Directory · US
Data Security Software Products in United States
A register of firms and the professionals working at them in the Data Security Software Products sector based in United States. Browse the public index, then filter or export on Kipplo.
Companies
486 on file
Idmission
IDMission delivers advanced technology for Identity Verification. With IDMission, companies build applications allowing them to instantly recognize customers and access their identity details with a ‘selfie’. Our ISO certified components use facial recognition/biometrics, and document capture and verification to positively establish a digital identity and query our global network of information providers to fill KYC, AML, financial, legal and regulatory data. Packaged for delivery as mobile and web SDKs, APIs, or Identity as a Service (IDaaS), IDMission leads in passive liveness detection and document verification. Identity proofing is driven by AI Machine Learning models trained on hundreds of millions of global records collected by IDMission, including thousands of the most difficult document types from LATAM, Asia and around the world. Used in financial services, e-commerce, the sharing economy, government and regulated industries, IDmission establishes true identity without compromising the user experience.
51 to 200 staff
Avepoint
Beyond Secure. AvePoint is the global leader in data security, governance, and resilience, going beyond traditional solutions to ensure a robust data foundation and enable organizations everywhere to collaborate with confidence. Over customers worldwide rely on the AvePoint Confidence Platform to prepare, secure, and optimize their critical data across Microsoft, Google, Salesforce, and other collaboration environments. AvePoint’s global channel partner program includes approximately managed service providers, value-added resellers, and systems integrators, with our solutions available in more than 100 cloud marketplaces. To learn more, visit If you have questions about your investment in AVPT please contact ir@avepoint.com
1001 to 5000 staff
Bluefin Payment Systems
Bluefin is the global leader in security-first payment infrastructure, pioneering PCI-validated point-to-point encryption (P2PE), vaultless tokenization, and advanced orchestration. Our vendor-agnostic solutions devalue sensitive data across every channel - card-present, eCommerce, mobile, call center, and unattended - helping enterprises, software providers, and organizations reduce PCI scope, ease compliance, and minimize risk. With 300+ global partners and connected clients in 60 countries, Bluefin secures billions of transactions annually through a scalable foundation that adapts to complex enterprise needs.
201 to 500 staff
Netenrich, Inc
Netenrich is redefining security operations with a proactive, shift-left approach. Our Adaptive MDR solution, powered by Resolution Intelligence Cloud™ technology, leverages artificial intelligence and big data to deliver customized experiences and data-driven results for every customer. With a focus on agility and innovation, our solution evolves with your changing needs, and brings you a step closer to achieving autonomic operations. As a trusted Google partner, specializing in Chronicle SecOps, we’ve transformed hundreds of companies across various sectors, including healthcare, finance, and technology. From our global hubs, we provide 24/7 proactive uninterrupted operations, peak performance, and peace of mind.
501 to 1000 staff
Ownbackup
OwnBackup believes that no company operating in the cloud should ever lose data. With comprehensive backup, visual compare, and fast recovery capabilities, we have helped hundreds of organizations through data loss and corruption crises. Our solution also provides enterprises with the performance and reporting required to meet compliance regulations in a number of industries. We provide secure, automated, daily backups of SaaS and PaaS data, including Salesforce. The company was co-founded by technology veterans with deep experience in data-recovery, data-protection and information-security. OwnBackup’s solutions provide built-in protection against data loss and corruption caused by human error, malicious intent, integration error and rogue applications. All of this has helped make OwnBackup the top-ranked backup and restore ISV on the Salesforce.com AppExchange, a venue the solution has been listed on since 2012, and to gain recognition as a Gartner “Cool Vendor” in Business Continuity and IT Disaster Recovery.
