Logo | Name | Σ | Employees |
---|---|---|---|
![]() | ![]() Votre guichet unique pour vos besoins en Cybersécurité. For 10 years we have supported our clients in protecting their information assets: SIEM / SOC / SOAR; Threat Intelligence / UBA / IAM / API Security SOC Managé, Cyber Threat Intelligence, Surveillance du Deep & Dark Web, Test d'intrusion, Sécurité des API, SIEM / SOAR, NIS-2, Formation Cyber, and Microsoft MXDR 269 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 56 |
![]() | ![]() Startup offering specialized services for the processing of sensitive health data Ventio is a startup offering specialized services for the processing of sensitive health data, with different fields of expertise: - in IT engineering for secure data processing in the cloud - in medical imaging - in prospective R&D involving new digital technologies - in data valorization for health research Magnetic resonance imaging, Cloud computing, eHealth, R&D, IT, GDPR, and cybersecurity 104 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity Data Analytics | 21 | 3 |
![]() | ![]() Providing an edge on DeFi We are a team of engineers, researchers, and finance experts working on decentralized finance protocols (spectra.finance), artificial intelligence, risk analysis and cybersecurity. 273 similar entities Type: Startup Activities: fintech it services Technologies: A.I. Cybersecurity | 0 | 11 |
![]() | ![]() Axiocap simplifies business shareholding Axiocap simplifies each crucial step in business governance: it is a "corporate trust software" platform that dematerializes: - Management of financial securities (tokénisation on blockchain) - shareholder assemblies - shareholders' registers (titles & amp; decisions) You easily manage, from a secure and collaborative platform, the formalities linked to corporate governance, allowing you to have a global vision of your shareholding. Discover the 👇 solution https://axiocap.com/ Legaltech, AG online, online vote, online shareholding, dematerialized securities, and simplified shareholding 39 similar entities Type: Startup Activities: fintech legaltech Technologies: Cybersecurity | 24 | 25 |
![]() | ![]() Calypt est une société spécialisée dans la sécurité des systèmes d'informations offrant des prestations sur mesure. Calypt is an IT Security Company which provides services for protecting your assets. We love to get involved in exciting projects. No matter what size we're happy to talk about a new idea, solution, or application. Feel free to contact us to discuss about security. IT Security, Consulting, Developments, Security Solutions, Penetration Testing, Software assessment, Research & development, Vulnerability assessment, Computer forensics, and Reverse engineering 62 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 11 |
![]() | ![]() Empowering organizations to effectively manage risk in every send, share, receive and save of sensitive content. Kiteworks' mission is to empower organizations to effectively manage risk in every send, share, receive, and save of sensitive data. To this end, we created a platform that delivers data governance, compliance, and protection to customers. The platform unifies, tracks, controls and secures sensitive data moving within, into, and out of their organization, significantly improving risk management and ensuring regulatory compliance on all sensitive data communications. Secure File Sharing, Enterprise Data Security, Regulatory Compliance, Secure BYOD, Private Cloud, Integration with Security Infrastructure, Encryption, Integration … 58 similar entities Type: SMB Activities: it services regtech Technologies: Cybersecurity | 4 | 299 |
![]() | ![]() Global Intelligence - Regional Perspective Caribbean Solutions Lab (Cayman Islands), award-winning, purveyors of cybersecurity, training, professional and managed services to the English and Dutch Caribbean since 2007. McAfee, FireEye, Education, Training, System Security, Network Security, Data Security, Content Security, Mobile Security, Professional Services, Cybersecurity, EDR, NDR, XDR, Vulnerability Managment, Tenable, Meraki, Managed Services, SIEM, Audit, Cylance, MFA, Threat Intelligence, Compromise Assessment, BCDR, Vectra, MSSP, Zero Trust, Cloud Security, and Trellix 192 similar entities Type: Startup Activities: edtech it services Technologies: Cybersecurity | 41 | 4 |
![]() | ![]() Modern Authentication for Your Workforce: Secure, Seamless, and Password-Free. Secret Double Octopus provides the only passwordless MFA solution for all enterprise authentication needs. From workstations & SSOs to on-premises infrastructure & legacy applications – with zero employee-managed passwords and a highly secure yet user-friendly interface. 59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 7 | 39 |
![]() | ![]() Together for a Safer Cyberspace CFLW is a tech-SME that pursues a safer cyberspace through cutting-edge intelligence services. Dark Web Monitor – Providing actionable dark web intelligence to law enforcement, governments and industry. Phishing Threat Intelligence – Delivering strategic insights and real-time monitoring to protect organizations from digital threats. Crypto-Asset Analytics – Helping agencies and investigators to trace illicit activities in blockchain transactions. AI & Emerging Tech – Leveraging collaborative and responsible analytics to stay ahead in digital asset monitoring. As a global cyber intelligence provider rooted in the Netherlands, we believe in impact through collaboration and innovation. Working closely … 404 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 10 |
![]() | ![]() Securing connected, autonomous mobility Began in 2007 as the automotive security division of Penta Security Systems Inc., AUTOCRYPT spun off in 2019 as it became a global leader in autonomous and connected mobility security technologies, paving the way for the new age of automobile and mobility through a multi-layered, holistic approach, with security solutions for V2X/C-V2X, V2G (including PnC security), in-vehicle system, and fleet management (including MaaS and DRT development). Recognized by Forbes Asia in its 100 to Watch list and by TU-Automotive as the Best Auto Cybersecurity Product/Solution, AUTOCRYPT ensures that security is prioritized before vehicles hit the road. … 59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 177 |
![]() | ![]() Support companies and institutions in the informed and secure implementation of digital solutions. Passionate about technology and Cybersecurity, we offer high value-added services, from cyber governance to cyber managed services, including integration and training on cybersecurity technologies and solutions. IAM, PAM, Data Governance, Office 365 Security, SSO, MFA, ISO 27001, SIEM, EDR, ESET, MIM, BeyondTrust, Microsoft, SOC, Sensibilisation Cybersécurité, Scan de vulnérabilité, SOAR, Infogérance, and Infrastructure IT 647 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 6 |
![]() | ![]() The only risk-driven DevSecOps provider that addresses the specific needs of automotive and mobility companies. C2A Security is the only risk-driven DevSecOps provider that addresses the specific needs of car makers and mobility companies. Cyber Security, Automotive, Cybersecurity lifecycle management , Embedded security solutions , TARA, and electric vehicles 15 similar entities Type: Startup Activities: transporttech Technologies: Cybersecurity | 26 | 40 |
