Logo | Name | Σ | Employees |
---|---|---|---|
![]() | ![]() Highlight cyber threats before they darken your business European leader in intrusion detection and advanced threat detection, Gatewatcher has been protecting the critical networks of large companies as well as public institutions since 2015. Its model combines multiple technologies with A.I. to provide consistent, optimal protection and meet the current and future cybersecurity challenges of organizations. cybersecurity, sécurité informatique, cyberdéfense, cyberdefense, cyberattacks, IT, advanced persistent threats, networks security, exploits, malware, intrusion detection system, threat protection, IDS, APT, Trackwatch technology, NDR, CTI, Threat hunting, and Threat forensics 419 similar entities Tags: FrenchTech2030 Type: Startup Activities: it services Technologies: Cybersecurity | 64 | 126 |
![]() | ![]() We are your confident Cyber Security crew for a safe digital journey. Northwave Northwave offers an Intelligent combination of cyber security services to protect your information. We believe it is essential to our society and economy that we can rely on safe and trustworthy digital infrastructures. Therefore, we feel the need to make integrated ICT security services of the highest possible quality available to every organisation. Northwave integrates people, processes and technology into an Intelligent Security Operation: smart security that controls proactive and reactive measures based on a pragmatic (ISO certified) quality management structure. We combine Information Security, Privacy and … 99 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 8 | 231 |
![]() | ![]() When Experience Matters Triskele Labs is one of Australia’s fastest growing cybersecurity companies. We deliver services including traditional projects such as Penetration Testing, Compliance and Risk Management through to new breed services including 24*7*365 Security Operations and outsourced Cybersecurity Managers to ensure we are a complete cybersecurity solution centre. Our team of experts leverage elite threat intelligence to provide the highest level of cybersecurity professional services. We go the extra mile to demystify cybersecurity and become your trusted partner by developing customised programs that deliver on your specific needs to meet your budget. Our holistic approach allows us to achieve … 301 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 100 |
![]() | ![]() Mission: To Save & Improve Human Lives Since 2005, Team Cymru’s mission has been to save and improve human lives by working with public and private sector analyst teams around the world, enabling them to track and take down bad actors of all kinds. The company delivers comprehensive visibility into global cyber threat activity and is a key source of intelligence for many cyber security and threat intelligence vendors. Its Community Services division provides no-cost threat detection, DDoS mitigation and threat intelligence to network operators, hosting providers and more than 143 CSIRT teams across 86+ countries. Enterprise security teams rely … 152 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 4 | 126 |
![]() | ![]() YOU DESERVE TO BE HACKED YOU DESERVE TO BE HACKED. They say you should keep your friends close, but your enemies closer — and CovertSwarm is your worst nightmare. A specialist red team of ethical hackers and penetration testers, we attack relentlessly from every angle to hit your brand where it hurts again, and again, and again. If there’s a weak spot in your app or website, we’ll find it. If an update exposes a vulnerability, we’ll spot it. And we’ll raise the alarm fast, before anyone can break in. Cyber Services, Social Engineering, Cyber assurance, Cyber Risk, Constant Cyber … 6 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 67 |
![]() | ![]() A hacker’s view of you and your business. Security insights without jargon. It’s like cyber security, but simple. A security service that provides a hacker’s view of you and your business. That's the idea behind Fresh Security. We talk to you as a human - without jargon - and provide you with clear actionable insights in real time. So you can stop attacks before they start. 40 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 4 |
![]() | ![]() Cyber-Physical Security Convergence | Identity & Access Governance | Visitor Management | Insider Threat Protection At AlertEnterprise digital identity and trust are at the center of everything we do and core to our Physical Identity and Access Management (PIAM) solutions. We go to work each day with the mission to help organizations solve critical business and security challenges. We address those challenges by taking a universal digital identity for people and things, extending it across an entire enterprise in a secure, intelligent and efficient way. Fact is, security is long overdue for a digital transformation, and we believe that the … 128 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 6 | 348 |
![]() | ![]() Cyber Security, Red Team Attack Simulation & Penetration Testing | "To defeat your enemy, become your enemy" – Sun Tzu We are a cyber and Information security services provider. Founded by university academics and consultants we develop and provide system penetration, network intrusion, incident response, user awareness, and information governance solutions, strategies, and services. Our employees are a combination of Ph.D. qualified researchers, Crest Registered Testers, and BSI 27001 lead auditors. Through our combined and academic research, we have a thorough understanding of the problem domain, ideally placing us to use applied research to mitigate the real-world risks of cybercrime. … 200 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 0 | 12 |
