Top Tech Companies (130)
Silobreaker is a SaaS platform that enables threat intelligence teams to produce high-quality and relevant intelligence at a faster pace. We do this by bringing together all the steps of the intelligence cycle in one place; from the management of cyber, physical and geopolitical PIRs to the automated collection and processing of structured and unstructured data from open, deep and dark web and finished intelligence sources; to the analysis, production and dissemination of intelligence. This helps intelligence teams work more efficiently to identify and prioritise threats and supports decision-makers to act faster to mitigate risk, protect revenue and drive business results. Our customers come from the corporate, government, military and financial services sectors and represent a wide range of use-cases across cyber and corporate security; competitive intelligence, incident management, market intelligence, risk analysis, asset management and general OSINT.
CrowdStrike Falcon LogScale is a time-series logging and aggregation platform for unrestricted, comprehensive event analysis, On-Premises or in the Cloud. With 1TB/day of raw log ingest/node, in-memory stream processing, and live, shareable dashboards and alerts, you can instantly and in real-time explore, monitor, and visualize any system’s data. Unique features of Humio include: • All-you-can-eat site license: Unlimited log volumes at fixed price/yr • Handles large data volumes efficiently (up to a 1 TB/day of data on a single node) • Streaming live queries, alerts, and dashboards provide an instant view into system and application health • Ad-hoc search capabilities Falcon LogScale’s innovative data storage and in-memory search engine technologies provide a cost-competitive log management and analysis solution that requires significantly less hardware, engineering resources, and licensing costs vs. competing solutions. Get more info and start a free trial at www.humio.com.
The Financial Services Information Sharing and Analysis Center (FS-ISAC) is the only global cyber intelligence sharing community solely focused on financial services. Serving financial institutions and in turn their customers, the organization leverages its intelligence platform, resiliency resources, and a trusted peer-to-peer network of experts to anticipate, mitigate and respond to cyber threats. FS-ISAC members represent over $35 trillion in assets under management with users in more than 70 countries. Headquartered in United States, the organization has offices in the United Kingdom and Singapore.
Comcast delivers broadband, mobile, and video products that delight customers and technology that powers the future; produces and distributes leading entertainment, sports, and news, and brings incredible theme parks and attractions to life. At the heart of Comcast are our people. Our engineers, designers, creators, storytellers, and entrepreneurs are passionate about the important role we play in millions of people’s lives. Come create the future with us.
Heimdal is an industry-leading unified and AI-powered cybersecurity solutions provider established in Copenhagen in 2014. With an integrated approach to cybersecurity, Heimdal has dramatically boosted operational efficiency and security effectiveness for over 15k+ customers globally. Heimdal empowers CISOs, Security Teams, and IT admins to enhance their SecOps, reduce alert fatigue, and be proactive using one seamless XDR security platform. Our award-winning line-up of 10+ fully integrated cybersecurity solutions span the entire IT estate, allowing organizations to be proactive, whether remote or onsite. That's why our XDR suite and managed services offer solutions for every attack surface, whether at the Endpoint or Network, in Vulnerability Management, Privileged Access, implementing Zero Trust, thwarting Ransomware, preventing Business Email Compromises, and much more. Find out more by visiting: www.heimdalsecurity.com
ELEKS is the partner of choice for many of the world's leading enterprises, SMEs and technology challengers. We help businesses elevate their value through custom software development, product design, QA and consultancy services. We deliver high tech innovations to Fortune 500 companies, big enterprises and technology challengers, improving the ways they work and boosting the value they create for the modern world. Our 2000+ professionals located in the Delivery Centers across Eastern Europe and sales offices in Europe, the US and UK, provide our clients with a full range of software services. These include dedicated teams, product development, R&D and technology consulting. For more information, please visit: eleks.com
Persistent Systems is a leading provider of digital transformation services, offering innovative solutions tailored to various industries worldwide. With a robust global presence, they deliver cutting-edge services in product engineering, digital strategy, and data analytics, helping businesses thrive in today's rapidly evolving landscape. From healthcare and financial services to retail and manufacturing, Persistent Systems empowers organizations across diverse sectors to embrace technology and drive sustainable growth.
