1Password
Trusted by over 100,000 businesses and millions of consumers, 1Password offers industry-leading identity security solutions to reduce risk for companies and provide people with peace of mind. 1Password eases the tension between security and convenience with solutions that enable powerful password management and the future of authentication with passkeys.
Address 4711 Yonge Street, 10th Floor
Toronto, Ontario
M2N 6K8
Canada
Website 1password.com
|
512
|
Adaptive Shield, A CrowdStrike Company
Chosen by hundreds of large enterprises, including Fortune 500 companies, Adaptive Shield is the trusted SaaS Security Posture Management (SSPM) and Identity Threat Detection and Response (ITDR) platform that enables security teams to stay on top of their organization’s apps, identities, and any unusual user behavior in the SaaS ecosystem. With 160+ supported applications out-of-the-box and the ability to monitor custom applications, Adaptive Shield offers full coverage of breadth and depth across the entire lifecycle of threat prevention, detection, and response.
Address Kremenetski 2
Tel Aviv-Yafo, 6789902
Israel
Website www.adaptive-shield.com
|
319
|
Aikido Security
Aikido is the no-nonsense security platform for developers. The all-in-one security platform that covers you from code-to-cloud and helps you get security done. Engineering teams execute faster with Aikido thanks to centralized scans, aggressive false positive reduction, automatic risk triage, risk bundling, and easy step-by-step risk fixes. Aikido makes security simple for SMEs and doable for developers, so companies can win customers, grow up-market, and ace compliance, Get security done. Get back to business.
Address 88 Coupure Rechts
Gent, 9000
Belgium
Website aikido.dev
Social Networks
|
SC4
|
Apiiro
Apiiro helps security and development teams at major companies streamline application risk visibility, prioritization, assessment, and remediation, enabling faster security fixes and secure cloud deployments.
Address 114 Yigal Alon Street
Tel Aviv-Yafo, 6744320
Israel
Website apiiro.com
Social Networks
|
407
|
Appdome
The Appdome mission is to protect every mobile app in the world and the people who use mobile apps in their lives and at work.
Appdome provides the mobile industry’s only Unified Mobile App Defence platform, powered by a patented mobile coding engine, Threat-Events™ Threat-Aware UX/UI Control and ThreatScope™ Mobile XDR.
Using Appdome, mobile brands eliminate complexity, ship faster and save money by delivering 300+ Certified Secure™ mobile app security, anti-malware, anti-fraud, anti-social engineering, mobile anti-bot, anti-cheat, geo compliance, MiTM attack prevention, code obfuscation, social engineering and other protections in Android and iOS apps with ease, inside the mobile DevOps and CI/CD pipeline.
Leading ?nancial, healthcare, government and m-commerce brands use Appdome to protect Android and iOS apps, mobile customers, and mobile businesses globally.
Address 3 Twin Dolphin Drive, Suite 375
Redwood City, California
94065
United States of America
Website www.appdome.com
|
301
|
Aqua Security
Aqua Security is the pioneer in securing containerized cloud native applications. The Aqua Platform, a Cloud Native Application Protection Platform (CNAPP), enables organizations to secure every cloud native application everywhere, from code commit to runtime. With enterprise scale that doesn’t slow development pipelines, Aqua secures your future in the cloud. Founded in 2015, Aqua is headquartered in Boston, MA and Ramat Gan, Israel protecting over 500 of the world’s largest enterprises. For more information, visit https://www.aquasec.com.
Address Mazars, 30 Old Bailey
London, EC4M 7AU
United Kingdom
Website www.aquasec.com
Social Networks
|
325
|
ArmorCode, Inc.
ArmorCode supercharges security teams so their organizations can ship secure software faster. The ArmorCode Platform unifies AppSec and vulnerability management to normalize and correlate findings and orchestrate workflows so teams can identify, articulate, and remediate their most critical risks.
Address 2100 Geng Road
Palo Alto, California
94303
United States of America
Website www.armorcode.com
Social Networks
|
SC3
|
Auguria
Auguria brings order to the chaos that is security data. Our Security Knowledge Layer™ AI data prioritization engine automates the ingestion, classification, and prioritization of event data to eliminate 99% of the noise and transforms the remaining 1% into actionable information. Outcomes include faster MTTR, reduced analysis load on SecOps, and opportunities to reduce data storage costs.
Address 999 Corporate Drive, Suite 100
Ladera Ranch, California
92694
United States of America
Website auguria.io
Social Networks
|
318
|
Axonius
Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions and informing business-level strategy. With solutions for both cyber asset attack surface management (CAASM) and SaaS management, Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps and automatically validate and enforce policies.
Address 16 Great Queen Street, Covent Garden
London, WC2B 5AH
United Kingdom
Website www.axonius.com
Social Networks
|
213
|
BackBox
More than 500 enterprises worldwide trust BackBox as their preferred cyber resilience platform for network devices. BackBox supports network devices from over 180 vendors, offering thousands of pre-built automations, and a no-code way to create new ones. BackBox empowers teams with the confidence to automate critical network processes, maintain business continuity during disruptions, and recover swiftly. From backups and OS updates to configuration compliance and vulnerability management, BackBox ensures that automations deliver consistent, reliable outcomes. To learn more, visit www.backbox.com.
