Top San Francisco Bay Area, CA Cybersecurity Companies (188)
Comp AI is the open source platform that helps you automate compliance with frameworks like SOC 2, ISO 27001, and GDPR. Built for modern development teams, it integrates directly with your existing tools to streamline policy management, evidence collection, and control monitoring.Unlike legacy platforms that require sales calls and long onboarding, Comp AI is transparent and self-serve. You can deploy...
The world's leading banks, airlines, retailers, hotel chains, and federal agencies rely on Shape as their primary line of defense against sophisticated cybercrime. The Shape technology platform, covered by 50+ patents, stops automated fraud and other attacks on web and mobile applications, including credential stuffing, account takeover, scraping, and unauthorized aggregation. Shape is one of the largest processors of login...
Tech Research Online is a leading platform delivering comprehensive technology insights, including trending news, insightful blogs, in-depth whitepapers, and expert interviews. We aim to educate and empower technology professionals, decision-makers, and enthusiasts with authoritative content on emerging technologies and industry innovations.
Tessian’s mission is to secure the human layer. Using machine learning technology, Tessian automatically stops data breaches and security threats caused by human error - like data exfiltration, accidental data loss, business email compromise and phishing attacks - with minimal disruption to employees' workflow. As a result, employees are empowered to do their best work, without security getting in their...
LOCH is a global leader of next-generation wireless threat monitoring. The company provides actionable intelligence on all 5G cellular and wireless IoT devices to help organizations improve their security posture, reduce risk, and manage wireless data usage across the enterprise. Every wireless device needs to be visible and secure, regardless of what type of device it is, what protocol it...
IoTium provides a secure managed software-defined network infrastructure for industrial IoT to securely connect legacy and greenfield mission-critical on-site machinery and automation & control systems to applications that reside in datacenters or the cloud - all at scale. The solution is zero-touch provisioned eliminating all complexities in scalable mass deployment.
At Babylon, we envision a future where Bitcoin and Proof-of-Stake (PoS) chains thrive together. Our mission is to build a Bitcoin-driven decentralized world by evolving Bitcoin into a trusted security backbone for PoS chains, delivering yields for bitcoin holders while fostering an integrated, secure, and decentralized economy. We trace our genesis to a transformative research paper on Bitcoin security, an...
Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks, heralding the new era of self-protecting software. Contrast's patented deep security instrumentation is the breakthrough technology that enables highly accurate assessment and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has sensors that...
ColorTokens simplifies, accelerates and automates your security operations with our award- winning Xtended ZeroTrust PlatformTM. With us, your business is resilient to cyber threats, each critical asset completely secure, assured against any misadventure from anywhere. Our ColorTokens unique Zero Trust approach gives you the comfort and confidence of fully protected cloud workloads, dynamic applications, endpoints and users.
Kivu combines technical and legal expertise to deliver investigative, discovery and forensic solutions worldwide. Kivu’s digital forensic investigators are experienced in protecting organizations against compromise of data, theft of trade secrets and unauthorized access to data. Our qualifications include forensic certifications (Encase Certified EnCE, SANS GCIH Incident Handlers, Certified Ethical Hackers, and reverse malware experts); IT certifications (Certified Information Systems...
Every day at FireEye, we see firsthand the impact of cyber-attacks on real people. This is what inspires us to fulfill our mission to relentlessly protect our customers from the impact and consequences of cyber attacks. We have learned that technology alone isn’t enough to combat cyber attackers. Our fundamental belief is that hands-on front-line expertise and intelligence, combined with innovative...
iCrypto enables organizations to eliminate risks such as Identity Theft, Access Breaches, Data Breaches, Ransom Attacks, and more, while enforcing compliance through a low friction patented mobile-centric technology leveraging device/network biometrics and tokenized identity. Providing true biometrically-tied identity of participants in any workflow, and being able to hold them accountable, is key to ensuring trust and creating certainty of whom...
Providing essential security and compliance infrastructure, Very Good Security (VGS) enables startups and enterprises to focus on their core business instead of compliance and regulatory overhead. With one single integration, VGS customers unlock the value of sensitive data without the cost and liability of securing it themselves, while also accelerating compliances like PCI, SOC 2 and more.
The cybersecurity industry has an effectiveness problem. Every year new technologies, vendors, and solutions emerge, and yet despite this constant innovation we continue to see high profile breaches in the headlines. All organizations know they need better security, but the dizzying array of options leave resource-constrained IT and security leaders wondering how to proceed. At Arctic Wolf, our mission is...
Druva delivers data protection and management for the cloud era. Druva Cloud Platform is built on AWS and offered as-a-Service; customers drive down costs by over 50 percent by freeing themselves from the burden of unnecessary hardware, capacity planning, and software management.
Dasera is a leader in data security. Dasera enables safe use of sensitive data by securing the entire data lifecycle in cloud data stores. Dasera was co-founded by serial-entrepreneurs Ani Chaudhuri and Noah Johnson and is backed by Sierra Ventures, One Way Ventures, Saama Capital, Sand Hill Angels, and others.
Founded in 2011 with offices in Redwood City, Entreda is the leading provider of comprehensive cybersecurity software, systems, and training to the independent financial advice and other regulated industries. Its Unify platform monitors endpoints on client networks, and automatically remediates cybersecurity vulnerabilities in real time. Within the Unify platform Entreda also offers advanced network vulnerability scanning and penetration testing capabilities....
Simbian is a mission-driven AI security company based in Mountain View, CA, backed by Silicon Valley investors, and founded by serial security entrepreneurs.
Tala prevents client-side attacks like Magecart, XSS, code injections and session re-directs. Our innovative solution is designed to secure customer data and ensure data privacy, without degrading site performance or top-line revenue. Tala's technology automates policy generation, deployment and maintenance of powerful web standards, including CSP, SRI, Feature Policy, Referrer Policy, HSTS and others. Tala also leverages JavaScript virtualization synthetically...
DataVisor is a leading AI-Powered fraud and risk management platform that enables organizations to respond to fast-evolving cyber attacks and mitigate risks as they happen in real time. Our mission is to protect large consumer facing enterprises protect their business and their customers from digital threats and restore trust and safety online. DataVisor is venture-backed by New View Capital and...