Explore Top Tech Companies
All Filters
Remote jobs

Industry

DEI

Tech Stack

Perks

Size

Top Tech Companies (142)

Don't see your company?

Create a company profile
Security
25 Employees

EZMCOM is a security access provider for innovative and easy-to-use technology that can be deployed to protect users, data, and applications from credential theft, account takeover and breaches. EZMCOM is working with companies worldwide to change the way we authenticate and authorize – across mobile devices, servers, workstations within enterprise and cloud services. 30+ million users are protected with EZMCOM solutions worldwide. Our Vision is to become a global leader in online identity proofing solutions


Security
65 Employees

Introducing FileString, a better way to share your important files. FileString is an easy to use cloud-based service that attaches a digital string to the important files you share, so you can control your content even after someone downloads it to their computer or mobile device. With FileString, you can protect files you share from being viewed, forwarded, printed or edited. You can track every time your file is viewed or printed. You can remotely update distributed copies to the latest version. And you can revoke access to files so they can never be opened again by people to whom you’ve sent them. FileString makes it simple to manage the files you’ve shared with control. It’s available on any Internet-connected computer or mobildevice and it works whether you’re online or off. FileString also automatically syncs your sent and received files – so you’ll always have access, when and where you need it. Now there is a new option to share your most important files. Don’t regret emailing an attachment and losing control of your important content. Don’t regret giving access to your shared cloud based folder permitting the download of your important file. Now you can add intelligence to your important files, and control them on all the devices you share with. Now you can “string” your most important files. Share with confidence, share with control. “String it …with File String”.


Security
6 Employees

Creating a world where everyone is safe opening links with patented endpoint solutions that have never been seen before


Cloud • Security • Software
San Jose, CA, US
89 Employees

For over thirty years, Lynx Software Technologies has helped customers with some of the most demanding, mission critical, system requirements to create, certify, and deploy equipment, above, on and below the surface of the earth.. Lynx for the Internet of Things (IoT): As billions of ‘things’ are connected to the internet, a new paradigm of security is required. Lynx offers real-time military-grade security products to protect the edge, the gateway and cloud devices while protecting any sensitive data as it traverses the IoT. Key Markets: Automotive, Industrial, Factory Automation, Medical and Transportation. Our LYNX MOSA.ic software framework and LynxSecure separation kernel hypervisor provide a secure foundation for this new generation of connected platforms. Lynx for Enterprise Cyber Security: To fight modern day malicious threats, security needs to be built-in rather than implemented as an afterthought. Lynx offers isolation technology that can be implemented in endpoint and cloud deployments to separate and protect critical enterprise infrastructure. This isolation technology separates sensitive information from the key attack points and denies infiltration and exfiltration attempts. Lynx for Aerospace & Defense: Lynx provides certified avionics RTOS solutions based on open standards such as POSIX, ARINC and FACE that allow reusability of certified code and systems. The FAA Reusable Software Component (RSC) has been issued to LynxOS-178. The LynxOS 7.0 RTOS and LynxSecure separation kernel technologies were designed to provide the highest levels of security without compromising performance and real-time determinism.


Security
123 Employees

JASK is modernizing security operations by delivering an advanced SIEM platform that provides better visibility, better automation and a better architecture. Built on cloud-native technologies, the JASK ASOC platform streamlines security analyst workflows by automating many of the repetitive tasks that restrict productivity, freeing them for higher-value roles like threat hunting and vulnerability management, while addressing the escalating talent shortage.


Security
33 Employees

Wynyard ACA is a market leader in high consequence crime fighting and security software, used by law enforcement and national security agencies, critical infrastructure operations and major corporations. Its advanced crime analytics platform helps solve growing big data and security problems including organised and transnational crime, new generati


Hardware • Internet of Things • Other • Retail • Security
San Francisco, CA, US
93 Employees

August designs smart home access products and services that are safer than traditional keys, make life easier, and put you in control of your front door from anywhere in the world. With August products, you can create virtual keys to your home and easily grant access to housecleaners, dog walkers, delivery services, guests, friends, and family—and control how long that access lasts—all from your smartphone. August products work together, integrate with other smart devices and services, and are designed to fit naturally and elegantly into the home.


Security
152 Employees

Expanse helps IT operations and security teams discover, manage, and secure all of their global internet assets. Current Expanse customers comprise more than 10 percent of the routable internet and they use the company's platform to monitor for real-time changes to their infrastructure. Using leading-edge collection and analysis technology, Expanse


Security
San Francisco, CA, US

Valimail is a pioneering, identity-based, anti-phishing company that has been ensuring the global trustworthiness of digital communications since 2015. Valimail delivers the only complete, cloud-native platform for validating and authenticating sender identity to stop phishing, protect and amplify brands, and ensure compliance.


Security
230 Employees

Vectra® uses artificial intelligence to automate real-time cyber attack detection and response – from network users and IoT devices to data centers and the cloud. All internal traffic is continuously monitored to detect hidden attacks in progress. Detected threats are instantly correlated with host devices that are under attack and unique context shows where attackers are and what they are doing. Threats that pose the biggest risk to an organization are automatically scored and prioritized based on their severity and certainty, which, enables security operations teams to quickly focus their time and resources on preventing and mitigating loss. https://vectra.ai


Security
310 Employees

CipherCloud, a leader in cloud security and visibility, enables companies to adopt the cloud while delivering data protection, compliance and control. CipherCloud delivers a comprehensive multi-cloud security platform that integrates advanced data protection, content control, monitoring, cloud discovery and risk analysis. The largest financial services, insurance, healthcare, telecommunication, and government companies across more than 25 countries have put their trust in CipherCloud.


