Top Phoenix, AZ Cybersecurity Startups (1,035)
Since 2015, Immuta has given Fortune 500 companies and government agencies around the world the power to put their data to work – faster and more safely than ever before. Our platform delivers data security, governance, and continuous monitoring across complex data ecosystems – de-risking sensitive data at enterprise scale. From BI and analytics, to data marketplaces, AI, and whatever...
LogicManager believes performance is a result of effective risk management. Our ERM software and top-rated customer experience help organizations manage surprises before they happen - ensuring a positive impact on the organization and community at large. But don’t just take our word for it; we're proud to be a certified Great Place to Work® every year since 2017!
Closinglock is the trusted platform for securing and streamlining real estate transactions. Working with title companies and law firms nationwide, it protects what truly matters: their clients, their funds, and their hard-earned reputation. Closinglock brings the entire workflow into one secure space—from ID verification and wire instructions to payments and eSigning. This means users can close deals faster, with total...
Nisos is the human risk management company specializing in unmasking threats before they escalate. We are a trusted advisor who operates as an extension of security, intelligence, legal, and human resource teams to protect their people and business. Our intelligence-led solutions help enterprises make critical decisions, manage human risk, and drive real world consequences for digital threats. For more information,...
At UncommonX, we believe organizations need more than alerts —they need context, prioritization, and insight. That’s why we’re rethinking cybersecurity from the ground up. Our AI-powered Exposure Management platform delivers complete visibility across networks—on-prem, cloud, OT, IoT, and beyond—without deploying agents or disrupting operations. We call it hyperconverged security: a smarter, unified approach that combines asset discovery, vulnerability management, threat intelligence,...
Deepening the Science of Security Founded in 2012 by 3 expert hackers with no investment capital, Trail of Bits is the premier place for security experts to boldly advance security and address technology’s newest and most challenging risks. It has helped secure some of the world's most targeted organizations and devices. Our combination of novel research with practical solutions reduces the...
We're building a next-generation cyber risk platform that empowers security and business leaders to make more informed decisions about their cybersecurity program. Our platform, Axio360, allows security teams to capture and quantify their cyber risks in dollar terms, which helps business leaders prioritize and plan cybersecurity initiatives and investments. Some of the largest energy, critical infrastructure, and financial services companies...
Invoice Home is a billing and invoicing service for small businesses and freelancers seeking to grow their business or start a new one! We offer simplistic services and tools with over 100 customizable templates, where you can add your business logo and signature. We offer a desktop version for behind your screens while at home or in your office but...
CertifID helps to create a world without wire fraud. Started after our co-founder was hit by fraud – we’re the only company dedicated to fighting fraud for the real estate industry with an identity verification SaaS platform, insurance, and proven recovery services. CertifID helps safeguard billions of dollars every month from fraud and provides peace of mind with direct insurance...
Hiro is a company that creates developer tools for Stacks, a network that enables apps and smart contracts for Bitcoin. As a core entity within the Stacks Ecosystem, Hiro works alongside various independent entities, developers, and community members to establish a user-owned internet on Bitcoin. Hiro provides developers with the tools to innovate and build on Bitcoin in ways previously...
FusionAuth builds software for developers needing to add authentication to their software products. It's a big problem - every application needs authentication, but building it yourself is a complex distraction. We distribute our free Community software through word-of-mouth reputation to software developers worldwide. We nurture and support the software development communities, taking their input to give "Devs" the features they...
Kivu combines technical and legal expertise to deliver investigative, discovery and forensic solutions worldwide. Kivu’s digital forensic investigators are experienced in protecting organizations against compromise of data, theft of trade secrets and unauthorized access to data. Our qualifications include forensic certifications (Encase Certified EnCE, SANS GCIH Incident Handlers, Certified Ethical Hackers, and reverse malware experts); IT certifications (Certified Information Systems...
Horizon3.ai's mission is to help you find and fix attack vectors before attackers can exploit them. NodeZero, our autonomous penetration testing solution, enables organizations to continuously assess the security posture of their enterprise, including external, identity, on-prem, IoT, and cloud attack surfaces. Like APTs, ransomware, and other threat actors, our algorithms discover and fingerprint your attack surface, identifying the ways...
The Ellington Cyber Academy (ECA) is an educational platform offering SIEM and SOAR programs for entry-to-junior-level IT and cybersecurity professionals building a career in the field of cybersecurity. We are an affordable option for end-to-end SIEM and SOAR training. While accepted students will receive all of the knowledge required to take specialized certification exams after completing an ECA program, ECA is...
Binalyze is an innovator in Investigation and Response Automation. With evidence collected, our Timeline, Triage, and Drone features help you to collaborate and complete incident response investigations quickly and dramatically reduce dwell time. AIR saves you time, reduces cybersecurity operational costs, and helps you prevent the financial and reputational losses associated with cyber attacks.
SOURCEWORX provides IT solutions that are tailored to suit the unique needs of any organization. With over 16 years of experience in the ICT Industry, our expertise lies in analysing, identifying, solving, and effectively managing various business challenges. Our approach is centered around comprehensively understanding your ICT landscape and combine this understanding with our extensive expertise to develop custom-made solutions....
Keyavi solves today's cybersecurity problems by making data self-protecting, intelligent and self-aware, so that it can protect itself immediately, no matter where it is or who is attempting access.
Teleskope automates the protection of your most important asset: data. Existing tools leave your data exposed, with inaccurate classification, excessive false positives, and no remediation support. Built by security engineers to fill this gap, Teleskope automates data protection – from detection to remediation and prevention. Teleskope provides full visibility into your security posture, discovering your data across cloud, on-prem, and third-party...
Founded in 2003, VariQ is a multiple award-winning company delivering Cybersecurity, Cloud and Software Development services to 20+ federal, state and local government departments and agencies. Headquartered in Rockville MD, VariQ is a premier end-to-end IT services integrator that that emphasizes innovation, quality, and professional excellence in the delivery of advanced technology systems that it modernizes, integrates, and sustains for...
Proficio is a world-class Managed Security Service Provider (MSSP) providing managed detection and response solutions, 24×7 security monitoring and advanced data breach prevention services to organizations globally. Our rapid growth is being fueled by the rise in cloud-based services, the acceptance of the Software-as-a-Service (SaaS) model, and the increasing number of cyber security attacks on businesses, hospitals and government. We...