This article showcases our top picks for the best Washington based Cyber Security companies. These startups and companies are taking a variety of approaches to innovating the Cyber Security industry, but are all exceptional companies well worth a follow.
We tried to pick companies across the size spectrum from cutting edge startups to established brands.
We selected these startups and companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
Top Washington Cyber Security Companies
ExtraHop delivers cloud-native network detection and response to secure the hybrid enterprise. Our breakthrough approach applies advanced machine learning to all cloud and network traffic to provide complete hybrid and multi-cloud visibility, real-time threat detection, and intelligent response.
With this approach, we give the world’s leading enterprises including The Home Depot, Credit Suisse, and Caesars Entertainment the perspective they need to rise above the noise to detect threats, ensure the availability of critical applications, and secure their investment in cloud. Learn more at www.extrahop.com..
Tempered is a cyber risk management company that reduces cyber risks by providing point and click identity-based micro-segmentation. Its security and cloud network allow users to segment anything to achieve micro-segmentation for an IP resource without infrastructure change or disruption.
Tempered Networks was founded in 2012 and is headquartered in Seattle, Washington.. .
CI Security is a security company that provides managed cyber-security solutions. The company is an information security platform providing managed detection and response services to help you be secure, compliant, and resilient against threats to the life safety, life-sustaining, and quality-of-life systems and services you provide to clients, customers, constituents, and communities.
It focused on protecting and defending critical services in healthcare, the public sector, and the businesses that support them. The Critical Insight (CI) solution combines next-generation processing with an expert human touch to deliver advanced Managed Detection and Response (MDR), integrating cleanly into your existing strategy.
CI Security was founded in 2012 and is headquartered in Seattle, Washington, United States.. .
Polyverse develops cybersecurity technology to build diversity across multiple system dimensions, increasing the cost for attackers. It ensures global organizations and governments stop attacks before they start.
Polyverse enables customers and partners to use its leading-edge cyber-technology to build diversity and uniqueness across multiple system dimensions, increasing the complexity and cost for attackers and stopping cybersecurity attacks before they start. Polyverse turnkey solutions install in minutes within your existing architectural infrastructure and carry very low ongoing operating costs.
Polyverse technology has been validated by the U.S. Department of Defense to mitigate against zero-day memory exploits.
Founded in 2015 by bringing together top talent from Microsoft, Amazon, Google, and SUSE, Polyverse is led by founder and CEO Alex Gounares. Polyverse was recently named one of the top 100 startups in the world by CNBC..
Cloudentity is a provider of Identity-Aware Authorization and Application Security solutions for the API first economy such as Open Banking. API Access Control has emerged as the next generation of Identity security allowing enterprises to protect APIs, users, and services from misuse and abuse.
Security and infrastructure teams at Fortune 500 organizations across the world rely on Cloudentity to keep their applications safe from attack. For more information visit Cloudentity.com, on Twitter at @CloudentityTEAM, or connect on LinkedIn at www.linkedin.com/company/cloudentityteam/..
Strike Graph is a compliance SAAS solution simplifying security certifications such as SOC 2 Type I/II. These certifications dramatically improve revenue for B2B companies.
Our platform empowers companies to rapidly deploy a risk driven security program. After setup Strike Graph collects evidence for auditor review via automation and api driven integration to common business systems & infrastructure.
Facilitated by the Strike Graph platform, key actors in the process including Risk Managers, CTO’s, CISO’s and Auditors can work collaboratively to achieve trust and move deals.. .
doxo is an all-in-one bill pay service that facilitates secure payment to any biller with any payment method on any device. It currently serves over 4 million users who make payments to 75,000+ local and national businesses, making doxo the largest bill pay directory in the nation.
Billers on the network get paid directly and consumers have complete bills pay independence over when and how they pay their bills. The company more than doubled its customer base in 2018 and is expanding its team to further accelerate growth and change the bill pay landscape to focus on the customer.
doxo investors include MDV, Sigma Partners, and Bezos Expeditions.. .
TableSafe provides solutions for secure payment transactions. It develops RAIL, the patented ‘pay at the table’ solution.
It is a Kirkland, Washington-based technology company that designs, builds, and sells hardware and software products designed to eliminate credit and debit card information theft. In addition, their solutions increase waiter efficiency and provide restaurants with new marketing and communication applications..
CENTRI provides a complete, advanced security solution for the Internet of Things. Our flexible, software-only platform enables thing makers and developers to quickly get to market with purpose-built IoT security to protect their data from chip-to-Cloud.
