Logo | Name | Σ | Employees |
---|---|---|---|
![]() | ![]() Build the most secure & connected facilities Trout Access Gate combines visibility, access, monitoring, and compliance in one device — so your team spends less time stitching tools and firefighting, and more time piloting your environment and showing IT’s value. networking, cybersecurity, OT, and industrial zero-trust 65 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 22 | 14 |
![]() | ![]() Modern Authentication for Your Workforce: Secure, Seamless, and Password-Free. Secret Double Octopus provides the only passwordless MFA solution for all enterprise authentication needs. From workstations & SSOs to on-premises infrastructure & legacy applications – with zero employee-managed passwords and a highly secure yet user-friendly interface. 59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 7 | 39 |
![]() | ![]() Together for a Safer Cyberspace CFLW is a tech-SME that pursues a safer cyberspace through cutting-edge intelligence services. Dark Web Monitor – Providing actionable dark web intelligence to law enforcement, governments and industry. Phishing Threat Intelligence – Delivering strategic insights and real-time monitoring to protect organizations from digital threats. Crypto-Asset Analytics – Helping agencies and investigators to trace illicit activities in blockchain transactions. AI & Emerging Tech – Leveraging collaborative and responsible analytics to stay ahead in digital asset monitoring. As a global cyber intelligence provider rooted in the Netherlands, we believe in impact through collaboration and innovation. Working closely … 404 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 10 |
![]() | ![]() Support companies and institutions in the informed and secure implementation of digital solutions. Passionate about technology and Cybersecurity, we offer high value-added services, from cyber governance to cyber managed services, including integration and training on cybersecurity technologies and solutions. IAM, PAM, Data Governance, Office 365 Security, SSO, MFA, ISO 27001, SIEM, EDR, ESET, MIM, BeyondTrust, Microsoft, SOC, Sensibilisation Cybersécurité, Scan de vulnérabilité, SOAR, Infogérance, and Infrastructure IT 647 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 6 |
![]() | ![]() Storage and security of professional data Cyber Security specialist: A complete solution to protect your business from the risk of data loss. Hybrid backup system, with local box and cloud space, your information will be protected. Qualiopi certified training organization, cybersecurity training for your employees. Satisfaction rate: 92%, 0%abandonment rate, 100%presence rate. 56 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 15 | 7 |
![]() | ![]() Cyberwatch - French cybersecurity company specialized in Vulnerability & Compliance Management Products: - Cyberwatch Vulnerability Manager - Cyberwatch Compliance Manager Services: - Penetration testing Job offers at https://cyberwatch.fr/recrutement/ Sécurité informatique, Test d'intrusion, Audit de sécurité, Software as a Service, Penetration testing, and Vulnerability Management Type: Startup Activities: it services Technologies: Cybersecurity SaaS | 22 | 37 |
![]() | ![]() Founding the New Web of Trust. 🔒 Vaultys, leader in cybersecurity, is the 1st authentication solution resistant to AIA assigned attacks. The employees, owners of their identifier, connect without password safely, simplicity and sovereignty. 🔒 cybersecurity, decentralized identity, and sovereignty 110 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 18 | 4 |
![]() | KNS Identity & amp; Access Founded in Lyon in 2002, KNS is a digital service company that works at all levels of information systems securing in France and abroad. Reference player and recognized expert, KNS provides its customers and partners with an impartial, clear and pragmatic vision of digital security issues and related solutions. 19 years of identity management - 25 specialized consultants - 120 IAM/SSO references Identities management, management of authorizations, securing and control of access, Digital identity standards, workflow, rectivities of accounts, inter-referential synchronization, MFA, SSO, identity federation, identity-vigilance, IAM, advice and audit, Integration, Development, Deployment, Maintenance, and Devaas 64 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 2 | 95 |
![]() | ![]() An ESN made up of consultants, engineers specializing in computer project management, network architecture and information systems management. Cybersecurity, IT networks, compliance, high debt, servers, firewall, wifi, IT parks management, intranet, extranet, backup, GDPR, software supports, MOA/MOE, and Multi Factors Authentication 352 similar entities Type: SMB Activities: it services privacytech Technologies: Cybersecurity | 0 | 5 |
![]() | ![]() Authentification de tous les types de données de votre entreprise Woleet is the ideal solution to protect your critical data. All of your sensitive files can be secured with electronic signature, electronic seal or time stamping. Public Blockchain, Cybersecurity, Timestamping, Notary solutions, Certification, Electronic signature, and Electronic seal Type: Startup Activities: it services Technologies: Blockchain/Cryptocurrency Cybersecurity | 24 | 1 |
![]() | ![]() Concepteur de solutions de sûreté pour les infrastructures critiques ALCEA is manufacturing Security products since 1995, - Access Control - Cctv - Alarm Intruder Detection - Key Management System - Supervision Software The company is based on three headquarters - ALCEA France in Marcoussis (Paris area) 1995 - ALCEA DRM Antilles Guyanne (French Islands) 2013 - ALCEA SECURITY SERVICES Qatar in Doha 2009 ALCEA is covering all security needs, from single to multisite, over one or several countries. our supervision software is one of the best product to manage your profesional security. Our worldwide references are counting the best brands … 59 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 4 | 157 |
![]() | ![]() Protecting people and data against cyberthreats to give you peace of mind We are prioritizing security above all else through our Secure Future Initiative (SFI). Explore SFI principles, pillars, and progress here ⬇️ Security, Information protection, Identity, Compliance, Zero Trust, Remote Work, Threat protection, Access management, Microsoft Azure, Microsoft 365, Cloud app security, Secure application development, MCAS, CASB, Cloud access, Machine learning, and Cybersecurity 73 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity A.I. A.I. - Machine Learning | 2 | N/A |
![]() | ![]() Orchestrate your Security Posture Through Endpoint Intelligence. Batuta is orchestrating the future of cybersecurity through Endpoint Intelligence. By intelligently orchestrating every endpoint, the platform eliminates complexity and fragmentation, turning noise into actionable insights. Batuta is a member of the World Economic Forum’s Global Innovators Community and the Centre for Cybersecurity, and is headquartered in San Francisco. Cybersecurity, Technology, Managed Services, Information Security, Penetration Testing, and Security as a Service 62 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 9 | 101 |
