Logo | Name | Σ | Employees |
---|---|---|---|
![]() | ![]() Bring on the future Kaspersky is an international company for cyber security and digital privacy, which was founded in 1997. The cyber security provider protects a billion devices from cyber threats and targeted attacks. The profound threat intelligence and security expertise from Kaspersky serves as the basis for innovative security solutions and services to protect private users, companies, critical infrastructures and governments worldwide. The company's comprehensive security portfolio includes a leading protection of digital life for private devices, specialized security products and services for companies as well as cyber immune solutions to combat complex and steadily developed digital threats. Millions … 98 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 6 | 42 |
![]() | ![]() Tetrate solves application networking and security, enabling innovation with speed and safety in hybrid environments. Tetrate provides the world’s leading Application Networking and Security Platform built on top of open source Istio and Envoy with a modern management plane that brings centralized governance and decentralized enforcement of application networking – essential for implementing Zero Trust security across legacy and modern workloads. Join the community @ tetr8.io/slack. cloud, servicemesh, istio, envoy, envoyproxy, DevSecOps, networking, Zero Trust, security, cloud native, service mesh, compliance, pci, fips, hipaa, Gateway API, and Kubernetes 74 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 6 | 122 |
![]() | ![]() The Most Comprehensive OT & IoT Cyber Security Platform. A Gartner Cool Vendor. SCADAfence is the global technology leader in OT & IoT cybersecurity. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access, and IoT device security. A Gartner “Cool Vendor”, SCADAfence delivers proactive security and visibility to some of the world's most complex OT networks, including the largest manufacturing facility in Europe. SCADAfence enables organizations in critical infrastructure, manufacturing, and building management industries to operate securely, reliably, and efficiently. OT Security, ICS Security, … 8 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 11 | 33 |
![]() | ![]() Rohde & Schwarz Cybersecurity is a leading IT security company that protects companies and public institutions around the world against cyberattacks. The company develops and produces technologically leading solutions for information and network security, including highly secure encryption solutions, next-generation firewalls and firewalls for business-critical web applications, innovative approaches for working in the cloud securely as well as desktop and mobile security. The award-winning and certified IT security solutions range from compact, all-in-one products to customized solutions for critical infrastructures. To prevent cyberattacks proactively, rather than reactively, the trusted IT solutions are developed following the security-by-design approach. More than 500 … 163 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 137 |
![]() | ![]() Innovative, personalized and secure IT solutions and managed services. Edificom is a technology provider of IT solutions, services and network infrastructure serving a wide variety of customers in the education, hospitality and healthcare industries. The company is located in Crissier, Switzerland, and our team works closely with more than 60 customers in the region offering reliable and robust solutions for wired and wireless networks. We provide innovative and secure technology solutions through our certified Tier IV data center as a means to keep their data safe and secure under Swiss data law. Current Vendors and technology Partners include: Fortinet, Blackberry, … 214 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 15 |
![]() | ![]() The solutions to grow digital ESMS and SMEs Widip has developed since 2005 expertise in the secure accommodation of servers - ISO 27001 and HDS certification (health data accommodation) - and digital processing projects. Our offer is based on three main axes: - Security, backup and integrity of data with a dedicated audit and expertise offer - The availability of data carried by our Cloud, Network and Over -site solutions (12 employees with our customers) - user satisfaction with a team of 15 people in the service and user support center (remote supervision, hot-line and telemainne) at the service of … 194 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 12 | 32 |
![]() | ![]() Hybrid IT infrastructure security IT infrastructure is changing, always. From on-premise to the cloud, from server to edge, computer to IOT. One segment remains constant: the network. At NANO Corp we keep the network visible, understandable, operational and secure. Undisputed European Leader in network probes, NANO Corp. is the only french company to have developed its own in-house network probe. Certified at 100Gbit/s by Spirent Communications, our network probe, running in full-CPU at L2/L7, is the only technology to achieve such a high level of performance in Europe and in the world, while also being light. Our team's high level … Type: Startup Activities: it services Technologies: A.I. A.I. - Machine Learning Cybersecurity | 16 | 22 |
![]() | ![]() Australia's cybersecurity experts Australia's phishing and cybersecurity experts. We offer a comprehensive range of cybersecurity services that protect your business from cyber criminals and digital threats. Cloud Security, Application Security, Infrastructure Security, PCI DSS, Phishing, and Email Security 542 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 3 |
![]() | ![]() Advanced Biometric IAM for Wearables/IOT powered by on-Device Machine Learning Fortifyedge provides edge based cybersecurity for cyber-physical devices for industrial IoT customers. Our embedded software utilizes AI to detect attacks before they start. artificial intelligence, cybersecurity, edge computing, Industrial IoT, LoRaWAN, FIDO, embedded systems, and privacy 53 similar entities Type: Startup Activities: it services privacytech Technologies: A.I. A.I. - Machine Learning IoT Embedded Systems Cybersecurity | 0 | 3 |
