This article showcases our top picks for the best San Francisco based Cyber Security companies. These startups and companies are taking a variety of approaches to innovating the Cyber Security industry, but are all exceptional companies well worth a follow.
We tried to pick companies across the size spectrum from cutting edge startups to established brands.
We selected these startups and companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
Top San Francisco Cyber Security Companies
HashiCorp is an open-source software company based in San Francisco, California. HashiCorp provides open source tools and commercial products that enable developers, operators, and security professionals to provide secure and run distributed application infrastructure.
It was founded in 2012 by Mitchell Hashimoto and Armon Dadgar. HashiCorp offers both open source and paid commercial products..
Lookout is a cybersecurity company that predicts and stops mobile attacks before harm is done to an individual or an enterprise. Lookout’s cloud-based technology is fueled by a global sensor network of more than 60 million users and tens of thousands of apps that are added daily.
With this dataset of virtually all the mobile code in the world and the predictive machine intelligence to analyze and make sense of the data, Lookout can identify connections that would otherwise go unseen and stop cybercriminals from attacking mobile devices. Headquartered in San Francisco, Lookout has offices in Boston, London, Singapore, Tokyo, Toronto and Washington, D.C..
Expanse is an enterprise software company that provides an updated view of all internet-connected assets that belong to an organization. It provides IT and security teams with visibility into their global internet attack surface, helping them discover unknown assets and reduce and manage their exposure to online threats.
Expanse is trusted by some of the world’s largest enterprises and government agencies to monitor and track more than 400 million Internet- and cloud-connected assets comprising more than 10% of the global Internet. Using leading-edge collection and analysis technology, Expanse will improve any organization’s awareness and visibility to help prevent successful attacks.
Founded in 2012, Expanse is headquartered in San Francisco, California.. .
Businesses of every size, in every industry, are increasingly dependent on technology. For all of the benefits innovation brings, the digitization of the economy also creates risk at a magnitude never previously imagined.
This new risk is complex, and it’s constantly evolving. The old way of managing risk doesn’t cut it in the digital age.
We designed At-Bay from the ground up to help businesses meet digital risk head-on. By combining world-class technology with industry-leading insurance expertise, At-Bay offers clarity and confidence to businesses in the digital age.
We believe that every business, big or small, when empowered to understand and manage risk, can thrive in a digital world. We address digital risk in a way that everyone, from brokers and business owners, to CISOs and CFOs, can all understand.
We question, analyze, and monitor the risk of every company in our portfolio—not just once, but continuously—so we can educate, advise, and support our brokers and our insureds throughout our partnership. Because digital risk never rests, and neither do we..
Coalition is the provider of cyber insurance and security, combining comprehensive insurance and proactive cybersecurity tools to help businesses manage and mitigate cyber risk. Coalition provides companies with up to USD $15 million of cyber and technology insurance coverage in all 50 states and the District of Columbia, as well as CAD $20M of coverage across all 10 provinces in Canada.
Coalition’s cyber risk management platform provides automated security alerts, threat intelligence, expert guidance, and cybersecurity tools to help businesses remain resilient in the face of cyber attacks.. .
ForgeRock® is the digital identity management company transforming the way organizations interact securely with customers, employees, devices, and things. Organizations adopt the ForgeRock Identity Platform™ as their digital identity system of record to monetize customer relationships, address stringent regulations for privacy and consent (GDPR, HIPAA, FCC privacy, etc.), and leverage the internet of things.
ForgeRock serves hundreds of brands, including Morningstar, Vodafone, GEICO, Toyota, TomTom, and Pearson, as well as governments like Norway, Canada, and Belgium, securing billions of identities worldwide. ForgeRock has offices across Europe, the USA, and Asia.
Visit www.forgerock.com for free downloads and follow us on Twitter @forgerock.. .
AppOmni secures the Applications that power the Enterprise! AppOmni is the only SSPM solution that gives teams all the tools they need to be successful – from security posture management to monitoring and detection to continuous compliance. To properly secure and manage the use of critical SaaS applications, Security, Compliance, and IT teams need a comprehensive solution that enables immediate visibility, proactive posture monitoring, normalized event streams, and effective compliance tooling.
AppOmni is that solution. Founded in 2018, AppOmni empowers Security, Compliance, and IT teams with unique capabilities across all phases of a mature SaaS Security Posture Management (SSPM) program.
Unlike traditional security and management tools, AppOmni deeply understands SaaS applications and provides immediate visibility, management, and detection capabilities.. .
Abnormal Security is an email security company that protects enterprises from targeted email attacks. The Abnormal Security platform takes a data science approach to provide everything needed for comprehensive email protection, detection, and response.
Abnormal Behavior Technology (ABX) models the identity of both employees and external senders, profiles relationships, and analyzes email content to stop attacks that lead to account takeover, financial damage, and organizational mistrust. Though one-click, API-based Office 365, and G Suite integration, Abnormal sets up in minutes and does not disrupt email flow.
Abnormal Security was founded in 2018 and is headquartered in San Francisco, California.. .