501 to 1000 staff
Securityscorecard
Funded by world-class investors, including Evolution Equity Partners, Silver Lake Partners, Sequoia Capital, GV, Riverwood Capital, and others, SecurityScorecard is the global leader in cybersecurity ratings, response, and resilience, with more than 12 million companies continuously rated. Founded in 2013 by security and risk experts Dr. Aleksandr Yampolskiy and Sam Kassoumeh, SecurityScorecard's patented rating technology is used by over organizations for enterprise risk management, third-party risk management, board reporting, due diligence, cyber insurance underwriting, and regulatory oversight. SecurityScorecard makes the world a safer place by transforming the way companies understand, improve and communicate cybersecurity risk to their boards, employees, and vendors. SecurityScorecard is listed as a free cyber tool and service by the U.S. Cybersecurity & Infrastructure Security Agency (CISA). Every organization has the universal right to its trusted and transparent Instant SecurityScorecard rating Founded in 2013 by security and risk experts Dr. Alex Yampolskiy and Sam Kassoumeh, SecurityScorecard’s patented rating technology is used by over organizations for self-monitoring, third-party risk management, board reporting and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix security risks across their externally facing digital footprint. SecurityScorecard is the only provider of instant cyber risk ratings that automatically map to vendor cybersecurity questionnaire responses - providing a true 360 degree view of risk. SecurityScorecard continues to make the world a safer place by transforming the way companies understand, improve and communicate security risk to their boards, employees and vendors. To receive an email with your company’s current score, please visit instant.securityscorecard.com.
501 to 1000 staff
Kriptos
Kriptos enhances Cybersecurity, Risk, and Compliance strategies by providing enterprises with an AI-driven cybersecurity platform that offers Full Data Visibility, real-time insights, and risk management. Through Data Discovery and Classification, Kriptos scans endpoints, servers, and cloud environments, identifying and labeling sensitive data, including confidential, PII, and PCI information. Seamlessly integrating with cybersecurity tools such as DLP, CASB, and SIEM, Kriptos strengthens data risk management by identifying critical users and high-risk areas across organizations. Additionally, its Data Compliance module delivers real-time insights to support regulatory requirements, including ISO 27001, SOC2, and more. Kriptos provides an efficient, scalable solution to reduce risk, enhance compliance, and strengthen data governance.
51 to 200 staff
Altr
ALTR is the only automated data access governance and data security solution that allows users to easily control and protect sensitive data in the cloud – to minimize risks sooner and unlock value faster. Hundreds of companies and thousands of users leverage ALTR’s platform to gain unparalleled visibility into data usage, automate and control data access, and secure data with patented rate limiting and tokenization-as-a-service, all in minutes instead of months. ALTR’s partner ecosystem integrations enable scalable on-premises-to-cloud protection. To learn more, visit ALTR.com.
51 to 200 staff
Bemo
Our software helps companies with up to 500 employees running on Microsoft 365 / Azure become secure and compliant (SOC 2, CMMC, ISO 27001 etc) by automating the long and manual work of deploying tools like Conditional Access, Intune, Defender, Sentinel, and more. CISOs, Directors of IT, and IT Managers often complain that their orgs spend thousands of hours per year running PowerShell scripts, toggling through all the Microsoft Admin Centers, and navigating through the ever-changing GUI, in an effort to meet their organization's security and compliance frameworks. Our platform eliminates the drudgery and accelerates the deployment and adoption of the entire M365 E5 and Azure security stack so your org can become compliant next week instead of next year.
51 to 200 staff
Intellicheck
Why Intellicheck? Identity validation and proofing service that uses a unique and proprietary analysis of DMV-issued IDs to create trusted, real-time customer identity verification experiences. Our SaaS solutions are used across a wide variety of industries, both in-person and digitally, primarily as a white-label service. Follow us on LinkedIn to learn more about industry trends and best practices in identity verification.
51 to 200 staff
Mailprotector
Email security is broken because it assumes too much trust. We fixed it by resetting trust to zero. As THE zero trust email security company, Mailprotector enables MSPs to turn email protection from a commodity service into an unrivaled advantage. We replace complexity with confidence and constant fixes with true prevention. Our approach frees you from email security anxiety, empowering you to be the expert your clients need. Backed by protection so intelligent it feels effortless, we're setting a new standard in email security. It doesn't just stop threats, it resets trust by questioning everything, so you don't have to.