![]() | ![]() Cybersecurity dedicated to Digital Engineering 4.0 : Industry + Building + City Stemming from the Innovation and Incubation Lab of Ingérop conseil et Ingénierie, scredIn Software proposes a cybersecurity application brick, associated with services, dedicated, for Digital Engineering 4.0 #PT4T > Protect today for tomorrow #Cybersecurity #DigitalEngineering #Industry #Building #City #BIM #PLM #SmartData cybersécurité, BIM, Ingénierie Numérique, Formation, Conseil, and Data Management 278 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 4 |
![]() | ![]() An ESN made up of consultants, engineers specializing in computer project management, network architecture and information systems management. Cybersecurity, IT networks, compliance, high debt, servers, firewall, wifi, IT parks management, intranet, extranet, backup, GDPR, software supports, MOA/MOE, and Multi Factors Authentication 352 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 0 | 5 |
![]() | ![]() All the services you need in data protection, web legal adaptation, e-commerce and cybersecurity. All the services you need in data protection, web legal adaptation, e-commerce and cybersecurity. Data protection, Data Protection Delegate, Registration of trademarks, cybersecurity, legal adaptation Web pages, legal adaptation online stores, e-commerce advice, online confidence label, and information security 75 similar entities Type: Startup Activities: privacytech e-commerce it services legaltech Technologies: Cybersecurity | 1 | 2 |
![]() | ![]() Cabinet de conseil & d'expertise en cybersécurité Conseil en cybersécurité Management de la sécurité de l’information, Conseil en Sécurité des systèmes d'information, Cybersécurité, Audit de sécurité, Pentests, Red Team, Sécurité offensive, Test d'intrusion, Gouvernance SSI, Mise en conformité ISO 27001, Sécurité IoT, Assistance RSSI, Intégration solutions cybersécurité, Test d'intrusion, ISO 27001, ISO 27005, Analyse de risques cyber, SOC - Security Operation Center, Centre de Cyberdéfense, SSI, and RGPD 61 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity IoT | 14 | 23 |
![]() | ![]() After 3 years of adventure between initial reflection, incubation and development, Incredio ceases its activity in May 2017. Digital Safety Society, Incloudio developed an appsec / DevSecops consulting offer and SaaS security platforms 100% designed, operated and hosted in France: - Core: code review - Vulnus: Vulnerability management - Citadel: Application protection Protection of web applications, website protection, review code, code review, vulnerability management, vulnerability management, appsec, devsec, digital security, and cloud 61 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 1 |
![]() | ![]() Services: conseil, intégration, services managés, support IT Solutions: Antispam, Antivirus, Authentification forte, Chiffrement, Corrélation de logs, Firewall, IPS, NAC, QOS, Supervision, Virtualisation, VPN SSL, WAFS 405 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 5 |
![]() | ![]() Aceso Conseil supports its customers on various subjects around cyber security and data protection: - Cyber / GDP awareness - Cyber maturity audit - CYBER PROGRAMS - RSSI or DPO support - Popularization of European regulations to come and identification of the strategy to be deployed (DSA / DMA / DA / Cyber Security Act / Cyber Resilience Act ...) Cybersecurity, GDPR, and governance 415 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 1 |
![]() | ![]() Cybersecurity for and by humans. Eternilab offers advice, expertise and training in the security of networks and information systems. IT security, computer networks, and reliable and secure software development 449 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 7 |
![]() | ![]() From a single platform allowing the verification of the identity of the Net surfers & the security of the transactions, LUNConnect drives several commercial brands destined to various sectors of activity allowing to improve the connection between the people .: - LUNConnect for sharing, dating and classified ads websites - MySweetSilver for Silver Economy - LUNConnectPRO for security and multi-service companies LUNConnect is a trademark of LUNC SAS Type: Startup Activities: it services silvertech Technologies: Cybersecurity | 0 | N/A |
![]() | ![]() Secureware est une société spécialisée dans la cybersécurité : Firewalls Next Gen, EDR, IPv6, anti-phishing, ... Secureware is a company dedicated to protecting companies of all sizes from emerging threats. We are also active in the fields of hyperconvergence. Secureware has a wolrdwide coverage and in fact is doing most of its business in Africa. Firewalls and Hyperconvergence 58 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 25 |
![]() | ![]() ✅ Let's humanize IT with simple and educational training EVEIL DIGITAL supports VSEs/SMEs/Local authorities and associations on their digital transformation issues: - Audit and technological advice - IT project management - Cybersecurity and GDPR - Teleworking solutions and collaborative tools coaching, Consulting, Support, Technologies, and Appropriation 744 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 1 |
![]() | SecludIT - Ahead of Security Founded by security experts together with EURECOM, a French research institute in telecom and network security, SecludIT has developed Elastic Security, a set of products and services specifically designed to help cloud infrastructure providers and users to safely migrate to the cloud. Since its creation in 2011, SecludIT has become a recognized industry player, one of the Cloud Security Alliance founders and active member, co-author of Security Best Practices 2.1. SecludIT is a technology partner of Amazon Web Services, HP Cloud, VMware and Eucalyptus. Cloud Computing, Security, IaaS, Monitoring, Automation, Vulnerability Assessment, Audit, Amazon Web Services (AWS EC2 & VPC), … 76 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 1 |
![]() | ![]() the cyber defense mobile carrier Dust Mobile offers secure and resilient mobile communications locally and worldwide to protect privacy, mission critical transmissions and out-of-band network connectivity. mobile operator, resilient communications, mobile device management, secure communications, international network, roaming data, cybersecurity, and cyberdefense 71 similar entities Type: Startup Activities: it services telecommunications Technologies: Cybersecurity | 3 | 8 |
![]() | ![]() The Citadel Datacenter Be YS Security Centers, a company created in Clermont-Ferrand in 2018, specializes in the design and management of datacenters with high level of physical and logical security. It operates "La Citadelle Datacenter", set of data processing centers dedicated to the protection of vital importance (health data, contractual, personal, sensitive information ...). The company is part of the "Be YS" ecosystem which brings together expertise in management and protection of digital identities and sensitive data. IT accommodation, cybersecurity, information security, and datacenter 81 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 0 |
![]() | ![]() Arcansecurity develops an innovative authentication solution without passwords to simplify the connection path of a user while improving the level of security. Security, Authentication, Cryptography, Software Development, and Cloud 243 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 4 | 1 |
