Search 1
Entities
LogoName Σ Employees
Mithril Security Mithril Security

A simple privacy framework for data science collaboration. Mithril Security helps software vendors deploy AI SaaS to security-demanding organizations. We do it thanks to our secure enclave deployment tooling, which provides SaaS on-prem levels of security and control for customers. #DataSecurity #AIIntegration #SaaS #Enclaves #ConfidentialComputing #AISaaS Deep Tech, confidential computing, cybersecurity, and Data Science

91 similar entities Type: Startup Activities: it services Technologies: A.I. Cybersecurity

9 13
D-Lake D-Lake

Your data is critical The D-Lake group supports its customers in securing their data. Contact us: Sales@d-lake.fr Cloud, Network, Security, Consulting, Coffee, Internet, and Hosting

316 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

13 9
20face 20face

Privacy Proof Biometrics | GDPR Compliant At 20face (www.20face.com), we specialize in Privacy Proof Facial Recognition suitable for various application domains. We are committed to provide the best solutions and services to help other businesses and companies in building more intelligent and smart products. With a complete awareness of the technical challenges in each application domain, we build robust and accurate software solutions and constantly research on ways to further improve them. Face recognition R&D, Automated surveillance and security, Smart home applications, and Automated identity verification and access-control

80 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 11
Notakey Notakey

Modern Identity and Access Management company. We provide a suite of products, starting from video identification to user authentication and transaction/document signing. Currently used by some of the largest telecommunication, healthacare, IT and financial service companies.

280 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

5 3
Dataxium Dataxium

Secure new technologies to speed up innovation In an environment in movement where cyber attacks are more and more advanced, cybersecurity and more generally the safety of information systems is a vital issue for companies. In addition, the various directions (general, RSSI, CIO, Risks, operational, etc.) must note the challenge of new technologies (Big Data, NOSQL, Blockchain, Docker, Cloud, IoT, IA) so as not to leave. In this context, how to combine appropriation of new technologies and security? Specialist in information systems and new technologies, Dataxium helps you to take stock of your information system, to secure it, to define …

59 similar entities Type: Startup Activities: it services Technologies: IoT Cybersecurity Blockchain/Cryptocurrency

2 7
Trout Trout

Build the most secure & connected facilities Trout Access Gate combines visibility, access, monitoring, and compliance in one device — so your team spends less time stitching tools and firefighting, and more time piloting your environment and showing IT’s value. networking, cybersecurity, OT, and industrial zero-trust

65 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

22 14
VENTIO VENTIO

Startup offering specialized services for the processing of sensitive health data Ventio is a startup offering specialized services for the processing of sensitive health data, with different fields of expertise: - in IT engineering for secure data processing in the cloud - in medical imaging - in prospective R&D involving new digital technologies - in data valorization for health research Magnetic resonance imaging, Cloud computing, eHealth, R&D, IT, GDPR, and cybersecurity

104 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity Data Analytics

21 3
Ataraxie-IT Ataraxie-IT

RGPD conformity & amp; Cybersecurity for VSEs and SMEs VSE/SMEs, Liberal professions & amp; Independent, Ataraxie-IT offers you: ▶ ︎ Personal data protection (RGPD, DPD/external compliance) ▶ ︎ Safety of your information system (SSI, ISO 27001/27002, EBIOS, Ansi guides) ▶ ︎ data backup Security of information systems, IT security, data backup, computer backup, RGPD compliance, personal data protection, external DPO, and RGPD advice

106 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity

0 1
YAGAAN YAGAAN

Source code vulnerability detection and remediation made simple and efficient with YAGAAN Code Mining technology. At the confluence of software development and cyber risk management, application security is a major challenge for companies whose activities include software development, integration and/or auditing. Indeed, it is a proven fact that the use of Application vulnerabilities as a vector of entry or propagation during cyber-attacks has increased and is now almost systematically used. Within this context, we believe that an upfront optimization of the Application security which is introduced at the earliest stage of the development process is key. Not only it helps …

66 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity

6 1
Hiveo - Once For All Hiveo - Once For All

Vendor Digital Identity Compliance Management Solution HIVEO streamlines and secures exchanges between principals and suppliers via a single tool. An ergonomic solution for collecting documents and information, HIVEO verifies the conformity of the supplier's digital identity and thus guarantees principals compliance with their vigilance obligations. Clients, optimize your time by automating a low value-added task and sustain your relationships thanks to their monitoring over time. You too, join the HIVEO network. Business network, Data security, and compliance

51 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

4 4
CALYPT CALYPT

Calypt est une société spécialisée dans la sécurité des systèmes d'informations offrant des prestations sur mesure. Calypt is an IT Security Company which provides services for protecting your assets. We love to get involved in exciting projects. No matter what size we're happy to talk about a new idea, solution, or application. Feel free to contact us to discuss about security. IT Security, Consulting, Developments, Security Solutions, Penetration Testing, Software assessment, Research & development, Vulnerability assessment, Computer forensics, and Reverse engineering

62 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 11
Kiteworks Kiteworks

Empowering organizations to effectively manage risk in every send, share, receive and save of sensitive content. Kiteworks' mission is to empower organizations to effectively manage risk in every send, share, receive, and save of sensitive data. To this end, we created a platform that delivers data governance, compliance, and protection to customers. The platform unifies, tracks, controls and secures sensitive data moving within, into, and out of their organization, significantly improving risk management and ensuring regulatory compliance on all sensitive data communications. Secure File Sharing, Enterprise Data Security, Regulatory Compliance, Secure BYOD, Private Cloud, Integration with Security Infrastructure, Encryption, Integration …

58 similar entities Type: SMB Activities: it services regtech Technologies: Cybersecurity

4 299
Secret Double Octopus Secret Double Octopus

Modern Authentication for Your Workforce: Secure, Seamless, and Password-Free. Secret Double Octopus provides the only passwordless MFA solution for all enterprise authentication needs. From workstations & SSOs to on-premises infrastructure & legacy applications – with zero employee-managed passwords and a highly secure yet user-friendly interface.

