Logo | Name | Σ | Employees |
---|---|---|---|
![]() | ![]() Security, wherever your data is Fortanix is a global leader in data security. We prioritize data exposure management, as traditional perimeter-defense measures leave your data vulnerable to malicious threats in hybrid multicloud environments. Our unified data security platform makes it simple to discover, assess, and remediate data exposure risks, whether it’s to enable a Zero Trust enterprise or to prepare for the post-quantum computing era. We empower enterprises worldwide to maintain the privacy and compliance of their most sensitive and regulated data, wherever it may be. At Fortanix, we bring together the very best people in service of our mission … 60 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 16 | 231 |
![]() | ![]() We bring security to the public cloud. We offer a unique, comprehensive data protection suite powered by next-generation cryptography to secure your data in use and protect what matters most. And, what’s most important, is that you’re in control. cryptography, multi-party computation, FHE, functional encryption, secure enclave, datasecurity, dataprivacy, managed services, confidentialcomputing, cybersecurity, confidential VM, confidential GenAI, and post-quantum 94 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity Data Analytics Generative A.I. A.I. | 45 | 19 |
![]() | ![]() A simple privacy framework for data science collaboration. Mithril Security helps software vendors deploy AI SaaS to security-demanding organizations. We do it thanks to our secure enclave deployment tooling, which provides SaaS on-prem levels of security and control for customers. #DataSecurity #AIIntegration #SaaS #Enclaves #ConfidentialComputing #AISaaS Deep Tech, confidential computing, cybersecurity, and Data Science 91 similar entities Type: Startup Activities: it services Technologies: A.I. Cybersecurity | 9 | 13 |
![]() | ![]() Your Data, Your Rules Using our proprietary process utilising encryption, fragmentation and multi-cloud distribution. To revolutionise data security through a platform to enable people and enterprises to take back control, and ownership and secure custody of their own and their stakeholder’s data. This is achieved through our UK & UK-US-patented process with involves encryption, fragmentation, and distribution across multi-cloud storage solutions that enable business continuity, risk mitigation and enterprises to uphold regulation and compliance. The secure storage of your data is proven through the world's first immutable ledger by providing the user a proof of record on the blockchain. Blockchain … 100 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 10 | 17 |
![]() | ![]() Security-first Compliance At Bastion, we're changing the way modern companies secure their software. We enable fast-moving tech teams to build secure, compliant applications from day one—without sacrificing speed. By combining automated compliance, built-in security tooling, and expert guidance, Bastion delivers an all-in-one solution tailored for startups and scale-ups. Designed by security engineers for today’s engineering teams, Bastion is trusted by some of the fastest-growing companies to stay secure and audit-ready—without slowing down. Build fast. Stay secure. Security, Cybersecurity, Technology, and SaaS 122 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 8 | 17 |
![]() | ![]() We are specialists in protecting sensitive information More than a technological solution, we are a strategic decision for organizations. Our mission is to redefine the relationship between enterprises and cyber-security and the user experience in the process of authentication and access to technology assets. We deliver robust, multi-layered solutions, with advanced technology and focus on preventing security issues, protecting government and corporate information. We ensure secure communication between people (H2H), between machines (M2M), and between people and machines (H2M) with end-to-end encryption. We prevent: - Data breaches - Financial losses - Impact on productivity - Intrusion in IoT devices - … 129 similar entities Type: Startup Activities: it services privacytech Technologies: IoT Cybersecurity | 2 | 22 |
![]() | ![]() Born SAFE solutions for hyper-confidential data www.SeeZam.com The solution is an electronic safe, providing you a virtual secured and inviolable storage space and guaranteeing that the sensitive information deposited is restored to you intact. The professional solution SeeZam is an innovative online service: the e-Vault. A first in its field, this service for businesses and organizations meets the growing security requirements for preserving and sharing secret content. Security, Secrecy, Financial services, and Confidentiality 73 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 2 |
![]() | ![]() Your experts for the most secure and powerful Enterprise File Service At DRACOON we help you with securing your data in the most powerful Enterprise File Service. Join our network of users from renown international companies and experience what we as the market leader for secure enterprise file sharing can do to support your business. Take security and collaboration to the next level with us. DRACOON is recognized as a Leader in the ISG Provider LensTM Public Cloud – Services and Solutions and BSI C5, ISO27001 and IDW PS 951 certified. Customers like DATEV, Rossmann, Helios Kliniken, Rödl & Partner, … 45 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 5 | 79 |
![]() | ![]() EMPOWERING YOUR DIGITAL FUTURE Data grows at an exponential speed. Data security has become crucial for digital companies and their products. Alice&Bob.Company shields what is key: your data. We transform and mature your cloud implementations to sensitive data production platforms. To make the digital world a safer place. Cloud, IT Security, AWS, Public Cloud, Kubernetes, DevOps, DevSecOps, Security Champions , Well Architected Framework, Shift Left , Container, Data Security, Big Data, Hadoop, Thread Modeling, Penetration Testing, Security Assessment, Security Champions Program, Managed Security Service, Data Protection, CISO, ISM, PCI DSS, Iso 27001, IT Grundschutz, and EU-US Privacy Shield 138 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 5 | 18 |
![]() | ![]() Data Security Managed Service Provider Data is at the heart of every organisation; it’s invaluable and keeping information secure has become more critical than ever. HANDD Business Solutions (HANDD) is passionate about simplifying data security delivery. We offer comprehensive data security services, safeguarding data throughout its lifecycle and enabling organisations worldwide to secure their data during creation, in use, in transit and when at rest. By proactively addressing technology adoption risks, we accelerate compliance with data security regulations through our comprehensive range of managed and professional services, consulting, and technology solutions. Operating globally, HANDD has implemented its data security approach … 59 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 1 | 28 |