11 to 50 staff
Nisos
Nisos is the human risk management company specializing in unmasking threats before they escalate. We are a trusted advisor who operates as an extension of security, intelligence, legal, and human resource teams to protect their people and business. Our intelligence-led solutions help enterprises make critical decisions, manage human risk, and drive real world consequences for digital threats. For more information visit:
51 to 200 staff
Sath Inc
Sath's IDHub software is poised to bring Identity Management to the masses. Automate Onboarding, Offboarding, and all User Access Governance without the need for IT involvement. https://sath.com
51 to 200 staff
Via
The U.S. Department of Defense and Fortune 100 companies around the globe trust VIA to help them solve their toughest data and identity protection challenges. Using its Web3, quantum-resistant, passwordless technologies (19 issued patents), VIA protects data against theft, manipulation, and misuse.
51 to 200 staff
Vital4
VITAL4 is a cloud software company that offers a globally accessible due diligence data search. Our software delivers quality and up-to-date data that will help your organization save time, money and mitigate risk with customers, suppliers, contractors, partners, volunteers, and associated third-party relationships. We are the leading provider of background screening products and services for pre-employment purposes. VITAL4 has the most comprehensive offering on the market with over products and services in over 240 countries and territories across the globe- Global Data Products - Criminal Products - Verification Products - Financial Products - Healthcare Compliance Products - Due Diligence Products
11 to 50 staff
Axis Technology, Llc
For more than 20 years, Axis Technology has built smart data privacy and protection solutions that use leading software products and combine them with our proven business process using a collaborative approach to secure your sensitive data.
51 to 200 staff
Eclypses
Eclypses provides Post-Quantum Encryption-as-a-Service. Solving tomorrows cybersecurity problems today. Eclypses MicroToken Exchange (MTE) technology offers Post-Quantum Encryption-as-a-Service (EaaS). Designed to deliver cloud-based encryption with unmatched efficiency. This FIPS (140, 140-3) validated service ensures uses the NIST validated CRYSTALS-Kyber algorithm, providing our customers with unmatched data security across any network. Unlike traditional network security measures which are no longer enough, Eclypses MTE encrypts data at the application layer (7). Replacing data-packets with one-time unique values and only decrypting it securely on the receiving end. This ensures end-to-end protection for data in transit and at the edge. Preventing hackers from deconstructing encryption patterns or executing man-in-the-middle attacks, replay/delay and injection, packet inspection, pattern recognition, and credential harvesting. Eclypses mitigates the top 8/10 API Vulnerabilies at implementation. Available on AWS and Azure Marektplaces today and deployable in under 30 minutes. For more information, visit
11 to 50 staff
Elysium Analytics
We make it easy to build a semantic security data lake for contextual and deep analytics with our open data model and provide the pre-built applications you need to get immediate value from your data. Open Data Model * Turnkey open data model with full metadata discovery * Normalization data layer connecting disparate data sources with relational data model and graph model on a security data lake Scalable Search * Full-text search with a single open standard query language (KQL) across cloud, third-party SaaS, and on-premises environments * Scales to petabytes of telemetry data for post-hoc interrogations and hunting * Unlimited compute on demand for consistent performance regardless of load Analytics & Visualization * ML-based scoring for all events with full enrichment, correlation, and contextual analytics * All data is aggregated and analyzed with ML models and GraphML * Access predefined Looker and OpenSearch-driven dashboards out-of-the-box, or build your own
11 to 50 staff
Prime Factors
Prime Factors is the leader in application-layer data protection, providing software products that simplify protecting data where it's most susceptible to a breach. Coupling a Data Security Governance approach with a proprietary Data Protection Engine, Prime Factors' software seamlessly implements and automates the enforcement of Data Protection Policies while orchestrating the centralized cryptographic key management at the application level in order to protect data whether it's used, moved, or stored. These enterprise solutions govern how data is protected, using encryption, tokenization and data masking techniques, and limits who can who can access the data, whether pseudonymized, anonymized, partially masked or in the clear – all while providing flexible audit logging and alerts for compliance management. For more than 35 years, Prime Factors has been a trusted partner for more than global customers, earning the confidence of 80% of the top financial institutions in North America.