59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

7 39
CFLW Cyber Strategies CFLW Cyber Strategies

Together for a Safer Cyberspace CFLW is a tech-SME that pursues a safer cyberspace through cutting-edge intelligence services. Dark Web Monitor – Providing actionable dark web intelligence to law enforcement, governments and industry.​ Phishing Threat Intelligence – Delivering strategic insights and real-time monitoring to protect organizations from digital threats. Crypto-Asset Analytics – Helping agencies and investigators to trace illicit activities in blockchain transactions.​ AI & Emerging Tech – Leveraging collaborative and responsible analytics to stay ahead in digital asset monitoring.​ As a global cyber intelligence provider rooted in the Netherlands, we believe in impact through collaboration and innovation. Working closely …

404 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 10
AUTOCRYPT AUTOCRYPT

Securing connected, autonomous mobility Began in 2007 as the automotive security division of Penta Security Systems Inc., AUTOCRYPT spun off in 2019 as it became a global leader in autonomous and connected mobility security technologies, paving the way for the new age of automobile and mobility through a multi-layered, holistic approach, with security solutions for V2X/C-V2X, V2G (including PnC security), in-vehicle system, and fleet management (including MaaS and DRT development). Recognized by Forbes Asia in its 100 to Watch list and by TU-Automotive as the Best Auto Cybersecurity Product/Solution, AUTOCRYPT ensures that security is prioritized before vehicles hit the road. …

59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 177
ISSROAD ISSROAD

Support companies and institutions in the informed and secure implementation of digital solutions. Passionate about technology and Cybersecurity, we offer high value-added services, from cyber governance to cyber managed services, including integration and training on cybersecurity technologies and solutions. IAM, PAM, Data Governance, Office 365 Security, SSO, MFA, ISO 27001, SIEM, EDR, ESET, MIM, BeyondTrust, Microsoft, SOC, Sensibilisation Cybersécurité, Scan de vulnérabilité, SOAR, Infogérance, and Infrastructure IT

647 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

2 6
Seclab Seclab

Improving the security, the integrity and the availability needs of connected industries and critical infrastructures. As France's leading provider of cyber protection for critical systems, Seclab secures exchanges by simplifying interconnection architectures and eliminating the risks associated with software flaws in cybersecurity equipment. Its patented technology for electronically breaking all network and USB communication protocols enables the deployment of highly secure network architectures and remote control of cyber-physical systems. ANSSI-certified, our products are designed to secure the country's most critical infrastructures. Our customers address the cybersecurity of their most sensitive assets with solutions that are simpler to implement and maintain …

79 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

19 29
Vaultys Vaultys

Founding the New Web of Trust. 🔒 Vaultys, leader in cybersecurity, is the 1st authentication solution resistant to AIA assigned attacks. The employees, owners of their identifier, connect without password safely, simplicity and sovereignty. 🔒 cybersecurity, decentralized identity, and sovereignty

110 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

18 4
Guardicore Guardicore

Guardicore is the segmentation company disrupting the legacy firewall market. Our software-only approach is decoupled from the physical network, providing a faster alternative to firewalls. Built for the agile enterprise, we offer greater security and visibility in the cloud, data-center and endpoint. Cloud Security, Data Center Security, Legacy Firewall Alternative, Hybrid Cloud Security, Micro-Segmentation, Software-Defined Segmentation, Network Security, and Network Segmentation

77 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

15 82
totemo ag - a Kiteworks company totemo ag - a Kiteworks company

securing data in motion totemo’s leading security solutions for companies and authorities of all sizes are categorized in the product families totemomail® for email encryption, totemodata® for secure managed file transfer and totemomobile® for secure mobile communication. Our innovative products ensure secure information exchanges via the Internet, and cover the functional areas of secure email, mobile security, secure managed file transfer, and data loss prevention (DLP). Our business success is founded on more than ten years of research and development, several international patents and the FIPS 140-2 validation of our cryptography module. Our security solutions are based on the same …

60 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

2 15
KNS KNS

Identity & amp; Access Founded in Lyon in 2002, KNS is a digital service company that works at all levels of information systems securing in France and abroad. Reference player and recognized expert, KNS provides its customers and partners with an impartial, clear and pragmatic vision of digital security issues and related solutions. 19 years of identity management - 25 specialized consultants - 120 IAM/SSO references Identities management, management of authorizations, securing and control of access, Digital identity standards, workflow, rectivities of accounts, inter-referential synchronization, MFA, SSO, identity federation, identity-vigilance, IAM, advice and audit, Integration, Development, Deployment, Maintenance, and Devaas

64 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

2 95
Elandis Elandis

An ESN made up of consultants, engineers specializing in computer project management, network architecture and information systems management. Cybersecurity, IT networks, compliance, high debt, servers, firewall, wifi, IT parks management, intranet, extranet, backup, GDPR, software supports, MOA/MOE, and Multi Factors Authentication

352 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity

0 5
OnSecurity OnSecurity

We simplify the management and delivery of your pentesting. OnSecurity offers CREST-accredited AI Augmented Penetration Testing, all whilst harnessing technology to simplify the management and delivery of pentesting. https://www.onsecurity.io/ Continuous assessment, Vulnerability detection, IT Security reporting, Web Security, Penetration testing, Compliance testing, Threat and attack intelligence, Red teaming, Social engineering, and AI-Augmented Pentesting

76 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 58
Binarii Labs Binarii Labs

Your Data, Your Rules Using our proprietary process utilising encryption, fragmentation and multi-cloud distribution. To revolutionise data security through a platform to enable people and enterprises to take back control, and ownership and secure custody of their own and their stakeholder’s data. This is achieved through our UK & UK-US-patented process with involves encryption, fragmentation, and distribution across multi-cloud storage solutions that enable business continuity, risk mitigation and enterprises to uphold regulation and compliance. The secure storage of your data is proven through the world's first immutable ledger by providing the user a proof of record on the blockchain. Blockchain …

100 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity

10 17
Cryptonite Cryptonite

At Cryptonite, our goal is to help enterprises regain the upper hand against attackers, by providing a platform that addresses fundamental weaknesses in today’s networks. After five years of research and development, Cryptonite was founded in 2015 with a focus on next-generation solutions that defend networks proactively—protecting enterprise networks and giving security professionals time to investigate and respond to cyber threats before it’s too late. Cryptonite’s security platform "CryptoniteNXT"​ establishes a Zero Trust protected environment by implementing an active defense that eliminates full categories of the most common tactics used by adversaries and malicious code.