![]() | ![]() Attackers Shouldn’t Have The Information Advantage. The Flare Threat Exposure Management (TEM) solution empowers organizations to proactively detect, prioritize, and mitigate the types of exposures commonly exploited by threat actors. Our platform automatically scans the clear & dark web and prominent threat actor communities 24/7 to discover unknown events, prioritize risks, and deliver actionable intelligence you can use instantly to improve security. Flare integrates into your security program in 30 minutes and often replaces several SaaS and open source tools. Learn more by signing up for our free trial: https://try.flare.io/free-trial/ Dark Web, External Threat Intelligence, Data Analysis, Web Crawling, CTI, … 22 similar entities Type: Startup Activities: it services Technologies: Cybersecurity Data Analytics | 1 | 120 |
![]() | ![]() The CTEM platform for smarter cybersecurity risk management. Outpost24 helps organizations improve cyber resilience with a complete range of solutions that enable Continuous Threat Exposure Management (CTEM). Our intelligent cloud platform unifies asset management, automates vulnerability assessment, and quantifies cyber risk in business context. Executives and security teams around the world trust Outpost24 to identify and prioritize the most important security issues across their attack surface to accelerate risk reduction. To learn more about our products and services go to https://outpost24.com Passive reconnaissance, Cyber security, Data leakage, Cyber Threat Intelligence, Digital footprint, Digital Risk monitoring, Counterintelligence, Asset management, Attack Surface … 149 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 7 | 8 |
![]() | ![]() Simply faster than attackers Patrowl is an innovative product designed by cybersecurity experts. It automates the detection and remediation of your vulnerabilities to finally be faster and more efficient than cybercriminal organizations. It is built around 4 main principles: - Patrowl automates continuous penetration tests using advanced technology and our expertise. This allows us to identify your assets (known and shadow-it) and vulnerabilities in real time over a wide area. At a glance, visualize your overall level of security and especially how to improve it. - Real adapted solutions appear on the Dashboard. You will be able to act yourself … 50 similar entities Type: Startup Activities: it services Technologies: A.I. Cybersecurity | 15 | 46 |
![]() | ![]() Reveal the dark side of your network Cyber attacks are becoming more varied and sophisticated. CUSTOCY provides its AI-powered threat detection SaaS platform (NDR) to identify the most complex and unknown #cyber intrusions on your network BEFORE they paralyse you. Based on a unique technological core combining artificial intelligence, threat intelligence and behavioural analysis, it provides unrivalled detection of attacks, guaranteeing 88 times less false positives. No more avalanches of alerts! Your security teams can concentrate on what's really important. What are you waiting for testing? Go to https://www.custocy.ai/en/demo/ to book your slot demo. cybersécurité, cybersecurity, sécurité informatique, IT security, … 63 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 34 | 13 |
![]() | ![]() Cyber Security - figthing malware and botnets abuse.ch is providing community driven threat intelligence on cyber threats. It is the home of a couple of projects that are helping internet service providers and network operators protecting their infrastructure from malware. IT-Security researchers, vendors and law enforcement agencies rely on data from abuse.ch, trying to make the internet a safer place. cybersicherheit, cybersecurity, and threat intelligence 224 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 5 | 1 |
![]() | ![]() The best defense is the hack. Torii Security is an expertise firm specializing in information systems safety. Our mission: protect your digital heritage! We intervene all over the chain, to guarantee a real improvement in your protection: - Evaluation: by carrying out safety audits and intrusion tests (Pentses), - Training: Technical training and risk awareness for all, - Improvement: by technical supports, advice services, integration of open source solutions with added value More information to come on www.torii-security.fr Safety of information systems, open source, audits, intrusion tests, advice, management, advice, cybersecurity, computer security, and cyber awareness 151 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 4 |
![]() | ![]() Offensive security & Threat Intelligence GreenLock Advisory is an independant consulting firm created in 2015. We are offering several expertises on cyber-security: - Penetration testing - Architecture review - Threat intelligence/hunting - Automation of Security Operations - Vulnerability management cybersecurity, audit, security, threat intelligence, vulnerability management, and Automation 308 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 1 |