![]() | ![]() Cybersecurity for and by humans. Eternilab offers advice, expertise and training in the security of networks and information systems. IT security, computer networks, and reliable and secure software development 449 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 7 |
![]() | ![]() Security-first Compliance At Bastion, we're changing the way modern companies secure their software. We enable fast-moving tech teams to build secure, compliant applications from day one—without sacrificing speed. By combining automated compliance, built-in security tooling, and expert guidance, Bastion delivers an all-in-one solution tailored for startups and scale-ups. Designed by security engineers for today’s engineering teams, Bastion is trusted by some of the fastest-growing companies to stay secure and audit-ready—without slowing down. Build fast. Stay secure. Security, Cybersecurity, Technology, and SaaS 122 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 8 | 17 |
![]() | ![]() NVISO is a cyber security services firm composed of outstanding security professionals - each has a specific field of expertise, ranging from security research and risk management to incident response and security testing. This unique "skill blend" allows them to analyse and respond to complex client challenges and help those companies prevent, detect and respond to security challenges with a positive business outcome. Built on values of Pride, Caring for our people, Breaking Barriers, and fostering a no-BS approach, our mission is to be an innovative, trusted and respected security partner for our clients. Penetration Testing, Digital Forensics & Incident … 203 similar entities Type: Startup Activities: it services deeptech Technologies: Cybersecurity | 11 | 319 |
![]() | ![]() The smart choice for secure cloud transformation Our expert team provide secure datacentre, network and cloud native solutions as well as industry leading managed services. We focus on providing efficient solutions to organisations enabling them to do business in confidence, with seamless transition and without fear of a cybersecurity attack. Bringing over 12 years of experience at the highest level, building trusted relationships with customers’, and supporting them wherever they are on their digital journey. Cybersecurity is built into the fabric of all our solutions, enabling secure and confident business operations. Cloud Transformation, Cyber Security, Infrastructure, Networking, Penetration Testing, Cyber … 351 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 7 | 29 |
![]() | ![]() Cybersecurity - Qualified Passi - Security of information systems: Auditer | Protect | Monitor | React A French company founded by a team specializing in the field of networks and the security of information systems, Algosecure aims to support you in the implementation of security and network architecture. We provide advisory and implementation services in safety, network, integration and outsourcing of security systems. Our desire is to establish a trusted partnership with you. Our goal is to guarantee you an adequacy between the proposed architectures and your needs. IT security, Intrusion test, CERT, SOC, cybersecurity, cybersecurity, Pentest, Forensic, Security Audit, … 357 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 16 | 54 |
![]() | ![]() SECURITY SERVICE EDGE European with ease Olfeo is a French publisher of a proxy solution and internet content filtering. OLFEO optimizes internet access for internal and external users, including their mobile devices, thanks to 5 complementary products: URL filtering (SSL deciphering option), protocol filtering, QOS Cache proxy, flow antivirus, public portal. Web safety gateway, SECURITY SERVICE EDGE, CYBER Awareness and training, Cloud Access Security Broker, and CASB 4 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 23 | 61 |
![]() | ![]() Reference brand of@inherent group, dedicated to managed cybersecurity services. Security of Digital Networks International (International SDN), is an independent company founded in 2005 by IT security experts. International SDN issues services for Intangible IT risk management intended for businesses. Surveillance of digital networks, cybersecurity, incident traceability, security incident detection, and response to security incidents 158 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 13 | 26 |
![]() | ![]() The industry’s most comprehensive product suite for security operations. The industry’s most comprehensive product suite for security operations empowering enterprises with the best-in-class detection, investigation, automation and response capabilities. Incident Response, Computer Security, Security Orchestration, Security Automation, Threat Hunting, SOAR, and Security Orchestration Automation and Response 241 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 5 | 64 |
![]() | ![]() Arcansecurity develops an innovative authentication solution without passwords to simplify the connection path of a user while improving the level of security. Security, Authentication, Cryptography, Software Development, and Cloud 243 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 4 | 1 |
![]() | ![]() ESN specializing in network and security infrastructure. SSII Specialized network & amp; IT security. IP integral, architect of network and safety infrastructure solutions, supports you to increase the efficiency of your network, by optimizing and securing exchanges. SAS with a capital of € 40,000 - 23 rue Laugier - 75017 Paris - Tel. : 01.83.64.47.99 Network and security infrastructure, security, network, and cybersecurity 89 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 3 | 6 |
![]() | ![]() Total Cloud Security Anywhere Your Workforce Goes Bitglass’ Total Cloud Security Platform is the only secure access service edge offering that combines a Gartner-MQ-Leading cloud access security broker, the world’s only on-device secure web gateway, and zero-trust network access to secure any interaction. Based in Silicon Valley with offices worldwide, the company is backed by Tier 1 investors and was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution. 59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 22 |