Address 14135 Midway Road, Suite G250
Addison, Texas
75001
United States of America
Website www.backbox.com
Social Networks
|
SC2
|
BeyondTrust
Entitle makes it easy to give employees just the right access, exactly when they need it, across Clouds and SaaS. Whether it’s temporary admin privileges, break-glass access, granular PII access, Entitle centralizes visibility, streamlines self-service access, automates user access reviews, and enforces policies automatically.
Entitle is now part of BeyondTrust, a 6-time PAM market leader recognized by Gartner and trusted by 20,000+ customers, including 75 of the Fortune 100.
Address 11695 Johns Creek Parkway Suite 200
Atlanta, Georgia
30097
United States of America
Website www.beyondtrust.com/products/entitle
Social Networks
|
312
|
Binalyze
Binalyze is an innovator in Investigation and Response Automation a market category recognised by Gartner in 2024 called CIRA. (Cloud Investigation and Response.) Established in 2018 and headquartered in Tallinn, Estonia, it boasts a global presence with offices in the UK, US, and Singapore.
Binalyze empowers incident response and SOC teams with rapid, effective and unified forensic insights at unmatched speed and scale, delivering faster investigations, stronger security outcomes, and boosting cyber resilience.
Address Hobujaama, 10151 Tallinn, Estonia
Tallinn, 10151
Estonia
Website www.binalyze.com
Social Networks
|
536
|
Binarly
Binarly is a global firmware and software supply chain security company founded in 2021. The flagship Binarly Transparency Platform is an enterprise-class, AI-powered solution used by device manufacturers, OEMs, IBVs and product security teams to identify known and unknown vulnerabilities, misconfigurations and signs of malicious code implantation. Based in California, Binarly brings decades of research and program analysis expertise to build solutions to protect businesses, critical infrastructure, and consumers around the world.
Address 2450 Colorado Avenue, Suite 100E
Santa Monica, California
90404
United States of America
Website www.binarly.io
Social Networks
|
530
|
Black Duck
Black Duck® offers the most comprehensive, powerful, and trusted portfolio of application security solutions in the industry. We have an unmatched track record of helping organizations around the world secure their software quickly, integrate security efficiently in their development environments, and safely innovate with new technologies. As the recognized leaders, experts, and innovators in software security, Black Duck has everything you need to build trust in your software. Learn more at www.blackduck.com.
Address Arlington Business Park, Bldg 1430, 1st Fl
Reading, Berkshire, RG7 4SA
United Kingdom
Website www.blackduck.com
|
219
|
Blaze Information Security
At Blaze Information Security, we are experts in offensive cybersecurity. From senior leadership to the consulting team, we’re all cybersecurity specialists committed to technical excellence. We are a CREST-accredited penetration testing company certified under ISO 9001 and ISO 27001. Our engineers hold OSCP, OSWE, OSCE, and CREST certifications and have extensive experience in delivering complex projects across various industries. Blaze offers services ranging from network and application security testing to advanced red teaming, providing the expertise needed to support organizations worldwide.
Address Friedrichstraße 114A
Berlin, 10117
Germany
Website www.blazeinfosec.com
Social Networks
|
314
|
Bugcrowd Inc.
We are Bugcrowd. Since 2012, we’ve been empowering organizations to take back control and stay ahead of threat actors by uniting the collective ingenuity and expertise of our customers and trusted alliance of elite hackers, with our patented data and AI-powered Security Knowledge Platform™. Our network of hackers brings diverse expertise to uncover hidden weaknesses, adapting swiftly to evolving threats, even against zero-day exploits. With unmatched scalability and adaptability, our data and AI-driven CrowdMatch™ technology in our platform finds the perfect talent for your unique fight. We are creating a new era of modern crowdsourced security that outpaces threat actors.
Address 300 California Street, Suite 220
San Francisco, California
94104
United States of America
Website www.bugcrowd.com
Social Networks
|
227
|
Censys
Censys, Inc.™ is the leading Internet Intelligence Platform for Threat Hunting and Attack Surface Management. Founded in 2017 in Ann Arbor, Michigan, Censys provides organizations with the most comprehensive real-time view of Internet infrastructure. Customers like Google, Cisco, Microsoft, Samsung, Swiss Armed Forces, the U.S. Department of Homeland Security, Cybersecurity & Infrastructure Security Agency, and over 50% of the Fortune 500 rely on Censys for a real-time, contextualized view into their internet and cloud assets.
Address 116 1/2 S Main St
Ann Arbor, Michigan
48104
United States of America
Website censys.com
Social Networks
|
321
|
Chainguard
Chainguard secures your software supply chain by default. Founded by experts in open source and security, we empower organizations to build trustworthy software. Our developer-friendly tools and secure infrastructure mitigate attack risks. With Chainguard, you benefit from:
- Hardened, minimal container images to reduce vulnerabilities
- SBOMs and verifiable provenance for transparency in your software
- Streamlined developer workflows that integrate security seamlessly into your development lifecycle.
