Top San Jose, CA Cybersecurity Companies (37)
Build what’s next — with tech that matters PwC provides professional services across Audit and Assurance, Advisory and Tax — powered by a global network of over 370,000 people in 149 countries. You may know us for our business expertise, but technology is core to how we help clients move faster, build trust and deliver meaningful outcomes. As a technologist, you’ll work...
Improving the future and protecting lives is an ambitious mission, but it’s what we do. As a leading aerospace, defense, and security company, we work together to deliver a full range of products and services for air, land, space, and naval forces, as well as advanced electronics, security, information technology solutions and customer support services. How we work is rooted...
RedSeal—through its cloud security solution and professional services —helps government agencies and Global 2000 companies measurably reduce their cyber risk by showing them what’s in all their network environments and where resources are exposed to the internet. Only RedSeal’s award-winning cloud security solution can bring all network environments—public clouds, private clouds, and on-premises— into one comprehensive, dynamic visualization. RedSeal verifies...
SonicWall has been fighting the cyber-criminal industry for over 25 years defending small, medium-size businesses and enterprises worldwide. Backed by research from the Global Response Intelligent Defense (GRID) Threat Network, our award-winning real-time breach detection and prevention solutions, coupled with the formidable resources of over 10,000 loyal channel partners around the globe, are the backbone securing more than a million...
Stellar Cyber Open XDR platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to successfully secure their environments. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering a 20X improvement in MTTD and an 8X improvement...
Druva delivers data protection and management for the cloud era. Druva Cloud Platform is built on AWS and offered as-a-Service; customers drive down costs by over 50 percent by freeing themselves from the burden of unnecessary hardware, capacity planning, and software management.
DuploCloud offers an end-to-end DevOps software platform for dev teams that don’t have dedicated DevOps engineers and augments those that do. The platform automates the provisioning of your application to the cloud (AWS, GCP, Azure), integrating cloud ops, DevOps, and security/compliance with 24x7 monitoring and support. The software runs in your cloud account and is accessed thru our UI, Terraform...
As the world’s leading provider of cloud-based software and security solutions purpose-built for delivery by managed service providers (MSPs), Datto believes there is no limit to what small and medium businesses (SMBs) can achieve with the right technology. Datto’s proven Unified Continuity, Networking, and Business Management solutions drive cyber resilience, efficiency, and growth for MSPs. Delivered via an integrated platform, Datto’s...
As the global AI and cybersecurity leader, Palo Alto Networks (NASDAQ: PANW) is dedicated to protecting our digital way of life via continuous innovation. Trusted by more than 70,000 organizations worldwide, we provide comprehensive AI-powered security solutions across network, cloud, security operations and AI, enhanced by the expertise and threat intelligence of Unit 42. Our focus on platformization allows enterprises...
Vectra® is the leader in threat detection and response – from cloud and data center workloads to user and IoT devices. Its Cognito® platform accelerates threat detection and investigation using AI to enrich network metadata it collects and stores with the right context to detect, hunt and investigate known and unknown threats in real time. Vectra offers four applications on...
Forescout Technologies, Inc. actively defends the Enterprise of Things by identifying, segmenting and enforcing compliance of every connected thing. Fortune 1000 companies trust Forescout as it provides the most widely deployed, enterprise-class platform at scale across IT, IoT, and OT managed and unmanaged devices. Forescout arms customers with more device intelligence than any other company in the world, allowing organizations...
Enea is a world-leading specialist in software for telecom and cybersecurity. The company’s cloud-native solutions connect, optimize, and secure services for mobile subscribers, enterprises, and the Internet of Things. More than 100 communication service providers and 4.5 billion people rely on Enea technologies every day. Enea has strengthened its product portfolio and global market position by integrating a number of...
Lacework is the data-driven security platform for the cloud. The Lacework Polygraph Data Platform automates cloud security at scale so our customers can innovate with speed and safety. Only Lacework can collect, analyze, and accurately correlate data across an organization’s AWS, Azure, GCP, and Kubernetes environments, and narrow it down to the handful of security events that matter. Customers all...
Since 1993, EPAM Systems, Inc. (NYSE: EPAM) has used its software engineering expertise to become a leading global provider of digital engineering, cloud and AI-enabled transformation services, and a leading business and experience consulting partner for global enterprises and ambitious startups. We address our clients’ transformation challenges by fusing EPAM Continuum’s integrated strategy, experience and technology consulting with our 30+...
Malwarebytes believes that when people and organizations are free from threats, they are free to thrive. Founded in 2008, Malwarebytes CEO Marcin Kleczynski had one mission: to rid the world of malware. Today, that mission has expanded to provide cyberprotection for every one. Malwarebytes provides consumers and organizations with device protection, privacy, and prevention through effective, intuitive, and inclusive solutions...
Serving thousands of enterprise customers around the world including 45% of Fortune 500 companies, Zscaler (NASDAQ: ZS) was founded in 2007 with a mission to make the cloud a safe place to do business and a more enjoyable experience for enterprise users. As the operator of the world’s largest security cloud, Zscaler accelerates digital transformation so enterprises can be more...
Break free from the conventional cybersecurity mindset. Instead, consume 1 evergreen platform that’s backed by 24x7 security operations and includes continuous incident response—all delivered under your brand. With WhiteDog, you’ll not only have a partner who has your back, you’ll never have to buy another security tool. We curate and manage a composable tech stack that’s comprised of best-in-class tools....
Persistent Systems is a leading provider of digital transformation services, offering innovative solutions tailored to various industries worldwide. With a robust global presence, they deliver cutting-edge services in product engineering, digital strategy, and data analytics, helping businesses thrive in today's rapidly evolving landscape. From healthcare and financial services to retail and manufacturing, Persistent Systems empowers organizations across diverse sectors to...
Axiado is a leading hardware-anchored platform security solutions company deploying a novel, AI-driven approach to platform security against ransomware, supply chain, side-channel, and other cyberattacks in the growing ecosystem of cloud data centers, 5G networks, and other disaggregated compute networks. We offer a new processor called the Trusted Control/Compute Unit (TCU) that redefines security from the ground-up. Its hardware-anchored and AI-driven...
iCrypto enables organizations to eliminate risks such as Identity Theft, Access Breaches, Data Breaches, Ransom Attacks, and more, while enforcing compliance through a low friction patented mobile-centric technology leveraging device/network biometrics and tokenized identity. Providing true biometrically-tied identity of participants in any workflow, and being able to hold them accountable, is key to ensuring trust and creating certainty of whom...



































