Search 1
Entities
LogoName Σ Employees
CyberCyte CyberCyte

Proactively Reduce Cyber Risk with the Power of CyberCyte AI CyberCyte is an AI-driven risk and continuous threat exposure management platform(X-CTEM) that continuously identifies, assesses and prioritizes security risks for complete visibility and automated response to threats, vulnerabilities, and misconfigurations. Through the in-depth collection and an AI-driven classification of forensic artifacts and risk indicators, the platform strengthens the cybersecurity infrastructure through an interconnected Continuous Threat Exposure Management (CTEM), Automated Security Assessment (ASCA), and GRC Management framework. The platform discovers previously unknown risks, reduces complexity, and minimizes operational costs. Cyber Security, Biometrics, Identity Tokenisation, Zero Trust, Network Access Control, and DNS …

180 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I.

0 17
Citalid Citalid

A new way to live with cyber risk Citalid's cyber risk quantification platform enables Enterprises and Insurers to make enlightened decisions about the risks they face. Our advanced technology assesses the likelihood and financial impact of the cyber threats you face, in a simple and dynamic way. Then, we make this knowledge actionable by automatically generating tailored security and insurance recommendations, and simulating their return on investment. In 2023, Citalid has been featured by Gartner in the "Hype Cycle" for Cyber Risk Quantification and was a winner of the Zurich Innovation Championship. cybersécurité, cyberdéfense, cybermenaces, crq, and cyberrisk

74 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

57 48
CybaVerse CybaVerse

The future of cyber security. Our mission is to create innovative solutions coupled with highly skilled professionals, streamlined processes, and cutting-edge technology to deliver the very best managed cyber security solutions to the market. CybaVerse is a cyber security SaaS platform for SMEs and MSPs, offering automated assessments, MDR, and white-labeled solutions to simplify security, boost protection, and support scalable growth. Industry leading service lines: Penetration Testing Managed Security Services Cyber Security Training Compliance Penetration Testing, Managed Detection and Response, Threat Intelligence, OSINT, ISO27001, Cyber Essentials , Cyber Awareness Training, Cyber Security, and cyber security assessment

151 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 30
Yogosha Yogosha

Offensive Security Testing Platform - Harden your assets. Lower your breach risk. Yogosha is an Offensive Security Testing Platform that allows companies and governments to raise their security posture. • Access 1000+ elite security experts with diverse skills • Launch security tests within 48 hours • Find serious vulnerabilities in real-time within hours/days • Accelerate vulnerability remediation • Keep up with compliance and regulatory obligations More than 300 organisations have hardened their assets and lowered their breach risk with Yogosha. Our security testing operations include: Pentesting as a Service, Continuous Offensive Testing, Bug Bounty, Red teaming, Vulnerability Disclosure Program, Forensics, …

Type: Startup Activities: it services Technologies: Cybersecurity

70 213
Keepnet Keepnet

Human Cyber Risk Management: Build security culture with AI Phishing Simulations, Adaptive Training, Phishing Response. Our Vision: At Keepnet, we see the future of cybersecurity differently. For us, the human element is at the core of every digital fortress. We are dedicated to crafting a cybersecurity environment that interweaves cutting-edge technology, the principles of behavioral psychology, and nudge theory. Our goal? To empower businesses and individuals, arming them with a consolidated platform to fight against ever-evolving cyber threats. Through collaboration, advanced technology integration, and measurable outcomes, we aim to create a secure and resilient digital ecosystem where the human element …

61 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

5 35
Alsid Alsid

A $1.5-trillion cybercrime industry is evolving faster than your defenses. They say there’s no gain without pain. We’re not buying that. Welcome to Alsid, the creators of the AD security solution built on 4 pillars: FIX existing weaknesses with intel-driven insights, threat scores, cost estimates, and custom step-by-step recommendations. HARDEN against future vulnerabilities to break attack paths and keep your threat exposure in check. DETECT attacks in real time with continuous IoE monitoring and empower your threat hunters with AD-native investigation capabilities. RESPOND to threats at machine-speed, replay attacks to hunt for patient zero, and kick persistence mechanisms out for …

Type: Startup Activities: it services Technologies: Cybersecurity

19 14
Skybox Security Skybox Security

Secure more. Limit less. Prevent breaches before they happen. Get the intelligence and context you need to reduce cyber exposure at speed and scale. Skybox Security is the only platform that collectively visualizes and analyzes hybrid and multi-cloud networks, providing full context and understanding of the attack surface. Security Analytics, Firewall Auditing, Vulnerability Management, Network Auditing, Threat Intelligence Management, Firewall Change Management, Attack Surface Visibility, Modeling and Simulation, Rule Lifecycle Management, Vulnerability Assessment, and Attack Simulation

80 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

15 154
FLabs FLabs

We process application threat data into actionable intelligence, analyze & share information with the InfoSec community. We process app threat data from F5 and our partners into actionable intelligence. We analyze and share the Who, What, When, Why, How, & What’s Next of cyber attacks to benefit the security community. InfoSec, Threat Intelligence, Application Security, IoT, Cybersecurity, threat research, application services, malware, phishing, credential stuffing, breaches, hackers, CISO, independent, application protection, ddos, tls, and magecart