![]() | ![]() Cybersecurity Makes Sense Licanam, your planning of services and solutions. Cybersecurity turnkey, specializes in AS-A-Service cybersecurity for protection, risk prevention and cyber incident management. Our team of cybersecurity experts has more than 10 years experience in risk analysis, the implementation of safety strategies, regulatory compliance management and the development of emergency plans. We support our customers in the event of an cyber attack. Our healing services provided in the event of an attack aims to restore systems and processes affected by the incident, limit damage and minimize negative impacts. Services may include the following elements: - Restoring systems and data … Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 3 |
![]() | ![]() The Leader in Offensive Security Praetorian, a trusted leader in offensive security services, empowers enterprises to thrive in a digital world without compromise. Enterprise security demands the ability to proactively detect vulnerabilities and threats, yet identifying signals from noise in today’s ever-expanding attack surfaces is increasingly difficult. Our cybersecurity experts provide the deep subject matter expertise needed to defend against persistent, sophisticated attacks. Praetorian professional and managed services cover all attack vectors - external, internal, cloud, web app, secrets, phishing, and supply chain and vendor risk. With Praetorian standing guard, CISOs of the world’s largest organizations rest assured that they … 81 similar entities Type: Startup Activities: it services Technologies: A.I. A.I. - Machine Learning Cybersecurity IoT | 6 | 172 |
![]() | ![]() The industry’s most comprehensive product suite for security operations. The industry’s most comprehensive product suite for security operations empowering enterprises with the best-in-class detection, investigation, automation and response capabilities. Incident Response, Computer Security, Security Orchestration, Security Automation, Threat Hunting, SOAR, and Security Orchestration Automation and Response 237 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 5 | 64 |
![]() | ![]() Leading experts within cybersecurity At Vambrace Cybersecurity we love to solve problems with simplicity & innovation. It’s our mission to make compliance & cyber security services accessible to all. We take pride in building and nurturing teams of exceptional talent, so we’re confident that our cyber security & compliance services are the best way to stay one step ahead of the hackers and protect your business. With our own in-house UK Security Operations Centre (SOC) and years of industry experience, we're ideally placed to help you stay ahead of current and emerging security threats. Gambling Compliance, Cyber Security, Startup Support, … 434 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 19 |
![]() | ![]() Finally, IT assistance without obligation! 🙋🏻♂️ Cyber security partner of large accounts since 2011, we have positioned ourselves as cyber-security, networks, cloud, infrastructure. We design digital technology as a tool at the service of humans and not the other way around. One of the keys to cyber-security progress Cybersecurity, managed services, networks, and audit cybersecurity 467 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 4 |
![]() | ![]() Founded in 2014 by the industry’s top cybersecurity experts, Binary Defense is on a mission to change the security industry for the better and help organizations defend against threats of all kinds. We believe that the best defense against cyber threats uses a human-driven, technology-assisted approach. We protect businesses of all sizes through our advanced cybersecurity solutions including Managed Detection and Response, Threat Hunting, Digital Risk Protection, Incident Response, Phishing Response, and Analysis on Demand. Binary Defense was spawned from the need for better monitoring and detection capabilities in companies. The founder of Binary Defense, David Kennedy, also founded TrustedSec … 69 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 3 | 205 |
![]() | ![]() Find and neutralize the attacker In recent years, the number of computer attacks has experienced a very strong increase, targeting governments as well as private companies. The complexity of these attacks has also progressed significantly, regardless of the type of target. Attacks and operating procedures in the state of the current art (often named APT) show that an attacker can invest an IS and stay active for years without being detected. In this context of current computer threat, it is recommended for any entity concerned with its security to be proactive and to seek a possible compromise before even having … Type: Startup Activities: it services Technologies: Cybersecurity | 4 | 4 |
![]() | ![]() Empowering organizations with machine learning to strengthen security, working alongside teams for a smarter network. Since Redborder’s inception, we’ve been committed to ensuring client security through advanced, AI-powered solutions designed to adapt to today’s dynamic threat landscape. Cybersecurity is about more than technology; it’s about transparency, collaboration, and a shared commitment to safety. With the rapid rise of sophisticated cyber threats—such as advanced persistent threats, zero-day exploits, and targeted malware attacks—traditional security measures alone are no longer enough. Redborder's Network Detection and Response solutions analyze and correlates real time data from across your network, to provide deep insights into potential … 63 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 3 | 16 |