At BCG Platinion, we leverage our expertise alongside the unique experiences of our teams to accelerate digital transformations for our clients. Our interdisciplinary team comprises of over 1,000 strategists, architects, and cybersecurity consultants with industry-specific knowledge from across the BCG ecosystem. This diverse group empowers our clients with essential knowledge, supports a broad range of digital transformation objectives, and drives innovation to build resilience and a lasting competitive edge. In the past two years alone, our IT experts have delivered more than 3,000 tech and data projects, implemented and secured large-scale tech programs, and architected platforms that shape the future. Founded in 2000, BCG Platinion has experienced continuous and successful growth. Today, we have a presence in over 70 cities worldwide.
tru.ID makes mobile digital identity secure and seamless. Our SIM-based APIs work with global mobile networks, providing a new phishing-resistant possession factor for IAM. Businesses across the world are using tru.ID for secure device binding, MFA, passwordless login, and more. Talk to Sales to learn why: https://tru.id/book-demo
auticon is an award-winning international social enterprise providing tech consultancy and neuro-inclusion services to clients across industry and service sectors, and exclusively employing professional consultants on the autism spectrum. As a social enterprise our core mission is to promote neuro-diversity and significantly improve the employment prospects of autistic adults through: Providing high quality, supported, long term careers for skilled autistic adults. Providing lived experiences, training and advice to help clients employ and support neuro-diverse talent. Setting new standards of awareness and advocacy for neuro-diversity in the workplace
eXate is a distributed software platform for enforcing data privacy, data protection, and dynamic attribute-based access controls on data in motion and data at rest. With fine-grained access controls, and the ability to apply the Principles of Least Privilege, eXate can automatically enforce data policies and control the flow of sensitive data within a firm and across geographic borders. With more than 2/3rd of the world's population being covered under data protection regulation, the demand for data privacy by consumers is at an all-time high. 87% of consumers have indicated that they will not do business with a company who does not protect their personal data. As a result, 94% of companies now share privacy metrics with their Boards, and it is getting exponentially harder for organisations to stay on top of current data privacy demands.
CyberOwl helps asset operators in the maritime and critical national infrastructure sectors gain visibility, cyber security and cyber compliance of systems on their distributed, remote assets. We provide technologies, a managed service and specific cyber security advisory services to support the asset operator. Our technologies provide near-real-time visibility of the behaviours of assets and their communication patterns. They are deployed to identify and inventory assets on the IT and OT networks of these operational platforms. They detect and raise early warning of cyber attack tactics, techniques and procedures; identify anomalous and suspicious activity; and monitor for non-compliance with cyber security policies. These are delivered through a modular, distributed architecture that is optimised for environments facing the challenges of intermittent connectivity, bandwidth constraints and the need for remote management. Our managed service provides assurance and support to asset operators with any level of cyber expertise. We support security operations through alert verification, triaging and providing guidance on appropriate cyber incident response actions. CyberOwl was shortlisted for the Lloyds Science of Risk Prize, selected into the first GCHQ Cyber Accelerator Programme and is part of the UK Government's centre of excellence for cyber security innovation - the London Office for Rapid Cybersecurity Advancement (LORCA).
Sycurio (formerly Semafone) helps organizations transform CX and simplify how they manage regulatory compliance and payment security. Our solutions and services enable enterprises to safeguard every customer interaction, in every channel - delivering a standout customer experience that builds trust and lasting loyalty.
At Keyless, we’re on a mission to provide businesses with the smoothest, safest, and most private passwordless authentication possible. Passwords, one-time codes, and FaceID all have their drawbacks, whether it's security risks, high costs, or poor user experience. We offer a simpler, safer, and more cost-effective alternative. Zero-Knowledge Biometrics (ZKB), our award-winning biometric system, is the only technology to date that combines the strengths of the two existing systems, providing the user experience of centralized biometrics with the privacy of local biometrics. Crucially, we authenticate users, not just their devices - something that sets us apart from legacy authentication and older biometric systems. In addition, ZKB does not store any biometric data anywhere, ensuring maximum privacy and security for our users. Keyless is also completely device-agnostic. Users can enroll on one device and authenticate on another. All users need is a front-facing camera. Keyless is available for both consumers and employees, dramatically reducing ATO fraud while enhancing the user experience. Our MFA technology is resistant to phishing and compliant with all major data protection and payment regulations. Our solutions are used to authenticate users during logins, transactions, step-up actions, and account recovery, delivering the most secure and frictionless passwordless MFA experience available. Our technology is widely recognized as the most privacy-focused passwordless authentication solution in the world. Don't take our word for it - check out our certifications and awards! Certifications FIDO2 and FIDO Biometrics Certifications ISO27001 Certification Non-Provisional Patent Grant for Privacy Technology Awards CyberTech 100 2023 | Most Innovative Companies Global InfoSec Awards 2023 | Hot Company Award, Biometrics 2023 Cybersecurity Excellence Awards | Best Passwordless Solution Join us on our mission to modernize authentication! https://careers.keyless.io
Cellebrite is the leader in digital intelligence and investigative analytics, partnering with public and private organizations to transform how they manage data in investigations to accelerate justice and ensure data security.
