Logo | Name | Σ | Employees |
---|---|---|---|
![]() | ![]() Modern Identity and Access Management company. We provide a suite of products, starting from video identification to user authentication and transaction/document signing. Currently used by some of the largest telecommunication, healthacare, IT and financial service companies. 280 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 5 | 3 |
![]() | ![]() Modern Authentication for Your Workforce: Secure, Seamless, and Password-Free. Secret Double Octopus provides the only passwordless MFA solution for all enterprise authentication needs. From workstations & SSOs to on-premises infrastructure & legacy applications – with zero employee-managed passwords and a highly secure yet user-friendly interface. 59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 7 | 39 |
![]() | ![]() Together for a Safer Cyberspace CFLW is a tech-SME that pursues a safer cyberspace through cutting-edge intelligence services. Dark Web Monitor – Providing actionable dark web intelligence to law enforcement, governments and industry. Phishing Threat Intelligence – Delivering strategic insights and real-time monitoring to protect organizations from digital threats. Crypto-Asset Analytics – Helping agencies and investigators to trace illicit activities in blockchain transactions. AI & Emerging Tech – Leveraging collaborative and responsible analytics to stay ahead in digital asset monitoring. As a global cyber intelligence provider rooted in the Netherlands, we believe in impact through collaboration and innovation. Working closely … 404 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 10 |
![]() | ![]() Support companies and institutions in the informed and secure implementation of digital solutions. Passionate about technology and Cybersecurity, we offer high value-added services, from cyber governance to cyber managed services, including integration and training on cybersecurity technologies and solutions. IAM, PAM, Data Governance, Office 365 Security, SSO, MFA, ISO 27001, SIEM, EDR, ESET, MIM, BeyondTrust, Microsoft, SOC, Sensibilisation Cybersécurité, Scan de vulnérabilité, SOAR, Infogérance, and Infrastructure IT 647 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 6 |
![]() | ![]() Founding the New Web of Trust. 🔒 Vaultys, leader in cybersecurity, is the 1st authentication solution resistant to AIA assigned attacks. The employees, owners of their identifier, connect without password safely, simplicity and sovereignty. 🔒 cybersecurity, decentralized identity, and sovereignty 110 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 18 | 4 |
![]() | KNS Identity & amp; Access Founded in Lyon in 2002, KNS is a digital service company that works at all levels of information systems securing in France and abroad. Reference player and recognized expert, KNS provides its customers and partners with an impartial, clear and pragmatic vision of digital security issues and related solutions. 19 years of identity management - 25 specialized consultants - 120 IAM/SSO references Identities management, management of authorizations, securing and control of access, Digital identity standards, workflow, rectivities of accounts, inter-referential synchronization, MFA, SSO, identity federation, identity-vigilance, IAM, advice and audit, Integration, Development, Deployment, Maintenance, and Devaas 64 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 2 | 95 |
![]() | ![]() An ESN made up of consultants, engineers specializing in computer project management, network architecture and information systems management. Cybersecurity, IT networks, compliance, high debt, servers, firewall, wifi, IT parks management, intranet, extranet, backup, GDPR, software supports, MOA/MOE, and Multi Factors Authentication 352 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 0 | 5 |
![]() | ![]() A leader in unified identity security One Identity helps organizations strengthen cybersecurity, boost efficiency and control costs through the One Identity Fabric, a holistic approach to identity and access management (IAM). By unifying IAM tools, including identity governance and administration (IGA), access management (AM), privileged access management (PAM), and Active Directory management (AD Mgmt), it ensures optimal functionality and efficiency. This cohesive structure reduces identity sprawl and extends governance to the farthest endpoints of your IAM ecosystem. Proven and trusted on a global scale, One Identity manages more than 500 million identities for more than 11,000 organizations worldwide. For more … 36 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 15 | 609 |
![]() | ![]() Security to communicate freely Ceerus is a distributed secure communications platform that provides frictionless security for every sensitive conversation with your staff and customers, regardless of where they are or what apps they use. Cybersecurity, Secure Communications, Enterprise Apps, FinTech, and API 113 similar entities Type: Startup Activities: regtech deeptech it services fintech Technologies: Cybersecurity | 22 | 4 |