Security
243 Employees

Founded in 2006, OpenDNS, now part of Cisco, has evolved from a provider of fast, reliable DNS services used by more than 65 million active users every day into a leading network security innovator. In 2012, we launched our first enterprise security product, Umbrella. Today, Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the internet wherever users go. By learning from internet activity patterns, Umbrella automatically uncovers current and emerging threats. And because it’s built into the foundation of the internet and delivered from the cloud, Umbrella is the simplest security product to deploy and delivers powerful, effective protection.


Security
53 Employees

Our Mission To give people control and security over their digital identity. We believe identity should be convenient, safe and secure, and put users in control. Civic allows people to control the use of their identity information. We use cutting edge identity verification technology to secure and protect personal information transfer. Having condu


Security
2 Employees

Authy provides strong authentication for the connected world, protecting people and the enterprise against malicious attacks. Our two-factor authentication (2FA) security solution enables organizations to minimize risk while enhancing the user experience. Authy 2FA provides a fast-to-implement, highly scalable and proven 99.999 % reliable alternative to passwords. Used by 11,000+ websites serving 2 million consumers worldwide, it's designed to give users the ability to self-service or easily manage their own 2FA experience. Coinbase, CloudFlare, Humble Bundle and Twitch.tv are just some Authy clients. Authy is a Twilio company. Follow us on: Twitter at @Authy Facebook at https://www.facebook.com/authysec Google+ at https://plus.google.com/+Authy GitHub at https://github.com/authy


Security
94 Employees

Cloudmark is a trusted leader in intelligent threat protection against known and future attacks, safeguarding 12 percent of the world’s inboxes from wide-scale and targeted email threats. With more than a decade of experience protecting the world’s largest messaging environments, only Cloudmark combines global threat intelligence from a billion subscribers with local behavioral context tracking to deliver instant and predictive defense against data theft and security breaches that result in financial loss and damage to brand and reputation. Cloudmark protects more than 120 tier-one service providers and tens of thousands of enterprises, including, Verizon, Swisscom, Comcast, Cox and NTT.


Security
65 Employees

Blueliv is a leading cyberthreat intelligence provider, headquartered from Barcelona, Spain. We scour the open, deep and dark web to deliver fresh, automated and actionable threat intelligence to organizations, helping protect their networks from the outside in. We enable organizations to save time and resources by accelerating incident response performance, providing user-friendly evidence accessible to all levels within cybersecurity operations teams with our pay-as-you-need solution. We do not believe in a one-size-fits-all approach, and work together to configure a modular solution tailored to customer needs using separate intelligence modules, all backed up by our world-class in-house analyst team. Blueliv was named Enterprise Security and Enterprise Threat Detection 2018 category winners by Computing.co.uk, ‘Threat Intelligence Company of the Year2018’ by Cybersecurity Breakthrough, a Gartner ‘Cool Vendor,’ andGo-Ignite winner, in addition to holding affiliate membership of FS-ISAC for several years.


Security
57 Employees

Preempt was founded in 2014 by global security and networking experts with a passion for making IT security teams more effective in protecting their organizations from breaches and malicious insiders. Preempt protects organizations by eliminating security threats. Threats are not black or white and the Preempt Platform is the only solution that preempts threats with continuous threat prevention that automatically adapts based on identity, behavior and risk. This ensures that both security threats and risky employee activities are responded to with the right level of security at the right time. The platform easily scales to provide comprehensive identity based protection across organizations of any size.


Artificial Intelligence • Machine Learning • Natural Language Processing • Security • Cybersecurity
Sunnyvale, CA, US
110 Employees

We help organizations communicate more securely over email and other cloud office applications with the power of Natural Language Understanding (NLU). The Armorblox platform connects over APIs and analyzes thousands of signals to understand who users are, what they do, and how they communicate. With this context, Armorblox can stop advanced email attacks like business email compromise, and also help organizations stay compliant by protecting their sensitive data from falling into the wrong hands. Security teams also become more proactive after using Armorblox because the platform automates away most of the manual and repetitive tasks involved in responding to user-reported email threats. We create the VERY BEST People-first Company Culture through thoughtful programs that elevate and engage our People. We are proud to have an industry-leading product, a gender score that ranks in the top 20%, and a diversity score that ranks in the top 30%. We are honored Armorblox was awarded Great Place to Work, Omni Award for Outstanding Wellbeing and Benefits, Best Company Leadership, Best CEOs for Diversity, Best Company Compensation, and was featured in the 2019 Forbes AI 50 list and was named a 2020 Gartner Cool Vendor in Cloud Office Security. Founded in 2017, Armorblox is headquartered in Sunnyvale, CA and backed by the very best investors in Silicon Valley including General Catalyst and Next47.


Security
Mountain View, US
600 Employees

SentinelOne was founded in 2013 by an elite team of cyber security and defense experts who developed a fundamentally new, groundbreaking approach to endpoint protection. SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organizations secure their assets with speed and simplicity.


Security
22 Employees

StealthMail makes your emails secure and invisible to email relays, hackers, or Public Internet threats - making email relationships with clients a trusted one via StealthMail’s best-in-class Secure Email Channel. Moreover, StealthMail gives you full and exclusive control over your encryption keys, data, and access rights - so that your email communication is fully protected. To start using StealthMail no integration is needed. There are no risks for existing IT infrastructure. The whole deployment takes less than 4 hours. Users get Outlook Add-Ins and the server is deployed to Microsoft’s Azure Cloud.