CENTRI eliminates the risk of data theft and delivers device integrity with modern, standards-based technologies for the connected world.. .
Investments in Machine Learning and other data science analytics are beginning to show their limitations. DarkLight was created to bridge the gaps and help organizations realize the full potential of AI.
We are pointing DarkLight’s powerful domain agnostic AI platform first at a massive problem – Cybersecurity. To learn more, please visit www.darklight.ai..
VeriClouds is a threat intelligence company helping organizations detect compromised credentials before hackers do. We use the same data attackers do, proactively monitoring the dark web and systematically reducing user-centric risk.
VeriClouds provides the best approach to eliminate the biggest cause of massive data breaches, the weak and/or stolen password.. .
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network, including domains and IPs, and connect them with nearly every active domain on the Internet.
Those connections inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.
Learn more about how to connect the dots on malicious activity at http://www.domaintools.com or follow us on Twitter:@domaintools. .
WatchGuard Technologies, Inc. provides unified threat management solutions that combine firewall, virtual private networks (VPN), and security services to protect networks and businesses.
The companyâ€™s products include WatchGuard extensible threat management (XTM) 1050, a XTM appliance with Firebox X Peak, X Core, and X Edge e-Series that integrates stateful packet firewall, VPN, zero day attack prevention, anti-spyware, anti-spam, anti-virus, intrusion prevention, and URL filtering on a single appliance. WatchGuard also offers powerful, easy-to-use, easy-to-deploy multi-factor authentication.
WatchGuard Technologies, Inc. was formerly known as Seattle Software Labs, Inc.
and changed its name to WatchGuard Technologies, Inc. in 1997.
The company was founded in 1996 and is headquartered in Seattle, Washington with additional offices in North America, Europe, the Asia Pacific, and Latin America. WatchGuard Technologies, Inc.
operates as a subsidiary of Gladiator Corporation.. .
Townsend is a provider of data privacy services designed to meet evolving compliance requirements. It helps businesses to meet evolving legislation, technology, and data privacy requirements using strong encryption and key management to secure sensitive data; managed file transfers, XML and web services to meet business requirements; and real-time system logging for comprehensive reporting on access attempts to confidential data.
Townsend Security was established in 1985 and is headquartered in Olympia, Washington.. .
Fortify 24×7 is a leading managed security services provider offering comprehensive services that cover all aspects of Prevention, Detection and Response. The company provides ‘Security as a Service’ across multiple categories including Endpoint Protection, Firewall/IDS, DLP, PAM, IAM and more via a collaborative cloud-based platform, which enables customers to tackle evolving cyber threats on a real-time basis.
Fortify 24×7 has successfully filled a gap in the industry with its dedicated 24x7x365 Security Operations Center (SOC), keeping a steady finger on the pulse of cyber threats across North America and trends across the world. Furthermore, a proactive approach has pushed the company to rapidly develop technologies in-house given the need of its customers.
Fortify 24×7 is a fully equipped and dedicated team who identifies cyber threats relevant to customer organizations, conducts analysis on impact and actively connects the dots across multiple incidents. This core incident response service is strengthened by preventive vulnerability management systems that span an organization’s cyber and domain footprint and enables our customers to be cyber resilient.
Fortify 24×7 current customer base includes SMB’s, Fortune 500 companies, healthcare (payor/provider), education, entertainment & media, and state/local government.. .
Quantivate is a leading provider of web-based continuity, risk management, and compliance software and service solutions. Founded in 2005, with the release of its Business Continuity software, the company has continued to develop innovative solutions that help organizations manage risk and remain compliant, while saving save time and money.
Quantivate’s product portfolio now comprises of a comprehensive suite of applications for Business Continuity, Vendor Management, Enterprise Risk Management, Information Security, and Internal Audit Management. Quantivate’s products and services have been audited, reviewed, and passed examinations from many state and federal examiners including: • NCUA • FDIC • OCC • State Financial Institution Examiners • State Insurance Commissioners • FDA/HIPAA • WHO/CDC • NERC.
DataSunrise is an innovative software company dedicated to delivering data security products. DataSunrise was founded by a talented team with strong background in enterprise security, data protection and database management systems.
DataSunrise’s flagship product is a data-centric high-performance security software for real-time sensitive and private data protection, auditing, discovery, compliance with privacy law, SOX, HIPAA, ISO27001, PCI, GDPR.. .