![]() | ![]() Intelligent Cybersecurity | Follow us on X @KudelskiSec Kudelski Security is a premier cybersecurity solutions provider, working with the most security-conscious organizations in Europe and across the United States. Our long-term approach to client partnerships enables us to continuously evaluate their security posture to design and deliver solutions to reduce business risk, maintain compliance and increase overall security effectiveness. For more information about capabilities including consulting, technology, managed security services or custom innovation, visit: www.kudelskisecurity.com Managed security services and solutions, security incident response, threat monitoring, risk assessment and compliance, penetration testing, device security evaluation, identity and access management, security compliance … 443 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 21 | 430 |
![]() | ![]() Managed #cybersecurity without the complexity. EDR, ITDR, SIEM & SAT crafted for under-resourced IT and Security teams. Protect Your Endpoints, Identities, Logs, and Employees. The fully managed security platform that combines endpoint detection and response, Microsoft 365 identity protection, a predictably affordable SIEM and science-based security awareness training. Powered by custom-built enterprise technology for mid-market enterprises, small businesses, and the MSPs that support them and delivered by unrivaled industry analysts in our 24/7 Security Operations Center. By delivering a suite of purpose-built solutions that meet budget, security, and peace-of-mind requirements, Huntress is how the globe’s most underresourced businesses defend against … 217 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 8 | 707 |
![]() | ![]() We process application threat data into actionable intelligence, analyze & share information with the InfoSec community. We process app threat data from F5 and our partners into actionable intelligence. We analyze and share the Who, What, When, Why, How, & What’s Next of cyber attacks to benefit the security community. InfoSec, Threat Intelligence, Application Security, IoT, Cybersecurity, threat research, application services, malware, phishing, credential stuffing, breaches, hackers, CISO, independent, application protection, ddos, tls, and magecart 103 similar entities Type: SMB Startup Activities: deeptech healthtech it services Technologies: Cybersecurity | 2 | 6 |
![]() | ![]() ICS Cyber Management provides affordable Cyber Security as a Service to companies of all industries to provide the ability to monitor, alert, and control a breach. Partner with our talented team of IT consultants and compliance specialists to bring industry proven methodologies, expertise and best practices to your organization. ICS Cyber Management can help you with complex compliance requirements, technology assessments, and guide you in the decision making process. Whether you need us to “do it all” or just serve as advisers, we’re here to help. With INSIDE|OUT we take the guesswork out of Cyber Security and give your IT … 109 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 2 |
![]() | ![]() Your expert in pentesting Cresco is your partner in cybersecurity. With our ethical hacking background, we replicate hacker's methods and conduct in depth assessments to have a realistic vision on the maturity of your security systems in order to set up an adequate security plan to protect your business. At Cresco we believe in long term collaborations. We are working together with leading IT companies, sharing our expertise in cybersecurity to make EU's IT landscape a safer place. We are fully committed to work transparently respecting data and information confidentiality, striving for process excellence and delivering the best possible service … 177 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 5 | 20 |
![]() | ![]() The security of your data, our daily issue. 🔒 Founded in 2020, our mission is to protect companies against increasing digital threats. We offer complete services, ranging from intrusion tests to the implementation of secure infrastructure and supervision, relying on multidisciplinary expertise. Our services: ✔ Audits ✔ Intrusion tests ✔ Implementation of secure network architecture ✔ Integrations of safety solutions ✔ Training & amp; awareness ✔ MCO / MCS 67 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 2 | 10 |
![]() | ![]() Cyber Security | Penetration Testing | Threat Monitoring & Intelligence | Cyber Essentials (formerly Melius CyberSafe) Melius CyberSafe is now GoDefend. Same mission. Sharper focus. Stronger protection At GoDefend, we know that scaling a business means making big decisions with limited time and resources. Between building a team, managing growth, and keeping your tech running, cybersecurity can feel like just another complex, costly problem you can't afford to deal with. But ignoring cyber threats isn’t an option - one attack could undo everything you’ve worked so hard to build. We’re here to change that GoDefend was built for businesses like … 141 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 11 |
