Search 1
Entities
LogoName Σ Employees
Notakey Notakey

Modern Identity and Access Management company. We provide a suite of products, starting from video identification to user authentication and transaction/document signing. Currently used by some of the largest telecommunication, healthacare, IT and financial service companies.

280 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

5 3
Secret Double Octopus Secret Double Octopus

Modern Authentication for Your Workforce: Secure, Seamless, and Password-Free. Secret Double Octopus provides the only passwordless MFA solution for all enterprise authentication needs. From workstations & SSOs to on-premises infrastructure & legacy applications – with zero employee-managed passwords and a highly secure yet user-friendly interface.

59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

7 39
CFLW Cyber Strategies CFLW Cyber Strategies

Together for a Safer Cyberspace CFLW is a tech-SME that pursues a safer cyberspace through cutting-edge intelligence services. Dark Web Monitor – Providing actionable dark web intelligence to law enforcement, governments and industry.​ Phishing Threat Intelligence – Delivering strategic insights and real-time monitoring to protect organizations from digital threats. Crypto-Asset Analytics – Helping agencies and investigators to trace illicit activities in blockchain transactions.​ AI & Emerging Tech – Leveraging collaborative and responsible analytics to stay ahead in digital asset monitoring.​ As a global cyber intelligence provider rooted in the Netherlands, we believe in impact through collaboration and innovation. Working closely …

404 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 10
ISSROAD ISSROAD

Support companies and institutions in the informed and secure implementation of digital solutions. Passionate about technology and Cybersecurity, we offer high value-added services, from cyber governance to cyber managed services, including integration and training on cybersecurity technologies and solutions. IAM, PAM, Data Governance, Office 365 Security, SSO, MFA, ISO 27001, SIEM, EDR, ESET, MIM, BeyondTrust, Microsoft, SOC, Sensibilisation Cybersécurité, Scan de vulnérabilité, SOAR, Infogérance, and Infrastructure IT

647 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

2 6
Vaultys Vaultys

Founding the New Web of Trust. 🔒 Vaultys, leader in cybersecurity, is the 1st authentication solution resistant to AIA assigned attacks. The employees, owners of their identifier, connect without password safely, simplicity and sovereignty. 🔒 cybersecurity, decentralized identity, and sovereignty

110 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

18 4
KNS KNS

Identity & amp; Access Founded in Lyon in 2002, KNS is a digital service company that works at all levels of information systems securing in France and abroad. Reference player and recognized expert, KNS provides its customers and partners with an impartial, clear and pragmatic vision of digital security issues and related solutions. 19 years of identity management - 25 specialized consultants - 120 IAM/SSO references Identities management, management of authorizations, securing and control of access, Digital identity standards, workflow, rectivities of accounts, inter-referential synchronization, MFA, SSO, identity federation, identity-vigilance, IAM, advice and audit, Integration, Development, Deployment, Maintenance, and Devaas

64 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

2 95
Elandis Elandis

An ESN made up of consultants, engineers specializing in computer project management, network architecture and information systems management. Cybersecurity, IT networks, compliance, high debt, servers, firewall, wifi, IT parks management, intranet, extranet, backup, GDPR, software supports, MOA/MOE, and Multi Factors Authentication

352 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity

0 5
One Identity One Identity

A leader in unified identity security One Identity helps organizations strengthen cybersecurity, boost efficiency and control costs through the One Identity Fabric, a holistic approach to identity and access management (IAM). By unifying IAM tools, including identity governance and administration (IGA), access management (AM), privileged access management (PAM), and Active Directory management (AD Mgmt), it ensures optimal functionality and efficiency. This cohesive structure reduces identity sprawl and extends governance to the farthest endpoints of your IAM ecosystem. Proven and trusted on a global scale, One Identity manages more than 500 million identities for more than 11,000 organizations worldwide. For more …

36 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

15 609
Ceerus Ceerus

Security to communicate freely Ceerus is a distributed secure communications platform that provides frictionless security for every sensitive conversation with your staff and customers, regardless of where they are or what apps they use. Cybersecurity, Secure Communications, Enterprise Apps, FinTech, and API

113 similar entities Type: Startup Activities: regtech deeptech it services fintech Technologies: Cybersecurity

22 4
inWebo inWebo

The Simple Key to High Security - our strong authentication solution protects B2B or B2C applications from phishing Founded in 2008, inWebo is a major international player in the cybersecurity industry that offers an Identity & Access Management solution including: - inWebo adaptive & passwordless MFA that secures access to B2B and B2C applications by combining the highest level of security on the market with a seamless user experience, freeing them from equipment constraints, thanks to its SaaS mode and multiple tokens. - A CIAM orchestrator to create frictionless, personalized and secure access journeys using a graphical interface or low …

62 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 57
ArcanSecurity ArcanSecurity

Arcansecurity develops an innovative authentication solution without passwords to simplify the connection path of a user while improving the level of security. Security, Authentication, Cryptography, Software Development, and Cloud

243 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

4 1
Examin Examin

Compliance Trust Generator Examin develops an increased compliance platform in terms of cybersecurity and data protection to allow companies to assess their level of exposure to risk of regulatory origin, ensure their compliance and check that of their partners.