![]() | inWebo The Simple Key to High Security - our strong authentication solution protects B2B or B2C applications from phishing Founded in 2008, inWebo is a major international player in the cybersecurity industry that offers an Identity & Access Management solution including: - inWebo adaptive & passwordless MFA that secures access to B2B and B2C applications by combining the highest level of security on the market with a seamless user experience, freeing them from equipment constraints, thanks to its SaaS mode and multiple tokens. - A CIAM orchestrator to create frictionless, personalized and secure access journeys using a graphical interface or low … 62 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 57 |
![]() | ![]() Arcansecurity develops an innovative authentication solution without passwords to simplify the connection path of a user while improving the level of security. Security, Authentication, Cryptography, Software Development, and Cloud 243 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 4 | 1 |
![]() | ![]() Compliance Trust Generator Examin develops an increased compliance platform in terms of cybersecurity and data protection to allow companies to assess their level of exposure to risk of regulatory origin, ensure their compliance and check that of their partners. 100 similar entities Type: Startup Activities: it services regtech privacytech Technologies: Cybersecurity | 7 | 9 |
![]() | Unosecur Comprehensive identity security for your multi-cloud and hybrid environments Unosecur is a comprehensive identity security platform that addresses identity-related threats in multi-cloud and on-premise environments, providing end-to-end protection and identity management for human and non-human identities. The Unified Identity Fabric by Unosecur integrates automated least-privilege implementation, MITRE ATT&CK framework-based threat detection, AI-powered policy creation, and more. We seamlessly manage your organization’s human and non-human identities: from discovery and analysis to monitoring, control, remediation, and governance. Type: Startup Activities: it services Technologies: Cybersecurity A.I. | 1 | 28 |
![]() | ![]() Your expert in IT solutions: consulting, cybersecurity, infrastructure, networks, wifi, connectivity & amp; Cloud Since April 2023, Yourax has definitely joined the ACESI group by becoming Acesi Lille! IT security, IT solution, IT consultant, Cloud, Infrastructure, Managed, SaaS, Connectivity, Analytics, Hypercongence, RGPD, Audit, and Cybersecurity 330 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 8 | 17 |
![]() | ![]() Simplify password management and put digital security within everyone's reach, including the most cyber-fragile. Authentication, SSO, Privacy, Privacy, Connection, Cyber Security, Payment, Web Trust, Passwords, and Sovereign 146 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 3 | 2 |
![]() | ![]() #SecurityRiskmanagement #Cybersecurity #EbiosRisqueManager #OligoRiskManager #DORA #NIS2 Reciproc-it is an Information Security System Consulting Firm. Our main activities are based on giving guidance to protect the data and information, by ensuring their integrity, confidentiality, availability and auditability It’s also a matter of helping our customers in managing and processing their IT projects in well framed way by using the adequate methodology Information System Security, IT Projects management, Cybersecurity, risk management, consulting, and Compliance 422 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 5 | 9 |
![]() | ![]() Highlight cyber threats before they darken your business European leader in intrusion detection and advanced threat detection, Gatewatcher has been protecting the critical networks of large companies as well as public institutions since 2015. Its model combines multiple technologies with A.I. to provide consistent, optimal protection and meet the current and future cybersecurity challenges of organizations. cybersecurity, sécurité informatique, cyberdéfense, cyberdefense, cyberattacks, IT, advanced persistent threats, networks security, exploits, malware, intrusion detection system, threat protection, IDS, APT, Trackwatch technology, NDR, CTI, Threat hunting, and Threat forensics 422 similar entities Tags: FrenchTech2030 Type: Startup Activities: it services Technologies: Cybersecurity | 62 | 128 |
![]() | ![]() Award-winning AI tool offering cyberattack response, recovery, and training automation across all business functions ORNA is a cyber incident response and case management platform for small teams that detects cyberattacks and uses AI to guide response, reporting, compliance and prevention efforts through an innovative real-time collaborative environment. cybersecurity, digital forensics, SaaS, and crisis management 266 similar entities Type: Startup Activities: it services Technologies: A.I. Cybersecurity | 3 | 40 |
![]() | ![]() Your cybersecurity partner! ☛ Governance ☛ RSSI Assistance ☛ Audits and Penses ☛ Secure architectures Specialist in the governance of information systems security and secure infrastructure architecture, Allistic supports its customers and their RSSIs in the definition of the cybersecurity strategy of their business. Cybersecurity, IT security, GDP, PSS, crisis management, awareness, secure architectures, Pentest, Audit, CC scan, SOC, Security, Security Advice, Cloud Security, Big Data security, Security Management, Risk Management, and Management of Compliance 374 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity Data Analytics | 45 | 19 |