Privacera enables secure data sharing across mulitple on-prem and cloud services. It is leading disruption and innovation in the governance space by enabling data democratization without compromising data privacy, or compliance.
Data is the fuel for the next set of growth in enterprises. Data should be democratized and shared to facilitate better decision making.
Data sharing should happen without compromising on individual rights to privacy.. .
Bugcrowd connects companies and their applications to a crowd of tens of thousands of security researchers to identify critical software vulnerabilities. Powered by Bugcrowd’s platform, companies of all sizes can run both private and public bounty programs to efficiently test their applications and reward valid vulnerabilities.
Based in San Francisco, Bugcrowd is backed by Blackbird Ventures, Costanoa Ventures, Industry Ventures, Paladin Capital Group, Rally Ventures, and Salesforce Ventures.. .
Nozomi Networks provides an industrial cybersecurity solution for real-time visibility to manage cyber risk and improve resilience for industrial operations. Customers gain advanced cybersecurity, improved operational reliability and IT/OT integration.
It supports over a quarter of a million devices in sectors such as critical infrastructure, energy, manufacturing, mining, transportation, and utilities, to tackle escalating cyber risks to operational networks (OT).. .
Digital Shadows identifies unwanted exposure, protect against external threats, and minimize digital risk. The company’s product Digital Shadows SearchLight helps to minimize these risks by detecting data loss, securing the online brand, and reducing the attack surface.
Digital Shadows has proven that their digital risk management service is incredibly valuable, providing my security teams with context, prioritization, recommended actions, and even remediation options to dramatically reduce risk to Sophos. The company was founded in 2011 and is based in San Francisco, California..
RiskIQ provides organizations the visibility and intelligence they need to secure their Enterprise Digital Footprint and map their Adversaries’ infrastructure. RiskIQ products, powered by a proprietary virtual-user technology, threat analysis engine, and global proxy network, enable an organization to defend against threats targeting its websites, mobile applications, brands, customers, and employees.
RiskIQ is used by eight of the 10 largest financial institutions in the U.S. and five of the nine leading Internet companies in the world.
The company is headquartered in San Francisco and backed by Battery Ventures and Summit Partners. For more, visit www.riskiq.com..
Tigera provides Zero Trust network security and continuous compliance for Kubernetes platforms. Tigera Secure extends enterprise security and compliance controls to Kubernetes environments with support for on-premises, multi-cloud, and legacy environments.
Tigera powers all of the major Hosted Kubernetes environments including Amazon EKS, Azure AKS, Google GKE, and IBM Container Service. Tigera is also integrated with the major on-premises Kubernetes deployments and is shipped “batteries included” in Docker EE and fully integrated with Red Hat OpenShift.
Tigera Secure builds on leading open source projects: Kubernetes, Calico, and Istio, which Tigera engineers maintain and contribute to as active members of the cloud-native community. Our employees are experts in securing Kubernetes and our technology is deployed in the largest SaaS, financial services, gaming, and retail companies where security and compliance are critical to the business..
Valimail is the global leader in zero-trust email security. The company’s full line of cloud-native solutions authenticate sender identity to stop phishing, protect brands, and ensure compliance; they are used by organizations ranging from neighborhood shops to some of the world’s largest organizations, including Uber, Splunk, Yelp, Fannie Mae, Mercedes Benz USA, and the U.S.
Federal Aviation Administration. Valimail is the fastest growing DMARC solution, with the most domains at DMARC enforcement, and is the premier DMARC partner for Microsoft 365 environments..
Corelight offers network traffic analysis solutions for cybersecurity. It helps security professionals to understand network traffic and to detect and stop cyberattacks.
Its solution was built on Bro, a widely-used open-source framework that provides a real-time understanding of network traffic. The company was founded in 2013 and is headquartered in San Francisco, California..
Persona enables business to verify customer identities that brings trust to online interactions and help them with age verification, fraud prevention, and account recovery. It offers a comprehensive suite of automated identity verification components with worldwide coverage that can be configured, branded, and themed to create custom-tailored flows that cover any use case.
It handles complex collecting, verifying, and managing sensitive personal information to stay focused on building products. Persona was founded in 2018 and is headquartered in San Francisco, California..
Arkose Labs inc.
Arkose Labs is an information technology company that focuses on financial services and provides fraud prevention, anti-spam, and abuse analysis for businesses, companies, and industries. Its technology is designed for retail, gaming, and fin-tech.
Arkose Labs bankrupts the business model of fraud. Recognized by Gartner as a 2020 Cool Vendor, its innovative approach determines true user intent and remediates attacks in real-time.
Risk assessments combined with interactive authentication challenges undermine the ROI behind attacks, providing long-term protection while improving good customer throughput. The company was founded in 2015 and headquartered in San Francisco, California..
Panther’s mission is to help security teams detect and respond to breaches at cloud-scale. Panther is more than a SIEM, it’s a sustainable way to monitor everything happening in your environment.
In a world exploding with data, automation is critical. Panther directly enables security teams to create expressive detections with Python and store years of normalized and structured data in a security data lake.
Move to a platform built for security engineers, by security engineers. Jack Naglieri launched the company in San Francisco, California in 2018..
