Explore 13,460 companies in Cyber Security
0 followers
Arsen is a cybersecurity SaaS allowing CISOs and cybersecurity expert to manage phishing simulations.Thanks to its intuitive interface and powerful attack engine, Arsen allows its users to create high-quality, custom made fake phishing campaigns in a few clicks.By submitting their organization to ph
0 followers
ToothPic provides solutions on technologies for the recognition of photographic devices.ToothPic’s mission is turning every smartphone into a secure and user-friendly key for user authentication. ToothPic is an official university spin-off of Politecnico di Torino, a major engineering school in Ital
0 followers
We founded xahive in 2013 in Canada to enable our clients to achieve the strongest cybersecurity protection based on the integration of technology, education, culture, and governance to prevent, detect, and defend against cyber threats. Our holistic approach to cybersecurity is unmatched in the indu
0 followers
Enterprise Network Security for the Agile World. Anytime. Anywhere. Product is the industry's first and only true #SASE platform; which can deliver unified enterprise-grade network security to households, small businesses, and enterprises. Whenever and wherever you need.
0 followers
F2F Events produces IT conferences focusing on information security, cloud, IT infrastructure, and enterprise communications.
0 followers
Genesis Business Communication Solutions is a communications technology solution provider.
0 followers
The Talent Source has been connecting strategic Digital enablers and Technology talent to top brands, Advisory and PE backed firms since 2009. As a trusted talent acquisition partner, we connect highly sought after talent to opportunities with impact, on either a permanent or contract basis by leve
0 followers
swIDch is an information technology company that offers secure authentication through dynamic codes.
0 followers
Humanize enables c-suite executives to control, measure, and manage their cyber priorities and risks. Using the power of artificial intelligence, their technology runs attacks to test and validate the company’s attack surface and to identify weak spots.
0 followers
A.I powered Cybersecurity with built in Prevention Features to stop Threats / Fraud before they happen.
0 followers
ShadowObjects provides data visualization, systems integration, and cyber security services.
0 followers
Jasper Solutions provides a broad portfolio of business and technology solutions to a diverse base of federal, state and local government agencies, and commercial enterprises.Jasper Solutions serves its clients on a worldwide basis to improve their business performance and align IT with their missio
0 followers
Camali Corporation is an engineering company that specializes in design, installation and maintenance of computer data centers.
0 followers
Excalibur Solutions provides systems architecture, systems development, and implementation management services.
0 followers
Catch is a cyber security company building technology to protect the vulnerable from cyber scams.
0 followers
APM IT Solutions provides dynamic voice, data, and cloud solutions to clients.
0 followers
PC Works Plus focuses on assessing security & compliance on small business IT infrastructure, by performing Security Risk Assessments.
0 followers
Tolar is a leading provider of managed IT services to businesses in Abilene and around the Big Country and West Texas. We deliver appropriate solutions, expert advice and predictable IT results to help your business grow. We are globally ranked among the world's best managed service providers, or M
1 follower
Compliiant.io provides affordable, subscription-based cybersecurity solutions for businesses that either don't have the budget for a dedicated security professional or those with fluctuating security demands. Pause your subscription or cancel at any time. No contracts or minimums.
0 followers
Konekti provides mid-size industries with cloud migration, IT infrastructure, cloud and network security solutions.
0 followers
Intruno provides a cognitive privacy surveillance solution, training management, and cybersecurity services.
0 followers
Challenges are rarely binary. Hidden issues always seem to pop up if you’re not looking out for them. That’s why you need a partner that’s so well versed in what your facing that nothing surprises you. We see things coming from miles away and are never caught off guard. Vertex11 is like your crysta
0 followers
Stealth Software Technologies is a provider of software solutions & research in cybersecurity and cryptography as well as publications.
0 followers
BluBracket develops a code security platform that checks for security and integrity issues.
0 followers
About Max Secure Software Max Secure Software is a Cyber Security software product development company that designs and develops products to protect the Privacy and Security of Windows, Linux, Android and iOS/ Mac users.
0 followers
HexaTier provides database security and compliance and sets the industry standard with a patented database reverse proxy technology for securing cloud-hosted databases and DBaaS platforms. Providing a unified solution, including: Database Security, Dynamic Data Masking, Database Activity Monitoring
0 followers
We believe what you can do is more important than your background, so we created Enigma -- a screening platform created for the cybersecurity industry.Enigma's unique puzzle-based scenarios help companies screen high volumes of candidates efficiently, with challenges tailored to the real-world skill
0 followers
A E-TRUST é líder brasileira em IAM. Acreditamos que a proteção de dados é fundamental para o sucesso das empresas nos dias de hoje e, é por isso, que nossos sistemas e serviços são projetados para oferecer soluções personalizadas e altamente eficientes, como: ✔️ Gestão de Identidades e Acessos (
0 followers
MSEDP Inc. has been a leader in technology solutions for small and medium-sized businesses (SMBs) since 1973.
