Logo | Name | Σ | Employees |
---|---|---|---|
![]() | ![]() Application Security Made Simple Yagaan is a suite of complementary, modular application security tools designed to help every organization adopt a security strategy in line with its challenges. From code analysis to real-time protection, security is integrated at every stage in the life of your applications. SAST, Sécurité applicative, Cybersécurité, RGPD, Data privacy, DevSecOps, Maîtrise des risques, OWASP, audit de code, CI/CD, SAAS, On Premise, Secure coding, Code Mining, AST, MAST, RASP, and Application Shielding 66 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 6 | 1 |
![]() | ![]() We Help Organizations Grow Smarter with Real-Time Tracking of Assets & People We Help Organizations Grow Smarter with Real-Time Tracking of Assets & People We provide Perimeter Intrusion Detection System using combination of Laser, Vibration & Seismic Sensors. Our Intrusion Detection System is integrated with our patent pending GPS & Indoor Positing System. As pioneers in Security Solutions our advantage over others is the framework that we have developed consisting of hardware such as Actuators, Sensors, Gateways, and Software such as Mobile Apps and Back-end Application Server. This framework can operate over a Secured Cloud Server or in a local … 67 similar entities Type: Startup Activities: it services Technologies: Geolocation Sensors Wireless | 0 | 5 |
![]() | ![]() Security-first Compliance At Bastion, we're changing the way modern companies secure their software. We enable fast-moving tech teams to build secure, compliant applications from day one—without sacrificing speed. By combining automated compliance, built-in security tooling, and expert guidance, Bastion delivers an all-in-one solution tailored for startups and scale-ups. Designed by security engineers for today’s engineering teams, Bastion is trusted by some of the fastest-growing companies to stay secure and audit-ready—without slowing down. Build fast. Stay secure. Security, Cybersecurity, Technology, and SaaS 122 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 8 | 17 |
![]() | ![]() Cybersecurity - Qualified Passi - Security of information systems: Auditer | Protect | Monitor | React A French company founded by a team specializing in the field of networks and the security of information systems, Algosecure aims to support you in the implementation of security and network architecture. We provide advisory and implementation services in safety, network, integration and outsourcing of security systems. Our desire is to establish a trusted partnership with you. Our goal is to guarantee you an adequacy between the proposed architectures and your needs. IT security, Intrusion test, CERT, SOC, cybersecurity, cybersecurity, Pentest, Forensic, Security Audit, … 357 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 16 | 54 |
![]() | ![]() The industry’s most comprehensive product suite for security operations. The industry’s most comprehensive product suite for security operations empowering enterprises with the best-in-class detection, investigation, automation and response capabilities. Incident Response, Computer Security, Security Orchestration, Security Automation, Threat Hunting, SOAR, and Security Orchestration Automation and Response 241 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 5 | 64 |
![]() | ![]() Security Solutions for your DevOps Process Our mission is to offer the most comprehensive solutions for application security. We shield assets, blocking attacks on vulnerabilities with a plethora of features that empower both executives and developers with state-of-the-art security through our end-to-end platform. Our clients welcome the transparency and complete scope Kiuwan grants them in terms of solving the risks and threats that affect their application portfolio. We support multiple application technologies, covering over 30 programming languages. Our platform proves to be of key importance when companies industrialize the Software Development Life Cycle, when they want to secure their applications … 63 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 27 |
![]() | ![]() Industrial Reverse Engineering Our mission : design, develop and deliver solutions for better product and supply chain cybersecurity. Cloud, Edge Computing, IOT, Industry Operations, Software Defined Networking and 5G : software is everywhere. However, does this mean that your software is security-ready ? Do you monitor and control your software supply chain in order to raise security awareness? Moabi helps corporate and institutional organizations to analyze, measure and improve any software security to succeed their digital transformation. Moabi SAAS platform is a scalable, cost efficient and pro-active security solution that performs analysis relying on security standards and tests software, binaries … 18 similar entities Type: Startup Activities: it services Technologies: 5G Cybersecurity IoT SaaS | 56 | 6 |
![]() | ![]() Building security, privacy, and compliance programs that leave no doubt. We help audit, implement, and manage security compliance programs for companies with multiple compliance requirements. Our programs are designed to scale while removing the pain, stress, and friction associated with security compliance. Services: - Compliance as a Service: Outsource compliance so you can focus on your core business. - Multi-Framework: Multiple frameworks, one solution. - Offensive Security - Red Teaming, Continuous Penetration Testing, and more. - SOC 1, 2, 3 - ISO 27001, 27701, 9001, 22301 - HITRUST - PCI DSS - FedRAMP - Privacy and GDPR - Cybersecurity Assessments … 99 similar entities Type: Startup Activities: it services regtech privacytech Technologies: Cybersecurity | 1 | 54 |
![]() | ![]() Build data security into your software or business operations, by default and by design Absio moves data security to the top of the stack with application-level data security solutions and consulting services. Our roots lie in battlefield information-sharing. We apply our military-grade security expertise helping businesses protect data at a time when users carry a wealth of private information in their pockets. PRODUCTS With our simple APIs, coders build privacy and security functionality directly into their software, by default and by design. Protections can be applied to any data created or processed by the application and follow the data anywhere … 76 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity IoT | 0 | 3 |