Traceable combines the end-to-end distributed tracing, cloud-native integrations, and advanced behavioral analytics to provide modern application and API security. It natively instruments Kubernetes, Envoy Service Mesh, Serverless, and other cloud-native environments to secure transactions.
Traceable leverages machine learning technology to analyze data from the user and session to the application code in order to learn normal application behavior and detect activities that deviate from the norm, allowing businesses to easily analyze attack attempts and perform root cause analysis to conduct security operations.. .
CloudPassage® Halo® is the world’s leading agile security platform that provides instant visibility and continuous protection for servers in any combination of data centers, private clouds and public clouds. The Halo platform is delivered as a service, so it deploys in minutes and scales on-demand.
Halo uses minimal system resources; so layered security can be deployed where it counts, right at every workload – servers, instances and containers. Leading enterprises like Citrix, Salesforce.com and Adobe use CloudPassage today to enhance their security and compliance posture, while at the same time enabling business agility.
Headquartered in San Francisco, California, CloudPassage is backed by Benchmark Capital, Lightspeed Venture Partners, Meritech Capital Partners, Tenaya Capital, Shasta Ventures, Musea Ventures and other leading investors.. .
UpGuard’s proprietary technology tests an organization’s IT infrastructure both internally and externally and calculates the potential risk for future intrusions and outages. Upon evaluating the ongoing configuration state of every server and network device, companies are given an easy-to-understand score called CSTAR — a single number which indicates to IT staff as well as their executives their risk level for data breaches.
An organization’s CSTAR score can even be used by corporate insurers in creating a cybersecurity insurance policy. Thousands of companies, including ADP, E*TRADE, and Cisco Systems, use UpGuard to validate infrastructure, continuously detect risks, and procure cybersecurity insurance.
UpGuard is headquartered in Mountain View, California with offices in Portland, Oregon.. .
Orchid Labs is an open-source project committed to ending surveillance and censorship on the internet. Orchid uses an overlay network built upon the existing internet, which is driven by a peer-to-peer tokenized bandwidth exchange, creating a more inclusive, liberated internet.
Orchid Labs was founded in 2017 by Dr. Steven Waterhouse, Jay Freeman, Brian J.
Fox, Gustav Simonsson, and Stephen Bell.. .
TruSTAR is an API-first cloud native Intelligence Management platform that operationalizes internal and external data sources through an ecosystem of partner integrations and custom API solutions to help security teams accelerate detection, incident response, investigations, and collaboration. Our Mission is to build and deliver technology so teams of security professionals canDefend Better Together.
We believe that when security professionals can integrate intelligence data into every stage of their workflow, they can make better decisions faster. Founded in 2014 by a mix of seasoned entrepreneurs, former security and intelligence specialists, and killer product developers, TruSTAR is building a platform that operationalizes internal and external data sources through an ecosystem of integrations to help you gain control of your data..
Castle enables online businesses of all sizes to detect and prevent user account fraud, a technology previously only available to banks and large financial institutions. Whether you’re building a bitcoin service, e-commerce store, mobile app, or any other customer-facing application, Castle’s API’s lets you add account hijack protection.
Castle tracks fraudsters based on device fingerprint, keystrokes, site browsing history, and hundreds of other signals. Whenever something suspicious occurs, both the administrator and account owner are alerted and can immediately take appropriate action..
Wallarm is helping customers to implement application security functions for CI/CD environments. It is a high-performance WAF with the ability to verify the impact of malicious payloads in real time, allowing SecOps and DevOps teams to focus on real risks without manual attacks analysis.
Wallarm is adapting security (blocking) rules automatically for each release which ensures low false positives rate even for agile CI/CD approach. It’s a scalable hybrid-architecture solution with nodes deployed as packages, Docker containers and dynamic modules for NGINX/plus, while machine learning is performed by Wallarm cloud service..
Preempt secures all workforce identities to accelerate digital transformation. Since 80% of all breaches involve compromised credentials, Preempt unifies security visibility and control for on-premises and cloud identities.
Threats are preempted and IT policy enforced in real-time using identity, behavioral, and risk analytics. Preempt protects 4M+ workforce identities across 400+ enterprises.
Customers have reduced the cost required to stop advanced threats and accelerate Zero Trust and Conditional Access initiatives. Founded in 2014, Preempt is headquartered in Silicon Valley, with R&D in Israel and sales offices worldwide..
Banyan Security provides a remote network access platform for hybrid and multi-cloud. It replaces the user’s legacy VPNs with a least privilege, network independent, contextual access platform modeled after the BeyondCorp framework.
The platform utilizes trust scoring powered by machine learning. It ensures both users and devices are authenticated and trusted before authorizing granular access to sensitive corporate applications.
Banyan’s distributed, highly scalable platform is currently used by enterprises across verticals including Adobe, SAP, Veeva, BlueVoyant, and Byton. Banyan Security was founded in 2015 and is headquartered in San Francisco, California..
Magic aims to make passwordless the gold standard for online applications. Magic is the bridge to a more secure and authentic Internet, and authentication is just the beginning.