Premera Blue Cross
Premera Blue Cross is a leading health plan in the Pacific Northwest, providing comprehensive health benefits and tailored services to 1.5 million people, from individuals to Fortune 100 companies. Premera is committed to providing its members peace of mind about their healthcare coverage.
The company offers innovative health and wellness solutions focused on quality outcomes for patients and controlling costs. Premera Blue Cross, which has operated in Washington since 1933, is a not-for-profit, independent licensee of the Blue Cross Blue Shield Association..
rThreat is a Zero trust defense-forward breach and attack simulation SaaS platform that challenges your cyber defenses using real malicious scripts in a secure testing environment. Our on-demand threat packages consist of known and unknown/Zero-Day threats.
Our platform enables users to rapidly identify security gaps, address vulnerabilities, and optimize solutions for customers. More importantly, it allows continuous testing of customer environments to ensure regulatory and data privacy requirements are met, remediated, and provide a paper trail/evidence for third-party auditors.
At the senior levels of the organization, the rThreat platform provides a view into the response capabilities of cyber defense teams to react to threats and their ability to mitigate those risks rapidly.. .
Tenta Browser encrypts and securely stores your downloaded data, so only you have access to your private files. Your bookmarks, tab history, notifications, and images, videos, and documents are only accessible after you enter your PIN, and are viewed in their private media players.
You can also encrypt personal videos and images by moving them from your local device storage to your Tenta Vault in just two taps.. .
OSNEXUS enables organizations to manage their storage ranging from small sites to hyper-scale deployments across global datacenters with its QuantaStor SDS industry-leading Software Defined Storage (SDS) platform. The QuantaStor platform provides scale-out file, block, and object storage technology as a single, easy-to-manage solution.
QuantaStor SDS, deployed by Global 500 companies worldwide, addresses a broad set of storage use cases including server virtualization, big data, cloud computing, and high performance applications through scale-out physical and virtual storage appliances.. .
If one WordPress site running Wordfence is attacked, the attacker is blocked and all other sites also running Wordfence block that attacker. You are watching this happen in real-time on the map above.
The data you’re seeing is being streamed to your web browser from one of their real-time security servers in their Seattle data center. Green traffic is ordinary WordPress sign-in’s.
Red traffic is hack attempts that we’ve blocked. Wordfence is the only WordPress security plugin that provides this kind of real-time distributed protection as it learns from other sites that are attacked.
It’s part of what makes us the best WordPress security plugin in the business. But that’s just the beginning of what they do to protect your site and help you recover from an attack..
Halo Privacy specializes in total digital privacy for individuals, small groups, and teams. Through significant experience in both the private and public sectors Halo’s principals realized that to achieve the best possible results for their customers Halo needs to combine the best of a consulting practice with custom tailored products.
This was the genesis of our “3T” approach. Tradecraft, Training, and Technology.
The company’s Platinum Solution, The Halo Suite is the best realization of this. With a continuous cycle of improvement reacting to the ever changing threat landscape Halo customers can rest assured that all measures are being taken to assure their privacy..
Datafi is a cloud data enablement platform that helps organizations reduce the data friction across their data landscape. The platform connects data sources and uses in a simple, secure and compliant way, enabling critical applications, data analytics, modern data workloads and machine learning.
Datafi technology provides complete discovery, control and visibility of business data everywhere at the scale necessary to enable digital transformation and at a fraction of the cost of legacy data management and compliance solutions. Datafi Labs was founded in 2019 and headquartered in Seattle, Washington, USA.
Codeproof Technologies Inc
Embrace the power of mobility to grow your business as a mobile-first enterprise. The comprehensive Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more.
The SaaS enterprise mobile security platform is built on the elastic cloud stack for flexible, scalable, secure and productive mobility operations. The Codeproof cloud console enables centralized Mobile Application Management, Mobile Content Management and Mobile Device Management.
The platform boasts Geofencing and time-based policy enforcement to manage your devices where you want, when you want. We envision leadership in the IoT and mobile security segment by establishing a safe environment for the modern enterprise to connect, learn and perform better than ever before.
Codeproof Technologies Inc., a Delaware corporation with principal place of business at Bellevue, WA.. .
Cloak’s mission is to give you the tools you need to stay safe when you’re online. Cloak’s app is the easiest, most trusted way to stay safe when you’re using public Wi-Fi, like the kind you find at coffee shops, airports, hotels, and conferences.
Cloak automatically detects unsafe connections and secures them. Available today for iPhone, iPad, and Mac, Cloak “just works” – anytime, anywhere in the world.