![]() | ![]() Think network as DNA Cloud Network is an IT company which specialise on Network and Security engineering services. The company provides technical services to businesses over EMEA to walk them into their digital transformation. réseau, sécurité, cloud, firewall, load balancing, and network design 532 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 14 |
![]() | ![]() Compliance Trust Generator Examin develops an increased compliance platform in terms of cybersecurity and data protection to allow companies to assess their level of exposure to risk of regulatory origin, ensure their compliance and check that of their partners. 100 similar entities Type: Startup Activities: it services regtech privacytech Technologies: Cybersecurity | 7 | 9 |
![]() | ![]() Cybersecurity solutions, services and training for SMEs /ETIs Chack is a service company offering computer security support solutions through, RSSI time in time shared or à la carte, safety audits, intrusions tests (Pentest), training, development of activity plans, from support and management to GDPR compliance as well as CYBER (EDR, XDR, SIEM) tools managed. 207 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 1 |
![]() | ![]() Our mission : we guarantee physical access security to professional sites Vitaprotech is a French group whose mission is to secure physical access to vital sites in three areas: perimeter intrusion detection, access control and security, and cloud video surveillance solutions. Its member companies, present in France and internationally, are experts in the design, manufacture and sale of high-end solutions for intrusion detection equipment around professional sites and access control. www.sorhea.com www.protechusa.com www.til-technologies.fr www.ard.fr www.vauban-systems.fr www.tdsi.co.uk www.prysm-software.com www.esifrance.net détection d'intrusion périmétrique, contrôle d'accès, and Analyse d'images 89 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 49 |
![]() | ![]() Passwordless online payments We build a payment stack leveraging new authentication frameworks for secure & successful consumer experience. Payment, Authentication, Passwordless, Ecommerce, and Digital Wallet 69 similar entities Type: Startup Activities: it services fintech Technologies: Cybersecurity | 0 | 6 |
![]() | ![]() Simplify password management and put digital security within everyone's reach, including the most cyber-fragile. Authentication, SSO, Privacy, Privacy, Connection, Cyber Security, Payment, Web Trust, Passwords, and Sovereign 146 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 3 | 2 |
![]() | ![]() Cybersecurity is not a choice Securas offers cybersecurity solutions and services and Cyber Threat Intelligence which allowing both to detect and prevent cyber attacks and threats. Our goal is to make prevention against cybersecurity threats accessible to all! Cybersecurity, CTI, Pensest, Application intrusion test, external intrusion test, social engineering, infrastructure and network, Mobile applications or desktop, and PENTEST of web platforms 313 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 14 |
![]() | ![]() #SecurityRiskmanagement #Cybersecurity #EbiosRisqueManager #OligoRiskManager #DORA #NIS2 Reciproc-it is an Information Security System Consulting Firm. Our main activities are based on giving guidance to protect the data and information, by ensuring their integrity, confidentiality, availability and auditability It’s also a matter of helping our customers in managing and processing their IT projects in well framed way by using the adequate methodology Information System Security, IT Projects management, Cybersecurity, risk management, consulting, and Compliance 422 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 5 | 9 |
![]() | ![]() Highlight cyber threats before they darken your business European leader in intrusion detection and advanced threat detection, Gatewatcher has been protecting the critical networks of large companies as well as public institutions since 2015. Its model combines multiple technologies with A.I. to provide consistent, optimal protection and meet the current and future cybersecurity challenges of organizations. cybersecurity, sécurité informatique, cyberdéfense, cyberdefense, cyberattacks, IT, advanced persistent threats, networks security, exploits, malware, intrusion detection system, threat protection, IDS, APT, Trackwatch technology, NDR, CTI, Threat hunting, and Threat forensics 422 similar entities Tags: FrenchTech2030 Type: Startup Activities: it services Technologies: Cybersecurity | 62 | 128 |
![]() | ![]() Immigrance, maintenance contract, security, accommodation of data in datacenter, activity recovery plan Immigrance, maintenance contract, security, accommodation of data in datacenter, activity recovery plan, backup solutions, fiber optics FTTH / FTTO Network, systems, IT, security, IoT, accommodation, servers, VPS servers, dedicated servers, Datacenter, and Network 385 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 7 | 3 |
![]() | ![]() Your cybersecurity partner! ☛ Governance ☛ RSSI Assistance ☛ Audits and Penses ☛ Secure architectures Specialist in the governance of information systems security and secure infrastructure architecture, Allistic supports its customers and their RSSIs in the definition of the cybersecurity strategy of their business. Cybersecurity, IT security, GDP, PSS, crisis management, awareness, secure architectures, Pentest, Audit, CC scan, SOC, Security, Security Advice, Cloud Security, Big Data security, Security Management, Risk Management, and Management of Compliance 374 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity Data Analytics | 45 | 19 |
![]() | ![]() The embedded protection for documents Empathy. Honesty. Playfulness. Craftsmanship. Solidarity — these are some of the values we live by, as a company. We work by them too: we’re building a product we believe in — we bring security and control over your company's data, wherever it's sent or stored. See https://www.seald.io cybersecurity, encryption, data security, end-to-end encryption, and data protection 105 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 19 | 8 |
![]() | ![]() Audit & amp; Digital Welcome to the universe of Probeecy, your trusted ally dedicated to the protection of personal data, computer security, internal audit, as well as internal and quality control. 142 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity | 3 | 2 |
![]() | ![]() Human risk managed the right way Arsen is a phishing training and awareness solution, leveraging realistic simulation, microlearning and reporting. Cybersécurité, SaaS, Phishing, Cybersecurity Awareness, and human risks 251 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 8 | 16 |
![]() | ![]() Secourriel is a cybersecurity FinTech startup which delivers the gold standard of secure messaging We provide contract ready messaging for sensitive content and an instant legally binding receipt. With our broad B2B enterprise level functionality we deliver the gold standard of secure messaging to the financial ecosystem. Secourriel is the indispensable next step for the financial sector facing MiFID 2 and GDPR. cybersecurity, encryption, secure messaging, MiFID 2, GDPR, FinTech, RegTech, and regify.secourriel.com 26 similar entities Type: Startup Activities: fintech it services privacytech regtech Technologies: Cybersecurity | 1 | 1 |