15 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 1
One Identity One Identity

A leader in unified identity security One Identity helps organizations strengthen cybersecurity, boost efficiency and control costs through the One Identity Fabric, a holistic approach to identity and access management (IAM). By unifying IAM tools, including identity governance and administration (IGA), access management (AM), privileged access management (PAM), and Active Directory management (AD Mgmt), it ensures optimal functionality and efficiency. This cohesive structure reduces identity sprawl and extends governance to the farthest endpoints of your IAM ecosystem. Proven and trusted on a global scale, One Identity manages more than 500 million identities for more than 11,000 organizations worldwide. For more …

36 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

15 609
Woleet Woleet

Authentification de tous les types de données de votre entreprise Woleet is the ideal solution to protect your critical data. All of your sensitive files can be secured with electronic signature, electronic seal or time stamping. Public Blockchain, Cybersecurity, Timestamping, Notary solutions, Certification, Electronic signature, and Electronic seal

Type: Startup Activities: it services Technologies: Blockchain/Cryptocurrency Cybersecurity

24 1
CryptoWeb CryptoWeb

Allow any business to benefit from reliable accommodation while ensuring fair pricing. Cryptoweb is a dedicated, secure and outsourced accommodation service 24/7 for software publishers, web agencies and all companies with a web application. Immigrant, Accommodation, Saas, Iaas, Cluster, Container, Container, Web application, API, Web, Supervision, System Admin, System Administrator, Sys Admin, and Hosting

59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

2 4
Synaps Synaps

Trusted digital ID Synaps helps crypto companies kickstart their projects. We assist our clients in identifying investors and power users with identity and compliance solutions. KYC, Online Identity, eKYC, Digital KYC, Digital Identity, and KYB

65 similar entities Type: Startup Activities: it services Technologies: SaaS

9 58
UBIKA UBIKA

Protect your web applications and APIs anywhere, anytime Founded in 2001, with headquarters in Meudon, France and a research facility in Montpellier, UBIKA is a European cybersecurity vendor. Our mission is to help organizations secure their digital transformation by protecting their web applications and APIs against daily attacks. Our ubiquitous and cloud agnostic Web Application & API Protection (WAAP) technology can be deployed on-premises, in the Cloud, in SaaS mode or as a container, to secure both legacy and cloud native applications. More than 600 companies and public institutions in 35 counties entrust the security of their web applications and …

29 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

8 90
MEGA The Privacy Company MEGA The Privacy Company

User-encrypted cloud services MEGA is a global technology company focused on security, privacy and performance for storage and sharing since 2013. Strong, user generated end-to-end encryption guarantees that nobody else will have unauthorised access to your data. Not even us. Our innovative and competitive service offerings have seen more than 250 million users join us. Check us out. You will like what you see. Privacy, Security, Cloud Storage, Encrypted, Communication, secure, collaboration, Chat, Business, Global, Technology, Cloud, MEGA, VPN, Password Manager, Chat, S4, Encryption, and Data Protection

29 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity

2 181
RCO ASESORÍA DIGITAL RCO ASESORÍA DIGITAL

All the services you need in data protection, web legal adaptation, e-commerce and cybersecurity. All the services you need in data protection, web legal adaptation, e-commerce and cybersecurity. Data protection, Data Protection Delegate, Registration of trademarks, cybersecurity, legal adaptation Web pages, legal adaptation online stores, e-commerce advice, online confidence label, and information security

75 similar entities Type: Startup Activities: privacytech e-commerce it services legaltech Technologies: Cybersecurity

1 2
Microsoft Security Microsoft Security

Protecting people and data against cyberthreats to give you peace of mind We are prioritizing security above all else through our Secure Future Initiative (SFI). Explore SFI principles, pillars, and progress here ⬇️ Security, Information protection, Identity, Compliance, Zero Trust, Remote Work, Threat protection, Access management, Microsoft Azure, Microsoft 365, Cloud app security, Secure application development, MCAS, CASB, Cloud access, Machine learning, and Cybersecurity

73 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity A.I. A.I. - Machine Learning

2 N/A
Brain-Networks Brain-Networks

Services: conseil, intégration, services managés, support IT Solutions: Antispam, Antivirus, Authentification forte, Chiffrement, Corrélation de logs, Firewall, IPS, NAC, QOS, Supervision, Virtualisation, VPN SSL, WAFS

405 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 5
Bastion Technologies Bastion Technologies

Security-first Compliance At Bastion, we're changing the way modern companies secure their software. We enable fast-moving tech teams to build secure, compliant applications from day one—without sacrificing speed. By combining automated compliance, built-in security tooling, and expert guidance, Bastion delivers an all-in-one solution tailored for startups and scale-ups. Designed by security engineers for today’s engineering teams, Bastion is trusted by some of the fastest-growing companies to stay secure and audit-ready—without slowing down. Build fast. Stay secure. Security, Cybersecurity, Technology, and SaaS

122 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

8 17
Ceerus Ceerus

Security to communicate freely Ceerus is a distributed secure communications platform that provides frictionless security for every sensitive conversation with your staff and customers, regardless of where they are or what apps they use. Cybersecurity, Secure Communications, Enterprise Apps, FinTech, and API

113 similar entities Type: Startup Activities: regtech deeptech it services fintech Technologies: Cybersecurity

22 4
ACESO-Conseil ACESO-Conseil

Aceso Conseil supports its customers on various subjects around cyber security and data protection: - Cyber ​​/ GDP awareness - Cyber ​​maturity audit - CYBER PROGRAMS - RSSI or DPO support - Popularization of European regulations to come and identification of the strategy to be deployed (DSA / DMA / DA / Cyber ​​Security Act / Cyber ​​Resilience Act ...) Cybersecurity, GDPR, and governance

415 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 1
Eternilab Eternilab

Cybersecurity for and by humans. Eternilab offers advice, expertise and training in the security of networks and information systems. IT security, computer networks, and reliable and secure software development

449 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 7
Secureware France Secureware France

Secureware est une société spécialisée dans la cybersécurité : Firewalls Next Gen, EDR, IPv6, anti-phishing, ... Secureware is a company dedicated to protecting companies of all sizes from emerging threats. We are also active in the fields of hyperconvergence. Secureware has a wolrdwide coverage and in fact is doing most of its business in Africa. Firewalls and Hyperconvergence

58 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 25
SecludIT - Ahead of Security SecludIT - Ahead of Security