![]() | ![]() Services: conseil, intégration, services managés, support IT Solutions: Antispam, Antivirus, Authentification forte, Chiffrement, Corrélation de logs, Firewall, IPS, NAC, QOS, Supervision, Virtualisation, VPN SSL, WAFS 405 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 5 |
![]() | ![]() Security-first Compliance At Bastion, we're changing the way modern companies secure their software. We enable fast-moving tech teams to build secure, compliant applications from day one—without sacrificing speed. By combining automated compliance, built-in security tooling, and expert guidance, Bastion delivers an all-in-one solution tailored for startups and scale-ups. Designed by security engineers for today’s engineering teams, Bastion is trusted by some of the fastest-growing companies to stay secure and audit-ready—without slowing down. Build fast. Stay secure. Security, Cybersecurity, Technology, and SaaS 122 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 8 | 17 |
![]() | ![]() Security to communicate freely Ceerus is a distributed secure communications platform that provides frictionless security for every sensitive conversation with your staff and customers, regardless of where they are or what apps they use. Cybersecurity, Secure Communications, Enterprise Apps, FinTech, and API 113 similar entities Type: Startup Activities: regtech deeptech it services fintech Technologies: Cybersecurity | 22 | 4 |
![]() | ![]() Aceso Conseil supports its customers on various subjects around cyber security and data protection: - Cyber / GDP awareness - Cyber maturity audit - CYBER PROGRAMS - RSSI or DPO support - Popularization of European regulations to come and identification of the strategy to be deployed (DSA / DMA / DA / Cyber Security Act / Cyber Resilience Act ...) Cybersecurity, GDPR, and governance 415 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 1 |
![]() | ![]() Cybersecurity for and by humans. Eternilab offers advice, expertise and training in the security of networks and information systems. IT security, computer networks, and reliable and secure software development 449 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 7 |
![]() | ![]() Offensive security & Threat Intelligence GreenLock Advisory is an independant consulting firm created in 2015. We are offering several expertises on cyber-security: - Penetration testing - Architecture review - Threat intelligence/hunting - Automation of Security Operations - Vulnerability management cybersecurity, audit, security, threat intelligence, vulnerability management, and Automation 310 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 1 |
![]() | SecludIT - Ahead of Security Founded by security experts together with EURECOM, a French research institute in telecom and network security, SecludIT has developed Elastic Security, a set of products and services specifically designed to help cloud infrastructure providers and users to safely migrate to the cloud. Since its creation in 2011, SecludIT has become a recognized industry player, one of the Cloud Security Alliance founders and active member, co-author of Security Best Practices 2.1. SecludIT is a technology partner of Amazon Web Services, HP Cloud, VMware and Eucalyptus. Cloud Computing, Security, IaaS, Monitoring, Automation, Vulnerability Assessment, Audit, Amazon Web Services (AWS EC2 & VPC), … 76 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 1 |
![]() | inWebo The Simple Key to High Security - our strong authentication solution protects B2B or B2C applications from phishing Founded in 2008, inWebo is a major international player in the cybersecurity industry that offers an Identity & Access Management solution including: - inWebo adaptive & passwordless MFA that secures access to B2B and B2C applications by combining the highest level of security on the market with a seamless user experience, freeing them from equipment constraints, thanks to its SaaS mode and multiple tokens. - A CIAM orchestrator to create frictionless, personalized and secure access journeys using a graphical interface or low … 62 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 57 |
![]() | ![]() The Citadel Datacenter Be YS Security Centers, a company created in Clermont-Ferrand in 2018, specializes in the design and management of datacenters with high level of physical and logical security. It operates "La Citadelle Datacenter", set of data processing centers dedicated to the protection of vital importance (health data, contractual, personal, sensitive information ...). The company is part of the "Be YS" ecosystem which brings together expertise in management and protection of digital identities and sensitive data. IT accommodation, cybersecurity, information security, and datacenter 81 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 0 |
![]() | ![]() Semiconductors, PKI & Post-Quantum Security Solutions SEALSQ develops the next generation quantum-resistant Semiconductors, PKI and Related Trust Services Semiconductors , Cybersecurity, PKI, Post-Quantum, Digital Security, Trust Services, Smart Card, and NFC 79 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 4 | 43 |
![]() | ![]() Teleport is the easiest, most secure way to access and protect all your infrastructure. Teleport is the Infrastructure Identity Company, modernizing identity, access, and policy for infrastructure, improving engineering velocity and infrastructure resiliency against human factors and compromise. Kubernetes, Cloud Infrastructure, Access, Identity, Security, and Privileged Access Management 58 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 6 | 222 |
![]() | ![]() Protect Identities. Secure Digital Services Curity is the leading supplier of API-driven identity management, providing unified security for digital services. Curity Identity Server offers a unique combination of API security and identity and access management. it is used for logging in and securing millions of users' access to the web and mobile apps over APIs and microservices. Curity is built upon open standards and designed for development and operations. We enjoy the trust of large organizations in financial services, telecom, retail, energy and government services with operations across many countries which have chosen Curity for their enterprise-grade API security needs. … 18 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 50 |
![]() | ![]() Continuous Controls Monitoring for Enterprise Security Panaseer is an enterprise cybersecurity automation and data analytics company that helps organizations stop preventable breaches by ensuring security controls are fully deployed and working effectively — maximizing their security investments and resources. Control failures are the biggest problem in cybersecurity, with 79% of organisations admitting to being surprised by a security event that evaded existing controls. Panaseer’s Continuous Controls Monitoring platform gives a complete, trusted view of security controls, with metrics and measures guidance aligned to best practice frameworks that improve collaboration and prioritization. With $262 billion spent on cybersecurity tools in 2021, … 32 similar entities Type: Startup Activities: it services fintech Technologies: Cybersecurity Data Analytics | 20 | 118 |
