company? Let’s change
that.
Don't see your company?
Create a company profileCyble is a Series A-funded global cyber intelligence start-up backed by Y Combinator and reputed VC firms including Blackbird Ventures and Spider Capital, Xoogler Ventures, Picus Capital, and Cathexis Ventures. Cyble provides capabilities for customers to manage cyber risks with AI powered actionable threat intelligence. We are specialists in gathering intelligence across the Deepweb, Darkweb and the Surface Web. We are a fast growing startup recognized by Forbes along with other distinctions.
CubeWorks is accelerating the future of IoT through millimeter-scale smart sensing solutions.
Trovisto Security is a pure-play cyber security services and solutions provider. No matter how big or how small your initiative is, we can help.
Actual Software offers software support, computer systems design, network infrastructure and data processing management services.
Forshaw Industries, Inc. supplies pest control chemicals, equipment, and safety supplies.
Online Cyber security training school, providing quality infosec education. A marketplace for cyber security instructor and students.
Iteck Solutions specializes in the development and delivery of IT solutions for cloud, network, remote, and general services.
Abacus Research, Inc. is a full service investigative agency with nationwide coverage. With over 17 years in both the “insurance & corporate” sectors, we have found that what matters most are correct procedures, reliable information, concise details & competitive pricing. Foremost, our vast national coverage allows us to cover, begin and work any case in a timely manner. Our goal is to give our clients the most timely, reliable and accurate information possible that will allow them to make an informed claims decision
Everykey is a offers a Bluetooth device designed to replace keys and passwords.
Techsage Solutions is an IT company that provides virtualization, cybersecurity, VoIP, cloud, hardware and consulting services.
For customers of cloud native security vendors that take a ‘period scanning’ approach to securing Kubernetes, the dynamic life cycle leads to an endless sea of alerts. KSOC is the first and only vendor to use the Kubernetes lifecycle to surface the true risk of your clusters at any point in time.
Patientory is empowering people to take charge of their own health. We’re revolutionizing the way doctors and patients interact and gain access to information, cutting out all layers and processes that currently are stumbling blocks in care coordination.
Redmorph offers the only comprehensive solution for your Android Smartphone to get proactive control over both privacy and security issues. In addition to your 'peace of mind', the blocking of non-essential background activity and network connection results in significant data usage savings and improved device performance in most devices.
Veridify Security Inc. – Securing the Internet of Things® Veridify Security delivers fast, small footprint, ultra-low-energy, and quantum-resistant public-key security tools for low-resource processors powering the Internet of Things (IoT). Veridify’s new DOME™ Device Ownership Management and Enrollment™ solution provides a zero-touch onboarding and ownership management platform for the smallest IoT devices in the field without requiring a pervasive cloud or network connection. The company’s Key Agreement Protocols and Digital Signature Algorithms are used for secure device-to-device communications, as well as secure boot and secure software updates for automotive, consumer, healthcare, industrial, and smart homes applications. Veridify is partners with leading semiconductor manufacturers and IP providers, including Arm, Intel, Renesas, STMicroelectronics, SiFive, and Synopsys, and offers Software Development Kits, RTL, and tools for a wide range of environments. We invite you to join us in a conversation at our blog at https://www.securerf.com/iot-security-blog/
AEVEX Aerospace, headquartered in Solana Beach, California, supports the U.S. national security mission and partner nation needs around the world by providing full-spectrum aviation, remote sensing, and analysis solutions. The company’s capabilities include custom design and engineering; rapid prototyping; sensor integration and sustainment; aircraft modification and certification; flight test instrumentation and support; mission operations service; advanced intelligence data processing, exploitation, and dissemination solutions; and tailored hardware and software mission-system tools. AEVEX uses agile and customized approaches to rapidly define, develop, and deliver specialized solutions for airborne special mission needs for the U.S. Government, partner nations, and commercial businesses. AEVEX has major offices in California, Massachusetts, New Mexico, North Carolina, Ohio, and Virginia.
Whistic is a leading provider of proactive vendor security and an innovator in changing the way that companies publish and evaluate security posture to build trust. Whistic is the single source of trust for both buyers and sellers, helping companies speed up the pace of business. The Whistic Trust Catalog® now contains nearly 15,000 company profiles that can be assessed on-demand, and notable customers include Airbnb, Okta, Betterment, Vonage, Qualtrics, and other world-leading brands within healthcare, manufacturing, energy, and education.
In today's rapidly changing cyber security landscape, you need an expert in your corner to help you navigate the traps and pitfalls of cyber threats and compliance. Threat analysis and remediation can be a daunting and perilous task. DeepCyber Security can provide a cost-effective solution to address all of your needs; without having to hire full time in-house resources thus allowing you to focus on your business/mission critical requirements.
Our AI software analyzes data from existing security cameras in real-time to detect weapons, intruders, social distancing, masks, crowds, and where people travel in any environment. The system acts as an end-to-end security camera management system that enables onboarding and management of cameras as well as instant alerts and analytics that allow organizations to pinpoint problems. We leverage cutting-edge computer vision algorithms for object detection on a hyper-scale cloud backend, and we provide analytics to our customers without collecting any personally identifiable information. If you want to help build a company from the ground up and develop cutting-edge technology that helps keep people safe--without invading privacy--we'd love to hear from you.
State-of-the-art colocation facilities that provide flexible and scalable data center solutions, innovative technology, excellent service and a team to support you with years of expertise. Our parent company, SBA Communications, develops new tower sites to expand our tower portfolio both domestically and internationally. In the new build program, we construct towers in locations that are strategically chosen by us or under a build-to-suit arrangement. These sites form the backbone for our edge computing capabilities, which include both data centers and infrastructure at the base of our towers. SBA Edge - Chicago is strategically located in a fiber-rich area known as a technology hub. Our impressive facility offers clients unparalleled infrastructure and a personalized level of service based on your application requirements. We are capable of delivering varying levels of power redundancy and can cool the highest density racks all in an effort to support the dynamic needs of our customers. Our edge capabilities allow customers to instantaneously communicate with multiple networks over direct connections or through layer 2 private connections. These unique capabilities can support business applications requiring low-latency performance or those looking to avoid public IP transit. SSAE 18, PCI, Open-IX and HIPAA Certified Fully redundant 2N power and dynamic in row cooling infrastructure Multiple points of entry with multiple connectivity options Private suites and expandable cages available Full (42U), 1/2 (21U) or 1/3 (14U) cabinet colocation Typical use cases for our high-density colocation services include: - High-Performance Computing (HPC) - High Density Colocation - Edge Data - Virtualized Environments - Blockchain - Solar Powered Virtualization - Managed Hosting Providers - Big Data - SAAS Providers - Cloud-based security - Customized High Density Colocation - Ethereum Initiatives - Blockchain Applications Contact us at 877-432-2656 or [email protected]
Founded in 2017, Living Security’s mission is to help prevent cybersecurity breaches with a human risk management solution that does more than meet compliance needs, it also truly changes behavior. Living Security believes empowering people is the key to ending cybersecurity breaches, picking up where traditional security awareness training drops off. Gamified learning and immersive experiences engage and educate users, while the science-backed, tech-enabled platform uniquely provides CISOs the ability to measure training efficacy and program ROI. Named one of Austin’s Best Places to Work, the Living Security team is composed of 50+ cybersecurity professionals committed to transforming security awareness training as we know it and turning end users into the enterprise’s greatest asset against cybercrime. Living Security is trusted by security-minded organizations like CVS Health, MasterCard, Verizon, MassMutual, Biogen, AmerisourceBergen, Hewlett Packard, JP Morgan, and Target. Learn more at www.livingsecurity.com.