This article showcases our top picks for the best Boston based Cyber Security companies. These startups and companies are taking a variety of approaches to innovating the Cyber Security industry, but are all exceptional companies well worth a follow.
We tried to pick companies across the size spectrum from cutting edge startups to established brands.
We selected these startups and companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
Top Boston Cyber Security Companies
iboss has created the first and only web gateway as a service specifically designed to solve the challenge of securing distributed organizations. Built for the cloud, the iboss Distributed Gateway Platform leverages an elastic, cloud-based node architecture that provides advanced security for today’s decentralized organizations with more financial predictability.
Users are always connected to iboss cloud, regardless of device or location, to ensure all Internet traffic is secured for compliance, web filtering, malware defense, and data loss at all times. iboss was founded in 2003 and is based in Boston, MA, USA..
Cybereason is the leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, and managed monitoring services. Founded by elite intelligence professionals born and bred in offense-first hunting, Cybereason gives enterprises the upper hand over cyber adversaries.
The Cybereason platform is powered by a custom-built in-memory graph, the only truly automated hunting engine anywhere. It detects behavioral patterns across every endpoint and surfaces malicious operations in an exceptionally user-friendly interface.
Cybereason is privately held and headquartered in Boston with offices in London, Tel Aviv, and Tokyo.. .
Founded in 2011, BitSight transforms how organizations manage information security risk. The BitSight Security Ratings Platform applies sophisticated algorithms, producing daily security ratings that range from 250 to 900, to help manage third party risk, underwrite cyber insurance policies, benchmark performance, conduct M&A due diligence and assess aggregate risk.
Organizations worldwide, including seven of the top 10 cyber insurers, 20% of Fortune 500 companies, and 3 of the top 5 investment banks use BitSight’s proven Security Ratings technology on a daily basis to make integral risk and business decisions. With over 1,000 customers and the largest ecosystem of users and information, BitSight is the most widely used Security Ratings Service.
For more information, please visit www.bitsighttech.com or follow @BitSight on Twitter.. .
Onapsis provides cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications. Its solutions include the Onapsis Security Platform, a widely-used SAP-certified cyber-security solution in the market.
Unlike generic security products, Onapsis’ context-aware solutions deliver both preventative vulnerability and compliance controls, as well as real-time detection and incident response capabilities to reduce risks affecting critical business processes and data. The company was founded in 2019 and is headquartered in Boston, Massachusetts.
Onapsis has offices in Heidelberg, Germany, and Buenos Aires, Argentina.. .
Say No to Passwords. Passwords are the weakest link in securing access to your applications.
Biometric techniques, new devices, and new device sensors provide exciting possibilities. However, they can be expensive to deploy and manage.
Transmit Security allows you to drag and drop Authentication, Trust Models and Identity Management into any Application at Business Speed. You will be able to do trusted device binding, primary authentication, secondary authentication and respond to security risks immediately.
Deploy any policy instantly. No change to your application required..
ObserveIT helps organizations identify and eliminate insider threats. With more than 1,600 global customers across all major verticals, ObserveIT is an insider threat monitoring and prevention solution that empowers security teams to detect insider threats, streamline the investigation process, and prevent data exfiltration.
The company is headquartered in Boston, Massachusetts, United States.. .
Voatz is a mobile election voting platform, secured via smart biometrics, real time ID verification, and the blockchain for irrefutability. Voatz enables citizens to vote in all kinds of elections or voting events via a smartphone.
Past attempts at internet based voting have failed or not gone mainstream due to fundamental concerns around security, auditability, and voter anonymity. With Voatz, using biometrics for security and the Blockchain for irrefutability, it is able to tackle all challenges and significantly streamline the process of voting and identity verification.
Voatz was a part of the Techstars Boston 2017 and Masschallenge Boston 2017 cohorts. The company was founded on 2015 and is headquartered in Boston, Massachusetts..
InAuth is a digital device intelligence company for a mobile-first world. It delivers the most advanced device identification, risk detection, and analysis capabilities possible to help organizations limit risk, remove friction, and reduce fraud within their digital channels.
