Explore Top Tech Companies
All Filters
Location

Remote jobs

Industry

DEI

Tech Stack

Perks

Size

Top Tech Companies (766)

Don't see your company?

Create a company profile
Cloud • Information Technology • Consulting • Cybersecurity
Maitland, FL, US
21 Employees

OrLANtech is a Managed Service Provider (MSP) that was founded in 1995 and is now the market leader in delivering Technology-as-a-Service to small and medium size businesses (SMB) in the central Florida area. Our purpose is to make technology work for business by radically improving the economics and delivery mechanism of technology for the SMB using our TotalCare solutions. Our fixed-fee portfolio of services includes network security, monitoring and management, end-user help desk, on-site engineer services, cloud solutions, PCI/HIPAA compliance, business continuity and disaster recovery, telecommunications (VoIP) and infrastructure supply and support. We want to help local businesses grow and move forward by taking the stress of IT management off of their plate. Don't worry, be happy!


Information Technology • Mobile • Software • Consulting • Cybersecurity
Columbia, MD, US
8 Employees

In this rapidly evolving digital age, Pumex Computing helps businesses develop customized, process-driven, and end-to-end software solutions that help them stay ahead of the curve and gain a competitive edge. Our team is composed of highly-skilled and passionate engineers who aim to offer nothing less than excellence in every project we produce. We put our customers' needs first. We focus on the design, development, and deployment of cost-effective and scalable solutions that fit the unique goals and objectives of any organization. With up-to-date expertise in a vast variety of technical specialties, Pumex offers a broad range of software development and consultation services, including but not limited to the following. Agile app prototyping Agile consulting Agile development Appian development Artificial Intelligence (AI) AWS integration Azure integration Business intelligence services Cloud managed services Cloud migration Cloud solutions Cross-platform app development cross-platform web development Custom app development Cybersecurity Data analytics Data cleansing Data ETL Data integration Data management Data migration Data mining solutions Data services Data warehousing DevSecOps consulting Drupal development Federal government IT solutions Federal technology consulting Federal technology solutions Hybrid app development Infrastructure Architecture Design Intuitive web development IT consulting IT project management services IT staffing services IT staffing solutions Kentico Development Location Intelligence (LI) solutions Low-code and no-code BI development Machine Learning Malware investigations Managed IT solutions Managed IT support services Mobile app development Mobile BI solutions and development Native app development .NET consulting .NET development Online analytical processing (OLAP) Open-source BI solutions Operational Intelligence (OI) Salesforce app development Salesforce consulting


Software • Consulting • Cybersecurity
Nashville, TN, US
201 Employees

Today, with over 400 customers utilizing our consulting services, managed services, and IRM|Pro® software, Clearwater has become the gold standard in healthcare cybersecurity, risk management and HIPAA compliance solutions. We are honored to be frequently referred and recommended by major healthcare law firms, private equity professionals, and other well-respected consulting organizations. As the trusted solution provider of over 60 health systems, numerous large scale physician practice management groups, and dozens of rapidly growing digital health companies, we bring unmatched experience to every partnership and engagement. Clearwater has been named Best in KLAS for Cybersecurity Advisory Services by its customers and was recently rated as a top performer in a 2021 KLAS Research report reviewing market perceptions vs. client reality in the Security and Privacy Consulting Services market. In addition, Clearwater has been named the top Compliance and Risk Management solution provider in Black Book Market Research’s annual survey of the healthcare industry the past four years in a row, 2017, 2018, 2019, and 2020. We are a frequent presenter and educator to industry organizations including CHIME, HIMSS, ASHRM, AHLA and AEHIS.Today, with over 400 customers utilizing our consulting services, managed services, and IRM|Pro® software, Clearwater has become the gold standard in healthcare cybersecurity, risk management and HIPAA compliance solutions. We are honored to be frequently referred and recommended by major healthcare law firms, private equity professionals, and other well-respected consulting organizations. As the trusted solution provider of over 60 health systems, numerous large scale physician practice management groups, and dozens of rapidly growing digital health companies, we bring unmatched experience to every partnership and engagement. Clearwater has been named Best in KLAS for Cybersecurity Advisory Services by its customers and was recently rated as a top performer in a 2021 KLAS Research report reviewing market perceptions vs. client reality in the Security and Privacy Consulting Services market. In addition, Clearwater has been named the top Compliance and Risk Management solution provider in Black Book Market Research’s annual survey of the healthcare industry the past four years in a row, 2017, 2018, 2019, and 2020. We are a frequent presenter and educator to industry organizations including CHIME, HIMSS, ASHRM, AHLA and AEHIS.