100 similar entities Type: Startup Activities: it services regtech privacytech Technologies: Cybersecurity

7 9
Unosecur Unosecur

Comprehensive identity security for your multi-cloud and hybrid environments Unosecur is a comprehensive identity security platform that addresses identity-related threats in multi-cloud and on-premise environments, providing end-to-end protection and identity management for human and non-human identities. The Unified Identity Fabric by Unosecur integrates automated least-privilege implementation, MITRE ATT&CK framework-based threat detection, AI-powered policy creation, and more. We seamlessly manage your organization’s human and non-human identities: from discovery and analysis to monitoring, control, remediation, and governance.

Type: Startup Activities: it services Technologies: Cybersecurity A.I.

1 28
Yourax Yourax

Your expert in IT solutions: consulting, cybersecurity, infrastructure, networks, wifi, connectivity & amp; Cloud Since April 2023, Yourax has definitely joined the ACESI group by becoming Acesi Lille! IT security, IT solution, IT consultant, Cloud, Infrastructure, Managed, SaaS, Connectivity, Analytics, Hypercongence, RGPD, Audit, and Cybersecurity

330 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

8 17
UpSignOn - gestionnaire de mots de passe simple et 100% français UpSignOn - gestionnaire de mots de passe simple et 100% français

Simplify password management and put digital security within everyone's reach, including the most cyber-fragile. Authentication, SSO, Privacy, Privacy, Connection, Cyber ​​Security, Payment, Web Trust, Passwords, and Sovereign

146 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity

3 2
RECIPROC-IT RECIPROC-IT

#SecurityRiskmanagement #Cybersecurity #EbiosRisqueManager #OligoRiskManager #DORA #NIS2 Reciproc-it is an Information Security System Consulting Firm. Our main activities are based on giving guidance to protect the data and information, by ensuring their integrity, confidentiality, availability and auditability It’s also a matter of helping our customers in managing and processing their IT projects in well framed way by using the adequate methodology Information System Security, IT Projects management, Cybersecurity, risk management, consulting, and Compliance

422 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

5 9
GATEWATCHER GATEWATCHER

Highlight cyber threats before they darken your business European leader in intrusion detection and advanced threat detection, Gatewatcher has been protecting the critical networks of large companies as well as public institutions since 2015. Its model combines multiple technologies with A.I. to provide consistent, optimal protection and meet the current and future cybersecurity challenges of organizations. cybersecurity, sécurité informatique, cyberdéfense, cyberdefense, cyberattacks, IT, advanced persistent threats, networks security, exploits, malware, intrusion detection system, threat protection, IDS, APT, Trackwatch technology, NDR, CTI, Threat hunting, and Threat forensics

422 similar entities Tags: FrenchTech2030 Type: Startup Activities: it services Technologies: Cybersecurity

62 128
ORNA ORNA

Award-winning AI tool offering cyberattack response, recovery, and training automation across all business functions ORNA is a cyber incident response and case management platform for small teams that detects cyberattacks and uses AI to guide response, reporting, compliance and prevention efforts through an innovative real-time collaborative environment. cybersecurity, digital forensics, SaaS, and crisis management

266 similar entities Type: Startup Activities: it services Technologies: A.I. Cybersecurity

3 40
Allistic Allistic

Your cybersecurity partner! ☛ Governance ☛ RSSI Assistance ☛ Audits and Penses ☛ Secure architectures Specialist in the governance of information systems security and secure infrastructure architecture, Allistic supports its customers and their RSSIs in the definition of the cybersecurity strategy of their business. Cybersecurity, IT security, GDP, PSS, crisis management, awareness, secure architectures, Pentest, Audit, CC scan, SOC, Security, Security Advice, Cloud Security, Big Data security, Security Management, Risk Management, and Management of Compliance

374 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity Data Analytics

45 19
ProbeeCy ProbeeCy

Audit & amp; Digital Welcome to the universe of Probeecy, your trusted ally dedicated to the protection of personal data, computer security, internal audit, as well as internal and quality control.