![]() | ![]() We are specialists in protecting sensitive information More than a technological solution, we are a strategic decision for organizations. Our mission is to redefine the relationship between enterprises and cyber-security and the user experience in the process of authentication and access to technology assets. We deliver robust, multi-layered solutions, with advanced technology and focus on preventing security issues, protecting government and corporate information. We ensure secure communication between people (H2H), between machines (M2M), and between people and machines (H2M) with end-to-end encryption. We prevent: - Data breaches - Financial losses - Impact on productivity - Intrusion in IoT devices - … 129 similar entities Type: Startup Activities: it services privacytech Technologies: IoT Cybersecurity | 2 | 22 |
![]() | ![]() Take control of security testing | We reconcile expertise, tools & teams for chip security & binary analysis Expertise in cybersecurity testing takes years to build but can be lost in seconds. When tools are disconnected, teams work in silos, and critical knowledge isn’t shared, security weakens. We believe in a holistic approach, where tools, teams, and expertise are interconnected in a single environment to ensure efficiency, consistency, and long-term knowledge retention. At eShard, we help industrial leaders and government agencies take control of chip security testing and binary analysis. Our platform provides a dedicated testing environment where teams can … 43 similar entities Type: Startup Activities: it services fintech Technologies: Cybersecurity Embedded Systems IoT | 18 | 45 |
![]() | ![]() We are a Deeptech Cybersecurity Enabler Embedded security systems will pave the way for data privacy and application protection in an ever-evolving connected world. In a world where technological progress is increasing and connectivity possibilities are infinite, the associated cyberattacks are increasing in number and intensity. Managing threats to data privacy and application protection has never been so critical or strategic. We believe that vulnerabilities can be reduced by adopting a security-by-design approach, with embedded security solutions. We endeavor to provide silicon/ASIC providers with world-class innovative embedded security solutions, in the form of certified Secure Enclaves & IP, to create … 88 similar entities Type: Startup Activities: it services Technologies: Cybersecurity Semiconductors IoT | 11 | 7 |
![]() | ![]() Highlight cyber threats before they darken your business European leader in intrusion detection and advanced threat detection, Gatewatcher has been protecting the critical networks of large companies as well as public institutions since 2015. Its model combines multiple technologies with A.I. to provide consistent, optimal protection and meet the current and future cybersecurity challenges of organizations. cybersecurity, sécurité informatique, cyberdéfense, cyberdefense, cyberattacks, IT, advanced persistent threats, networks security, exploits, malware, intrusion detection system, threat protection, IDS, APT, Trackwatch technology, NDR, CTI, Threat hunting, and Threat forensics 422 similar entities Tags: FrenchTech2030 Type: Startup Activities: it services Technologies: Cybersecurity | 62 | 127 |
![]() | ![]() Empowering digital transformations while managing risk with cybersecurity intelligence. SEECRA focused on providing Cybersecurity consultancy and pioneer solutions in collaborations with the most excellent engineering universities and research centres to safeguard governments, financial institutions, and other enterprises from cyberthreats. OUR MISSION: - Enable businesses digital transformations while managing risk with cybersecurity intelligence - Achieve business advantage through improved customer experiences. - To exceed customer expectations for quality, responsiveness, and professional excellence. Cyber Security, Secure Communications, Mobile Application Security, ERP Security, ICS/OT Security, Security Awareness Training, ATM Security System, SCADA Security Assessments, SAP & Oracle Security, Cloud Container Security, SOC, Cybersecurity … 434 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 3 |
![]() | ![]() Managed #cybersecurity without the complexity. EDR, ITDR, SIEM & SAT crafted for under-resourced IT and Security teams. Protect Your Endpoints, Identities, Logs, and Employees. The fully managed security platform that combines endpoint detection and response, Microsoft 365 identity protection, a predictably affordable SIEM and science-based security awareness training. Powered by custom-built enterprise technology for mid-market enterprises, small businesses, and the MSPs that support them and delivered by unrivaled industry analysts in our 24/7 Security Operations Center. By delivering a suite of purpose-built solutions that meet budget, security, and peace-of-mind requirements, Huntress is how the globe’s most underresourced businesses defend against … 218 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 7 | 672 |
![]() | ![]() META’s Trusted Partner for Unique Cybersecurity, Cloud and Big Data Solutions For over 17 years, Spire Solutions has led Middle East, Turkey and Africa's digital transformation, pioneering as the region's premier value-added distributor. Our expertise spans across Secure Digital Infrastructure, Artificial Intelligence, and Cloud Technologies, underpinned by our commitment to Data Optimization, Big Data, Cybersecurity, and Privacy Solutions. By leveraging a specialized approach, we empower organizations to navigate and excel in today's digital landscape. VULNERABILITY ASSESEMENT, PENETRATION TESTING, MALWARE DETECTION, ZERO DAY ATTACK DETECTION, RAPID7, NEXPOSE, METASPLOIT, APT, THREAT HUNTING, GRC, TWO FACTOR AUTHENTICATION, SOLARWINDS, IT MANAGEMENT, DECEPTION TECHNOLOGY, FIREWALL … 452 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 3 | 80 |
![]() | ![]() A leading Cyber Security Company in Canada Want to create a secure digital environment for your business to ensure a flawless, problem-free workflow of your organization? Looking for a reliable cyber security company that can offer you first-class security services and top-notch solutions? MBS Tech is a leading cyber security company in Canada, providing businesses with a complete set of high-quality customized services and solutions. Regardless of your industry and the size of your organization, our experienced team of cyber security professionals can help you reach an optimal cyber security position to guarantee your business safety and inviolability. Security, security … 179 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 6 |
