Explore top tech companies.
All Filters
Office Type

Industry

Size

Open Jobs

Remote Jobs

Perks

DEI

Tech Stack

Top San Francisco Bay Area, CA Cybersecurity Companies (178)

Cloud • Information Technology • Consulting • Cybersecurity
San Francisco, California, USA
137 Employees

Blackstone Technology Group (www.bstonetech.com) is a privately-held, global IT services and solutions firm founded in 1998. We are headquartered in San Francisco with additional offices in Denver, Houston, Colorado Springs and Washington, DC. Blackstone’s mission is to implement innovative IT and business process solutions that help clients address industry challenges, achieve cost containment, and transform client’s business models within the commercial and public service marketplaces. Blackstone has garnered an impressive track record of delivering successful results, with a noteworthy client list that includes many Fortune 1000 businesses and the US Federal Government. Follow Us On Twitter: Twitter (Corporate): www.twitter.com/btgcorporate Twitter (Staffing): www.twitter.com/bstonetalent Visit Our Corporate Site: http://www.bstonetech.com/ Join Our YouTube Channel: http://www.youtube.com/c/BlackstoneTechnologyGroup


Cloud • Security • Cybersecurity
San Francisco, California, USA
646 Employees

Our mission is to secure and empower our digital future in a privacy-focused world where mobility and cloud are essential to all we do for work and play. We enable consumers and employees to protect their data, and to securely stay connected without violating their privacy and trust. Lookout is trusted by millions of consumers, the largest enterprises and government agencies, and partners such as AT&T, Verizon, Vodafone, Microsoft, Google, and Apple. Headquartered in San Francisco, Lookout has offices in Amsterdam, Boston, London, Sydney, Tokyo, Toronto and Washington, D.C.

Let Your Resume Do The Work
Upload your resume to be matched with jobs you're a great fit for.

Cloud • Security • Software • Cybersecurity
6 Offices
6,187 Employees

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.


Security • Cybersecurity
Redwood, California, USA
95 Employees

Area 1’s mission is to stop phish - the root cause of 95% of cybersecurity incidents. Phishing enables rogue wire transfers, stolen customer data, and initial access into computer networks. We offer the cybersecurity industry’s only Pay-per-Phish solution: Pay only for the phish we catch, that your other defenses are missing. We also offer the only technology that comprehensively blocks phishing attacks across all threat vectors - email, web and network - before they can damage your business. Area 1 is trusted by more than 2000 leading enterprises across the financial services, healthcare, aviation, manufacturing, consumer goods, critical infrastructure and other industries. Want to stop phishing? Visit www.area1security.com, follow us on Twitter (@area1security), or subscribe to area1security.com/newsletter-phish-of-the-week.


Artificial Intelligence • Cloud • eCommerce • Information Technology • Software • Cybersecurity • Web3
5 Offices
1,000 Employees

Capital Numbers is a leading software development company specializing in digital transformation solutions that drive business growth and innovation. We build custom, scalable solutions tailored to the unique needs of businesses—from agile startups to large enterprises. With a team of over 500 skilled professionals, we excel in AI/ML, Cloud Engineering, Data Analytics, Web & Mobile App Development, and Quality Assurance. Our expertise is trusted by a global clientele and backed by multiple industry awards and certifications, including ISO 9001, ISO 27001, and SOC 2 Type II, reflecting our commitment to quality and security. Our flexible engagement models—ranging from project-based delivery to staff augmentation and agile pods—allow us to adapt to a wide range of client requirements, delivering impactful results at every stage of the digital journey. With 250+ clients worldwide, including Reuters, Tipalti, Volvo, dpd, and Outlook, Capital Numbers can handle diverse and complex projects. A notable achievement is developing the award-winning CreditRich app, which won the Startup Pitch contest at SXSW, demonstrating the company’s innovative approach and technical excellence. Recognized with 50+ awards and over 200 five-star ratings, Capital Numbers is known for its commitment to delivering excellence and innovation. Certifications: ISO 9001 & ISO 27001 SOC 2 Type II CIN: L72200WB2012PLC183599 DUNS Number: 65-080-6800


Security • Database • Cybersecurity
San Francisco, California, USA
223 Employees

Providing essential security and compliance infrastructure, Very Good Security (VGS) enables startups and enterprises to focus on their core business instead of compliance and regulatory overhead. With one single integration, VGS customers unlock the value of sensitive data without the cost and liability of securing it themselves, while also accelerating compliances like PCI, SOC 2 and more.


