernetes Security, Kubernetes RBAC, Kubernetes Admission …

24 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 45
Wandera, a Jamf company Wandera, a Jamf company

The way enterprises work has changed. Data is stored beyond corporate walls, and limitless connections have given rise to remote working. The perimeter has been redefined. This evolving new environment requires a new security model that is cloud centric. Wandera provides a zero trust cloud security solution to protect the modern workplace. We enable zero-trust access to all your applications, secure your data and devices against cyber threats and help you apply policies to filter internet access and reduce risk exposure. We believe in making security simple. This is why we created a unified offering, managed through a single console …

60 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 52
Bitglass, Inc. Bitglass, Inc.

Total Cloud Security Anywhere Your Workforce Goes Bitglass’ Total Cloud Security Platform is the only secure access service edge offering that combines a Gartner-MQ-Leading cloud access security broker, the world’s only on-device secure web gateway, and zero-trust network access to secure any interaction. Based in Silicon Valley with offices worldwide, the company is backed by Tier 1 investors and was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution.

57 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 22
Pulse Secure Pulse Secure

Zero Trust Secure Access for Hybrid IT and Multi-Cloud Pulse Secure provides easy, comprehensive software-driven Secure Access solutions that provide visibility and seamless, protected connectivity between users, devices, things, and services. Our suites uniquely integrate cloud, mobile, application, and network access to enable hybrid IT in a Zero Trust world. Today, more than 80% of the Fortune 500 and over 20,000 enterprises (and 18M end-points) and service providers across every vertical entrust Pulse Secure to empower their mobile workforce to securely access applications and information in the data center and cloud while ensuring business compliance. SSLVPN, NAC, Mobile, Security, BYOD, …

67 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

11 128
Huntress Huntress

Managed #cybersecurity without the complexity. EDR, ITDR, SIEM & SAT crafted for under-resourced IT and Security teams. Protect Your Endpoints, Identities, Logs, and Employees. The fully managed security platform that combines endpoint detection and response, Microsoft 365 identity protection, a predictably affordable SIEM and science-based security awareness training. Powered by custom-built enterprise technology for mid-market enterprises, small businesses, and the MSPs that support them and delivered by unrivaled industry analysts in our 24/7 Security Operations Center. By delivering a suite of purpose-built solutions that meet budget, security, and peace-of-mind requirements, Huntress is how the globe’s most underresourced businesses defend against …

217 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

7 672
Spire Solutions Spire Solutions

META’s Trusted Partner for Unique Cybersecurity, Cloud and Big Data Solutions For over 17 years, Spire Solutions has led Middle East, Turkey and Africa's digital transformation, pioneering as the region's premier value-added distributor. Our expertise spans across Secure Digital Infrastructure, Artificial Intelligence, and Cloud Technologies, underpinned by our commitment to Data Optimization, Big Data, Cybersecurity, and Privacy Solutions. By leveraging a specialized approach, we empower organizations to navigate and excel in today's digital landscape. VULNERABILITY ASSESEMENT, PENETRATION TESTING, MALWARE DETECTION, ZERO DAY ATTACK DETECTION, RAPID7, NEXPOSE, METASPLOIT, APT, THREAT HUNTING, GRC, TWO FACTOR AUTHENTICATION, SOLARWINDS, IT MANAGEMENT, DECEPTION TECHNOLOGY, FIREWALL …

453 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

3 80
Keeper Security, Inc. Keeper Security, Inc.

Manage, protect and monitor all your organization's passwords, secrets and remote connections with zero-trust security Manage, protect and monitor all your organization's passwords, secrets and remote connections with zero-trust security Password Management, Secure File Storage, Cyber Security, password security, cybersecurity, password vault, SSO, zero knowledge, secrets management, and remote access

139 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

21 538
CryptoMove CryptoMove

The world’s first moving target data protection platform. CryptoMove Tholos is a key vault and secrets management product for devops security that protects API keys, configs, and other app secrets with decentralization and moving target defense as a service. Moving target defense is a security paradigm shift. Globally patented. Years of stealth R&D. Cloud native. Team of PhD’s and distributed systems engineers. Backed by Google’s CISO and security leaders from FireEye, Palo Alto Networks, JPMorgan, & others. Case studies in the Fortune 500 and federal agencies including the Department of Homeland Security. Cyber security, Data breach, moving target defense, MTD, …