![]() | ![]() Securing your digital transformation Evides Digital Security NL (formerly Motiv) is the cyber security specialist who provides organizations in the public and private sector with IT security solutions and services, to prevent cyber crime, data theft and data breaches. Our experienced security professionals understand the business issues that companies stand for and the place of security within the IT landscape. They identify careful security risks and offer, by combining high -quality knowledge, smart ideas and technological possibilities, innovative solutions that ensure optimally secure business processes and applications. Evides Digital Security NL is a Managed Security Services Provider and offers a … 66 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 2 | 66 |
![]() | ![]() Exploring the Depths of Security JSOF is an Israeli boutique cyber consultancy and project firm. We understand software, low-level technologies and information security. Our expertise comes from years of experience in the best teams of the Israeli cyber world. We use our in-depth knowledge to provide cutting-edge cyber-security solutions and overcome the most challenging projects. IoT Research, Embedded Devices, IP protection, Mobile security, OS Internals, Fuzzing, SDL, Information security, Secure code review, Cyber Security, Automotive Cyber Security, Medical Devices Cyber Security, ICS Cyber Security, IoT Cyber Security, and product security 192 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 0 | 3 |
![]() | ![]() Take Control of Connected Device Risk. We enable product security teams – the guardians of the connected world – to protect the devices we rely on every day through market-leading software threat, vulnerability, and risk management. Finite State is the leading provider of product cyber security solutions for connected devices and embedded systems, including IoT, medical devices, and OT/ICS. cybersecurity, iot, vulnerability research, risk management, ICS, Supply Chain Security, and OT 61 similar entities Type: Startup Activities: deeptech it services Technologies: IoT Cybersecurity | 2 | 61 |
![]() | ![]() Securing the ICS Firmware and Software Supply Chain aDolus Technology Inc. is the global authority on software intelligence for critical infrastructure. Our AI technology correlates information from diverse sources about ICS, IIoT, and IoT firmware and software to provide continuous assurance that packages (and all their subcomponents) are legitimate, tamper-free, and safe to ship and install. By working together to secure the software supply chain, we can create a safer, better world. Cybersecurity, Industrial Control System Security, IIoT, Software Security, Software Validation, Smart Devices, SBOMs, VEX documents, OT, Software Supply Chain Security, Vulnerability Management, Cybersecurity Compliance, Artificial Intelligence, 3rd Party … 185 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 3 | 8 |
![]() | ![]() The world’s first moving target data protection platform. CryptoMove Tholos is a key vault and secrets management product for devops security that protects API keys, configs, and other app secrets with decentralization and moving target defense as a service. Moving target defense is a security paradigm shift. Globally patented. Years of stealth R&D. Cloud native. Team of PhD’s and distributed systems engineers. Backed by Google’s CISO and security leaders from FireEye, Palo Alto Networks, JPMorgan, & others. Case studies in the Fortune 500 and federal agencies including the Department of Homeland Security. Cyber security, Data breach, moving target defense, MTD, … 57 similar entities Type: Startup Activities: it services drones privacytech Technologies: Cybersecurity IoT SaaS Drones | 1 | 1 |
![]() | ![]() Security for Good With the advent of low cost – high bandwidth- low latency connectivity, the increased use of digitization techniques to deliver end-to-end intelligence, many industrial sectors are combining microelectronics and embedded software to deliver real time interactions between the physical and the digital worlds leveraging on complex IT infrastructures of interconnected devices, systems, systems-of-systems, edge and cloud services. This creates attractive business opportunities for hackers that could exploit the large attack surface exposed by those complex infrastructures to extort money, potentially threatening to remotely cause physical damage to users or surrounding equipment. ProvenRun’s mission is to provide customers … 73 similar entities Type: Startup Activities: it services Technologies: IoT Semiconductors Embedded Systems Cybersecurity | 16 | 57 |
![]() | Moix Security Security is consulting firm specialising in application and software security. We help organisations design, build, and maintain secure software. software security, penetration testing, and vulnerability assessment 485 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 1 |
![]() | ![]() digital.security is now an Eviden business Founded in 2015 by a group of IT security experts with the support of the Econocom Group, digital.security (~ 230 experts) aims to offer companies and government organisations advanced audit and consulting services and a CERTTM dedicated to the IoT ecosystem. Our experts have strong expertise in providing Integration & Projects (SSO, IAM, IAG, PKI, privilege management, Logs collection, analysis and management Data compliance solutions), and also in Operational Security (outsourcing, security services center operations, SOC & SIEM management). Audit, IoT, IAM, SSO, Security, Pentesting, BugBounty, DLP, Consulting, CERT, CSIRT, RedTeam, SOC, SIEM, DFIR, … 342 similar entities Type: SMB Activities: it services Technologies: IoT Cybersecurity | 0 | 62 |
![]() | ![]() Build your edge. Edge Computing - Edge Delivery - Edge Security StackPath is an edge cloud platform, providing cloud services that are physically closer to end users than core cloud providers’ services. StackPath edge compute—including Virtual Machines and Containers—and edge applications—including CDN and WAF—are strategically located in the world’s most densely populated areas, and united by a secure private network fabric and a single management system. Customers ranging from Fortune 50 enterprises to one-person startups trust StackPath to give their latency-sensitive workloads and applications the speed, security and efficiency they require. SECaaS, CDN, WAF, Cloud Computing, DDoS, Monitoring, DNS, Containers, … 35 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 17 | 47 |