Address 810 7th St S
Kirkland, Washington
98033
United States of America
Website www.chainguard.dev
|
532
|
Clover Security
Clover empowers Product Security teams to integrate security into the early stages of development and design. By analyzing data from tools like Confluence, Jira, and Google Drive, Clover boosts visibility into early product and R&D work, preemptively flags risks, and provides security requirements from the start, drastically cutting cost and risk of bad design choices. It equips Product Managers and Developers with actionable, timely guidance in their existing workflow, cultivating an environment where secure-by-design isn't just a goal—it's the standard. We're backed by top founders and industry leaders from companies like Wiz, Snyk, Google, Microsoft, Slack, and others.
Address 18 Ha'arba'a
Tel Aviv, 6473918
Israel
Website clover.security
|
SC5
|
CMD + CTRL
CMD+CTRL Security is a pioneer in software security training. Industry-leading organizations rely on our training solutions to make software secure wherever it runs.
As part of Security Innovation, we spent nearly two decades helping Fortune 100 clients defend software applications and sensitive data from cyber threats. This experience taught us that software development teams need better options for learning about security.
In 2024 the Security Innovation training division became CMD+CTRL Security, offering the same high-standards and customer focus our clients have come to expect. Our comprehensive suite of role-based modules, skill labs and hands-on cyber ranges are purpose-built to deliver security expertise to all software stakeholders — from developers to architects to the C-suite – to ensure more secure, resilient software development.
Address 187 Ballardvale Street, Suite A195
Wilmington, Massachusetts
01887
United States of America
Website www.cmdnctrlsecurity.com
Social Networks
|
524
|
Contrast Security
Contrast Security unifies Application Detection and Response (ADR), runtime protection, and instrumented Application Security Testing (AST) in a single platform. We help organisations detect and respond to application attacks faster, eliminate vulnerabilities in development and production, and ship secure software with confidence. Contrast Security delivers a complete application protection that prevents data breaches and secures the entire enterprise from development, to operations, to production.
Address 6800 Koll Center Parkway
Pleasanton, California
94566
United States of America
Website www.contrastsecurity.com
Social Networks
|
437
|
Corelight
Corelight offers the industry's only open source-based NDR platform, which transforms network and cloud activity into evidence that provides SOCs with greater visibility, enhanced analytics, in-depth threat hunting and accelerated investigation.
Address 548 Market StreetPMB 77799
San Francisco, California
94104
United States of America
Website www.corelight.com
|
501
|
Corellium
Address 1301 N Congress Ave, Suite 410
Boynton Beach, Florida
33426
United States of America
Website www.corellium.com
|
426
|
CYBER RANGES
CYBER RANGES is the ISO27001 certified next-generation military-grade full-content-lifecycle simulation platform for the development and validation of threat-informed defence capability and cyber resilience. Built on cloud technology, CYBER RANGES is available for subscription-based, managed service, On-Premises or transportable rugged deployment.
CYBER RANGES applies high automation, high orchestration and high scalability to the delivery of even complex large-audience deep-dive management tabletop and technical exercises based on high-fidelity IT/OT infrastructure replicas.
Address Quantico Cyber Hub
1010 Corporate Drive
Stafford, Virginia
22554
United States of America
Website www.cyberranges.com
Social Networks
|
331
|
Cytidel
Address ATU Mayo. Westport Road,Overwatchr Security Limited
Castlebar, Mayo
F23 X853
Ireland
Website www.cytidel.com
|
SC6
|
DataDome
DataDome’s cyberfraud protection stops attacks with unparalleled accuracy and zero compromise. Our platform, powered by multi-layered machine learning, analyzes 5 trillion signals daily, adapting to and scanning every request in real-time. We protect leading enterprises worldwide, including Foot Locker, TripAdvisor, and SoundCloud. With record time to value, DataDome acts as a force multiplier for teams, offering transparent insights, 24/7 SOC coverage options, and 50+ easy to deploy integrations. DataDome was named a Leader in The Forrester Wave™ Bot Management 2024 Report, is consistently ranked a G2 Leader, and was recognized as one of G2’s Best Security Products of 2024.
Address 29 Boulevard Des Italiens
Paris, 75002
France
Website datadome.co
Social Networks
|
336
|
Egress, a KnowBe4 company
As advanced persistent threats continue to evolve, we recognize that people are the biggest risk to organizations’ security and are most vulnerable when using email.
Egress, a KnowBe4 company, is the only cloud email security provider to continuously assess human risk and dynamically adapt policy controls, preparing customers to defend against advanced phishing attacks and outbound data breaches before they happen. Leveraging contextual machine learning and neural networks, with seamless integration using cloud-native API architecture, Egress provides enhanced email protection, deep visibility into human risk, and instant time to value.