We accelerate tech adoption through our services of Cyber Security, Cloud, IoT, Big Data, AI and Blockchain. Follow on our social media channels: • Twitter: https://twitter.com/TefTech_EN • LinkedIn Telefónica Tech AI of Things: https://www.linkedin.com/showcase/telefonicatech-aiofthings • Linkedin Telefónica Cyber Security & Cloud: https://www.linkedin.com/showcase/telefonicatech-cybersecurity-cloud • Youtube: https://www.youtube.com/user/telefonicatech • Instagram: https://www.instagram.com/telefonicatech • Twitch : https://www.twitch.tv/telefonicatech • Blog: https://business.blogthinkbig.com/telefonica-tech/
Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 5,500 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. Headquartered in Cambridge, UK, the company has 1,500 employees and over 30 offices worldwide. Darktrace was named one of TIME magazine’s ‘Most Influential Companies’ for 2021.
CultureAI’s innovative Human Risk Management Platform empowers you to identify security risks, educate employees in real time, and nudge them to make immediate fixes. Strengthen resilience against phishing, improve SaaS security, reduce data loss through generative AI, and more. We help security teams identify and manage their most prominent employee security risks in one comprehensive platform.
At Uniken, we elevate digital identity and security from trust to certainty, ensuring confidence in every digital interaction. Our mission is to empower client-centric organizations worldwide to achieve zero fraud and create amazing customer experiences through our innovative security solutions. With our award-winning REL-ID security platform, we transform identity verification from a challenge into a strategic advantage. REL-ID secures the entire customer journey—covering everything from device and application security to network connections, customer authentication, transaction verification, and digital signing. By eliminating traditional security burdens placed on clients, REL-ID enables organizations to provide fast, frictionless, and secure experiences across any channel at any time. With a global presence, including headquarters in the United States and operations across APAC, EMEA, and LATAM, we provide tailored solutions to industries where trust and security are crucial. Whether you’re in finance, healthcare, retail, travel, or government, Uniken helps you unlock new possibilities for customer engagement and business growth. In a world where threats are constantly evolving, we ensure that identity is a certainty, not a vulnerability. Our performance speaks for itself: - 34.8 billion client interactions secured - $39.8 trillion in transaction value protected - Zero dollars, data, or identities lost Join us in shaping the future of secure digital interactions. Contact us today to learn how Uniken can help your organization build trust, drive growth, and secure its digital future. Visit our website for more information or to schedule a demo at www.uniken.com.
Manage true physical segmentation, remotely, instantly and without using the internet. No VPN’s, no IPv6, no IPv4 - no packets to sniff and no appliances to be seen. “I would like to introduce you to an exciting new approach to protecting high value network assets - a physical "drawbridge" called Goldilock. If you need to protect crown jewel data, such as intellectual property or computing infrastructure, this is your solution…it uniquely achieves what no other solution can.” Gregory Akers, Advanced Security Research, CISCO. Find out why Britain’s GCHQ National Cyber Security Center, chose Goldilock. Dynamic Physical Network Segmentation (#DPNS) Goldilock is revolutionizing the way data and critical infrastructure are protected online. How? Our patented solution allows you to physically connect and disconnect anything from the internet, from anywhere, at anytime, without using the internet do do it - thus eliminating the internet as a threat vector. The Goldilock premise is that your data and systems should not be physically connected to the Internet when you’re not using them, but that they need to be available to you from anywhere, immediately. Goldilock's non-IP controlled Drawbridge technology applies the same principle and technology to network architecture - allowing network administrators, directors and other authorized individuals to instantaneously connect and disconnect devices, control systems and network zones for data isolation, mitigation of zero-day or ransomware incidents. Have total control of your data and infrastructure, save money and sleep better knowing Goldilock is at your fingertips