![]() | ![]() Your cybersecurity partner! ☛ Governance ☛ RSSI Assistance ☛ Audits and Penses ☛ Secure architectures Specialist in the governance of information systems security and secure infrastructure architecture, Allistic supports its customers and their RSSIs in the definition of the cybersecurity strategy of their business. Cybersecurity, IT security, GDP, PSS, crisis management, awareness, secure architectures, Pentest, Audit, CC scan, SOC, Security, Security Advice, Cloud Security, Big Data security, Security Management, Risk Management, and Management of Compliance 374 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity Data Analytics | 45 | 19 |
![]() | ![]() The Modern SOC Company JASK is modernizing security operations by delivering an advanced SIEM platform that provides better visibility, better automation and a better architecture. Built on cloud-native technologies, the JASK ASOC platform streamlines security analyst workflows by automating many of the repetitive tasks that restrict productivity, freeing them for higher-value roles like threat hunting and vulnerability management, while addressing the escalating talent shortage. Cyber Security, Security Analytics, Artificial Intelligence, Security Operations, SIEM, and Cloud 89 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I. | 2 | 13 |
![]() | ![]() Improving the security, the integrity and the availability needs of connected industries and critical infrastructures. As France's leading provider of cyber protection for critical systems, Seclab secures exchanges by simplifying interconnection architectures and eliminating the risks associated with software flaws in cybersecurity equipment. Its patented technology for electronically breaking all network and USB communication protocols enables the deployment of highly secure network architectures and remote control of cyber-physical systems. ANSSI-certified, our products are designed to secure the country's most critical infrastructures. Our customers address the cybersecurity of their most sensitive assets with solutions that are simpler to implement and maintain … 79 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 19 | 29 |
![]() | ![]() Provider of tools and services to protect your networks and critical assets. Montimage provides tools and services to protect your networks and critical assets. It offers a security and performance monitoring and management framework adapted to your needs. Services of the company: MMT network monitoring framework. Cyber Threat Intelligence services. Secure portable 4G/5G mobile network platform. Added value : We offer highly innovative solutions that have been built in-house resulting from more than 10 years of research. They integrate advanced AI techniques and multi-source Cyber Threat Intelligence that allow preventing zero-day security breaches. Our solutions have been certified for protecting … 56 similar entities Type: SMB Activities: it services Technologies: Cybersecurity A.I. | 2 | 15 |
![]() | ![]() Hacking, cybersecurity and intelligence. TPX MX SA DE CV. (Mexico) TPX Security LLC. (USA) More than a company, we are a great expert team passionate about the design, development and implementation of computer solutions, cyber infrastructure security, through new technologies focusing on all those companies that finally use them as a tool for productivity, commerce or means of interaction. We offer all our customers a complete service in the chain of computer solutions and cyber security, establishing innovative solutions adjusted to the specific needs of our clients. [+] https://tpx.mx Courses, workshops, software development, computer security, conferences, consulting, backs 302 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 21 |
![]() | ![]() Guardicore is the segmentation company disrupting the legacy firewall market. Our software-only approach is decoupled from the physical network, providing a faster alternative to firewalls. Built for the agile enterprise, we offer greater security and visibility in the cloud, data-center and endpoint. Cloud Security, Data Center Security, Legacy Firewall Alternative, Hybrid Cloud Security, Micro-Segmentation, Software-Defined Segmentation, Network Security, and Network Segmentation 77 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 15 | 82 |
![]() | ![]() An ESN made up of consultants, engineers specializing in computer project management, network architecture and information systems management. Cybersecurity, IT networks, compliance, high debt, servers, firewall, wifi, IT parks management, intranet, extranet, backup, GDPR, software supports, MOA/MOE, and Multi Factors Authentication 352 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 0 | 5 |
![]() | ![]() AI-Native Cybersecurity Human Risk Management Platform Move from traditional security awareness to high user engagement and adaptive security with the world’s first AI-native cybersecurity human risk management platform. Built by a team of visionary CISOs, security experts and researchers, OutThink protects enterprise organizations by putting humans at the heart of security operations. Cyber Security, Security Education, Information Security Awareness Training, Startup, Cyber Risk, Human Vulnerability Management, Human Risk Intelligence, Phishing, Cyber Security Awareness Training , IT Managed Services , SaaS, and Phishing Simulations 86 similar entities Type: Startup Activities: it services Technologies: Cybersecurity SaaS | 18 | 50 |
![]() | ![]() Specialists in Rail Cyber Security Solutions RazorSecure offers products and services to enhance railway cyber security by protecting networks and monitoring key systems. We deliver this through our flexible approach to cyber security, designed specifically for rolling stock, signalling and infrastructure systems. We’ve learned from working with industry leading companies that everyone has a unique set of requirements and challenges to overcome, so we have tailored our solution to provide the flexibility to address even the most difficult environments. Railway, Cyber Security, Asset Discovery, Intrusion Detection, Anomaly Detection, Rail Cyber Security Compliance, and Rail Cyber Security 140 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 15 | 26 |