![]() | ![]() ID Verification, Secure Biometric Authentication, Payments Fortress Identity is an intelligent biometrics platform that replaces passwords with secure multimodal and multi-factor identification, using an individual’s unique human biometrics for secure identity authentication. 51 similar entities Type: Startup Activities: regtech Technologies: Cybersecurity | 1 | 3 |
![]() | ![]() HELM Solutions, Inc. is a global cyber security and technology firm that provides legal and compliance solutions to government and the enterprise. The Helm platform is a web-based compliance-as-a-service solution that partners with regulators around the world to provide companies of all sizes with the tools and visibility necessary to conduct instant and comprehensive compliance gap analyses into their cyber security and technology operations. As gaps are identified between regulatory requirements and a company’s cyber security or technology operations (i.e. IT Tools, Business Operations, Architecture, and Policy / Standards / Controls Libraries), our platform then refers those customers to the … 43 similar entities Type: Startup Activities: fintech it services privacytech regtech Technologies: Cybersecurity | 4 | N/A |
![]() | ![]() Expert in mobile cybersecurity and secure collaborative solutions Ercom, a Thales company, is a reference company with 30 years of combined expertise in two key areas: cybersecurity and communication networks. Being a reference company means providing clients with cutting edge solutions for their industry, combining certified security and simplicity in order to accelerate end-user adoption over a large range of devices. Ercom presents : - Cryptosmart, the only “Restricted” French, EU & NATO certified solution, jointly developed with Samsung, to secure devices and end-to-end mobile communications (voice, SMS and data) on consumer smartphones and tablets. - Cryptobox, the first sharing … Type: SMB Activities: it services Technologies: Cybersecurity | 19 | 166 |
![]() | ![]() Master your cybersecurity Net Freed is a cybersecurity consulting and expertise firm that has supported companies of all sizes since 2017. We are convinced that cybersecurity is based on the association of advanced technologies, proven processes, and staff aware of the risks. To counter the lack of visibility in the face of these threats, we offer a suitable and proportionate approach, to give you the keys to your cybersecurity solution, with an enlightened vision of your digital environment. Blockchain, information systems security and networks, digital transformation, cybersecurity, networks, RSSI, SOC, IAM, and Audit 270 similar entities Type: SMB Activities: it services Technologies: Blockchain/Cryptocurrency Cybersecurity | 5 | 4 |
![]() | ![]() Cybersecurity and cryptocurrencies at the service of companies Companies equipment in cyber-attack protection applications - Password manager - Hardening = strengthening of configurations - Patching and updates of bones and applications - Management of identities and access including SSO - Phishing training and cybersecurity training - Restric sharing of collaborative files and tools - Inventory, monitoring and performance - Risk management - internal safety audit and SCI - Analysis of phishing and ransomware suspicions - CC scan of vulnerabilities and intrusions tests (Penses) - Security architecture (3 thirds, zero trust, ...) Cybersecurity, patching, and password management 98 similar entities Type: Startup Activities: fintech Technologies: Blockchain/Cryptocurrency | 0 | 1 |
![]() | ![]() Continuously Manage Your Threat Exposure! Deepinfo has the most comprehensive Internet-wide data and has been using this data for years to empower cybersecurity of all sizes of organizations worldwide, including the Fortune 500. Deepinfo, backed by well-known industry professionals from Europe and the US, has a young, highly skilled team with PhDs and masters in cybersecurity and big data. Domain Names, IP Addresses, SSL Certificates, Internet Data, Threat Intelligence, Attack Surface, Attack Surface Management, Brand Protection, Cyber Threat Intelligence, and Third-Party Risk Management 30 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 23 |
![]() | ![]() Construisons ensemble la cybersécurité de demain Created in 2009, Systemis is an international group (50 people, France, Luxemburg, UK) and covers three major areas : - Architecture and Counselling in Security, - IT Security ingeneering - Security Applcation integration, - Mobile Security Applications and solutions, Collaborative applications and specific development (Collaborative and Secure extranet) - Innovative mobile secured services cybersécurité , sécurité des systèmes d'information, informatique, and IT 166 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 31 |
![]() | ![]() Over 50 years expertise in the design of resilient critical infrastructure / networks and expeditionary commodities. The Company operates six business Units addressing the comprehensive domains of strategic facilities and networks resilience, protection and security of critical infrastructure, provision of deployment support commodities for expeditionary operations, design and manufacturing of stabilized turrets and positioners and the CEM measurement ,protection and cybersecurity of antennas and infrastructure . CEGELEC Défense is a subsidiary of VINCI Energies. 34 similar entities Type: SMB Activities: it services manufacturing telecommunications Technologies: Cybersecurity | 8 | 155 |
![]() | ![]() Ingram Micro acquired, during 2019, the company Abbakan specializing in Cybersecurity. Thanks to this new feature, our Cybersecurity BU is expanding its range of products. Resellers will find a complete selection of suppliers, covering all IT security issues. SECURITY, NETWORK & ACCESS, STORAGE, WEB, CLOUD, and NETWORK 135 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 7 | 10 |
![]() | ![]() Shaping the future through cyber security Nixu, a DNV company, is a trusted cyber security services partner. We help our customers ensure business resilience with peace of mind across multiple industries, enabled by some of the best cyber security professionals in Europe. Information Security Consulting, Application Security, Secure Software Development, Penetration Testing, Identity & Access Management, Situational awareness (GRC+SIEM), IT risk management, Business continuity planning, Vulnerability management, Incident response, Computer forensics, Privacy & Data protection, Security Operations Center (SOC), XDR, and Cyber security 439 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 14 | 206 |
![]() | ![]() Markmonitor is trusted globally by many of the world's leading brands to establish and securely protect their corporate domain portfolios. Domain Management, Corporate Registrar, and Domain Broker Services 77 similar entities Type: SMB Activities: deeptech it services Technologies: Cybersecurity | 36 | 194 |
![]() | ![]() Automate 90% of your KYB, KYC, AML compliance operations iComply is a Vancouver based, Indigenous founded, Canadian compliance technology company serving small to medium financial services providers. Our purpose drives us to create innovative digital solutions that promote trust, accountability, security, and privacy. fintech, finance, technology, capital markets, legal technology, regtech, blockchain, legal, kyc, aml, esg, kyb, know your customer, know your business, anti-money laundering, customer due diligence, enhanced due diligence, digital onboarding, identity verifcation, document verification, facial recognition, fraud detection, fraud prevention, corporate onboarding, beneficial ownership, Fintrac, FinCEN, Financial Conduct Authority, FINMA, remote authentication, deep fake detection, video KYC, … 98 similar entities Type: Startup Activities: fintech it services legaltech regtech Technologies: Blockchain/Cryptocurrency | 19 | 10 |