![]() | ![]() Securing the ICS Firmware and Software Supply Chain aDolus Technology Inc. is the global authority on software intelligence for critical infrastructure. Our AI technology correlates information from diverse sources about ICS, IIoT, and IoT firmware and software to provide continuous assurance that packages (and all their subcomponents) are legitimate, tamper-free, and safe to ship and install. By working together to secure the software supply chain, we can create a safer, better world. Cybersecurity, Industrial Control System Security, IIoT, Software Security, Software Validation, Smart Devices, SBOMs, VEX documents, OT, Software Supply Chain Security, Vulnerability Management, Cybersecurity Compliance, Artificial Intelligence, 3rd Party … 185 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 3 | 8 |
![]() | Moix Security Security is consulting firm specialising in application and software security. We help organisations design, build, and maintain secure software. software security, penetration testing, and vulnerability assessment 485 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 1 |
![]() | ![]() Prysm has been a security software publisher for over 25 years! We are the French leader in PSIM software. Our AppVisionTM solution secures over 2,000 installations worldwide. We work hand-in-hand with our integrator partners, distributors and technology partners to offer you the solution best suited to your project. Every day, we innovate to offer you the most in-demand features in the field. Our ambition: to provide simplified, fluid and cyber-secure security management. 63 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 5 | 33 |
![]() | ![]() Security is of utmost concern for embedded software used in mobile, IoT, and automotive industries. Most of such software is built using Open Source Software (OSS) components, despite the fact that significant security vulnerabilities have been discovered in them. Although newer versions of the components without the vulnerabilities are usually available, developers often neglect to use them. To make matters worse, third-party software that many companies rely on is distributed in binary format without the source code, making it extremely difficult to identify the potential security issues. Insignary Recognized by Gartner® as a Representative Vendor for Software Composition Analysis View … 15 similar entities Type: Startup Activities: it services Technologies: Cybersecurity Embedded Systems IoT | 2 | 14 |
![]() | ![]() We provide mobile and application security solutions. Improve security, enhance productivity, stay compliant. Appurity is a team of consultants who assess environments and business requirements to deliver specialised, best-in-class security solutions – endpoint to cloud. Built for the modern and dispersed workforce, Appurity’s solutions adhere to data protection and cybersecurity schemes and regulations such as Cyber Essentials and ISO. We work with businesses to develop and implement impenetrable security strategies that utilise the latest technologies and security frameworks including ZTNA, SSE, CASB, MTD, continuously validating security risks. Working with our technology partners that include Lookout, Pentera, Absolute, BlackBerry, Ivanti and … 100 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 4 | 8 |
![]() | ![]() A comprehensive portfolio of end-to-end video security products and services. Avigilon was acquired by Motorola Solutions in 2018 and is now part of its ecosystem of safety and security technologies. Avigilon's security suite provides a comprehensive portfolio of end-to-end video security products and services that is part of Motorola Solutions’ technology ecosystem. It provides flexible, modular layers of security, through fixed video, advanced analytics and smart access control systems with deployment options for both cloud and on-premise security. About Motorola Solutions: Motorola Solutions is solving for safer. We build and connect technologies to help protect people, property and places. Our … 44 similar entities Type: SMB Activities: it services Technologies: A.I. Cybersecurity | 12 | 387 |
![]() | ![]() Transform your SaaS adoption with a single platform that protects all users and applications. All in one platform for SaaS app and access management for modern IT teams. Streamline app discovery, identity security, user offboarding, access reviews, and cost tracking. security, compliance, SaaS, devops, security engineering, saas security, and IT security 108 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 6 | 4 |
![]() | ![]() Secure your infrastructure with the only vulnerability management platform to combine XDR, SAST, DAST & mobile security. Beyond Security is a global leader in automated vulnerability assessment and compliance solutions - enabling businesses and governments to accurately assess and manage security weaknesses in their networks, applications, industrial systems and networked software at a fraction of the cost of human-based penetration testing. Product lines include: *beSECURE® (formerly AVDS): network vulnerability assessment, web application testing and PCI compliance scanning *beSTORM®: Dynamic Application Security Testing (DAST) aka Black Box Fuzzing *beSOURCE®: Static Application Security Testing (SAST) aka White Box Testing Beyond Security's automated, … 30 similar entities Type: SMB Activities: it services Technologies: IoT | 3 | 33 |
![]() | ![]() Zabýváme se komplexními implementačními a integračními IT službami, telekomunikací a vývojem na zakázku. Jsme DATASYS We deliver technical resources, software and comprehensive services in the implementation and integration of information systems, network infrastructure services and supervision and management information systems. We develop specialized applications addressing specific business or operational problems for the customer. Web and / or mobile applications such as B2B and B2C. We provide independent consultancy and advisory services in a wide range of IT issues. We implement highly sophisticated systems of internal information protection, based on the analysis of the information content of files, reports and other … 93 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 7 | 109 |
![]() | ![]() Create Secure Software Security Innovation is a leader in software security, providing comprehensive solutions to secure software from design to deployment, across all environments, including Web, Cloud, IoT, mobile, and desktop. With a commitment to delivering precise and actionable security with zero false positives, we empower organizations to protect their products confidently and efficiently. Leveraging decades of expertise and as part of Bureau Veritas, a global leader in Testing, Inspection, and Certification, we seamlessly integrate world-class security into development processes, safeguarding the way companies build and deliver products. Visit securityinnovation.com to learn how we can help secure your software and … 159 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 202 |