11 to 50 staff
Ridgeline International, Llc
Ridgeline is laser-focused on solving our customers’ toughest data challenges. We take a comprehensive approach to Digital Signature Management that’s been developed through hands-on work and close partnership with our Government customers that has expanded to work with enterprises across a wide variety of industries. Digital Signature Management is not just digital privacy, cybersecurity, data analysis, or tech integration, it’s all of those combined and more. We provide consulting services, training, and software solutions to help you do business according to your needs. Nine years on, Ridgeline is now laser-focused on solving one of the toughest problems we know our customers face, Ubiquitous Technical Surveillance, through an approach we call Digital Signature Management. These threats cut across every industry. We’ve expanded our offerings to meet the unique needs of customers in the Government and business worlds.
201 to 500 staff
Securiti
Securiti is the pioneer of the DataAI Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid multicloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance. Securiti has been recognized with numerous industry and analyst awards, including "Most Innovative Startup" by RSA,"Top 25 Machine Learning Startups" by Forbes,"Most Innovative AI Companies'' by CB Insights,"Cool Vendor in Data Security" by Gartner, and "Privacy Management Wave Leader'' by Forrester. For more information, please follow us on LinkedIn and visit Securiti.ai.
501 to 1000 staff
Concentric Ai
Concentric AI is intelligent data security made easy. Its Semantic Intelligence™ platform uses context-aware AI to discover sensitive data, monitor risks, automate remediation, simplify compliance, and accelerate investigations. It delivers smart, targeted protection by understanding how data is used, shared, and exposed. Concentric AI also offers managed services to keep security programs lean, scalable, and effective. This end-to-end platform protects data at rest, data in motion, and all the GenAI tools users interact with—so organizations can stay compliant, reduce exposure, and safeguard critical information wherever it lives and however it travels.
201 to 500 staff
Digitsec
DigitSec is a comprehensive SaaS security platform for Salesforce application development that helps identify vulnerabilities and mitigate risk. With DigitSec, cybersecurity, and development teams can overcome the challenges of balancing security with functionality and deadlines to deliver secure business-critical Salesforce applications. The DigitSec platform is an easy-to-use, intuitive, and proactive platform that identifies Salesforce application vulnerabilities quickly. It is highly flexible to meet the demanding needs of admins, project managers, and developers. Some of the world’s largest system integrators and Fortune companies rely on DigitSec to secure their Salesforce application development. The DigitSec platform can be used in any industry and any sized organization. DigitSec is SOC 2 Type 2 compliant, making it an ideal partner for regulated industries. DigitSec integrates into tools such as VS Code, Azure DevOps, Jenkins, Jira, GitHub, and more. It also helps satisfy compliance requirements, including PCI DSS, HIPAA, ISO 27001, GDPR, NISTIR 8397, APPI and others.
11 to 50 staff
Fortifydata
The FortifyData platform enables Enterprises to identify and manage their risk exposure across their entire attack surface – This includes external, internal, cloud configuration, and also third party risks. This information is then published as a Security Rating, translated into Cyber Risk Quantification and can further be customized with configurable risk models driving the most insightful cybersecurity risk indications on any company.
11 to 50 staff
Icrimefighter
Founded in 2011 by two law enforcement officers in Minnesota, iCrimeFighter (iCF) is an AWS GovCloud-based and fully compliant (CJIS, SOCII, FIPS, HIPPA) digital evidence collection, storage, and transfer solution. It remains far superior than any other Digital Evidence Management System (DEMS) in the market, as it allows Law Enforcement Agencies, District Attorneys, Title IX Coordinators, Offices of Student Conduct at Colleges and Universities, Students, Citizens of the Community, and any other individual or agency involved in a case to safely and efficiently collaborate. Our solution provides agencies with a system that allows public safety professionals to seamlessly streamline digital evidence from the field to the courtroom; thus, rewarding valuable time back to law enforcement officers and county attorneys, so they can dedicate more of their time making a positive impact on the community.