Founded by security experts together with EURECOM, a French research institute in telecom and network security, SecludIT has developed Elastic Security, a set of products and services specifically designed to help cloud infrastructure providers and users to safely migrate to the cloud. Since its creation in 2011, SecludIT has become a recognized industry player, one of the Cloud Security Alliance founders and active member, co-author of Security Best Practices 2.1. SecludIT is a technology partner of Amazon Web Services, HP Cloud, VMware and Eucalyptus. Cloud Computing, Security, IaaS, Monitoring, Automation, Vulnerability Assessment, Audit, Amazon Web Services (AWS EC2 & VPC), …

76 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 1
inWebo inWebo

The Simple Key to High Security - our strong authentication solution protects B2B or B2C applications from phishing Founded in 2008, inWebo is a major international player in the cybersecurity industry that offers an Identity & Access Management solution including: - inWebo adaptive & passwordless MFA that secures access to B2B and B2C applications by combining the highest level of security on the market with a seamless user experience, freeing them from equipment constraints, thanks to its SaaS mode and multiple tokens. - A CIAM orchestrator to create frictionless, personalized and secure access journeys using a graphical interface or low …

62 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 57
Dust Mobile Dust Mobile

the cyber defense mobile carrier Dust Mobile offers secure and resilient mobile communications locally and worldwide to protect privacy, mission critical transmissions and out-of-band network connectivity. mobile operator, resilient communications, mobile device management, secure communications, international network, roaming data, cybersecurity, and cyberdefense

71 similar entities Type: Startup Activities: it services telecommunications Technologies: Cybersecurity

3 8
Transfertpro Transfertpro

The french and secure solution for sharing, coediting and protecting your documents. french solution of document transfer to perform all of your file uploads safely, quickly and easily. cybersécurité, saas, cloud, ANSSI, eIDAS, and RGPD

59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

10 13
SEALSQ SEALSQ

Semiconductors, PKI & Post-Quantum Security Solutions SEALSQ develops the next generation quantum-resistant Semiconductors, PKI and Related Trust Services Semiconductors , Cybersecurity, PKI, Post-Quantum, Digital Security, Trust Services, Smart Card, and NFC

79 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

4 43
Teleport Teleport

Teleport is the easiest, most secure way to access and protect all your infrastructure. Teleport is the Infrastructure Identity Company, modernizing identity, access, and policy for infrastructure, improving engineering velocity and infrastructure resiliency against human factors and compromise. Kubernetes, Cloud Infrastructure, Access, Identity, Security, and Privileged Access Management

58 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

6 222
Bluink Ltd. Bluink Ltd.

Identity verification in seconds, fraud detection, and secure digital ID credentials Bluink is a Canadian company that specializes in identity verification and digital identity, using the smartphone as a strong authenticator and secure digital wallet. Our mission is to empower people and organizations by making secure access simple using strong digital identities. We do this by combining expertise and leadership with creativity and innovation. Not only do we build our products, but we use them too. Whether you’re seeking identity verification, digital identity, passwordless login, or MFA, you can trust that Bluink has the best for you. Identity and Access …

71 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

3 25
Curity Curity

Protect Identities. Secure Digital Services Curity is the leading supplier of API-driven identity management, providing unified security for digital services. Curity Identity Server offers a unique combination of API security and identity and access management. it is used for logging in and securing millions of users'​ access to the web and mobile apps over APIs and microservices. Curity is built upon open standards and designed for development and operations. We enjoy the trust of large organizations in financial services, telecom, retail, energy and government services with operations across many countries which have chosen Curity for their enterprise-grade API security needs. …

18 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 50
IDENTOS Inc. IDENTOS Inc.

Simplifying trusted connectivity At IDENTOS, we believe that digital trust is the linchpin to improving digital access everywhere. Globally, we design and develop digital identity & access technology to meet modern demands of user-centricity, respect for privacy, and distributed system interoperability. With IDENTOS, organizations connect with far greater confidence, compliance, and agility. The IDENTOS workplace puts you in touch with: ● Making a real difference ● A fast growing organization ● A family friendly culture ● Ongoing staff engagements ● Wellness Fridays ● Benefits and dental package security, encryption, authentication, digital identity, UMA 2.0, Federated Trust, and secure communications

51 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

6 61
Cyberens Technologies & Services Cyberens Technologies & Services

Data Protection & Security Engineering Cyberens is a technology firm with a very strong focus on (cyber) security. We provide cybersecurity consulting services in IT sectors relating to defense and space, banking, industrial control systems and IoT and also develop software for customers who care for their (cyber)security. We perform risk analyses with EBIOS, the ANSSI sponsored risk assessment methodology, audit IT and OT systems, define security strategies and implementation plans. We have developed a multi-platform cryptographic library with strong and efficient algorithms for smartphones and connected objects (Windows 32/64, OS X, iOS 32/64, Android, Unix, Linux). The library is …

28 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity IoT

0 1
Alice and Bob Alice and Bob

Securing identies and exhanges : - SSL certificates - strong authentication - digital signature - encryption - digital certificates - network security, BOYD, Cloud Electronic signatures have the same legal value as handwritten signatures. Save time and money and improve the confidence in your company. Protect your web sites, extranets and intranets with SSL certificates. Don't exchange your documents and emails unencrypted on the Internet. Use simple and cost-effective solutions to protect your management and your employees. Protect the access to your coporate network based on who requires to access on on which computer, tablet or smartphone. It is easy …

16 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 N/A
Cloud Network Cloud Network

Think network as DNA Cloud Network is an IT company which specialise on Network and Security engineering services. The company provides technical services to businesses over EMEA to walk them into their digital transformation. réseau, sécurité, cloud, firewall, load balancing, and network design

532 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 14
SIKUR SIKUR

We are specialists in protecting sensitive information More than a technological solution, we are a strategic decision for organizations. Our mission is to redefine the relationship between enterprises and cyber-security and the user experience in the process of authentication and access to technology assets. We deliver robust, multi-layered solutions, with advanced technology and focus on preventing security issues, protecting government and corporate information. We ensure secure communication between people (H2H), between machines (M2M), and between people and machines (H2M) with end-to-end encryption. We prevent: - Data breaches - Financial losses - Impact on productivity - Intrusion in IoT devices - …

129 similar entities Type: Startup Activities: it services privacytech Technologies: IoT Cybersecurity