By leveraging future-proof PKI and identity technology under-the-hood, Magic also lets developers tap into new infrastructures such as IPFS and blockchain — unlocking endless possibilities and innovative business models.. .
Bastille Networks Internet Security
Bastille specializes in enterprise threat detection through software-defined radio. It provides full visibility into the known and unknown mobile, wireless, and Internet of Things (IoT) devices inside an enterprise’s corporate airspace.
Through its patented software-defined radio and machine learning technology, Bastille senses, identifies and localizes threats, providing security teams the ability to accurately quantify risk and mitigate airborne threats that could pose a danger to network infrastructure.. .
Independent from any vendor or technology, the unparalleled Picus Platform is designed to continuously measure the effectiveness of security defenses by using emerging threat samples in production environments. Created by a team that’s been working together more than 10 years already and has proven their expertise in enterprise cybersecurity, Picus is trusted by many large multinational corporations and government agencies.
Recognized as a Cool Vendor in Security and Risk Management, 2H19 by Gartner.. .
Fast’s mission is to make buying online faster, safer and easier for everyone. Its Fast Login and Fast Checkout products enable a one-click sign-in and purchasing experience that makes it easier for people to buy and merchants to sell.
The company’s products work on any browser, device or platform to deliver a consistent, stress-free purchasing experience. Fast is entirely consumer-focused and invests heavily in its users’ privacy and data security.
Headquartered in San Francisco, Fast is a privately held company funded by Stripe, Index Ventures, Susa Ventures, Global Founders Capital and Brian Sugar – who also serves on the board. To learn more, visit fast.co..
Remediant provides enterprises with Privileged Access Management (PAM) software to help them protect their accounts from misuse and abuse. It enables real-time monitoring, zero trust protection of privileged accounts and Just-In-Time Administration (JITA) across IT/Security ecosystems.
Its product, SecureONE, a next-generation Privileged Access Management (PAM) solution that dynamically allocating privileged access across Windows, Linux and Mac systems — without installing an agent.. .
Rubica is advanced cybersecurity built for ease-of-use and end-user privacy, extending enterprise-grade protection to mixed use devices, personal environments & remote workers. Our advanced threat detection and prevention covers all devices (phones, laptops, tablets) on any network or cell connection, no matter what the user is doing online.
Set up is simple: Just download the app. No hardware, integration or IT support needed.
Our personal and work worlds are now blended. This requires a new approach to security which gives users convenience & privacy in their personal activities, but assures the company that there’s advanced threat protection covering the device at all times, regardless of whether it’s being used for work or personal.
This is Rubica.. .
PSafe develops Internet security software for mobile devices in Latin America. Its products include PSafe Total, an antivirus and security software for Android operating systems; PowerPRO that identifies and removes tasks that consume too much battery, and suggests solutions; and PSafe Total Windows, a software that activates real-time virus scans, provides optimization, and recovers valuable data by cleaning disk space that consumes temporary or unnecessary files.
Benjamin Myers, Marco de Mello, and Ram Rao founded PSafe in 2010, with its headquarters in San Francisco in California. It operates as a subsidiary of Grupo Xango..
Insight Engines empowers organizations to do deeply technical investigations of their data in minutes that today take days. Our first set of cyber security focused products are used daily by some of the largest healthcare, finance, and government organizations to go beyond their SIEM.
(1) We automatically let them know the use cases that are possible with the data in their log store, and what data they may want to remove. (2) We empower them to ask questions of their log data, via our unique natural language search technology, and get relevant answers in seconds.
(3) We give them timely recommendations of what to ask. Our investors include folks like August Capital, Google Ventures, and DCVC..
Opora develops cyber threat intelligence technologies. It combines cloud computing, big data, machine learning, and other cutting-edge fields into an intelligent, dynamic, and robust cyber threat intelligence platform running on the global cloud.
The Gartner Research Group named the company a cool vendor in “Cool Vendors in Security and Risk Management Software for Technology and Service Providers, 2018”.. .
tCell is a next gen web app firewall for the cloud designed to overcome the limitations of traditional Web Application Firewalls. tCell’s technology provides unparalleled visibility into application behavior, dramatically reducing false positives, protects applications from attacks and provides actionable data to prevent future attacks.
tCell’s adaptive deployment models enable Security and DevOps organizations to deploy industry leading security along side mission critical applications and is used by leading organizations like Veeva, Zenefits, and John Muir Health. tCell is funded by Menlo Ventures and lead by the executive teams from Splunk, Okta, and Skyhigh Networks.
Learn more at tcell.io.. .
Authy provides a two-factor authentication smartphone application for consumers, a 2FA Rest API for developers, and an authentication platform for enterprises. It enables every user, group, and organization to customize their settings and configure security rules through its platform.
Authy achieves and maintains compliance with PCI, HIPAA, FIPS 140, and other regulatory mandates worldwide. It offers protection for various apps, including Facebook, Gmail, Dropbox, or any account that supports Google Authenticator.
Authy’s login verification options include a unique verification code, a text message, and a singular answer question that appears only on its users’ mobile device.. .