![]() | ![]() Network Security Posture and Resilience Assurance Titania solutions are trusted by NOC, SOC, Incident Response and Cyber Protection teams to safeguard critical infrastructure and commercial entities, globally. Whether your organization needs real-time visibility and analysis of every network change to get ahead of threats and potential network disruptions. Or scheduled network posture and vulnerability assessments for enhanced attack surface management and compliance assurance. Titania has a solution for every stage of the journey to network readiness, recovery and resilience. IT Security, Firewalls, Network Security, Network Resillience, Network Readiness, Operational Resilience, Compliance Assessments, Configuration Analysis, Network Exposure Management, Attack Surface Management, … 59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 6 | 88 |
![]() | ![]() We provide mobile and application security solutions. Improve security, enhance productivity, stay compliant. Appurity is a team of consultants who assess environments and business requirements to deliver specialised, best-in-class security solutions – endpoint to cloud. Built for the modern and dispersed workforce, Appurity’s solutions adhere to data protection and cybersecurity schemes and regulations such as Cyber Essentials and ISO. We work with businesses to develop and implement impenetrable security strategies that utilise the latest technologies and security frameworks including ZTNA, SSE, CASB, MTD, continuously validating security risks. Working with our technology partners that include Lookout, Pentera, Absolute, BlackBerry, Ivanti and … 100 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 4 | 8 |
![]() | ![]() Safeguarding Critical OT Environments with a Purpose-Built Cybersecurity Platform Our mission is to Safeguard Critical OT Environments with a Purpose-Built Cybersecurity Platform. Build your critical infrastructure with easy-to-use, trusted, and scalable cybersecurity solution - the Tosibox Platform. Our platform opens up new business opportunities and generates new revenue streams for our partners and customers. #OTnetworking #cybersecurity #connectivity #data #WeMakeTosibox Remote Access, VPN, Remote maintenance, Industry 4.0, Cyber Security, Access Management, Continuous Monitoring, Predictive Maintenance, network management, OT network, Data management, Building Automation, ISO27001, Physical security, connectivity, Industrial Automation, Oil and Gas, Critical infrastructure, Utility Services, Building management systems, IoT, Water … 77 similar entities Type: Startup Activities: it services transporttech Technologies: Cybersecurity | 5 | 99 |
![]() | ![]() Improving security and working for a SAFER and BETTER future itm8 er et globalt IT-hus, udsprunget af et iværksætterdrevent mindset. Hos itm8 udvider vi grænserne for IT-løsninger med fokus på fire forretningskritiske områder: Cloud Services, Digital Transformation, Application Services og Cyber Security. IT Security, Active Directory, Penetration Test, Red Team test, and Hacking 271 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 5 | 31 |
![]() | ![]() Democratizing Endpoint Protection for IoT Firedome, a cybersecurity trailblazer, specializes in detection and response solutions for networks and IoT devices tailored for enterprise settings. Founded by leading security veterans, the company comprises a globally distributed team of cyber, networking, research, and analysis experts – With one mission: thwarting attacks on enterprise networks. Firedome CurveTM provides organizations with the means to preemptively stop supply chain, insider threat, ransomware, and other complex attacks that might otherwise evade detection by current security protocols and controls. The company was founded by top security veterans, with a globally distributed team of cyber, embedded, research, and … 90 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 5 | 11 |
![]() | ![]() Embedded Security @Scale. Firmware protection. Done Right. Sequitur Labs was acquired by SEC eDGE in 2023. Follow ua at @SEC-EDGE. Sequitur Labs enables the bedrock of Digital Transformation – TRUST. Our solution EmSPARK Security SuiteTM, streamlines trust enablement and delivers tools and processes to bring field-resilient products to market. We help OEMs achieve time market goals without compromising security and protecting the integrity of firmware through the entire product lifecycle – from design, through manufacturing and deployment. Enterprises deploying EmSPARK powered devices are assured they remain protected from physical and remote attacks and can be securely updated in the field. … 16 similar entities Type: SMB Activities: it services Technologies: Embedded Systems IoT | 7 | 15 |
![]() | ![]() Comprehensive Security for Your SaaS Applications Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS. The company is backed by Greylock Partners, Wing, GV and Norwest Venture Partners. Advanced Threat Protection, Insider Threat Protection, Threat Detection, Threat Response, Automated Intelligence, Machine Learning, Information Security Software, SaaS Security , Incident Response, Visibility and Monitoring, and compliance 166 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I. A.I. - Machine Learning | 9 | 211 |
![]() | ![]() Proactive AI Cybersecurity for IoT and Web businesses Nothreat unlocks unparalleled IoT security with its patented AIoTDefend solution. Our leading-edge adaptive AI technology not only anticipates and neutralises any threats in real-time but also evolves, offering proactive protection against unforeseen events. With unique embedded traps to outwit attackers, we're not just defending but setting new global standards! cybersecurity, online security, software development , IoT, and AI Type: Startup Activities: it services Technologies: Cybersecurity IoT A.I. | 1 | 24 |
![]() | ![]() Business Risk & Performance Management Our powerful solutions suite streamlines onboarding, compliance, monitoring and insights to mitigate risk and secure growth at every stage of the digital business lifecycle. fintech security, SaaS, PCI-DSS, VISA, MasterCard, Payment Card Industry, I.T. Security, Fintech, Merchant Risk Management, Risk Management, Fraud, Risk Prediction, and Merchant Security 604 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 25 |