![]() | ![]() Next-generation distributor of groundbreaking security, risk, and compliance solutions through a global partner network Catalisto LLC provides cybersecurity sourcing, testing and capacity development services to critical infrastructure and corporate stakeholders globally. Catalisto’s technical team has worked across 14 of the 16 CISA critical infrastructure sectors, including for DOD and USAID, and has designed, built, and maintained large and sensitive databases, cybersecurity testing environments, and threat modeling platforms for a range of public, private and government clientele across the globe. For further information, please contact us at info@catalisto.com Security, Cybersecurity, physical security, risk, governance, startups, technology, distribution, and channel management 139 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 13 |
![]() | ![]() CYber SECurity for every data state, everywhere, on Earth & in Space. CYSEC is a European cybersecurity company based in Switzerland and France, with additional locations in Italy and Luxembourg. Since 2018, CYSEC has been providing world-leading, high-performance cybersecurity tools to ensure robustness, confidentiality, and integrity for the space internet networks & critical infrastructures. Hardware Security Module (HSM), Trusted Execution Environment (TEE), Hybrid Cloud, Virtual Machine, Cybersecurity, Post-Quantum Cryptography, Confidential Computing, Newspace, Satcom, Starlink, and Space Internet 28 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 16 | 54 |
![]() | ![]() Dover Microsystems’ CoreGuard® is the only solution that prevents the exploitation of software vulnerabilities. Dover is the first company to bring real security, safety, and privacy enforcement to silicon. Our revolutionary hardware-based technology empowers processors to protect themselves in real-time from the exploitation of software vulnerabilities. It is the only solution that can stop ALL network-based attacks. Computer Security, Processor Architecture, and Semiconductors 14 similar entities Type: Startup Activities: it services deeptech nanotech privacytech Technologies: Semiconductors Cybersecurity | 7 | 9 |
![]() | ![]() Cybersec Netherlands | 10 - 11 September 2025 | Jaarbeurs, Utrecht Cybersec Netherlands | 6 - 7 November, 2024 | Jaarbeurs, Utrecht Cybersecurity, Infosecurity, Privacy, GDPR, IoT, Artificial Intelligence, Blockchain, Cloud Computing, Data Management, Digital Transformation, DevOps, Security Awareness, Risk Management, Infrastructure, cyber, data, and cloud 108 similar entities Type: Startup Activities: it services privacytech Technologies: A.I. A.I. - Machine Learning Blockchain/Cryptocurrency Cybersecurity IoT | 16 | 1 |
![]() | ![]() Digital security platforms Biorsaf develops digital platforms for the operation of companies, digitizing manuals and procedures for the management and evaluation of risk in all sectors. Food Safety and Risk Management Type: Startup Activities: it services Technologies: Cybersecurity SaaS | 0 | 11 |
![]() | ![]() Électronique et instrumentation pour un monde plus sûr ARCYS, as a specialist in safety electronics and instrumentation for harsh environments, provides its expertise to system integrators, public and private operators with a complete, qualified and innovative product range : • Safety control solutions • Instrumentation • Secured wireless systems • Maintenance, after-sales service and on-site interventions. Instrumentation, Contrôle Commande, Systèmes Sans fil, MCO, Nucléaire Civil, Défense, Transport, FPGA, Environnement sévère , Cybersécurité, SIL3, and SIL4 165 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 8 | 139 |
![]() | ![]() IoT & Transportation Cybersecurity IoT & Transportation Cybersecurity Cryptography, Cybersecurity, Cyber Security, Aerospace & Defense Cybersecurity, Automotive Cybersecurity, Fleet Cybersecurity, Telematics Cybersecurity, Rideshare Cybersecurity, Usage-Based Insurance Cybersecurity, Mobile Carrier Cybersecurity, Cybersecurity Consulting, Resource Constrained Networks CyberSecurity, Trusted Mobility, Smart Contract-based Services, Root-of-Trust, Trusted Data Marketplace, Mobility Platform, Blockchain, Artificial Intelligence, Automotive, Mobility, Platform, Mobility Services, Mobility Platform, Trusted Platform, Data Monetization, Peer-2-Peer Sharing, Car Sharing, Smart Contract, Hyperledger, Ethererum, Ethereum Platform, Open Data Platform, Data platform, and API 73 similar entities Type: Startup Activities: it services transporttech Technologies: Cybersecurity A.I. Blockchain/Cryptocurrency IoT | 5 | 1 |
![]() | ![]() Business Risk & Performance Management Our powerful solutions suite streamlines onboarding, compliance, monitoring and insights to mitigate risk and secure growth at every stage of the digital business lifecycle. fintech security, SaaS, PCI-DSS, VISA, MasterCard, Payment Card Industry, I.T. Security, Fintech, Merchant Risk Management, Risk Management, Fraud, Risk Prediction, and Merchant Security 604 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 25 |
![]() | ![]() A global leader in SASE, Versa enables organizations to create self-protecting networks with our Universal SASE Platform Versa is the modern secure network. Available via the cloud, on-premises, or as a blended combination of both, Versa SASE connects Enterprise branches, teleworkers, and end users securely and reliably to applications in the cloud or data centers around the world. SDN, SD-WAN, SD-Security, Network Security, VNF, Hybrid WAN, MSP, WAN, Multicloud, SASE, Cyber Security, CASB, SWG, NGFW, RBI, ZTNA, SSE, DLP, and AI 59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 20 | 791 |
![]() | ![]() In-App protection SDK and User Safety suite that gives evident reason to trust the App Talsec is an academic-based and community-driven mobile security company. We deliver in-App Protection and a User Safety suite for Fintechs. We bridge the gaps between the user's perception of app safety and the strong security requirements of the financial industry. 33 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 16 |
![]() | ![]() Your security & network layer Spotit is the trusted advisor for its customers and collaborates with them on innovative security & networking architectures that bring a big strategic advantage and insight. Spotit starts a journey with each customer and builds a long-term relationship based on vision, highly specialized knowledge, commitment and trust. Networking, Security, Audit, Pen testing, Data Classification, Security Awareness, Threat Intelligence, Converged Networking, Ethical Hacking, Social Engineering, Industrial SCADA networking, Identity Control, SIEM, Mobile device management, GDPR, and Data Protection 61 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 2 | 96 |