Paladin is cybersecurity simplified. Our mission is to make cybersecurity accessible and practical for all companies.
Cyber risk is human risk. Paladin Shield, our all-in-one cybersecurity suite, makes it easy to defend employees, systems, and data against cybercriminals..
Clear Skye delivers a complete Identity and Access Governance (IAG) solution. It provides employee lifecycle automation, access requests, access certifications, and business intelligence.
It allows for complete integration of governance and business processes, which supports the explosion of applications and complex workflow needs.. .
Horizon3.ai provide continuous, automated Pen Test operations to enable Customers to understand whether critical systems and data are protected, what urgent issues must be immediately triaged or remediated, how to prioritize vulnerabilities and other defensive efforts, whether detection and remediation times are improving, and identify ineffective tools, controls, policies, processes, and training. We invite you to our website to learn and provide feedback How we do it.
We identify your cybersecurity weaknesses by safely conducting offensive cyber operations leveraging automation, machine learning, and artificial intelligence. The customer provides Horizon 3 AI initial access, which allows us to act as a supply chain threat, insider threat, advanced persistent threat (APT), or a compromised user.
With that initial access, we automatically orchestrate the execution of cyberattack tools & techniques. We laterally move through the enterprise, chaining together harvested credentials, software misconfigurations, exploitable vulnerabilities, and dangerous software defaults just like a cyber threat actor.
We leverage graph analytics techniques to efficiently and safely maneuver, identifying verified attack paths that could lead to sensitive data exposure or business systems disruption. We inform the user of these verified attack paths, prioritized by business impact, so they can remediate the threat vectors..
Averon is on a mission to restore sanity in online identity. Our conversion-increasing innovations instantly authenticate mobile users, creating a world where we can all move safely and efficiently around the internet with zero effort and maximum trust—no more frustrating and unsecure login IDs and passwords.
Averon’s technology is the new gold standard for digital identity—the easiest, fastest and most secure verification solution for users on both WiFi and LTE. Simple to implement and effortless for users, Averon’s solutions don’t rely on personally identifiable information, providing the most private authentication method in the digital realm.
Protected by 35 patents, Averon’s methods are trusted by the world’s leading ride share and transportation services, digital currencies, cryptocurrency wallets, and global telecommunications companies to deliver the most elegant user experience with the highest caliber security. Join us in helping the online world Be Authentic.
For more information, visit www.averon.com. .
i2Chain is a SaaS platform allowing companies to securely share sensitive documents with anyone within or outside the organization. i2Chain enables mortgage companies, banks, accounting firms, hospitals, and others to safely share their customers’ PII, IP, and PHI with co-processing entities in compliance with GDPR, CCPA privacy regulations.
i2Chain’s zero-click technology secures documents with encryption, policies, immutable audit logs and it is storage agnostic. i2Chain was founded in 2018 and is based in San Francisco, California..
Lacoon Mobile Security
Lacoon Mobile Security provides a mobile threat management platform that allows enterprises to manage and mitigate the risks of BYOD and protect their corporate assets from mobile cyber threats including malicious applications, targeted network attacks and Advanced Persistent Threats. Lacoon protects the world’s leading organizations with the most comprehensive mobile security available to both iOS and Android, delivered via a centralized platform that easily augments to existing infrastructure providing real-time security and intelligence.
Its patented Behavioral Risk Engine detects device, application and in-network threats that others will miss and quantifies the risks and vulnerabilities that BYOD exposes to the enterprise. Company History: Lacoon Security Ltd.
was founded in 2011 by experts from mobile cyber security and defense industries who observed mobile devices being used to access and store unprecedented quantities of personal & corporate information and discovered a consequent uptick in attacker activity targeting those devices that posed significant risks to security. Their extensive expertise, developed in the field during their service in elite units of the Israeli Defense Forces, gave them a unique perspective on both the dangers of BYOD and corporate mobility trends and the shortcomings of current technologies.
They recognized that organizations did not have the tools they needed to effectively protect themselves from the cyber-criminal and espionage activity they were facing.. .
Purism makes computers and mobile devices that do not track you. Purism products are specifically designed, from the bootloader and motherboard to the operating system and applications, to respect and protect your privacy and security, out of the box.
Purism devices feature physical hardware “kill switches” to sever the camera, microphone, data (and in the tablets, GPS) connections for additional security. Purism hardware is preinstalled with the world’s best privacy applications, including QubesOS, the Linux operating system recommended by security experts for ultimate defense against malware, tracking, viruses, spyware, ransomware and other threats.
Privately held and crowdfunded, Purism has raised $1.1 million in its first year, solely with crowdfunding and product preorders. According to ZD Net, the Librem is one of the top 2 crowd-funded PC hardware projects in history.
According to Wikipedia, it is one of the top 100 hardware crowdfunds in history, and it is the #1 opensource hardware crowdfunded product. Purism has received widespread global press coverage in PCWorld, InfoWorld, Engadget, Wired, TechCrunch, Mashable and ArsTechnica, and early product reviews are positive.
(****). The product has been funded and manufactured and the first Librem 13″ notebooks are currently shipping to backers.