103 similar entities Type: SMB Startup Activities: deeptech healthtech it services Technologies: Cybersecurity

2 6
Melius CyberSafe Melius CyberSafe

Cyber Security | Penetration Testing | Vulnerability scanning | Cyber Essentials | CE Plus | ISO27001 At Melius CyberSafe, we believe cybersecurity shouldn’t be complex, costly, or reactive. That’s why we’ve built a smarter, more proactive approach, one that gives businesses the continuous protection they need without the headaches (or the expensive price-tag). Founded by experts with decades of experience in penetration testing, compliance, and risk management, we set out to make enterprise-level security affordable and accessible to businesses of all sizes. Our CREST-accredited penetration testing services help organisations uncover vulnerabilities before attackers do, ensuring their networks, applications, and cloud …

139 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

2 11
AttackIQ AttackIQ

Continuously Strengthen Your Cyber Defenses and Proactively Manage Threat Exposure. AttackIQ® is trusted by top organizations worldwide to validate security controls in real time. By emulating real-world adversary behavior, AttackIQ closes the gap between knowing about a vulnerability and understanding its true risk. AttackIQ’s Adversarial Exposure Validation (AEV) platform aligns with the Continuous Threat Exposure Management (CTEM) framework, enabling a structured, risk-based approach to ongoing security assessment and improvement. The company is committed to supporting its MSSP partners with a Flexible Preactive Partner Program that provides turn-key solutions, empowering them to elevate client security. AttackIQ is passionate about giving back …

61 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

17 168
Patrowl.io Patrowl.io

Simply faster than attackers Patrowl is an innovative product designed by cybersecurity experts. It automates the detection and remediation of your vulnerabilities to finally be faster and more efficient than cybercriminal organizations. It is built around 4 main principles: - Patrowl automates continuous penetration tests using advanced technology and our expertise. This allows us to identify your assets (known and shadow-it) and vulnerabilities in real time over a wide area. At a glance, visualize your overall level of security and especially how to improve it. - Real adapted solutions appear on the Dashboard. You will be able to act yourself …

53 similar entities Type: Startup Activities: it services Technologies: A.I. Cybersecurity

15 47
DND Agency DND Agency

Agence de conseil et d'expertise Cybersécurité spécialisée en Audit de Sécurité IT et protection des données. Are we legion ? May be not... However, we can take action globally to help you avoid IT confusion. D.N.D Agency Team embodies all technical IT Skills to contribute to your safety, the safety of your informatics system, the safety of your staff, and mainly the safety of your structure. We know that everything linked to cyberspace is exposed to risks. The role of our team is to think out of the box and proceed efficiently in your interests thanks to our 10 years’ …

106 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity IoT

2 16
EclecticIQ EclecticIQ

Tailored threat intelligence, risk-based prioritization, rapid response Founded in 2014, EclecticIQ is a global provider of threat intelligence technology and services that empower customers to neutralize critical cyber threats to their business in an ever-evolving landscape. Guided by our values — being curious, bold, accountable, and collaborative — we help security teams make smarter, faster decisions with dynamic solutions that reduce complexity and streamline threat detection and response. From our AI-embedded threat intelligence platform to our browser extension, our products improve workflows, reduce analyst fatigue, and mitigate cyber risk. Our customers rely on our expertise and unique technology to integrate …

197 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

13 80
CovertSwarm CovertSwarm

YOU DESERVE TO BE HACKED YOU DESERVE TO BE HACKED. They say you should keep your friends close, but your enemies closer — and CovertSwarm is your worst nightmare. A specialist red team of ethical hackers and penetration testers, we attack relentlessly from every angle to hit your brand where it hurts again, and again, and again. If there’s a weak spot in your app or website, we’ll find it. If an update exposes a vulnerability, we’ll spot it. And we’ll raise the alarm fast, before anyone can break in. Cyber Services, Social Engineering, Cyber assurance, Cyber Risk, Constant Cyber …

6 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 63
ThreatsHub ThreatsHub

Threat Analysis & Cloud Security, a tailored architecture to help your security teams fight against cyber-threats ThreatsHub provides reliable and actionable Threat Intelligence and Cloud Security Services. Combines Machine Learning and Cybersecurity techniques in a custom built platform to scan, acquire and classify public Internet data. Our innovation and research make it possible to tackle escalating cyber risks through exceptional network visibility, threat detection and operational insight. Learn more at threatshub.org. Get security news, trends and insights at threatshub.org/blog or follow us on Twitter @ThreatsHub.