With safer digital transactions, banks, payment networks, merchants, healthcare providers, governments, and other organizations are better positioned to capture new revenue opportunities and compete more effectively in an “always-on” world.. .
DUST — the Diamond Unclonable Security Tag — is a proprietary technology which utilizes nanodiamonds to create an unclonable identity layer on any object. An optical scanner and cloud-based infrastructure provides an interface to the object identity and provenance.
DUST ensures that trusted data and verifiable products are used and traced across their full lifecycle.. .
We’re building a next-generation global security fabric to connect and secure the digital ecosystem on which enterprise businesses depend. Join us in helping solve complex systems problems at the intersection of cloud, networking, security, and distributed computing.
If you’re interested in learning more, please email [email protected] or visit our website. Our team combines an unparalleled mix of talent, skill, and passion with years of experience at industry-leading networking, security, and infrastructure companies, including Cisco, Microsoft, AWS, and Cloudflare.
Our investors include Bain Capital Ventures, 645 Ventures, First Star Ventures and Dreamit Ventures.. .
Kolide is an Endpoint Security agent and MDM that puts user productivity and privacy first. Powered by Honest Security, we believe in security through transparency, trust, education and empowerment.
We provides end-users with real-time alerting through Slack, enabling them to take ownership of the security of their device.. .
Born and raised in the security community, we’re on a roll and just getting started. In late 2009, the original team of Pwnies – Dave Porcello, Gabe Koss, and Oliver Weis – placed the Pwn Plug on the original site (Dave’s blog) with little expectation of what was to come.
From those humble beginnings, we have focused on providing full threat detection of every wireless and wired device in and around your workplace. We are the only company that detects rogue, misconfigured, and unauthorized devices across wired and wireless spectrums.
By automating wireless and wired device detection, our solutions continuously detect the devices on or around your network that are open pathways for attackers. Pwnie Express is led by industry veterans with deep security testing and product development experience.
Security assessment is our lifeblood, and we believe in making it simple to do the easy things, and possible to do the hard stuff. With Pwn Pulse, a distributed security assessment service, and our award-winning sensors, security teams can get the answers they need in a timely and effective manner..
CyberSaint Security is a leading cybersecurity software firm that helps organizations address business risk through an automated, intelligent cybersecurity compliance and risk management program. Based in Boston, Massachusetts, the CyberSaint team’s intellectual DNA winds deeply through the academic, tech and investment communities in Boston, the White House, RSA, IBM, EMC, KPMG, MIT, Harvard, and others.
The Company’s mission is to empower organizations to adopt cybersecurity frameworks that enable holistic measurement, enhance communication and improve cybersecurity resiliency. The CyberStrong Platform is an integrated risk management solution powering automated, intelligent cybersecurity compliance and risk management.
Built on the gold-standard foundation of the NIST Cybersecurity Framework, CyberStrong’s patented capabilities streamline and automate GRC activities and provide a single pane of glass through which CISOs and their security teams can measure, report, and mitigate risk. CyberStrong’s unparalleled time-to-value, breakthrough Artificial Intelligence and Machine Learning automation eliminate manual effort and help organizations make informed decisions that reduce risk while driving overall business value..
Trillbit is a tech company that can convert any existing speaker into a data transmitter and any device with a microphone into a data receiver. Any device with a speaker becomes a transmitter and any device with a microphone becomes a receiver.
With that, it connects businesses and people to exchange proximity-based, real-time information just over the sound, without the need for any network, wifi, or Bluetooth. Proprietary technology for Data over Sound.
The company has won several awards for its disruptive technology and applications. It was founded in 2017 and is headquartered in Boston, Massachusetts..
Suspect Technologies is a Next Generation Law Enforcement Imaging Software. Suspect Technologies aims to continuously improve the security, safety of people and access to services by using computer vision technology.
Its solutions enhance the collective values of security, safety, efficiency and convenience. It is currently scaling as the face company of law enforcement..