![]() | ![]() Simple, Secure, Now Post-Quantum protects the world’s information against today’s threats and tomorrow’s challenges. We ensure our clients can carry out their operations safely and securely, with trust and confidence in all their activities. Specialising in innovative identity and cyber-security solutions, PQ brings its expertise in cryptography and data protection to solve access, approval, and oversight challenges for clients across sectors. We leverage innovative technologies – from multi-party computing to blockchain – to create new approaches to identity, and implement end-to-end solutions that enforce data policies, manage risk, and create trust. We bind identities to actions to ensure accountability, and … 49 similar entities Type: Startup Activities: it services fintech privacytech Technologies: Blockchain/Cryptocurrency Cybersecurity | 15 | 10 |
![]() | ![]() Empowering organizations to effectively manage risk in every send, share, receive and save of sensitive content. Kiteworks' mission is to empower organizations to effectively manage risk in every send, share, receive, and save of sensitive data. To this end, we created a platform that delivers data governance, compliance, and protection to customers. The platform unifies, tracks, controls and secures sensitive data moving within, into, and out of their organization, significantly improving risk management and ensuring regulatory compliance on all sensitive data communications. Secure File Sharing, Enterprise Data Security, Regulatory Compliance, Secure BYOD, Private Cloud, Integration with Security Infrastructure, Encryption, Integration … 73 similar entities Type: SMB Activities: it services regtech Technologies: Cybersecurity | 1 | 290 |
![]() | ![]() Collaborate Without Compromise - Protecting communication for the world’s most security-demanding organisations! Wire is the enterprise-class platform for secure, uncompromising digital collaboration. We partner with Government, Defense, and Public Sector agencies that prioritize security and confidentiality above all else. We also serve enterprise organizations that want to deliver digitally transformed employee and customer communications, while maintaining data protection, privacy, and compliance. Digital collaboration is at the heart of modern employee productivity and customer experience. Yet, the freedom of sharing afforded by collaboration puts sensitive data at risk like never before. Worse, the most common collaboration tools are developed by tech … Type: Startup Activities: privacytech Technologies: Cybersecurity | 20 | 186 |
![]() | ![]() Security Service Edge Leader focusing on securing the world’s data with cloud-native security solutions. Skyhigh Security protects organizations with cloud-native security solutions that are both data-aware and simple to use. Its market-leading Security Service Edge (SSE) Portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security. Organizations can now have complete visibility and control and seamlessly monitor and mitigate security risks—achieving lower associated costs, driving greater efficiencies, and keeping pace with the speed of innovation. 70 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 8 | 640 |
![]() | ![]() Zero Trust Data Security and Privacy Fasoo provides zero trust data security and AI-powered enterprise content platforms that enable organizations to discover, classify, protect, control, trace, and analyze critical information assets while enhancing productivity. Since 2000, Fasoo has helped customers create a secure information-sharing environment and simplified secure collaboration internally and externally. Its advanced EDRM (Enterprise Digital Rights Management) and DSPM (Data Security Posture Management) solutions secure millions of users across more than 2,000 organizations worldwide, serving leading firms in various industries, including business services, energy, financial, healthcare, insurance, manufacturing, legal, retail and public sectors. Fasoo addresses today’s security challenges, … 96 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 4 | 118 |
![]() | ![]() August Schell is dedicated to delivering agile and innovative cybersecurity solutions to proactively defend and protect organization’s data against cyber attacks. Through our proven expertise with cybersecurity services and solutions, we are masters at designing, deploying and implementing highly secure solutions for on-premise and cloud based computing environments. We offer a wide range of next-generation products and services for: - Enterprise-Scale Identity Management, including Derived Credentials for Mobility - Big Data, including Security and Visualization related to Big Data Network Security and Visibility - Operational Intelligence - Data Center Security, including Firewalls, Endpoint Awareness/Management, and Virtualization - Cloud Security and … 95 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 13 | 104 |
![]() | ![]() Becrypt is a leading provider of high assurance cyber security products and services. With a heritage of creating National Cyber Security Centre certified products, Becrypt is a trusted provider of endpoint cybersecurity software solutions. We help the most security conscious organisations to protect their customer, employee and intellectual property data. Our client base includes governments (central and defence), public sector, critical national infrastructure organisations and SMEs. Learn more at www.becrypt.com. Please contact HR@becrypt.com, 0845 838 2050 if you are interested in joining a great team with competitive salary and benefits. IT security, Data protection, Encryption software, Secure remote access, Thin … 136 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 4 | 70 |
![]() | ![]() Global Leader in Cybersecurity, Privacy, GRC & Performance Analytics Hitachi Systems Trusted Cyber Management Inc. DBA Hitachi Cyber is a leading provider of advanced cybersecurity and performance analytics solutions, dedicated to safeguarding businesses against the ever-evolving threat landscape. With a strong focus on innovation and excellence, we offer a comprehensive suite of services designed to enhance cybersecurity and performance maturity, address emerging compliance requirements, and mitigate risks associated with digital transformation. For the past 25 years, Hitachi Cyber has been at the forefront of the industry, delivering 24/7 Managed Security Services, Cybersecurity, Privacy and GRC Professional Services, Cyber Threat Intelligence … 152 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity IoT | 7 | 164 |