Logo | Name | Σ | Employees |
---|---|---|---|
![]() | ![]() Securing your digital transformation Evides Digital Security NL (formerly Motiv) is the cyber security specialist who provides organizations in the public and private sector with IT security solutions and services, to prevent cyber crime, data theft and data breaches. Our experienced security professionals understand the business issues that companies stand for and the place of security within the IT landscape. They identify careful security risks and offer, by combining high -quality knowledge, smart ideas and technological possibilities, innovative solutions that ensure optimally secure business processes and applications. Evides Digital Security NL is a Managed Security Services Provider and offers a … 66 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 2 | 66 |
![]() | ![]() Application Security Made Simple Yagaan is a suite of complementary, modular application security tools designed to help every organization adopt a security strategy in line with its challenges. From code analysis to real-time protection, security is integrated at every stage in the life of your applications. SAST, Sécurité applicative, Cybersécurité, RGPD, Data privacy, DevSecOps, Maîtrise des risques, OWASP, audit de code, CI/CD, SAAS, On Premise, Secure coding, Code Mining, AST, MAST, RASP, and Application Shielding 66 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 6 | 1 |
![]() | ![]() Linux & Windows security automation platform. Create and manage your own security model. Rudder centralizes the security operational management of hybrid and cloud-based IT systems throughout their lifecycle. Rudder is designed with flexibility at its core, allowing you to create a security model that perfectly aligns with your organization’s specific needs. We provide all the tools needed to improve and ensure the security posture of your IT infrastructure by covering the most critical aspects: - security configuration management for automating and enforcing security configuration settings across all your systems. - patch and vulnerability management for identifying and remediating vulnerabilities while … Type: Startup Activities: it services regtech Technologies: Cybersecurity | 20 | 19 |
![]() | ![]() Integrator of development engineering and information security solutions ABLOGIX, created in March 2007, benefits from certified experts in 2 complementary areas of expertise: 1- System and Software Development Engineering 2- Information System Security ABLOGIX accompanies its customers from the analysis of the need, the supply, the installation of the solutions, as well as the training. 1. We provide organizations with integrated System and Software Development solutions in SaaS or On-Premise: - Requirements Management - Configuration and Change Management, - of Compilation and Testing in DevOps (IC/DC) - application security testing (DevSecOps) that meet the needs of businesses by maximizing the … 19 similar entities Type: Startup Activities: it services Technologies: Cybersecurity Sensors Wireless | 7 | 4 |
![]() | ![]() The first marketplace powered by hackers. Working as ethical hackers and security researchers over the past decade we learned that online security became a Wild West for companies. Trying to get control of risk levels by assigning security teams, hiring security companies at scheduled intervals and licensing multiple expensive solutions, but eventually, ending up with a security flow that is not insightful and with reports scattered all over the place. Online security isn’t just about implementing smart technology, it is also about including the right people, gathering insider intelligence and the ability to align all these processes towards one goal. … 127 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 3 | 32 |
![]() | ![]() The best defense is the hack. Torii Security is an expertise firm specializing in information systems safety. Our mission: protect your digital heritage! We intervene all over the chain, to guarantee a real improvement in your protection: - Evaluation: by carrying out safety audits and intrusion tests (Pentses), - Training: Technical training and risk awareness for all, - Improvement: by technical supports, advice services, integration of open source solutions with added value More information to come on www.torii-security.fr Safety of information systems, open source, audits, intrusion tests, advice, management, advice, cybersecurity, computer security, and cyber awareness 156 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 4 |
![]() | ![]() Security-first Compliance At Bastion, we're changing the way modern companies secure their software. We enable fast-moving tech teams to build secure, compliant applications from day one—without sacrificing speed. By combining automated compliance, built-in security tooling, and expert guidance, Bastion delivers an all-in-one solution tailored for startups and scale-ups. Designed by security engineers for today’s engineering teams, Bastion is trusted by some of the fastest-growing companies to stay secure and audit-ready—without slowing down. Build fast. Stay secure. Security, Cybersecurity, Technology, and SaaS 122 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 8 | 17 |
![]() | ![]() Security Solutions for your DevOps Process Our mission is to offer the most comprehensive solutions for application security. We shield assets, blocking attacks on vulnerabilities with a plethora of features that empower both executives and developers with state-of-the-art security through our end-to-end platform. Our clients welcome the transparency and complete scope Kiuwan grants them in terms of solving the risks and threats that affect their application portfolio. We support multiple application technologies, covering over 30 programming languages. Our platform proves to be of key importance when companies industrialize the Software Development Life Cycle, when they want to secure their applications … 63 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 27 |
![]() | ![]() Build data security into your software or business operations, by default and by design Absio moves data security to the top of the stack with application-level data security solutions and consulting services. Our roots lie in battlefield information-sharing. We apply our military-grade security expertise helping businesses protect data at a time when users carry a wealth of private information in their pockets. PRODUCTS With our simple APIs, coders build privacy and security functionality directly into their software, by default and by design. Protections can be applied to any data created or processed by the application and follow the data anywhere … 76 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity IoT | 0 | 3 |
