Logo | Name | Σ | Employees |
---|---|---|---|
![]() | ![]() A simple privacy framework for data science collaboration. Mithril Security helps software vendors deploy AI SaaS to security-demanding organizations. We do it thanks to our secure enclave deployment tooling, which provides SaaS on-prem levels of security and control for customers. #DataSecurity #AIIntegration #SaaS #Enclaves #ConfidentialComputing #AISaaS Deep Tech, confidential computing, cybersecurity, and Data Science 91 similar entities Type: Startup Activities: it services Technologies: A.I. Cybersecurity | 9 | 13 |
![]() | ![]() Practical and pragmatic RGPD compliance Pialab, practical and pragmatic GDPR conformity: ✔️ External ✔️Mise in compliance and advice ✔️Formation and awareness Our online store: https://pialab.lemonsqueezy.com/ Data protection, definition of an action plan, GDPR, training, risk identification, GDPR, DPO, treatment register, cybersecurity, and SSI 45 similar entities Type: SMB Activities: privacytech it services Technologies: Cybersecurity | 9 | 3 |
![]() | ![]() The RSSI and DPO software that effectively defends the company by hiring its supplychain against cyberrencies. The collaborative RSSI and DPO solution for cybersecurity management Accessible and efficient which guides and engages your internal teams and your suppliers. With the multiplication of regulatory requirements, in particular the NIS 2, we offer the most relevant solution to establish complete, accessible, efficient and engaging cybersecurity management, in accordance with international standards and standards in the field. Governance, Risks, Compliance, ISO27001, ISO27005, NIS2, GDPR, NISTCSF, IEC624443, Governance, Risks, Compliance, Cybersecurity, Security, Privacy, It, OT, and Dora 80 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 16 | 5 |
![]() | ![]() Online Redefined Founded in Luxembourg in 2017, OnePrivacy is a company specialised in the design of infrastructure and software that respects online privacy. Our goal is to build and commercialise products and solutions that confirm to the notion of Privacy By Design. The goal of our project is for the OnePrivacy brand to be the gold standard for protecting business and individual’s rights to privacy. Our innovative solutions show that there is an alternative to the current system, an alternative reality where one does not need to sacrifice one’s right to privacy when using the internet. Cybersecurity, Encrypted Communications, and … 40 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 9 | 4 |
![]() | ![]() Securing Every bit of your data Founded in 2011 by Fred Raynal, Quarkslab is a French company specializing in cybersecurity and more specifically in the protection and analysis of software. Research and development are the fundamental pillars of Quartkslab. Its purpose has always been to promote innovation by creating a function between academic research and a concrete practice. Its expertise combines offensive and defensive security in the protection of applications and data, and helps government companies and organizations to adopt a new security posture: obliging attackers, not defenders, to adapt permanently. Thanks to these advice services and through the R … 38 similar entities Type: Startup Activities: it services deeptech Technologies: Cybersecurity | 25 | 100 |
![]() | ![]() RGPD conformity & amp; Cybersecurity for VSEs and SMEs VSE/SMEs, Liberal professions & amp; Independent, Ataraxie-IT offers you: ▶ ︎ Personal data protection (RGPD, DPD/external compliance) ▶ ︎ Safety of your information system (SSI, ISO 27001/27002, EBIOS, Ansi guides) ▶ ︎ data backup Security of information systems, IT security, data backup, computer backup, RGPD compliance, personal data protection, external DPO, and RGPD advice 106 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 0 | 1 |
![]() | ![]() Your controlled and secure IT, to advance with serenity We transform the IT of Rhône-Alpes SMEs into a strategic lever for growth and evolution thanks to our pragmatic vision oriented towards the results. Our tailor -made solutions in outsourcing and cybersecurity are specifically designed to meet the challenges of each phase of your evolution: growth, consolidation and digital transformation. We work with companies that share our values: * Proactivity and anticipation: detect future challenges, integrate innovations, adapt permanently * Pragmatic vision: going to the essentials without blabla or waste, adopt rapid and significant improvements * Confidence: Building lasting relationships, based … 429 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 2 | 7 |
![]() | ![]() Together for a Safer Cyberspace CFLW is a tech-SME that pursues a safer cyberspace through cutting-edge intelligence services. Dark Web Monitor – Providing actionable dark web intelligence to law enforcement, governments and industry. Phishing Threat Intelligence – Delivering strategic insights and real-time monitoring to protect organizations from digital threats. Crypto-Asset Analytics – Helping agencies and investigators to trace illicit activities in blockchain transactions. AI & Emerging Tech – Leveraging collaborative and responsible analytics to stay ahead in digital asset monitoring. As a global cyber intelligence provider rooted in the Netherlands, we believe in impact through collaboration and innovation. Working closely … 404 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 10 |
![]() | ![]() Securing connected, autonomous mobility Began in 2007 as the automotive security division of Penta Security Systems Inc., AUTOCRYPT spun off in 2019 as it became a global leader in autonomous and connected mobility security technologies, paving the way for the new age of automobile and mobility through a multi-layered, holistic approach, with security solutions for V2X/C-V2X, V2G (including PnC security), in-vehicle system, and fleet management (including MaaS and DRT development). Recognized by Forbes Asia in its 100 to Watch list and by TU-Automotive as the Best Auto Cybersecurity Product/Solution, AUTOCRYPT ensures that security is prioritized before vehicles hit the road. … 59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 177 |
![]() | ![]() Founding the New Web of Trust. 🔒 Vaultys, leader in cybersecurity, is the 1st authentication solution resistant to AIA assigned attacks. The employees, owners of their identifier, connect without password safely, simplicity and sovereignty. 🔒 cybersecurity, decentralized identity, and sovereignty 110 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 18 | 4 |
![]() | ![]() An ESN made up of consultants, engineers specializing in computer project management, network architecture and information systems management. Cybersecurity, IT networks, compliance, high debt, servers, firewall, wifi, IT parks management, intranet, extranet, backup, GDPR, software supports, MOA/MOE, and Multi Factors Authentication 352 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 0 | 5 |
![]() | ![]() User-encrypted cloud services MEGA is a global technology company focused on security, privacy and performance for storage and sharing since 2013. Strong, user generated end-to-end encryption guarantees that nobody else will have unauthorised access to your data. Not even us. Our innovative and competitive service offerings have seen more than 250 million users join us. Check us out. You will like what you see. Privacy, Security, Cloud Storage, Encrypted, Communication, secure, collaboration, Chat, Business, Global, Technology, Cloud, MEGA, VPN, Password Manager, Chat, S4, Encryption, and Data Protection 29 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 2 | 181 |
![]() | ![]() All the services you need in data protection, web legal adaptation, e-commerce and cybersecurity. All the services you need in data protection, web legal adaptation, e-commerce and cybersecurity. Data protection, Data Protection Delegate, Registration of trademarks, cybersecurity, legal adaptation Web pages, legal adaptation online stores, e-commerce advice, online confidence label, and information security 75 similar entities Type: Startup Activities: privacytech e-commerce it services legaltech Technologies: Cybersecurity | 1 | 2 |