11 to 50 staff
Indykite
IndyKite is building the system of intelligence — delivering contextual data access and retrieval that makes enterprise data usable the moment it is needed. The platform connects to data wherever it resides, applying rules and context automatically at the moment of use. This intelligence layer turns data from a static asset into a responsive force, giving applications and AI the context, access, and trust to shape outcomes in real time — enabling faster decisions, adaptive digital experiences, and entirely new classes of intelligent services.
51 to 200 staff
Monarx
Monarx offers a complete and advanced malware protection solution designed specifically for web hosts and server environments. Here are the key features and capabilities of Monarx's malware protection: Threat Removal Monarx provides real-time detection of malware, ensuring that threats are identified in real-time. Threat Removal If threats are found, Monarx safely removes the threat and restores the infected files to original functionality. Threat Shield When enabled will block new threats in realtime, preventing infection before it strikes your website. Server Protections Deep removal of additional areas that are often infected such as memory and hidden processes. HoneyNet This is our crowd-sourced data set that collects then protects in realtime. With direct access (via cloud) this our early warning detection system. Command Center & APIs Manage your fleet of servers from a single pane of glass and have full control via our Global API.
11 to 50 staff
Secuvy
Secuvy is the leading Data Security Posture Management (DSPM) platform that secures complex unstructured data, including PDFs, CAD files, images, contracts, and intellectual property that traditional security tools consistently miss. While most platforms rely on pattern-matching and manual tagging, Secuvy finds data anywhere, beyond patterns. Its self-learning AI autonomously discovers and classifies sensitive data across cloud, on-premise, SaaS, and hybrid environments without retraining when new data types emerge. Organizations deploy Secuvy in 45 minutes and reduce manual classification effort by up to 90%, transforming months-long projects into hours. What enterprises get from Secuvy- Advanced classification precision : Especially regulated datasets including complex unstructured data, including PDFs, CAD files, images, contracts, and intellectual property - AI & LLM Governance - Prevent sensitive data from leaking into Copilot, ChatGPT Enterprise, and AI training pipelines - Compliance & Risk Readiness : Automatically maintain correct labels and generate audit evidence for CMMC, HIPAA, GLBA, GDPR, NIST - Policy Enforcement : Apply the right controls automatically across all systems - Data Visibility : Know where sensitive data lives, how it's shared, and where misclassified files create risk Secuvy integrates with 250+ data sources and enhances Microsoft Purview, DLP, CASB, and compliance tools. By feeding accurate, contextual classification, enterprises gain the data intelligence they've never had before.
51 to 200 staff
Siemonster
We help MSSPs and enterprises deliver scalable, white-labeled SOC platforms under their own brand. SIEMonster is a customizable, multi-tenant cybersecurity operations platform designed for speed, autonomy, and global scale. Trusted by partners worldwide, our platform enables client-branded reporting, automated response, and outcome-driven threat visibility—without vendor noise or lock-in. We stay invisible—so you stay in control.
201 to 500 staff
Sighthound
Founded in 2013, Sighthound has always believed in the power of making complex technology simple and accessible. With a passion for visual data, we've dedicated ourselves to pioneering computer vision solutions that transform industries and improve everyday processes. At the heart of Sighthound is a commitment to quality and customer success. We pride ourselves on creating intuitive AI tools that empower businesses and agencies to make smarter decisions, optimize their operations, and protect what matters most. Our products are designed to be both powerful and user-friendly, ensuring you get reliable insights without the complexity. Vehicle Identity Recognition Make Model Color Generation Automatic License Plate Recognition Edge AI Hardware: Compute Camera & Compute Node Smart Traffic Systems Person Detection Space Occupancy Video Redaction Image Redaction Audio Redaction Screen Redaction Document Redaction ID Redaction
11 to 50 staff
Sotero
Sotero is a global leader in data security and ransomware prevention. Our Data Security Platform offers a simple way to protect your data everywhere, all the time. Sotero uses a multi-layered approach to secure and keep your data private, even when it's being used. Our platform encrypts data throughout its entire lifecycle and stops threats with real-time detection and automated quarantine of malicious access. Our solution is easy to set up and manage without affecting the user experience. Organizations quickly gain full control over data privacy, compliance, and governance. We provide comprehensive data security to protect data at the edge, on IoT devices, in streaming data, and in collaboration systems. For more information, please visit
11 to 50 staff
Tachyon Networks
Tachyon provides data assurance solutions using proprietary technology founded upon a blockchain matrix architecture. When analysing data from disparate sources, the assurance of authenticity (where and who it came from) and pedigree of integrity (has it been altered) becomes crucial. Knowing both provides confidence and certainty to your decision making.