Software • Cybersecurity
Elizabethtown, KY, US
205 Employees

Venminder is an industry recognized leader of third-party risk management solutions. Dedicated to third-party risk, the company is the go-to partner for software, high-quality assessments on vendor controls, certified subject-matter expertise and education. Venminder’s platform provides a centralized location to execute a third-party risk management program. It enables users to store documentation, onboard a vendor, track contracts, manage SLAs, send and manage questionnaires, manage due diligence and oversight, complete risk assessments, create workflows, run reporting and more. Assessments performed by Venminder’s qualified experts, including CISSPs, CPAs, financial risk analysts, paralegals and more, are readily available in an online library. The assessments enable clients to identify possible risks and understand areas of strength on their vendors’ information security and privacy standards, SOC reports, financial viability, business continuity/disaster recovery preparedness, contractual standards, regulatory compliance and more. Venminder clients also use the firm to streamline due diligence processes by outsourcing vendor document collection; and regularly consult with Venminder’s experts to ensure their third-party risk management policy and procedures meet industry standards. The Venminder platform is used by 1,000+ customers across a wide range of industries to execute their third-party risk management programs. As the company’s solutions are designed to accommodate growth and various levels of program maturity, customers range in size from small to Fortune 100 organizations. As the industry’s go-to leader, Venminder’s team of highly experienced professionals regularly speak at conferences, provide the latest research and educational content, host CPE credit eligible webinars and provide access to an online networking community for third-party risk professionals, Third Party ThinkTank. #thirdpartyrisk #vendorrisk #supplierrisk #vendormanagement


Hardware • Software • Cybersecurity
Fallbrook, CA, US
47 Employees

Industrial IoT Cybersecurity breaches and threats are alarmingly increasing in frequency and complexity. These cybersecurity challenges coupled with the no increase in the internet flow of information is creating a widening gap in the ability of internally skilled resources to respond. This gap is causing tremendous risks, losses and negatively impacting organizations. Palmchip Industrial IoT cybersecurity solutions and services focuses on filling the gap one organization at a time by simplifying cybersecurity complexity, and keeping organizations secure and more productive. VISION/MISSION:To improve and enhance quality of life by creating leading edge and wide reaching technologies and solutions. To create Happiness technologies and solutions for a connected and secure world. OVERVIEW: 1996, Palmchip is a pioneer in System on a Chip (SoC) hardware, firmware and software. 2000, Palmchip introduced Single Chip (SoC) Platform and Intellectual Properties (IP) with built-in security powered over 1.5 Billion Network Security, Storage, Telecom, Wireless, IoT, Powergrid and WiFi devices to-date. 2009, Palmchip extended vertically its offering, to include Custom Mobile and Desktop Application Development for Security, Business Productivity and IoT Applications. 2015, Palmchip expanded its Security offering to include Cyber Security Solutions and Services for Real-Time, data mirroring and data monitoring Cyber Security solutions addressing efficient and custom data protection requirements and challenges facing midsize and small Business to Business and Business. Our Clients are in various domains including Healthcare, Banking, Data Centers and Aerospace. Over 116 licensees and Customers. Palmchip provide Custom Software development for Cyber Security, Storage and Networking to Fortune 1000 companies such as Seagate, Fireye, Maxtor, LSI Logic, WiChorus (Tellabs) and Broadcom to name a few. Email: [email protected], Phone: +1 (951) 760-0300