25 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I. - Machine Learning

0 2
HanseSecure GmbH HanseSecure GmbH

More security through effective and highly specialized review & AMP; Advice It security? -& gt; Contact now! Pentest | RedTeaming | Technical & amp; Strategic advice Cisoaas Hansesecure sees itself as a supporting challenger and offers you an individual offer and target adjustment. Our customers come from all industries and company sizes. By combining different security skills, we open up a holistic range of services. You want yourself & amp; Protect your company? 👉🏼 https://hansesecure.de/termin ➡ 70,000 followers on Twitter ➡ TOP 21 Security Sources worldwide 2018-2023 ➡ Published vulnerabilities (e.g. Microsoft & amp; Intel) on https://hansesisecure.de/blog/ Here you can …

69 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

8 5
Torii Security Torii Security

The best defense is the hack. Torii Security is an expertise firm specializing in information systems safety. Our mission: protect your digital heritage! We intervene all over the chain, to guarantee a real improvement in your protection: - Evaluation: by carrying out safety audits and intrusion tests (Pentses), - Training: Technical training and risk awareness for all, - Improvement: by technical supports, advice services, integration of open source solutions with added value More information to come on www.torii-security.fr Safety of information systems, open source, audits, intrusion tests, advice, management, advice, cybersecurity, computer security, and cyber awareness

156 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

2 4
GreenLock Advisory GreenLock Advisory

Offensive security & Threat Intelligence GreenLock Advisory is an independant consulting firm created in 2015. We are offering several expertises on cyber-security: - Penetration testing - Architecture review - Threat intelligence/hunting - Automation of Security Operations - Vulnerability management cybersecurity, audit, security, threat intelligence, vulnerability management, and Automation

310 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 1
Flare Flare

Attackers Shouldn’t Have The Information Advantage. The Flare Threat Exposure Management (TEM) solution empowers organizations to proactively detect, prioritize, and mitigate the types of exposures commonly exploited by threat actors. Our platform automatically scans the clear & dark web and prominent threat actor communities 24/7 to discover unknown events, prioritize risks, and deliver actionable intelligence you can use instantly to improve security. Flare integrates into your security program in 30 minutes and often replaces several SaaS and open source tools. Learn more by signing up for our free trial: https://try.flare.io/free-trial/ Dark Web, External Threat Intelligence, Data Analysis, Web Crawling, CTI, …

22 similar entities Type: Startup Activities: it services Technologies: Cybersecurity Data Analytics

1 120
NVISO Security NVISO Security

NVISO is a cyber security services firm composed of outstanding security professionals - each has a specific field of expertise, ranging from security research and risk management to incident response and security testing. This unique "skill blend"​ allows them to analyse and respond to complex client challenges and help those companies prevent, detect and respond to security challenges with a positive business outcome. Built on values of Pride, Caring for our people, Breaking Barriers, and fostering a no-BS approach, our mission is to be an innovative, trusted and respected security partner for our clients. Penetration Testing, Digital Forensics & Incident …

203 similar entities Type: Startup Activities: it services deeptech Technologies: Cybersecurity

11 319
Outpost24 Benelux (ex-Sweepatic) Outpost24 Benelux (ex-Sweepatic)

The CTEM platform for smarter cybersecurity risk management. Outpost24 helps organizations improve cyber resilience with a complete range of solutions that enable Continuous Threat Exposure Management (CTEM). Our intelligent cloud platform unifies asset management, automates vulnerability assessment, and quantifies cyber risk in business context. Executives and security teams around the world trust Outpost24 to identify and prioritize the most important security issues across their attack surface to accelerate risk reduction. To learn more about our products and services go to https://outpost24.com Passive reconnaissance, Cyber security, Data leakage, Cyber Threat Intelligence, Digital footprint, Digital Risk monitoring, Counterintelligence, Asset management, Attack Surface …

147 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

7 8
Olyt Olyt

Build, plan and automaton your cybersecurity strategy with Olyt. Olyt is a platform that supports cybersecurity teams in their daily challenges. Our platform makes it possible to organize, centralize and follow the cybersecurity roadmap thus giving real time scoring of the cybersecurity posture of the entire company. Our integrations and security controls simplify the monitoring of the fights to be waged

80 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 N/A
TeamSystem Cybersecurity | Muscope TeamSystem Cybersecurity | Muscope

Welcome to Muscope, a company led by highly experienced founders with more than 17 years of field track record on average. Our Muscope|Risk platform analyzes your company attack perimeter from external and dark web data, identifies vulnerabilities, provides a security rating and a detailed action plan, in order to ensure a high standard of safety. As a bonus, the platform calculates a monetary annual risk for specific types of cyberattacks and incidents. Together we are on a mission to prevent cyber attacks aimed at your company, with forever evolving technology. Join us!