Address White Collar Factory, 1 Old Street Yard, 12th Floor
London, EC1Y 8AF
United Kingdom
Website www.egress.com
|
225
|
Endor Labs
Endor Labs is a software supply chain security (SSCS) platform for organizations that value developer experience. We help DevSecOps teams build credibility with developer-centric tools that make it safer and faster to use open source (OSS) code, easier to detect CI/CD risks, and simpler to comply with SSCS regulations. Existing Software Composition Analysis (SCA) and Application Security Posture Management (ASPM) tools bury teams in uncontextualized data and tens of thousands of false positive alerts. Endor Labs’s new approach cuts 92% of the noise while providing actionable fix information that actually makes developers faster.
Address 444 High St.
Palo Alto, California
94301
United States of America
Website www.endorlabs.com
Social Networks
|
SC1
|
Flare
Flare is the leader in Threat Exposure Management, helping organizations of all sizes detect high-risk exposures found on the clear and dark web. Combining the industry's best cybercrime database with a ridiculously intuitive user experience, Flare enables customers to reclaim the information advantage and get ahead of threat actors. For more information, visit https://flare.io.
Address 1751 Rue Richardson, Unit 3.108
Montréal, Quebec
H3K 1G6
Canada
Website flare.io
Social Networks
|
513
|
Fortinet
Fortify Your Cybersecurity with Fortinet
Founded more than 20 years ago in Sunnyvale, California, Fortinet continues to be a driving force in the evolution of cybersecurity and the convergence of networking and security. Securing people, devices, and data everywhere is our mission. To that end, our portfolio of over 50 enterprise-grade products is the largest integrated offering available, delivering proven cybersecurity everywhere you need it. More than 755,000 customers trust Fortinet solutions, which are among the most deployed, most patented, and most validated in the industry.
fortinet.com/uk
Address Gainsborough House
Unit 2 Manor Park, Manor Farm Road
Reading, RG2 0NA
United Kingdom
Website www.fortinet.com/uk
Social Networks
|
215
|
GitHub
GitHub Advanced Security is an application security testing solution that is natively embedded in the developer workflow. It empowers DevSecOps teams to prioritize innovation and enhance developer productivity without sacrificing security. Automated security checks are run with every pull request, surfacing issues in the context of the development workflow so vulnerabilities are fixed in minutes, not months.
Address 88 Colin P Kelly Jr St
San Francisco, California
94107
United States of America
Website github.com
|
306
|
Google
Transform your cybersecurity with frontline intelligence, expertise and AI-powered cloud innovation. With Google Cloud, you can prevent, detect, investigate and respond to security incidents before they impact your business, and build on the most trusted, secure cloud to drive your organisation’s digital transformation.
Address Belgrave House76 Buckingham Palace Rd
London, SW1W 9TQ
United Kingdom
Website cloud.google.com/security
Social Networks
|
418
|
HackerOne
HackerOne is the global leader in human-powered security, harnessing the creativity of the world’s largest community of security researchers with cutting-edge AI to protect your digital assets. The HackerOne Platform combines the expertise of our elite community and the most up-to-date vulnerability database to pinpoint critical security flaws across your attack surface. Our integrated solutions, including bug bounty, pentesting, code security audits, spot checks, and AI red teaming, ensure continuous vulnerability discovery and management throughout the software development lifecycle. Trusted by industry leaders such as Coinbase, General Motors, GitHub, Goldman Sachs, Hyatt, PayPal, Snap Inc, and the U.S. Department of Defense, HackerOne was named a Best Workplace for Innovators by Fast Company in 2023 and a Most Loved Workplace for Young Professionals in 2024.
Address 548 Market Street, PMB 24734
San Francisco, California
94104
United States of America
Website www.hackerone.com
Social Networks
|
403
|
HCLSoftware
HCLSoftware is an innovative global company built on a foundation of trusted heritage. We go beyond enabling your digital transformation — we fuel the Digital+ Economy, providing a comprehensive toolkit to bridge the gap between where you are and where you need to be.
Address 6th Floor, 70, Gracechurch Street
London, EC3V OXL
United Kingdom
Website www.hcl-software.com
|
420
|
ING
ING is a leading European universal bank. Over 1/4 of the 60,000 employees work in Tech. We serve around 38 million customers in over 40 countries. We apply technology on a global scale to provide a superior customer experience that’s personal, easy, relevant and instant. We use the latest insights and tools to protect people’s personal data and their money. Above all, there’s one thing we care about most - making the difference in people’s lives. With tech that matters.
Address Bijlmerdreef 24
Amsterdam, 1102 CT
Netherlands
Website www.ing.com
|
313
|
ISC2
Address 280 Bishopsgate
London, EC2M 4RB
United Kingdom
Website www.isc2.org
Social Networks
|
241
|
JFrog
JFrog Ltd. (Nasdaq: FROG) is on a mission to create a world of software delivered without friction from developer to device. Driven by a “Liquid Software” vision, the JFrog Software Supply Chain Platform is a single system of record that powers organizations to build, manage, and distribute software quickly and securely, to aid in making it available, traceable, and tamper-proof. The integrated security features also help identify, protect, and remediate against threats and vulnerabilities. JFrog’s hybrid, universal, multi-cloud platform is available as both self-hosted and SaaS services across major cloud service providers. Millions of users and 7K+ customers worldwide, including a majority of the Fortune 100, depend on JFrog solutions to securely embrace digital transformation. Once you leap forward, you won’t go back! Learn more at jfrog.com and follow us on X: @jfrog.