![]() | ![]() Protecting people and data against cyberthreats to give you peace of mind We are prioritizing security above all else through our Secure Future Initiative (SFI). Explore SFI principles, pillars, and progress here ⬇️ Security, Information protection, Identity, Compliance, Zero Trust, Remote Work, Threat protection, Access management, Microsoft Azure, Microsoft 365, Cloud app security, Secure application development, MCAS, CASB, Cloud access, Machine learning, and Cybersecurity 73 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity A.I. A.I. - Machine Learning | 2 | N/A |
![]() | ![]() Cabinet de conseil & d'expertise en cybersécurité Conseil en cybersécurité Management de la sécurité de l’information, Conseil en Sécurité des systèmes d'information, Cybersécurité, Audit de sécurité, Pentests, Red Team, Sécurité offensive, Test d'intrusion, Gouvernance SSI, Mise en conformité ISO 27001, Sécurité IoT, Assistance RSSI, Intégration solutions cybersécurité, Test d'intrusion, ISO 27001, ISO 27005, Analyse de risques cyber, SOC - Security Operation Center, Centre de Cyberdéfense, SSI, and RGPD 61 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity IoT | 14 | 23 |
![]() | ![]() Dedicated experts in cybersecurity and GDPR compliance. 360° services for all businesses. CyberSecura is a consulting and service company exclusively dedicated to cybersecurity, privacy and GDPR compliance. Our main fields of expertise include setting up secure architectures, secure solutions, and secure practices for your projects that involve connected objects, web or mobile applications, for your infrastructure at the base of your IT practices, and for all your contributors. Although we have a solid technical expertise in nowadays cutting edge security technology, we do not believe in the 'one size fits all' approach: we take pride in fully understanding the applicative … 191 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity IoT | 4 | 9 |
![]() | The Shifting Privacy Left Podcast Discussions with privacy engineers, technologists, researchers, ethicists, innovators, market makers & thought leaders. Shifting Privacy Left features lively discussions on the need for organizations to embed privacy by design into engineering, devops and the product development processes BEFORE code or products are ever shipped. Each Tuesday, we'll publish a new episode that features meaty interviews with privacy engineers, technologists, researchers, ethicists, innovators, market makers, and industry thought leaders. We'll dive deeply into this subject and unpack the exciting elements of emerging technologies and tech stacks that are driving privacy innovation, strategies and tactics that win trust, privacy pitfalls to avoid, … 19 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 1 | N/A |
![]() | ![]() Providing the latest in Cybersecurity solutions to help protect your organisation EnterpriseRed is a security consultancy company and provider of leading-edge cybersecurity solutions. We can help protect you from cyber criminals, help you do more with less budget, help minimize the risk of a data breach or ransomware attack and help you obtain cybersecurity certification and compliance for Cyber Essentials and other standards. We’ve been busy behind the scenes with our preferred partners creating solutions to bring you the best of the best, designed to fit your budget. email: sales@enterprisered.com, tel: +44 (0)118 228 6207 Internet of Things , DDoS … 172 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity IoT | 1 | 3 |
![]() | ![]() Security to communicate freely Ceerus is a distributed secure communications platform that provides frictionless security for every sensitive conversation with your staff and customers, regardless of where they are or what apps they use. Cybersecurity, Secure Communications, Enterprise Apps, FinTech, and API 113 similar entities Type: Startup Activities: regtech deeptech it services fintech Technologies: Cybersecurity | 22 | 4 |
![]() | ![]() Fraud prevention with AI, privacy & convince. NIST top performer facial biometrics & liveness detection provider. Our technology has been used for years by major institutions throughout the globe and is designed to get you started immediately, increasing the security of your business without friction. With an extremely streamlined integration and a fully customizable interface, you have the ultimate resource to ensure your customers are who they say they are, saving you money on account takeover, chargebacks, and many other use cases. Face recognition, Mobile payments, Fraud prevention, and Liveness detection 66 similar entities Type: Startup Activities: fintech it services Technologies: A.I. Cybersecurity | 9 | 8 |
![]() | ![]() Cybersecurity for and by humans. Eternilab offers advice, expertise and training in the security of networks and information systems. IT security, computer networks, and reliable and secure software development 449 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 7 |
![]() | ![]() Data Protection Experience XDPO, created in 2019, supports organizations by quickly reducing risks with an agile approach and strong values. We are specialized in awareness of cybersecurity, the RGPD compliance and the review of customer and employee journeys. We also intervene as certified and designated DPOs (data protection delegate) with the CNIL in more than forty organizations. Personal data protection is an issue for all structures and we support you in this process. RGPD, external DPO, RGPD training, Personal Data Protection, AMOA, RGPD consultant, RGPD audit, and cybersecurity 60 similar entities Type: Startup Activities: consulting privacytech Technologies: Cybersecurity | 0 | 2 |
![]() | ![]() Simplifying trusted connectivity At IDENTOS, we believe that digital trust is the linchpin to improving digital access everywhere. Globally, we design and develop digital identity & access technology to meet modern demands of user-centricity, respect for privacy, and distributed system interoperability. With IDENTOS, organizations connect with far greater confidence, compliance, and agility. The IDENTOS workplace puts you in touch with: ● Making a real difference ● A fast growing organization ● A family friendly culture ● Ongoing staff engagements ● Wellness Fridays ● Benefits and dental package security, encryption, authentication, digital identity, UMA 2.0, Federated Trust, and secure communications 51 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 6 | 61 |
![]() | ![]() Data protection, Data Governance, Responsible AI : GDPR, Data Privacy, AI Act TNP TRUST has a team of 40 consultants certified and specialized in GDPR, privacy and cybersecurity, data governance and Responsible AI consulting services. Our services : -Outsourced DPO, representative of foreign companies, audit GDPR, support of GDPR compliance program, training sessions for DPO, implementation of tools (ex. One Trust) , privacy by design -Data governance -AI Governance conseil en protection des données personnelles, audit des traitements de données personnelles, Analyse d'impact sur la protection des données (PIA), Conformité GDPR, Data Protection Officer, RGPD, GDPR, CNIL, DPO, Délégué protection … 98 similar entities Type: Startup Activities: privacytech Technologies: Cybersecurity | 7 | 4 |
![]() | ![]() Arcansecurity develops an innovative authentication solution without passwords to simplify the connection path of a user while improving the level of security. Security, Authentication, Cryptography, Software Development, and Cloud 243 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 4 | 1 |
![]() | ![]() We are specialists in protecting sensitive information More than a technological solution, we are a strategic decision for organizations. Our mission is to redefine the relationship between enterprises and cyber-security and the user experience in the process of authentication and access to technology assets. We deliver robust, multi-layered solutions, with advanced technology and focus on preventing security issues, protecting government and corporate information. We ensure secure communication between people (H2H), between machines (M2M), and between people and machines (H2M) with end-to-end encryption. We prevent: - Data breaches - Financial losses - Impact on productivity - Intrusion in IoT devices - … 129 similar entities Type: Startup Activities: it services privacytech Technologies: IoT Cybersecurity | 2 | 22 |
