Top Massachusetts Security Startups (46)
LogicManager believes performance is a result of effective risk management. Our ERM software and top-rated customer experience help organizations manage surprises before they happen - ensuring a positive impact on the organization and community at large. But don’t just take our word for it; we're proud to be a certified Great Place to Work® every year since 2017!
We are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers that since 2014 share the same dream: make technology a safer place. Every day, we work side by side with our customers to help them safely navigate digital opportunities, while growing their business. And we do it with passion, determination, and constant curiosity about the unexpected. Our purpose...
Videray Technologies exists to create a safer society across the globe. We have created the world’s most powerful, user-friendly, and portable Handheld Backscatter X-ray Imager to help our clients see through surfaces to detect potential threats. Our technology is already making progress on this mission domestically and internationally in over 90 countries.
Security teams use OX to prioritize developer resources by finding and fixing the 5% of issues that matter. OX proprietary technology consolidates security intelligence better than anyone on the market today. With OX you can improve appsec security posture without slowing down development, consolidate existing tooling into actionable insights and remediate issues with minimal back and forth
Zenity is the first security and governance platform purpose-built for AI agents - spanning SaaS, home grown platforms (Cloud), and end-user devices (Endpoint). Trusted by Fortune 500 enterprises, Zenity helps security teams confidently adopt AI by delivering defense in depth with full-lifecycle coverage: from agent discovery and posture management to real-time detection, prevention, and response. As enterprises adopt Microsoft Copilot,...
At Root.io, we automate container vulnerability management through intelligent patching that doesn't require rebuilds or rebasing. Our platform enables security and development teams to effectively manage vulnerabilities without slowing down deployments. How Root.io transforms container security: - Instant vulnerability patching without container rebuilds - Automated triage that eliminates false positives - Clear maturity metrics to track security progress - Native integration with existing CI/CD workflows -...
Built on the OpenTitan open-source silicon root of trust project, zeroRISC is the first commercial cloud security service for silicon that delivers transparency and trustworthiness for data centers and ICS/OT, IoT and edge devices. The zeroRISC platform is the only all-in-one drop-in silicon, software and services solution that delivers trustworthy, cloud-based secure device management below the operating system, while making...
For the security practitioner caught between rapidly evolving threats and demanding executives, IANS Research is a clear-headed resource for decision-making and articulating risk. We provide experience-based security insights for Chief Information Security Officers and their teams. The core of our value comes from the IANS Faculty, a network of seasoned practitioners. We support client decisions and executive communications with Ask-an-Expert...
Your personal information is available for public consumption. This makes you–and the organization you work for–an easy target for abuses ranging from identity theft, robocalls, and spam texts to social engineering, and executive and employee threats. DeleteMe removes unwanted instances of personal information from online sources; making it simple for our customers to keep their personal data from being used...
Guardsquare offers the most complete approach to mobile application security on the market. Built on the open source ProGuard technology, Guardsquare’s software integrates seamlessly across the development cycle. From app security testing to code hardening to real-time visibility into the threat landscape, Guardsquare solutions provide enhanced mobile application security from early in the development process through publication. More than 900 customers...
Push is a browser-based identity security platform that hardens and monitors your identity attack surface. Turn every employee's browser into a telemetry source and control point for defending workforce identities to prevent account takeover at scale. Security teams can monitor and secure their entire identity attack surface (ISPM) and detect and block identity-based attacks (ITDR) such as advanced phishing techniques. Push...
Founded in 2015 by experts from the U.S. Cyber Command and MIT’s Lincoln Laboratory, SimSpace combines the highest-fidelity, military-grade cyber ranges and training content with unique user and adversary emulation techniques. By providing team and individual training exercises, attack simulations, mission rehearsals, and product evaluations that leverage its cyber range, the SimSpace Cyber Force Platform delivers quantitative and actionable insights into...
Cobalt’s Pentest as a Service (PtaaS) platform is modernizing traditional pentesting. By combining a SaaS platform with an exclusive community of testers, we deliver the real-time insights you need to remediate risk quickly and innovate securely.
HYPR is the leader in Passwordless Multi-factor Authentication (MFA). We protect workforce and customer identities with the highest level of assurance while enhancing the end users’ experience. Our approach shifts the economics of attack and risk in the enterprises' favor by replacing password-based MFA with Passwordless MFA. With HYPR, customers can finally enable cross-platform desktop MFA, stop phishing, and reduce fraud...
DFLabs IncMan is the pioneering Security Automation and Orchestration platform to manage, measure and orchestrate security operations tasks including security incident qualification, triage and escalation, threat hunting & investigation and threat containment.
WTG enables our clients to innovate and transform their businesses by realizing the benefits of threat and vulnerability management, hyper-converged, software-defined, hybrid cloud infrastructure frameworks, and more. We provide expertise in the areas of server, storage, cloud, networking, security, virtualization, hyper-convergence, data protection technologies, and more. Our professional services team has over 100 years of combined experience. They have expertise with...
Mule Force is a cybersecurity company based in Boston, MA that specializes in securing business networks, websites and devices. Our services include penetration testing, vulnerability assessment , policy creation and website security and maintenance.
For over a decade, our customers' needs have sculpted our SmartWall ONE DDoS protection platform. From just DDoS detection to offering DDoS protection-as-a-service, we meet you exactly where you are, providing precisely the protection you need. We believe no customer should alter their environment for a vendor; instead, we flexibly mold our robust, automatic, on-prem solutions to safeguard your business...
Patented smart contract engine for blockchain agnostic distributed ledger platform
Threat Stack is the leader in cloud security & compliance for infrastructure and applications, helping companies securely leverage the cloud with proactive risk identification, real-time threat detection through the powerful combination of the Threat Stack Cloud Security Platform® and the Threat Stack Cloud SecOps Program℠.





























.jpg)