87 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

5 7
Praetorian Praetorian

The Leader in Offensive Security Praetorian, a trusted leader in offensive security services, empowers enterprises to thrive in a digital world without compromise. Enterprise security demands the ability to proactively detect vulnerabilities and threats, yet identifying signals from noise in today’s ever-expanding attack surfaces is increasingly difficult. Our cybersecurity experts provide the deep subject matter expertise needed to defend against persistent, sophisticated attacks. Praetorian professional and managed services cover all attack vectors - external, internal, cloud, web app, secrets, phishing, and supply chain and vendor risk. With Praetorian standing guard, CISOs of the world’s largest organizations rest assured that they …

82 similar entities Type: Startup Activities: it services Technologies: A.I. A.I. - Machine Learning Cybersecurity IoT

6 172
Binary Defense Binary Defense

Founded in 2014 by the industry’s top cybersecurity experts, Binary Defense is on a mission to change the security industry for the better and help organizations defend against threats of all kinds. We believe that the best defense against cyber threats uses a human-driven, technology-assisted approach. We protect businesses of all sizes through our advanced cybersecurity solutions including Managed Detection and Response, Threat Hunting, Digital Risk Protection, Incident Response, Phishing Response, and Analysis on Demand. Binary Defense was spawned from the need for better monitoring and detection capabilities in companies. The founder of Binary Defense, David Kennedy, also founded TrustedSec …

68 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

3 201
GATEWATCHER GATEWATCHER

Highlight cyber threats before they darken your business European leader in intrusion detection and advanced threat detection, Gatewatcher has been protecting the critical networks of large companies as well as public institutions since 2015. Its model combines multiple technologies with A.I. to provide consistent, optimal protection and meet the current and future cybersecurity challenges of organizations. cybersecurity, sécurité informatique, cyberdéfense, cyberdefense, cyberattacks, IT, advanced persistent threats, networks security, exploits, malware, intrusion detection system, threat protection, IDS, APT, Trackwatch technology, NDR, CTI, Threat hunting, and Threat forensics

422 similar entities Tags: FrenchTech2030 Type: Startup Activities: it services Technologies: Cybersecurity

62 127
Clear Gate | Cyber Security & Research Clear Gate | Cyber Security & Research

In-Depth, Manual Penetration Tests Clear Gate is an Israeli-based company operating worldwide since 2016, assisting companies to protect their SaaS applications by performing a cyber security risk assessment. We focus only on Cyber Security Risk Assessments for SaaS applications, nothing else since it is the only way we can be a leader in our field. We believe automation is excellent, but in most cases, it is not enough, and human logic is required. With manual testing, we discover significantly more. Penetration Testing, Code Review, Risk Assessment, Application Security, Mobile App Security, API Security, SaaS Security, ISO27001, and SOC2 Type 2

68 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 18
ID Agent ID Agent

ID Agent, a Kaseya company, provides effective, easy-to-manage and affordable dark web monitoring, security awareness training and phishing simulation solutions to managed service providers (MSPs) and organizations’ IT teams. Our flagship product, Dark Web ID, monitors the dark web to identify compromised and stolen user credentials and deliver validated intelligence and alerts to prevent security incidents. Our BullPhish ID solution provides security awareness training and phishing simulation geared to the non-technical end user to mitigate human risk and further enhance organizations’ cybersecurity posture. Cyber Threat Intelligence, Dark Web Monitoring, Cybersecurity, MSP, MSSP, Digital Risk Protection, Anti-Phishing Software, Phishing Simulation, Employee …

57 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 23
Huntress Huntress

Managed #cybersecurity without the complexity. EDR, ITDR, SIEM & SAT crafted for under-resourced IT and Security teams. Protect Your Endpoints, Identities, Logs, and Employees. The fully managed security platform that combines endpoint detection and response, Microsoft 365 identity protection, a predictably affordable SIEM and science-based security awareness training. Powered by custom-built enterprise technology for mid-market enterprises, small businesses, and the MSPs that support them and delivered by unrivaled industry analysts in our 24/7 Security Operations Center. By delivering a suite of purpose-built solutions that meet budget, security, and peace-of-mind requirements, Huntress is how the globe’s most underresourced businesses defend against …

218 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

7 672
Cybersafe Solutions a CyberMaxx Company Cybersafe Solutions a CyberMaxx Company

STATE-OF-THE-ART CYBERSECURITY SOLUTIONS & PROTECTION 24/7 We’ve moved! Cybersafe Solutions is now proud to be part of the pack at CyberMaxx. Follow us for the latest on modern MDR solutions and more cybersecurity related content. cybermaxx.com Threat Hunting, Threat Monitoring (Network & Endpoint Security Monitoring), Threat Training (Security Awareness Training & Simulated Phishing Tests), Threat Forensics (Digital Forensics & Incident Response), Threat Policies, Managed Detection Response and Containment, Network Security Monitoring , Endpoint Security Monitoring , Investigations And Incident Response, Security Awareness Training & Simulated Phishing Tests, Penetration Testing, Risk Assessments, Security Policy Development, Dark Web Monitoring, Cyber Security, Cybersecurity, …

188 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

3 24
Lastline, Inc. Lastline, Inc.

