Directory · SE
Data Security Software Products in Sweden
A register of firms and the professionals working at them in the Data Security Software Products sector based in Sweden. Browse the public index, then filter or export on Kipplo.
Companies
13 on file
Amido
Amido är ett svenskt SaaS-bolag inom Smart Access. Vi förenklar accesshantering genom att koppla samman olika system – så att fastighetsägare, bostadsbolag, kommuner och företag får bättre kontroll, mindre manuellt arbete och ökad trygghet. Vår plattform samlar passersystem, nyckelskåp, porttelefoner och bokningssystem i ett övergripande system – utan att ni behöver byta ut det som redan fungerar. Det ger er full överblick och kontroll över vem som har tillgång till era fastigheter, när och hur. Smart Access är vårt DNA. Vi är en oberoende aktör som förenar system, stärker säkerheten och skapar lösningar som gör skillnad. Tillsammans med våra kunder bygger vi ett tryggare samhälle, en integration i taget. Amido grundades 2008 och har sitt huvudkontor i Göteborg. Vi är 35 medarbetare och omsätter cirka 46 MSEK. Bolaget är noterat på Spotlight Stock Market (Ticker: AMIDO).
11 to 50 staff
Inuit Ab
IT solutions that simplifies and secure your business. Part of Elovade. We assist you in achieving high security, increased business value, and happier users through efficient IT solutions. Solutions for: Proactive IT security, IT administration, helpdesk, ITSM, unified endpoint management (UEM), identity access management (IAM), Microsoft 365 security and management, network it operations management (ITOM), IT analytics and more. Vendors: ManageEngine, WithSecure, Zoho, Trustwave, Chryptshare, Safend, Varist.
11 to 50 staff
Fidesmo
Fidesmo brings security to the ever-growing world of contactless transactions. We unite service providers and device manufacturers in a single, secure and scalable NFC platform on a global scale – opening up a world of opportunities to the untapped potential of contactless transactions. Fidesmo is a Swedish tech company founded in 2013, with headquarters in Stockholm and R&D offices in Madrid. Read more at fidesmo.com.
11 to 50 staff
Defentry
Defentry is a B2B SaaS company founded 2015 in Stockholm, Sweden. Our mission is to put an end to identity theft. We offer a cyber security app to your customers, they can be either private individuals or small to medium enterprises. No matter who your customers are, you want them to be able to stay safe online and keep them safe from cyber criminals. Our app is customized and white labeled in your brand and we monitor, alert and support our users immediately so they feel protected and safe. Become our partner and offer our cyber security solution as a value added service, just like many other insurance and security companies across Europe. Identity theft is a crime increasing every year and it is largely linked to data leaks where personal data and login credentials are stolen. Since many generally reuse the same passwords the hackers can access many accounts with just one pair of credentials which makes the damages often much more severe. Data shows that even after credentials has been leaked, passwords are usually not changed. Why, one might wonder? Most people don’t even know that they’ve been exposed to a hacker attack and that their personal information has leaked until years later. This is why Defentry is needed, your customers will get a chance to protect themselves with your help and you will be able to provide a service they don’t even know they need. At the same time, you differentiate yourself from your competitors and get the opportunity to add a new revenue stream. Even with alerts in place, sometimes the worst happen and an identity fraud is committed anyway. Therefore we have added a complete range of identity protection services to our platform. Bank account and credit card monitoring instantly identifies suspicious transactions. Governmental and credit data makes the monitoring complete. On top of that we offer 24h personal assistance and fraud insurance to help handle the economical and legal effects.
1 to 10 staff
Bifrost Security
Bifrost offers tailor-made runtime security, continuously and automatically. Integrated into the customer’s developer pipeline, we provide up-to-date security profiles that utilize the robust security mechanisms underlying Docker and Kubernetes. We help harden your environment to limit vulnerability exposure in production so that developers can focus on shipping features at their preferred velocity. We are an early-stage startup that sprung out of research at Lund University and is run by an accomplished team of entrepreneurs.
1 to 10 staff
Non-Stop Gdpr
Accelerate your GDPR compliance game with nonstopgdpr.com!
1 to 10 staff
Isstech Ab
Need to secure and scale your business? IssTech is your specialist for robust data protection. We deliver tailored cloud services and cybersecurity solutions, with deep expertise in managing and securing Kubernetes environments.
1 to 10 staff
Turtle Privacy & Security
1 to 10 staff
Helisoft Ab
Whether your use case is getting an overview of your information, correlating HR data with Active Directory, apply governance and compliance to aggregated information or act as an Policy Information Point for dynamic access control solutions, it's all made easy with our phased approach. As many organizations, enterprises and businesses strive towards a holistic view on their information assets, creating enterprise models top-down trying to describe the information flowing in the processes implemented by, maybe not only one IT-system. Often enough this ends up like catching a wet soap in the shower, no matter how hard you try, it’s a daunting and illusive task, and it most probably will leave you infatuated due to the fact that the models have no real connection to the actual information and the amount of work to keep all up to date is just plain overwhelming. By using Helios and the many capabilities it bring, organizations, enterprises and businesses are given a central control plane for Information Management by integrating to the actual Information Systems, of course without disturbing or impacting performance, all depending on the Information System creating models and building the relations directly in Helios. Built on top of a graph database, analytics and assessments become a hassle-free activity perfect for audits, increase of understanding how IT-systems relates to information or even just simple alarms and reports. With this bottom-up approach the likelihood of an successful outcome is far greater and the quick results surpasses many expectations by far. Just the ability to view the correlation between information and IT-systems is let alone quite a big step towards a holistic approach to Information Management don’t you think?
1 to 10 staff
Nubis Operandis
Nubis Operandis is a swedish startup founded in 2018 and is located in Stockholm. Our NubOps SaaS offering aims to help Cloud Security Architects who work with Azure. We're a Microsoft Partner and we were recently accepted to the Microsoft for Startups program.
1 to 10 staff
Darkstrike
Darkstrike provides quantum-ready AI safety and cybersecurity platforms that proactively secure and control AI models, agentic AI, autonomous systems, and sensitive data. The company’s technology prevents unintended AI behaviors and harvest now, decrypt later threats while rendering data breaches obsolete. Darkstrike serves government, defense, critical infrastructure, and commercial organizations requiring uncompromising AI safety and cybersecurity
11 to 50 staff
Secure Mobility
Muneris Mobility is a leading distributor of advanced mobile security solutions, empowering businesses to protect their mobile devices and applications against modern cyber threats. With a focus on innovation and customer success, we help organizations secure their mobile ecosystems efficiently and proactively.
1 to 10 staff
Nodex Cloud
The next era of cloud storage is coming. NodeX Cloud delivers decentralized cloud storage built for industries where security, compliance, and control can’t be compromised. We remove single points of failure, prevent vendor lock-in, and give organizations verifiable control of their data. The result: a secure, compliant, and future-ready foundation for AI, security-focused sectors, and data-intensive applications.
1 to 10 staff