![]() | ![]() Arcansecurity develops an innovative authentication solution without passwords to simplify the connection path of a user while improving the level of security. Security, Authentication, Cryptography, Software Development, and Cloud 243 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 4 | 1 |
![]() | ![]() We are specialists in protecting sensitive information More than a technological solution, we are a strategic decision for organizations. Our mission is to redefine the relationship between enterprises and cyber-security and the user experience in the process of authentication and access to technology assets. We deliver robust, multi-layered solutions, with advanced technology and focus on preventing security issues, protecting government and corporate information. We ensure secure communication between people (H2H), between machines (M2M), and between people and machines (H2M) with end-to-end encryption. We prevent: - Data breaches - Financial losses - Impact on productivity - Intrusion in IoT devices - … 129 similar entities Type: Startup Activities: it services privacytech Technologies: IoT Cybersecurity | 2 | 22 |
![]() | ![]() LOCKSIGHT is a human -sized structure specializing in the field of cybersecurity. LOCKSIGHT combine functional and technical expertise to support and provide services with high added values throughout the life cycle of the information system of its customers. LOCKSIGHT offers a 360 ° cybersecurity vision thanks to new generation technologies and a transversal structure, allowing teams to intervene on all stages of the project with an efficient and pragmatic approach. We are listening to you to best meet your cybersecurity needs. 22 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 6 |
![]() | ![]() Manual / Automatic Customer Counters real time Protecpeo, actor of your safety on Perpignan and the Pyrenees Orientales, presents its intrusion alarm solutions in Perpignan and fire alarm or smoke detectors in Perpignan, video protection and video surveillance in Perpignan, anti -theft portico, emergency alert, access control, automatisms, interphonies and multi -mock. Intrusion alarm, fire alarm, smoke detectors, video protection, anti -theft gantry, home support, access control, automation, and interphonia 63 similar entities Type: SMB Startup Activities: connected commerce retail Technologies: Cybersecurity | 8 | 4 |
![]() | ![]() We bring security to the public cloud. We offer a unique, comprehensive data protection suite powered by next-generation cryptography to secure your data in use and protect what matters most. And, what’s most important, is that you’re in control. cryptography, multi-party computation, FHE, functional encryption, secure enclave, datasecurity, dataprivacy, managed services, confidentialcomputing, cybersecurity, confidential VM, confidential GenAI, and post-quantum 94 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity Data Analytics Generative A.I. A.I. | 45 | 19 |
![]() | ![]() Smarter, Safer At Blue Security, we believe that every person deserves to feel safe in their home and workplace. With over 34 years of experience in the security industry, we specialize in protecting South African homes and businesses. Trust us to secure your future. Armed Response, Alarm Monitoring, CCTV Systems, Gate Automation, Electric Fencing, Technical Support, Security Consulting, Cell Phone Panic, Neighbourhood Watch Support, Remote Surveillance, Eye-in-the-Sky street surveillance cameras, and Fire Detection and Suppression 116 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 300 |
![]() | ![]() Finally, IT assistance without obligation! 🙋🏻♂️ Cyber security partner of large accounts since 2011, we have positioned ourselves as cyber-security, networks, cloud, infrastructure. We design digital technology as a tool at the service of humans and not the other way around. One of the keys to cyber-security progress Cybersecurity, managed services, networks, and audit cybersecurity 463 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 4 |
![]() | ![]() Cybersecurity solutions, services and training for SMEs /ETIs Chack is a service company offering computer security support solutions through, RSSI time in time shared or à la carte, safety audits, intrusions tests (Pentest), training, development of activity plans, from support and management to GDPR compliance as well as CYBER (EDR, XDR, SIEM) tools managed. 207 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 1 |
![]() | ![]() Controlled data exchange IT & Amp; Ot -& gt; Protection of material and intangible assets -& gt; Forted electronic hardware partitions, therefore no zerodays without flaws possible. Permanently and sustainably protect your critical assets and your ultimate backups from ransomware -type protocol attacks. Ot, networks, cybersecurity, appliances, and security if 96 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 8 | 5 |
![]() | ![]() Passwordless online payments We build a payment stack leveraging new authentication frameworks for secure & successful consumer experience. Payment, Authentication, Passwordless, Ecommerce, and Digital Wallet 69 similar entities Type: Startup Activities: it services fintech Technologies: Cybersecurity | 0 | 6 |
![]() | ![]() Simplify password management and put digital security within everyone's reach, including the most cyber-fragile. Authentication, SSO, Privacy, Privacy, Connection, Cyber Security, Payment, Web Trust, Passwords, and Sovereign 146 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 3 | 2 |
![]() | ![]() Cybersecurity is not a choice Securas offers cybersecurity solutions and services and Cyber Threat Intelligence which allowing both to detect and prevent cyber attacks and threats. Our goal is to make prevention against cybersecurity threats accessible to all! Cybersecurity, CTI, Pensest, Application intrusion test, external intrusion test, social engineering, infrastructure and network, Mobile applications or desktop, and PENTEST of web platforms 313 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 14 |
![]() | ![]() #SecurityRiskmanagement #Cybersecurity #EbiosRisqueManager #OligoRiskManager #DORA #NIS2 Reciproc-it is an Information Security System Consulting Firm. Our main activities are based on giving guidance to protect the data and information, by ensuring their integrity, confidentiality, availability and auditability It’s also a matter of helping our customers in managing and processing their IT projects in well framed way by using the adequate methodology Information System Security, IT Projects management, Cybersecurity, risk management, consulting, and Compliance 422 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 5 | 9 |
![]() | ![]() Helping companies of all sizes to thrive by protecting them against cyberattacks We help companies of all sizes to thrive by protecting their information system against future cyber-attacks. We offer different formats of IT security audits in order to adapt to the complexity of the system audited and the scope of the security checks needed. Contact us and make sure that your company network, website, application or IoT product is complying with all security standards! 64 similar entities Type: Startup Activities: it services Technologies: Cybersecurity IoT | 2 | 8 |
