Explore Top Tech Companies
All Filters
Office Type

Industry

DEI

Tech Stack

Perks

Size

Remote jobs

Top Tech Companies (144)

Security
86 Employees

enSilo protects businesses around the world from data breaches and disruption caused by cyber attacks. The enSilo Endpoint Security Platform comprehensively secures endpoints in real-time pre- and post-infection without alert fatigue, excessive dwell time or breach anxiety while also containing incident response costs by orchestrating automated det


Security
77 Employees

Targeted phishing is the number one cyber attack vector worldwide. Because these socially engineered attacks so easily pierce static defenses, they have successfully disrupted the overall security posture of public and private organizations alike. Unlike traditional solutions that detect or remediate attacks after they’re already inside the enterprise, Area 1 extends beyond the firewall, into the wild, to stop these attacks preemptively and change outcomes. A 2016 Gartner Cool Vendor, Area 1 identifies threat campaigns, attacker infrastructure, and delivery mechanisms from the outside in to give advance warning and stop targeted phishing attacks during the earliest stages of an attack cycle. Area 1 is working with some of the most sophisticated security organizations including F500 banks, insurance providers, and health care providers to proactively stop targeted phishing attacks at the outset and significantly improve their cybersecurity posture. Get Ahead.


Security
300 Employees

Anomali® detects adversaries and tells you who they are. Organizations rely on the Anomali Threat Platform to detect threats, understand adversaries, and respond effectively. Anomali arms security teams with machine learning optimized threat intelligence and identifies hidden threats targeting their environments. The platform enables organizations


Security
26 Employees

Encoding.com is the largest and most trusted cloud-based video processing service provider. As the pioneer and market leader for enabling multi-screen video delivery, Encoding.com powers advanced workflows for the majority of the Fortune 1000 media, entertainment, cable, broadcast, and technology brands. Offering the most robust feature set in the industry, Encoding.com streamlines transcoding, packaging and video delivery to all mobile, desktop, IPTV, and OTT devices. Headquartered in San Francisco, CA with offices in Aspen, CO and St. Petersburg, Russia, Encoding.com operates in private cloud environments and 14 data centers around the globe. For the latest news, please visit www.encoding.com.


Security
4 Employees

Apozy is a drop-in platform for Chrome that stops phishing and web based attacks from causing damage. Simple install with visibility, control, automation, and accuracy.


Cloud • Security • Software
San Jose, California, USA
89 Employees

For over thirty years, Lynx Software Technologies has helped customers with some of the most demanding, mission critical, system requirements to create, certify, and deploy equipment, above, on and below the surface of the earth.. Lynx for the Internet of Things (IoT): As billions of ‘things’ are connected to the internet, a new paradigm of security is required. Lynx offers real-time military-grade security products to protect the edge, the gateway and cloud devices while protecting any sensitive data as it traverses the IoT. Key Markets: Automotive, Industrial, Factory Automation, Medical and Transportation. Our LYNX MOSA.ic software framework and LynxSecure separation kernel hypervisor provide a secure foundation for this new generation of connected platforms. Lynx for Enterprise Cyber Security: To fight modern day malicious threats, security needs to be built-in rather than implemented as an afterthought. Lynx offers isolation technology that can be implemented in endpoint and cloud deployments to separate and protect critical enterprise infrastructure. This isolation technology separates sensitive information from the key attack points and denies infiltration and exfiltration attempts. Lynx for Aerospace & Defense: Lynx provides certified avionics RTOS solutions based on open standards such as POSIX, ARINC and FACE that allow reusability of certified code and systems. The FAA Reusable Software Component (RSC) has been issued to LynxOS-178. The LynxOS 7.0 RTOS and LynxSecure separation kernel technologies were designed to provide the highest levels of security without compromising performance and real-time determinism.


Security
230 Employees

Vectra® uses artificial intelligence to automate real-time cyber attack detection and response – from network users and IoT devices to data centers and the cloud. All internal traffic is continuously monitored to detect hidden attacks in progress. Detected threats are instantly correlated with host devices that are under attack and unique context shows where attackers are and what they are doing. Threats that pose the biggest risk to an organization are automatically scored and prioritized based on their severity and certainty, which, enables security operations teams to quickly focus their time and resources on preventing and mitigating loss. https://vectra.ai


Cloud • Security
San Francisco
220 Employees

WhiteSource is the industry leader in open source security management. Founded in 2011, our vision is to empower businesses to develop better software faster by harnessing the power of open source. WhiteSource is used by more than 800 companies worldwide, including 23% of Fortune 100 companies.