![]() | ![]() Audit & amp; Digital Welcome to the universe of Probeecy, your trusted ally dedicated to the protection of personal data, computer security, internal audit, as well as internal and quality control. 142 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity | 3 | 2 |
![]() | ![]() Smart Web Application & API Protection + International CDN ! Start-up which revolutionizes the security of your websites and applications. cybersecurité, simplicité, innovation, analyse comportementale, machine learning, intelligence artificielle, WAAP, and CDN 171 similar entities Type: Startup Activities: it services Technologies: A.I. A.I. - Machine Learning Cybersecurity | 15 | 17 |
![]() | ![]() Human risk managed the right way Arsen is a phishing training and awareness solution, leveraging realistic simulation, microlearning and reporting. Cybersécurité, SaaS, Phishing, Cybersecurity Awareness, and human risks 251 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 8 | 16 |
![]() | ![]() ID Verification, Secure Biometric Authentication, Payments Fortress Identity is an intelligent biometrics platform that replaces passwords with secure multimodal and multi-factor identification, using an individual’s unique human biometrics for secure identity authentication. 51 similar entities Type: Startup Activities: regtech Technologies: Cybersecurity | 1 | 3 |
![]() | ![]() Specialist in remote monitoring, alarm systems and remote assistance for almost 40 years, Nexecur is committed to your security based on experience and knowledge of your needs. A subsidiary of Crédit Agricole, Nexecur develops efficient solutions that ensure effective and continuous protection of your company, guaranteeing the security of your employees. Remote monitoring, video surveillance, video protection, access control, technical alarms, fire detection, intrusion detection, and fog generator 63 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 9 | 380 |
![]() | ![]() digital.security is now an Eviden business Founded in 2015 by a group of IT security experts with the support of the Econocom Group, digital.security (~ 230 experts) aims to offer companies and government organisations advanced audit and consulting services and a CERTTM dedicated to the IoT ecosystem. Our experts have strong expertise in providing Integration & Projects (SSO, IAM, IAG, PKI, privilege management, Logs collection, analysis and management Data compliance solutions), and also in Operational Security (outsourcing, security services center operations, SOC & SIEM management). Audit, IoT, IAM, SSO, Security, Pentesting, BugBounty, DLP, Consulting, CERT, CSIRT, RedTeam, SOC, SIEM, DFIR, … 342 similar entities Type: SMB Activities: it services Technologies: IoT Cybersecurity | 0 | 68 |
![]() | ![]() Sensitive Data Requires Premium Protection OneVisage is a Swiss cyber-security company registered in 2016 by 3D computer vision experts, software veterans and executive managers. We aim to become a leading ethical, transversal Strong Authentication solution provider to help large OEM integrators and IAM providers eliminate digital identity theft. Strong Customer Authentication, 3D Facial Biometry, 2-FA, Multi-Factor Authentication, GDPR, CCPA, CNIL, Data Privacy, Data Protection, and ZERO Trust 86 similar entities Type: Startup Activities: it services privacytech Technologies: A.I. A.I. - Image Processing Cybersecurity | 20 | 7 |
![]() | ![]() Lightweight Identity Governance. "Who can access what within my organisation?" Having provable control over who can access is crucial for the NIS2 and ISO 27001 certifications. Elimity Insights is the lightweight identity governance solution that allows security teams to take control of user access within days. Elimity Insights allows security to easily answer the ever-growing number of IAM data questions: easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards! ✅ Identity Data Analytics, Identity Governance, IAM, Identity Security, Identity and Access Management (IAM), NIS2, and ISO 27001 8 similar entities Type: Startup Activities: it services regtech Technologies: Cybersecurity | 14 | 8 |
![]() | ![]() The leader in Identity and Access Management OneLogin by One Identity, a wholly owned subsidiary of Quest Software, leads the market in Identity and Access Management. OneLogin by One Identity, a wholly owned subsidiary of Quest Software, leads the market in Identity and Access Management and support more than 5,000 customers worldwide. Our platform provides everything you need to secure your workforce, customers and partners. Single Sign-On, SSO, identity management, security, multi-factor authentication, user provisioning, Compliance, Cloud Security, Credential Vaulting, Unified Endpoint Management, Consumer IAM, IAM, Governance, Web Access Management, and Adaptive MFA 66 similar entities Type: Startup Activities: it services regtech Technologies: Cybersecurity | 15 | 68 |
![]() | ![]() The Modern SOC Company JASK is modernizing security operations by delivering an advanced SIEM platform that provides better visibility, better automation and a better architecture. Built on cloud-native technologies, the JASK ASOC platform streamlines security analyst workflows by automating many of the repetitive tasks that restrict productivity, freeing them for higher-value roles like threat hunting and vulnerability management, while addressing the escalating talent shortage. Cyber Security, Security Analytics, Artificial Intelligence, Security Operations, SIEM, and Cloud 89 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I. | 2 | 13 |