53 similar entities Type: Startup Activities: it services drones privacytech Technologies: Cybersecurity IoT SaaS Drones

1 1
totemo ag - a Kiteworks company totemo ag - a Kiteworks company

securing data in motion totemo’s leading security solutions for companies and authorities of all sizes are categorized in the product families totemomail® for email encryption, totemodata® for secure managed file transfer and totemomobile® for secure mobile communication. Our innovative products ensure secure information exchanges via the Internet, and cover the functional areas of secure email, mobile security, secure managed file transfer, and data loss prevention (DLP). Our business success is founded on more than ten years of research and development, several international patents and the FIPS 140-2 validation of our cryptography module. Our security solutions are based on the same …

54 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

2 15
Avigilon Avigilon

A comprehensive portfolio of end-to-end video security products and services. Avigilon was acquired by Motorola Solutions in 2018 and is now part of its ecosystem of safety and security technologies. Avigilon's security suite provides a comprehensive portfolio of end-to-end video security products and services that is part of Motorola Solutions’ technology ecosystem. It provides flexible, modular layers of security, through fixed video, advanced analytics and smart access control systems with deployment options for both cloud and on-premise security. About Motorola Solutions: Motorola Solutions is solving for safer. We build and connect technologies to help protect people, property and places. Our …

39 similar entities Type: SMB Activities: it services Technologies: A.I. Cybersecurity

12 387
Carbon Black Carbon Black

Carbon Black delivers legendary enterprise security solutions to protect any business. Your backstage pass to the most epic cybersecurity solutions on the market for Endpoint, Network, Data and Cloud security. Featuring worldwide (yet local-to-you) partner experts with the chops to deliver enterprise-grade security, whether you're a solo act or a supergroup. Be first in line to experience defense that goes to 11. Application Whitelisting, Endpoint Security, Server Security, PCI Compliance, Cyber security protection, Cyber Forensics, Application Control, Windows XP End of Life Security, Advanced Threat Protection, Malware Protection, Incident Response, and Next Gen Antivirus NGAV

85 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

13 308
Gudens Cybersecurity Gudens Cybersecurity

Guden Cybersecurity is currently operating in a private development phase. Security Architecture, Data Loss Prevention, Penetration Testing, Incident Response, Identity Management, Access Management, Secure DevOps, Cloud Security, Network Security, Data Security, Endpoint Security, Vulnerability Management, Secure DevOps, and Digital Forensic

441 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

0 142
RedSeal, Inc. RedSeal, Inc.

Cloud security solutions and services that show what’s on all network environments and where resources are exposed. RedSeal delivers actionable insights to close defensive gaps across the entire network, on premises and in the cloud. Hundreds of Fortune 1000 companies and more than 75 government agencies, including five branches of the U.S. military, depend on RedSeal for exceptionally secure environments. Visit www.redseal.net to learn more. Network Security, Network Modeling, Risk Scoring & Analytics, Incident Response, Network Situational Awareness, Vulnerability Prioritization, Continuous Monitoring, Security Metrics, Cybersecurity, Continuous Compliance, Cyber Resilience, Digital Resilience, and Cloud

54 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

12 181
Core Security Core Security

Leading-edge cyber threat prevention and identity governance solutions to help prevent, detect, test, and monitor risk. Core Security is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra's Core Security delivers market-leading, threat-aware, vulnerability, identity and access management solutions that provide the actionable intelligence and context needed to manage security risks across the enterprise. penetration testing, security intelligence, software solutions, vulnerability research, threat expertise, threat modeling, identity governance, privileged access management, and identity and access management

86 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

3 126
NetMotion Software by Absolute NetMotion Software by Absolute

Realize SASE with the only cloud-first security platform that actually improves the remote working experience. Absolute Security fully acquired NetMotion in July 2021. Please follow us on our Absolute Security Page: https://www.linkedin.com/company/absolute-cyberresilience Mobile VPN Software, Remote Device Management, Cellular Network Performance Management Software, Mobile Data Deployments, Business Intelligence Tools & Reporting, Mobile Analytics, Experience Monitoring, Software-defined perimeter, Zero Trust Network Access, SASE, Cloud, and Enterprise VPN Software

47 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

25 111