![]() | ![]() We bring security to the public cloud. We offer a unique, comprehensive data protection suite powered by next-generation cryptography to secure your data in use and protect what matters most. And, what’s most important, is that you’re in control. cryptography, multi-party computation, FHE, functional encryption, secure enclave, datasecurity, dataprivacy, managed services, confidentialcomputing, cybersecurity, confidential VM, confidential GenAI, and post-quantum 94 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity Data Analytics Generative A.I. A.I. | 45 | 19 |
![]() | ![]() Cybersecurity & amp; Data Protection Cabinet specializing in computer security and compliance. We offer advice and audit on IT security and ISO 27001 or GDP compliance, and also provide awareness -raising and training on these subjects. Since 2019, we have also been external to the RGPD. Associate of Qorum Secur'Num, the 1st collective force of TPME and Cybersecurity of France. 94 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 9 | 3 |
![]() | ![]() Compliance Trust Generator Examin develops an increased compliance platform in terms of cybersecurity and data protection to allow companies to assess their level of exposure to risk of regulatory origin, ensure their compliance and check that of their partners. 100 similar entities Type: Startup Activities: it services regtech privacytech Technologies: Cybersecurity | 7 | 9 |
![]() | Unosecur Comprehensive identity security for your multi-cloud and hybrid environments Unosecur is a comprehensive identity security platform that addresses identity-related threats in multi-cloud and on-premise environments, providing end-to-end protection and identity management for human and non-human identities. The Unified Identity Fabric by Unosecur integrates automated least-privilege implementation, MITRE ATT&CK framework-based threat detection, AI-powered policy creation, and more. We seamlessly manage your organization’s human and non-human identities: from discovery and analysis to monitoring, control, remediation, and governance. Type: Startup Activities: it services Technologies: Cybersecurity A.I. | 1 | 28 |
![]() | ![]() Finally, IT assistance without obligation! 🙋🏻♂️ Cyber security partner of large accounts since 2011, we have positioned ourselves as cyber-security, networks, cloud, infrastructure. We design digital technology as a tool at the service of humans and not the other way around. One of the keys to cyber-security progress Cybersecurity, managed services, networks, and audit cybersecurity 463 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 4 |
![]() | ![]() Cryptographic Discovery Tool | Cryptographic Visibility | Internal and Regulatory Compliance Venari Security provides organisations with advanced visibility into their encrypted attack surface, ensuring regulatory compliance and privacy adherence through our cryptographic discovery tool. Our focus is on crypto agility which helps you assess both external and internal cryptographic risks, preparing your business now and for the quantum future. Cyber Security, Threat intelligence, Threat Detection, Metadata, Artificial Intelligence, Encrypted Traffic Visibility, Encryption, Next Generation, Data Privacy, Ransomware, Encrypted Traffic Analysis, Cryptographic Discovery Tool, Cryptographic Visibility, Regulatory Compliance, NIST, and NCSC 58 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity A.I. A.I. - Machine Learning Data Analytics | 16 | 45 |
![]() | ![]() Regulatory Research Software OneTrust DataGuidance provides a comprehensive platform for regulatory research, offering over two decades of expertise to privacy professionals worldwide. With contributions from more than 1,700 experts and daily updates from 300+ jurisdictions, the platform includes access to over 27,000 articles, insights, and guidance notes. DataGuidance simplifies the complexity of global regulations, covering emerging areas like artificial intelligence and US privacy laws, while tracking enforcement trends. Integrated with the AI-powered OneTrust Copilot, it enhances research speed and efficiency, empowering organizations to collaborate across the enterprise and take the first step in establishing and evolving privacy, data, and AI … 47 similar entities Type: Startup Activities: privacytech legaltech regtech Technologies: Cybersecurity | 33 | 21 |
![]() | ![]() For a strategic and effective alignment of your systems and your information : Cybersecurity, GPDR, Safety, Audit, Risks Cybersécurité, sérénité et lucidité pour les dirigeants, pour un alignement stratégique et effectif de vos systèmes et de votre information - Task force experte (RSSI, DPO, Risk Manager, Project Manager, Formateur Expert) - Solutions logicielles sur-mesure en management et gouvernance - Domaines : Audit, Cybersécurité, Test d'intrusion, Gestion des cyber-risques , Confidentialité RDPR, Certification ISO 27001, eBios RM, Maîtrise consolidée des projets, Sûreté et sécurité, Intelligence économique crm@effectiveyellow.com www.effectiveyellow.com Cybersecurity, serenity and lucidity for managers, for a strategic and effective alignment of … 131 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 7 | 7 |
![]() | ![]() Simplify password management and put digital security within everyone's reach, including the most cyber-fragile. Authentication, SSO, Privacy, Privacy, Connection, Cyber Security, Payment, Web Trust, Passwords, and Sovereign 146 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 3 | 2 |
![]() | ![]() Cybersecurity is not a choice Securas offers cybersecurity solutions and services and Cyber Threat Intelligence which allowing both to detect and prevent cyber attacks and threats. Our goal is to make prevention against cybersecurity threats accessible to all! Cybersecurity, CTI, Pensest, Application intrusion test, external intrusion test, social engineering, infrastructure and network, Mobile applications or desktop, and PENTEST of web platforms 313 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 14 |
![]() | ![]() Highlight cyber threats before they darken your business European leader in intrusion detection and advanced threat detection, Gatewatcher has been protecting the critical networks of large companies as well as public institutions since 2015. Its model combines multiple technologies with A.I. to provide consistent, optimal protection and meet the current and future cybersecurity challenges of organizations. cybersecurity, sécurité informatique, cyberdéfense, cyberdefense, cyberattacks, IT, advanced persistent threats, networks security, exploits, malware, intrusion detection system, threat protection, IDS, APT, Trackwatch technology, NDR, CTI, Threat hunting, and Threat forensics 422 similar entities Tags: FrenchTech2030 Type: Startup Activities: it services Technologies: Cybersecurity | 62 | 128 |
![]() | ![]() Your cybersecurity partner! Specializing in cybersecurity, Unumkey has been labeled France Cybersecurity since 2019. Our service offer aims to support private and public organizations in their securing of their informational heritage. Aware that this approach requires a global vision, we have a multidisciplinary team capable of approaching all the problems of cybersecurity: governance, legal, infrastructure and development. Cybersecurity, Cloud, Infrastructure, Networks, Intrusing, RGPD, Inforensic, Governance, Training/Awareness, Continuous Integration, Pentest, WiFi, IoT, SSI Governance, ISO 27001, SSI, NIS2, and secure development Type: Startup Activities: it services privacytech Technologies: IoT Cybersecurity | 10 | 5 |