11 to 50 staff
Apura Cyber Corp
Apura Cyber Corp is a company with deep technical expertise and extensive experience in threat intelligence, digital forensics, incident response, and anti-fraud operations. Our premier product, BTTng, is an advanced OSINT and Cyber Threat Intelligence platform that provides broad, dynamic visibility into threats across the most comprehensive collection of monitored sources in the industry. Building on this foundation, Apura now offers BTTli, our dedicated Leak Intelligence platform. BTTli enables organizations to quickly identify, analyze, and act on data exposure incidents by securely processing leaked datasets within Apura’s protected environment. Apura is proud to have contributed for seven consecutive years to the development of the world’s most trusted cybersecurity publication, the Verizon Data Breach Investigations Report (DBIR), and honored to be part of FIRST, the premier global organization for incident response.
51 to 200 staff
Cranium
Incubated and funded in stealth inside of KPMG Studio, with additional institutional investment by SYN Ventures, Cranium emerged in 2023 with a mission to secure the AI revolution by delivering the industry’s leading AI security and trust solution. Whether organizations are builders and/or consumers of AI, Cranium offers a comprehensive platform that enables complete security, compliance, and trust across the entire AI supply chain. For more information, visit:
51 to 200 staff
Crashplan
CrashPlan provides cyber-ready data resilience and governance in a single platform for organizations whose ideas power their revenue. With its comprehensive backup and recovery capabilities for data stored on servers, on endpoint devices, and in SaaS applications, CrashPlan’s solutions are trusted by entrepreneurs, professionals, and businesses of all sizes worldwide. From ransomware recovery and breaches to migrations and legal holds, CrashPlan’s suite of products ensures the safety and compliance of your data without disruption. Headquartered in Minneapolis, Minnesota, CrashPlan protects more than world-class organizations, including the largest global brands.
51 to 200 staff
Evo Security
Evo Security simplifies Identity and Access Management (IAM) for Managed Service Providers (MSPs), Managed Security Service Providers (MSSPs), and their SMB and mid-market clients. Our unified platform consolidates MFA, SSO, RADIUS, Help Desk Verification, and Privileged Access Management (PAM)—empowering technicians and end-users with seamless, secure access in one solution tailored for the channel. We're backed and advised by some of the leading minds in the MSP space and world-class institutional investors. Our focus is building a fantastic product to serve (who we believe to be) the unsung heroes of modern business - IT Service Providers - and their vast client base of small to medium businesses and enterprises. One agent. One dashboard. Total identity management. Built for MSPs.
11 to 50 staff
Freeze
Freeze is the premium cybersecurity and privacy solution trusted by leading organizations to mitigate risks such as social engineering, phishing, financial fraud, hacks, attacks, physical security threats, and safeguard executive reputations. Our platform leverages advanced integrations, models, and AI to detect and thwart information reconnaissance targeting your company, vendors, partners, employees, and their families, bolstering your organization's cybersecurity by closing doors to threat actors and attack surface they leverage. Our extensive detection and removal capabilities offer the most comprehensive security and privacy protection. At our core, we prioritize customer satisfaction, continuous platform enhancement, privacy ethics leadership, and pioneering solutions, delivering excellence to our clients and the ecosystem.
11 to 50 staff
Invisus
INVISUS delivers proactive cyber risk management solutions for consumers and small to mid-sized businesses. for Business: Our innovative and proprietary InfoSafe Certification program makes it simple and affordable for small and mid-size businesses to get and stay compliant with data security and privacy requirements. for Home: From computer protection and technical support services, to identity theft protection and credit monitoring, our robust iDefend plans provide comprehensive protection against evolving cybersecurity and data privacy risks.