Abusix is a company of Internet security, network abuse handling, antispam and fraud specialists. Their mission is to help ISPs & Internet companies solving the rapidly growing problem of outgoing spam and all kind of other network abuse or security issues in a solid, accurate and reliable way.
They are providing network abuse handling & reporting, customized spamfeeds, consulting and cloud-based software/services against network abuse for ISPs, ESPs, technology providers, businesses and many more. Get in touch!.
ZeroNorth is a provider of risk-based vulnerability orchestration across applications and infrastructure. It provides a comprehensive and continuous view of risk and reduces costs associated with managing disparate technologies.
The organizations that rely on software as a competitive advantage trust ZeroNorth to manage risks by orchestrating the continuous and comprehensive discovery and remediation of vulnerabilities.The company empowers customers to rapidly scale application and infrastructure security while integrating seamlessly into developer environments to simplify and verify remediation. ZeroNorth was founded in 2015 and is headquartered in Boston, Massachusetts, United States..
krypt.co builds the next generation of mobile-based authentication, with a vision that authentication should be based on strong cryptography. Public key cryptography has existed for almost 40 years but it’s barely used for authentication.
The private key is not memorizable. Most people cannot compute digital signatures in their head.
Therefore we need to store the private key somewhere. It has to be accessible but also kept a secret.
At KryptCo, they tackles this very problem and believes that smartphone is core to the solution.. .
Aite Group is an independent research and advisory firm focused on business, technology, and regulatory issues and their impact on the financial services industry. The company provides annual research subscription services offering access to an extensive library of research reports and their underlying data sets and access to a team of seasoned industry analysts.
Its practices include retail banking & payments, wholesale banking & payments, institutional securities and investments, wealth management health insurance, life insurance, property and casualty insurance, fraud & AML, and cybersecurity. Its consulting services include new market entry studies, market sizing studies, competitive analyses, vendor evaluations, on-site strategy sessions, advisory calls, presentations, webinars, and white papers.
Aite Group was founded by Gwenn Bézard and Gerald Clemente, and is based in Boston, Massachusetts.. .
Headquartered in Boston, FiVerity, Inc. develops and markets AI- and machine learning software solutions that detect new and emerging forms of cyber fraud and deliver actionable, proactive threat intelligence.
The company’s products meet the unique requirements of financial institutions, including banks, credit unions, and credit card providers. The company’s solutions help financial institutions strengthen, streamline and scale their consumer-facing business processes, such as application processing, credit verification, and customer onboarding.
With its predictive and proactive approach, FiVerity’s solutions help customers to improve their internal processes to reduce losses from fraud and drive faster, and more profitable and sustainable growth.. .
Kinnami is a cloud software company that tackles the problem of a lack of trust in the digital world. It’s blockchain-based platform safeguards data provenance by enhancing data verification and audibility.
AmiStamp provides an easy way to create fingerprints of digital assets that cannot be falsified. It can be used to establish ownership (IP, copyrights, trade secrets) as well as to authenticate that data has not to be altered in subsequent stages of collaboration (e.g.
contracts, research). Kinnami’s EcoSystem API also enables 3rd party developers to very easily & seamlessly integrate the digital stamping technology into their own applications.”.
Founded in 2016, Smart Hive’s mission is to make the cyber security intelligence that organizations use in their information sharing programs real-time, relevant, and actionable. Smart Hive was developed to give organizations the power of real information at their fingertips and finally an ability to build a pro-active Cyber Security Program.
Led by former Security Executives who understand the power of making informed decisions, Smart Hive was built understanding the challenges that have existed for over a decade in making real Information Sharing possible.. .
Advoqt Cybersecurity is an IT company for data science and open-source tools to automate the cybersecurity program. It combines Cybersecurity expertise with Data Science to optimize and automate your Risk Management program.
They deliver consulting, systems integration, and proprietary tools. They are focused on advancing your security program from initial project scoping through to successful completion.