AI-powered Network Security to Defeat Advanced Threats Lastline, Inc. provides innovative AI-powered network security products that detect and defeat advanced cyberattacks attempting to enter and operating within your network. We protect network, email, cloud, and web infrastructures, minimizing the risk of damaging and costly data breaches with fewer resources and at lower cost. We uniquely apply AI to the combination of network traffic and malware behaviors – what we call “AI Done Right” – delivering a single, comprehensive incident that identifies all malicious activity and affected systems across the compromised network, with minimal false positives. The result is improved efficiency …

59 similar entities Type: Startup Activities: it services Technologies: A.I. Cybersecurity

0 4
SECURAS TECHNOLOGIES SECURAS TECHNOLOGIES

Cybersecurity is not a choice Securas offers cybersecurity solutions and services and Cyber ​​Threat Intelligence which allowing both to detect and prevent cyber attacks and threats. Our goal is to make prevention against cybersecurity threats accessible to all! Cybersecurity, CTI, Pensest, Application intrusion test, external intrusion test, social engineering, infrastructure and network, Mobile applications or desktop, and PENTEST of web platforms

313 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 14
Threatcare Threatcare

The leader in proactive attack simulations. Recently acquired by ReliaQuest. Threatcare is the leader in proactive attack simulations, helping companies measure the effectiveness of their cybersecurity programs through their software. Their real-time insights and actionable recommendations enable companies to secure more faster, while having greater confidence in their current security controls. ReliaQuest’s recent acquisition of Threatcare will enhance the power of the ReliaQuest GreyMatter platform by enabling enterprise customers to vastly increase the quality and efficacy of their detection and response capabilities. Breach and Attack Simulation, Penetration Testing, Incident Response, Vulnerability Scans, BAS Technology, Cybersecurity, and Information Security

65 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

4 1
Synack, Inc. Synack, Inc.

The Premier Security Testing Platform. Synack’s Penetration Testing as a Service platform manages customers’ attack surfaces by discovering new assets, pentesting for critical vulnerabilities and gaining visibility into the root causes of security risks. We are committed to making the world more secure by harnessing a talented, vetted community of security researchers to deliver continuous penetration testing and vulnerability management, with actionable results. Synack's PTaaS platform has uncovered more than 71,000 exploitable vulnerabilities to date, protecting a growing list of Global 2000 customers and U.S. agencies in a FedRAMP Moderate Authorized environment. Security Testing, Cybersecurity, Penetration Testing, and Vulnerability Management

60 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

21 251
BluVector, A Comcast Company BluVector, A Comcast Company

We’re continuing our commitment to advanced threat detection as part of Comcast Technology Solutions. We’re continuing our commitment to advanced threat detection as part of Comcast Technology Solutions. Discover how we’re working together to empower security teams to protect their network with better security data. Cybersecurity, Machine Learning, Incident Response, malware detection, network intrusion detection, ai, network security, and fileless malware

134 similar entities Type: Startup Activities: it services Technologies: A.I. A.I. - Machine Learning Cybersecurity

15 12
Vambrace Cybersecurity Vambrace Cybersecurity

Leading experts within cybersecurity At Vambrace Cybersecurity we love to solve problems with simplicity & innovation. It’s our mission to make compliance & cyber security services accessible to all. We take pride in building and nurturing teams of exceptional talent, so we’re confident that our cyber security & compliance services are the best way to stay one step ahead of the hackers and protect your business. With our own in-house UK Security Operations Centre (SOC) and years of industry experience, we're ideally placed to help you stay ahead of current and emerging security threats. Gambling Compliance, Cyber Security, Startup Support, …

433 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 23
Cresco Cybersecurity Cresco Cybersecurity

Your expert in pentesting Cresco is your partner in cybersecurity. With our ethical hacking background, we replicate hacker's methods and conduct in depth assessments to have a realistic vision on the maturity of your security systems in order to set up an adequate security plan to protect your business. At Cresco we believe in long term collaborations. We are working together with leading IT companies, sharing our expertise in cybersecurity to make EU's IT landscape a safer place. We are fully committed to work transparently respecting data and information confidentiality, striving for process excellence and delivering the best possible service …

175 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

4 22
ThreatConnect ThreatConnect

ThreatConnect is changing the way security works by turning intelligence and insights into action. ThreatConnect enables threat intelligence operations, security operations, and cyber risk management teams to work together for more effective, efficient, and collaborative cyber defense and protection. With ThreatConnect, organizations infuse ML and AI-powered threat intel and cyber risk quantification into their work, allowing them to orchestrate and automate processes to get the necessary insights and respond faster and more confidently than ever before. More than 200 enterprises and thousands of security professionals rely on ThreatConnect every day to protect their organizations' most critical assets. To learn more …

64 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

6 166
Cyberint, a Check Point Company Cyberint, a Check Point Company

We turn intelligence into actions to proactively and effectively defend businesses against cyber threats Cyberint, the Impactful Intelligence company, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The Cyberint Argos platform’s patented technology provides superior visibility through continuous discovery of the evolving attack surface, combined with the automated collection and analysis of vast quantities of intelligence from across the open, deep and dark web. A team of global military-grade cybersecurity experts work alongside customers to rapidly detect, investigate, and disrupt relevant threats – before they have the chance to develop into …