Address 270 East Caribbean Drive
Sunnyvale, 94089
France
Website jfrog.com
|
127
|
Jit
Jit enables full application and cloud security coverage in minutes. Simply tailor a developer security toolchain to your use case in Jit's clickable interface, and easily implement it across your repos.
From there, Jit provides automated security scanning, security advice, and remediation code entirely within the PR, so developers never need to leave their environment to incorporate security. To prevent long lists of false positives, Jit can determine whether a vulnerability is exploitable in production to focus attention on the critical results.
In summary, developers can easily adopt Jit to secure their code without slowing them down.
Address 100 Summer St
Boston, Massachusetts
02110
United States of America
Website www.jit.io
|
424
|
Keeper Security
Keeper Security is transforming cybersecurity for people and organizations around the world with next-generation privileged access management. Keeper’s easy-to-use cybersecurity solutions are built with zero-trust and zero-knowledge security to protect every user on every device. Trusted by millions of individuals and thousands of organizations, Keeper is the leader for password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging. Learn more at KeeperSecurity.com.
Address King's Terrace
5A Lower Glanmire Rd
Cork, Cork
T23 DX49
Ireland
Website www.keepersecurity.com
Social Networks
|
327
|
KnowBe4
KnowBe4 empowers your workforce to make smarter security decisions every day. Over 65,000 organisations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk. KnowBe4 builds a human layer of defense so organisations can fortify user behavior with new-school security awareness and compliance training. Deploying KnowBe4 results in users that are alert and care about the damage that phishing, ransomware and other social engineering threats pose. The platform includes a comprehensive suite of awareness and compliance training, real-time user coaching, AI-powered simulated social engineering, and crowdsourced anti-phishing defense. With content in 35+ languages, KnowBe4 provides the world’s largest, always-fresh library of engaging content to strengthen your human firewall
Address 1 Leeds City Office Park, Meadow Lane
Leeds, LS11 5BD
United Kingdom
Website www.knowbe4.com
Social Networks
|
307
|
Mend.io
Mend.io offers an enterprise suite of application security tools designed to help leading organizations build and manage mature AppSec programs, enabling them to stop chasing vulnerabilities and start proactively managing application risk.
Address Ariel Sharon 4 Street
Givatayim, 532004
Israel
Website www.mend.io
|
406
|
Metomic
Metomic's data security software for SaaS, GenAI and cloud was born out of the frustration of its leaders trying to implement SaaS applications that make businesses more productive but are off limits because of high-risk security concerns. As a next generation security solution focused on SaaS applications, Metomic gives security teams clear visibility into how their organisation is sharing, storing, and extracting sensitive data from SaaS applications, such as Google Workspace and Slack. This allows them to detect and prevent security threats, allowing businesses to take full advantage of SaaS applications. To learn more visit www.metomic.io.
Address Office One, 1 Coldbath Square
London, EC1R 5HL
United Kingdom
Website metomic.io
Social Networks
|
231
|
Mindgard
Mindgard is an Enterprise (Automated AI Red Teaming/Continuous Security Testing for AI) product that helps you find and remediate security risks in your AI powered products, throughout the Software Development Life Cycle.
Address Level 24, One Canada Square, Canary Wharf
London, E14 5AB
United Kingdom
Website mindgard.ai
Social Networks
|
511
|
NATO NCIA
The NATO Communications and Information Agency (NCIA) is NATO’s technology and cyber hub, providing digital solutions and resilient communication and information services for seamless connectivity among Allied and Partner Nations. Our team of 3,000 civilian and military staff, located across 34 sites in Europe and North America, works together to connect all corners of NATO and maintain its edge. NCIA enables NATO to perform its core tasks, preserving peace and security for one billion. We collaborate with industry, academia and not-for-profit organizations to deliver innovative solutions, facilitate political consultations and enable multi-domain operations, protecting NATO’s networks 24/7.
Address Oude Waalsdorperweg 61
The Hague, 2597 AK
Netherlands
Website www.ncia.nato.int
Social Networks
|
430
|
NetSPI
NetSPI is the proactive security solution used to discover, prioritize, and remediate security vulnerabilities of the highest importance, so businesses can protect what matters most. NetSPI secures the most trusted brands on Earth through Penetration Testing as a Service (PTaaS), External Attack Surface Management (EASM), Cyber Asset Attack Surface Management (CAASM), and Breach and Attack Simulation (BAS).
Leveraging a unique combination of dedicated security experts, intelligent process, and advanced technology, NetSPI brings a proactive approach to cybersecurity with more clarity, speed, and scale than ever before.
Address 241 North 5th Avenue
Suite 1200
Minneapolis, Minnesota
55401
United States of America
Website www.netspi.com
Social Networks
|
320
|
Nokod Security
Nokod Security protects enterprises from risks introduced by low-code/no-code (LCNC) applications and robotic process automation (RPA) development.
