Explore Top Tech Companies
All Filters
Location

Remote jobs

Industry

DEI

Tech Stack

Perks

Size

Top Tech Companies (766)

Don't see your company?

Create a company profile
Artificial Intelligence • Information Technology • Natural Language Processing • Productivity • Software • Cybersecurity • Automation
Plano, TX, US
24 Employees

Aiden is a white-glove application packaging service that uses an AI bot to scale endpoint management across customers, efficiently handling Windows and software deployments and patch management. Our AI bot leverages your existing deployment tool and our extensive software library to set up and keep your Windows computers up-to-date for their entire lifecycle, increasing cyber hygiene, efficiency, and end-user experience. We improve end-user experience by ensuring all computers have exactly the software they’re supposed to have and nothing else. - We simplify your IT processes: With Aiden’s trusted solution, you can ditch the hassles of maintaining computer images, manually deploying software updates, and rolling out new machines by hyperautomating these time-consuming tasks. - We save you time (and headaches): Whether responding to help desk tickets or pushing out software updates, IT is like playing a constant game of whack-a-mole. With Aiden, you and your team can spend less time building machines, troubleshooting, deploying, patching, and stressing. Aiden frees you to focus on high-impact, more rewarding projects. - We support your compliance efforts: Keeping up with compliance frameworks (HIPPA, NIST, CIS, etc.) and performing constant security reviews associated with them is no small feat. AidenBot combined with a plain-English policy document enables your environment to comply with standards and audits.


Information Technology • Cybersecurity
Fairlawn, OH, US
107 Employees

TrustedSec is an information security consulting team at the forefront of attack simulations with a focus on strategic risk-management. Our goal is to help organizations defend against threats of all kinds and change the security industry for the better. With a team handpicked not only for expertise and technical skill, but for ethical character and dedication, TrustedSec is committed to increasing the security posture of organizations around the world. TrustedSec is an ally to any organization working to develop and improve their security program.


Information Technology • Cybersecurity
Fort Myers, FL, US
21 Employees

Cigent protects your most valuable asset – your data – with Cigent Secure SSDs™ that prevent compromise by attackers who remotely or physically access a device and secure file sharing that protects data wherever it goes. Funded by In-Q-Tel™ and founded by experts in storage, data forensics, and cyber security to develop a new standard in data protection.


Big Data • Cybersecurity
Los Angeles, California, US
45 Employees

Open Raven is the modern data security platform that brings visibility and control to an organization’s data protection program. From mapping data stores in clouds and corporate networks to identifying the data within, Open Raven lays the foundation for assessing and managing data risk. Deployed within minutes within an organization’s network, the platform is designed so that discovery, query and response capabilities can be readily extended to match the most complex and demanding environments.


Blockchain • Cryptocurrency • Cybersecurity
New York, NY, US
22 Employees

Valid Network Deriskifies Blockchain. Daily crypto attacks make it evident that blockchains and cryptocurrencies are NOT safe. Malicious hackers and human errors cost billions of dollars a year in fraudulent transactions and lost value. Likewise, financial opportunities are communicated among friends, and are hard to come by. Valid Network lets crypto investors trade with confidence with less risk and more visibility to new opportunities through continuous monitoring of blockchain networks, deep analysis, and predictive insights on assets’ reliability and security. We bring transparency, clarity, and value to crypto trade. Valid Network is an Israeli Blockchain cybersecurity and intelligence startup. The company was founded in 2019 and raised $8M to date from leading investors, such as Ten Eleven Ventures and JVP. The company is headquartered in New York with offices in Israel.


Cloud • Software • Cybersecurity
Pleasanton, CA, US
23 Employees

Founded in 2000, Bivio Networks is dedicated to providing leading deep packet inspection products that enable government agencies, service providers and enterprise customers to monitor, control, and secure critical network infrastructure. A leader in cyber intelligence, cyber security and advanced DPI application platform technology, Bivio has deployed its products in a wide range of solutions. Bivio's product include Deep Packet Inspection Applications and Advanced Cyber Security Platforms for speeds from multi-gigabit up to 100 Gbps, Custom Cyber Sensor technology, Platform as a Service (PaaS) for Cloud Security Operations and Active Network Defense technology. Bivio’s global customer base includes leading intelligence, defense and government agencies as well as fortune 500 and service providers. Bivio is privately-held and is headquartered in the San Francisco Bay Area with office locations worldwide.