The Librem 15 rev. 2 laptop with 1K screen and 4K screens is shipping.
SEWORKS focuses on automated offensive security to empower organizations to simulate real-world attack scenarios and discover security weaknesses in advance. SEWORKS provides Pentoma®, a fully automated web penetration testing solution.
Pentoma®’s core technology employs GAMAN (Generative Adversarial Model Agnostic Networks), an AI engine built by SEWORKS specifically for offensive security purposes. SEWORKS is headquartered in San Francisco, US, and backed by SoftBank Ventures Asia, Qualcomm Ventures, Samsung Ventures, and others..
Solebit provides the fastest, most accurate and cost-effective approach for the identification and prevention of zero-day malware and unknown threats. SoleGATE is the disruptive cyber protection software platform by Solebit, challenging the norms of currently available technologies that rely on slow, costly and mostly outdated, ineffective methods of sandboxing, signatures and behavioral inspection.
The solution is powered by DvC™ (data vs. code), a patented, real-time, signature-less engine.
DvC assumes that there is no legitimate reason for executable code to be present in any data file. As such, it does not rely on heuristics or behaviors (which are core limitations of competing technologies), and definitively identifies and terminates any instance of malicious code such as hidden CPU instructions, encrypted and polymorphic payloads, shellcodes and other commands typically buried in data file.
DvC also accurately identifies an blocks malicious active content using advanced flow analysis, de-obfuscation techniques and deep content evaluation, to reveal threat intent within any inbound data file covering machine, operating system and application levels, thereby rendering such sandbox evading attacks harmless to the enterprise. Solebit was founded in 2014 by a team of world-class cybersecurity experts, all graduates of the elite technology units in the Israel Defense Forces with years of experience in offensive and defensive security.
It counts a variety of leading global financial organizations, tech, defense contractors, security vendors, cloud and telecom service providers as active customers. For more information, please visit solebit.io.
Encoding.com, the world’s largest video encoding service, powers video transcoding for 3,000+ companies, including leading brands across media and entertainment, eLearning, retail, telecommunications, lifestyle and advertising. Blending an affordable SaaS model with sophisticated integrations on the AWS and Rackspace cloud computing platforms, Encoding.com enables publishers and developers to instantly scale without expensive video infrastructure investments.
Encoding.com supports ALL popular web and mobile formats utilizing Encoding Intelligence™ to accelerate processing and optimize display on any device. With millions of encodes under its belt, Encoding.com is the only encoding service to offer service-level guarantees for performance, so its customers can focus on content creation.
This Software-as-a-Service (SaaS) business is headquartered in San Francisco, California with offices in Denver, CO, New York, NY and St.Petersburg, Russia. For more information about Encoding.com, visit http://www.Encoding.com..
Rubicon Labs was founded with a mission to provide trust, identity, and security. The founders have a long and deep history of innovation and successful productization at Apple, Pixar, Adobe, Hewlett Packard, Broadcom and many successful startups.
Inspired by the changing IoT landscape, the team has created a unique technology to provide security and identity seamlessly from the cloud to the billions of connected things. Rubicon Labs has its headquarters in San Francisco, California and a R&D center in Austin, Texas.
The company is backed by Third Point Ventures, Pelion Venture Partners, and Akamai.. .
SIEMonster is the brainchild of a team of professional hackers with over 20 years’ experience hacking into companies around the world. Using this experience, SIEMonster has built modern security SIEM tools for companies wanting to detect threats and risks to their organization.
It all began when a global manufacturer detailed their frustrations at the exorbitant licensing costs of commercial SIEM products and asked whether they could build a SIEM to minimize these annual license fees. they thought that was a great idea and set out to build a SIEM that they would also use.
SIEMonster now provides SIEM products for Managed Security Providers (MSSP’s) and Security Professionals around the world.. .
Tall Poppy builds tools and services to help companies protect their employees against online harassment and abuse. It combines proactive security training, threat monitoring, and detection with incident response when an individual comes under attack.
In addition to its standard service, it also offers additional capabilities for high-profile or executive staff who face increased risk.. .
Wivity’s connected device cybersecurity information solutions give you the data you need to make trust decisions. Our cryptographic private key registry is being standardized by the SunSpec Alliance- https://sunspec.org/sunspec-blockchain-work-group/.
Produce level security is available via DeviceLookup.com- https://beta.devicelookup.com.. .
Sqreen is the industry’s first provider of Application Security Management (ASM), unifying application security needs into one single platform, giving over 500 companies unprecedented visibility and protection in production. Sqreen enables developers, operations and security teams to scale their security without impacting engineering velocity.
The company was founded by security veterans who previously led the offensive security team at Apple. Sqreen is backed by Greylock Partners, Y Combinator, Alven and Point Nine.
For more information, please visit www.sqreen.com.. .
StealthMail makes your emails secure and invisible to email relays, hackers, or Public Internet threats – making email relationships with clients a trusted one via StealthMail’s best-in-class Secure Email Channel. Moreover, StealthMail gives you full and exclusive control over your encryption keys, data, and access rights – so that your email communication is fully protected.