142 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity

3 2
OGO SECURITY OGO SECURITY

Smart Web Application & API Protection + International CDN ! Start-up which revolutionizes the security of your websites and applications. cybersecurité, simplicité, innovation, analyse comportementale, machine learning, intelligence artificielle, WAAP, and CDN

171 similar entities Type: Startup Activities: it services Technologies: A.I. A.I. - Machine Learning Cybersecurity

15 17
Arsen Cybersecurity Arsen Cybersecurity

Human risk managed the right way Arsen is a phishing training and awareness solution, leveraging realistic simulation, microlearning and reporting. Cybersécurité, SaaS, Phishing, Cybersecurity Awareness, and human risks

251 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

8 16
Fortress Identity Fortress Identity

ID Verification, Secure Biometric Authentication, Payments Fortress Identity is an intelligent biometrics platform that replaces passwords with secure multimodal and multi-factor identification, using an individual’s unique human biometrics for secure identity authentication.

51 similar entities Type: Startup Activities: regtech Technologies: Cybersecurity

1 3
NEXECUR NEXECUR

Specialist in remote monitoring, alarm systems and remote assistance for almost 40 years, Nexecur is committed to your security based on experience and knowledge of your needs. A subsidiary of Crédit Agricole, Nexecur develops efficient solutions that ensure effective and continuous protection of your company, guaranteeing the security of your employees. Remote monitoring, video surveillance, video protection, access control, technical alarms, fire detection, intrusion detection, and fog generator

63 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

9 380
digital.security digital.security

digital.security is now an Eviden business Founded in 2015 by a group of IT security experts with the support of the Econocom Group, digital.security (~ 230 experts) aims to offer companies and government organisations advanced audit and consulting services and a CERTTM dedicated to the IoT ecosystem. Our experts have strong expertise in providing Integration & Projects (SSO, IAM, IAG, PKI, privilege management, Logs collection, analysis and management Data compliance solutions), and also in Operational Security (outsourcing, security services center operations, SOC & SIEM management). Audit, IoT, IAM, SSO, Security, Pentesting, BugBounty, DLP, Consulting, CERT, CSIRT, RedTeam, SOC, SIEM, DFIR, …

342 similar entities Type: SMB Activities: it services Technologies: IoT Cybersecurity

0 68
OneVisage OneVisage

Sensitive Data Requires Premium Protection OneVisage is a Swiss cyber-security company registered in 2016 by 3D computer vision experts, software veterans and executive managers. We aim to become a leading ethical, transversal Strong Authentication solution provider to help large OEM integrators and IAM providers eliminate digital identity theft. Strong Customer Authentication, 3D Facial Biometry, 2-FA, Multi-Factor Authentication, GDPR, CCPA, CNIL, Data Privacy, Data Protection, and ZERO Trust

86 similar entities Type: Startup Activities: it services privacytech Technologies: A.I. A.I. - Image Processing Cybersecurity

20 7
Elimity Elimity

Lightweight Identity Governance. "Who can access what within my organisation?" Having provable control over who can access is crucial for the NIS2 and ISO 27001 certifications. Elimity Insights is the lightweight identity governance solution that allows security teams to take control of user access within days. Elimity Insights allows security to easily answer the ever-growing number of IAM data questions: easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards! ✅ Identity Data Analytics, Identity Governance, IAM, Identity Security, Identity and Access Management (IAM), NIS2, and ISO 27001

8 similar entities Type: Startup Activities: it services regtech Technologies: Cybersecurity

14 8
OneLogin by One Identity OneLogin by One Identity

The leader in Identity and Access Management OneLogin by One Identity, a wholly owned subsidiary of Quest Software, leads the market in Identity and Access Management. OneLogin by One Identity, a wholly owned subsidiary of Quest Software, leads the market in Identity and Access Management and support more than 5,000 customers worldwide. Our platform provides everything you need to secure your workforce, customers and partners. Single Sign-On, SSO, identity management, security, multi-factor authentication, user provisioning, Compliance, Cloud Security, Credential Vaulting, Unified Endpoint Management, Consumer IAM, IAM, Governance, Web Access Management, and Adaptive MFA

66 similar entities Type: Startup Activities: it services regtech Technologies: Cybersecurity

15 68
JASK (now Sumo Logic) JASK (now Sumo Logic)

The Modern SOC Company JASK is modernizing security operations by delivering an advanced SIEM platform that provides better visibility, better automation and a better architecture. Built on cloud-native technologies, the JASK ASOC platform streamlines security analyst workflows by automating many of the repetitive tasks that restrict productivity, freeing them for higher-value roles like threat hunting and vulnerability management, while addressing the escalating talent shortage. Cyber Security, Security Analytics, Artificial Intelligence, Security Operations, SIEM, and Cloud

89 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I.