Cybersecurity
San Jose, California, USA
289 Employees

ColorTokens simplifies, accelerates and automates your security operations with our award- winning Xtended ZeroTrust PlatformTM. With us, your business is resilient to cyber threats, each critical asset completely secure, assured against any misadventure from anywhere. Our ColorTokens unique Zero Trust approach gives you the comfort and confidence of fully protected cloud workloads, dynamic applications, endpoints and users.


Security • Software • Cybersecurity • Data Privacy
2 Offices
30 Employees

Truffle Security is a cybersecurity company that offers open-source and enterprise solutions for finding and remediating leaked software credentials. Our secret-scanning engine, Truffle Hog, identifies and addresses credentials and passwords before hackers are able to find and exploit them. Detecting these credentials early allows companies to take proactive measures to protect sensitive data. When we founded Truffle Security Co in February of 2021, we committed to continue to grow a community with security researchers around the world, and continue to provide free and open resources to support those that make the world more secure. We have a strong commitment to open source and to the community.


Artificial Intelligence • Information Technology • Internet of Things • Mobile • Software • Cybersecurity • Big Data Analytics
6 Offices
1,000 Employees

Since 2003, we have engineered more than 5,000 transformative solutions for our clients around the globe, bolstering their growth and competitive edge. Our mission is to advise and implement modern, sustainable solutions for our clients, using the power of digital, cloud, data, and intelligent technologies to help them create a thriving future for their businesses. Having a world-class team of 1,000+ technology consultants, strategists, and delivery experts, Svitla provides advisory, development, analytical, and support services to enable successful business transformations. We serve as a reliable partner to clients ranging from innovative startups to Fortune 500 enterprises, featuring notable brands such as Logitech, Ingenico, Amplience, and Global Citizen. Our extensive technological expertise spans across 20+ industries, including E-commerce & Retail, Financial Services, Healthcare & Life Sciences, Hospitality & Travel, Logistics & Transportation, among others. Svitla’s globally distributed teams operate across 10 delivery centers across the US, LATAM, Europe, and Asia. We are experts in a number of technological domains, including cloud migration and modernization, data analytics, web and mobile development, the Internet of Things, Artificial Intelligence and machine learning, and provide clients with DevOps and managed support services. Svitla is a WBENC-certified business and one of the largest and fastest-growing women-owned IT companies in the US. Our unparalleled value to our clients and high-quality services are verified by multiple international awards and certifications: ISO 9001:2015, SOC 2, AWS Advanced Partner, Inc. 5000, Global Outsourcing 100. Our focus is to build a business that is not only profitable but also contributes to the well-being of our partners, employees, their families, global and local communities, making a lasting impact on our collective future.


Software • Cybersecurity
San Francisco, California, USA
21 Employees

Identify company-owned devices with ease with Smallstep. Ensure that access to financial data, code repositories, PII, SaaS apps, and other sensitive resources is only possible from trusted, company-managed devices.


Cloud • Information Technology • Cybersecurity
Milpitas, California, USA
44 Employees

ICE is a leading managed IT solution provider specializing in full-range, vendor-independent managed IT services to small and mid enterprises for over 24 years. 97% CSAT (Client Satisfaction Score) with over 5,000.00 client reviews, customer service is front and center at ICE. Our objective is to be Trusted IT Partner for our clients. We specialize in Cybersecurity and provide 24x7x365 security detection and response services. We are also SOC 2 compliant.


Cybersecurity
San Francisco, California, USA
13 Employees

StealthMail makes your emails secure and invisible to email relays, hackers, or Public Internet threats - making email relationships with clients a trusted one via StealthMail’s best-in-class Secure Email Channel. Moreover, StealthMail gives you full and exclusive control over your encryption keys, data, and access rights - so that your email communication is fully protected. To start using StealthMail no integration is needed. There are no risks for existing IT infrastructure. The whole deployment takes less than 4 hours. Users get Outlook Add-Ins and the server is deployed to Microsoft’s Azure Cloud.


