Explore Top Tech Companies
All Filters
Location

Remote jobs

Industry

DEI

Tech Stack

Perks

Size

Top Tech Companies (1,495)

Don't see your company?

Create a company profile
Cloud • Security
Alpharetta, GA, US
100 Employees

Cyble is a Series A-funded global cyber intelligence start-up backed by Y Combinator and reputed VC firms including Blackbird Ventures and Spider Capital, Xoogler Ventures, Picus Capital, and Cathexis Ventures. Cyble provides capabilities for customers to manage cyber risks with AI powered actionable threat intelligence. We are specialists in gathering intelligence across the Deepweb, Darkweb and the Surface Web. We are a fast growing startup recognized by Forbes along with other distinctions.


Hardware • Information Technology • Internet of Things • Security
Ann Arbor, MI, US
11 Employees

CubeWorks is accelerating the future of IoT through millimeter-scale smart sensing solutions.


Security
Providence, RI, US
1 Employees

Trovisto Security is a pure-play cyber security services and solutions provider. No matter how big or how small your initiative is, we can help.


Security • Software
Saint Paul, MN, US

Actual Software offers software support, computer systems design, network infrastructure and data processing management services.


Security
Charlotte, North Carolina, US
47 Employees

Forshaw Industries, Inc. supplies pest control chemicals, equipment, and safety supplies.


Edtech • Information Technology • Security
Portland, OR, US

Online Cyber security training school, providing quality infosec education. A marketplace for cyber security instructor and students.


Cloud • Information Technology • Security
WA, US
8 Employees

Iteck Solutions specializes in the development and delivery of IT solutions for cloud, network, remote, and general services.


Agency • Insurance • Security
Greensboro, NC, US
25 Employees

Abacus Research, Inc. is a full service investigative agency with nationwide coverage. With over 17 years in both the “insurance & corporate” sectors, we have found that what matters most are correct procedures, reliable information, concise details & competitive pricing. Foremost, our vast national coverage allows us to cover, begin and work any case in a timely manner. Our goal is to give our clients the most timely, reliable and accurate information possible that will allow them to make an informed claims decision


Security • Software
Cleveland, Ohio, US
18 Employees

Everykey is a offers a Bluetooth device designed to replace keys and passwords.


Information Technology • Security
San Antonio, TX, US
5 Employees

Techsage Solutions is an IT company that provides virtualization, cybersecurity, VoIP, cloud, hardware and consulting services.

Evolv Technology Thumbnail
Artificial Intelligence • Computer Vision • Security • Software
Waltham, MA, US
300 Employees
Rapid7 Thumbnail
Artificial Intelligence • Cloud • Information Technology • Sales • Security • Software • Cybersecurity
7 Offices
2400 Employees
Verkada Inc Thumbnail
Cloud • Hardware • Security • Software
16 Offices
2000 Employees
Motorola Solutions Thumbnail
Artificial Intelligence • Hardware • Information Technology • Security • Software • Cybersecurity • Big Data Analytics
23 Offices
21000 Employees
Anduril Thumbnail
Aerospace • Artificial Intelligence • Hardware • Robotics • Security • Software • Defense
8 Offices
1400 Employees
Chime Thumbnail
Fintech • Machine Learning • Mobile • Security • Software • Analytics • Data Privacy
3 Offices
1336 Employees
ID.me Thumbnail
Cloud • eCommerce • Information Technology • Security • Software • Cybersecurity • Data Privacy
Fully Remote
615 Employees
Hivebrite Thumbnail
Security • Software • Analytics • App development • Automation
2 Offices
195 Employees
Coro Thumbnail
Artificial Intelligence • Cloud • Information Technology • Security • Software • Cybersecurity • Data Privacy
3 Offices
286 Employees

Cloud • Security
San Francisco, CA, US
38 Employees

For customers of cloud native security vendors that take a ‘period scanning’ approach to securing Kubernetes, the dynamic life cycle leads to an endless sea of alerts. KSOC is the first and only vendor to use the Kubernetes lifecycle to surface the true risk of your clusters at any point in time.


Blockchain • Healthtech • Information Technology • Security
Atlanta, GA, US
10 Employees

Patientory is empowering people to take charge of their own health. We’re revolutionizing the way doctors and patients interact and gain access to information, cutting out all layers and processes that currently are stumbling blocks in care coordination.


Mobile • Security
Cranberry, PA, US
8 Employees

Redmorph offers the only comprehensive solution for your Android Smartphone to get proactive control over both privacy and security issues. In addition to your 'peace of mind', the blocking of non-essential background activity and network connection results in significant data usage savings and improved device performance in most devices.