![]() | ![]() External Exposure & Attack Surface Management See Exactly What Attackers See. Take full control over your attack surface by uncovering and eliminating critical security risks – the ones you didn't know existed. Our botnet and discovery engine use graph data modeling to map and classify the assets across your attack surface. attacksurface, asset discovery, cloud security, cyber security threats, vulnerability management, attack surface, IT security, cyber threat intelligence, vulnerability assessment, attack surface management, network security, cyber posture, penetration testing, attack surface visibility, data security, data breach, pentesting, attack surface security, CISO, internet security, security posture, cybersecurity, cloud security, infosec, digital … 77 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 6 | 147 |
![]() | ![]() Tailored threat intelligence, risk-based prioritization, rapid response Founded in 2014, EclecticIQ is a global provider of threat intelligence technology and services that empower customers to neutralize critical cyber threats to their business in an ever-evolving landscape. Guided by our values — being curious, bold, accountable, and collaborative — we help security teams make smarter, faster decisions with dynamic solutions that reduce complexity and streamline threat detection and response. From our AI-embedded threat intelligence platform to our browser extension, our products improve workflows, reduce analyst fatigue, and mitigate cyber risk. Our customers rely on our expertise and unique technology to integrate … 203 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 13 | 78 |
![]() | ![]() The first marketplace powered by hackers. Working as ethical hackers and security researchers over the past decade we learned that online security became a Wild West for companies. Trying to get control of risk levels by assigning security teams, hiring security companies at scheduled intervals and licensing multiple expensive solutions, but eventually, ending up with a security flow that is not insightful and with reports scattered all over the place. Online security isn’t just about implementing smart technology, it is also about including the right people, gathering insider intelligence and the ability to align all these processes towards one goal. … 127 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 3 | 34 |
![]() | ![]() Managed Security Services Provider We believe that the Internet has become a crime scene. We were born from that belief and that the same knowledge and skills used by bad people to commit crimes should be used in defense of information, privacy, and security. Every practice we have and everything we do is centered around security. If a technology doesn't meet our highest standards of protecting the Confidentiality, Integrity, and Availability of information systems, it won't be a part of our offerings to our customers. We are proactive in analyzing emerging threats and deploying defensive measures against them in our … 203 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 3 | 9 |
![]() | ![]() TOGETHER WE'VE GOT THIS We are Adarma, the UK’s leading Security Operations specialist for modern global enterprises. With decades of experience protecting highly targeted organisations in the FTSE 350, including Critical National Infrastructure and other highly regulated industries, we deliver effective threat detection and incident response capabilities to protect your organisation. Acting as an extension of your team, our goal is to understand your business and security objectives to provide hybrid SOC solutions that optimise your security investments for maximum risk reduction and return on investment. Powered by Socket, our security operations platform, we leverage our extensive experience and engineering … 84 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 6 | 190 |
![]() | ![]() Trusted Threat Intelligence Since 2005 Malware Patrol is a trusted provider of straightforward, actionable cyber threat intelligence since 2005. We deliver accurate, enrichment-ready data feeds that help security teams, researchers, and cybersecurity companies detect, block, and investigate a wide range of threats—from phishing and malware to ransomware, C2s, and cryptominers. Our threat intelligence is used to power SIEMs, NGFWs, TIPs, DNS firewalls, and threat analytics platforms worldwide. We offer a flexible range of threat intelligence packages, as well as our Enterprise option, which includes single-feed purchases, research-grade data like malware samples and phishing artifacts, and our Big Data package with … 59 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 3 | 9 |
![]() | ![]() Cybersecurity made easy with MDR, XDR, and Managed WAF solutions. Alert Logic is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Achieve comprehensive security coverage with extended detection and response (XDR), managed detection and response (MDR), and managed web application firewall (WAF) solutions for public cloud, hybrid, and on-premises environments. Security-as-a-Service, Vulnerability Assessment, Intrusion Detection, Threat Management, Log Management, Compliance, Web Application Security, 24x7 Security Research and Operations, SaaS, Cloud Security, MDR, Managed Detection and Response, Web Application Firewall, Cybersecurity, WAF, XDR, and PCI ASV 63 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 20 | 190 |