Cybersecurity
San Francisco, CA, US
16 Employees

Paladin is cyber protection simplified. Our mission is to make cybersecurity accessible and practical for all companies. Cyber risk is human risk. Paladin Shield, our all-in-one cybersecurity suite, makes it easy to defend employees, systems, and data against cybercriminals.


Information Technology • Cybersecurity
San Antonio, TX, US
52 Employees

SandTech Solutions is a Certified 8a member as well as a Service Disabled Veteran-Owned Small Business (SDVOSB). We provide Cyber Security, Vulnerability Assessments, Penetration Testing as well as a holistic IT approach for your business. Our goal; TO ENABLE SUCCESS! Although we are a young company, we are staffed with sharp individuals with an average experience level of 20 years each working on Information Technology (IT), Cyber, and Telecommunications systems. Our deep understanding of technology and our proven approach to any challenge has helped us develop our client's Defensive Cyber Systems. SandTech Solutions is a Small Disadvantaged Business (SDB) as well as a Texas Historically Underutilized Business (HUB) and has earned certifications from the South Central Texas Regional Certification Agency (SCTRCA) for DIBE, ESBE, HABE, MBE, SBE, VBE.


Cybersecurity
Nashville, TN, US
82 Employees

Conquest Cyber is an elite team of cyber special operators working shoulder to shoulder with critical sector technologists as they stand on the frontline of freedom. The ARMED ATK software and SCyOps elements deliver Integrated Cyber Resiliency Management capabilities. These capabilities negate risk and provide business leadership with context, transparency, and a map from risk to operations.


Information Technology • Cybersecurity
Sarasota, FL, US
23 Employees

We are a small, energetic IT services company. We put our employees first and they obsess about delighting our customers. We are “employee driven…customer focused.” That simple phrase defines our culture and our core values. We provide big company benefits and perks and a small company atmosphere. Farfield provides on-premise advisory and support services in IT, cybersecurity, and informatics. As a certified HubZone and Service-Disabled Veteran Owned Small Business Farfield has carved out a niche as highly desirable small business provider. We have offices in Sarasota, FL and Catonsville, MD supporting customers in MD, the District of Columbia, GA, SC, TX, and WA.

Brinqa Thumbnail
Cloud • Security • Software • Cybersecurity
Austin, TX, US
96 Employees
CrowdStrike Thumbnail
Cloud • Information Technology • Sales • Security • Cybersecurity
33 Offices
10000 Employees
Tufin Thumbnail
Security • Cybersecurity
4 Offices
450 Employees
Nisos Thumbnail
Professional Services • Security • Consulting • Cybersecurity
2 Offices
90 Employees
Axio Thumbnail
Machine Learning • Security • Consulting • Cybersecurity
2 Offices
52 Employees
Cisco Meraki Thumbnail
Hardware • Information Technology • Security • Software • Cybersecurity • Conversational AI
6 Offices
3000 Employees
CSC Thumbnail
Fintech • Legal Tech • Software • Financial Services • Cybersecurity • Data Privacy
34 Offices
8000 Employees
Duo Security Thumbnail
Cloud • Information Technology • Machine Learning • Security • Software • Cybersecurity • Data Privacy
3 Offices
1000 Employees
Immuta Thumbnail
Big Data • Cloud • Information Technology • Security • Software • Database • Cybersecurity
3 Offices
250 Employees

Cybersecurity
Duluth, GA, US
72 Employees

Trenton Systems is a trusted computing innovator providing cybersecure, tactical edge computing solutions to the defense and aerospace industries. Established in 1989 and headquartered in Atlanta, Georgia, the company is a pioneer of made-in-USA computing solutions and has endured firmly and unwaveringly at the forefront of the high-performance computing industry for more than 30 years, designing, manufacturing, assembling, testing, and supporting customer-driven rugged computers that accelerate and underpin the world’s mission-critical programs, applications, and critical infrastructure processes.