![]() | ![]() EGERIE is a collaborative platform that maps and financially quantifies cyber risks. EGERIE platform orchestrates & industrializes cyber programs, spreading a culture of cyber performance, enabling scaling through continuous improvement, achieving high control, compliance, risk anticipation, protection & confidence. Cybersecurity, Cyber Risk Management , GDPR, ISO 27001, ISO 27005, ISO 21434, FAIR, NIST, Smart technology for Cybersecurity monitoring, Cyber Risk Quantification, Third-Party Cyber Risk Management, Cyber Compliance Management, NIS2, DORA, TISAX, and Security by design 91 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 60 | 118 |
![]() | ![]() Protect your data in any environment while respecting legal constraints Fruit of 5 years of work of our Lab of IT security research, the protection of the fact that we offer represents a new approach to digital security: instead of securing its transmission or storage, Difenso directly protects the data by encrypting it from its design and takes care of "the right to be forgotten". We thus meet European data confidentiality requirements (GDPR). Our innovative technology, certified by ANSSI, guarantees companies control and exclusive property of their data encryption, applicable to a multitude of cloud infrastructure and application platforms. Its … 88 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 0 | 8 |
![]() | ![]() Born SAFE solutions for hyper-confidential data www.SeeZam.com The solution is an electronic safe, providing you a virtual secured and inviolable storage space and guaranteeing that the sensitive information deposited is restored to you intact. The professional solution SeeZam is an innovative online service: the e-Vault. A first in its field, this service for businesses and organizations meets the growing security requirements for preserving and sharing secret content. Security, Secrecy, Financial services, and Confidentiality 73 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 2 |
![]() | ![]() Data protection, Data Governance, Responsible AI : GDPR, Data Privacy, AI Act TNP TRUST has a team of 40 consultants certified and specialized in GDPR, privacy and cybersecurity, data governance and Responsible AI consulting services. Our services : -Outsourced DPO, representative of foreign companies, audit GDPR, support of GDPR compliance program, training sessions for DPO, implementation of tools (ex. One Trust) , privacy by design -Data governance -AI Governance conseil en protection des données personnelles, audit des traitements de données personnelles, Analyse d'impact sur la protection des données (PIA), Conformité GDPR, Data Protection Officer, RGPD, GDPR, CNIL, DPO, Délégué protection … 98 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity | 0 | 4 |
![]() | ![]() Masters | Simplicity | Security Human at the heart of security Your safety, our priority. With Countact, finally manage your health security emergencies. Security and Digital 64 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 20 | 9 |
![]() | ![]() Identity Contract Solutions iDAKTO develops solutions that meet the increasing need for identification and authentication of citizens and large public and private organisations. Based on establishing an "Identity Contract" between a citizen and his government or between a user and his organisation, access to digital services is facilitated while increasing the level of security and trust. software development, digital identity, identity and access management, eidas, nfc, smartcards, openid, rgpd, digital wallet, mobile security, Identity as a Service, and idaas 63 similar entities Type: Startup Activities: it services privacytech Technologies: NFC Wireless | 25 | 52 |
![]() | ![]() Your cybersecurity partner! ☛ Governance ☛ RSSI Assistance ☛ Audits and Penses ☛ Secure architectures Specialist in the governance of information systems security and secure infrastructure architecture, Allistic supports its customers and their RSSIs in the definition of the cybersecurity strategy of their business. Cybersecurity, IT security, GDP, PSS, crisis management, awareness, secure architectures, Pentest, Audit, CC scan, SOC, Security, Security Advice, Cloud Security, Big Data security, Security Management, Risk Management, and Management of Compliance 374 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity Data Analytics | 45 | 19 |
![]() | ![]() The embedded protection for documents Empathy. Honesty. Playfulness. Craftsmanship. Solidarity — these are some of the values we live by, as a company. We work by them too: we’re building a product we believe in — we bring security and control over your company's data, wherever it's sent or stored. See https://www.seald.io cybersecurity, encryption, data security, end-to-end encryption, and data protection 105 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 19 | 8 |
![]() | ![]() Audit & amp; Digital Welcome to the universe of Probeecy, your trusted ally dedicated to the protection of personal data, computer security, internal audit, as well as internal and quality control. 142 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity | 3 | 2 |
![]() | ![]() Freckle offers privacy-compliant data & agnostic measurement for brands Freckle, powered by the people of Killi, offers privacy-compliant data and agnostic measurement for brands to build deeper relationships with their consumers. Data, Advertising, Attribution, Location, desktop, social, radio, cross device, search, tv, out of home, in-store, blockchain, measurement, privacy, and identity 59 similar entities Type: Startup Activities: privacytech it services martech Technologies: Blockchain/Cryptocurrency | 8 | 2 |
![]() | ![]() created the reference for mobile identity and digital privacy: itsme, digital ID Belgian Mobile ID is a consortium of Belgium’s leading banks (Belfius, BNP Paribas Fortis, KBC/CBC & ING) and mobile network operators (Orange, Proximus & Telenet Group) who have joined together to create the Belgian reference for mobile identity and digital privacy. Via the itsme app, Belgian Mobile ID makes it easier for anyone with a mobile phone and a bank account or eID to digitally log in, confirm transactions and even sign documents. Digital Security, Strong User Authentication, Electronic Signature, Digital Signature, Digital Identities, and Transaction Data Signing 20 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 2 | 6 |
![]() | ![]() ID Verification, Secure Biometric Authentication, Payments Fortress Identity is an intelligent biometrics platform that replaces passwords with secure multimodal and multi-factor identification, using an individual’s unique human biometrics for secure identity authentication. 51 similar entities Type: Startup Activities: regtech Technologies: Cybersecurity | 1 | 3 |
![]() | ![]() Vendor Risk Management for MarTech, Ecommerce and Media. PrivacyCloud's team combines a cross-border legal background with Privacy Engineering capabilities and a track record in Marketing Technology, eCommerce, Analytics and AI. marketing, transparency, control, privacy, advertising, digital marketing, legal compliance, data protection, online privacy, ePrivacy, privacy engineering, Privacy Enhancing Technologies, Privacy Operations, and Privacy Technology 71 similar entities Type: Startup Activities: privacytech it services martech Technologies: Data Analytics | 7 | 5 |
![]() | ![]() The solutions to grow digital ESMS and SMEs Widip has developed since 2005 expertise in the secure accommodation of servers - ISO 27001 and HDS certification (health data accommodation) - and digital processing projects. Our offer is based on three main axes: - Security, backup and integrity of data with a dedicated audit and expertise offer - The availability of data carried by our Cloud, Network and Over -site solutions (12 employees with our customers) - user satisfaction with a team of 15 people in the service and user support center (remote supervision, hot-line and telemainne) at the service of … 194 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 12 | 30 |
![]() | ![]() Master your cybersecurity Net Freed is a cybersecurity consulting and expertise firm that has supported companies of all sizes since 2017. We are convinced that cybersecurity is based on the association of advanced technologies, proven processes, and staff aware of the risks. To counter the lack of visibility in the face of these threats, we offer a suitable and proportionate approach, to give you the keys to your cybersecurity solution, with an enlightened vision of your digital environment. Blockchain, information systems security and networks, digital transformation, cybersecurity, networks, RSSI, SOC, IAM, and Audit 270 similar entities Type: SMB Activities: it services Technologies: Blockchain/Cryptocurrency Cybersecurity | 5 | 4 |