To start using StealthMail no integration is needed. There are no risks for existing IT infrastructure.
The whole deployment takes less than 4 hours. Users get Outlook Add-Ins and the server is deployed to Company’s Azure Cloud..
Patented Goldilock is the only technology on earth that allows individuals and institutions to physically disconnect and connect data and devices to & from the internet, in seconds, from anywhere on earth, with no human intervention – and WITHOUT using the internet. That’s right.
Goldilock has created a complete non-IP back channel, available to you and your organization, without purchasing specialty personal devices or going through complex training. Goldilock keeps your data completely isolated from the internet, invisible and un-findable to hackers.
For your enterprise Goldilock can ensure your data backups are clean and isolated in case of ransomware or other cyber intrusions. Goldilock’s Autotomy product allows network administrators to isolate devices and network architecture, in seconds, to mitigate attacks, zero-day incidents and other cyber threats..
Guardian protects and secures privacy and data while using apps and browsing the web on an iOS device. Guardian was founded on their belief that personal privacy and transparency into network-connected devices are fundamental consumer rights.
It is based in San Francisco, California.. .
ThinkSmart is a SaaS provider of sales channel management and motivation solutions to large, global Fortune 500 companies. The Company’s platform automates the capture and conversion of sales channel data across the enterprise into actionable key performance indicators (KPIs) presented in highly visual and interactive dashboards.
While most existing BI / analytics platforms are typically used by corporate managers to gain visibility into business unit performance, they are often limited in their ability to provide visibility beyond the channel partner or distributor level (e.g., national or regional dealer). They are further limited in their ability to provide tools to influence or motivate performance at the individual salesperson level (e.g., sales associate at dealer).
ThinkSmart’s unique analytics and reporting capabilities allow its clients to track real-time sales data at point-of-sale (POS) / individual salesperson level, and standardize the use and analysis of that data by various constituents across an entire organization. ThinkSmart also provides employee management and communication tools to track and incentivize sales performance at the individual level.
The Company’s platform is especially vital for large organizations with disparate sales channels or distribution partners where access to end customer data can be challenging. ThinkSmart’s clients are typically large global organizations conducting sales activity through multiple local distributors or retail storefronts where headquarters has limited influence over individual sales performance..
OPSWAT protects critical infrastructure. Our goal is to eliminate malware and zero-day attacks.
We believe that every file and every device pose a threat. Threats must be addressed at all locations at all times—at entry, at exit, and at rest.
Our products focus on threat prevention and process creation for secure data transfer and safe device access. The result is productive systems that minimize risk of compromise.
That’s why 98% of U.S. nuclear power facilities trust OPSWAT for cybersecurity and compliance.
OPSWAT. Trust no file.
Trust no device.. .
MT’s mission is to provide enterprises with continuous risk profiling and best of class security solutions as easy to use plugins and SaaS. Our first service MTCaptcha provides online bot detection and protection against automated attacks via AI driven adaptive captchas and proof-of-work, while fully compliant with Privacy (GDPR) and Accessibility (WCAG AAA) standards.
Its smart, its beautiful and its fully enterprise ready.. .
Momentum Cyber is the premier trusted advisor to the cybersecurity industry providing bespoke high-impact advice combined with tailored, senior-level access. The firm was founded by world-class operators and advisors and caters to the unique needs of both earlier stage Founders, CEOs, & Boards as well as the complexity of later stage & public companies throughout their lifecycle – Incubation to Exit.
Headquartered in San Francisco with operations globally, the founding team has closed over 250 transactions totaling over $250 billion in value. Momentum Cybersecurity Group, LLC conducts its M&A advisory services as an M&A Broker as defined by the SEC..
Arxan, a global trusted leader providing the industry’s most comprehensive application protection solutions, works with organizations looking to protect critical applications that deployed “into the wild.” Arxan currently protects more than one billion application instances across many industries including financial services, mobile payments, healthcare,automotive, gaming, and entertainment. Unlike legacy security providers that relying on perimeter-based barriers to keep bad actors out or that require device management controls, Arxan products protect at the application-level from the inside out.
This approach protects the source and binary code to expand the corporate perimeter of trust. Arxan provides a broad range of patented security capabilities such as a dynamic app policy engine, code hardening, obfuscation, white-box cryptography and encryption, and threat analytics..
They created security software, which is impossible to be compromised by the available modern technologies. It is a phantom password system that no one can see and once applied, users never need to hide it again.
It is not vulnerable to camera and keylogger, because users never enter their real code. The users Log In screen always looks different and they select different buttons each time they Log On, which only represent their actual password..
Digify is a cloud-based document security service that helps companies to protect and keep control of confidential documents. It features document security, virtual data rooms, file tracking statistics, and platform integrations.
Digify enables its users to protect, track, and control their files and information that they sent to a recipient.. .
CRFT enables teams of all sizes to ease the burden of repetitive and time-consuming tasks without custom code development or lengthy consulting engagements. As a result, CRFT helps focus on strategic and proactive efforts rather than playing “catch up” while streamlining operations and reducing analyst burn-out.