![]() | ![]() Innovating with security Fraunhofer AISEC is one of the leading institutions for applied research in the field of cyber security worldwide. More than 220 highly qualified researchers develop customized security concepts and solutions for businesses and public authorities, to protect their systems, infrastructures, products and services. The solutions include enhanced data security and effective protection against cybercrime such as industrial espionage and sabotage attacks. Learn more about IT security research on our #CybersecurityBlog: https://www.cybersecurity.blog.aisec.fraunhofer.de/en/ Imprint: https://www.aisec.fraunhofer.de/en/imprint.html IT Security, Embedded Security, Network Security, Cloud Security, Mobile Security, Automotive Security, Secure Operating Systems, Post Quantum Cryptography, Cybersecurity, Trusted Electronics, Artificial Intelligence, and … 183 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 29 | 149 |
![]() | ![]() In-Depth, Manual Penetration Tests Clear Gate is an Israeli-based company operating worldwide since 2016, assisting companies to protect their SaaS applications by performing a cyber security risk assessment. We focus only on Cyber Security Risk Assessments for SaaS applications, nothing else since it is the only way we can be a leader in our field. We believe automation is excellent, but in most cases, it is not enough, and human logic is required. With manual testing, we discover significantly more. Penetration Testing, Code Review, Risk Assessment, Application Security, Mobile App Security, API Security, SaaS Security, ISO27001, and SOC2 Type 2 65 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 17 |
![]() | ![]() Exploring the Depths of Security JSOF is an Israeli boutique cyber consultancy and project firm. We understand software, low-level technologies and information security. Our expertise comes from years of experience in the best teams of the Israeli cyber world. We use our in-depth knowledge to provide cutting-edge cyber-security solutions and overcome the most challenging projects. IoT Research, Embedded Devices, IP protection, Mobile security, OS Internals, Fuzzing, SDL, Information security, Secure code review, Cyber Security, Automotive Cyber Security, Medical Devices Cyber Security, ICS Cyber Security, IoT Cyber Security, and product security 187 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 0 | 3 |
![]() | ![]() 24/7/365 threat detection and response across your cloud, identity, endpoints and everything in-between. We got you. Red Canary stops cyber threats no one else does, so organizations can fearlessly pursue their missions. Security leaders all share one goal: ‘Don’t get breached.’ Since day one at Red Canary, enterprises have relied on us to find and stop threats before they can cause harm. The most sophisticated security teams trust us for our intelligence-led Security Operations platform run by world-class security experts. We manage, detect and respond to prevalent threats across cloud, identity and endpoint so you can have more time to … 61 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 521 |
![]() | ![]() We’re continuing our commitment to advanced threat detection as part of Comcast Technology Solutions. We’re continuing our commitment to advanced threat detection as part of Comcast Technology Solutions. Discover how we’re working together to empower security teams to protect their network with better security data. Cybersecurity, Machine Learning, Incident Response, malware detection, network intrusion detection, ai, network security, and fileless malware 136 similar entities Type: Startup Activities: it services Technologies: A.I. A.I. - Machine Learning Cybersecurity | 15 | 12 |
![]() | ![]() Guardian360, the central security platform Your IT infrastructure is essential to your operation. This means that protecting your IT infrastructure is of the utmost importance. There is no such thing as 100% security, but we can help you reduce the risks by identifying potential threats in an early stage and acting quickly if things do go wrong. We do that by using our Guardian360 central security platform. We refer to this as managed security. For you, it means a good night’s rest. Vulnerabilities change on a daily basis and come from external sources as well as from the internet. It … 34 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 14 |
![]() | ![]() Protecting SME and Supply Chain Networks from Cyber Attacks. Join us in #MissionPossibleCyber - securing the UK FAST ! LuJam Cyber is a cybersecurity company that provides protection to SME’s Network. We are part of the Wayra and GCHQ's NCSC 2018 Cyber Accelerator Program. Our product is complementary to firewalls and anti-virus software, detecting in different ways uncovered security threats including those associated with IoT devices. Our sensor audits, reports and alerts all types of suspicious network activity, provides visibility of unauthorised devices connecting, the use of cloud services and blocks access to high-risk areas of the internet. This subscription-based … 157 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT Sensors | 6 | 3 |
![]() | ![]() SenseOn hyperautomates threat detection and response, giving you unparalleled visibility and protection. SIEMLess Outcomes with the SenseOn Intelligence Cloud. Traditional SIEMs bury you in logs and hidden costs. SenseOn's AI-driven approach cuts through the noise - reducing risk, speeding up response, and slashing your security spend. Cyber, Cyber Defence, Information Security, Machine Learning, Artificial Intelligence, Digital Risk Monitoring, Al, Software, Artificial Intelligence, Threat Detection, AI Triangulation, Incident Response, 24/7 Managed SOC, and SIEMless 146 similar entities Type: Startup Activities: it services Technologies: A.I. A.I. - Machine Learning Cybersecurity | 6 | 67 |