![]() | ![]() DeFi Risk Management I Web3 Security Nefture is a Web3 security platform, protecting users, protocols and asset managers from exploits and Web3 threats. Nefture offers protection through real-time threat detection and proactive prevention allowing users to transact with confidence, save time and quickly react to potential exploits to their portfolio assets. We aim to facilitate the management of digital assets by reducing the risks. Cybersecurity, Blockchain, Web3, Blockchain Security, Cryptocrime, Cybercrime, Cryptocurrency, Blockchain Forensics, blockchain security consulting, DeFi, crypto asset management, crypto risk management, decentralized finance, crypto asset manager, crypto asset security managment, DeFi Security, crypto threat monitoring, Web3 Security, … 57 similar entities Type: Startup Activities: it services Technologies: Blockchain/Cryptocurrency Cybersecurity | 6 | 10 |
![]() | ![]() Highlight cyber threats before they darken your business European leader in intrusion detection and advanced threat detection, Gatewatcher has been protecting the critical networks of large companies as well as public institutions since 2015. Its model combines multiple technologies with A.I. to provide consistent, optimal protection and meet the current and future cybersecurity challenges of organizations. cybersecurity, sécurité informatique, cyberdéfense, cyberdefense, cyberattacks, IT, advanced persistent threats, networks security, exploits, malware, intrusion detection system, threat protection, IDS, APT, Trackwatch technology, NDR, CTI, Threat hunting, and Threat forensics 422 similar entities Tags: FrenchTech2030 Type: Startup Activities: it services Technologies: Cybersecurity | 62 | 128 |
![]() | ![]() Born SAFE solutions for hyper-confidential data www.SeeZam.com The solution is an electronic safe, providing you a virtual secured and inviolable storage space and guaranteeing that the sensitive information deposited is restored to you intact. The professional solution SeeZam is an innovative online service: the e-Vault. A first in its field, this service for businesses and organizations meets the growing security requirements for preserving and sharing secret content. Security, Secrecy, Financial services, and Confidentiality 73 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 2 |
![]() | ![]() Masters | Simplicity | Security Human at the heart of security Your safety, our priority. With Countact, finally manage your health security emergencies. Security and Digital 64 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 20 | 9 |
![]() | ![]() Your cybersecurity partner! ☛ Governance ☛ RSSI Assistance ☛ Audits and Penses ☛ Secure architectures Specialist in the governance of information systems security and secure infrastructure architecture, Allistic supports its customers and their RSSIs in the definition of the cybersecurity strategy of their business. Cybersecurity, IT security, GDP, PSS, crisis management, awareness, secure architectures, Pentest, Audit, CC scan, SOC, Security, Security Advice, Cloud Security, Big Data security, Security Management, Risk Management, and Management of Compliance 374 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity Data Analytics | 45 | 19 |
![]() | ![]() The embedded protection for documents Empathy. Honesty. Playfulness. Craftsmanship. Solidarity — these are some of the values we live by, as a company. We work by them too: we’re building a product we believe in — we bring security and control over your company's data, wherever it's sent or stored. See https://www.seald.io cybersecurity, encryption, data security, end-to-end encryption, and data protection 105 similar entities Type: Startup Activities: it services privacytech Technologies: Cybersecurity | 19 | 8 |
![]() | ![]() Audit & amp; Digital Welcome to the universe of Probeecy, your trusted ally dedicated to the protection of personal data, computer security, internal audit, as well as internal and quality control. 142 similar entities Type: Startup Activities: privacytech it services Technologies: Cybersecurity | 3 | 2 |
![]() | ![]() Human risk managed the right way Arsen is a phishing training and awareness solution, leveraging realistic simulation, microlearning and reporting. Cybersécurité, SaaS, Phishing, Cybersecurity Awareness, and human risks 251 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 8 | 16 |
![]() | ![]() ID Verification, Secure Biometric Authentication, Payments Fortress Identity is an intelligent biometrics platform that replaces passwords with secure multimodal and multi-factor identification, using an individual’s unique human biometrics for secure identity authentication. 51 similar entities Type: Startup Activities: regtech Technologies: Cybersecurity | 1 | 3 |
![]() | ![]() NucleausTM is an application security platform that continuously monitors your code repositories #SAST #spellcheckforcode NucleausTM continuously monitors your code repositories and reports back vulnerabilities and dependencies before that code causes risks. Offering a consistent platform process with minimal learning curve, simple to use interface, remediation strategy reports and NIST conformance status, NucleausTM enables transparency and risk management to code repositories. Security as a Service, Application Security Programs, Application Security Testing, Application Security, and Web Application Security 59 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 10 |
![]() | ![]() Ehrlich – Aufmerksam – Hilfsbereit: Marktführer intelligenter Sicherheitslösungen für alle Branchen & Unternehmensgrößen Securitas is a global knowledge leader in security. From a broad range of services of specialized guarding, technology solutions and consulting and investigations, we customize offerings that are suited to the individual customer’s needs, in order to deliver the most effective security solutions. Everywhere from small stores to airports, our 345,000 employees are making a difference. Security, Specialized guarding, Mobile services, Monitoring, Technical solutions, Consulting and investigations, Remote Video Solutions, and Sicherheitstechnik 166 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 3 | 1,405 |
![]() | ![]() Expert in mobile cybersecurity and secure collaborative solutions Ercom, a Thales company, is a reference company with 30 years of combined expertise in two key areas: cybersecurity and communication networks. Being a reference company means providing clients with cutting edge solutions for their industry, combining certified security and simplicity in order to accelerate end-user adoption over a large range of devices. Ercom presents : - Cryptosmart, the only “Restricted” French, EU & NATO certified solution, jointly developed with Samsung, to secure devices and end-to-end mobile communications (voice, SMS and data) on consumer smartphones and tablets. - Cryptobox, the first sharing … Type: SMB Activities: it services Technologies: Cybersecurity | 19 | 166 |