The Nokod Security Platform identifies vulnerabilities and compliance issues in apps built on platforms such as Microsoft Power Platform, UiPath, and ServiceNow.
Security teams are alerted to HTML and SQL Injections, Malicious third-party Components, Hard-coded Secrets, Untrusted Connections, Potential Data Leakage, and more.
Nokod provides automation and citizen developers with easy guidance for fixing security issues.
Address Abba Hillel Silver Rd 14
Ramat Gan, 5250606
Israel
Website nokodsecurity.com
Social Networks
|
SC9
|
OX Security
Address 7 Totzeret Haaretz, 5th Floor
Tel Aviv-Yafo, 6789104
Israel
Website www.ox.security
|
432
|
PlexTrac
Address 816 W Bannock Street, Suite 400
Boise, Idaho
83702
United States of America
Website plextrac.com
|
427
|
Push Security
Push is a browser-based identity security platform that hardens and monitors your identity attack surface. Turn every employee's browser into a telemetry source and control point for defending workforce identities to prevent account takeover at scale.
Security teams can monitor and secure their entire identity attack surface (ISPM) and detect and block identity-based attacks (ITDR) such as advanced phishing techniques. Push enforces controls to block, warn or guide employees in-browser to prevent breaches before they happen.
Address 2 Kingdom Street, 6th Floor
London, W2 6BD
United Kingdom
Website pushsecurity.com
Social Networks
|
436
|
ReversingLabs
ReversingLabs is the trusted name in file and software security. We provide the modern cybersecurity platform to verify and deliver safe binaries.
Address 222 Third St, Suite 1101
Cambridge, Massachusetts
02142
United States of America
Website www.reversinglabs.com
Social Networks
|
433
|
runZero
runZero was founded by HD Moore (creator of Metasploit) to help organizations discover and secure every asset across their IT, OT, and IoT environments — including risky unknown and unmanaged devices. On average, customers find 25% more assets with runZero.
The platform doesn’t require agents, authentication, or appliances to accomplish this. Our novel active scanning combines with passive discovery and API integrations to deliver insights across internal and external attack surfaces, as well as in-depth fingerprinting and exposure identification on every asset.
runZero is trusted by 500+ customers and is recognized as a Customers’ Choice on Gartner® Peer Insights.
Address 1512 Bluebonnet Lane
Austin, Texas
78704
United States of America
Website www.runzero.com
Social Networks
|
332
|
SecHard
SecHard, simplifies complex processes with its integrated approach. Its cybersecurity process automation capabilities provide unmatched cyber resilience, significantly reduce cyber risks, and mitigate the talent shortage problem. In addition to providing time and cost advantages, it also alleviates the workload of your Information Security Experts. No other product like this in the global market that includes all these features on a single platform and is compatible with the Zero Trust Architecture.
Address KÜÇÜKBAKKALKÖY MAHRÜYA SKNO: 12 -18 IÌ‡Ç KAPI NO: 1 ATAŞEHİR
Istanbul, 34750
Turkey
Website www.sechard.com
Social Networks
|
233
|
Secure Code Warrior
Secure Code Warrior is a secure coding platform that sets the standards that keep our digital world safe. We do this by providing the world’s leading agile learning platform that delivers the most effective secure coding solution for developers to learn, apply, and retain software security principles. More than 600 enterprises trust Secure Code Warrior to implement agile learning security programs and ensure the applications they release are free of vulnerabilities.
Address Ironstone House, 4 Ironstone Way,Brixworth
Northampton, NN6 9UD
United Kingdom
Website www.securecodewarrior.com
Social Networks
|
507
|
SIEMonster
40fi leverages the latest technology to protect your business from evolving threats. 40fi with its strong blue team foundation, has partnered with SIEMonster, which is created by a professional red team. We believe this is the best of both worlds.
40fi powered by SIEMonster, safeguards your digital assets, boosts operational efficiency, and drives growth through innovative and scalable solutions. With us, you're not just protected – you're empowered.
Address Level 6, 33 Holburn
London, EC1N 2HT
United Kingdom
Website 40fi.net
Social Networks
|
333
|
Snyk
Snyk is a developer-first security company that helps software-driven businesses develop fast and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and container images. Snyk’s solution is built on a comprehensive, proprietary vulnerability database, maintained by an expert security research team in Israel and London. With tight integration into existing developer workflows, source control (including Bitbucket, GitLab, Github), and CI/CD pipelines, Snyk enables efficient security workflows and reduces mean-time-to-fix. For more information or to get started with Snyk for free, visit https://snyk.io.
Address 24 Eversholt Street
London, NW1 1AD
United Kingdom
Website snyk.io
Social Networks
|
113
|
SOCRadar
SOCRadar was designed to provide a comprehensive and proactive approach to cybersecurity for organizations of all sizes. It combines Cyber Threat Intelligence, Brand Protection, External Attack Surface Management, and Supply Chain Intelligence into a single platform, providing a unified solution for managing cyber threats. SOCRadar's democratizing threat intelligence approach enables SMEs to access threat intelligence services previously only accessible to large enterprises, helping to level the playing field in the cybersecurity industry.