![]() | ![]() Cutting Edge Biometric Solutions Iriscan is a biometric security system that works with iris — the most secure biometric modality. Biometrics is used for access control and identity verification. It is safe and reliable when adequately protected. Our advantage is taking care of required security infrastructure and data protection out of the box, so organizations can concentrate on their goals instead. The system is flexible, and we provide on-demand integrations and customizations. biometric, security, identification, and authorization 71 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 4 |
![]() | ![]() Your Security Guide for the Digital Age. We're hiring! Perseus provides a comprehensive but simple Security-as-a-Service solution to SMEs for their cyber security and GDPR compliance. It includes assessment, continuous risk management, human and AI-based prevention, incident management and insurance. Its system, starting with an AI-based security scoring model that continuously calculates and updates risk scores, automatically suggests measures to prevent breaches and adjusts risk scores based on the security technology used. Impressum: Perseus Technologies GmbH CEO: Gerrit Knichwitz Commercial register number: HRB 180356 B, Amtsgericht Charlottenburg E-Mail: info@perseus.de Open job positions: https://www.perseus.de/en/company/career/ 29 similar entities Type: Startup Activities: it services insurtech privacytech Technologies: Cybersecurity | 7 | 31 |
![]() | ![]() digital.security is now an Eviden business Founded in 2015 by a group of IT security experts with the support of the Econocom Group, digital.security (~ 230 experts) aims to offer companies and government organisations advanced audit and consulting services and a CERTTM dedicated to the IoT ecosystem. Our experts have strong expertise in providing Integration & Projects (SSO, IAM, IAG, PKI, privilege management, Logs collection, analysis and management Data compliance solutions), and also in Operational Security (outsourcing, security services center operations, SOC & SIEM management). Audit, IoT, IAM, SSO, Security, Pentesting, BugBounty, DLP, Consulting, CERT, CSIRT, RedTeam, SOC, SIEM, DFIR, … 342 similar entities Type: SMB Activities: it services Technologies: IoT Cybersecurity | 0 | 68 |
![]() | ![]() Sensitive Data Requires Premium Protection OneVisage is a Swiss cyber-security company registered in 2016 by 3D computer vision experts, software veterans and executive managers. We aim to become a leading ethical, transversal Strong Authentication solution provider to help large OEM integrators and IAM providers eliminate digital identity theft. Strong Customer Authentication, 3D Facial Biometry, 2-FA, Multi-Factor Authentication, GDPR, CCPA, CNIL, Data Privacy, Data Protection, and ZERO Trust 86 similar entities Type: Startup Activities: it services privacytech Technologies: A.I. A.I. - Image Processing Cybersecurity | 20 | 7 |
![]() | ![]() Privacy protection for the data-driven enterprise HIPAA, GDPR and Data Residency requirements restrict your ability to conduct data science. CryptoNumerics removes these restrictions. CryptoNumerics enables you to create privacy protected datasets with quantifiable privacy risk. In addition, you can build statistical and machine learning models that protect people’s privacy. Our team consists of engineers and visionaries with previous experience in C-Level roles at Fortune 500 companies, founding teams of venture backed growth stage start-ups, and accomplished R&D leaders. Differential Privacy, Machine Learning, Artificial Intelligence, Cryptography, Data Privacy, and Collaborative Machine Learning 21 similar entities Type: Startup Activities: privacytech Technologies: A.I. A.I. - Machine Learning Cybersecurity | 2 | 1 |
![]() | ![]() CISO & IT-Governance Helping you guarding your valuable digital information today and for the future. • CISO • CISO-as-a-service • IT-Governance • ISO-27001 • NIST • GRC: Governance, Risk and Compliance iGuards offers a full service in gaining & keeping the trust in your Digital world. Are you in need of a CISO or further protection of your valuable digital information? Our professionals supervise complex security and privacy assignments from diagnosis to implementation. Let us be the guardians of your digital trust ! iGuards – Keeping your data safe. Information Security, Governance, CISO, CISO-as-a-service, Security Audit, NIST, ISO 27001, and … 61 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity | 0 | 2 |
![]() | ![]() Silent Circle is a recognized innovator in enterprise privacy delivered through a revolutionary platform of devices, software and services. Our mission is to be the world’s most trusted secure communications company by delivering privacy without compromise. We enable enterprises to regain privacy with their employees, partners and customers in a mobile first world where privacy is nearly extinct. Silent Circle was co-founded by Mike Janke, security expert and former Navy SEAL; Phil Zimmermann, co-founder of PGP, developer of the ZRTP protocol and 2015 inductee into the Internet Hall of Fame; and Jon Callas, creator of Apple's whole disk encryption software … 27 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 11 | 24 |
![]() | ![]() Cybersec Netherlands | 10 - 11 September 2025 | Jaarbeurs, Utrecht Cybersec Netherlands | 6 - 7 November, 2024 | Jaarbeurs, Utrecht Cybersecurity, Infosecurity, Privacy, GDPR, IoT, Artificial Intelligence, Blockchain, Cloud Computing, Data Management, Digital Transformation, DevOps, Security Awareness, Risk Management, Infrastructure, cyber, data, and cloud 108 similar entities Type: Startup Activities: it services privacytech Technologies: A.I. A.I. - Machine Learning Blockchain/Cryptocurrency Cybersecurity IoT | 16 | 1 |
![]() | ![]() The world's first non-profit computer security consultancy company. We believe in transparency and openness. Radically Open Security is the world's first not-for-profit computer security consultancy company! This is an initiative designed to run an ethical computer security consultancy company as a durable front-end for a back-end charitable Foundation (that financially supports Open Source projects, innovative security research, and Digital Rights organizations). 90% of our non-reinvested profits will go to the NLnet Foundation! :-) Radically Open Security was recognized by the Dutch Chamber of Commerce (KvK) as one of the Top 100 Most Innovative SMEs of 2016! For more information, see: … 58 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 3 | 16 |
![]() | ![]() Cybersecurity - Qualified Passi - Security of information systems: Auditer | Protect | Monitor | React A French company founded by a team specializing in the field of networks and the security of information systems, Algosecure aims to support you in the implementation of security and network architecture. We provide advisory and implementation services in safety, network, integration and outsourcing of security systems. Our desire is to establish a trusted partnership with you. Our goal is to guarantee you an adequacy between the proposed architectures and your needs. IT security, Intrusion test, CERT, SOC, cybersecurity, cybersecurity, Pentest, Forensic, Security Audit, … 357 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 16 | 51 |
![]() | ![]() Log in securely, share your ID data or to sign documents by using your smartphone A trustworthy identity solution, built on security, that uniquely combines four different services. digital identity, digital security, digital privacy, mobile identity, strong customer authentication, qualified electronic signature, and eSignature 121 similar entities Type: Startup Activities: it services privacytech Technologies: Data Analytics | 24 | 88 |
