Logo | Name | Σ | Employees |
---|---|---|---|
![]() | ![]() Improving the security, the integrity and the availability needs of connected industries and critical infrastructures. As France's leading provider of cyber protection for critical systems, Seclab secures exchanges by simplifying interconnection architectures and eliminating the risks associated with software flaws in cybersecurity equipment. Its patented technology for electronically breaking all network and USB communication protocols enables the deployment of highly secure network architectures and remote control of cyber-physical systems. ANSSI-certified, our products are designed to secure the country's most critical infrastructures. Our customers address the cybersecurity of their most sensitive assets with solutions that are simpler to implement and maintain … 79 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 19 | 29 |
![]() | ![]() Security to communicate freely Ceerus is a distributed secure communications platform that provides frictionless security for every sensitive conversation with your staff and customers, regardless of where they are or what apps they use. Cybersecurity, Secure Communications, Enterprise Apps, FinTech, and API 113 similar entities Type: Startup Activities: regtech deeptech it services fintech Technologies: Cybersecurity | 22 | 4 |
![]() | ![]() We are a Deeptech Cybersecurity Enabler Embedded security systems will pave the way for data privacy and application protection in an ever-evolving connected world. In a world where technological progress is increasing and connectivity possibilities are infinite, the associated cyberattacks are increasing in number and intensity. Managing threats to data privacy and application protection has never been so critical or strategic. We believe that vulnerabilities can be reduced by adopting a security-by-design approach, with embedded security solutions. We endeavor to provide silicon/ASIC providers with world-class innovative embedded security solutions, in the form of certified Secure Enclaves & IP, to create … 88 similar entities Type: Startup Activities: it services Technologies: Cybersecurity Semiconductors IoT | 11 | 7 |
![]() | ![]() Security for Good With the advent of low cost – high bandwidth- low latency connectivity, the increased use of digitization techniques to deliver end-to-end intelligence, many industrial sectors are combining microelectronics and embedded software to deliver real time interactions between the physical and the digital worlds leveraging on complex IT infrastructures of interconnected devices, systems, systems-of-systems, edge and cloud services. This creates attractive business opportunities for hackers that could exploit the large attack surface exposed by those complex infrastructures to extort money, potentially threatening to remotely cause physical damage to users or surrounding equipment. ProvenRun’s mission is to provide customers … 73 similar entities Type: Startup Activities: it services Technologies: IoT Semiconductors Embedded Systems Cybersecurity | 16 | 57 |
![]() | ![]() Cybersecurity is not a choice Securas offers cybersecurity solutions and services and Cyber Threat Intelligence which allowing both to detect and prevent cyber attacks and threats. Our goal is to make prevention against cybersecurity threats accessible to all! Cybersecurity, CTI, Pensest, Application intrusion test, external intrusion test, social engineering, infrastructure and network, Mobile applications or desktop, and PENTEST of web platforms 313 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 14 |
![]() | ![]() Highlight cyber threats before they darken your business European leader in intrusion detection and advanced threat detection, Gatewatcher has been protecting the critical networks of large companies as well as public institutions since 2015. Its model combines multiple technologies with A.I. to provide consistent, optimal protection and meet the current and future cybersecurity challenges of organizations. cybersecurity, sécurité informatique, cyberdéfense, cyberdefense, cyberattacks, IT, advanced persistent threats, networks security, exploits, malware, intrusion detection system, threat protection, IDS, APT, Trackwatch technology, NDR, CTI, Threat hunting, and Threat forensics 422 similar entities Tags: FrenchTech2030 Type: Startup Activities: it services Technologies: Cybersecurity | 62 | 128 |
![]() | ![]() Taking #cybersecurity to the next level with our unique, easy-to-use password-free authentication Based in Poland, with proven Silicon Valley experience, we’re a team of cybersecurity specialists that fully understand the new cyber threats faced by your business or organisation, whatever your size. From traditional sectors who have fully embraced the digital age like banking and e-commerce to the fast-growing world of IoT, your consumers are under threat from hacking attacks in the form of phishing, identity and data theft, and much more. By developing two core products, Cyberus Key and ELIoT Pro, we are moving cybersecurity to the next level … 64 similar entities Type: SMB Activities: fintech it services Technologies: Cybersecurity IoT | 2 | 9 |