0 followers
Zecurion data loss prevention (DLP) solution is an easy-to-use solution for securing confidential data at rest, in motion, at the endpoint or on network, in the cloud, and to demonstrate regulatory compliance. With pricing and configurations that are SMB as well as large-enterprise friendly, Zecu
0 followers
DATA SECURITY: TFS works with over 130 clients in 18 states conducting annual security risk assessments, phishing simulations with web based security training, pen testing and policies & procedures documentation. AUDIT FIRM PARTNERING: TFS specializes in partnering with small to mid-sized CPA fi
0 followers
Keyavi technology is a data protection platform that wraps your data with multiple layers of encryption and user-defined policies, making your data self-protecting, intelligent, and self-aware. Keyavi embeds encryption and policy-based protection directly into the data, allowing the protected files
0 followers
GigaNetworks focuses on offering strategic planning, system evaluation, implementation, training and technical support.
0 followers
Century Protective Services is a full service corporate and personal security firm headquartered in White Plains, New York serving the tri-state area. Since our inception in 1994, our industry knowledge and dedication to service have been the cornerstones that establish solid relationships and confi
0 followers
Missing Link Security is to secure the nation’s information by increasing awareness, countering threat, mitigating risk.
0 followers
CloudPro offers cloud, digital infrastructure, GTM, and cybersecurity services. Their security services include penetration tests, reviews of clients current environment, summaries of clients' current dependencies and gaps, and assessments and analyses of clients security risks and vulnerabilities.
0 followers
SG Computers provides networking, security, and mobile app development IT services.
0 followers
Cyber risk intelligence platform providing data and modelling on the cyber exposure of millions of companies worldwide.
0 followers
Practitioner-led Syndicate investing in early-stage startups in Cybersecurity, Deep Tech, and AI.
0 followers
With experience in running a business and managing the information technology infrastructure, you need a partner that will manage your IT allowing you to manage your business. You must work your IT instead of your IT working you. To accomplish this, you need to have a proactive approach to IT inst
0 followers
AI Solutions for Everyone, Without Compromise Cognoverse was born out of a simple but powerful idea: to make AI solutions accessible and affordable for everyone. In a world where countless companies claim to deliver AI development, we stand apart by providing end-to-end solutions that prioritize no
0 followers
Hashfire brings together the best of blockchain and advanced cryptographic methods to ensure that your documents are more than just secure—they’re untouchable. As a document authentication protocol, we use cryptographically hashed agreements to provably authenticate, validate, and store critical do
0 followers
Providing World-class Communication Network and Security Infrastructure Solutions Novo Technologies is dedicated to projects excellence, Novo Technologies undertakes end to end telecoms construction projects for both Carrier and Enterprise Clients. Our direction is driven by the project needs of o
0 followers
At TechRAM, we envision a world where businesses thrive without IT complexities. By delivering cutting-edge cybersecurity, AI-powered Microsoft solutions, proactive managed services, and seamless IT procurement, we empower organisations to focus on growth, security, and digital leadership. Our commi
0 followers
At San Aspen Technologies, we are dedicated to empowering organizations with cutting-edge solutions in both digital and physical security. As a trusted technology reseller, our mission is to provide our clients with the tools and technologies they need to protect their assets, data, and people. In
0 followers
Secure a Ship Ltd provides maritime security solutions in the designated High Risk Areas throughout the Gulf of Aden, East and West African coastlines, Indian Ocean, Gulf of Oman and the Red Sea. WE HAVE EXPERIENCE IN WEST AFRICA We can provide a wide range of security related services includi
0 followers
Teton has been founded to solve the real-time systems and application connectivity and data distribution challenges experienced by the people worldwide. We assembled an international team of business and technology experts; and the team works closely with customers to analyze their needs and underst
0 followers
Leveraging the principal’s legal and financial background, Bayberry provides top quality consulting and business development services to its clients in the government contracting, Managed and IT services, cybersecurity, software, manufacturing, distribution, and other industries. Bayberry also looks
0 followers
OWN Experiences offers a data & AI platform to build robust psychological profiles. Let data-driven companies read users’ state of mind, comply with their privacy and personalise accurate actions in real-time, anywhere. Emotional Data Analysis and Automation (EDAA™), OWN’s emotional AI, processes s