![]() | ![]() Myra technology monitors, analyzes, and filters malicious internet traffic before virtual attacks can do any real harm. The German technology manufacturer Myra offers a secure, certified Security-as-a-Service platform for protecting digital business processes. Our highly certified Security-as-a-Service platform protects your digital business processes against a wide range of risks such as DDoS attacks, bot networks and attacks on databases. We are specialized in protecting critical infrastructure, especially in the finance, insurance, healthcare and public sectors. The Myra technology is certified by the German Federal Office for Information Security (BSI) according to the ISO 27001 certification based on IT-Grundschutz (Basic IT … 65 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 5 | 83 |
![]() | ![]() Help, protection and help of people Iris Assistance markets prevention solutions, security, against isolation, and telemedicine for fragile dependent people at home or in establishments. personal service, home care, remote assistance, and protection of people 61 similar entities Type: SMB Activities: martech silvertech Technologies: Cybersecurity | 0 | 4 |
![]() | ![]() Safetica protects companies all over the world against data leaks and internal threats. We believe data protection should make running your business easier, not harder. Thanks to our expertise, our solution is simple and effective. Enterprise Internal IT Security, Employee Failure Protection, Endpoint DLP, Employee Productivity Monitoring, Data Security, Insider Threat Management, and Cloud Security 135 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 0 | 107 |
![]() | ![]() Empower People. Reduce Cyber Risk. The best software for MSSPs & MSPs to deliver anti-fraud, anti-phishing, e-mail analysis and security awareness training that motivates behavior change. Cybersecurity, Cybersecurity Strategy, Cyber Threat Intelligence and Analysis, and Cyber Risk Management and Remediation 446 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 18 | 47 |
![]() | ![]() Cyber Security, Red Team Attack Simulation & Penetration Testing | "To defeat your enemy, become your enemy" – Sun Tzu We are a cyber and Information security services provider. Founded by university academics and consultants we develop and provide system penetration, network intrusion, incident response, user awareness, and information governance solutions, strategies, and services. Our employees are a combination of Ph.D. qualified researchers, Crest Registered Testers, and BSI 27001 lead auditors. Through our combined and academic research, we have a thorough understanding of the problem domain, ideally placing us to use applied research to mitigate the real-world risks of cybercrime. … 199 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 0 | 13 |
![]() | ![]() Innovating for the new era of digital sovereignty Valarian delivers advanced data sovereignty infrastructure engineered to empower commercial enterprises and government institutions with full data ownership. Our solution is built to give customers complete control over their data, leveraging strategic localisation, granular access controls, and thorough auditability. Amid rising geopolitical and cyber threats, Valarian fortifies critical operations, enhancing resilience, securing privileged communications, and protecting IP and trade secrets. In this way, we enable corporate and government entities to innovate and compete globally with unwavering confidence. security, dual-use technology, and infrastructure 69 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 7 | 24 |
![]() | ![]() Your security & network layer Spotit is the trusted advisor for its customers and collaborates with them on innovative security & networking architectures that bring a big strategic advantage and insight. Spotit starts a journey with each customer and builds a long-term relationship based on vision, highly specialized knowledge, commitment and trust. Networking, Security, Audit, Pen testing, Data Classification, Security Awareness, Threat Intelligence, Converged Networking, Ethical Hacking, Social Engineering, Industrial SCADA networking, Identity Control, SIEM, Mobile device management, GDPR, and Data Protection 61 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 2 | 96 |
![]() | ![]() All-in-one compliance solution for GDPR, ISO27001, SOC2, NIS2, TISAX®, ISO27701, AI Act or ISO42001 Kertos is the modern backbone of every company’s privacy and compliance operations. We support in Data & Process Discovery, Data Subject Requests (e.g. customer data deletion), Access & Asset Management, Compliance Documentation and various Certification Frameworks such as ISO27001, SOC2, TISAX® and similar. Our intuitive no-code SaaS solution connects to the entire IT infrastructure, identifies compliance relevant assets and processes, related data and automates compliance workflows to get an organization certification ready within weeks. Data Privacy, Process Automation, Security, Compliance, GDPR, ISO27001, NIS2, and AI Act 66 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 5 | 58 |
![]() | ![]() We didn’t reinvent cybersecurity, we just made it simpler and smarter. Our unified platform simplifies security management by combining device protection, reputation monitoring, domain security, and more. Designed with ease of use and affordability in mind, we empower users to stay protected without breaking the bank. AI, Cybersecurity, and Social Media 299 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I. | 0 | 2 |
![]() | ![]() We provide mobile, multi-factor authentication-as-a-service to a wide range of industries that depend on strong customer authentication: banks, payment networks, credit card companies, eID providers, IoT companies and mobile carriers. Our user-friendly solution is built on a modern, patent-pending architecture originating from Nordic bank security. COVR is available as a native mobile app ready for a quick roll-out, and as a powerful SDK for trouble-free, white-label integration into existing mobile applications. Multi Factor Authentication, gdpr, psd2, user centric authentication, mobile first, cyber security, regulatory compliant, secure log-in, and password free 34 similar entities Type: Startup Activities: fintech it services privacytech Technologies: Cybersecurity IoT | 4 | 17 |
![]() | ![]() Your Voice, the One and Only The first Dynamic Enhanced Secure Customer Authentication platform, Peer-To-Peer, that allows to transform your voice in your identity, your payment system, your digital sign. Authentication, Biometrics, Digital Identity, Security, Privacy, Blockchain, Artificial Intelligence, Natural Language Processing, Natural Language Understanding, Machine Learning, Usability, Passwordless, and Cybersecurity 113 similar entities Type: Startup Activities: it services privacytech Technologies: A.I. Blockchain/Cryptocurrency Cybersecurity A.I. - Natural Language Processing A.I. - Machine Learning | 8 | 5 |
![]() | ![]() Smartphone Security. Simplified. Our mission is to protect consumers' digital identity and put people back in control by limiting the financial and reputational impact of having their smartphones stolen. The perfect defence is an illusion, so when things go wrong, Nuke From Orbit is ready to lock down digital identities quickly, efficiently, and with a minimum of fuss. The service cancels debit/credit cards, blocks phone SIMs, and secures email, social media and other accounts instantaneously and all at once. 16 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 6 | 5 |
![]() | ![]() The Standard of Trust for Physical Objects. Protect anything with Vision AI. We provide access to the most advanced Vision AI Standard for protecting people and products in the digital world. trust, security, protection, traceability, verification, identification, authentication, Vision AI, machine learning, computer vision, and neural networks 55 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 16 | 24 |