172 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

9 163
Radiflow Radiflow

Taking the guesswork out of OT security We believe there should be no compromise on ICS or OT security. You don’t want to realize the importance of cybersecurity after the fact. We believe that you can’t protect what you can’t see, and you can’t manage what you don’t know. Radiflow is on a mission to take the guesswork out of OT security. We empower our customers to prioritize their actions with our industrial threat detection and risk management solutions. With Radiflow CISO’s can make decisions and take action based on data. Radiflow’s team is known for its cybersecurity expertise and …

34 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

6 48
OnSecurity OnSecurity

We simplify the management and delivery of your pentesting. OnSecurity offers CREST-accredited AI Augmented Penetration Testing, all whilst harnessing technology to simplify the management and delivery of pentesting. https://www.onsecurity.io/ Continuous assessment, Vulnerability detection, IT Security reporting, Web Security, Penetration testing, Compliance testing, Threat and attack intelligence, Red teaming, Social engineering, and AI-Augmented Pentesting

76 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 58
3S Sécurité 3S Sécurité

The security of your data, our daily issue. 🔒 Founded in 2020, our mission is to protect companies against increasing digital threats. We offer complete services, ranging from intrusion tests to the implementation of secure infrastructure and supervision, relying on multidisciplinary expertise. Our services: ✔ Audits ✔ Intrusion tests ✔ Implementation of secure network architecture ✔ Integrations of safety solutions ✔ Training & amp; awareness ✔ MCO / MCS

66 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

2 9
Threat Protect Threat Protect

Enabling organisations and individuals to work with confidence by providing tailored Cybersecurity solutions Threat Protect helps businesses fight cybercrime, protect data and reduce security risks. With our cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Threat Protect enables businesses to transform the way they manage their information security and compliance programs. At Threat Protect we provide near real-time active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Join us in achieving a cyber resilient posture to help reduce your financial losses, meet regulatory requirements, improve your …

128 similar entities Type: Startup Activities: it services regtech Technologies: Cybersecurity

4 9
LuJam Cyber LuJam Cyber

Protecting SME and Supply Chain Networks from Cyber Attacks. Join us in #MissionPossibleCyber - securing the UK FAST ! LuJam Cyber is a cybersecurity company that provides protection to SME’s Network. We are part of the Wayra and GCHQ's NCSC 2018 Cyber Accelerator Program. Our product is complementary to firewalls and anti-virus software, detecting in different ways uncovered security threats including those associated with IoT devices. Our sensor audits, reports and alerts all types of suspicious network activity, provides visibility of unauthorised devices connecting, the use of cloud services and blocks access to high-risk areas of the internet. This subscription-based …

157 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT Sensors

6 3
SenseOn SenseOn

SenseOn hyperautomates threat detection and response, giving you unparalleled visibility and protection. SenseOn, founded in 2017, revolutionises cybersecurity with AI-driven NDR, EDR, and XDR solutions. Our platform, developed by cybersecurity experts and former government operatives, automates threat detection and response, protecting against advanced cyber threats like ransomware and data breaches. We aim to simplify and strengthen enterprise security through innovative automation. Cyber, Cyber Defence, Information Security, Machine Learning, Artificial Intelligence, Digital Risk Monitoring, Al, Software, Artificial Intelligence, Threat Detection, AI Triangulation, Incident Response, and 24/7 Managed SOC

145 similar entities Type: Startup Activities: it services Technologies: A.I. A.I. - Machine Learning Cybersecurity

6 69
TrustLayer TrustLayer

Cybersecurity, the direct way. Protecting users, activity and data — at every layer, without delay (formerly Censornet) Autonomous integrated security that ensures your cyber defences react at lightning speed, day and night. Faster, smarter, and safer than humanly possible. Every business needs a solution that can effectively manage cross-channel attacks. Censornet’s Autonomous Integrated Security shares attack intel across email, web, and cloud applications — meaning that your company is automatically protected against cyber attacks, no matter the time of day or night. This ensures your cyber defences react at lightning speed, day and night. We verify and assess risk continuously …

60 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

7 61
NopSec NopSec

Fix Less, Secure More Vulnerability assessment scanners are adept at finding security flaws, but they leave professionals with chaotic lists of vulnerabilities to sift through. With a mixture of spreadsheets and crossed fingers, cyberdefenders struggle to determine what to fix first. This results in wasted time and little progress made on their overall risk exposure. NopSec has been recognized by both Gartner and Forrester for its whole-brain approach to vulnerability prioritization. We’ve infused our years of offensive security expertise into a patented algorithm that prioritizes vulnerabilities for remediation based on each company’s unique environment. As a result, companies spend less …

31 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

2 47
HIUMA | Gestion, maintenance informatique HIUMA | Gestion, maintenance informatique

Finally, IT assistance without obligation! 🙋🏻‍♂️ Cyber ​​security partner of large accounts since 2011, we have positioned ourselves as cyber-security, networks, cloud, infrastructure. We design digital technology as a tool at the service of humans and not the other way around. One of the keys to cyber-security progress Cybersecurity, managed services, networks, and audit cybersecurity

463 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

0 4
VMRay VMRay

Sandboxing reinvented against the malware & phishing threats of today - and tomorrow. Sandboxing reinvented to uncover the threats of today & tomorrow. At VMRay, our purpose is to liberate the world from undetectable digital threats. Led by reputable cyber security pioneers, we develop best-in-class technologies to help organizations distinguish genuine threats from the noise and obtain additional context and insights into those threats. Based on the world's most advanced malware and phishing analysis platform, we enable enterprises, government organizations, and MSSPs to automate security operations, accelerate analysis and response, and build reliable threat intelligence. In times of uncertainty and …

88 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

9 114
vFeed, Inc. vFeed, Inc.