Cybersecurity
San Francisco, California, USA
50 Employees

Elevate Security was founded in 2017 by two former Salesforce security executives to address one of the most challenging aspects of building an enterprise security program: getting ahead of breaches before they happen. Our solutions help enterprise security leaders gain deep visibility into their biggest organizational risks to prevent ransomware, account takeover, and data loss. Elevate Security enables CISOs to transform beyond managing incidents to proactively addressing these risks with automated playbooks to get in front of the next breach. Elevate Security’s cloud-based platform integrates with leading security technologies to identify users most likely to cause a breach and automatically orchestrate additional security to minimize the likelihood of an incident. Elevate Security is trusted by leading enterprises in industries such as financial services, technology, healthcare, and more who rely on our proactive solution to strengthen their organizational security posture. For more information, visit: https://elevatesecurity.com/


Information Technology • Cybersecurity
San Jose, California, USA
65 Employees

Niagara Networks is a Silicon Valley-based company that pioneers the Open Visibility Platform(TM) to bring desperately needed agility to network security. Niagara Networks solutions enable NetOps and SecOps teams to easily and efficiently operate and administer multiple security tools and platforms with service scale and flexibility while reducing operational expenses and downtime. Niagara Networks provides high-performance, high-reliability network visibility, and traffic delivery solutions for the world's most demanding service provider and enterprise environments. Our solutions are installed in the world’s most prominent networks, empowering Security and Network Operations Centers (SOC/NOC) with end-to-end visibility and actionable traffic intelligence across physical and virtual networks. A former division of Interface Masters, Niagara Networks creates all the building blocks for an advanced Visibility Layer at all data rates up to 100Gb on all types of networks including 5G, with solutions for taps, bypass elements, packet brokers, and a unified management layer. We design, develop & manufacture our products in the Silicon Valley, USA


Software • Cybersecurity
3 Offices

Global Standards and Regulations Management - access, monitor, manage and audit your obligations from regulations, standards and internal corporate documents and permits. Nimonik is an integrated compliance management software with regulatory database and industry standards. Nimonik’s compliance management software helps you centralize external requirements from regulations and industry standards along with your digital requirements from engineering documents, contracts, permits, policies and other documents. Following our systematic approach, you will determine what applies to you, identify compliance gaps and close issues with actions and audits.


Cloud • Security • Cybersecurity
Mountain View, California, USA
312 Employees

Menlo Security enables organizations to outsmart threats, completely eliminating attacks and fully protecting productivity with a one-of-a-kind, isolation-powered cloud security platform. It’s the only solution to deliver on the promise of cloud security—by providing the most secure Zero Trust approach to preventing malicious attacks; by making security invisible to end users while they work online; and by removing the operational burden for security teams. Now organizations can offer a safe online experience, empowering users to work without worry while they keep the business moving forward.


Artificial Intelligence • Information Technology • Cybersecurity
Santa Clara, California, USA
198 Employees

The world's leading banks, airlines, retailers, hotel chains, and federal agencies rely on Shape as their primary line of defense against sophisticated cybercrime. The Shape technology platform, covered by 50+ patents, stops automated fraud and other attacks on web and mobile applications, including credential stuffing, account takeover, scraping, and unauthorized aggregation. Shape is one of the largest processors of login traffic in the world and protects more than 1.3 billion user accounts. Shape prevented more than $1 billion in fraud losses last year. Shape was recognized in Fortune Magazine as one of the leading companies in artificial intelligence in 2018 and listed in CNBC's top 50 most disruptive companies in the world.


Software • Cybersecurity
San Francisco, California, USA
10 Employees

The Identify3D technology suite protects confidentiality and integrity of data in digital manufacturing by providing intellectual property protection, manufacturing repeatability, and traceability — from initial design to finished product. By providing tight control of the digital supply chain, we unlock the potential of distributed manufacturing. For more information, visit www.identify3D.com.


Events • Information Technology • Internet of Things • Mobile • Sales • Software • Cybersecurity
2 Offices
1,500 Employees

Cradlepoint, part of Ericsson was born in Boise and built for wireless. We are a team of authentic, hard-working, and innovative people driven by a shared vision to Connect Beyond the limits of wired networks. We help customers utilize 4G and 5G cellular technology to connect people, places, and things — anywhere.


Information Technology • Cybersecurity
Emeryville, California, USA
43 Employees

LOCH is a global leader of next-generation wireless threat monitoring. The company provides actionable intelligence on all 5G cellular and wireless IoT devices to help organizations improve their security posture, reduce risk, and manage wireless data usage across the enterprise. Every wireless device needs to be visible and secure, regardless of what type of device it is, what protocol it uses, and who owns it. This guides everything we do and why LOCH aims to secure and enable the new world of wireless innovation that will drive the next generation of digital transformation. Find out more at www.LOCH.io.