![]() | ![]() Cybersec Netherlands | 10 - 11 September 2025 | Jaarbeurs, Utrecht Cybersec Netherlands | 6 - 7 November, 2024 | Jaarbeurs, Utrecht Cybersecurity, Infosecurity, Privacy, GDPR, IoT, Artificial Intelligence, Blockchain, Cloud Computing, Data Management, Digital Transformation, DevOps, Security Awareness, Risk Management, Infrastructure, cyber, data, and cloud 108 similar entities Type: Startup Activities: it services privacytech Technologies: A.I. A.I. - Machine Learning Blockchain/Cryptocurrency Cybersecurity IoT | 16 | 1 |
![]() | ![]() Comprehensive Security for Your SaaS Applications Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS. The company is backed by Greylock Partners, Wing, GV and Norwest Venture Partners. Advanced Threat Protection, Insider Threat Protection, Threat Detection, Threat Response, Automated Intelligence, Machine Learning, Information Security Software, SaaS Security , Incident Response, Visibility and Monitoring, and compliance 166 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I. A.I. - Machine Learning | 9 | 211 |
![]() | ![]() Cybersecurity - Qualified Passi - Security of information systems: Auditer | Protect | Monitor | React A French company founded by a team specializing in the field of networks and the security of information systems, Algosecure aims to support you in the implementation of security and network architecture. We provide advisory and implementation services in safety, network, integration and outsourcing of security systems. Our desire is to establish a trusted partnership with you. Our goal is to guarantee you an adequacy between the proposed architectures and your needs. IT security, Intrusion test, CERT, SOC, cybersecurity, cybersecurity, Pentest, Forensic, Security Audit, … 357 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 16 | 51 |
![]() | ![]() Log in securely, share your ID data or to sign documents by using your smartphone A trustworthy identity solution, built on security, that uniquely combines four different services. digital identity, digital security, digital privacy, mobile identity, strong customer authentication, qualified electronic signature, and eSignature 121 similar entities Type: Startup Activities: it services privacytech Technologies: Data Analytics | 24 | 88 |
![]() | ![]() Business Risk & Performance Management Our powerful solutions suite streamlines onboarding, compliance, monitoring and insights to mitigate risk and secure growth at every stage of the digital business lifecycle. fintech security, SaaS, PCI-DSS, VISA, MasterCard, Payment Card Industry, I.T. Security, Fintech, Merchant Risk Management, Risk Management, Fraud, Risk Prediction, and Merchant Security 604 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 25 |
![]() | ![]() Empower People. Reduce Cyber Risk. The best software for MSSPs & MSPs to deliver anti-fraud, anti-phishing, e-mail analysis and security awareness training that motivates behavior change. Cybersecurity, Cybersecurity Strategy, Cyber Threat Intelligence and Analysis, and Cyber Risk Management and Remediation 446 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 18 | 47 |
![]() | ![]() All-in-one compliance solution for GDPR, ISO27001, SOC2, NIS2, TISAX®, ISO27701, AI Act or ISO42001 Kertos is the modern backbone of every company’s privacy and compliance operations. We support in Data & Process Discovery, Data Subject Requests (e.g. customer data deletion), Access & Asset Management, Compliance Documentation and various Certification Frameworks such as ISO27001, SOC2, TISAX® and similar. Our intuitive no-code SaaS solution connects to the entire IT infrastructure, identifies compliance relevant assets and processes, related data and automates compliance workflows to get an organization certification ready within weeks. Data Privacy, Process Automation, Security, Compliance, GDPR, ISO27001, NIS2, and AI Act 66 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 5 | 58 |
![]() | ![]() We didn’t reinvent cybersecurity, we just made it simpler and smarter. Our unified platform simplifies security management by combining device protection, reputation monitoring, domain security, and more. Designed with ease of use and affordability in mind, we empower users to stay protected without breaking the bank. AI, Cybersecurity, and Social Media 299 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I. | 0 | 2 |
![]() | ![]() Self assessment, protection & healing tools for a trustworthy and resilient CCAM SELFY’s strategic vision is to become the main European provider of an agnostic toolbox for the self management of security and resilience of the CCAM ecosystem, which can be easily deployed over the CCAM environment to extend the current Operational Design Domain (ODD), providing self-awareness, self-resilience and self-healing mechanisms and end-user trust. CCAM, Cybersecurity, and Autonomous Vehicles 91 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 4 | 4 |