Correlated / Aggregated Vulnerability Intelligence & Prioritization as a Feed Service. vFeed, Inc. technology and algorithms transforms and unifies scattered big data into correlated vulnerability and threat intelligence multi-formats indicatos. We are passionate about protecting vulnerable and sensitive systems, and enabling clients to rapidly detect and react against cyber-attacks Our current worldwide client base comprises of a wide and diverse range of individuals and businesses from hackers, consultancy firms, CERTs and freelancers to governmental organizations, software companies and intelligence providers. U.S. Patent and Trade Office has recognized our method and system for automated computer vulnerability tracking as deserving the effort …

77 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I.

0 2
Stamus Networks Stamus Networks

Expose serious threats and unauthorized activity lurking in your network Stamus Networks believes in a world where defenders are heroes, and a future where those they protect remain safe. As organizations face threats from well-funded adversaries, we relentlessly pursue solutions that make the defender’s job easier and more impactful. The global leader in Suricata-based network security solutions, Stamus Networks helps enterprise security teams know more, respond sooner and mitigate their risk with insights gathered from cloud and on-premise network activity. Our Stamus Security Platform combines the best of intrusion detection (IDS), network security monitoring (NSM), and network detection and response …

60 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 30
ProSec GmbH ProSec GmbH

Be part of our #cyber resilience community and use our knowledge! Prosec GmbH transforms companies into digital fortresses. With the headquarters in Rhineland-Palatinate, Germany, we offer proactive cyber security solutions that protect your organization in a constantly changing threat landscape. Discover all of our offers and resources on our Linktree - https://linkr.ee/prosecGmbH Our services: 🔍 Detect: Identification of threats is essential. Our penetration tests reveal hidden vulnerabilities in their infrastructure, mobile applications and web applications. We make sure that you are always one step ahead of potential attackers. 🔐 Respond: Every second counts for security incidents. Our IT security advice …

107 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 55
Hacknowledge SA Hacknowledge SA

Your Vendor Neutral Cybersecurity Partner Security Made Simple What is Hacknowledge? Hacknowledge is a Swiss security monitoring solution that will help you shorten the time between breach and detection. Our service is built on experience and intelligence gained from more than a decade of penetration test and mitigating advanced threats An innovative approach Searching the logs to find security issues is close to finding a needle in the haystack. This is why we will leverage the use of your existing security devices and fortify your logs with strong indicators of compromise generated by our custom sensors installed on your network. …

55 similar entities Type: Startup Activities: it services Technologies: Cybersecurity Sensors

11 24
SoCyber SoCyber

✔️App/Network Penetration Testing ✔️Vulnerability Assessment ✔️Security as a Service Protect your organization with SoCyber's comprehensive cybersecurity solutions! Team SoCyber specializes in security and compliance for organizations in banking, eCommerce, fintech, critical infrastructure, and manufacturing. We help with NIS2, DORA, PCI-DSS and other relevant compliance frameworks! Get the essential tools and expertise to mitigate your cyber risk, strengthen your security posture, and confidently navigate the complex regulatory landscape. Our offensive security suite includes a range of critical services: • Penetration Testing: Network, web application, mobile application, and API penetration testing. • Security-as-a-Service (SECaaS): Scalable and flexible security services for growing organizations. …

61 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

7 20
Triskele Labs Triskele Labs

When Experience Matters Triskele Labs is one of Australia’s fastest growing cybersecurity companies. We deliver services including traditional projects such as Penetration Testing, Compliance and Risk Management through to new breed services including 24*7*365 Security Operations and outsourced Cybersecurity Managers to ensure we are a complete cybersecurity solution centre. Our team of experts leverage elite threat intelligence to provide the highest level of cybersecurity professional services. We go the extra mile to demystify cybersecurity and become your trusted partner by developing customised programs that deliver on your specific needs to meet your budget. Our holistic approach allows us to achieve …

298 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 93
Samurai Digital Security Limited Samurai Digital Security Limited

Cyber Security, Red Team Attack Simulation & Penetration Testing | "To defeat your enemy, become your enemy" – Sun Tzu We are a cyber and Information security services provider. Founded by university academics and consultants we develop and provide system penetration, network intrusion, incident response, user awareness, and information governance solutions, strategies, and services. Our employees are a combination of Ph.D. qualified researchers, Crest Registered Testers, and BSI 27001 lead auditors. Through our combined and academic research, we have a thorough understanding of the problem domain, ideally placing us to use applied research to mitigate the real-world risks of cybercrime. …