![]() | ![]() A Radically Simple and Secure Corporate Network Perimeter 81 is a robust, yet easy-to-use, converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, or cloud. It is a cloud-native service that includes advanced capabilities such as Zero Trust remote access, Internet access control, malware protection and firewall as a service. It enables any business to build a secure corporate network over a private global backbone, without hardware and within minutes. The entire service is managed from a unified console and is backed by an award-winning global support team that … 101 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 9 | 114 |
![]() | ![]() Master your cybersecurity Net Freed is a cybersecurity consulting and expertise firm that has supported companies of all sizes since 2017. We are convinced that cybersecurity is based on the association of advanced technologies, proven processes, and staff aware of the risks. To counter the lack of visibility in the face of these threats, we offer a suitable and proportionate approach, to give you the keys to your cybersecurity solution, with an enlightened vision of your digital environment. Blockchain, information systems security and networks, digital transformation, cybersecurity, networks, RSSI, SOC, IAM, and Audit 270 similar entities Type: SMB Activities: it services Technologies: Blockchain/Cryptocurrency Cybersecurity | 5 | 4 |
![]() | ![]() Specialist in remote monitoring, alarm systems and remote assistance for almost 40 years, Nexecur is committed to your security based on experience and knowledge of your needs. A subsidiary of Crédit Agricole, Nexecur develops efficient solutions that ensure effective and continuous protection of your company, guaranteeing the security of your employees. Remote monitoring, video surveillance, video protection, access control, technical alarms, fire detection, intrusion detection, and fog generator 63 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 9 | 380 |
![]() | ![]() Open source authentication and passkey infrastructure for developers Open-source authentication and user management for the passkey era. For better security, higher conversion rates, and happier users. #Passkeys #WebAuthn #ByeByePasswords Authentication-as-a-Service, WebAuthn, Web Authentication, 2FA, MFA, Passwordless Authentication, Biometric Authentication, FIDO2, and Passkeys 29 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 8 | 8 |
![]() | ![]() Managed IT & Cybersecurity Services Provider Small Businesses are the 'economic lifeblood' of every community, which is why Lumina prioritises protecting them from one simple mistake. We use phishing-resistant technology to protect you and your staff, so that you can click, tap, and work without the fear of being hacked. - No innocent clicks gone wrong - No stolen passwords - No panicked calls to clients Just smart cyber security that keeps your business running safely. "Big enough to protect your business, but small enough to care" Managed Services, IT Help Desk, Infrastructure Management, Business Continuity, Security, Hosting, Hosted Desktop, … 59 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 13 |
![]() | ![]() Towards a new experience increased by your unified safety Pioneer of responsible security increased security, Anaveo creates intelligent perceptual systems that allow you to know the reality of your environments and to anticipate anomalies to make them places of confidence and efficiency: see, know, predict. Anaveo is more of: • 200 secure and valued data of data • 600 experts at your service and a network of local agencies • 15,000 customers in all sectors of activity • 500,000 intelligent connected objects • 5,000 projects installed annually • 300,000 logistics flows per year • 100,000 annual interventions • 97% of … 81 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 4 | 365 |
![]() | APG Protection & Investigations Established in 2004, APG conduct a myriad of security operations including, but not limited to: Close Protection, Event Security, Investigations and Surveillance operations. In addition, we are a provider of accredited training courses including Close Protection and Door Supervision. We employ only the hightest calibre staff. Security, Surveillance, Event Security, Close Protection, Risk Management, Investigations, Legal Services, Professional Witnesses, and Online Investigations 61 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 3 |
![]() | ![]() Ingram Micro acquired, during 2019, the company Abbakan specializing in Cybersecurity. Thanks to this new feature, our Cybersecurity BU is expanding its range of products. Resellers will find a complete selection of suppliers, covering all IT security issues. SECURITY, NETWORK & ACCESS, STORAGE, WEB, CLOUD, and NETWORK 135 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 7 | 10 |
![]() | ![]() The agentless cloud security pioneer for AWS, Azure, Google Cloud, Kubernetes and more. Orca Security is the pioneer of agentless cloud security, and is trusted by hundreds of enterprises globally. We're the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across your cloud estate spanning AWS, Azure, Google Cloud and Kubernetes. Amazon Web Services, AWS Security, Breach Detection, Cloud Compliance, Cloud Native Security, Cloud Security, Cloud Security Posture Management, CSPM, Cloud Workload Protection, Container Security, Google Cloud Platform, Infrastructure as Code, Kubernetes, Microsoft Azure, Oracle Cloud Infrastructure, Serverless Security, Web Application & API Security, … 44 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 19 | 459 |
![]() | ![]() digital.security is now an Eviden business Founded in 2015 by a group of IT security experts with the support of the Econocom Group, digital.security (~ 230 experts) aims to offer companies and government organisations advanced audit and consulting services and a CERTTM dedicated to the IoT ecosystem. Our experts have strong expertise in providing Integration & Projects (SSO, IAM, IAG, PKI, privilege management, Logs collection, analysis and management Data compliance solutions), and also in Operational Security (outsourcing, security services center operations, SOC & SIEM management). Audit, IoT, IAM, SSO, Security, Pentesting, BugBounty, DLP, Consulting, CERT, CSIRT, RedTeam, SOC, SIEM, DFIR, … 342 similar entities Type: SMB Activities: it services Technologies: IoT Cybersecurity | 0 | 68 |
![]() | Safetytech Safetytech is a leading company in security technology in western Sweden. The company is part of the Prosero Security Group. We offer complete, customized solutions in access systems, locks, integrated systems, burglar alarms, evacuation alarms, fire alarms, fire protection, emergency lighting and camera surveillance - all the way from planning to installation, integration and service. 119 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 5 |
![]() | ![]() Shaping the future through cyber security Nixu, a DNV company, is a trusted cyber security services partner. We help our customers ensure business resilience with peace of mind across multiple industries, enabled by some of the best cyber security professionals in Europe. Information Security Consulting, Application Security, Secure Software Development, Penetration Testing, Identity & Access Management, Situational awareness (GRC+SIEM), IT risk management, Business continuity planning, Vulnerability management, Incident response, Computer forensics, Privacy & Data protection, Security Operations Center (SOC), XDR, and Cyber security 439 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 14 | 206 |