![]() | ![]() Taking Zero Trust to the Device NanoLock Security protects the operational integrity of industrial devices, machines and manufacturing lines against cyber events and human errors to maintain business continuity, improve safety and safeguard revenues. NanoLock is the only zero-trust, device-level solution that prevents outsiders as well as insiders and supply chain cyber events and even human errors in legacy and new devices, regardless of attack origin or exploited vulnerability and without affecting functionality and performance. Cybersecurity, Embedded security, Smart city, Device-level security , Zero Trust , and Zero trust device-level protection 5 similar entities Type: Startup Activities: smart city it services Technologies: Cybersecurity IoT Sensors | 10 | 24 |
![]() | ![]() We didn’t reinvent cybersecurity, we just made it simpler and smarter. Our unified platform simplifies security management by combining device protection, reputation monitoring, domain security, and more. Designed with ease of use and affordability in mind, we empower users to stay protected without breaking the bank. AI, Cybersecurity, and Social Media 299 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I. | 0 | 2 |
![]() | ![]() Immunize Your Software. Protect embedded systems across critical infrastructure from memory-based vulnerabilities. RunSafe Security delivers automated software hardening for critical infrastructure from source to runtime, protecting embedded systems against common and devastating memory safety attacks without compromising performance or requiring code rewrites. The RunSafe Security Platform includes an SBOM generator specifically designed for embedded systems and C/C++ projects, vulnerability identification and risk quantification, unique memory relocation techniques to mitigate memory-based vulnerabilities, and pre-hardened open-source packages and containers for immediate protection. Headquartered in McLean, Virginia, with an office in Huntsville, Alabama, RunSafe Security’s customers span the aerospace, defense, energy, industrial, and … Type: Startup Activities: it services deeptech healthtech Technologies: Embedded Systems IoT Cybersecurity | 10 | 41 |
![]() | Fox-IT For a more secure society Fox-IT prevents, solves and mitigates the most serious cyber threats with innovative solutions for government, defense, law enforcement, critical infrastructure, banking, and commercial enterprise clients worldwide. Our approach combines human intelligence and technology into innovative solutions that ensure a more secure society. We develop custom and packaged solutions that maintain the security of sensitive government systems, protect industrial control networks, defend online banking systems, and secure highly confidential data and networks. Intelligence, Cyber security, Forensic investigation, Threat monitoring, Managed services, Red teaming, Pentesting, Education, Fraud detection, Detection, Incident Response, Security Operations Center, and Crypto technlogy 149 similar entities Type: SMB Activities: it services edtech Technologies: Cybersecurity | 11 | 362 |
![]() | ![]() Take Control of Connected Device Risk. We enable product security teams – the guardians of the connected world – to protect the devices we rely on every day through market-leading software threat, vulnerability, and risk management. Finite State is the leading provider of product cyber security solutions for connected devices and embedded systems, including IoT, medical devices, and OT/ICS. cybersecurity, iot, vulnerability research, risk management, ICS, Supply Chain Security, and OT 61 similar entities Type: Startup Activities: deeptech it services Technologies: IoT Cybersecurity | 2 | 64 |
![]() | ![]() Securing the ICS Firmware and Software Supply Chain aDolus Technology Inc. is the global authority on software intelligence for critical infrastructure. Our AI technology correlates information from diverse sources about ICS, IIoT, and IoT firmware and software to provide continuous assurance that packages (and all their subcomponents) are legitimate, tamper-free, and safe to ship and install. By working together to secure the software supply chain, we can create a safer, better world. Cybersecurity, Industrial Control System Security, IIoT, Software Security, Software Validation, Smart Devices, SBOMs, VEX documents, OT, Software Supply Chain Security, Vulnerability Management, Cybersecurity Compliance, Artificial Intelligence, 3rd Party … 185 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 3 | 8 |
![]() | ![]() Innovating with security Fraunhofer AISEC is one of the leading institutions for applied research in the field of cyber security worldwide. More than 220 highly qualified researchers develop customized security concepts and solutions for businesses and public authorities, to protect their systems, infrastructures, products and services. The solutions include enhanced data security and effective protection against cybercrime such as industrial espionage and sabotage attacks. Learn more about IT security research on our #CybersecurityBlog: https://www.cybersecurity.blog.aisec.fraunhofer.de/en/ Imprint: https://www.aisec.fraunhofer.de/en/imprint.html IT Security, Embedded Security, Network Security, Cloud Security, Mobile Security, Automotive Security, Secure Operating Systems, Post Quantum Cryptography, Cybersecurity, Trusted Electronics, Artificial Intelligence, and … 179 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 29 | 140 |