![]() | ![]() Your Voice, the One and Only The first Dynamic Enhanced Secure Customer Authentication platform, Peer-To-Peer, that allows to transform your voice in your identity, your payment system, your digital sign. Authentication, Biometrics, Digital Identity, Security, Privacy, Blockchain, Artificial Intelligence, Natural Language Processing, Natural Language Understanding, Machine Learning, Usability, Passwordless, and Cybersecurity 113 similar entities Type: Startup Activities: it services privacytech Technologies: A.I. Blockchain/Cryptocurrency Cybersecurity A.I. - Natural Language Processing A.I. - Machine Learning | 8 | 5 |
![]() | ![]() Delivering actionable market and competitive intelligence for go-to-market in fraud, identity, and cybersecurity. Liminal is a technology company that empowers businesses with actionable market and competitive intelligence. Our AI-enabled Link platform delivers personalized, real-time intelligence in our native apps or directly in client workflows, enabling executives to make informed decisions, enhance productivity, and drive growth. We tackle critical focus areas with targeted solutions for fraud and identity, cybersecurity, trust and safety, financial crimes compliance, and privacy and consent management. Identity, Privacy, Security, FinTech, Authentication, Cyber Crime, IAM, Access Management, Digital Identity, Cybersecurity, Risk Management, Strategy, Market Analysis, market intelligence, saas … 61 similar entities Type: Startup Activities: privacytech constructiontech fintech media Technologies: Cybersecurity | 50 | 68 |
![]() | Gudens Cybersecurity Guden Cybersecurity is currently operating in a private development phase. Security Architecture, Data Loss Prevention, Penetration Testing, Incident Response, Identity Management, Access Management, Secure DevOps, Cloud Security, Network Security, Data Security, Endpoint Security, Vulnerability Management, Secure DevOps, and Digital Forensic 446 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 142 |
![]() | ![]() Identity and Access Management Provider specialising in Identity and Access Management, over the last 25 years Ilex International has developed a high level of expertise in IT security. Partner to most of the blue chip companies, today Ilex International is notably recognised for its expertise in enterprise repositories and identity federation. IAM - Identity and Access Management, Gestion des rôles, Web Access Management, Enterprise SSO et Fédération d'identités, and Workflow, provisioning et gestion des identités 13 similar entities Type: SMB Activities: it services Technologies: SaaS | 23 | 56 |
![]() | ![]() Accelerating global trust with award-winning KYC & AML solutions Shufti is an AI-powered digital identity verification solutions provider offering KYC, KYB, and AML services in 200+ countries and territories. It aims to create a secure and safe online marketplace devoid of identity theft and other fraudulent activities. KYC, AML, Address Verification, Face Verification, Customer Due Diligence, ID Verification, Age Verification, KYC Verification, Identity Verification, Credit Card Fraud Prevention, Identity theft protection, Biometric Verification, 2 Factor Authentication, ArtificialIntelligence, Machine Learning Algorithims, GDPR, User Verification, B2B, KYB, Fraud Prevention, Compliance, Security, Technology, and Software 76 similar entities Type: Startup Activities: it services regtech privacytech Technologies: A.I. Cybersecurity A.I. - Machine Learning | 3 | 119 |
![]() | ![]() We enable and secure access to business data by managing your digital identities. Founded in 1991, GCA Technology Services (GCA) is a security provider specializing in Identity and Access Management (IAM) solutions. We help enterprises enable and secure access to business data by managing their digital identities, and offer a best of breed portfolio of leading IAM vendor partners. Our team’s expertise, experience, and tenacity equip us with the tools to design, deploy and manage complex IAM projects that solve business challenges for our clients and enhance their profitability and competitiveness. Visit us at https://gca.net. Security Information & Event Management … 67 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 11 | 43 |
![]() | ![]() Security Without Compromise Strategic, tactical, and technical consulting services and the Eidola technical automation platform. Consented surveillance through transparency, reciprocity and proportionality - AuthC in concert with 0PN nee The Open Consent Group and Surveillance Trust Physical Security, Surveillance, Machine Vision, Automation, Intelligent Infrastructure, Privacy, Cybersecurity, and Identity and Access Management 119 similar entities Type: SMB Activities: privacytech Technologies: Cybersecurity | 1 | 2 |
![]() | ![]() The Leading AI-Powered Security and IT Operations Platform. Be Different. Be the Anomali. Anomali delivers the leading AI-Powered Security and IT Operations Platform. Only Anomali integrates ETL, SIEM, Next-Gen SIEM, XDR, UEBA, SOAR, and TIP into one powerful platform. At the center is the Anomali Copilot that navigates a proprietary cloud-native security and IT data lake to drive first-in-market speed, scale, and performance at a fraction of the cost. Modernize security and IT operations to protect and accelerate your organization with better analytics, visibility, productivity, and talent retention. Be Different. Be the Anomali. Learn more at www.anomali.com. Cyber Threat Intelligence, … 37 similar entities Type: Startup Activities: it services Technologies: A.I. Cybersecurity Data Analytics | 17 | 335 |