![]() | ![]() Helping fleet operators gain visibility, cybersecurity and cyber compliance of systems onboard vessels CyberOwl helps asset operators in the maritime and critical national infrastructure sectors gain visibility, cyber security and cyber compliance of systems on their distributed, remote assets. We provide technologies, a managed service and specific cyber security advisory services to support the asset operator. Our technologies provide near-real-time visibility of the behaviours of assets and their communication patterns. They are deployed to identify and inventory assets on the IT and OT networks of these operational platforms. They detect and raise early warning of cyber attack tactics, techniques and … 75 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 3 | 58 |
![]() | ![]() Sandboxing reinvented against the malware & phishing threats of today - and tomorrow. Sandboxing reinvented to uncover the threats of today & tomorrow. At VMRay, our purpose is to liberate the world from undetectable digital threats. Led by reputable cyber security pioneers, we develop best-in-class technologies to help organizations distinguish genuine threats from the noise and obtain additional context and insights into those threats. Based on the world's most advanced malware and phishing analysis platform, we enable enterprises, government organizations, and MSSPs to automate security operations, accelerate analysis and response, and build reliable threat intelligence. In times of uncertainty and … 88 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 9 | 115 |
![]() | ![]() Correlated / Aggregated Vulnerability Intelligence & Prioritization as a Feed Service. vFeed, Inc. technology and algorithms transforms and unifies scattered big data into correlated vulnerability and threat intelligence multi-formats indicatos. We are passionate about protecting vulnerable and sensitive systems, and enabling clients to rapidly detect and react against cyber-attacks Our current worldwide client base comprises of a wide and diverse range of individuals and businesses from hackers, consultancy firms, CERTs and freelancers to governmental organizations, software companies and intelligence providers. U.S. Patent and Trade Office has recognized our method and system for automated computer vulnerability tracking as deserving the effort … 72 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I. | 0 | 2 |
![]() | ![]() Be part of our #cyber resilience community and use our knowledge! Prosec GmbH transforms companies into digital fortresses. With the headquarters in Rhineland-Palatinate, Germany, we offer proactive cyber security solutions that protect your organization in a constantly changing threat landscape. Discover all of our offers and resources on our Linktree - https://linkr.ee/prosecGmbH Our services: 🔍 Detect: Identification of threats is essential. Our penetration tests reveal hidden vulnerabilities in their infrastructure, mobile applications and web applications. We make sure that you are always one step ahead of potential attackers. 🔐 Respond: Every second counts for security incidents. Our IT security advice … 112 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 56 |
![]() | ![]() Secure more. Limit less. Prevent breaches before they happen. Get the intelligence and context you need to reduce cyber exposure at speed and scale. Skybox Security is the only platform that collectively visualizes and analyzes hybrid and multi-cloud networks, providing full context and understanding of the attack surface. Security Analytics, Firewall Auditing, Vulnerability Management, Network Auditing, Threat Intelligence Management, Firewall Change Management, Attack Surface Visibility, Modeling and Simulation, Rule Lifecycle Management, Vulnerability Assessment, and Attack Simulation 78 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 15 | 154 |
![]() | ![]() LRQA is an award-winning provider of cybersecurity services. Best penetration testing service Teiss Awards '24 Best penetration testing service - Teiss Awards 2024 Managed cloud service winner - Stratus Awards 2023 Security vendor of the year - Computing security excellence awards 2023 LRQA is the leading global assurance partner, bringing together decades of unrivalled expertise in assessment, advisory, inspection and cybersecurity services. Our solutions-based partnerships are supported by data-driven insights that help our clients solve their biggest business challenges. Operating in more than 150 countries with a team of more than 5,000 people, LRQA’s award-winning compliance, supply chain, cybersecurity and … 201 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 2 | 1 |
![]() | ![]() Utilizing our knowledge of the Dark Net ecosystem, we search for compromised devices in our client's networks. CyWeTa DNS is a Czech threat intelligence company. We focus on collection and analysis of leaked credentials and confidential data, originating from devices compromised by various threat-actors. We maintain a huge database with data sourced from public, semi-public and private communication channels and we alert our customers if their data are detected. This way we can help you prevent a potentially devastating cyber attack which would utilize leaked credentials as an initial access vector. Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 4 |