Address 254 Chapman Road, Suite 208
Newark, Delaware
19702
United States of America
Website www.socradar.io
|
509
|
SpecterOps
In cyber security, you can’t fix what you can’t see. The very nature of Active Directory, Entra ID and Azure create invisible attack paths that risk escalations to nearly everything in your stack. Guided visibility of your identity attack paths and directory hygiene are critical.
BloodHound Enterprise is the go-to platform for Attack Path Management, empowering identity and security teams with continuous prioritisation, remediation guidance and verification and reporting metrics that let you see improvement over time in reducing
identity attack paths. Beloved by hundreds of global corporations and government departments, BloodHound Enterprise dramatically reduces the risk of lateral movement and privilege escalation in Active Directory, Azure AD / Entra ID, and hybrid Azure environments. BloodHound Enterprise is made by SpecterOps, is designated FedRAMP High by the U.S. FedRAMP program, and complies with SOC 2 Types 1 & 2 and ISO 27001 & 27017. Learn more: https://specterops.io/bloodhound-overview/
Address 100 N Pitt St, Suite 310
Alexandria, Virginia
22314
United States of America
Website specterops.io
Social Networks
|
324
|
Stamus Networks
As organizations face threats from well-funded adversaries, Stamus Networks relentlessly pursues solutions that make the defender's job easier and more impactful. The global leader in Suricata-based network security solutions, Stamus Networks helps enterprise security teams know more, respond sooner and mitigate their risk with insights gathered from cloud and on-premise network activity. Our Stamus Security Platform combines the best of intrusion detection (IDS), network security monitoring (NSM), and network detection and response (NDR) systems into a single solution that exposes serious and imminent threats to critical assets and empowers rapid response.
Address 5 Avenue Ingres
Paris, 75016
France
Website www.stamus-networks.com
Social Networks
|
411
|
Swimlane
Swimlane delivers automation for the entire security organization. Swimlane Turbine is the AI-enhanced, low-code security automation platform that unifies security teams, tools, and telemetry in-and-beyond the SOC into a single system of record to reduce process and data fatigue while quantifying business value and ensuring overall security effectiveness.
Mission Statement
Prevent breaches and enable continuous compliance via a low-code security automation platform that serves as the system of record for the entire security organization.
Address 999 18th St
Suite 2201N
Denver, Colorado
80202
United States of America
Website swimlane.com
Social Networks
|
414
|
Sysdig
In the cloud, every second counts. Attacks move at warp speed, and security teams must protect the business without slowing it down. Sysdig stops cloud attacks in real time, instantly detecting changes in risk with runtime insights, a unique AI architecture, and open source Falco. Sysdig delivers live visibility by correlating signals across cloud workloads, identities, and services to uncover hidden attack paths. By knowing what is running, teams can prioritize the vulnerabilities, misconfigurations, permissions, and threats that matter most. From prevention to defense, Sysdig helps enterprises move faster and focus on what matters: innovation.
Sysdig. Secure Every Second.
Address 135 Main Street, 21st Floor
San Francisco, California
94105
United States of America
Website sysdig.com
|
237
|
Taylor & Francis
Address 4 Park Square, Milton Park
Abingdon, Oxfordshire, OX14 4RN
United Kingdom
Website taylorandfrancis.com
|
440
|
ThreatLocker
Stop ransomware! ThreatLocker® improves enterprise-level server and endpoint security with zero trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Operational Alert solutions.
Address 1950 Summit Park Dr, 4th Floor
Orlando, Florida
32810
United States of America
Website www.threatlocker.com
Social Networks
|
201
|
Tidal Cyber
Tidal Cyber's Threat-Informed Defense platform provides data-driven visibility to help enterprises organize critical threat and defensive intelligence structured against MITRE ATT&CK and synthesize that intelligence using threat profiles that prioritize adversaries under TTPs. Calculate risk reductions from deployed security tools and view coverage maps showing residual risk.
Address 12644 Chapel Road PO Box 76
Clifton, Virginia
20124
United States of America
Website www.tidalcyber.com
Social Networks
|
SC7
|
Tines
Build workflows and automate processes with the only platform purpose-built to empower technical teams. Break down barriers across systems with fewer duplicate efforts, unnecessary alerts, and information silos.
Address The Academy, 42 Pearse St
Dublin, Dublin
D02 YX88
Ireland
Website www.tines.com
Social Networks
|
337
|
Torq
Torq is transforming cybersecurity with its pioneering enterprise-grade, AI-driven hyperautomation platform. By connecting the entire security infrastructure stack, Torq makes autonomous security operations a reality. It empowers organizations to instantly and precisely remediate security events, and orchestrate complex security processes at scale. Fortune 500 enterprises, including the world’s biggest financial, technology, consumer packaged goods, fashion, hospitality, and sports apparel companies are experiencing extraordinary outcomes with Torq.
Address HaMelacha Street 3, Floor 10-11
Tel Aviv-Yafo, 6721503
Israel
Website torq.io
Social Networks
|
226
|
Tracebit
Tracebit deploys and maintains tailored security canaries, proactively detecting intrusions across your organisation - from cloud infrastructure, to identity and endpoints.