![]() | ![]() Your Voice, the One and Only The first Dynamic Enhanced Secure Customer Authentication platform, Peer-To-Peer, that allows to transform your voice in your identity, your payment system, your digital sign. Authentication, Biometrics, Digital Identity, Security, Privacy, Blockchain, Artificial Intelligence, Natural Language Processing, Natural Language Understanding, Machine Learning, Usability, Passwordless, and Cybersecurity 113 similar entities Type: Startup Activities: it services privacytech Technologies: A.I. Blockchain/Cryptocurrency Cybersecurity A.I. - Natural Language Processing A.I. - Machine Learning | 8 | 5 |
![]() | ![]() The best of ICT with a human touch Comprehensive IT services for your digital transformation ➡ We design, implement and manage IT infrastructure – from cyber security, smart solutions, professional services, business applications, data analyses, datacenters, and cloud & edge services to support services. All in one place. Business and IT Consulting, IT Service Management, IT Project Management, Business applications, Data analytics, Cybersecurity, Cloud Infrastructure, Datacenter Infrastructure, Resource Management, Digital Workspace, Supply Services, Mobility Solutions, Cloud, Platfrom Strategies, IT Quality & Compliance, Digital Transformations, IT Procurement, and Smart solutions 538 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 81 |
![]() | ![]() Technology and Services PROSERTIS was created in 2005 from the meeting of professionals active for more than 15 years in their respective fields of IT, services, telephony and electronic security, and all united by the same passion: New Technologies. Vidéosurveillance, Alarme intrusion, Contrôle d'accès, Audiovisuel, Réseaux Lan Wan, Mobilité, Sécurité, and Sûreté 230 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 4 | 4 |
![]() | SYS1 SYS1, a local team, at the heart of your computer system SYS1 is present in New Aquitaine in Bordeaux as well as in Occitanie and PACA with its Montpellier agency to send the subjects below: Main activities Study, sale and integration of computer infrastructure: • Supply, replacement and evolution of networks (network heart and network active elements in partnership with Juniper) • Network and security virtualization with VMware NSX • Supply of servers, storage and hyperconvergence with Dell Technologies • Backup expertise (Dell Avamar / Datadomain and Veeam) • Expertise of perimeter safety solutions and users (Sophos, With-Secure, Stormshield, Systancia, … 286 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 6 | 101 |
![]() | ![]() Delivering actionable market and competitive intelligence for go-to-market in fraud, identity, and cybersecurity. Liminal is a technology company that empowers businesses with actionable market and competitive intelligence. Our AI-enabled Link platform delivers personalized, real-time intelligence in our native apps or directly in client workflows, enabling executives to make informed decisions, enhance productivity, and drive growth. We tackle critical focus areas with targeted solutions for fraud and identity, cybersecurity, trust and safety, financial crimes compliance, and privacy and consent management. Identity, Privacy, Security, FinTech, Authentication, Cyber Crime, IAM, Access Management, Digital Identity, Cybersecurity, Risk Management, Strategy, Market Analysis, market intelligence, saas … 61 similar entities Type: Startup Activities: privacytech constructiontech fintech media Technologies: Cybersecurity | 50 | 68 |
![]() | ![]() Defining a privacy respectful business model for digital engagement in places Krowdthink develops the Krowd - the first Personal Network, connecting people in places (without tracking or knowing location), answering two questions; Who's here and what's happening? We layer in services for venue owners to offer their visitors safety through direct connection to security, or to report cleanliness or maintenance worries by linking directly to operations and facilities management. Mobile Apps, Privacy, Social networking, eventtech, GDPR, facilities Management, Crowd Safety, Security, and CyberSecurity 56 similar entities Type: Startup Activities: privacytech Technologies: Cybersecurity | 23 | 0 |
![]() | Gudens Cybersecurity Guden Cybersecurity is currently operating in a private development phase. Security Architecture, Data Loss Prevention, Penetration Testing, Incident Response, Identity Management, Access Management, Secure DevOps, Cloud Security, Network Security, Data Security, Endpoint Security, Vulnerability Management, Secure DevOps, and Digital Forensic 446 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 142 |
![]() | Proposition 47 Diversity of Expertise of a Global Governance Proposition 47 offers transverse expertise in communication, law and information technology, built around three values: teamwork, ethics, and durability. Communication, Law, Finance, Information Technology, Cybersecurity, Data Governance, Compliance, Digital Transformation, Privacy, Data Protection, GDPR, Training, RGPD, Privacy, and Risk Management 176 similar entities Type: SMB Activities: consulting fintech privacytech regtech legaltech Technologies: Cybersecurity | 6 | 1 |
![]() | ![]() Futuring Security Telsy is the TIM Group company leader in cybersecurity and communications security, within TIM Enterprise. Founded in 1971, it develops proprietary cybersecurity and encryption solutions for government agencies, corporations, institutions and SMEs. Thanks to its crypto, cyber, quantum and intelligence verticals, Telsy's business proposition is unique as it combines crypto and cyber competences with an unprecendented indistrial posture. Telsy has acquired in 2021 QTI, a leading Italian company in Quantum Key Distribution and, in 2023, TS-Way, an Italian company specializied in Cyber Threat Intelligence. As a strategic asset for the country's national security, Telsy is subject to Golden … 3 similar entities Type: SMB Activities: telecommunications Technologies: A.I. Cybersecurity A.I. - Machine Learning | 0 | 274 |
![]() | ![]() We provide 360 Cyber Security Services We provide End to End Cyber Security Services Breach Investigations, Incident Handling, Forensics, Risk Assessment, End point security, WAPT, Incident Response, Mobile (Android, iOS), Source Code Review, Training, SOC, and VAPT 329 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 14 |
![]() | ![]() Security Without Compromise Strategic, tactical, and technical consulting services and the Eidola technical automation platform. Consented surveillance through transparency, reciprocity and proportionality - AuthC in concert with 0PN nee The Open Consent Group and Surveillance Trust Physical Security, Surveillance, Machine Vision, Automation, Intelligent Infrastructure, Privacy, Cybersecurity, and Identity and Access Management 119 similar entities Type: SMB Activities: privacytech Technologies: Cybersecurity | 1 | 2 |
![]() | ![]() Next-generation security & identity management Anomalix is a cybersecurity company specializing in Identity and Access Management (IAM). Anomalix provides identity-driven zero-trust security solutions that safeguard consumers, businesses, and governments. Identity Management, Security Analytics, Information Security, IAG, Cloud Security, Third Party Risk Management, Audit & Compliance, Business Agility, Identity Analytics, nonhuman identity, machine identity, and Identity Security 70 similar entities Type: Startup Activities: it services regtech Technologies: Cybersecurity | 1 | 12 |