Information Technology • Cybersecurity
San Antonio, TX, US
52 Employees

SandTech Solutions is a Certified 8a member as well as a Service Disabled Veteran-Owned Small Business (SDVOSB). We provide Cyber Security, Vulnerability Assessments, Penetration Testing as well as a holistic IT approach for your business. Our goal; TO ENABLE SUCCESS! Although we are a young company, we are staffed with sharp individuals with an average experience level of 20 years each working on Information Technology (IT), Cyber, and Telecommunications systems. Our deep understanding of technology and our proven approach to any challenge has helped us develop our client's Defensive Cyber Systems. SandTech Solutions is a Small Disadvantaged Business (SDB) as well as a Texas Historically Underutilized Business (HUB) and has earned certifications from the South Central Texas Regional Certification Agency (SCTRCA) for DIBE, ESBE, HABE, MBE, SBE, VBE.


Cybersecurity
Nashville, TN, US
82 Employees

Conquest Cyber is an elite team of cyber special operators working shoulder to shoulder with critical sector technologists as they stand on the frontline of freedom. The ARMED ATK software and SCyOps elements deliver Integrated Cyber Resiliency Management capabilities. These capabilities negate risk and provide business leadership with context, transparency, and a map from risk to operations.


Information Technology • Cybersecurity
Sarasota, FL, US
23 Employees

We are a small, energetic IT services company. We put our employees first and they obsess about delighting our customers. We are “employee driven…customer focused.” That simple phrase defines our culture and our core values. We provide big company benefits and perks and a small company atmosphere. Farfield provides on-premise advisory and support services in IT, cybersecurity, and informatics. As a certified HubZone and Service-Disabled Veteran Owned Small Business Farfield has carved out a niche as highly desirable small business provider. We have offices in Sarasota, FL and Catonsville, MD supporting customers in MD, the District of Columbia, GA, SC, TX, and WA.


Cybersecurity
Duluth, GA, US
72 Employees

Trenton Systems is a trusted computing innovator providing cybersecure, tactical edge computing solutions to the defense and aerospace industries. Established in 1989 and headquartered in Atlanta, Georgia, the company is a pioneer of made-in-USA computing solutions and has endured firmly and unwaveringly at the forefront of the high-performance computing industry for more than 30 years, designing, manufacturing, assembling, testing, and supporting customer-driven rugged computers that accelerate and underpin the world’s mission-critical programs, applications, and critical infrastructure processes.


Information Technology • Security • Software • Cybersecurity
2 Offices
66 Employees

Stytch is the most powerful identity platform built for developers. By powerful, we mean: **Comprehensive:** Stytch has everything you need to identify, authenticate, and manage your users, including fraud prevention tools like device fingerprinting. **Adaptable:** Stytch is the only auth provider that enables you to build directly with our APIs or our suite of SDKs, so you can deliver the ideal experience to your users – whatever your architecture. **Ready to scale:** With a wide array of auth methods and sophisticated architecture underpinning our infrastructure, Stytch’s infrastructure is built to grow with you as your use cases expand and your needs become bigger and more complex. Whatever your tech stack, whatever your use case, we have the infrastructure and features you need to secure and scale your application. At Stytch, we believe our ultimate success will be determined by two factors: - Building a product that delights both customers and end users - Creating a work environment where everyone thrives These two cannot exist without the other — without a great culture, we won't be able to deliver a great product over the long run; similarly, having a great culture will be fleeting if we don't deliver a product that developers and users love.

Capco Thumbnail
Fintech • Professional Services • Consulting • Energy • Financial Services • Cybersecurity • Generative AI
24 Offices
6000 Employees
Datadog Thumbnail
Artificial Intelligence • Cloud • Software • Cybersecurity
13 Offices
5000 Employees
Nisos Thumbnail
Professional Services • Security • Consulting • Cybersecurity
2 Offices
90 Employees
Cymulate Thumbnail
Information Technology • Sales • Software • Cybersecurity
6 Offices
200 Employees
Invoice Home Thumbnail
Fintech • Information Technology • Mobile • Software • Financial Services • Cybersecurity • SEO
Austin, TX, US
20 Employees
BAE Systems Thumbnail
Aerospace • Hardware • Information Technology • Security • Software • Cybersecurity • Defense
18 Offices
35000 Employees
Cloudflare Thumbnail
Information Technology • Security • Cybersecurity
9 Offices
3300 Employees
CNA Thumbnail
Cloud • Insurance • Professional Services • Analytics • Cybersecurity
Chicago, IL, US
7000 Employees
CrowdStrike Thumbnail
Cloud • Information Technology • Sales • Security • Cybersecurity
33 Offices
10000 Employees