CRFT supports a wide variety of advanced automation use cases in key areas of cybersecurity management, including Threat Remediation, Incident Response, Provisioning, Governance.. .
IObit designs and develops system utilities and security software for superior PC performance and security for user worldwide. It offers PC optimization and security software that include an optimization software for PC speedup called Advanced SystemCare Free, PC clean, and registry clean under Windows 10, 8, 7, Vista, and XP, a solution to identify and fix outdated, missing, and incorrect PC drivers, as well as to download and update Nvidia, Realtek, Intel PC, and Microsoft Windows drivers called Driver Booster 4, a solution to uninstall unwanted programs and plug-ins called IObit Uninstaller 6 Free, a disk defragmenter solution called Smart Defrag 5, Start Menu 8 for Windows 8, a solution to identify and block more malicious files called Advanced SystemCare Ultimate 10, and a solution to scan and detect malware and online threats called IObit Malware Fighter 5 Free.
IObit also provides a password folder protection tool called Protected Folder, a solution to secure important data and privacy called Random Password Generator, and a solution for files or folders “Cannot Delete” problems on Windows called IObit Unlocker. Its solutions are available online.
IObit’s solutions and tech support are provided through distributors. It began operation in 2004, with its headquarters in the United States..
CyberPolicy is your Trusted Advisor for Cyber Insurance. With curated choice and competitive rates from leading insurance carriers, They are committed to helping you find the right cyber coverage to protect your business against cyber attacks.
From creating a Cyber Plan, selecting cybersecurity tools, to purchasing the right policy, their team of licensed Advisors are here to offer objective advice and all the help you need. CyberPolicy, Inc is a wholly owned subsidiary of CoverHound, Inc.
CyberPolicy is distributed by CoverHound, Inc. acting as a Managing General Agency (MGA).
Founded in 2010, CoverHound is a San Francisco-based insuretech company backed by Chubb (formerly the ACE Group), one of the largest global insurance companies, American Family Ventures, RRE Ventures, Blumberg Capital and others. CoverHound delivers online platforms for comparing and purchasing P&C insurance, built to deliver fast, accurate and actionable rates from leading US carriers..
EVault, a Seagate Company, provides EVault on-premise, Cloud-Connected, and edge data protection solutions, often deployed in combination as Cloud-Connected “hybrids,” to help small to mid-size organizations protect and access their business data—anytime, anywhere. Through a uniquely integrated ecosystem of storage software, SaaS, managed services and appliances, EVault helps its customers meet the challenges of maintaining business continuity in multi-platform, multi-site environments.
EVault’s data protection, disaster recovery and other solutions are optimized to perform in a distributed environment, supported by a secure, reliable cloud storage infrastructure, and backed by the highest quality customer service. EVault’s solutions are sold through a broad reseller network, and power the products and services of managed service providers, data centers, telcos, application providers, and other technology partners for more than 30,000 customers worldwide..
New Context helps fortune 500’s build secure compliant data platforms. New Context created “Lean Security”, a set of best practices designed to help enterprises manage and secure data for critical infrastructure.
Awareness, Simplification, Automation and Measurement are the core principles of Lean Security. Learn more by reading New Context’s Lean Security Manifesto.
New Context Services include building and deploying secure and compliant data platforms, performing security assessments, driving IT/OT convergence and more generally, “DevOps done right” in environments where security and compliance are not an option. New Context also offers LS/IQ, a Software Product that empowers a business to continuously adapt and maintain security and compliance.
The LS/IQ Score empowers your organization to build sustainable data security and scalable systems effectively. New Context is passionate about keeping the connected world safe..
Vaultize is an enterprise platform for end-to-end file security with built-in information / digital rights management (IRM / DRM / EDRM), secure file sharing, data protection and data loss prevention (DLP). It takes an information-centric and holistic approach towards management, security and control of data in enterprises.
Vaultize Technologies is a privately held company with presence in more than 30 countries – including the US, Singapore and India, through its channel network consisting of resellers, distributors, system integrators and MSPs. Vaultize was started in 2010 by a team with extensive experience in technology leadership and executive management roles with security, storage and data protection leaders like Symantec, McAfee and VERITAS..
Telegraph Hill Software
Telegraph Hill (THPII) helps software companies with the strategy, design, and delivery of SaaS Operations, Agile Java Development, DevOps, Test Automation, Data Warehousing, Analytics, Machine Learning and Information Security. Located in San Francisco, THPII employs elite engineers, specializing in the front- and back-end development of SaaS applications.
THPII’s consultants have over six decades of combined leadership experience, holding roles such as CTO, VPE, and Head of Engineering throughout their careers.. .
EnvKey solves these problems without getting in the way. It’s like a password manager for API keys and application config.
Using end-to-end encryption built on the OpenPGP standard, EnvKey makes it easy to grant secure, always in-sync access to the developers and servers that need it, all from a user-friendly UI. Using EnvKey ensures that no 3rd party, including EnvKey itself, ever has access to your secrets.
It takes a part of your system that is error-prone and insecure and makes it just work.. .
You may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.