11 to 50 staff
Medcrypt
Medcrypt provides data security as a service to medical device OEMs. From medical imaging devices to pacemakers, Medcrypt ensures that devices act only on instructions from trusted sources.
11 to 50 staff
Netdiligence
NetDiligence® is a Cyber Risk Assessment and Data Breach Services company. Since 2001, we have conducted thousands of enterprise-level cyber risk assessments for a broad variety of corporate clients, including well-known names in banking, brokerage, mortgage, insurance, clearinghouse, and other financial service sectors. We have also assessed major Internet-based retailers, online auctions, B2B service providers, software companies, medical providers, universities, and a significant percentage of the Fortune NetDiligence services are used by leading insurers in the US and UK that offer "cyber risk insurance" for businesses. Insurers like ACE, Arch, Chubb, Zurich, Beazley, Hiscox, Aspen, Brit and other Lloyds of London syndicates rely on NetDiligence risk assessments to support both loss-control and educational objectives. As a complement to our cyber risk assessment services, NetDiligence hosts an annual Cyber Risk & Privacy Liability Forum. Featuring dozens of subject matter speakers across two days, our forum is attended by hundreds of risk managers and cyber liability insurance leaders from all over the world. NetDiligence is also an acknowledged leader in data and privacy breach prevention and recovery. Our eRiskHub® portal is licensed by a majority of cyber liability insurers to provide ongoing education and breach recovery services to their policyholders. NetDiligence technical experts assist many of these insurers with cyber liability claims investigations. Voted "Advisen 2015 Cyber Risk Pre-Breach Team of the Year" by industry peers
1 to 10 staff
Paperclip Inc
Paperclip enables enterprises to harness the power of their data without ever sacrificing security. As a trusted software technology partner, Paperclip creates operational efficiencies, improves digital communication, and secures valuable data for some of the largest globally recognized brands worldwide. With more than three decades of customer-centric innovation, Paperclip is a proven strategic partner that continues to revolutionize the content supply chain for highly-regulated industries. Paperclip solutions securely capture, transcribe, store, and exchange our client’s most sensitive data, such as PII, PHI, NPI, and corporate IP. Paperclip continues to innovate, adapt and excel within a rapidly changing digital world.
11 to 50 staff
Smartroom
SmartRoom is a leading provider of virtual data room solutions, engineered to streamline complex transactions and safeguard your most sensitive data. Trusted by professionals in M&A, private equity, legal, and corporate development sectors, our platform ensures a seamless, secure, and efficient environment for collaboration and decision-making. With a focus on robust security measures, user-friendly interfaces, and dedicated support, SmartRoom empowers your business to operate at peak performance, every time. Discover how our innovative solutions can elevate your data management and drive success in your critical business processes.
201 to 500 staff
Synergetics
Synergetics is proud to announce that our OpenFLIS platform has received JAB authorization, further cementing our reputation as a leading technology provider for Government agencies and Federal supply chain participants. OpenFLIS is a cutting-edge platform designed to serve our customers' data applications in a microservices deployment model. OpenFLIS is a major distinguishing factor for Synergetics when compared to other Government contractors. Our platform brings together CSP capabilities and an architecture that unifies the experience of interacting with data, granularly secures access, captures key analytics, and leverages powerful AI and infrastructure provided by MS Azure. At Synergetics, we believe that data is the key to unlocking success in today's world. That's why we have developed OpenFLIS as a powerful tool to help our customers make sense of their data and use it to drive their missions forward. With OpenFLIS, our customers can rest assured that their data is secure, accessible, and being used to its full potential. Whether it's providing real-time analytics, automating workflows, or uncovering insights, OpenFLIS is a valuable asset for any Government agency or Federal supply chain participant. At Synergetics, we are committed to providing our customers with the best technology solutions possible. Contact us today to learn more about how OpenFLIS and our other products and services can help you achieve your goals.
