Top New York Security Startups (91)
Authorization controls who has access to what in an app. It’s a problem as old as computers, and it turns out, it’s a hard problem. At Oso, we help our customers build features to meet enterprise requirements, like fine-grained access controls or custom roles and permissions. We also provide the tools needed to build the next generation of secure, permissions...
Deepening the Science of Security Founded in 2012 by 3 expert hackers with no investment capital, Trail of Bits is the premier place for security experts to boldly advance security and address technology’s newest and most challenging risks. It has helped secure some of the world's most targeted organizations and devices. Our combination of novel research with practical solutions reduces the...
Eternal Encryption. In an age of escalating cyberespionage, robust encryption protocols have never been more important. Current encryption methods rely on vulnerable and archaic technologies, which will be rendered obsolete by the rise of quantum computers and associated scientific advances. Qrypt’s encryption solution can secure an enterprise today and eliminate future risk; it is the only algorithm mathematically proven to be unbreakable,...
IT is the undercurrent of the business world. It’s how companies onboard employees, support collaboration, protect security and serve customers. Businesses run better when company devices, networks, and applications work like a dream. But most IT services were built for a different time, when hybrid and remote work weren’t the norm — and security risks weren’t quite as high as they...
Apiiro empowers application security and development teams from companies like BlackRock, Morgan Stanley, Rakuten, and Colgate with complete visibility and actionable context from deep code analysis and runtime intelligence they need to save time prioritizing alerts, fixing and preventing real risks across their modern applications and software supply chains, so they can deliver secure applications to the cloud. ✅ RSA Innovation...
DataDome’s cyberfraud protection stops attacks with unparalleled accuracy and zero compromise. Our platform, powered by multi-layered machine learning, analyzes 5 trillion signals daily and adapts to and scans every request in real-time—seamlessly protecting your websites, mobile apps, and APIs against account fraud, ad fraud, payment fraud, credential stuffing, scraping, and more. Leading enterprises trust DataDome, including Foot Locker, Tripadvisor, and...
Fivesky provides advanced technologies to unleash an organization's ability to achieve their highest goals. We live for designing, deploying and maintaining networks, their security, and virtualization - we're great at it. Our strong technical expertise, along with our deep industry insights empowers successful business transformation while reducing OpEx costs. Your trusted advisor for Cloud Integration, Security, Automation & Virtualization. What makes...
Pliancy specializes in providing end-to-end IT solutions and ongoing support for today's highest-executing Capital Management and Life Sciences organizations. We are located in New York, San Francisco, Palo Alto, South San Francisco, San Diego, Austin, TX, and Boston, MA
The Linx Identity Security platform enables identity, security, and IT ops teams to finally control the whole identity lifecycle. A radical departure from legacy identity security solutions, Linx untangles the complex, ever-evolving web of identity security. Integrating smoothly with your IAM stack, Linx pulls together all your organization’s identity data—organizing it neatly to reveal the hidden links between your employees,...
Nagomi automates the process of proving your security is actually working. Our platform unifies data across your assets, defenses, and threats to clearly illustrate your security program is both efficient and effective to key stakeholders. By maximizing existing investments, reducing threat exposure, and improving alignment, Nagomi is the only Proactive Defense Platform to turn cybersecurity from a technical cost center...
Stytch is the most powerful identity platform built for developers. By powerful, we mean: **Comprehensive:** Stytch has everything you need to identify, authenticate, and manage your users, including fraud prevention tools like device fingerprinting. **Adaptable:** Stytch is the only auth provider that enables you to build directly with our APIs or our suite of SDKs, so you can deliver the ideal experience...
HYPR is the leader in Passwordless Multi-factor Authentication (MFA). We protect workforce and customer identities with the highest level of assurance while enhancing the end users’ experience. Our approach shifts the economics of attack and risk in the enterprises' favor by replacing password-based MFA with Passwordless MFA. With HYPR, customers can finally enable cross-platform desktop MFA, stop phishing, and reduce fraud...
Kasada is the most effective and easiest way to defend against advanced persistent bot attacks across web, mobile, and API channels. With Kasada, trust in the Internet is restored by foiling even the stealthiest cyber threats, from credential abuse to data scraping. The solution invisibly stops automated threats while inflicting financial damage to attackers, destroying their ROI. With the ability...
Teleskope is redefining data security for the AI era with the industry’s first agentic platform that combines precise visibility with automated remediation. Teleskope autonomously scans, catalogs, and classifies data in motion and at rest while automating remediations that understand and adapt to each organization’s unique risk profile, enabling security teams to manage data sprawl proactively while securely enabling AI adoption....
At Myriad, we bring together big-picture thinking and flawless execution to unlock the power of technology for you. Our team of expert engineers, architects, project managers, and logistics specialists know technology inside and out—and every aspect of your business. Armed with this deep knowledge and an agile, rigorous approach, we’re able to deliver the best solutions for your organization. To...
Baselayer empowers over 2,000 financial institutions and government agencies to trust the small and medium-sized businesses they serve. We use proprietary machine learning to search government records, the web, and private databases to answer questions about Compliance, Risk, or Fraud about any business in the United States. Our solution suite includes tools for identity verification (Know Your Business), enhanced due diligence,...
Sonrai Security is a rapidly growing venture-funded Saas cloud security company with over a 300% increase in revenue-customer logos and a 67% growth in employees. It is named a 2021 Gartner Cool Vendor and has offices in New York and New Brunswick, Canada. It recently secured $50M Series C funding and is backed by Menlo Ventures, Polaris Partners, TenEleven Ventures,...
Sentra is the global leader in cloud-native data security for the AI era. The company’s mission is to empower organizations to confidently scale their data operations across multi-cloud and on-premises environments while leveraging the power of AI without compromising security. Sentra ensures data is secured no matter where it travels by automatically detecting vulnerabilities, misconfigurations, over-permissions, unauthorized access, data duplication and...
Oasis is the market leading platform for non-human identity management. Our mission is to fortify cybersecurity defenses by enabling enterprises to efficiently secure non-human identities throughout their lifecycle. The shift to hybrid multi-cloud, microservices, agile development and AI-driven business process automation has led to the exponential growth of non-human identities, completely changing the identity fabric of enterprise environments. We created...
Security teams use OX to prioritize developer resources by finding and fixing the 5% of issues that matter. OX proprietary technology consolidates security intelligence better than anyone on the market today. With OX you can improve appsec security posture without slowing down development, consolidate existing tooling into actionable insights and remediate issues with minimal back and forth

.jpg)









.jpg)






.png)