The company offers solutions in Threat Analytics, Cloud Security. Penetration Testing, Asset Management, Soar (Security Orchestration Automation & Response), and Data Science.
It also helps businesses assess their resilience and then design, implement, and manage Cybersecurity programs that can really withstand modern-day threats. Their technology, expert consultants, and a vetted ecosystem of niche partners allow you to deliver integrated solutions that give you a competitive edge.
Advoqt Cybersecurity was founded in 2012 and is headquartered in Boston, MA, USA.. .
BlindHash Cyber’s patented technology offers a new way to think about securing passwords. Until now, the more secure the password the slower the login process along with an expensive pricetag for securing them.
BlindHash Cyber makes securing passwords scalable and makes it virtually impossible for hackers to steal your passwords via an offline attack.. .
ThreatReady Resources inspires people to build a culture of cyberawareness and assists companies in creating a human firewall as an effective first line of defense against cyber attacks. They focus on making people care about cyber threats.
They think it’s the first step in lasting behavior change. They live in a digital world surrounded by infinite information and they’ve all become experts at screening it out.
That’s why they use techniques from advertising and advanced learning to develop quick-hit campaigns that respect your employees’ time and intelligence while providing valuable information.. .
SecureFLO, LLC provides information and cyber/information security as a service. Data security that focuses on risk from cyber threats, business process, regulatory compliance, and overall operations.
We will work with your company to asses for HIPAA, FISMA, PCI, SOX, NERC, GDPR, NYDFS, CCPA, etc. We also help you develop standards like NIST, ISO, COBIT, UCF to develop good governance and policies.
We understand risk from a security and privacy perspective. We will help you conduct a Penetration test, Vulnerability scans, Secure code reviews to support the assessments.
All remediation efforts that include but not limited to DevOps, cloud, desktop email, network, etc. visit https://www.secureflo.net/services/ for more information.
Vulsec helps organizations from a standpoint to discover, correlate, and mitigate risks. To ensure an organization is protected, the company incorporates its digital security platform, automated risk discovery, and strong partner network with the methodology they provide.
The company brings in the experience from all industries within the United States and internationally to apply global data privacy laws that will protect companies from an audit. The company creates the blueprint that maps risks to solutions then bring to their CISO marketplace to facilitate introductions with the experts.
Vulsec was founded on 2015 and is headquartered in Boston, Massachusetts.. .
To address the ever-growing concerns of source code espionage and theft, a handful of veteran software developers have started GitStorage Inc. Its premier product, gitstorage, runs the version control system “git” on a small Linux appliance, offering a solution that combines the best of hosted options and on-premise solutions.
The company’s mission is to develop unique solutions to protect valuable intellectual property from getting into the wrong hands. GitStorage is sold in two variants, a 64GB (blue) and 16GB (pink) version.
The product is available for sale on Amazon.com. .
Appsulate is a web isolation platform that secures SaaS apps from data exfiltration and shields corporate endpoints from web-borne threats. It renders all content in the cloud and sends only passive, safe pixels to the browser to prevent exfiltration of confidential or regulated data from web apps (such as SFDC, O365 or Workday) or exposure to malicious web content.
IT security professionals gains peace of mind with GDPR and HIPAA compliance and visibility into end user activity. Appsulate runs in the cloud, accessible from any web browser without installation..
Flare Technologies tracks and analyzes the open source software that a software company brings in and utilizes in its final product. The company’s software plugin generates automated risk-analysis reports for security and compliance issues and integrates with a Real-time alert system that notifies whenever new vulnerabilities are introduced.
The technology was developed by Michael Lu and Stephan Williams, two programmers and recent computer science graduates from Georgia Tech.. .
Business builders, strategic marketers, security analysts. Deliver presentations throughout the United States and Canada on identity theft protection and personal security.
Work with Fortune 1000, IT and startups. Launching, branding, messaging, representation, m&a facilitator, SEO and media.
Private equity includes dynamic biometrics, credit card platform multi-factor authentication, security investigations and telemarketing fraud mitigation.. .
You may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.