2 22
HIAsecure HIAsecure

The French start-up that invented the strong authentication solution secured by human intelligence To protect companies and people from an increasingly virulent cybercrime in Europe, the French start-up Hiasecure has developed a non-observable, non-attachable and non-capable high-controlled authentication solution by automated means by securing it by a factor specific to humans: intelligence. With a simple and fun use, it allows its user to generate a single-use access code himself from a secret formula that he is the only one to know. Compatible with all IT systems, the Hiasecure solution is easily integrated while responding to financial constraints as well as …

Type: Startup Activities: it services Technologies: Cybersecurity

4 6
Tiempo Secure Tiempo Secure

We are a Deeptech Cybersecurity Enabler Embedded security systems will pave the way for data privacy and application protection in an ever-evolving connected world. In a world where technological progress is increasing and connectivity possibilities are infinite, the associated cyberattacks are increasing in number and intensity. Managing threats to data privacy and application protection has never been so critical or strategic. We believe that vulnerabilities can be reduced by adopting a security-by-design approach, with embedded security solutions. We endeavor to provide silicon/ASIC providers with world-class innovative embedded security solutions, in the form of certified Secure Enclaves & IP, to create …

88 similar entities Type: Startup Activities: it services Technologies: Cybersecurity Semiconductors IoT

11 7
Cosmian Cosmian

We bring security to the public cloud. We offer a unique, comprehensive data protection suite powered by next-generation cryptography to secure your data in use and protect what matters most. And, what’s most important, is that you’re in control. cryptography, multi-party computation, FHE, functional encryption, secure enclave, datasecurity, dataprivacy, managed services, confidentialcomputing, cybersecurity, confidential VM, confidential GenAI, and post-quantum

94 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity Data Analytics Generative A.I. A.I.

45 19
BitLogiK BitLogiK

Specific infosec : Access, Payments, Blockchain, Privacy Specific infosec : Access, Payments, Blockchain, Privacy. Security systems design and review. Analysis and improving cryptographic implementations. Secret keys and data protection. infosec, blockchain, payments, access systems, cryptography, cloud, and privacy

29 similar entities Type: Startup Activities: it services privacytech Technologies: Blockchain/Cryptocurrency

1 1
Examin Examin

Compliance Trust Generator Examin develops an increased compliance platform in terms of cybersecurity and data protection to allow companies to assess their level of exposure to risk of regulatory origin, ensure their compliance and check that of their partners.

100 similar entities Type: Startup Activities: it services regtech privacytech Technologies: Cybersecurity

7 9
XTREAMWAVE XTREAMWAVE

Security Software editor Xtreamwave is a security software editor and Secure Solutions Provider. Our software are based on high security components . Xtreamwave est un editeur de logiciel de sécurité. Nos produits sont basés sur des composants eux mêmes sécurisés. Identification, authentification, anti counterfeit, Security software, Contactless, crypto, Biometric, payment, Tags, RFID, Smart Cards, milimeterwave Radar, and Branding protection

13 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 4
Unosecur Unosecur

Comprehensive identity security for your multi-cloud and hybrid environments Unosecur is a comprehensive identity security platform that addresses identity-related threats in multi-cloud and on-premise environments, providing end-to-end protection and identity management for human and non-human identities. The Unified Identity Fabric by Unosecur integrates automated least-privilege implementation, MITRE ATT&CK framework-based threat detection, AI-powered policy creation, and more. We seamlessly manage your organization’s human and non-human identities: from discovery and analysis to monitoring, control, remediation, and governance.

Type: Startup Activities: it services Technologies: Cybersecurity A.I.

1 28
Yourax Yourax

Your expert in IT solutions: consulting, cybersecurity, infrastructure, networks, wifi, connectivity & amp; Cloud Since April 2023, Yourax has definitely joined the ACESI group by becoming Acesi Lille! IT security, IT solution, IT consultant, Cloud, Infrastructure, Managed, SaaS, Connectivity, Analytics, Hypercongence, RGPD, Audit, and Cybersecurity

330 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

8 17
HIUMA | Gestion, maintenance informatique HIUMA | Gestion, maintenance informatique

Finally, IT assistance without obligation! 🙋🏻‍♂️ Cyber ​​security partner of large accounts since 2011, we have positioned ourselves as cyber-security, networks, cloud, infrastructure. We design digital technology as a tool at the service of humans and not the other way around. One of the keys to cyber-security progress Cybersecurity, managed services, networks, and audit cybersecurity

463 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

0 4
Venari Security Venari Security

Cryptographic Discovery Tool | Cryptographic Visibility | Internal and Regulatory Compliance Venari Security provides organisations with advanced visibility into their encrypted attack surface, ensuring regulatory compliance and privacy adherence through our cryptographic discovery tool. Our focus is on crypto agility which helps you assess both external and internal cryptographic risks, preparing your business now and for the quantum future. Cyber Security, Threat intelligence, Threat Detection, Metadata, Artificial Intelligence, Encrypted Traffic Visibility, Encryption, Next Generation, Data Privacy, Ransomware, Encrypted Traffic Analysis, Cryptographic Discovery Tool, Cryptographic Visibility, Regulatory Compliance, NIST, and NCSC

58 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity A.I. A.I. - Machine Learning Data Analytics

16 45
ARC Data Shield ARC Data Shield

Controlled data exchange IT & Amp; Ot -& gt; Protection of material and intangible assets -& gt; Forted electronic hardware partitions, therefore no zerodays without flaws possible. Permanently and sustainably protect your critical assets and your ultimate backups from ransomware -type protocol attacks. Ot, networks, cybersecurity, appliances, and security if

96 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

8 5
VITAPROTECH VITAPROTECH

Our mission : we guarantee physical access security to professional sites Vitaprotech is a French group whose mission is to secure physical access to vital sites in three areas: perimeter intrusion detection, access control and security, and cloud video surveillance solutions. Its member companies, present in France and internationally, are experts in the design, manufacture and sale of high-end solutions for intrusion detection equipment around professional sites and access control. www.sorhea.com www.protechusa.com www.til-technologies.fr www.ard.fr www.vauban-systems.fr www.tdsi.co.uk www.prysm-software.com www.esifrance.net détection d'intrusion périmétrique, contrôle d'accès, and Analyse d'images

