Top Tech Companies (126)
Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 5,500 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. Headquartered in Cambridge, UK, the company has 1,500 employees and over 30 offices worldwide. Darktrace...
At Macquarie, we aim to bring together the best of financial services and technology for our people and clients – whether that’s utilizing our technology platforms for our people to work and collaborate or enabling our team to place trades, manage clients or improve the way we do things.
PhishSafety provides realistic phishing simulations and training to help educate your employees and keep your company safe.
Laika helps businesses manage compliance, fly through audits, and build trust in the marketplace. With Laika's software platform and expert-in-the-loop offering, it has never been easier to design, demonstrate, and maintain compliance. We take charge of compliance obligations comprehensively. Our platform serves as a compliance command center for managing controls, policies, internal/external audits, vendor risk, and more. But unlike other...
CLEAR transforms what is uniquely you – your fingerprints, your face, your eyes – into a secure, biometric key to frictionless experiences. CLEAR currently powers customer experiences in nearly 40 U.S. airports and venues. With over 3 million members so far, CLEAR is the identity platform of the future, today.
Every day there’s another cyber-attack on the news. Hackers stole twenty million credit card numbers from a retailer, or they shut down an oil pipeline, or crippled a hospital. These attacks are more than just disruptive; they’re big business for organized crime and rogue states. Wiz is here to prevent them from happening where companies and governments build applications today...
Keybase aims to make the internet more secure by making public-key cryptography accessible to mainstream internet users.
Kisi connects physical doors to the cloud so people can gain access way more securely and conveniently than before. Help us on our mission to build the smartest security system existing to date and join the Kisi Krew in New York!
Secure online services from password-based attacks with a next generation approach to multi-factor authentication that delivers a frictionless user experience
Nuvolo is the global leader in modern, cloud-based Connected Workplace solutions. We provide a single integrated workplace management system (IWMS) platform to manage all people, all physical locations, all assets, and all work – enabling data sharing across departments. Industries we serve include healthcare, life sciences, financial services, retail, government, higher education & enterprise. We’re the largest and fastest-growing independent...
Our AI software analyzes data from existing security cameras in real-time to detect weapons, intruders, social distancing, masks, crowds, and where people travel in any environment. The system acts as an end-to-end security camera management system that enables onboarding and management of cameras as well as instant alerts and analytics that allow organizations to pinpoint problems. We leverage cutting-edge computer vision...
Morphisec is the world leader in providing advanced security solutions for midsize to small enterprises around the globe. We simplify security and can automatically block modern attacks from the endpoint to the cloud. Unlike traditional security solutions relying on human intervention, our solutions deliver operationally simple, proactive prevention. We protect businesses around the globe with limited security resources and training...
IT is the undercurrent of the business world. It’s how companies onboard employees, support collaboration, protect security and serve customers. Businesses run better when company devices, networks, and applications work like a dream. But most IT services were built for a different time, when hybrid and remote work weren’t the norm — and security risks weren’t quite as high as they...
Global digital identity and fraud solutions, working to create a world where everyone can transact online with confidence Our market-leading technology, data and expertise help our customers improve digital access, deliver a seamless experience and establish trust so that they can transact quickly, safely and securely with their customers online. Headquartered in the UK and with over 1,000...
Kasada is the most effective and easiest way to defend against advanced persistent bot attacks across web, mobile, and API channels. With Kasada, trust in the Internet is restored by foiling even the stealthiest cyber threats, from credential abuse to data scraping. The solution invisibly stops automated threats while inflicting financial damage to attackers, destroying their ROI. With the ability...
Modernizing DLP and CASB to secure SaaS data, DoControl is a No-Code SaaS Security Platform, giving organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation. We take a unique, customer-focused approach to the challenge of labor-intensive security risk management and data exfiltration prevention in popular SaaS applications. By replacing manual work with automation, DoControl...
SKOUT Cybersecurity is redefining the way Managed Service Providers (MSPs) deliver security to their customers. SKOUT makes cyber-as-a-service easy for MSPs by offering one dashboard, one number to call, and one turnkey partner. SKOUT is trusted by MSPs all over the world to lower the cost and complexity of delivering managed security services. SKOUT believes that all businesses should have...
Beagle Security is a SaaS-based automated penetration testing solution that helps you to identify vulnerabilities on your web applications, public APIs & GraphQL endpoints before hackers exploit them. Beagle Security analyzes your web application by applying several penetration testing procedures to understand how deep it can be hacked. A detailed, contextual report is provided explaining the open vulnerabilities (categorized by critical,...
