51 to 200 staff
Tac Security
TAC Security (NSE: TAC) TAC Security, a leading publicly listed global cybersecurity company specializing in vulnerability management, today serves clients across 100 countries and has emerged as the world’s 5th largest vulnerability management company. TAC Security’s flagship product, ESOF (Enterprise Securityin One Framework), excels in cyber scoring, cyber risk quantification, and leveraging advanced AI for vulnerability assessment and penetration testing. TAC Security partners with tech giants such as Google, Microsoft, and Meta for CASA (Cloud Application Security Assessment). Serving a diverse global clientele, TAC Security is committed to innovation and excellence in cybersecurity for Fortune 500, startups and Governments Globally. Recognised as "Great Place to Work" and third time in the row "Great People Manager Company" by GMI in association with Forbes and The Economic Times.
51 to 200 staff
Ubiq Security
Ubiq enables enterprises to encrypt, tokenize, and mask sensitive data at the individual record and file level and integrates with Identity Providers (Okta, Entra ID) to ensure only authorized users with appropriate permissions can access or manipulate sensitive data. This approach enables user-level context and enforces fine-grained, Zero Trust access controls. Delivered as a low-code/no-code solution, Ubiq integrates seamlessly into applications, databases, data warehouses, and API gateways without requiring agents, hardware, virtual machines, or proxies. Deployment is measured in hours, not days or weeks.
51 to 200 staff
Assertion Inc
At Assertion, we make collaboration applications safer for enterprises. Our expert solutions make cybersecurity for collaboration systems easier, simpler, and up-to-date. Our offerings include Session Border Controller Security, contact center security, and security for collaboration applications, such as MS Teams and Zoom.
11 to 50 staff
Canopy Software
We're the global leaders in incident response data mining software, and the only company that exclusively focuses on solving this fast-growing need. Powered by AI and machine learning, our patented technology is purpose-built to zero in on personally identifiable information (PII) in any data set, exceeding the technical limitations of comparable tools. When an organization experiences a cyber incident, they want their incident response team using Canopy's Data Breach Response Software to analyze the compromised data and identify the affected individuals. Why? So that they can notify quickly (both regulators and affected individuals), reducing their risk of compliance issues, penalties & fines, and reputational damage. Cyber insurers want IR firms using Canopy for these projects, too. Data mining is a notoriously expensive step in the overall process, but our purpose-built tech and workflows are the fastest, most accurate on the market, keeping payouts as low as possible and saving insurers millions per year.
11 to 50 staff
Ezyhire
You Don’t Need to be an Expert to Hire an Expert Recruiters' Future: AI-driven tech screenings, ID verification, background checks, and more—no tech team needed. Our Vision:Simplifying Tech Hiring for Global Success At Ezyhire, we are dedicated to transforming the recruitment landscape by empowering organizations to thrive and individuals to flourish. Through our unwavering commitment to integrity, innovation, and empathy, we aim to be the premier partner for employers and recruiters, fostering meaningful relationships built on trust and understanding. Key Features-Extensive Test Library: Access over advanced, pre-made tests backed by statistical evidence to ensure the highest quality assessments-Diverse Question Bank: Utilize a vast library of more than questions covering a wide range of technical and non-technical subjects-Ezyhire AI Evaluate: Leverage cutting-edge Generative AI technology to assess answers in innovative ways-Advanced AI-Based Proctoring: Prevent cheating and ensure fairness with sophisticated AI-based proctoring solutions-Comprehensive ID Verification: Verify candidate identities seamlessly to enhance trust and security in the hiring process-Thorough Background Checks: Conduct in-depth background checks to ensure the reliability and integrity of potential hires-Insightful #StaffingTools #AgencyRecruitmentTools #MSPStaffingTools #TalentIntelligence #TalentSolutions #VideoInterviewTools #AutoProctoredAssessments #OneWayInterviewTools #TalentAnalytics #LiveCodingEnabledVideoInterviews #CodingTests #PhoneInterviewTools #FreeRecruitmentTools #CandidateReport #RecruitmemtPlatform #EnterpriseHiringTools #VettedTalentPoolCreation #CompetencyBasedHiringTools #TalentCuration #DE & IRecruitment #UnbiasedStaffingTools #RealWorldAssessments #CustomisedAssessments #ADACompliantStaffingTools #PreBuiltTestLibrary #ContingentStaffingTools
11 to 50 staff