With a read-only connection to your environment, Tracebit recommends canaries based on your unique configuration; deploys them via infrastructure-as-code; and continuously evolves and refreshes them to keep threat actors guessing.
Tracebit is an intrusion detection solution that helps you “assume breach” at scale. Covering AWS, Azure and other cloud resources.
Address 86-90 Paul Street
London, EC2A 4NE
United Kingdom
Website tracebit.com
Social Networks
|
SC8
|
TrueFort
The largest enterprises rely on TrueFort to secure their data center and cloud environments. After decades seeing tools fail to protect our businesses, we decided to build what we could never buy: a platform with continuous behavior analytics, application intelligence, and automated enforcement for the application runtime environment. We believe in aligning security, operations, and development teams around a single truth for the optimal resources for each application to control lateral movement in critical environments.
Address 3 West 18th Street
Weehawken, New Jersey
07086
United States of America
Website truefort.com
|
431
|
Upwind Security
Upwind is the runtime-powered cloud security platform that leverages runtime data to secure your cloud infrastructure. Upwind helps you mitigate the risks that actually matter, identify the root causes of threats in minutes and respond with context and automation.
Upwind protects everything you run in the cloud in one centralized platform, whose capabilities include CSPM, DSPM, CWPP, CDR, API security, vulnerability management, identity security and container security.
Address 140 New Montgomery St. San Francisco, California, 94105
San Francisco, 94105
Israel
Website www.upwind.io
Social Networks
|
107
|
VulnCheck
Address 6 Longfellow Rd
Lexington, Massachusetts
02420
United States of America
Website vulncheck.com
|
526
|
watchTowr
|
326
|
White Hat, an EPAM company
White Hat, part of the EPAM group, is a leading cyber intelligence and offensive security company that leverages an attacker’s perspective to shape innovative, proactive defense strategies. Founded in 2012, White Hat delivers strategic and technical expertise, empowering global enterprise clients to transform from reactive defenses to resilient security postures. Cyber threats are imminent and always evolving. Our elite team of cyber analysts and ethical hackers has successfully resolved and thwarted some of the world’s most complex cyber incidents for governments and leading organizations across finance, healthcare, critical infrastructure, technology, telecom and other key sectors.
Address 17 Rothschild Boulevard, Floor 4
Tel Aviv-Yafo, 6688120
Israel
Website www.white-hat-cyber.com
|
409
|
Wiz
Address Suite 4, 7th Floor, 50 Broadway
London, SW1H 0DB
United Kingdom
Website www.wiz.io
|
412
|
wolfSSL
wolfSSL, the best-tested cryptography, provides security solutions emphasizing speed, size, portability, features, and standards compliance. Our performance-optimized TLS library is designed for standard, embedded, and RTOS environments, securing over 2-billion connections. wolfSSL supports industry standards up to the current (D)TLS 1.3, is up to 20x smaller than OpenSSL, offers a simple API, OpenSSL compatibility layer, OCSP and CRL support, FIPS 140-3 compliance and post-quantum cryptography (PQC algos including Dilithium, FALCON, KYBER, and more).
Address 10016 Edmonds Way, Suite C-300
Edmonds, Washington
98020
United States of America
Website www.wolfssl.com
Social Networks
|
425
|
Women in Security and Privacy (WISP)
Address 1000 Rolling Woods Way
Concord, California
94521
United States of America
Website www.wisporg.com
|
340
|
Women’s Society of Cyberjutsu (WSC)
Address 1405 S. Fern St, Suite 514
Arlington, Virginia
22202
United States of America
Website womenscyberjutsu.org
|
341
|
YesWeHack
YesWeHack is a leading Bug Bounty and Vulnerability Management Platform whose clients include Teamviewer, Tencent, Swiss Post, Orange and the French Ministry of Armed Forces. Founded in 2015, YesWeHack connects organisations worldwide to tens of thousands of ethical hackers, who uncover vulnerabilities in websites, mobile apps and other digital assets. YesWeHack products include Bug Bounty, Vulnerability Disclosure Policy (VDP), Pentest Management and Attack Surface Management platforms.
Address 14 Rue Charles
Paris, 75004
France
Website yeswehack.com
Social Networks
|
330
|
Zero Networks
Zero Networks is the pioneer of automated microsegmentation that implements in 30 days. Gone are the days of manual labeling, guessing on grouping, and never-ending policy creation and management. With automated, accurate rule creation, agentless architecture and patented just-in-time MFA for privileged connections, Zero Networks segments every asset on prem and in the cloud, even OT/IoT, with set-and-forget deployment and maintenance. Combined with their advanced Identity Segmentation and Secure Remote Access capabilities, Zero Networks enables true zero trust capabilities to finally thwart ransomware for good, exceed compliance requirements, earn chart-topping audit scores, and pass every pen test.
Address 1317 Edgewater Drive, #1171
Orlando, Florida
32804
United States of America
Website zeronetworks.com
Social Networks
|
315
|