![]() | ![]() Markmonitor is trusted globally by many of the world's leading brands to establish and securely protect their corporate domain portfolios. Domain Management, Corporate Registrar, and Domain Broker Services 77 similar entities Type: SMB Activities: deeptech it services Technologies: Cybersecurity | 36 | 194 |
![]() | ![]() All Breton Cybersecurity Partner in Governance, Risks and Compliance Sourcitec is a company that offers governance, risks and compliance advice and services: -Cybermarime -Cyberprotection -Cyberdefense -CyberResilience She supports professionals for: -Définir functions and responsibilities in terms of cyber risk management -Define security strategies -Mesure the risks and set up suitable prevention devices -Define the activity continuity plan, the crisis management process -Sensitize employees on threats and good practices to adopt Safety of information system, governance, risks, compliance, cybermaritime, cyberprotection, cyberresilience, awareness, PCA, PRA, crisis management, ISO 27001 Li, ISO 27001 La, Ebios RM, and cyberefense 240 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 11 | 10 |
![]() | ![]() The human side of cybersecurity At Systancia, we believe that you can leverage cybersecurity for business performance. Therefore, we deliver all the cyber elements you need to secure workforces ‘s access to their working environments. We help c-level executives, starting with CISOs, to solve the impossible cybersecurity equation of : speed to compliance, shortage of competences, integration of disparate tools, inflation of budgets and costs. How ? With a unique “zero-trust” platform which unifies identity and access management (#IAM), privileged access management (#PAM) and zero-trust network access (#ZTNA) into a single and enabling user experience. Do you need to - … 16 similar entities Type: SMB Activities: it services Technologies: A.I. Cybersecurity SaaS | 36 | 96 |
![]() | ![]() Kenna is now Cisco Vulnerability Management Kenna is now Cisco Vulnerability Management. Learn more: https://www.cisco.com/site/us/en/products/security/vulnerability-management/index.html security, SaaS, vulnerability management, vulnerability intelligence, threat management, and information security 113 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 26 |
![]() | ![]() Best in mobile user authentication | No trade-off between usability and security Best in mobile user authentication | No trade-off between usability and security user authentication, security, cryptography, IAM, mobile authentication, two factor, second factor, strong authentication, cyber security, authentication, user experience, UX, multi factor authentication, mfa, 2fa, sca, strong customer authentication, mobile security, infosecurity, advanced electronic signatures, e-Signatures, electronic signing, frictionless authentication, seamless login, and two factor authentication 18 similar entities Type: Startup Activities: it services uxtech Technologies: Cybersecurity | 5 | 1 |
![]() | ![]() The leader in Identity and Access Management OneLogin by One Identity, a wholly owned subsidiary of Quest Software, leads the market in Identity and Access Management. OneLogin by One Identity, a wholly owned subsidiary of Quest Software, leads the market in Identity and Access Management and support more than 5,000 customers worldwide. Our platform provides everything you need to secure your workforce, customers and partners. Single Sign-On, SSO, identity management, security, multi-factor authentication, user provisioning, Compliance, Cloud Security, Credential Vaulting, Unified Endpoint Management, Consumer IAM, IAM, Governance, Web Access Management, and Adaptive MFA 66 similar entities Type: Startup Activities: it services regtech Technologies: Cybersecurity | 15 | 68 |
![]() | ![]() Comprehensive Security for Your SaaS Applications Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS. The company is backed by Greylock Partners, Wing, GV and Norwest Venture Partners. Advanced Threat Protection, Insider Threat Protection, Threat Detection, Threat Response, Automated Intelligence, Machine Learning, Information Security Software, SaaS Security , Incident Response, Visibility and Monitoring, and compliance 166 similar entities Type: Startup Activities: it services Technologies: Cybersecurity A.I. A.I. - Machine Learning | 9 | 211 |
![]() | ![]() Next-generation Cybersecurity Solutions for Modern SMBs Get secured in minutes with Controla, the cybersecurity management platform for the modern SMB. We protect your company’s computers, accounts, files, and workspace, ensuring you maintain strong and consistent cyber hygiene. Choose to follow our simple guides or let Controla automate the security tasks for you. Our mission is to help business owners quickly and easily take control of their cybersecurity. Simply onboard your team, and let Controla assign the necessary actions to secure your business. 64 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 10 |
![]() | Groupe GIP GIP supports you whatever your activity by offering you personalized responses to your safety needs GIP supports you whatever your activity by offering you personalized responses to your safety needs Having become a major player in the security market in France, the company has structured itself under the chairmanship of its founder who has always had the desire to engage in an approach of proximity, independence and sincerity with regard to its customers. With its 5 agencies in France and more than 9,000 clients in remote monitoring, the group is organized in four branches of activity: GIP Security: Guarding and … 61 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 29 |
![]() | ![]() HSC (Hervé Schauer Consultants) was an information security consulting company from 1989 to 2017 Herve Schauer Consultants: the significant precursor for more than 25 years. - Security audit: infrastructures of all sizes and all kinds: operating systems, web applications, SCADA, firewalls, IPBX, mainframes, etc... - Internal and external penetration tests: Web applications, wireless technologies (Wifi, RFID), VoIP, telcos infrastructures, etc... - IS Management: ISO 27001, SMSI construction, coaching, councilling, documentation, audit coaching, security policy, charters,.... - Risk management: ISO 27005, EBIOS v3, EBIOS 2010, Mehari, security survey, implementation, coaching - Security policies and conformity: ISO 27001, PCI-DSS, RGS,.... - Independence … 97 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 12 | 535 |
![]() | ![]() Business Risk & Performance Management Our powerful solutions suite streamlines onboarding, compliance, monitoring and insights to mitigate risk and secure growth at every stage of the digital business lifecycle. fintech security, SaaS, PCI-DSS, VISA, MasterCard, Payment Card Industry, I.T. Security, Fintech, Merchant Risk Management, Risk Management, Fraud, Risk Prediction, and Merchant Security 604 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 25 |
![]() | ![]() Empower People. Reduce Cyber Risk. The best software for MSSPs & MSPs to deliver anti-fraud, anti-phishing, e-mail analysis and security awareness training that motivates behavior change. Cybersecurity, Cybersecurity Strategy, Cyber Threat Intelligence and Analysis, and Cyber Risk Management and Remediation 446 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 18 | 47 |