Software • Cybersecurity
Tampa, FL, US
76 Employees

Iron EagleX is an agile customer focused team. We are passionate people solving tough problems and bringing modern technology solutions and practices to our Government customers. We deliver engineering solutions in cloud computing, big data, cyber, and machine learning technologies to modernize and migrate systems to the cloud. We take on and fill advanced operational and mission support gaps and can adjust to requirements while sustaining excellence in execution and performance. We seek out like-minded people to join our thriving team. If you are a creative hard charger, who likes working on challenging problems in a fast-paced mission critical environment, and who is up for multiple challenges and opportunities without drama and obstacles to do your job, please reach out to us. We are interested in discussing how you can join our team.


Cybersecurity
Tampa, FL, US
22 Employees

For 20 years, Securance Consulting has empowered enterprises to assume proactive cybersecurity, compliance, and risk management strategies. Through independent assessments of people, processes, and technology, we identify the technical risks, vulnerabilities, and inefficiencies that hamper business objectives and deliver valuable insights to drive sustainable, lasting change. To ensure that we deliver exceptional results, we staff each project with senior IT consultants, who have decades of experience across multiple industries and disciplines and professional certifications, including: • Certified Information Systems Auditor (CISA) • Certified Information Systems Security Professional (CISSP) • Certified Information Security Manager (CISM) • Certified Internal Auditor (CIA) • Certified Public Accountant (CPA) • Certified Ethical Hacker (CEH) • Certified Business Continuity Professional (CBCP) • Certified HIPAA Professional (CHP) • Global Information Assurance Certifications (GIAC) Securance offers a comprehensive array of services to help clients strengthen their cybersecurity and risk profiles. Our core offerings include: • Business Continuity and Disaster Recovery Planning • Compliance Services • Cybersecurity as a Service (CSaaS) • Cybersecurity Assessments — Network, System, Platform, and Cloud Technologies • IT General Controls Reviews • IT Risk Assessments • IT Strategic Planning • Virtual CISO • Vulnerability Assessments and Penetration Tests


Cybersecurity
Fully Remote, US
5 Employees

https://www.clearvector.com


Information Technology • Professional Services • Security • Cybersecurity
Tucson, AZ, US

Protech Security Systems is a reliable provider of smart security camera systems for both homes and businesses. We offer an extensive range of home security systems, business security cameras, business intercom systems, and more. Our customers choose us because we are licensed and insured; we offer complete design and installation solutions; and we provide free estimates, and competitive pricing. As Tucson's most trusted home and business security company for over 20 years, our smart security solutions ensure that you can efficiently monitor all points of access and run your business smoothly.


Cloud • eCommerce • Enterprise Web • Consulting • Cybersecurity • Defense • Conversational AI
US
25 Employees