![]() | ![]() AI-powered identity solutions intersecting biometrics, privacy & cybersecurity (Nasdaq: IDAI, Euronext Growth: AIID ID) Trust Stamp is a global provider of AI-powered identity services for use in multiple sectors including banking and finance, regulatory compliance, government, real estate, communications, and humanitarian services. Our technology empowers organisations with biometric identity solutions that reduce fraud, protect personal data privacy, increase operational efficiency and reach a broader base of users worldwide through unique data transformation and comparison capabilities. Identity Verification, Cybersecurity, Facial Biometrics, Artificial Intelligence, Cryptography, and Fintech 90 similar entities Type: Startup Activities: fintech regtech privacytech Technologies: A.I. Cybersecurity | 28 | 68 |
![]() | ![]() The most comprehensive end-to-end identity security platform for your workforce and customers. HYPR, the leader in passwordless identity assurance, delivers the industry's most comprehensive end-to-end identity security for your workforce and customers. By unifying phishing-resistant passwordless authentication, adaptive risk mitigation, and automated identity verification, HYPR ensures secure and seamless user experiences for everyone. Trusted by organizations worldwide, including two of the four largest US banks, leading manufacturers, and critical infrastructure companies, HYPR secures some of the most complex and demanding environments globally, showcasing our commitment to innovation and security excellence. Cybersecurity, Mobile Security, Infrastrucure, Data Security, Security, Wireless, Privacy, SaaS, … 21 similar entities Type: Startup Activities: it services regtech privacytech Technologies: Cybersecurity IoT SaaS Wireless | 17 | 110 |
![]() | kyron solutions informatiques Advise, support, defend and protect the assets of companies www.kyron.fr Audits & amp; Advice, governance, risks, compliance, IS optimization, PMO, AMOA, AMOE, Engineering - Architecture, Integration, Operation, Physical Security, Training, Infrastructure Systems and Networks, Bastion, Data Protection, Anti -Phising, Cybersecurity, and ISA62443 489 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 5 | 29 |
![]() | ![]() Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges with solutions that protect critical data and applications without workflow disruption. Its platform of interoperable identity, authentication, and access management solutions enables organizations in over 45 countries to fully manage and secure all enterprise and third-party digital identities by establishing trust between people, technology, and information. software, technology, security, single sign-on, strong authentication management, healthcare, clinical workflows, virtualization, secure text messaging, patient identification, identity management, multifactor authentication, cybersecurity, and healthcare IT 99 similar entities Type: SMB Activities: healthtech regtech Technologies: Cybersecurity | 18 | 1,199 |
![]() | ![]() Australia's cybersecurity experts Australia's phishing and cybersecurity experts. We offer a comprehensive range of cybersecurity services that protect your business from cyber criminals and digital threats. Cloud Security, Application Security, Infrastructure Security, PCI DSS, Phishing, and Email Security 542 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 3 |
![]() | ![]() Idenprotect. Security Simplified. Productivity Elevated Idenprotect is a leading cybersecurity company specialising in a range of phishing-resistant and passwordless authentication and secure browsing solutions. We help organisations of all sizes eliminate password risks, streamline operations, and foster a productive, secure digital environment. Authentication, Innovation, Information Security, Security, Mobility, Assurance, Cryptography, Multi-Factor Authentication, Digital Signing, TEE, TPM & SE, Identity Driven Browsing, Secure Browser, and Enterprise Browser 136 similar entities Type: Startup Activities: it services regtech Technologies: Cybersecurity | 2 | 23 |
![]() | ![]() Best in Class Solutions for National Security, Identity, and Intelligence National Security Solutions is the FOCI (Foreign Ownership, Control, and Influence)-mitigated subsidiary of IDEMIA Global that delivers identity credentials, biometric, and video analytic solutions to the Federal and Intelligence Communities to include U.S. Departments of Defense, Homeland Security, Justice, and State and prominent intelligence agencies. We enable some of the United States’ most sensitive programs. We are recognized experts in identity management, secure credentials, biometrics, video analytics, and access control solutions. Biometrics, Identity Management, Law Enforcement, Video Analytics, Fingerprint Algorithms, Credentialing, AFIS, Facial Recognition, Artificial Intelligence, ID Documents, Digital ID, … 133 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 4 | 163 |