199 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity

0 13
VirusTotal VirusTotal

Crowdsourced security intelligence for everyone What? VirusTotal is the richest and most actionable crowdsourced threat intelligence platform in the planet. It equips security teams with comprehensive context and cutting edge functionalities to proactively protect their networks from cybersecurity threats. Why? Security teams are often confronted with an unknown file/URL/domain/IP address and asked to make sense of an attack. Without further context, it is virtually impossible to determine attribution, build effective defenses against other strains of the attack, or understand the impact of a given threat in your organization. Through API and web based interaction with VirusTotal, security analysts can quickly …

49 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

8 60
BlackfishID BlackfishID

We didn’t reinvent cybersecurity, we just made it simpler and smarter. Our unified platform simplifies security management by combining device protection, reputation monitoring, domain security, and more. Designed with ease of use and affordability in mind, we empower users to stay protected without breaking the bank. AI, Cybersecurity, and Social Media

299 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I.

0 2
Redborder Redborder

Empowering organizations with machine learning to strengthen security, working alongside teams for a smarter network. Since Redborder’s inception, we’ve been committed to ensuring client security through advanced, AI-powered solutions designed to adapt to today’s dynamic threat landscape. Cybersecurity is about more than technology; it’s about transparency, collaboration, and a shared commitment to safety. With the rapid rise of sophisticated cyber threats—such as advanced persistent threats, zero-day exploits, and targeted malware attacks—traditional security measures alone are no longer enough. Redborder analyze and correlates real time data from across your network, to provide deep insights into potential threats, enabling faster, more accurate …

63 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

3 18
Carbon Black Carbon Black

Carbon Black delivers legendary enterprise security solutions to protect any business. Your backstage pass to the most epic cybersecurity solutions on the market for Endpoint, Network, Data and Cloud security. Featuring worldwide (yet local-to-you) partner experts with the chops to deliver enterprise-grade security, whether you're a solo act or a supergroup. Be first in line to experience defense that goes to 11. Application Whitelisting, Endpoint Security, Server Security, PCI Compliance, Cyber security protection, Cyber Forensics, Application Control, Windows XP End of Life Security, Advanced Threat Protection, Malware Protection, Incident Response, and Next Gen Antivirus NGAV

89 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

13 308
Ackcent Cybersecurity Ackcent Cybersecurity

Cybersecurity as a Service. Protect against the attacks of today. Prepare for the threats of tomorrow. Ackcent is focused exclusively on offering cybersecurity services and solutions. Our mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialized professional services. Ackcent's professional services are designed to achieve the following: - Align our clients cybersecurity with their business strategies. - Evaluate and manage the vulnerability of their digital assets. - Supervise and administer 24/7 security services. - Protect systems and applications in a cloud environment. From our headquarters in Barcelona, Madrid and …

114 similar entities Type: SMB Activities: consulting it services Technologies: Cybersecurity

3 56
Malware Patrol Malware Patrol

Since 2005, we've provided actionable threat intelligence to prevent, detect and respond to cyber attacks. Malware Patrol has provided cyber threat intelligence since 2005. Enterprises and members of our community in more than 175 countries use our up-to-the-minute data for threat research and hunting, incident response, and network protection. Our machine readable feeds are available in predefined and customized formats, compatible with the most popular security systems, including: Cisco ASA, Fortinet FortiGate Firewall, Palo Alto Firewall, Mikrotik, MISP, pfSense, Squid, among others Protect your company from unwanted cyber attacks. For a FREE evaluation of our data feeds, send us a …

61 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

3 8
Team Cymru Team Cymru

Mission: To Save & Improve Human Lives Since 2005, Team Cymru’s mission has been to save and improve human lives by working with public and private sector analyst teams around the world, enabling them to track and take down bad actors of all kinds. The company delivers comprehensive visibility into global cyber threat activity and is a key source of intelligence for many cyber security and threat intelligence vendors. Its Community Services division provides no-cost threat detection, DDoS mitigation and threat intelligence to network operators, hosting providers and more than 143 CSIRT teams across 86+ countries. Enterprise security teams rely …

152 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

4 127
Blacklight AI | OwlGaze Blacklight AI | OwlGaze

Next-Gen AI SIEM Designed by Security Experts for Proactive Security Teams OwlGaze is the cybersecurity software company behind Blacklight AI SIEM. Blacklight, our proprietary predictive AI-based SIEM and threat detection software provides first-in-class security. A cloud-native, monitoring and detection software that acts as a command center for any organization. Blacklight is architected, designed and built using industry best practices, offering the maximum level of flexibility and extensibility. Combined with OwlGaze’s SOC services, we help enhance your monitoring, detection and response capabilities using our next-gen software designed for proactive monitoring. Monitors, detects, and predicts sophisticated threats allowing security teams to respond …

60 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I. A.I. - Machine Learning

1 12