You can get going with Cloak in just a couple minutes – it’s that easy. Cloak is VPN, evolved..
CoinSafe.com makes a free and easy to use app that turns any smartphone, tablet or desktop computer into a Bitcoin ATM. With no expensive, clunky machines, all you need is an internet connected device to begin buying and selling bitcoin at your local business.
Our software supports all major currencies and works anywhere with a demand for exchanging bitcoin and cash.. .
Allstream is a Canadian leader in IP communications and the only national provider that works exclusively with business customers. Supported by its more than 30,000-kilometer nationwide high-performance fibre-optic network, Allstream’s communications technologies and services include a range of innovative, highly-scalable IP, Cloud, and Security solutions that help organizations communicate more efficiently and profitably.
Allstream is recognized for offering solutions that its competitors will not and for delivering the best customer experience among national providers.. .
Electric Lightwave are a new kind of communications company focused on understanding your business. They apply their agility, expertise, infrastructure and services to build reliable, secure solutions to solve your most challenging technical issues.
This is backed by a support model that delivers a high-touch service experience aimed to delight you.. .
Leviathan Security Group
We understand these. We understand how important they are to your business.
We learn your business, and how you use information. We assess your organization’s tolerance for risk, and then provide clear insight for your technology operations, development and management.
Leviathan provides a broad set of information security services ranging from low-level technical engineering to strategic business consulting. We’re as comfortable with fuzzing the firmware on your novel embedded device as we are with conducting a penetration test, reviewing your source code, or evaluating the security of your Internet-scale application—and our consultants speak to both engineers and boardrooms.
Our methodology is grounded in measurable facts, and field-tested by humans. Our consultants are experts in their fields known around the world for their research.
Our clients range from the Fortune 50 to startups, and from lawyers, to banks, to utilities.. .
iSign International Inc., a provider of products and services for Bio-metric Signature Security In North America. Leading Provider of Dynamic Electronic Document Management Organizations are moving away from paper daily and going to electronic document platforms.
iSign International‘s solutions provide a secured cloud based platform where all of your documents are available anytime, anywhere in an encrypted system accessed by your biometric signature utilizing our proprietary technology; eliminating alpha numeric passwords which are hackable, lost or stolen daily. Our clients collaborate within their organizations on encrypted documents and with their customers utilizing iMail in an end to end encrypted communication, increasing workflow within the organization with security that is unmatched.
iSign International offers solutions for the individual user to large corporations with superior scalability so as your business grows, we meet the needs of any organization. iSign Biometric Signature is a proprietary encrypted gateway, encrypted electronic document and encrypted email application for desktop, Android and iOS.
It uses end-to-end encryption to secure all communications to other iSign users. iSign platforms can be used to send and receive encrypted instant messages, group messages, attachments and digital content.
Users can independently verify the identity of their messaging correspondents by utilizing the GPS tag and unique id attached to every document. iSign Internationals proprietary end-to-end encryption is a system of communication where only the communicating users can read the messages.
It prevents potential eavesdroppers – including telecom providers, Internet providers, and even the provider of the communication service – from being able to access the encrypted message. The system is designed to defeat any attempts at surveillance and/or tampering because no third parties can decipher the data being communicated or stored.
Our data is everything. Photos, account numbers, passwords.
But keeping it private is complicated and can be overwhelming. It doesn’t have to be.
Empowering you to protect your own privacy is what we are all about. Lemmino is a startup on a mission to bring digital security and privacy to everyone through simpler, easier tools.
Security for Everyone. Privacy for Everyone.
Built for Everyone. – Take Control – Keep tabs on your device, see what apps are installed and track its whereabouts.
Log onto our website and use our Phone Barking feature when it’s lost under the couch or if it’s gone for good, remotely lock or wipe it so no one finds your personal photos or reads your e-mail. – Stay Secure – Send and receive completely private messages that only the group can see and rest assured that the conversation is absolutely gone from our system when it is deleted whether by you or through auto-expiration.
FDG WEB, Inc
We have a full-time staff of local developers and designers serving our clients nationwide and in the local Seattle/Puget Sound area. We have made a name for ourselves by delivering high-quality work to our clients.
From CMS’s like WordPress, Drupal, and Joomla, to custom CAKE PHP web applications, we’ve built applications and sites for start-ups and enterprise clients alike.. .
In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cyber Security Think Tank (CSTT), a new security knowledge platform and professional program. CSTT is helping shape the future of cybersecurity through cutting-edge thought leadership, as well as training and certification programs for the professionals who are leading it there.