![]() | ![]() NVISO is a cyber security services firm composed of outstanding security professionals - each has a specific field of expertise, ranging from security research and risk management to incident response and security testing. This unique "skill blend" allows them to analyse and respond to complex client challenges and help those companies prevent, detect and respond to security challenges with a positive business outcome. Built on values of Pride, Caring for our people, Breaking Barriers, and fostering a no-BS approach, our mission is to be an innovative, trusted and respected security partner for our clients. Penetration Testing, Digital Forensics & Incident … 203 similar entities Type: Startup Activities: it services deeptech Technologies: Cybersecurity | 10 | 316 |
![]() | ErediX Eredix is an IT security company based in Saint Omer offering training, security audit, and penses Eredix is a computer security company based in Saint Omer in Hauts de France. We are specialized in training, audits and penses (intrusion test in your systems) for companies, public organizations and communities. Our consultants have recognized expertise and appreciated professionalism from our customers. Cybersecurity, IT security, and security of the IS 235 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 1 |
![]() | ![]() EMPOWERING TRUST Our technology solutions empower Government Agencies and Businesses to achieve ‘trust in transactions’ in both the physical and digital worlds. Identity Solutions, Multi-Modal Biometrics, Document Verification, Identity Verification, Mobile Network Solutions, IoT Network Solutions, 5G, LTE, 3G, NB-IoT, LTE-M, Private Networking, Biometric Jumpkits, Biometric Handhelds, Biometric Kiosks, Defense, Intelligence, Law Enforcement, Security, and Border Control 297 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 0 | 3 |
![]() | ![]() BeyondID brings digital identity strategies to life. BeyondID is the managed identity services provider that the most successful brands trust to bring their digital identity strategies to life. Identity and Access Management, API Management, Cloud, SaaS, Consulting, Implementation, Managed Services, SSO, MFA, Identity Governance Administration, API Gateway, Microservices, Content Collaboration, Okta, One Identity, Ping Identity, Netskope, Mulesoft, Google Cloud, AWS, Microsoft, cybersecurity, CIAM, Zero Trust, Azure, MSSP, IGA, PAM, Identity Proofing, Digital Transformation, Digital Front Door, Digital Banking, Omnichannel Experience, Zero Trust Security, Healthcare, Financial Services, and Retail 74 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 140 |
![]() | ![]() The industry’s most comprehensive product suite for security operations. The industry’s most comprehensive product suite for security operations empowering enterprises with the best-in-class detection, investigation, automation and response capabilities. Incident Response, Computer Security, Security Orchestration, Security Automation, Threat Hunting, SOAR, and Security Orchestration Automation and Response 241 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 5 | 64 |
![]() | ![]() ID Agent, a Kaseya company, provides effective, easy-to-manage and affordable dark web monitoring, security awareness training and phishing simulation solutions to managed service providers (MSPs) and organizations’ IT teams. Our flagship product, Dark Web ID, monitors the dark web to identify compromised and stolen user credentials and deliver validated intelligence and alerts to prevent security incidents. Our BullPhish ID solution provides security awareness training and phishing simulation geared to the non-technical end user to mitigate human risk and further enhance organizations’ cybersecurity posture. Cyber Threat Intelligence, Dark Web Monitoring, Cybersecurity, MSP, MSSP, Digital Risk Protection, Anti-Phishing Software, Phishing Simulation, Employee … 57 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 21 |
![]() | ![]() Securing the ICS Firmware and Software Supply Chain aDolus Technology Inc. is the global authority on software intelligence for critical infrastructure. Our AI technology correlates information from diverse sources about ICS, IIoT, and IoT firmware and software to provide continuous assurance that packages (and all their subcomponents) are legitimate, tamper-free, and safe to ship and install. By working together to secure the software supply chain, we can create a safer, better world. Cybersecurity, Industrial Control System Security, IIoT, Software Security, Software Validation, Smart Devices, SBOMs, VEX documents, OT, Software Supply Chain Security, Vulnerability Management, Cybersecurity Compliance, Artificial Intelligence, 3rd Party … 185 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 3 | 8 |
![]() | ![]() Manage, protect and monitor all your organization's passwords, secrets and remote connections with zero-trust security Manage, protect and monitor all your organization's passwords, secrets and remote connections with zero-trust security Password Management, Secure File Storage, Cyber Security, password security, cybersecurity, password vault, SSO, zero knowledge, secrets management, and remote access 142 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 20 | 479 |