2 13
Cybersec Netherlands Cybersec Netherlands

Cybersec Netherlands | 10 - 11 September 2025 | Jaarbeurs, Utrecht Cybersec Netherlands | 6 - 7 November, 2024 | Jaarbeurs, Utrecht Cybersecurity, Infosecurity, Privacy, GDPR, IoT, Artificial Intelligence, Blockchain, Cloud Computing, Data Management, Digital Transformation, DevOps, Security Awareness, Risk Management, Infrastructure, cyber, data, and cloud

108 similar entities Type: Startup Activities: it services privacytech Technologies: A.I. A.I. - Machine Learning Blockchain/Cryptocurrency Cybersecurity IoT

16 1
Obsidian Security Obsidian Security

Comprehensive Security for Your SaaS Applications Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS. The company is backed by Greylock Partners, Wing, GV and Norwest Venture Partners. Advanced Threat Protection, Insider Threat Protection, Threat Detection, Threat Response, Automated Intelligence, Machine Learning, Information Security Software, SaaS Security , Incident Response, Visibility and Monitoring, and compliance

166 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I. A.I. - Machine Learning

9 211
AlgoSecure AlgoSecure

Cybersecurity - Qualified Passi - Security of information systems: Auditer | Protect | Monitor | React A French company founded by a team specializing in the field of networks and the security of information systems, Algosecure aims to support you in the implementation of security and network architecture. We provide advisory and implementation services in safety, network, integration and outsourcing of security systems. Our desire is to establish a trusted partnership with you. Our goal is to guarantee you an adequacy between the proposed architectures and your needs. IT security, Intrusion test, CERT, SOC, cybersecurity, cybersecurity, Pentest, Forensic, Security Audit, …

357 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

16 51
itsme® itsme®

Log in securely, share your ID data or to sign documents by using your smartphone A trustworthy identity solution, built on security, that uniquely combines four different services. digital identity, digital security, digital privacy, mobile identity, strong customer authentication, qualified electronic signature, and eSignature

121 similar entities Type: Startup Activities: it services privacytech Technologies: Data Analytics

24 88
Onlayer Onlayer

Business Risk & Performance Management Our powerful solutions suite streamlines onboarding, compliance, monitoring and insights to mitigate risk and secure growth at every stage of the digital business lifecycle. fintech security, SaaS, PCI-DSS, VISA, MasterCard, Payment Card Industry, I.T. Security, Fintech, Merchant Risk Management, Risk Management, Fraud, Risk Prediction, and Merchant Security

604 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 25
Beauceron Security Beauceron Security

Empower People. Reduce Cyber Risk. The best software for MSSPs & MSPs to deliver anti-fraud, anti-phishing, e-mail analysis and security awareness training that motivates behavior change. Cybersecurity, Cybersecurity Strategy, Cyber Threat Intelligence and Analysis, and Cyber Risk Management and Remediation

446 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

18 47
Kertos Kertos

All-in-one compliance solution for GDPR, ISO27001, SOC2, NIS2, TISAX®, ISO27701, AI Act or ISO42001 Kertos is the modern backbone of every company’s privacy and compliance operations. We support in Data & Process Discovery, Data Subject Requests (e.g. customer data deletion), Access & Asset Management, Compliance Documentation and various Certification Frameworks such as ISO27001, SOC2, TISAX® and similar. Our intuitive no-code SaaS solution connects to the entire IT infrastructure, identifies compliance relevant assets and processes, related data and automates compliance workflows to get an organization certification ready within weeks.​ Data Privacy, Process Automation, Security, Compliance, GDPR, ISO27001, NIS2, and AI Act

66 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity

5 58
BlackfishID BlackfishID

We didn’t reinvent cybersecurity, we just made it simpler and smarter. Our unified platform simplifies security management by combining device protection, reputation monitoring, domain security, and more. Designed with ease of use and affordability in mind, we empower users to stay protected without breaking the bank. AI, Cybersecurity, and Social Media

299 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I.

0 2
SELFY PROJECT SELFY PROJECT

Self assessment, protection & healing tools for a trustworthy and resilient CCAM SELFY’s strategic vision is to become the main European provider of an agnostic toolbox for the self management of security and resilience of the CCAM ecosystem, which can be easily deployed over the CCAM environment to extend the current Operational Design Domain (ODD), providing self-awareness, self-resilience and self-healing mechanisms and end-user trust. CCAM, Cybersecurity, and Autonomous Vehicles

91 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

4 4
VOICEME VOICEME

Your Voice, the One and Only The first Dynamic Enhanced Secure Customer Authentication platform, Peer-To-Peer, that allows to transform your voice in your identity, your payment system, your digital sign. Authentication, Biometrics, Digital Identity, Security, Privacy, Blockchain, Artificial Intelligence, Natural Language Processing, Natural Language Understanding, Machine Learning, Usability, Passwordless, and Cybersecurity