Cybersecurity
Reston, VA, US
89 Employees

Electrosoft delivers a diversified set of technology-based solutions and services differentiated by thought leadership and innovation. Fueling the success of our Government and commercial customers since 2001 through outstanding value and trust, we couple our domain knowledge and experience with proven, mature, management practices to deliver the right solutions on time and within budget. What distinguishes us from our peers is our deep culture of customer-service, professionalism, accountability, excellence and innovation delivered on the bedrock of uncompromising integrity.


Fintech • Information Technology • Professional Services • Financial Services • Cybersecurity
2 Offices
170 Employees

As a Credit Union Service Organization (CUSO) and Fintech, we pioneer cutting-edge banking solutions. Our mission is to create affordable, tailored, technical solutions that empower financial service businesses to achieve their goals.


Information Technology • Cybersecurity
Winter Park, FL, US
18 Employees

The Dytech Group, Inc. helps companies with 5 to 100 computers use computer technology to reduce costs and increase productivity. Founded in 1982, the Dytech Group is in its 39th year of business. The staff of the Dytech Group has experience in all aspects of technology, not just hardware, but also cloud solutions, software and support. The Dytech Group is committed to supporting the latest technologies. The Dytech Group is a Microsoft Gold Certified Partner that sells and supports Microsoft Windows 2003/2008 networks. Support for wide area networks (WAN), virtual private networks as well.


Software • Cybersecurity
Reston, VA, US
101 Employees

Global InfoTek, Inc. (GITI) is a woman owned small business with an award-winning track record of designing, developing, and deploying best-of-breed technologies that address the nation’s pressing cyber and advanced technology needs. For more than two decades, GITI has merged pioneering technologies, operational effectiveness, and best business practices to rapidly provide low-cost, agile solutions to DoD, DHS, and IC customers. Our Innovation Hive of world-class talent enables us to provide rapid development services at the speed of need. Headquartered in Reston, VA, GITI also has operations in San Antonio, TX and Rome, NY. Our prime contracts include Agile Cyber Technology (ACT) 2 and EAGLE II. For more information about Global InfoTek, visit www.globalinfotek.com.


Security • Software • Cybersecurity
San Francisco, CA, US
2,598 Employees

HackerOne empowers the world to build a safer internet. As the world’s trusted hacker-powered security platform, HackerOne gives organizations access to the largest community of hackers on the planet. Armed with the most robust database of vulnerability trends and industry benchmarks, the hacker community mitigates cyber risk by searching, finding, and safely reporting real-world security weaknesses for organizations across all industries and attack surfaces. Customers include The U.S. Department of Defense, Dropbox, General Motors, GitHub, Goldman Sachs, Google, Hyatt, Lufthansa, Microsoft, MINDEF Singapore, Nintendo, PayPal, Qualcomm, Slack, Starbucks, Twitter, and Verizon Media. HackerOne was ranked fifth on the Fast Company World’s Most Innovative Companies list for 2020 and made its Brands that Matter list for 2021. Headquartered in San Francisco, HackerOne has a presence in London, the Netherlands, France, Germany, and over 70 other locations across the globe.


Information Technology • Cybersecurity
2 Offices
15 Employees

Protected Trust offers comprehensive technology and compliance solutions that provide the freedom to focus on your business instead of I.T. At Protected Trust, we understand that information is one of your company’s most valuable assets. We are committed to protecting that asset and earning your confidence through superior service, proactive guidance and exceptional TrustCare ™ support. Our framework of security and compliance expertise offers business owners unrivaled peace of mind and truly transformative results.