![]() | ![]() Empower People. Reduce Cyber Risk. The best software for MSSPs & MSPs to deliver anti-fraud, anti-phishing, e-mail analysis and security awareness training that motivates behavior change. Cybersecurity, Cybersecurity Strategy, Cyber Threat Intelligence and Analysis, and Cyber Risk Management and Remediation 446 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 18 | 47 |
![]() | ![]() Cyber security specialists Logiq provide a full range of Cyber Security, Information Assurance and System Engineering services. We specialise in delivering excellence, whether it is a bespoke system development, system design, compliance audit or cyber strategy. Our combination of technical expertise and business understanding means we are able to provide our clients with a complete cyber solution, enabling them to conduct their business securely. Information Security, Cyber Security, Security Risk Assessment, Security Architecture, System Testing, Compliance Management, Tender Support, Requirments Management, Security Consultancy, Cyber Strategy, Secure System Design, Software Security, and Security Development 322 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 144 |
![]() | ![]() We protect the world’s critical infrastructure from cyber threats. Our platform uniquely combines network and endpoint visibility, threat detection, and AI-powered analysis for faster, more effective incident response. Customers rely on us to minimize risk and complexity while maximizing operational resilience. www.nozominetworks.com Cybersecurity, OT Security, IoT Security, OT Cybersecurity, SaaS-Powered Security, Cloud-based Security, Digital Transformation, Cyber Threats, OT Network Visibility, Scalable IoT Security, Threat Detection, Anomaly Detection, IoT Network Security, Scalable Security Platform, IoT Device Security, OT Asset Security, Vulnerability Assessment, OT Network Monitoring, SCADA Security, and ICS Security 165 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 29 | 325 |
![]() | ![]() We're a team of security professionals, who want to help industry of smart devices (IoT, IIoT, Automotive, ...). We can help in improving security of your devices and inspiring confidence of people in the future and safe hyper-connected world. We offer products with unique technologies, a full range of security consulting and Threat Detection service for devices. IoT and Cybersecurity 162 similar entities Type: Startup Activities: it services Technologies: Sensors IoT Cybersecurity | 0 | 0 |
![]() | ![]() Intelligent Cybersecurity | Follow us on X @KudelskiSec Kudelski Security is a premier cybersecurity solutions provider, working with the most security-conscious organizations in Europe and across the United States. Our long-term approach to client partnerships enables us to continuously evaluate their security posture to design and deliver solutions to reduce business risk, maintain compliance and increase overall security effectiveness. For more information about capabilities including consulting, technology, managed security services or custom innovation, visit: www.kudelskisecurity.com Managed security services and solutions, security incident response, threat monitoring, risk assessment and compliance, penetration testing, device security evaluation, identity and access management, security compliance … 453 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 21 | 434 |
![]() | Gudens Cybersecurity Guden Cybersecurity is currently operating in a private development phase. Security Architecture, Data Loss Prevention, Penetration Testing, Incident Response, Identity Management, Access Management, Secure DevOps, Cloud Security, Network Security, Data Security, Endpoint Security, Vulnerability Management, Secure DevOps, and Digital Forensic 446 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 142 |
![]() | ![]() Security Service Edge Leader focusing on securing the world’s data with cloud-native security solutions. Skyhigh Security protects organizations with cloud-native security solutions that are both data-aware and simple to use. Its market-leading Security Service Edge (SSE) Portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security. Organizations can now have complete visibility and control and seamlessly monitor and mitigate security risks—achieving lower associated costs, driving greater efficiencies, and keeping pace with the speed of innovation. 70 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 8 | 640 |
![]() | ![]() Leading-edge cyber threat prevention and identity governance solutions to help prevent, detect, test, and monitor risk. Core Security is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra's Core Security delivers market-leading, threat-aware, vulnerability, identity and access management solutions that provide the actionable intelligence and context needed to manage security risks across the enterprise. penetration testing, security intelligence, software solutions, vulnerability research, threat expertise, threat modeling, identity governance, privileged access management, and identity and access management 88 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 3 | 126 |
![]() | ![]() Creating a community that rejects conventional thinking in order to make better, more secure technology. Companies come to ISE when they need to find and fix their security vulnerabilities and prove their tech is secure. They also come to ISE when they need help managing the complex and error prone process of managing security assessments. People come to work at ISE because it’s community, flexibility, and they are empowered to do meaningful work that helps others. Architecture review, Penetration testing, Source Code review, Cryptographic Protocol & Algorithm Review, Third Party Evaluation, Application Security, Software Development, Governance Risk and Compliance, and … Type: SMB Activities: it services Technologies: Cybersecurity | 14 | 42 |