![]() | ![]() Enter Simplicity! FINPIN provides you with a new way of secure logins to all your existing password-protected accounts (as soon as trust is enabled) by leveraging your mobile phone for primary authentication where possible (lower security needs) and for secondary (multi-factor) authentication where necessary (higher security needs) FINPIN’s patented technology requires virtually no end-user configuration and no hardware installation: just a smartphone with the app plus a little piece of software. Easily unleash your smartphone and together we can free millions of users from the sheer endless maze of passwords they have to remember Multi-Factor Authentification and Passwordless 24 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 4 |
![]() | ![]() Cyber security specialists Logiq provide a full range of Cyber Security, Information Assurance and System Engineering services. We specialise in delivering excellence, whether it is a bespoke system development, system design, compliance audit or cyber strategy. Our combination of technical expertise and business understanding means we are able to provide our clients with a complete cyber solution, enabling them to conduct their business securely. Information Security, Cyber Security, Security Risk Assessment, Security Architecture, System Testing, Compliance Management, Tender Support, Requirments Management, Security Consultancy, Cyber Strategy, Secure System Design, Software Security, and Security Development 322 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 1 | 144 |
![]() | ![]() Building the most secure KeyLess Authentication System, powering the best wallet for ₿ & Stablecoin to onboard Billions Elysium Lab is a Swiss start-up redefining on-chain authentication and self-custody with its Keyless Multifactor Authentication system. Designed for Bitcoin and on-chain applications, it ensures secure and intuitive onboarding and recovery. Our technology protects decentralized privacy and digital identity, tackling cyber threats and centralized custody risks while empowering users with true independence and security. Elysium Wallet eliminates stored keys, ensuring full ownership, seamless usability, and bulletproof security, offering unmatched safety in a Cold Software Wallet. You are the Key! 15 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 3 | 12 |
![]() | ![]() We make vulnerable passwords impossible With MindYourPass, vulnerable passwords are past tense. Let MindYourPass make your organization cyber secure. With our powerful solutions, you get full control over business password usage and allow employees to easily log in using only strong and unique passwords. For every organization, we have a suitable solution that matches our Triple-iTM improvement method. Software security, cyber security, Awareness, IAM, MFA, Password manager, Wachtwoordmanager, Informatiebeveiliging, Privacy, Nederlands, EU, Adoptie, Innovatie, B2B, B2C, Cloud, SaaS, Wachtwoordbeleid, Monitoring, and Assessment 60 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 11 |
![]() | ![]() Patchstack helps web developers to easily secure web apps from third-party component vulnerabilities. Building security community behind #WordPress ecosystem & protecting websites from plugin vulnerabilities. Website Security, Website Monitoring, Web Application Security, Web Application Monitoring, Cyber Security, Cyber Security Platform, Web Security Platform, and Website Security Platform 69 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 41 |
![]() | ![]() Our mission is to make the Internet safer by securing everyone’s email. Fraudmarc's unique approach combines the power of DMARC reporting with our hosted SPF CompressionTM solution to give you the power to manage policies without the risk of tedious DNS changes. Our enterprise plans support some of the Internet's most influential senders and our free plans make security accessible to everyone. We make security easy so you can get back to work. Email Security, Email Authentication, SPF, DMARC, DKIM, and Cyber Security 47 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 2 | 5 |
![]() | ![]() A platform empowering security leaders to continuously maximize return on their security investments. Enterprise Security Profiler Empowering CISOs with clarity & confidence in their security programme by visualizing capabilities, usage and spend against their key threat priorities. Welcome to Security Investment Optimization. 📊 Cyber Security, Capability Mapping, and Security Portfolio Management 115 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 15 |
![]() | ![]() Intelligent Cybersecurity | Follow us on X @KudelskiSec Kudelski Security is a premier cybersecurity solutions provider, working with the most security-conscious organizations in Europe and across the United States. Our long-term approach to client partnerships enables us to continuously evaluate their security posture to design and deliver solutions to reduce business risk, maintain compliance and increase overall security effectiveness. For more information about capabilities including consulting, technology, managed security services or custom innovation, visit: www.kudelskisecurity.com Managed security services and solutions, security incident response, threat monitoring, risk assessment and compliance, penetration testing, device security evaluation, identity and access management, security compliance … 453 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 21 | 434 |
![]() | Gudens Cybersecurity Guden Cybersecurity is currently operating in a private development phase. Security Architecture, Data Loss Prevention, Penetration Testing, Incident Response, Identity Management, Access Management, Secure DevOps, Cloud Security, Network Security, Data Security, Endpoint Security, Vulnerability Management, Secure DevOps, and Digital Forensic 446 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 142 |
![]() | ![]() We provide 360 Cyber Security Services We provide End to End Cyber Security Services Breach Investigations, Incident Handling, Forensics, Risk Assessment, End point security, WAPT, Incident Response, Mobile (Android, iOS), Source Code Review, Training, SOC, and VAPT 329 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 1 | 14 |
![]() | ![]() Security Without Compromise Strategic, tactical, and technical consulting services and the Eidola technical automation platform. Consented surveillance through transparency, reciprocity and proportionality - AuthC in concert with 0PN nee The Open Consent Group and Surveillance Trust Physical Security, Surveillance, Machine Vision, Automation, Intelligent Infrastructure, Privacy, Cybersecurity, and Identity and Access Management 119 similar entities Type: SMB Activities: privacytech Technologies: Cybersecurity | 1 | 2 |