113 similar entities Type: Startup Activities: it services privacytech Technologies: A.I. Blockchain/Cryptocurrency Cybersecurity A.I. - Natural Language Processing A.I. - Machine Learning

8 5
Liminal Liminal

Delivering actionable market and competitive intelligence for go-to-market in fraud, identity, and cybersecurity. Liminal is a technology company that empowers businesses with actionable market and competitive intelligence. Our AI-enabled Link platform delivers personalized, real-time intelligence in our native apps or directly in client workflows, enabling executives to make informed decisions, enhance productivity, and drive growth. We tackle critical focus areas with targeted solutions for fraud and identity, cybersecurity, trust and safety, financial crimes compliance, and privacy and consent management. Identity, Privacy, Security, FinTech, Authentication, Cyber Crime, IAM, Access Management, Digital Identity, Cybersecurity, Risk Management, Strategy, Market Analysis, market intelligence, saas …

61 similar entities Type: Startup Activities: privacytech constructiontech fintech media Technologies: Cybersecurity

50 68
Gudens Cybersecurity Gudens Cybersecurity

Guden Cybersecurity is currently operating in a private development phase. Security Architecture, Data Loss Prevention, Penetration Testing, Incident Response, Identity Management, Access Management, Secure DevOps, Cloud Security, Network Security, Data Security, Endpoint Security, Vulnerability Management, Secure DevOps, and Digital Forensic

446 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

0 142
ILEX-International ILEX-International

Identity and Access Management Provider specialising in Identity and Access Management, over the last 25 years Ilex International has developed a high level of expertise in IT security. Partner to most of the blue chip companies, today Ilex International is notably recognised for its expertise in enterprise repositories and identity federation. IAM - Identity and Access Management, Gestion des rôles, Web Access Management, Enterprise SSO et Fédération d'identités, and Workflow, provisioning et gestion des identités

13 similar entities Type: SMB Activities: it services Technologies: SaaS

23 56
Shufti Shufti

Accelerating global trust with award-winning KYC & AML solutions Shufti is an AI-powered digital identity verification solutions provider offering KYC, KYB, and AML services in 200+ countries and territories. It aims to create a secure and safe online marketplace devoid of identity theft and other fraudulent activities. KYC, AML, Address Verification, Face Verification, Customer Due Diligence, ID Verification, Age Verification, KYC Verification, Identity Verification, Credit Card Fraud Prevention, Identity theft protection, Biometric Verification, 2 Factor Authentication, ArtificialIntelligence, Machine Learning Algorithims, GDPR, User Verification, B2B, KYB, Fraud Prevention, Compliance, Security, Technology, and Software

76 similar entities Type: Startup Activities: it services regtech privacytech Technologies: A.I. Cybersecurity A.I. - Machine Learning

3 119
GCA Technology Services (GCA) GCA Technology Services (GCA)

We enable and secure access to business data by managing your digital identities. Founded in 1991, GCA Technology Services (GCA) is a security provider specializing in Identity and Access Management (IAM) solutions. We help enterprises enable and secure access to business data by managing their digital identities, and offer a best of breed portfolio of leading IAM vendor partners. Our team’s expertise, experience, and tenacity equip us with the tools to design, deploy and manage complex IAM projects that solve business challenges for our clients and enhance their profitability and competitiveness. Visit us at https://gca.net. Security Information & Event Management …

67 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

11 43
IDmachines IDmachines

Security Without Compromise Strategic, tactical, and technical consulting services and the Eidola technical automation platform. Consented surveillance through transparency, reciprocity and proportionality - AuthC in concert with 0PN nee The Open Consent Group and Surveillance Trust Physical Security, Surveillance, Machine Vision, Automation, Intelligent Infrastructure, Privacy, Cybersecurity, and Identity and Access Management

119 similar entities Type: SMB Activities: privacytech Technologies: Cybersecurity

1 2
Anomali Anomali

The Leading AI-Powered Security and IT Operations Platform. Be Different. Be the Anomali. Anomali delivers the leading AI-Powered Security and IT Operations Platform. Only Anomali integrates ETL, SIEM, Next-Gen SIEM, XDR, UEBA, SOAR, and TIP into one powerful platform. At the center is the Anomali Copilot that navigates a proprietary cloud-native security and IT data lake to drive first-in-market speed, scale, and performance at a fraction of the cost. Modernize security and IT operations to protect and accelerate your organization with better analytics, visibility, productivity, and talent retention. Be Different. Be the Anomali. Learn more at www.anomali.com. Cyber Threat Intelligence, …