Building on the strength of globally-recognized expertise, it gives cybersecurity professionals a smarter way to keep organizations and their information more secure. With CSTT, business leaders and cyber professionals can obtain the knowledge, tools, guidance and connections to be at the forefront of a vital and rapidly changing industry.
Because Cyber Security Think Tank (CSTT) is at the center of everything that’s coming next.. .
Life changes. Gimigo keeps it current.
Change happens — email address, phone number, mailing address, credit/debit card number, and more. Gimigo keeps everything current.
When information changes, Gimigo updates friends and family’s mobile devices and businesses you depend on. You control what gets shared — it’s as simple as Click.
Change. Done.™ EASY TO USE * Simple app on your iPhone, iPad, or Android LIGHTNING FAST * Sync keeps phone contacts current * Or manage your Gimigo to keep others current SECURE * A+ Rating from Qualys® * Multi-layer privacy and security * Built-in identity theft protection Get the app @ [https://gimigo.com](https://gimigo.com).
At 3D, our team of IT consultants offers the credentials, skills, hands-on experience, and can-do attitude that consistently exceed expectations. Our engineers hold more than 40 certificates in technology solutions including cloud computing, network security, data backup and disaster recovery.
Partnering with solution providers like Microsoft, Cisco, and Sophos, 3D Corporation effectively meets the needs of our broad customer base.. .
RHONDOS is the exclusive distributor of PowerConnect for the North American market, providing first-line Support and Implementation Services that facilitate maximum return on investment when ingesting SAP security logs, performance metrics, and business data into Splunk. They consider theirselves a Talent Agency for Splunking SAP, hiring and investing in some of the brightest minds for Splunk and SAP: senior consultants and support personnel who are recognized experts in architecting, deploying, configuring, and customizing Splunk Enterprise, Splunk ES & ITSI, and optimizing them to receive mission-critical SAP data.
The founders of RHONDOS are industry veterans with experience working at companies including Splunk, Microsoft, and SAP.. .
Osterman Research provides market research and consulting services to firms focused on the messaging, Web and collaboration industries. The company conducts in-depth, primary research on an ongoing basis with decision makers and influencers to understand trends, buying patterns and other relevant information that is important to vendors of archiving, security, encryption and related technologies.
Osterman Research publishes industry analysis reports, forecasts and white papers; and conducts Webinars on a regular basis.. .
AirZip provides a range of enterprise rights management solutions to its clients. AirZip’s range of solutions include information protection, document control, operational efficiency, secure communications, and regulatory compliance.
Its product portfolio consists of AirZip Accelerator, AirZip Acceleration Engine, and AirZip FileSECURE. AirZip was founded in 1999 and is based in Washington..
Gen-Ark™is a Permanent Private Family Archive. Its state-of-the-art technology provides private, online archiving services.
If you’re interested in collecting, organizing, permanently preserving, and maintaining your most precious digital content (photos, audio, videos, and documents), Gen-Ark™ is the solution for you! Gen-Ark™’s cloud-based Digital Estate Asset Management System is designed to support generational succession(s) and future technology changes. It utilizes a uniquely-secure, financial trust to ensure the permanent protection of every generational archive and the priceless history it contains.
Securing your very own Private Family Archive is easy and affordable. .
Reavis Consulting Group LLC
Reavis Consulting Group is an industry leader in providing research and analysis regarding information security. Our diverse and fast growing clientele include members of the Fortune 500, government, critical infrastructure sectors – and the information security companies that serve them.
Reavis Consulting Group, LLC, is lead by Jim Reavis, who has been instrumental in the launch of several successful security companies.. .
Mechanized Cyber is a data driven digital transformation and cyber security company aimed at creating innovative and user-friendly solutions for Cyber, OT and IoT use cases. We believe that data is king in today’s rapidly changing world and the better you are at rapidly collecting, analyzing and acting on your data the more prepared you will be.
Our services are focused on leveraging existing technologies and identifying relationships within data to provide operational and security excellence.. .
Online Trust Alliance
The Online Trust Alliance (OTA) is a non-profit with the mission to enhance online trust, while promoting innovation and the vitality of the internet. OTA’s goal is to help educate businesses, policy makers and stakeholders while developing and advancing best practices and tools to enhance the protection of users’ security, privacy and identity.
OTA supports collaborative public-private partnerships, benchmark reporting, meaningful self-regulation and data stewardship.. .
You may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.