![]() | ![]() Empowering You to Succeed AMAG Technology, an Allied Universal Company, is a market leader in Physical Access Control, Identity Management and integrated security solutions. AMAG delivers a powerful, unified and open security platform that empowers businesses to effectively secure their facilities, meet compliance and have peace of mind. While access control is the foundation of what we do, the Symmetry Security Management system includes video, identity management, analytics, mobile, intrusion, visitor management, command and control and incident management. Symmetry’s scalable security solutions provide operational insights and intelligence to improve business today and tomorrow. To learn more about AMAG Technology, please … 17 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 197 |
![]() | ![]() In December 2020, NortonLifeLock announced it would acquire the Avira and BullGuard brands, products and services which are now part of NortonLifeLock Inc. NortonLifeLock (NASDAQ: NLOK) is a global leader in consumer Cyber Safety. internet security, antivirus, mobile security, mobile protection, identity protection, vpn, small office security, endpoint security, and antimalware 200 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 8 | 24 |
![]() | ![]() Enterprise iD Cybersecurity. The need for a proven and secure identity has never been higher. Consumers demand it, businesses need it to establish and maintain customer trust, and compliance mandates it. Traditional methods of authentication and verification, passwords, SMS passcodes, and knowledge-based authentication are increasingly vulnerable and create consumer friction. Q5iD is THE premier cybersecurity software company delivering the BEST identity management solutions in the WORLD. Proven, authenticated, trusted, secure, and managed identity protection, now. Headquartered in Austin, TX, Bellevue, WA and Denver, CO. technology, biometrics, authentication, identityproofing, cybersecurity, and hiring 91 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 27 |
![]() | ![]() The #1 Independent Consultancy, Systems Integrator, and Managed Services Provider for Identity & Access Management. iC Consult is the trusted partner of choice for Identity-driven Cybersecurity. Our team of over 850 experts is committed to delivering next-level solutions tailored to the unique needs of our clients worldwide. We achieve this by continuously driving innovation, leveraging cutting-edge technology, and partnering with leading identity and cybersecurity vendors, as well as renowned analyst firms. Identity is our specialty: Our end-to-end service portfolio covers all aspects of professional and managed services in identity security including advisory, architecture, implementation, integration, support, and operations. We help … 83 similar entities Type: SMB Activities: it services regtech Technologies: Cybersecurity | 15 | 830 |
![]() | ![]() A nonprofit helping those impacted by identity crime, scams and privacy issues since 1999. The Identity Theft Resource Center (ITRC) is a non-profit organization established in 1999 to minimize risk and mitigate the impact of identity compromise. Identity Theft, Victim Assistance, Scams, Fraud, ID Theft, Cybersecurity, Privacy, Nonprofit, data breaches, identity fraud, consumer services, and public service 42 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 31 |
![]() | ![]() Cybersecurity service provider specializing in Security Assessments,ISO27001,PCI DSS,MSS, ICS Security & Cloud Security Leading provider of digital security services to clients across the globe. Our service portfolio covers Managed Detection and Response, Vulnerability Management, Risk Management, Privacy and Compliance, as well as an expansive portfolio of training programs. Information Rights Management, Penetration Testing, Vulnerability Assessment, Web application security, DLP, PCI DSS, ISO 27001, SCADA Assessment, Risk Assessment, Breach Response, Compliance, CoBIT, PA DSS, Sharepoint Security, DDos, MDM, 2FA, WAF, DAM, SOC, Managed Security Services (MSS), SWIFT CSP Audit, Cloud Security, and ICS security 271 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 2 | 669 |
![]() | Marmalade Box We are an information security practise, combining marketing skills and experience with behavioural science to deliver security awareness, behaviour and culture solutions which make a demonstrable difference. Information Security, Personal Development and Training, Governance, Risk and Compliance, and Employee Education and Awareness 235 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 5 | N/A |
![]() | ![]() We provide easy and secure access to information anywhere, anytime. Our services: - Managed Services - Engineering - Consulting Our Focus: - Cybersecurity - End User - Modern Workplace Management Our uniques: - Cybersecurity at its best - Outstanding User Experience - Operational Excellence Security, Mobility, Mobile Security, Integration, Managed Services, Enterprise Mobility Management, App Management, Training & Education, Mobile Device Management, Unified Endpoint Management, Mobile Operations Center, iOS/Android/macOS/Windows10, Mobile Threat Defense, Cloud Security, Modern Workplace, Zero Trust, Microsoft M365, Device as a Service (DaaS), and End User Services 423 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 3 | 12 |
![]() | Moix Security Security is consulting firm specialising in application and software security. We help organisations design, build, and maintain secure software. software security, penetration testing, and vulnerability assessment 485 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 1 |