37 similar entities Type: Startup Activities: it services Technologies: A.I. Cybersecurity Data Analytics

17 335
Trust Stamp Trust Stamp

AI-powered identity solutions intersecting biometrics, privacy & cybersecurity (Nasdaq: IDAI, Euronext Growth: AIID ID) Trust Stamp is a global provider of AI-powered identity services for use in multiple sectors including banking and finance, regulatory compliance, government, real estate, communications, and humanitarian services. Our technology empowers organisations with biometric identity solutions that reduce fraud, protect personal data privacy, increase operational efficiency and reach a broader base of users worldwide through unique data transformation and comparison capabilities. Identity Verification, Cybersecurity, Facial Biometrics, Artificial Intelligence, Cryptography, and Fintech

90 similar entities Type: Startup Activities: fintech regtech privacytech Technologies: A.I. Cybersecurity

28 68
HYPR | The Identity Assurance Company HYPR | The Identity Assurance Company

The most comprehensive end-to-end identity security platform for your workforce and customers. HYPR, the leader in passwordless identity assurance, delivers the industry's most comprehensive end-to-end identity security for your workforce and customers. By unifying phishing-resistant passwordless authentication, adaptive risk mitigation, and automated identity verification, HYPR ensures secure and seamless user experiences for everyone. Trusted by organizations worldwide, including two of the four largest US banks, leading manufacturers, and critical infrastructure companies, HYPR secures some of the most complex and demanding environments globally, showcasing our commitment to innovation and security excellence. Cybersecurity, Mobile Security, Infrastrucure, Data Security, Security, Wireless, Privacy, SaaS, …

21 similar entities Type: Startup Activities: it services regtech privacytech Technologies: Cybersecurity IoT SaaS Wireless

17 110
kyron solutions informatiques kyron solutions informatiques

Advise, support, defend and protect the assets of companies www.kyron.fr Audits & amp; Advice, governance, risks, compliance, IS optimization, PMO, AMOA, AMOE, Engineering - Architecture, Integration, Operation, Physical Security, Training, Infrastructure Systems and Networks, Bastion, Data Protection, Anti -Phising, Cybersecurity, and ISA62443

489 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

5 29
Imprivata Imprivata

Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges with solutions that protect critical data and applications without workflow disruption. Its platform of interoperable identity, authentication, and access management solutions enables organizations in over 45 countries to fully manage and secure all enterprise and third-party digital identities by establishing trust between people, technology, and information. software, technology, security, single sign-on, strong authentication management, healthcare, clinical workflows, virtualization, secure text messaging, patient identification, identity management, multifactor authentication, cybersecurity, and healthcare IT

99 similar entities Type: SMB Activities: healthtech regtech Technologies: Cybersecurity

18 1,199
Iron Bastion Iron Bastion

Australia's cybersecurity experts Australia's phishing and cybersecurity experts. We offer a comprehensive range of cybersecurity services that protect your business from cyber criminals and digital threats. Cloud Security, Application Security, Infrastructure Security, PCI DSS, Phishing, and Email Security

542 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 3
Idenprotect Idenprotect

Idenprotect. Security Simplified. Productivity Elevated Idenprotect is a leading cybersecurity company specialising in a range of phishing-resistant and passwordless authentication and secure browsing solutions. We help organisations of all sizes eliminate password risks, streamline operations, and foster a productive, secure digital environment. Authentication, Innovation, Information Security, Security, Mobility, Assurance, Cryptography, Multi-Factor Authentication, Digital Signing, TEE, TPM & SE, Identity Driven Browsing, Secure Browser, and Enterprise Browser

136 similar entities Type: Startup Activities: it services regtech Technologies: Cybersecurity

2 23
IDEMIA National Security Solutions IDEMIA National Security Solutions

Best in Class Solutions for National Security, Identity, and Intelligence National Security Solutions is the FOCI (Foreign Ownership, Control, and Influence)-mitigated subsidiary of IDEMIA Global that delivers identity credentials, biometric, and video analytic solutions to the Federal and Intelligence Communities to include U.S. Departments of Defense, Homeland Security, Justice, and State and prominent intelligence agencies. We enable some of the United States’ most sensitive programs. We are recognized experts in identity management, secure credentials, biometrics, video analytics, and access control solutions. Biometrics, Identity Management, Law Enforcement, Video Analytics, Fingerprint Algorithms, Credentialing, AFIS, Facial Recognition, Artificial Intelligence, ID Documents, Digital ID, …