Hier klicken um Original Neo Tropfen mit 50%Rabatt beim Hersteller zu bestellen ➡️ https://cutt.ly/8w1EAQKy ⬅️ (Link im Browser kopieren) Gebrauchsanleitung für Neo Tropfen Um die besten Ergebnisse zu erzielen, ist es wichtig, Neo Tropfen korrekt einzunehmen. Hier ist eine Schritt-für-Schritt-Anleitung: Vor der ersten Verwendung Drücken Sie den Sicherheitsverschluss nach unten, um die Flasche zu öffnen. Einnahme der Tropfen Nehmen Sie eine (1) Pipette (1 ml) einmal täglich ein. Verwenden Sie die Messanleitung für eine einfache Dosierung. Tropfen Sie die Flüssigkeit direkt in den Mund. Die empfohlene Tagesdosis sollte nicht überschritten werden. Für eine optimale Aufnahme empfehlen wir die Einnahme vor der Hauptmahlzeit. Sicherheitsverschluss Öffnen: Eine Anleitung Die Flasche ist mit einer Kindersicherung ausgestattet. Hier sind die Anweisungen zum Öffnen: Halten Sie die Flasche mit einer Hand fest. Greifen Sie den Deckel mit der anderen Hand. Drücken Sie den Deckel nach unten und drehen Sie ihn gegen den Uhrzeigersinn, bis der Sicherheitsring bricht. Drehen Sie weiter, bis sich der Deckel löst und abgenommen werden kann. Diese Schritte sollen versehentliches Verschütten oder Missgeschicke verhindern. Die Bedeutung eines gesunden Lebensstils Während Neo Tropfen Ihnen helfen können, Ihre Gewichtsabnahmeziele zu erreichen, ist es wichtig, sie mit einem gesunden Lebensstil zu kombinieren. Hier sind einige Tipps, um Ihre Ergebnisse zu maximieren: Hier klicken um Original Neo Tropfen mit 50%Rabatt beim Hersteller zu bestellen ➡️ https://cutt.ly/8w1EAQKy ⬅️ (Link im Browser kopieren)


Artificial Intelligence • Cloud • Information Technology • Software • Cybersecurity • App development • Big Data Analytics
14 Offices
23,000 Employees

Persistent Systems is a leading provider of digital transformation services, offering innovative solutions tailored to various industries worldwide. With a robust global presence, they deliver cutting-edge services in product engineering, digital strategy, and data analytics, helping businesses thrive in today's rapidly evolving landscape. From healthcare and financial services to retail and manufacturing, Persistent Systems empowers organizations across diverse sectors to embrace technology and drive sustainable growth.


Information Technology • Cybersecurity
Fairlawn, OH, US
107 Employees

TrustedSec is an information security consulting team at the forefront of attack simulations with a focus on strategic risk-management. Our goal is to help organizations defend against threats of all kinds and change the security industry for the better. With a team handpicked not only for expertise and technical skill, but for ethical character and dedication, TrustedSec is committed to increasing the security posture of organizations around the world. TrustedSec is an ally to any organization working to develop and improve their security program.


Information Technology • Cybersecurity
Fort Myers, FL, US
21 Employees

Cigent protects your most valuable asset – your data – with Cigent Secure SSDs™ that prevent compromise by attackers who remotely or physically access a device and secure file sharing that protects data wherever it goes. Funded by In-Q-Tel™ and founded by experts in storage, data forensics, and cyber security to develop a new standard in data protection.


Software • Cybersecurity
Dallas, TX, US
24 Employees

Cyber adAPT offers a leading network threat detection platform (NTD) to the enterprise and ODM/OEM markets. Utilizing its patented software technology, Cyber adAPT NTD allows customers to inspect, detect and respond to real-time network threats including: - Ransomware - Network Trojan - Unauthorized Privilege - Network Exploitation Activities - Command & Control Communications - Network Bot Communications The NTD platform further provides customers immediate contextual information that categorizes the risk and urgency of a threat thereby allowing security teams to respond immediately to effectively and efficiently remediate attacks. The NTD platform is updated automatically and continuously with the latest Cyber adAPT threat intelligence and passively watches network traffic, 24/7/365 -- without impacting latency, throughput or performance of the network(s) being secured. Cyber adAPT NTD is a powerful tool in the arsenal of its customers to proactively reduce network cyber risks in a thorough and cost-effective manner. Please contact us if you would like to learn more.


Software • Cybersecurity
Chicago, IL, US
18 Employees

Cog Systems, a cyber security company. Cog built and enabled the world's most secure connected devices, provided advanced operating system and platform development products and services for smart, connected and IoT devices. Our founding staff developed the OKL4 Microvisor at Open Kernel Labs (acquired by General Dynamics C4 Systems) and have each more than decade of specialist experience in the field, including managing projects from concept through to design, implementation and deployment. Cog software has been deployed in several billion devices worldwide. Cog's mission is to redefine the design and development of embedded systems and in the process help our customers to deliver more reliable and secure systems, faster.