![]() | ![]() Connecting people, ideas and solutions globally AFCEA International, established in 1946, is a non-profit organization serving its members by providing a forum for the ethical exchange of information, and dedicated to increasing knowledge through the exploration of issues relevant to its members in information technology, communications and electronics for the defense, homeland security and intelligence communities. association, government, homeland security, military, intelligence, education, security, defense, cyber, C4ISR, nonprofit, professional development, international, technology, stem, stem education, and cybersecurity 65 similar entities Type: SMB Activities: edtech govtech military spacetech Technologies: Cybersecurity | 18 | 287 |
![]() | ![]() Transforming data into AI insights that safeguard and enhance your business Behavox is an AI company that transforms structured and unstructured corporate data into insights that safeguard and enhance businesses. Our proprietary technology and industry-specific LLM enables users to ask and answer questions without becoming domain experts, technologists, or data scientists. Our global client base includes banks, hedge funds, private equity firms, crypto firms and other non-financial companies. Equipping them with quality, cost-efficient insights, our solutions empower them to: —Detect and address compliance risks —Streamline and secure data archiving —Predict and prevent regulatory breaches —Turn big data into revenue Founded … Type: Startup Activities: privacytech regtech Technologies: A.I. Cybersecurity | 12 | 222 |
![]() | ![]() AI-powered identity solutions intersecting biometrics, privacy & cybersecurity (Nasdaq: IDAI, Euronext Growth: AIID ID) Trust Stamp is a global provider of AI-powered identity services for use in multiple sectors including banking and finance, regulatory compliance, government, real estate, communications, and humanitarian services. Our technology empowers organisations with biometric identity solutions that reduce fraud, protect personal data privacy, increase operational efficiency and reach a broader base of users worldwide through unique data transformation and comparison capabilities. Identity Verification, Cybersecurity, Facial Biometrics, Artificial Intelligence, Cryptography, and Fintech 90 similar entities Type: Startup Activities: fintech regtech privacytech Technologies: A.I. Cybersecurity | 28 | 68 |
![]() | ![]() Tetrate solves application networking and security, enabling innovation with speed and safety in hybrid environments. Tetrate provides the world’s leading Application Networking and Security Platform built on top of open source Istio and Envoy with a modern management plane that brings centralized governance and decentralized enforcement of application networking – essential for implementing Zero Trust security across legacy and modern workloads. Join the community @ tetr8.io/slack. cloud, servicemesh, istio, envoy, envoyproxy, DevSecOps, networking, Zero Trust, security, cloud native, service mesh, compliance, pci, fips, hipaa, Gateway API, and Kubernetes 74 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 6 | 123 |
![]() | ![]() The SCION Internet. Reliable. Flexible. Secure. We combine the security of private networks with the flexibility of the Internet. Networking, Security, Flexibility, Performance, availability, ISP, Cloud Services Provider, SCION, SD-WAN connectivity, hijacking prevention, Next-Generation Internet, Business Continuity, Compliance, DDoS prevention, Network-as-a-Service, Enhanced Internet Service, Telemetry-based routing, B2B Internet, Public network, Interconnection, SSFN, Network security, and Swiss-made technology 81 similar entities Type: Startup Activities: it services telecommunications Technologies: Cybersecurity | 4 | 37 |
![]() | kyron solutions informatiques Advise, support, defend and protect the assets of companies www.kyron.fr Audits & amp; Advice, governance, risks, compliance, IS optimization, PMO, AMOA, AMOE, Engineering - Architecture, Integration, Operation, Physical Security, Training, Infrastructure Systems and Networks, Bastion, Data Protection, Anti -Phising, Cybersecurity, and ISA62443 489 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 5 | 29 |
![]() | ![]() Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges with solutions that protect critical data and applications without workflow disruption. Its platform of interoperable identity, authentication, and access management solutions enables organizations in over 45 countries to fully manage and secure all enterprise and third-party digital identities by establishing trust between people, technology, and information. software, technology, security, single sign-on, strong authentication management, healthcare, clinical workflows, virtualization, secure text messaging, patient identification, identity management, multifactor authentication, cybersecurity, and healthcare IT 99 similar entities Type: SMB Activities: healthtech regtech Technologies: Cybersecurity | 18 | 1,199 |
![]() | ![]() Secure Collaboration Solutions Armour Communications enable organisations in Government and Enterprise environments to collaborate by securing their communication channels including their Voice, Instant Messaging (Closed) and Conferencing. In addition we can provide the related audit capabilities that are required to ensure organisations can protect a variety of sensitive use cases and meet their compliance and regulatory obligations. Our solutions work on everyday endpoint devices such as Smartphones, Tablets and Windows Desktops. Armour Comms has ISO27001 and Cyber Essentials+ certifications and is used at Corporate Confidential, OFFICIAL-SENSITIVE (and higher) and NATO Restricted. Secure Voice Communications, Secure Communications Channels, Secure Collaboration, Mobile … 100 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 8 | 21 |
![]() | ![]() Australia's cybersecurity experts Australia's phishing and cybersecurity experts. We offer a comprehensive range of cybersecurity services that protect your business from cyber criminals and digital threats. Cloud Security, Application Security, Infrastructure Security, PCI DSS, Phishing, and Email Security 542 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 3 |
![]() | ![]() Let us build your leadership team in Information Security, IT Risk Management and Transformational Technology Since 1986, Alta Associates has been widely acknowledged as the leading boutique executive search firm specializing in Information Security, Cybersecurity, and IT Risk Management, thus helping companies build resilient workforces. In 2022, Alta Associated became part of Diversified Search Group. Learn more at https://diversifiedsearchgroup.com/alta-associates/. Cyber Security, GRC, IT Risk Management, Privacy and IT Governance, Information Security, Technology, Transformational Technology, CISO, and Diversity 40 similar entities Type: SMB Activities: hrtech privacytech Technologies: Cybersecurity | 16 | 5 |
![]() | ![]() EMPOWERING TRUST Our technology solutions empower Government Agencies and Businesses to achieve ‘trust in transactions’ in both the physical and digital worlds. Identity Solutions, Multi-Modal Biometrics, Document Verification, Identity Verification, Mobile Network Solutions, IoT Network Solutions, 5G, LTE, 3G, NB-IoT, LTE-M, Private Networking, Biometric Jumpkits, Biometric Handhelds, Biometric Kiosks, Defense, Intelligence, Law Enforcement, Security, and Border Control 297 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 0 | 3 |