89 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 49
Bazalt Bazalt

Passwordless online payments We build a payment stack leveraging new authentication frameworks for secure & successful consumer experience. Payment, Authentication, Passwordless, Ecommerce, and Digital Wallet

69 similar entities Type: Startup Activities: it services fintech Technologies: Cybersecurity

0 6
UpSignOn - gestionnaire de mots de passe simple et 100% français UpSignOn - gestionnaire de mots de passe simple et 100% français

Simplify password management and put digital security within everyone's reach, including the most cyber-fragile. Authentication, SSO, Privacy, Privacy, Connection, Cyber ​​Security, Payment, Web Trust, Passwords, and Sovereign

146 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity

3 2
RECIPROC-IT RECIPROC-IT

#SecurityRiskmanagement #Cybersecurity #EbiosRisqueManager #OligoRiskManager #DORA #NIS2 Reciproc-it is an Information Security System Consulting Firm. Our main activities are based on giving guidance to protect the data and information, by ensuring their integrity, confidentiality, availability and auditability It’s also a matter of helping our customers in managing and processing their IT projects in well framed way by using the adequate methodology Information System Security, IT Projects management, Cybersecurity, risk management, consulting, and Compliance

422 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

5 9
Unicorn Security Unicorn Security

Helping companies of all sizes to thrive by protecting them against cyberattacks We help companies of all sizes to thrive by protecting their information system against future cyber-attacks. We offer different formats of IT security audits in order to adapt to the complexity of the system audited and the scope of the security checks needed. Contact us and make sure that your company network, website, application or IoT product is complying with all security standards!

64 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT

2 8
Nefture Nefture

DeFi Risk Management I Web3 Security Nefture is a Web3 security platform, protecting users, protocols and asset managers from exploits and Web3 threats. Nefture offers protection through real-time threat detection and proactive prevention allowing users to transact with confidence, save time and quickly react to potential exploits to their portfolio assets. We aim to facilitate the management of digital assets by reducing the risks. Cybersecurity, Blockchain, Web3, Blockchain Security, Cryptocrime, Cybercrime, Cryptocurrency, Blockchain Forensics, blockchain security consulting, DeFi, crypto asset management, crypto risk management, decentralized finance, crypto asset manager, crypto asset security managment, DeFi Security, crypto threat monitoring, Web3 Security, …

57 similar entities Type: Startup Activities: it services Technologies: Blockchain/Cryptocurrency Cybersecurity

6 10
PHOSPHORUS Technologies PHOSPHORUS Technologies

Personalized support for companies in their digital protection strategy Founded in 2010 by Malik Dahman and Didier Sammaritano, Phosphorus Technologies is responsible for simplifying access to computer technologies and cloud, backup and data protection for very small businesses and PMEs. Today, IT security is a priority issue for companies: their digital data represents a real heritage, essential for their sustainability. It thus becomes essential to set up reliable backup systems allowing the recovery of data in the event of a claim. To meet this need, Phosphorus Technologies has developed complete data security solutions guaranteeing the implementation of a rapid and …

59 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity

6 10
GATEWATCHER GATEWATCHER

Highlight cyber threats before they darken your business European leader in intrusion detection and advanced threat detection, Gatewatcher has been protecting the critical networks of large companies as well as public institutions since 2015. Its model combines multiple technologies with A.I. to provide consistent, optimal protection and meet the current and future cybersecurity challenges of organizations. cybersecurity, sécurité informatique, cyberdéfense, cyberdefense, cyberattacks, IT, advanced persistent threats, networks security, exploits, malware, intrusion detection system, threat protection, IDS, APT, Trackwatch technology, NDR, CTI, Threat hunting, and Threat forensics

422 similar entities Tags: FrenchTech2030 Type: Startup Activities: it services Technologies: Cybersecurity

62 128
Intégrale IP Intégrale IP

ESN specializing in network and security infrastructure. SSII Specialized network & amp; IT security. IP integral, architect of network and safety infrastructure solutions, supports you to increase the efficiency of your network, by optimizing and securing exchanges. SAS with a capital of € 40,000 - 23 rue Laugier - 75017 Paris - Tel. : 01.83.64.47.99 Network and security infrastructure, security, network, and cybersecurity

89 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

3 6
Appurity Limited Appurity Limited

We provide mobile and application security solutions. Improve security, enhance productivity, stay compliant. Appurity is a team of consultants who assess environments and business requirements to deliver specialised, best-in-class security solutions – endpoint to cloud. Built for the modern and dispersed workforce, Appurity’s solutions adhere to data protection and cybersecurity schemes and regulations such as Cyber Essentials and ISO. We work with businesses to develop and implement impenetrable security strategies that utilise the latest technologies and security frameworks including ZTNA, SSE, CASB, MTD, continuously validating security risks. Working with our technology partners that include Lookout, Pentera, Absolute, BlackBerry, Ivanti and …

100 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT

4 8
SeeZam S.A. SeeZam S.A.

Born SAFE solutions for hyper-confidential data www.SeeZam.com The solution is an electronic safe, providing you a virtual secured and inviolable storage space and guaranteeing that the sensitive information deposited is restored to you intact. The professional solution SeeZam is an innovative online service: the e-Vault. A first in its field, this service for businesses and organizations meets the growing security requirements for preserving and sharing secret content. Security, Secrecy, Financial services, and Confidentiality

73 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

2 2
IDAKTO IDAKTO

Identity Contract Solutions iDAKTO develops solutions that meet the increasing need for identification and authentication of citizens and large public and private organisations. Based on establishing an "Identity Contract" between a citizen and his government or between a user and his organisation, access to digital services is facilitated while increasing the level of security and trust. software development, digital identity, identity and access management, eidas, nfc, smartcards, openid, rgpd, digital wallet, mobile security, Identity as a Service, and idaas

63 similar entities Type: Startup Activities: it services privacytech Technologies: NFC Wireless

25 52
Cryptosense (acquired by SandboxAQ) Cryptosense (acquired by SandboxAQ)

Securing the Cryptography that Protects your Sensitive Data Cryptosense is now part of SandboxAQ. Read more about this on https://cryptosense.com/blog/why-cryptosense-is-joining-sandboxaq. Cryptosense is the world’s leading platform for cryptography lifecycle management. By integrating in CI/CD, it finds compliance violations and vulnerabilities in your encryption and key-management, lets your Devs self-serve the fixes, and auto populates an inventory so you’re always ready for tomorrow. Our customers include some of the largest financial institutions in the world and the software companies that supply them. cryptography, security, PKCS#11, security compliance, Application Security, Java security, OpenSSL security, Secure Devops, cloud security, FedRAMP compliance, PCI DSS …