133 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

4 163
NVISO Security NVISO Security

NVISO is a cyber security services firm composed of outstanding security professionals - each has a specific field of expertise, ranging from security research and risk management to incident response and security testing. This unique "skill blend"​ allows them to analyse and respond to complex client challenges and help those companies prevent, detect and respond to security challenges with a positive business outcome. Built on values of Pride, Caring for our people, Breaking Barriers, and fostering a no-BS approach, our mission is to be an innovative, trusted and respected security partner for our clients. Penetration Testing, Digital Forensics & Incident …

203 similar entities Type: Startup Activities: it services deeptech Technologies: Cybersecurity

10 316
ErediX ErediX

Eredix is ​​an IT security company based in Saint Omer offering training, security audit, and penses Eredix is ​​a computer security company based in Saint Omer in Hauts de France. We are specialized in training, audits and penses (intrusion test in your systems) for companies, public organizations and communities. Our consultants have recognized expertise and appreciated professionalism from our customers. Cybersecurity, IT security, and security of the IS

235 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

1 1
ID SECURE ID SECURE

EMPOWERING TRUST Our technology solutions empower Government Agencies and Businesses to achieve ‘trust in transactions’ in both the physical and digital worlds. Identity Solutions, Multi-Modal Biometrics, Document Verification, Identity Verification, Mobile Network Solutions, IoT Network Solutions, 5G, LTE, 3G, NB-IoT, LTE-M, Private Networking, Biometric Jumpkits, Biometric Handhelds, Biometric Kiosks, Defense, Intelligence, Law Enforcement, Security, and Border Control

297 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT

0 3
BeyondID BeyondID

BeyondID brings digital identity strategies to life. BeyondID is the managed identity services provider that the most successful brands trust to bring their digital identity strategies to life. Identity and Access Management, API Management, Cloud, SaaS, Consulting, Implementation, Managed Services, SSO, MFA, Identity Governance Administration, API Gateway, Microservices, Content Collaboration, Okta, One Identity, Ping Identity, Netskope, Mulesoft, Google Cloud, AWS, Microsoft, cybersecurity, CIAM, Zero Trust, Azure, MSSP, IGA, PAM, Identity Proofing, Digital Transformation, Digital Front Door, Digital Banking, Omnichannel Experience, Zero Trust Security, Healthcare, Financial Services, and Retail

74 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 140
Cortex by Palo Alto Networks Cortex by Palo Alto Networks

The industry’s most comprehensive product suite for security operations. The industry’s most comprehensive product suite for security operations empowering enterprises with the best-in-class detection, investigation, automation and response capabilities. Incident Response, Computer Security, Security Orchestration, Security Automation, Threat Hunting, SOAR, and Security Orchestration Automation and Response

241 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

5 64
ID Agent ID Agent

ID Agent, a Kaseya company, provides effective, easy-to-manage and affordable dark web monitoring, security awareness training and phishing simulation solutions to managed service providers (MSPs) and organizations’ IT teams. Our flagship product, Dark Web ID, monitors the dark web to identify compromised and stolen user credentials and deliver validated intelligence and alerts to prevent security incidents. Our BullPhish ID solution provides security awareness training and phishing simulation geared to the non-technical end user to mitigate human risk and further enhance organizations’ cybersecurity posture. Cyber Threat Intelligence, Dark Web Monitoring, Cybersecurity, MSP, MSSP, Digital Risk Protection, Anti-Phishing Software, Phishing Simulation, Employee …

57 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

1 21
aDolus Technology Inc. aDolus Technology Inc.

Securing the ICS Firmware and Software Supply Chain aDolus Technology Inc. is the global authority on software intelligence for critical infrastructure. Our AI technology correlates information from diverse sources about ICS, IIoT, and IoT firmware and software to provide continuous assurance that packages (and all their subcomponents) are legitimate, tamper-free, and safe to ship and install. By working together to secure the software supply chain, we can create a safer, better world. Cybersecurity, Industrial Control System Security, IIoT, Software Security, Software Validation, Smart Devices, SBOMs, VEX documents, OT, Software Supply Chain Security, Vulnerability Management, Cybersecurity Compliance, Artificial Intelligence, 3rd Party …

185 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT

3 8
Keeper Security, Inc. Keeper Security, Inc.

Manage, protect and monitor all your organization's passwords, secrets and remote connections with zero-trust security Manage, protect and monitor all your organization's passwords, secrets and remote connections with zero-trust security Password Management, Secure File Storage, Cyber Security, password security, cybersecurity, password vault, SSO, zero knowledge, secrets management, and remote access

142 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

20 479
AMAG Technology AMAG Technology

Empowering You to Succeed AMAG Technology, an Allied Universal Company, is a market leader in Physical Access Control, Identity Management and integrated security solutions. AMAG delivers a powerful, unified and open security platform that empowers businesses to effectively secure their facilities, meet compliance and have peace of mind. While access control is the foundation of what we do, the Symmetry Security Management system includes video, identity management, analytics, mobile, intrusion, visitor management, command and control and incident management. Symmetry’s scalable security solutions provide operational insights and intelligence to improve business today and tomorrow. To learn more about AMAG Technology, please …

17 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 197
BullGuard (Now Part of NortonLifeLock Inc.) BullGuard (Now Part of NortonLifeLock Inc.)