Security
184 Employees

RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprise networks to be resilient to cyber events. RedSeal helps customers understand their network from the inside out – providing actionable intelligence, situational awareness and a Digital Resilience Score to help enterprises measure and improve their resilien


Security
65 Employees

Cybersecurity and IT support, tailored to midsized businesses. Xantrion was founded in 2000 to provide enterprise-grade IT services to midsized businesses in the San Francisco Bay Area. Our focus has never wavered. We continually refine our services to meet the needs of the organizations we serve. As a result, our tailored solutions, in-depth cybersecurity expertise, and superior service have made us one of the top 10 managed service providers in California.


Security
154 Employees

Menlo Security's patented Isolation Platform protects organizations from cyber attack by eliminating the threat of malware. The Platform isolates and executes all Web content in the cloud, enabling users to safely interact with websites, links and documents online without compromising security. Menlo Security is trusted by some of the world’s large


Security
134 Employees

Demisto Enterprise is the first and only comprehensive, Security Operations Platform to combine security orchestration, incident management and interactive investigation. Demisto’s orchestration engine automates security product tasks and weaves in the human analyst tasks and workflows. It's the first machine learning incident response platform tha


Security
San Francisco, California, USA

Valimail is a pioneering, identity-based, anti-phishing company that has been ensuring the global trustworthiness of digital communications since 2015. Valimail delivers the only complete, cloud-native platform for validating and authenticating sender identity to stop phishing, protect and amplify brands, and ensure compliance.


Security
New York, New York, USA

eSentire® is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent.


Security
152 Employees

Expanse helps IT operations and security teams discover, manage, and secure all of their global internet assets. Current Expanse customers comprise more than 10 percent of the routable internet and they use the company's platform to monitor for real-time changes to their infrastructure. Using leading-edge collection and analysis technology, Expanse


Security
El Segundo, California, USA

Organizations around the globe rely on Rapid7 technology, services, and research to securely advance. The visibility, analytics, and automation delivered through our Insight cloud simplifies the complex and helps security teams reduce vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate routine tasks.


Security
79 Employees

tCell is a Next-Gen Cloud WAF designed to protect applications, APIs, and microservices where they are most vulnerable. tCell’s technology provides unparalleled visibility into application behavior, dramatically reducing false positives, protecting applications from attacks and providing actionable data to prevent future attacks. Best suited for CI/CD pipelines, tCell’s flexible deployment models enable Security and DevOps organizations to deploy industry-leading security alongside mission-critical applications and used by leading organizations like Veeva, Zenefits, and John Muir Health. tCell is funded by Menlo Ventures and led by executives from Splunk, Okta, and Skyhigh Networks. Learn more at tcell.io.


Security
24 Employees

DeviceLock is a leading provider of endpoint device and port control software for data leak prevention (DLP) in the BYOD and Cloud-enabled enterprise. Over 70,000 customers have deployed DeviceLock on over 7 million computers. DeviceLock has a vast range of corporate customers including financial institutions, state and federal government agencies, classified military networks, healthcare providers, telecommunications companies, and educational institutions. DeviceLock, Inc. is an international corporation based in San Ramon, California with offices in London, Dusseldorf, Milan and Moscow.


Security
389 Employees

Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. By implementing least privilege access, Centrify minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity and costs for the modern, hybrid enterprise. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse.


Security
65 Employees

EC Wise Inc. is an international secure platform and systems developer providing IT Security, Services, and Analytics. EC Wise is headquartered in the US with offices in China and Peru. We offer services that enable our clients to efficiently plan, design, and implement highly secure information platforms, products, networks and systems compliant with national and international standards. Founded in 1998 by Jack Hakim, EC Wise has grown to a mature global technology and security firm focused on developing and operating affordable secure systems for highly regulated markets (e.g., Government, Health Care, Finance, Military). EC Wise services include software development, product integration, analytics, machine learning, and design/ implementation of layered security strategies. In addition to full life cycle projects we can integrate specific products or services, automate processes to increase efficiency and consistency, develop decision hubs to automate decision making, and deliver a variety of security solutions. Our strong partnerships with companies including Oracle, Microsoft, Promia, Darktrace, Contrast Security, CloudPassage, Bromium, and Alert Logic provide the breadth and depth required for integrated enterprise and cyber-solutions. We are a global company both in customers and infrastructure. Our teams in the U.S. and China work collaboratively to deliver projects and support our customers regardless of time zone or location. We invite you to visit us on the web (https://www.ecwise.com), and check out our intro video (https://youtu.be/OO70PdiNsCk).