Security
Shelton, CT, US
17 Employees

Veridify Security Inc. – Securing the Internet of Things® Veridify Security delivers fast, small footprint, ultra-low-energy, and quantum-resistant public-key security tools for low-resource processors powering the Internet of Things (IoT). Veridify’s new DOME™ Device Ownership Management and Enrollment™ solution provides a zero-touch onboarding and ownership management platform for the smallest IoT devices in the field without requiring a pervasive cloud or network connection. The company’s Key Agreement Protocols and Digital Signature Algorithms are used for secure device-to-device communications, as well as secure boot and secure software updates for automotive, consumer, healthcare, industrial, and smart homes applications. Veridify is partners with leading semiconductor manufacturers and IP providers, including Arm, Intel, Renesas, STMicroelectronics, SiFive, and Synopsys, and offers Software Development Kits, RTL, and tools for a wide range of environments. We invite you to join us in a conversation at our blog at https://www.securerf.com/iot-security-blog/


Aerospace • Security
Solana Beach, CA, US
296 Employees

AEVEX Aerospace, headquartered in Solana Beach, California, supports the U.S. national security mission and partner nation needs around the world by providing full-spectrum aviation, remote sensing, and analysis solutions. The company’s capabilities include custom design and engineering; rapid prototyping; sensor integration and sustainment; aircraft modification and certification; flight test instrumentation and support; mission operations service; advanced intelligence data processing, exploitation, and dissemination solutions; and tailored hardware and software mission-system tools. AEVEX uses agile and customized approaches to rapidly define, develop, and deliver specialized solutions for airborne special mission needs for the U.S. Government, partner nations, and commercial businesses. AEVEX has major offices in California, Massachusetts, New Mexico, North Carolina, Ohio, and Virginia.


Security • Software
Pleasant Grove, UT, US
124 Employees

Whistic is a leading provider of proactive vendor security and an innovator in changing the way that companies publish and evaluate security posture to build trust. Whistic is the single source of trust for both buyers and sellers, helping companies speed up the pace of business. The Whistic Trust Catalog® now contains nearly 15,000 company profiles that can be assessed on-demand, and notable customers include Airbnb, Okta, Betterment, Vonage, Qualtrics, and other world-leading brands within healthcare, manufacturing, energy, and education.


Security
Dallas, Texas, US
10 Employees

In today's rapidly changing cyber security landscape, you need an expert in your corner to help you navigate the traps and pitfalls of cyber threats and compliance. Threat analysis and remediation can be a daunting and perilous task. DeepCyber Security can provide a cost-effective solution to address all of your needs; without having to hire full time in-house resources thus allowing you to focus on your business/mission critical requirements.


Artificial Intelligence • Computer Vision • Security • Software • Cybersecurity
New York, NY, US
15 Employees

Our AI software analyzes data from existing security cameras in real-time to detect weapons, intruders, social distancing, masks, crowds, and where people travel in any environment. The system acts as an end-to-end security camera management system that enables onboarding and management of cameras as well as instant alerts and analytics that allow organizations to pinpoint problems. We leverage cutting-edge computer vision algorithms for object detection on a hyper-scale cloud backend, and we provide analytics to our customers without collecting any personally identifiable information. If you want to help build a company from the ground up and develop cutting-edge technology that helps keep people safe--without invading privacy--we'd love to hear from you.


Cloud • Security • Software
Boca Raton, FL, US
19 Employees

State-of-the-art colocation facilities that provide flexible and scalable data center solutions, innovative technology, excellent service and a team to support you with years of expertise. Our parent company, SBA Communications, develops new tower sites to expand our tower portfolio both domestically and internationally. In the new build program, we construct towers in locations that are strategically chosen by us or under a build-to-suit arrangement. These sites form the backbone for our edge computing capabilities, which include both data centers and infrastructure at the base of our towers. SBA Edge - Chicago is strategically located in a fiber-rich area known as a technology hub. Our impressive facility offers clients unparalleled infrastructure and a personalized level of service based on your application requirements. We are capable of delivering varying levels of power redundancy and can cool the highest density racks all in an effort to support the dynamic needs of our customers. Our edge capabilities allow customers to instantaneously communicate with multiple networks over direct connections or through layer 2 private connections. These unique capabilities can support business applications requiring low-latency performance or those looking to avoid public IP transit. SSAE 18, PCI, Open-IX and HIPAA Certified Fully redundant 2N power and dynamic in row cooling infrastructure Multiple points of entry with multiple connectivity options Private suites and expandable cages available Full (42U), 1/2 (21U) or 1/3 (14U) cabinet colocation Typical use cases for our high-density colocation services include: - High-Performance Computing (HPC) - High Density Colocation - Edge Data - Virtualized Environments - Blockchain - Solar Powered Virtualization - Managed Hosting Providers - Big Data - SAAS Providers - Cloud-based security - Customized High Density Colocation - Ethereum Initiatives - Blockchain Applications Contact us at 877-432-2656 or [email protected]


Information Technology • Security • Software
Austin, TX, US
81 Employees

Founded in 2017, Living Security’s mission is to help prevent cybersecurity breaches with a human risk management solution that does more than meet compliance needs, it also truly changes behavior. Living Security believes empowering people is the key to ending cybersecurity breaches, picking up where traditional security awareness training drops off. Gamified learning and immersive experiences engage and educate users, while the science-backed, tech-enabled platform uniquely provides CISOs the ability to measure training efficacy and program ROI. Named one of Austin’s Best Places to Work, the Living Security team is composed of 50+ cybersecurity professionals committed to transforming security awareness training as we know it and turning end users into the enterprise’s greatest asset against cybercrime. Living Security is trusted by security-minded organizations like CVS Health, MasterCard, Verizon, MassMutual, Biogen, AmerisourceBergen, Hewlett Packard, JP Morgan, and Target. Learn more at www.livingsecurity.com.