![]() | ![]() RegTech Analyst is the leading intelligence platform for the global RegTech industry. We provide the essential facts, figures and analysis required by financial institutions, technology solution providers, investors, regulators and expert advisors. Our extensive data, research and insights are not available from anywhere else and comprise a ‘must-have’ information source for decision-makers working in the mission-critical areas of RegTech, RiskTech and Cybersecurity. RegTech , RegTech Intelligence, RegTech Analytics, FinTech Intelligence, FinTech, FinTech Analytics, RegTech Research, FinTech Research, Cybersecurity, Compliance, Risk, Risk Management, Investment Research, RiskTech, and Regulation 50 similar entities Type: Startup Activities: regtech fintech Technologies: Cybersecurity | 38 | 3 |
![]() | ![]() Stronger Authentication with Identity Threat Intelligence VeriClouds provides a credential-centric solution to stop preventable data breaches. CredVerify APIs work with popular authentication services to block account takeover and credential stuffing attacks that rely on compromised, stolen, or weak credentials. 55 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 3 |
![]() | Fox-IT For a more secure society Fox-IT prevents, solves and mitigates the most serious cyber threats with innovative solutions for government, defense, law enforcement, critical infrastructure, banking, and commercial enterprise clients worldwide. Our approach combines human intelligence and technology into innovative solutions that ensure a more secure society. We develop custom and packaged solutions that maintain the security of sensitive government systems, protect industrial control networks, defend online banking systems, and secure highly confidential data and networks. Intelligence, Cyber security, Forensic investigation, Threat monitoring, Managed services, Red teaming, Pentesting, Education, Fraud detection, Detection, Incident Response, Security Operations Center, and Crypto technlogy 149 similar entities Type: SMB Activities: it services edtech Technologies: Cybersecurity | 11 | 362 |
![]() | ![]() Hirsch is a global leader in security technology, specializing in physical access control, video intelligence, and identity reader solutions, providing comprehensive protection across both physical and digital environments. With over 43 years of expertise, Hirsch delivers the industry's most complete high-security, end-to-end platform, protecting everything from small enterprises to critical infrastructure. Access Control, Physical Access Control, Logical Access Control, Credentials, FICAM, FIDO, CPNI, Smart Card Readers, Video and Data Analytics, Telephone Entry Systems, Mobile Security, Identity Management, Security, Security Technology, Homeland Security, Identity Security, Cybersecurity, Video Surveillance, FIDO2, and Cloud Security 59 similar entities Type: Startup Activities: it services Technologies: Wireless Cybersecurity Data Analytics IoT NFC | 17 | 252 |
![]() | ![]() Cennox supports the world's leading businesses for all things facilities, security, and technology. Cennox help the world’s leading brands to execute and deliver their complex change programs across technology, security and facility transformation. ATM Parts, Repairs & Refurbishment, ATM Security & Anti-Skimming Protection, Commercial Signage & Branding, Self-Service Kiosks, Security Solutions, Maintenance Services, Installation Services, payment technology, financial services, retail services, signage, facility fit-out, Smart safes, Retail technology, Branch transformation, and cash management 58 similar entities Type: SMB Activities: fintech Technologies: Cybersecurity | 1 | 631 |
![]() | ![]() The Cyber Research Databank The world's most comprehensive information source about cybersecurity companies, products, services and investors. http://cyberdb.co/ cybersecurity, Cyber, IT security, Infosec, Information Security, and Cyber Map 147 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 4 |
![]() | ![]() Your protection, our mission. Founded in 2004, Secure Network offers specialized services to assess the security of your systems. Thanks to standard methodologies sharpened by years of experience offering penetration testing and security assessment services worldwide, Secure Network is able to effectively answer all your needs and support you in the protection of your core businesses. ethical hacking, penetration testing, computer forensics, information security, and network security 94 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 11 | 31 |
![]() | ![]() Take Control of Connected Device Risk. We enable product security teams – the guardians of the connected world – to protect the devices we rely on every day through market-leading software threat, vulnerability, and risk management. Finite State is the leading provider of product cyber security solutions for connected devices and embedded systems, including IoT, medical devices, and OT/ICS. cybersecurity, iot, vulnerability research, risk management, ICS, Supply Chain Security, and OT 61 similar entities Type: Startup Activities: deeptech it services Technologies: IoT Cybersecurity | 2 | 64 |
![]() | ![]() TokenEx is now IXOPAY. Learn more at www.ixopay.com. IXOPAY is the world’s leading tokenization and payment orchestration platform offering flexible, scalable payment solutions that empower global merchants to optimize complex payment stacks at scale. eCommerce Solutions, Data Security, Enterprise Solutions, Storefront Solutions, GDPR, PCI compliance, Tokenization, and Payment Orchestration 63 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity | 9 | 31 |
![]() | ![]() Manage, protect and monitor all your organization's passwords, secrets and remote connections with zero-trust security Manage, protect and monitor all your organization's passwords, secrets and remote connections with zero-trust security Password Management, Secure File Storage, Cyber Security, password security, cybersecurity, password vault, SSO, zero knowledge, secrets management, and remote access 142 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 20 | 479 |
![]() | ![]() Dedicated platform and services for everything product security, designed for device manufacturers. Cybellum is where teams do product security. Device manufacturers such as Jaguar Land Rover, Supermicro, Danaher, Rolls Royce and Faurecia use Cybellum's Product Security Platform and services to manage the main aspects of their cybersecurity operations across business units and lifecycle stages. From SBOM to Vulnerability Management, Compliance Validation, and Incident Response, teams ensure their connected products are fundamentally secure and compliant – and stay that way. Powered by Cyber Digital TwinsTM technology, Cybellum creates a live digital replica of every software component inside the devices, allowing product … 57 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 11 | 70 |
![]() | ![]() IT training and international certifications Noor Technology is a company specializing in the training of your staff in the use of new information technologies. IT security, data center, cloud computing, networks & amp; Telecoms, IT maintenance, Internet, IP telephony, and fiber optics 427 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 2 |