![]() | ![]() RSA Conference is the premier series of global events and year-round learning for the cybersecurity community. RSAC is where the security industry converges to discuss current and future concerns and have access to the experts, unbiased content and ideas that help enable individuals and companies advance their cybersecurity posture and build stronger and smarter teams. Both in-person and online, RSAC brings the cybersecurity industry together and empowers the collective “we” to stand against cyberthreats around the world. RSA Conference. Where the world talks security. Security, Conferences, Cyber security, Data protecton, and Cryptography 58 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 40 | 88 |
![]() | ![]() Next-generation security & identity management Anomalix is a cybersecurity company specializing in Identity and Access Management (IAM). Anomalix provides identity-driven zero-trust security solutions that safeguard consumers, businesses, and governments. Identity Management, Security Analytics, Information Security, IAG, Cloud Security, Third Party Risk Management, Audit & Compliance, Business Agility, Identity Analytics, nonhuman identity, machine identity, and Identity Security 70 similar entities Type: Startup Activities: it services regtech Technologies: Cybersecurity | 1 | 12 |
![]() | ![]() Security Service Edge Leader focusing on securing the world’s data with cloud-native security solutions. Skyhigh Security protects organizations with cloud-native security solutions that are both data-aware and simple to use. Its market-leading Security Service Edge (SSE) Portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security. Organizations can now have complete visibility and control and seamlessly monitor and mitigate security risks—achieving lower associated costs, driving greater efficiencies, and keeping pace with the speed of innovation. 70 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 8 | 640 |
![]() | ![]() Array offers a complete range of application delivery and security solutions. Array offers a complete range of application delivery and security solutions aimed at maximizing employee productivity, ensuring always-on availability, optimizing the end-user experience, and guarding business infrastructure against attack and data leakage. Application Delivery Controllers, SSL VPN, Secure Access Gateways, Remote Desktop, NFV, Network HCI, Load balancers, SSL Intercept, and Web Application Firewall 62 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 2 | 251 |
![]() | ![]() Thycotic is now Delinea, providing privileged access management (PAM) solutions for seamless security. Visit delinea.com Thycotic is now Delinea, a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide, including over half of the Fortune 100. Our customers range from small businesses to the world's largest financial institutions, intelligence agencies, and critical infrastructure companies. Privileged Identity … 33 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 25 | 1,128 |
![]() | ![]() What does IPS Grupo a Great Place to Work? Strategy, community, leadership, loyalty and respect In IPS group we build a safer, technological and human future. We have been committed to giving reliable and effective security solutions for more than 29 years. Security officers • Consulting • Armed • Remote protection Private Security, Security, and Security Technology 132 similar entities Type: SMB Activities: consulting Technologies: Cybersecurity | 0 | 323 |
![]() | ![]() The first marketplace powered by hackers. Working as ethical hackers and security researchers over the past decade we learned that online security became a Wild West for companies. Trying to get control of risk levels by assigning security teams, hiring security companies at scheduled intervals and licensing multiple expensive solutions, but eventually, ending up with a security flow that is not insightful and with reports scattered all over the place. Online security isn’t just about implementing smart technology, it is also about including the right people, gathering insider intelligence and the ability to align all these processes towards one goal. … 127 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 3 | 36 |
![]() | ![]() Define Once. Secure Constantly. #SecurityAsCode The Waratek ARMR #SecurityAsCode platform allows you to define the final state of your desired security behavior to be executed constantly in the runtime release-after-release. Application Security, Secure Java Containers, Runtime Application Self Protection, Java Security, Cyber Security, java, information security, web application security, .NET, runtime protection, .NET security, RASP, appsec, vulnerability patching, legacy upgrade, and API security 32 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 4 | 24 |
![]() | ![]() Daily news for security and safety professionals Security News makes the range of reporting on security related topics more accessible and is a starting point for security guards, security managers and anyone interested in security news. Security companies and suppliers also have the option to publish yourself on the website in the field of security. security, safety, security, and safety 75 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 0 | 19 |
![]() | ![]() Blinda Beep is a business group of the security sector.Our activities focus on installation and maintenance of security systems, with the aim of providing all the necessary services to our customers, ultimately as important. 94 similar entities Type: Startup Activities: it services Technologies: Cybersecurity | 0 | 4 |
![]() | kyron solutions informatiques Advise, support, defend and protect the assets of companies www.kyron.fr Audits & amp; Advice, governance, risks, compliance, IS optimization, PMO, AMOA, AMOE, Engineering - Architecture, Integration, Operation, Physical Security, Training, Infrastructure Systems and Networks, Bastion, Data Protection, Anti -Phising, Cybersecurity, and ISA62443 489 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 5 | 29 |
![]() | ![]() Leading-edge cyber threat prevention and identity governance solutions to help prevent, detect, test, and monitor risk. Core Security is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra's Core Security delivers market-leading, threat-aware, vulnerability, identity and access management solutions that provide the actionable intelligence and context needed to manage security risks across the enterprise. penetration testing, security intelligence, software solutions, vulnerability research, threat expertise, threat modeling, identity governance, privileged access management, and identity and access management 88 similar entities Type: SMB Activities: it services Technologies: Cybersecurity | 3 | 126 |
![]() | ![]() Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges with solutions that protect critical data and applications without workflow disruption. Its platform of interoperable identity, authentication, and access management solutions enables organizations in over 45 countries to fully manage and secure all enterprise and third-party digital identities by establishing trust between people, technology, and information. software, technology, security, single sign-on, strong authentication management, healthcare, clinical workflows, virtualization, secure text messaging, patient identification, identity management, multifactor authentication, cybersecurity, and healthcare IT 99 similar entities Type: SMB Activities: healthtech regtech Technologies: Cybersecurity | 18 | 1,199 |