Top Tech Companies (121)
No crime or accident has to go under the radar ever again. Meet Iris: real-time video surveillance monitored 24/7 by AI. Iris uses computer vision to detect criminal and suspicious activity in surveillance cameras in real-time to quickly identify and report them.
Security teams use OX to prioritize developer resources by finding and fixing the 5% of issues that matter. OX proprietary technology consolidates security intelligence better than anyone on the market today. With OX you can improve appsec security posture without slowing down development, consolidate existing tooling into actionable insights and remediate issues with minimal back and forth
From our HQ in Brooklyn our team at Include Security brings together some of the best information security talent from around the world. We have security experts in every aspect of enterprise and consumer technology, from low-level hardware and operating systems to the latest cutting-edge web applications. We specialize in taking the art of security assessments to a new level. In a...
At Macquarie, we aim to bring together the best of financial services and technology for our people and clients – whether that’s utilizing our technology platforms for our people to work and collaborate or enabling our team to place trades, manage clients or improve the way we do things.
SKOUT Cybersecurity is redefining the way Managed Service Providers (MSPs) deliver security to their customers. SKOUT makes cyber-as-a-service easy for MSPs by offering one dashboard, one number to call, and one turnkey partner. SKOUT is trusted by MSPs all over the world to lower the cost and complexity of delivering managed security services. SKOUT believes that all businesses should have...
Bonifide is a community-powered fraud prevention platform for Bitcoin and other cryptocurrencies.
As the world moves to a mobile-first economy, businesses need to modernize how they acquire, engage with and enable consumers. Prove’s phone-centric identity tokenization and passive cryptographic authentication solutions reduce friction, enhance security and privacy across all digital channels, and accelerate revenues while reducing operating expenses and fraud losses. Over 1,000 enterprise customers use Prove’s platform to process 20 billion...
The most secure, passwordless authentication platform for tech forward-thinking organizations, globally. Breaking down the barriers between identity, security, and device management, Beyond Identity fundamentally changes the way the world logs in – eliminating passwords and providing users with a frictionless multi-factor login experience.
Eternal Encryption. In an age of escalating cyberespionage, robust encryption protocols have never been more important. Current encryption methods rely on vulnerable and archaic technologies, which will be rendered obsolete by the rise of quantum computers and associated scientific advances. Qrypt’s encryption solution can secure an enterprise today and eliminate future risk; it is the only algorithm mathematically proven to be unbreakable,...
Persona helps businesses manage KYC/AML/KYB programs, fight fraud, and build trust by automating any identity-related use case with our flexible identity infrastructure. For example, we help Branch automate their KYC process and Coursera verify learners’ identities before delivering course credentials. Beyond securely collecting and verifying user information such as PII, government IDs, and biometric selfies, our platform also provides flexible case...
Cloud Computer-Aided Dispatch, Records Management, Property, Evidence, Analytics. Powerfully Simple. Purposefully Smart.
Protected Media is a successful early-stage company, whose solutions are deployed in dozens of global organizations, serving to billions of users. We developed an innovative, award-winning, cyber security solution for fighting online advertising fraud. The company founded in 2014 by network security experts fighting cybercriminals over 15 years
Beagle Security is a SaaS-based automated penetration testing solution that helps you to identify vulnerabilities on your web applications, public APIs & GraphQL endpoints before hackers exploit them. Beagle Security analyzes your web application by applying several penetration testing procedures to understand how deep it can be hacked. A detailed, contextual report is provided explaining the open vulnerabilities (categorized by critical,...
Keybase aims to make the internet more secure by making public-key cryptography accessible to mainstream internet users.
OnTrak Solutions is a leading provider of fleet management systems, offering advanced programs and solutions tailored to manage risk, enhance efficiencies, and create safer fleet operations. Our expertise in integrating telematics and analytical platforms delivers customizable solutions that not only rehabilitate fleets but also offer superior coaching for drivers, significantly improving risk profiles. At the core of our offerings are...
Trustmi is the only end-to-end payment security solution that helps businesses protect their bottom line by eliminating losses from cyberattacks, internal collusion, and human error and ensuring payments go to the right place.
EverSafe monitors the financial health of older adults and families for fraud, identity theft and age-related issues. A perfect caregiver's tool, EverSafe analyzes banking, investment, retirement, credit card, credit and real estate data daily, and sends alerts to members and designated 'trusted advocates.'
AuriStor, Inc. produces secure, scalable cloud storage solutions that reduce the cost of managing ever increasing unstructured storage needs of global enterprises, small & midsize businesses and eventually, individuals.
Elastic, the Search AI Company, enables everyone to find the answers they need in real time, using all their data, at scale — unleashing the potential of businesses and people. The Elastic Search AI Platform, used by more than 50% of the Fortune 500, brings together the precision of search and the intelligence of AI to enable everyone to accelerate...










 Logo.png)






.jpg)




 (2).jpg)
%20(1).jpg)
_0.png)