62 similar entities Type: Startup Activities: it services privacytech Technologies: Blockchain/Cryptocurrency Cybersecurity

5 1
Seald Seald

The embedded protection for documents Empathy. Honesty. Playfulness. Craftsmanship. Solidarity — these are some of the values we live by, as a company. We work by them too: we’re building a product we believe in — we bring security and control over your company's data, wherever it's sent or stored. See https://www.seald.io cybersecurity, encryption, data security, end-to-end encryption, and data protection

105 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity

19 8
ProbeeCy ProbeeCy

Audit & amp; Digital Welcome to the universe of Probeecy, your trusted ally dedicated to the protection of personal data, computer security, internal audit, as well as internal and quality control.

142 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity

3 2
Agarri Agarri

Advice, training and service in offensive IT security: Intrusion test, Burp training PRO suite, code audit, black-box testing, awareness, risk analysis, fuzzing, vulnerability search, application audit, ... Since the magnificent setting that is the Luberon, Agarri satisfies its customers located around the world. Security, Hacking, Pentest, feat, testing, and risk

85 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

2 1
OGO SECURITY OGO SECURITY

Smart Web Application & API Protection + International CDN ! Start-up which revolutionizes the security of your websites and applications. cybersecurité, simplicité, innovation, analyse comportementale, machine learning, intelligence artificielle, WAAP, and CDN

171 similar entities Type: Startup Activities: it services Technologies: A.I. A.I. - Machine Learning Cybersecurity

15 17
Belgian Mobile ID - itsme Belgian Mobile ID - itsme

created the reference for mobile identity and digital privacy: itsme, digital ID Belgian Mobile ID is a consortium of Belgium’s leading banks (Belfius, BNP Paribas Fortis, KBC/CBC & ING) and mobile network operators (Orange, Proximus & Telenet Group) who have joined together to create the Belgian reference for mobile identity and digital privacy. Via the itsme app, Belgian Mobile ID makes it easier for anyone with a mobile phone and a bank account or eID to digitally log in, confirm transactions and even sign documents. Digital Security, Strong User Authentication, Electronic Signature, Digital Signature, Digital Identities, and Transaction Data Signing

20 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity

2 6
Fortress Identity Fortress Identity

ID Verification, Secure Biometric Authentication, Payments Fortress Identity is an intelligent biometrics platform that replaces passwords with secure multimodal and multi-factor identification, using an individual’s unique human biometrics for secure identity authentication.

51 similar entities Type: Startup Activities: regtech Technologies: Cybersecurity

1 3
Nucleaus Nucleaus

NucleausTM is an application security platform that continuously monitors your code repositories #SAST #spellcheckforcode NucleausTM continuously monitors your code repositories and reports back vulnerabilities and dependencies before that code causes risks. Offering a consistent platform process with minimal learning curve, simple to use interface, remediation strategy reports and NIST conformance status, NucleausTM enables transparency and risk management to code repositories. Security as a Service, Application Security Programs, Application Security Testing, Application Security, and Web Application Security

59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 10
Securitas Germany Securitas Germany

Ehrlich – Aufmerksam – Hilfsbereit: Marktführer intelligenter Sicherheitslösungen für alle Branchen & Unternehmensgrößen Securitas is a global knowledge leader in security. From a broad range of services of specialized guarding, technology solutions and consulting and investigations, we customize offerings that are suited to the individual customer’s needs, in order to deliver the most effective security solutions. Everywhere from small stores to airports, our 345,000 employees are making a difference. Security, Specialized guarding, Mobile services, Monitoring, Technical solutions, Consulting and investigations, Remote Video Solutions, and Sicherheitstechnik

166 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

3 1,405
Amiosec Amiosec

Innovation, agility and security Amiosec is an exciting UK technology company and is a trusted SME and technology partner of choice for our customers. Based in Tewkesbury, the focus of the business is on the development of discreet and bespoke secure technology solutions, with innovation and agility being at the heart of the company's ethos. The technology and R&D is geared towards rapid prototype, research, design and development of secure communications and cyber security solutions. To support this Amiosec employs a number of technical specialists and the founders of the company have a wealth of experience in the technology and …

61 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

0 100
ERCOM ERCOM

Expert in mobile cybersecurity and secure collaborative solutions Ercom, a Thales company, is a reference company with 30 years of combined expertise in two key areas: cybersecurity and communication networks. Being a reference company means providing clients with cutting edge solutions for their industry, combining certified security and simplicity in order to accelerate end-user adoption over a large range of devices. Ercom presents : - Cryptosmart, the only “Restricted” French, EU & NATO certified solution, jointly developed with Samsung, to secure devices and end-to-end mobile communications (voice, SMS and data) on consumer smartphones and tablets. - Cryptobox, the first sharing …

Type: SMB Activities: it services Technologies: Cybersecurity

19 166
Perimeter 81, a Check Point Company Perimeter 81, a Check Point Company

A Radically Simple and Secure Corporate Network Perimeter 81 is a robust, yet easy-to-use, converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, or cloud. It is a cloud-native service that includes advanced capabilities such as Zero Trust remote access, Internet access control, malware protection and firewall as a service. It enables any business to build a secure corporate network over a private global backbone, without hardware and within minutes. The entire service is managed from a unified console and is backed by an award-winning global support team that …

101 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

9 114
TrustBuilder TrustBuilder

Protecting identities. Securing access. Streamlining journeys. - We are hiring ! TrustBuilder is your reliable partner in cybersecurity. We go beyond the traditional software firm role, focusing on delivering robust and secure solutions that foster trust among enterprises. Our commitment is to ensure the secure digital journey of your employees, partners, and customers. With our advanced MFA and CIAM technology, we provide uninterrupted access while safeguarding identities. Member of the inWebo Group. Identity and Access Management (IAM), Policy Management, Attribute based IAM, Web Access Management, API Access Management, Multi-factor Authentication, Adaptive Authentication, Risk-based Authentication, Single Sign-on, CIAM, and Consumer Identity …