![]() | ![]() Delivering actionable market and competitive intelligence for go-to-market in fraud, identity, and cybersecurity. Liminal is a technology company that empowers businesses with actionable market and competitive intelligence. Our AI-enabled Link platform delivers personalized, real-time intelligence in our native apps or directly in client workflows, enabling executives to make informed decisions, enhance productivity, and drive growth. We tackle critical focus areas with targeted solutions for fraud and identity, cybersecurity, trust and safety, financial crimes compliance, and privacy and consent management. Identity, Privacy, Security, FinTech, Authentication, Cyber Crime, IAM, Access Management, Digital Identity, Cybersecurity, Risk Management, Strategy, Market Analysis, market intelligence, saas … 61 similar entities Type: Startup Activities: privacytech constructiontech fintech media Technologies: Cybersecurity | 50 | 68 |
![]() | ![]() Defining a privacy respectful business model for digital engagement in places Krowdthink develops the Krowd - the first Personal Network, connecting people in places (without tracking or knowing location), answering two questions; Who's here and what's happening? We layer in services for venue owners to offer their visitors safety through direct connection to security, or to report cleanliness or maintenance worries by linking directly to operations and facilities management. Mobile Apps, Privacy, Social networking, eventtech, GDPR, facilities Management, Crowd Safety, Security, and CyberSecurity 56 similar entities Type: Startup Activities: privacytech Technologies: Cybersecurity | 23 | 0 |
![]() | Gudens Cybersecurity Guden Cybersecurity is currently operating in a private development phase. Security Architecture, Data Loss Prevention, Penetration Testing, Incident Response, Identity Management, Access Management, Secure DevOps, Cloud Security, Network Security, Data Security, Endpoint Security, Vulnerability Management, Secure DevOps, and Digital Forensic 446 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 142 |
![]() | ![]() Simplify & automate your organization's privacy management to minimize risk and maintain privacy regulation compliance. Data privacy regulations are changing daily with new laws being introduced across the globe. Keeping up with these changes and remaining compliant is necessary for any organization who wants to avoid fines and loss of consumer trust. Using the TrustArc Privacy Management Platform, privacy leaders can simplify and automate their privacy program. This single platform experience is delivered through its unique combination of privacy frameworks, insights, intelligence, knowledge and operations. Only TrustArc can deliver the depth of continuous privacy intelligence, coupled with a fully-automated platform … 30 similar entities Type: SMB Activities: privacytech Technologies: Cybersecurity | 0 | 379 |
![]() | ![]() Accelerating global trust with award-winning KYC & AML solutions Shufti is an AI-powered digital identity verification solutions provider offering KYC, KYB, and AML services in 200+ countries and territories. It aims to create a secure and safe online marketplace devoid of identity theft and other fraudulent activities. KYC, AML, Address Verification, Face Verification, Customer Due Diligence, ID Verification, Age Verification, KYC Verification, Identity Verification, Credit Card Fraud Prevention, Identity theft protection, Biometric Verification, 2 Factor Authentication, ArtificialIntelligence, Machine Learning Algorithims, GDPR, User Verification, B2B, KYB, Fraud Prevention, Compliance, Security, Technology, and Software 76 similar entities Type: Startup Activities: it services regtech privacytech Technologies: A.I. Cybersecurity A.I. - Machine Learning | 3 | 119 |
![]() | ![]() Next-generation security & identity management Anomalix is a cybersecurity company specializing in Identity and Access Management (IAM). Anomalix provides identity-driven zero-trust security solutions that safeguard consumers, businesses, and governments. Identity Management, Security Analytics, Information Security, IAG, Cloud Security, Third Party Risk Management, Audit & Compliance, Business Agility, Identity Analytics, nonhuman identity, machine identity, and Identity Security 70 similar entities Type: Startup Activities: it services regtech Technologies: Cybersecurity | 1 | 12 |
![]() | ![]() Ponemon Institute conducts independent research on data protection and emerging information technologies. Our goal is to enable organizations in both the private and public sectors to have a clearer understanding of the trends in practices, perceptions and potential threats that will affect the collection, management and safeguarding of information assets. Ponemon Institute research informs organizations on how to improve upon their data protection initiatives and enhance their brand and reputation as a trusted enterprise. Ponemon Institute’s research services are engaged by global organizations in various sectors including information technologies, financial services, pharmaceuticals, telecommunications, services, hospitality and governmental sectors, among others. … 43 similar entities Type: SMB Activities: privacytech Technologies: Cybersecurity | 9 | 33 |
![]() | ![]() AI-powered identity solutions intersecting biometrics, privacy & cybersecurity (Nasdaq: IDAI, Euronext Growth: AIID ID) Trust Stamp is a global provider of AI-powered identity services for use in multiple sectors including banking and finance, regulatory compliance, government, real estate, communications, and humanitarian services. Our technology empowers organisations with biometric identity solutions that reduce fraud, protect personal data privacy, increase operational efficiency and reach a broader base of users worldwide through unique data transformation and comparison capabilities. Identity Verification, Cybersecurity, Facial Biometrics, Artificial Intelligence, Cryptography, and Fintech 90 similar entities Type: Startup Activities: fintech regtech privacytech Technologies: A.I. Cybersecurity | 28 | 68 |
![]() | ![]() The first marketplace powered by hackers. Working as ethical hackers and security researchers over the past decade we learned that online security became a Wild West for companies. Trying to get control of risk levels by assigning security teams, hiring security companies at scheduled intervals and licensing multiple expensive solutions, but eventually, ending up with a security flow that is not insightful and with reports scattered all over the place. Online security isn’t just about implementing smart technology, it is also about including the right people, gathering insider intelligence and the ability to align all these processes towards one goal. … 127 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 3 | 36 |
![]() | ![]() DPO Expert is made up of a multidisciplinary, recognized team, perfectly knowing the world of business and SMEs. They are experts in fields as varied as IT security, e-health, the professions of law and figure, personal services ... IT and freedoms, compliance, protection of personal data, IT security audit, European regulations, privacy, DPO Avocats, Put DPO of the FSP, and DPO EXPERT 61 similar entities Type: SMB Activities: privacytech Technologies: Cybersecurity | 4 | 2 |
![]() | ![]() DATA PROTECTION AND DATA SECURITY FOR DIGITAL PRODUCTS AND COMPANIES - independent consultancy & approved privacy seals ePrivacy advises and supports companies in the digital economy with all aspects and challenges of data protection and data security. As an independent service provider, ePrivacy certifies companies and products with the privacy seal "ePrivacyseal". Furthermore, the experts from ePrivacy are accredited by the ULD (Landesdatenschutzzentrum Kiel), members of the working group Mobile Security of the "IT-Gipfel" and certifiers of the OBA Framework, voluntary self-regulation guidelines for online advertising to protect Internet users. Prof. Dr. Christoph Bauer works together with a team of … 35 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 0 | 17 |
