Top Massachusetts Security Startups (46)
Since 2015, Immuta has given Fortune 500 companies and government agencies around the world the power to put their data to work – faster and more safely than ever before. Our platform delivers data security, governance, and continuous monitoring across complex data ecosystems – de-risking sensitive data at enterprise scale. From BI and analytics, to data marketplaces, AI, and whatever...
LogicManager believes performance is a result of effective risk management. Our ERM software and top-rated customer experience help organizations manage surprises before they happen - ensuring a positive impact on the organization and community at large. But don’t just take our word for it; we're proud to be a certified Great Place to Work® every year since 2017!
Voatz is on a mission to make it safer and more accessible for people to participate in democracy. Backed by military grade technology, Voatz makes it possible and secure to vote from a smartphone. Voatz can be used in all kinds of voting events, including overseas citizen absentee voting, state political party conventions, town hall meetings, university student government elections, professional...
At every moment, organizations need to know every identity, its access reach and its entitlement scope, so that they can change the system, be adaptive and fast without any impact to ongoing operations. Rezonate - Built for security, loved by DevOps
For over a decade, our customers' needs have sculpted our SmartWall ONE DDoS protection platform. From just DDoS detection to offering DDoS protection-as-a-service, we meet you exactly where you are, providing precisely the protection you need. We believe no customer should alter their environment for a vendor; instead, we flexibly mold our robust, automatic, on-prem solutions to safeguard your business...
Security teams use OX to prioritize developer resources by finding and fixing the 5% of issues that matter. OX proprietary technology consolidates security intelligence better than anyone on the market today. With OX you can improve appsec security posture without slowing down development, consolidate existing tooling into actionable insights and remediate issues with minimal back and forth
Randori, an IBM Company is your trusted adversary. Recognized as a leader in offensive security, Randori, an IBM Company combines attack surface management (ASM) and continuous automated red teaming (CART) in a single unified platform to provide a continuous, proactive, and authentic offensive security experience. Relied upon by Meijer, Greenhill Inc, FirstBank, NOV, Lionbridge and many more, Randori helps companies...
DFLabs IncMan is the pioneering Security Automation and Orchestration platform to manage, measure and orchestrate security operations tasks including security incident qualification, triage and escalation, threat hunting & investigation and threat containment.
TrustCloud makes it effortless to respond to security questionnaires, confidently share your security and compliance program with customers, and complete compliance certifications by automating your program with APIs, using AI to reduce manual work, and testing your controls and policies to achieve continuous compliance and earn trust
Upnine is a comprehensive managed service company with programs designed for Mission Critical Integrated Physical Security, Networking, IOT & Edge, and Wireless Connectivity platforms to stay on top of system health and prevent problems before they happen. Focusing on day-to-day management and professional services for our clients ecosystems across a broad range of compliance and safety-driven verticals throughout North America....
Pointr is a global leader in indoor location. Pointr technology uses machine-learning techniques to create the best performing and the most scalable indoor location technology available today. Pointr Maps platform enables location-based services such as digital mapping, navigation, location tracking, geofencing, and powerful location-based analytics. Pointr’s information security is ISO 27001 and ISO 27017 certified and approved by Cisco, Microsoft,...
Komand is the fastest way to add automation to your security operations, no code required. Simply integrate your tools, build automated workflows, and utilize human decision points to accelerate incident response and move security initiatives forward, faster.
At Root.io, we automate container vulnerability management through intelligent patching that doesn't require rebuilds or rebasing. Our platform enables security and development teams to effectively manage vulnerabilities without slowing down deployments. How Root.io transforms container security: - Instant vulnerability patching without container rebuilds - Automated triage that eliminates false positives - Clear maturity metrics to track security progress - Native integration with existing CI/CD workflows -...
With record-setting numbers of air travelers passing through airport security checkpoints, the opportunity for threats to make their way onto an airplane has increased significantly. Single- and dual-view X-ray systems lack useful automated explosive detection algorithms, and the image quality limits a screener’s ability to visually see and identify threats without divestiture of electronics and liquids. Recognizing the need to...
HYPR is the leader in Passwordless Multi-factor Authentication (MFA). We protect workforce and customer identities with the highest level of assurance while enhancing the end users’ experience. Our approach shifts the economics of attack and risk in the enterprises' favor by replacing password-based MFA with Passwordless MFA. With HYPR, customers can finally enable cross-platform desktop MFA, stop phishing, and reduce fraud...
Risk Management and Security Engineering Consultants, using data to drive risk management decisions.
Threat Stack is the leader in cloud security & compliance for infrastructure and applications, helping companies securely leverage the cloud with proactive risk identification, real-time threat detection through the powerful combination of the Threat Stack Cloud Security Platform® and the Threat Stack Cloud SecOps Program℠.
Patented smart contract engine for blockchain agnostic distributed ledger platform
We are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers that since 2014 share the same dream: make technology a safer place. Every day, we work side by side with our customers to help them safely navigate digital opportunities, while growing their business. And we do it with passion, determination, and constant curiosity about the unexpected. Our purpose...
The fear of cyber threats should never stand in the way of digital greatness. That is why we are changing the fundamentals of how cyber security works. We collaborate with ethical hackers to build a powerful platform that automates and scales crowdsourced vulnerability research. For us, security is not just about protecting what you have, but more so a tool...






















.jpeg)