![]() | Moix Security Security is consulting firm specialising in application and software security. We help organisations design, build, and maintain secure software. software security, penetration testing, and vulnerability assessment 485 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 1 |
![]() | ![]() Probely (a Snyk Business) is the premier cloud-based application security testing solution designed to empower Security and DevOps teams to work efficiently together on a DevSecOps approach built to reduce risk across web applications and RESTful APIs. Probely empowers Security and DevOps or Development teams to work together to secure their web applications and APIs. Our goal is to narrow the gap between development, security, and operations by making security an intrinsic characteristic of web applications development life-cycle. With over 30,000 vulnerability detection capabilities, including SQLi, XSS, Log4j, OS Command Injection, and SSL/TLS issues, Probely reports vulnerabilities that matter is … 32 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 4 | 6 |
![]() | ![]() Provider of tools and services to protect your networks and critical assets. Montimage provides tools and services to protect your networks and critical assets. It offers a security and performance monitoring and management framework adapted to your needs. Services of the company: MMT network monitoring framework. Cyber Threat Intelligence services. Secure portable 4G/5G mobile network platform. Added value : We offer highly innovative solutions that have been built in-house resulting from more than 10 years of research. They integrate advanced AI techniques and multi-source Cyber Threat Intelligence that allow preventing zero-day security breaches. Our solutions have been certified for protecting … 56 similar entities Type: SMB Activities: it services Technologies: Cybersecurity A.I. | 2 | 15 |
![]() | ![]() Security is of utmost concern for embedded software used in mobile, IoT, and automotive industries. Most of such software is built using Open Source Software (OSS) components, despite the fact that significant security vulnerabilities have been discovered in them. Although newer versions of the components without the vulnerabilities are usually available, developers often neglect to use them. To make matters worse, third-party software that many companies rely on is distributed in binary format without the source code, making it extremely difficult to identify the potential security issues. Insignary Recognized by Gartner® as a Representative Vendor for Software Composition Analysis View … 15 similar entities Type: Startup Activities: it services Technologies: Cybersecurity Embedded Systems IoT | 2 | 14 |
![]() | ![]() Guardicore is the segmentation company disrupting the legacy firewall market. Our software-only approach is decoupled from the physical network, providing a faster alternative to firewalls. Built for the agile enterprise, we offer greater security and visibility in the cloud, data-center and endpoint. Cloud Security, Data Center Security, Legacy Firewall Alternative, Hybrid Cloud Security, Micro-Segmentation, Software-Defined Segmentation, Network Security, and Network Segmentation 77 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 15 | 82 |
![]() | ![]() We provide mobile and application security solutions. Improve security, enhance productivity, stay compliant. Appurity is a team of consultants who assess environments and business requirements to deliver specialised, best-in-class security solutions – endpoint to cloud. Built for the modern and dispersed workforce, Appurity’s solutions adhere to data protection and cybersecurity schemes and regulations such as Cyber Essentials and ISO. We work with businesses to develop and implement impenetrable security strategies that utilise the latest technologies and security frameworks including ZTNA, SSE, CASB, MTD, continuously validating security risks. Working with our technology partners that include Lookout, Pentera, Absolute, BlackBerry, Ivanti and … 100 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 4 | 8 |
![]() | ![]() Create Secure Software Security Innovation is a leader in software security, providing comprehensive solutions to secure software from design to deployment, across all environments, including Web, Cloud, IoT, mobile, and desktop. With a commitment to delivering precise and actionable security with zero false positives, we empower organizations to protect their products confidently and efficiently. Leveraging decades of expertise and as part of Bureau Veritas, a global leader in Testing, Inspection, and Certification, we seamlessly integrate world-class security into development processes, safeguarding the way companies build and deliver products. Visit securityinnovation.com to learn how we can help secure your software and … 159 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 202 |
![]() | ![]() Black Duck® offers the most comprehensive, powerful, and trusted portfolio of application security solutions in the industry. We have an unmatched track record of helping organizations around the world secure their software quickly, integrate security efficiently in their development environments, and safely innovate with new technologies. As the recognized leaders, experts, and innovators in software security, Black Duck has everything you need to build trust in your software. Learn more at www.blackduck.com. Build trust in your software. open source security, open source compliance, open source risk, open source scanning, On-Demand software audits, open source vulnerability, open source audits, security risk … 53 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 14 | 1,198 |
![]() | ![]() Global Leader in Cybersecurity, Privacy, GRC & Performance Analytics Hitachi Systems Trusted Cyber Management Inc. DBA Hitachi Cyber is a leading provider of advanced cybersecurity and performance analytics solutions, dedicated to safeguarding businesses against the ever-evolving threat landscape. With a strong focus on innovation and excellence, we offer a comprehensive suite of services designed to enhance cybersecurity and performance maturity, address emerging compliance requirements, and mitigate risks associated with digital transformation. For the past 25 years, Hitachi Cyber has been at the forefront of the industry, delivering 24/7 Managed Security Services, Cybersecurity, Privacy and GRC Professional Services, Cyber Threat Intelligence … 152 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity IoT | 7 | 164 |