Top San Francisco Bay Area, CA Security Companies (238)
Authy provides strong authentication for the connected world, protecting people and the enterprise against malicious attacks. Our two-factor authentication (2FA) security solution enables organizations to minimize risk while enhancing the user experience. Authy 2FA provides a fast-to-implement, highly scalable and proven 99.999 % reliable alternative to passwords. Used by 11,000+ websites serving 2 million consumers worldwide, it's designed to give users the ability to self-service or easily manage their own 2FA experience. Coinbase, CloudFlare, Humble Bundle and Twitch.tv are just some Authy clients. Authy is a Twilio company. Follow us on: Twitter at @Authy Facebook at https://www.facebook.com/authysec Google+ at https://plus.google.com/+Authy GitHub at https://github.com/authy
A Gartner Emerging Vendor for EASM, Reposify’s external attack surface management (EASM) platform pinpoints unknown, exposed internet-facing assets so security teams can best secure their digital perimeter. Our intelligent internet mapping technology takes all environments of an organizations’ digital footprint into account for full-spectrum perimeter security, with no agents or deployment required. Having indexed billions of digital assets since 2016, Reposify’s proprietary internet mapping technology leverages big data to identify historical trends critical to an organizations’ security posture. Whether assets are on premise, in the cloud or housed across supply chains and subsidiaries, nothing is left unknown. All exposed assets — known or unknown — are automatically classified, analyzed and prioritized according to risk score. Customizable alerts trigger notifications for issues that require immediate attention. Leading enterprises worldwide use Reposify to discover and secure their internet-facing assets in real-time.
BluBracket is the first enterprise security solution for code in a software-driven world. BluBracket gives companies visibility into where source code introduces security risk while also enabling them to fully secure their code—without altering developer workflows or productivity.
DDoS Protection from a Partner You Can Trust. Founded in 2008, Nexusguard is a leading cloud-based distributed denial of service (DDoS) security solution provider fighting malicious internet attacks. Nexusguard ensures uninterrupted internet service, visibility, optimization and performance. Nexusguard is focused on developing and providing the best cybersecurity solution for every client across a range of industries with specific business and technical requirements. Nexusguard also enables communication service providers to deliver DDoS protection solution as a service. Nexusguard delivers on its promise to provide you with peace of mind by countering threats and ensuring maximum uptime. Visit www.nexusguard.com for more information.
Based in Silicon Valley, ShareRoot is positioned to become a major player in the marketing data and privacy protection ecosystem. The expanding global awareness around consumer data and privacy issues makes ShareRoot’s efforts and platforms more timely than ever. ShareRoot’s Legal Rights Management UGC platform was the first product the company created, with clients including Johnson and Johnson, McDonald's, and Costco. The company is currently in the process of launching their new MediaConsent platform which is the first platform to give consumers/citizens control of their data and privacy through a preference dashboard. The company also plans to integrate blockchain technology in order to further secure and guarantee the protection of data on its platforms and privacy of the consumers interacting with those platforms. For more information about ShareRoot please visit www.shareroot.co Check us out on the Australian Stock Exchange with our ticker symbol SRO
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of disruptive cloud-based security, compliance and IT solutions with more than 10,000 subscription customers worldwide, including a majority of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and automate their security and compliance solutions onto a single platform for greater agility, better business outcomes, and substantial cost savings. The Qualys Cloud Platform leverages a single agent to continuously deliver critical security intelligence while enabling enterprises to automate the full spectrum of vulnerability detection, compliance, and protection for IT systems, workloads and web applications across on premises, endpoints, servers, public and private clouds, containers, and mobile devices. Founded in 1999 as one of the first SaaS security companies, Qualys has strategic partnerships and seamlessly integrates its vulnerability management capabilities into security offerings from cloud service providers, including Amazon Web Services, the Google Cloud Platform and Microsoft Azure, along with a number of leading managed service providers and global consulting organizations. For more information, please visit http://www.qualys.com
Salt Security delivers an API Threat Protection solution focused on securing the ubiquitous APIs connecting everything from web and mobile applications to microservices and IoT devices. These are the APIs that you develop and own and are at the core of connecting your applications and data. Powered by our AI-based Big Data engine and Holistic Detection architecture, only Salt Security: --Discovers all your APIs and the sensitive data they expose --Pinpoints and stops attackers during reconnaissance --Eliminates API vulnerabilities to strengthen your security posture Salt Security was founded in 2016 by alumni of the Israeli Defense Forces (IDF) to deliver the first, patented API Protection platform to secure APIs. Salt Security deploys in minutes, automatically learns your unique APIs, and requires no configuration or customization to help you protect and improve your API security. In our Series D round, we raised $140M at a valuation of $1.4 billion. Led by CapitalG, Alphabet's independent growth fund, the round included participation from all existing investors, including Sequoia Capital, Y Combinator, Tenaya Capital, S Capital VC, Advent International, Alkeon Capital, and DFJ Growth.
