Top Fully Remote Security Companies (47)
Atlassian creates teamwork solutions for high-performing teams. Our portfolio of collaboration and work management software products includes Jira, Confluence, Trello, Loom and Rovo. More than 300,000 businesses worldwide rely on Atlassian’s technology, including 80 percent of Fortune 500 companies. Our solutions support various business teams and they help organizations plan, track, and deliver their biggest ideas together.
JumpCloud’s mission is to Make Work Happen®, providing simple, secure access to an organization’s technology resources from any device, or any location. The JumpCloud Open Directory Platform gives IT, security operations, and DevOps a single, cloud-based solution to control and manage employee identities and their devices, and apply conditional access controls based on Zero Trust principals. Since launching in 2012,...
LogicManager believes performance is a result of effective risk management. Our ERM software and top-rated customer experience help organizations manage surprises before they happen - ensuring a positive impact on the organization and community at large. But don’t just take our word for it; we're proud to be a certified Great Place to Work® every year since 2017!
Trust, Automated. Drata automates your compliance journey from start to audit-read and beyond and provides support from the security and compliance experts who built it. The company is backed by ICONIQ Growth, Alkeon Capital, Salesforce Ventures, GGV Capital, Cowboy Ventures, Leaders Fund, Okta Ventures, SVCI, SV Angel, and many key industry leaders.
GitLab is an open core software company that develops the most comprehensive DevSecOps Platform used by more than 100,000 organizations. Our mission makes it clear that we believe in a world where everyone can contribute. We make that possible at GitLab by running our operations on our product and staying aligned with our values. We strive to create a transparent environment...
Fueled by a belief that identity professionals deserve better, we found a way to break down the silos of identity security—eliminating the gaps and blind spots left behind by a patchwork of point solutions. The Silverfort Identity Security Platform is the first to deliver end-to-end identity security, protecting every identity in the cloud, on-prem, humans, machines, and everything in between....
Hiro is a company that creates developer tools for Stacks, a network that enables apps and smart contracts for Bitcoin. As a core entity within the Stacks Ecosystem, Hiro works alongside various independent entities, developers, and community members to establish a user-owned internet on Bitcoin. Hiro provides developers with the tools to innovate and build on Bitcoin in ways previously...
Red Canary is the leading security ally enabling every organization to make its greatest impact without fear of cyber-attack. The company provides outcome-focused solutions for security operations teams, who rely on Red Canary to analyze and respond to endpoint telemetry, manage alerts across the network, and provide cloud environment runtime threat detection. With Red Canary, security teams can make a...
Nisos is the human risk management company specializing in unmasking threats before they escalate. We are a trusted advisor who operates as an extension of security, intelligence, legal, and human resource teams to protect their people and business. Our intelligence-led solutions help enterprises make critical decisions, manage human risk, and drive real world consequences for digital threats. For more information,...
Texas Cyber Solutions is a premier cybersecurity firm specializing in penetration testing, network security audits, incident response, security architecture design, vCISO services, and strategic security consulting. We provide proactive security assessments, executive-level guidance, and hands-on defense solutions to protect businesses from evolving cyber threats. As an offensive security-driven company, we conduct comprehensive penetration testing across web applications, networks, wireless infrastructure,...
Asymmetric Research is a boutique security venture focused on deep partnerships with L1/L2 blockchains and DeFi protocols in an effort to keep them safe
SentinelSky is a cutting-edge drone as first responder service. We provie drone first response to local, state, federal and commercial agencies using some of the most advanced technologies available today.
Founded in 2010 by leading file security experts, Votiro has developed the most advanced Content Disarm and Reconstruction (CDR) solution available on the market today. The company’s innovative Positive Selection® technology goes beyond foundational CDR capabilities to serve as an API-first Content Disarm and Reconstruction-as-a-Service (CDRaaS). With Positive Selection® technology, Votiro is able to disarm all files of hidden known...
Fieldprint, Inc. provides full-service, nationwide electronic fingerprint collection and processing; Form I-9 Section 2 Completion; Badge Photography and Processing; and Fitness Determination and Adjudication. Fieldprint is the sister-company of Vertical Screen, Inc., a family of leading applicant screening companies, founded in 1989.
Truffle Security is a cybersecurity company that offers open-source and enterprise solutions for finding and remediating leaked software credentials. Our secret-scanning engine, Truffle Hog, identifies and addresses credentials and passwords before hackers are able to find and exploit them. Detecting these credentials early allows companies to take proactive measures to protect sensitive data. When we founded Truffle Security Co in...
Utility Bellhop is a no-cost service that researches and connects all home utilities including Home Security, Electricity, Water, Nat Gas, TV, and Internet. We exist to help consumers save money on their home services and save time on the connection of all home services, as well!
Cycode is an application security software vendor. Our complete AppSec platform provides visibility across the SDLC, including tooling, configurations, activity, risk, and more. We prevent breaches with secrets scanning, code leak detection, SCA, and SAST. Our knowledge graph finds things missed by other tools by connecting and correlating data from across the entire SDLC. We are an RSA innovation sandbox...
Transcend is a privacy platform that empowers brands to enhance regulatory stances for the laws of tomorrow and improve customer relationships through respectful and compliant data transparency, consent, and control.
Engineering teams today move fast, and security teams need to rethink the way they work with dev teams. It’s time to revolutionize the way Security, Dev and DevOps teams work together to supercharge security at the speed of engineering
Veza is the authorization platform for data security. Designed for hybrid, multi-cloud environments, Veza enables organizations to easily understand, manage and control who can and should take what action on what data. We empower customers to leverage the power of authorization for an identity-first approach to security, addressing critical business needs tied to managing access governance, data lake security, cloud...
Work Your Passion. Live Your Purpose.