Software • Cybersecurity
Elizabethtown, KY, US
205 Employees

Venminder is an industry recognized leader of third-party risk management solutions. Dedicated to third-party risk, the company is the go-to partner for software, high-quality assessments on vendor controls, certified subject-matter expertise and education. Venminder’s platform provides a centralized location to execute a third-party risk management program. It enables users to store documentation, onboard a vendor, track contracts, manage SLAs, send and manage questionnaires, manage due diligence and oversight, complete risk assessments, create workflows, run reporting and more. Assessments performed by Venminder’s qualified experts, including CISSPs, CPAs, financial risk analysts, paralegals and more, are readily available in an online library. The assessments enable clients to identify possible risks and understand areas of strength on their vendors’ information security and privacy standards, SOC reports, financial viability, business continuity/disaster recovery preparedness, contractual standards, regulatory compliance and more. Venminder clients also use the firm to streamline due diligence processes by outsourcing vendor document collection; and regularly consult with Venminder’s experts to ensure their third-party risk management policy and procedures meet industry standards. The Venminder platform is used by 1,000+ customers across a wide range of industries to execute their third-party risk management programs. As the company’s solutions are designed to accommodate growth and various levels of program maturity, customers range in size from small to Fortune 100 organizations. As the industry’s go-to leader, Venminder’s team of highly experienced professionals regularly speak at conferences, provide the latest research and educational content, host CPE credit eligible webinars and provide access to an online networking community for third-party risk professionals, Third Party ThinkTank. #thirdpartyrisk #vendorrisk #supplierrisk #vendormanagement


Hardware • Software • Cybersecurity
Fallbrook, CA, US
47 Employees

Industrial IoT Cybersecurity breaches and threats are alarmingly increasing in frequency and complexity. These cybersecurity challenges coupled with the no increase in the internet flow of information is creating a widening gap in the ability of internally skilled resources to respond. This gap is causing tremendous risks, losses and negatively impacting organizations. Palmchip Industrial IoT cybersecurity solutions and services focuses on filling the gap one organization at a time by simplifying cybersecurity complexity, and keeping organizations secure and more productive. VISION/MISSION:To improve and enhance quality of life by creating leading edge and wide reaching technologies and solutions. To create Happiness technologies and solutions for a connected and secure world. OVERVIEW: 1996, Palmchip is a pioneer in System on a Chip (SoC) hardware, firmware and software. 2000, Palmchip introduced Single Chip (SoC) Platform and Intellectual Properties (IP) with built-in security powered over 1.5 Billion Network Security, Storage, Telecom, Wireless, IoT, Powergrid and WiFi devices to-date. 2009, Palmchip extended vertically its offering, to include Custom Mobile and Desktop Application Development for Security, Business Productivity and IoT Applications. 2015, Palmchip expanded its Security offering to include Cyber Security Solutions and Services for Real-Time, data mirroring and data monitoring Cyber Security solutions addressing efficient and custom data protection requirements and challenges facing midsize and small Business to Business and Business. Our Clients are in various domains including Healthcare, Banking, Data Centers and Aerospace. Over 116 licensees and Customers. Palmchip provide Custom Software development for Cyber Security, Storage and Networking to Fortune 1000 companies such as Seagate, Fireye, Maxtor, LSI Logic, WiChorus (Tellabs) and Broadcom to name a few. Email: [email protected], Phone: +1 (951) 760-0300


Information Technology • Security • Software • Cybersecurity
2 Offices
66 Employees

Stytch is the most powerful identity platform built for developers. By powerful, we mean: **Comprehensive:** Stytch has everything you need to identify, authenticate, and manage your users, including fraud prevention tools like device fingerprinting. **Adaptable:** Stytch is the only auth provider that enables you to build directly with our APIs or our suite of SDKs, so you can deliver the ideal experience to your users – whatever your architecture. **Ready to scale:** With a wide array of auth methods and sophisticated architecture underpinning our infrastructure, Stytch’s infrastructure is built to grow with you as your use cases expand and your needs become bigger and more complex. Whatever your tech stack, whatever your use case, we have the infrastructure and features you need to secure and scale your application. At Stytch, we believe our ultimate success will be determined by two factors: - Building a product that delights both customers and end users - Creating a work environment where everyone thrives These two cannot exist without the other — without a great culture, we won't be able to deliver a great product over the long run; similarly, having a great culture will be fleeting if we don't deliver a product that developers and users love.