![]() | ![]() August Schell is dedicated to delivering agile and innovative cybersecurity solutions to proactively defend and protect organization’s data against cyber attacks. Through our proven expertise with cybersecurity services and solutions, we are masters at designing, deploying and implementing highly secure solutions for on-premise and cloud based computing environments. We offer a wide range of next-generation products and services for: - Enterprise-Scale Identity Management, including Derived Credentials for Mobility - Big Data, including Security and Visualization related to Big Data Network Security and Visibility - Operational Intelligence - Data Center Security, including Firewalls, Endpoint Awareness/Management, and Virtualization - Cloud Security and … 95 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 13 | 104 |
![]() | Fox-IT For a more secure society Fox-IT prevents, solves and mitigates the most serious cyber threats with innovative solutions for government, defense, law enforcement, critical infrastructure, banking, and commercial enterprise clients worldwide. Our approach combines human intelligence and technology into innovative solutions that ensure a more secure society. We develop custom and packaged solutions that maintain the security of sensitive government systems, protect industrial control networks, defend online banking systems, and secure highly confidential data and networks. Intelligence, Cyber security, Forensic investigation, Threat monitoring, Managed services, Red teaming, Pentesting, Education, Fraud detection, Detection, Incident Response, Security Operations Center, and Crypto technlogy 149 similar entities Type: SMB Activities: it services edtech Technologies: Cybersecurity | 11 | 362 |
![]() | ![]() Your protection, our mission. Founded in 2004, Secure Network offers specialized services to assess the security of your systems. Thanks to standard methodologies sharpened by years of experience offering penetration testing and security assessment services worldwide, Secure Network is able to effectively answer all your needs and support you in the protection of your core businesses. ethical hacking, penetration testing, computer forensics, information security, and network security 94 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 11 | 31 |
![]() | ![]() Guaranteed IT Solutions At NexTReT we are specialized in optimizing the ICT area of our clients and we help them acquire a high level of security with specialized solutions and services in: Infrastructure, Cloud, Application Development, Big Data, Artificial Intelligence, Quality of Service and Cybersecurity. How do we do it? Reducing and making costs more flexible, improving the quality of its service, making the ICT area more agile and adaptable and with commitment and vocation for service. Since 1993, more than 6,000 successful projects, more than 300 professionals, certifications from the market's leading manufacturers and offices in Barcelona and Madrid. … 727 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 4 | 244 |
![]() | ![]() Innovating with security Fraunhofer AISEC is one of the leading institutions for applied research in the field of cyber security worldwide. More than 220 highly qualified researchers develop customized security concepts and solutions for businesses and public authorities, to protect their systems, infrastructures, products and services. The solutions include enhanced data security and effective protection against cybercrime such as industrial espionage and sabotage attacks. Learn more about IT security research on our #CybersecurityBlog: https://www.cybersecurity.blog.aisec.fraunhofer.de/en/ Imprint: https://www.aisec.fraunhofer.de/en/imprint.html IT Security, Embedded Security, Network Security, Cloud Security, Mobile Security, Automotive Security, Secure Operating Systems, Post Quantum Cryptography, Cybersecurity, Trusted Electronics, Artificial Intelligence, and … 179 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 29 | 140 |
![]() | ![]() Your Secure Connectivity is Our Business Backed by the Service Experience Promise, Open Systems simply and cost-effectively connects and secures hybrid environments and thus ensures your organization can meet business objectives. Open Systems uniquely focuses on a superior user experience when helping organizations reduce risk, improve efficiency, and accelerate innovation. The Open Systems SASE Experience delivers on the promise of ZTNA with a comprehensive, unified and easy-to-implement and use SASE platform that combines SD-WAN and Security Service Edge delivered as a Service. We provide 24x7 operational management and engineering support from assigned engineering teams and ensure affordable and predictable costs. … 38 similar entities Type: SMB Activities: it services regtech Technologies: A.I. Cybersecurity | 10 | 422 |
![]() | ![]() Cybersecurity service provider specializing in Security Assessments,ISO27001,PCI DSS,MSS, ICS Security & Cloud Security Leading provider of digital security services to clients across the globe. Our service portfolio covers Managed Detection and Response, Vulnerability Management, Risk Management, Privacy and Compliance, as well as an expansive portfolio of training programs. Information Rights Management, Penetration Testing, Vulnerability Assessment, Web application security, DLP, PCI DSS, ISO 27001, SCADA Assessment, Risk Assessment, Breach Response, Compliance, CoBIT, PA DSS, Sharepoint Security, DDos, MDM, 2FA, WAF, DAM, SOC, Managed Security Services (MSS), SWIFT CSP Audit, Cloud Security, and ICS security 271 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 2 | 669 |
![]() | ![]() Next-Gen AI SIEM Designed by Security Experts for Proactive Security Teams OwlGaze is the cybersecurity software company behind Blacklight AI SIEM. Blacklight, our proprietary predictive AI-based SIEM and threat detection software provides first-in-class security. A cloud-native, monitoring and detection software that acts as a command center for any organization. Blacklight is architected, designed and built using industry best practices, offering the maximum level of flexibility and extensibility. Combined with OwlGaze’s SOC services, we help enhance your monitoring, detection and response capabilities using our next-gen software designed for proactive monitoring. Monitors, detects, and predicts sophisticated threats allowing security teams to respond … 60 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I. A.I. - Machine Learning | 1 | 12 |