![]() | ![]() Advancing digital security and preserving privacy as a fundamental human right. Least Authority is committed to building and supporting the development of usable technology solutions and ethical business practices to advance digital security and preserve privacy as a fundamental human right. We focus our work in three main areas: Security Consulting, Product Development, and Community-Contribution Projects. We pursue these areas knowing they are complementary and offer various ways for us to contribute to our mission: we enable more people to use secure and privacy-respecting technology. We uphold our mission by: -Conducting security audits and providing consulting services for software development … 66 similar entities Type: Startup Activities: it services Technologies: Blockchain/Cryptocurrency Cybersecurity | 5 | 17 |
![]() | ![]() Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges with solutions that protect critical data and applications without workflow disruption. Its platform of interoperable identity, authentication, and access management solutions enables organizations in over 45 countries to fully manage and secure all enterprise and third-party digital identities by establishing trust between people, technology, and information. software, technology, security, single sign-on, strong authentication management, healthcare, clinical workflows, virtualization, secure text messaging, patient identification, identity management, multifactor authentication, cybersecurity, and healthcare IT 99 similar entities Type: SMB Activities: healthtech regtech Technologies: Cybersecurity | 18 | 1,199 |
![]() | ![]() Zero Trust Data Security and Privacy Fasoo provides zero trust data security and AI-powered enterprise content platforms that enable organizations to discover, classify, protect, control, trace, and analyze critical information assets while enhancing productivity. Since 2000, Fasoo has helped customers create a secure information-sharing environment and simplified secure collaboration internally and externally. Its advanced EDRM (Enterprise Digital Rights Management) and DSPM (Data Security Posture Management) solutions secure millions of users across more than 2,000 organizations worldwide, serving leading firms in various industries, including business services, energy, financial, healthcare, insurance, manufacturing, legal, retail and public sectors. Fasoo addresses today’s security challenges, … 96 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 4 | 118 |
![]() | ![]() Realize SASE with the only cloud-first security platform that actually improves the remote working experience. Absolute Security fully acquired NetMotion in July 2021. Please follow us on our Absolute Security Page: https://www.linkedin.com/company/absolute-cyberresilience Mobile VPN Software, Remote Device Management, Cellular Network Performance Management Software, Mobile Data Deployments, Business Intelligence Tools & Reporting, Mobile Analytics, Experience Monitoring, Software-defined perimeter, Zero Trust Network Access, SASE, Cloud, and Enterprise VPN Software 50 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 25 | 111 |
![]() | ![]() Australia's cybersecurity experts Australia's phishing and cybersecurity experts. We offer a comprehensive range of cybersecurity services that protect your business from cyber criminals and digital threats. Cloud Security, Application Security, Infrastructure Security, PCI DSS, Phishing, and Email Security 542 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 3 |
![]() | ![]() Idenprotect. Security Simplified. Productivity Elevated Idenprotect is a leading cybersecurity company specialising in a range of phishing-resistant and passwordless authentication and secure browsing solutions. We help organisations of all sizes eliminate password risks, streamline operations, and foster a productive, secure digital environment. Authentication, Innovation, Information Security, Security, Mobility, Assurance, Cryptography, Multi-Factor Authentication, Digital Signing, TEE, TPM & SE, Identity Driven Browsing, Secure Browser, and Enterprise Browser 136 similar entities Type: Startup Activities: it services regtech Technologies: Cybersecurity | 2 | 23 |
![]() | ![]() Best in Class Solutions for National Security, Identity, and Intelligence National Security Solutions is the FOCI (Foreign Ownership, Control, and Influence)-mitigated subsidiary of IDEMIA Global that delivers identity credentials, biometric, and video analytic solutions to the Federal and Intelligence Communities to include U.S. Departments of Defense, Homeland Security, Justice, and State and prominent intelligence agencies. We enable some of the United States’ most sensitive programs. We are recognized experts in identity management, secure credentials, biometrics, video analytics, and access control solutions. Biometrics, Identity Management, Law Enforcement, Video Analytics, Fingerprint Algorithms, Credentialing, AFIS, Facial Recognition, Artificial Intelligence, ID Documents, Digital ID, … 133 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 4 | 163 |
![]() | ![]() The fast and efficient way to get and stay compliant with ISO 27001, SOC 2, TISAX, NIS 2 and more. Compliance made easy and fast. We are on a mission to automate up to 90% of security compliance for small and medium-sized businesses. We help SMEs to build their own ISMS and automate security standards such as ISO 27001, TISAX, GDPR, SOC2, ISO 27701, ISO 27017, ISO 27018 and more. ISO 27001, TISAX, GDPR, ISMS, Information Security, SOC2, DiGA, HIPAA, Compliance, NIS2, ISO 27701, DORA, Startups, SMBs, DACH, and Europe 57 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 6 | 27 |
![]() | ![]() EMPOWERING TRUST Our technology solutions empower Government Agencies and Businesses to achieve ‘trust in transactions’ in both the physical and digital worlds. Identity Solutions, Multi-Modal Biometrics, Document Verification, Identity Verification, Mobile Network Solutions, IoT Network Solutions, 5G, LTE, 3G, NB-IoT, LTE-M, Private Networking, Biometric Jumpkits, Biometric Handhelds, Biometric Kiosks, Defense, Intelligence, Law Enforcement, Security, and Border Control 297 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 0 | 3 |
![]() | Fox-IT For a more secure society Fox-IT prevents, solves and mitigates the most serious cyber threats with innovative solutions for government, defense, law enforcement, critical infrastructure, banking, and commercial enterprise clients worldwide. Our approach combines human intelligence and technology into innovative solutions that ensure a more secure society. We develop custom and packaged solutions that maintain the security of sensitive government systems, protect industrial control networks, defend online banking systems, and secure highly confidential data and networks. Intelligence, Cyber security, Forensic investigation, Threat monitoring, Managed services, Red teaming, Pentesting, Education, Fraud detection, Detection, Incident Response, Security Operations Center, and Crypto technlogy 149 similar entities Type: SMB Activities: it services edtech Technologies: Cybersecurity | 11 | 362 |
![]() | ![]() Fuelling security leaders with the expertise and innovation to keep people and assets safe #AnticipateLDN Fuelling security leaders with the expertise and innovation to keep people and assets safe #AnticipateLDN Security, Integrated Security, Access Control, Video Surveillance, Intelligent Buildings, Intruder Alarms, Perimeter Protection, Fire Safety, Cyber Security, Home Automation, and Safety 75 similar entities Type: SMB Activities: constructiontech smart home Technologies: Cybersecurity | 7 | 6 |
![]() | ![]() EyeLock is a leading technology provider of iris-based identity authentication products and technology solutions. Transforming the way identities are authenticated and protected, the Company offers a broad suite of breakthrough solutions for the identity management, access control, border control and logical access sectors. The proprietary, iris-based identity authentication solutions are cost-effective, scalable and easy-to-use iris recognition systems that operate while a person is in motion and at a distance. EyeLock delivers products and solutions where privacy, convenience and security are synonymous. Iris Biometrics, Security System, Iris Scanners, Identity, Authentication, and Access Control 13 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 15 | 16 |