In December 2020, NortonLifeLock announced it would acquire the Avira and BullGuard brands, products and services which are now part of NortonLifeLock Inc. NortonLifeLock (NASDAQ: NLOK) is a global leader in consumer Cyber Safety. internet security, antivirus, mobile security, mobile protection, identity protection, vpn, small office security, endpoint security, and antimalware

200 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

8 24
Q5iD Q5iD

Enterprise iD Cybersecurity. The need for a proven and secure identity has never been higher. Consumers demand it, businesses need it to establish and maintain customer trust, and compliance mandates it. Traditional methods of authentication and verification, passwords, SMS passcodes, and knowledge-based authentication are increasingly vulnerable and create consumer friction. Q5iD is THE premier cybersecurity software company delivering the BEST identity management solutions in the WORLD. Proven, authenticated, trusted, secure, and managed identity protection, now. Headquartered in Austin, TX, Bellevue, WA and Denver, CO. technology, biometrics, authentication, identityproofing, cybersecurity, and hiring

91 similar entities Type: Startup Activities: it services Technologies: Cybersecurity

0 27
iC Consult iC Consult

The #1 Independent Consultancy, Systems Integrator, and Managed Services Provider for Identity & Access Management. iC Consult is the trusted partner of choice for Identity-driven Cybersecurity. Our team of over 850 experts is committed to delivering next-level solutions tailored to the unique needs of our clients worldwide. We achieve this by continuously driving innovation, leveraging cutting-edge technology, and partnering with leading identity and cybersecurity vendors, as well as renowned analyst firms. Identity is our specialty: Our end-to-end service portfolio covers all aspects of professional and managed services in identity security including advisory, architecture, implementation, integration, support, and operations. We help …

83 similar entities Type: SMB Activities: it services regtech Technologies: Cybersecurity

15 830
Identity Theft Resource Center - Nonprofit Identity Theft Resource Center - Nonprofit

A nonprofit helping those impacted by identity crime, scams and privacy issues since 1999. The Identity Theft Resource Center (ITRC) is a non-profit organization established in 1999 to minimize risk and mitigate the impact of identity compromise. Identity Theft, Victim Assistance, Scams, Fraud, ID Theft, Cybersecurity, Privacy, Nonprofit, data breaches, identity fraud, consumer services, and public service

42 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

1 31
Network Intelligence Network Intelligence

Cybersecurity service provider specializing in Security Assessments,ISO27001,PCI DSS,MSS, ICS Security & Cloud Security Leading provider of digital security services to clients across the globe. Our service portfolio covers Managed Detection and Response, Vulnerability Management, Risk Management, Privacy and Compliance, as well as an expansive portfolio of training programs. Information Rights Management, Penetration Testing, Vulnerability Assessment, Web application security, DLP, PCI DSS, ISO 27001, SCADA Assessment, Risk Assessment, Breach Response, Compliance, CoBIT, PA DSS, Sharepoint Security, DDos, MDM, 2FA, WAF, DAM, SOC, Managed Security Services (MSS), SWIFT CSP Audit, Cloud Security, and ICS security

271 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity

2 669
Marmalade Box Marmalade Box

We are an information security practise, combining marketing skills and experience with behavioural science to deliver security awareness, behaviour and culture solutions which make a demonstrable difference. Information Security, Personal Development and Training, Governance, Risk and Compliance, and Employee Education and Awareness

235 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

5 N/A
Nomasis AG Nomasis AG

We provide easy and secure access to information anywhere, anytime. Our services: - Managed Services - Engineering - Consulting Our Focus: - Cybersecurity - End User - Modern Workplace Management Our uniques: - Cybersecurity at its best - Outstanding User Experience - Operational Excellence Security, Mobility, Mobile Security, Integration, Managed Services, Enterprise Mobility Management, App Management, Training & Education, Mobile Device Management, Unified Endpoint Management, Mobile Operations Center, iOS/Android/macOS/Windows10, Mobile Threat Defense, Cloud Security, Modern Workplace, Zero Trust, Microsoft M365, Device as a Service (DaaS), and End User Services

423 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

3 12
Moix Security Moix Security

Security is consulting firm specialising in application and software security. We help organisations design, build, and maintain secure software. software security, penetration testing, and vulnerability assessment

485 similar entities Type: SMB Activities: it services Technologies: Cybersecurity

0 1