84 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

9 68
itm8 Cyber Security itm8 Cyber Security

Improving security and working for a SAFER and BETTER future itm8 er et globalt IT-hus, udsprunget af et iværksætterdrevent mindset. Hos itm8 udvider vi grænserne for IT-løsninger med fokus på fire forretningskritiske områder: Cloud Services, Digital Transformation, Application Services og Cyber Security. IT Security, Active Directory, Penetration Test, Red Team test, and Hacking

271 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

5 31
NET FREED NET FREED

Master your cybersecurity Net Freed is a cybersecurity consulting and expertise firm that has supported companies of all sizes since 2017. We are convinced that cybersecurity is based on the association of advanced technologies, proven processes, and staff aware of the risks. To counter the lack of visibility in the face of these threats, we offer a suitable and proportionate approach, to give you the keys to your cybersecurity solution, with an enlightened vision of your digital environment. Blockchain, information systems security and networks, digital transformation, cybersecurity, networks, RSSI, SOC, IAM, and Audit

270 similar entities Type: SMB Activities: it services Technologies: Blockchain/Cryptocurrency Cybersecurity

5 4
Hanko Hanko

Open source authentication and passkey infrastructure for developers Open-source authentication and user management for the passkey era. For better security, higher conversion rates, and happier users. #Passkeys #WebAuthn #ByeByePasswords Authentication-as-a-Service, WebAuthn, Web Authentication, 2FA, MFA, Passwordless Authentication, Biometric Authentication, FIDO2, and Passkeys

29 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

8 8
Cecurity.com Cecurity.com

Digital Trust Prese CECURITY.COM, editor of the communicating electronic safe (CFEC) Solution of data protection, dematerialization and legal archiving allows you to respond to these constraints and to keep all types of data in a secure and trust environment. Digital safe, electronic archiving system, dematerialization, personal data protection, digital confidence, electronic invoice, cryptography, encryption, communicating electronic safe, software, and reliable digital copies

139 similar entities Type: SMB Activities: it services privacytech Technologies: Data Analytics

8 50
AuthN by IDEE AuthN by IDEE

IDEE is the technology company behind AuthN. AuthN is a passwordless, phish-proof MFA solution deployed in just 15 min. AuthN is an award-winning, client-less, passwordless multi-factor authentication (MFA) that can be deployed in minutes across the entire estate. It prevents every single credential phishing and password-based attack including adversary-in-the-middle (AiTM). It can be used with or without a phone. Cyber security, Digital identity, Identity and access management, Blockchain, Blockchain Identity, two-factor authentication, strong authentication, fraud prevention, authentication, device security, phishing prevention, stop phishing, and blockchain

20 similar entities Type: Startup Activities: it services regtech Technologies: Blockchain/Cryptocurrency Cybersecurity

7 19
IS Decisions IS Decisions

Multi-Factor Authentication and Access Management solutions for Microsoft Windows Environments and the Cloud. IS Decisions builds affordable, non-disruptive, and easy-to-use Access Management software solutions, allowing IT teams to effectively secure access to Active Directory infrastructures, SaaS applications, and data within. UserLock provides on-premise Active Directory (AD) Identities with secure access to both the corporate network and multiple cloud applications, from wherever they are working. FileAudit proactively tracks, audits, reports, alerts on and responds to, all access to files and folders on Windows Servers and in the cloud. Today more than ever, organizations need an effective and more efficient way to …

Type: SMB Activities: it services Technologies: Cybersecurity

5 45
NEOWAVE NEOWAVE

Strong authentication and secure transactions NEOWAVE is an innovative company specializing in strong authentication and secure transactions. Our main mission is to protect companies’ and individuals’ digital assets through strong authentication technologies based on secure components and digital certificates. Our solutions address the cybersecurity, digital trust and identity management markets. NEOWAVE products combine the high level of security offered by smart cards with the advantages of storage and connectivity technologies: USB, RFID/NFC and Bluetooth Low Energy (BLE). Designed and manufactured in France, they meet the security requirements of European agencies. Clefs USB / Tokens USB, RFID / NFC, Chiffrement de …

46 similar entities Type: SMB Activities: it services Technologies: Cybersecurity NFC Wireless

7 8
ANAVEO GROUPE ANAVEO GROUPE

Towards a new experience increased by your unified safety Pioneer of responsible security increased security, Anaveo creates intelligent perceptual systems that allow you to know the reality of your environments and to anticipate anomalies to make them places of confidence and efficiency: see, know, predict. Anaveo is more of: • 200 secure and valued data of data • 600 experts at your service and a network of local agencies • 15,000 customers in all sectors of activity • 500,000 intelligent connected objects • 5,000 projects installed annually • 300,000 logistics flows per year • 100,000 annual interventions • 97% of …

81 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

4 365
deviceTRUST GmbH deviceTRUST GmbH

Part of Citrix, a business unit of Cloud Software Group. deviceTRUST Contextual Security is the layer to protect a company's data and resources and reduces the costs associated with managing and securing digital workspaces while keeping productivity high.

59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

6 1
Iriscan Iriscan

Cutting Edge Biometric Solutions Iriscan is a biometric security system that works with iris — the most secure biometric modality. Biometrics is used for access control and identity verification. It is safe and reliable when adequately protected. Our advantage is taking care of required security infrastructure and data protection out of the box, so organizations can concentrate on their goals instead. The system is flexible, and we provide on-demand integrations and customizations. biometric, security, identification, and authorization

71 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 4
MCG MCG

Your cyber-secondary trusted partner Our collaboration allows you to defend yourself in the face of the various complex and structured cyber attacks to protect your assets, hosted internally or in the cloud, and thus secure the sustainability of your activities. To secure your business (SMEs, organization, etc.), our team of cybersecurity experts acts in confidentiality and transparency. We implement solutions adapted to your need, and preserve exchanges in a trusted environment that facilitates our long -term approach, and the creation of a real partnership for the sustainability of your activity.

65 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

9 15
APG Protection & Investigations APG Protection & Investigations

Established in 2004, APG conduct a myriad of security operations including, but not limited to: Close Protection, Event Security, Investigations and Surveillance operations. In addition, we are a provider of accredited training courses including Close Protection and Door Supervision. We employ only the hightest calibre staff. Security, Surveillance, Event Security, Close Protection, Risk Management, Investigations, Legal Services, Professional Witnesses, and Online Investigations

61 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

0 3