Elastica is the leader in Data Science Powered™ Cloud Application Security. Its CloudSOC™ platform empowers the companies to confidently leverage Cloud and SaaS applications while staying safe, secure and compliant. The following Elastica Apps on the extensible CloudSOC™ platform enable full life cycle of visibility & security for the Cloud and SaaS applications being used in your company: - Audit: Uncovers Shadow IT and highlights vulnerabilities in cloud apps being used by employees - Detect: Uses machine learning to detect intrusions and threats based on account activity in cloud apps - Protect: Provides defense against intrusions and compliance violations in cloud apps being used - Investigate: Enables forensic investigations on historic account activity on cloud apps being used Elastica, acquired by Blue Coat in 2015, is headquartered in San Jose, CA. Learn more about Elastica at https://www.elastica.net. Follow us on Twitter @ElasticaInc.
Yaana is a leading global provider of a wide range of intelligent compliance solutions including lawful interception, accurate data retention, big-data search & disclosure, advanced security and application specific analytics. Our solutions offer our customers a cost-effective path to address the complexities related to meeting compliance needs in the rapidly evolving information communications and cloud markets worldwide. Nestled in the heart of Silicon Valley, California, Yaana was founded in 2007 with a highly qualified executive team with deeply rooted experience spanning over three decades in communications, security, legal compliance and mobile technologies from leading companies including AT&T Bell Labs, Bellsouth, Booz Allen & Hamilton, FCC, GTE, VeriSign, Vodafone and several top law enforcement agencies. Yaana has expert staff across 18 geographical locations globally including USA, UK, Europe, Middle East and Asia Pacific. Yaana provides powerful innovative products and services incorporating advanced security measures that exceed industry best practices. We deliver complex real-time compliance solutions built on our highly secure and scalable infrastructure. We have a successful track record of pioneering, rapidly developing and launching innovative products and services. Yaana provides expertise in leading global industry standards and regulatory issues around legal compliance, legal interception, cybersecurity and data retention. As a recognized and trusted partner, Yaana enables our customers to get the best return on investment. Yaana’s products and services enable over 550 service providers (mobile operators, broadband networks, cable networks, social media providers and other communication providers) globally. Yaana was the first trusted partner with fully managed services in the US and UK for legal compliance, and is leading the industry in compliance automation and electronic technical interfaces between government agencies and service providers for data retention, legal interception and operational systems.
Calisti effortlessly secures, deploys, and manages your cloud native apps and event drive platforms such as Apache Kafka at scale on Kubernetes, on hybrid multi-cloud ◦ Calisti simplifies zero-trust security by integrating security into Apache Kafka through Kubernetes. ◦ Calisti simplifies observability by integrating metrics, events, logs, topology, and tracing into a single pane of glass, accelerating root cause analysis and remediation time. ◦ Calisti simplifies the management of services such as Scaling of clusters by providing a user-friendly platform offering features like real-time network debugging tools, integrated configuration validation, and a sleek UI dashboard.
Imperva is a cybersecurity leader with a mission to protect data and all paths to it. We protect the data of over 6,000 global customers from cyber attacks through all stages of their digital transformation. Our products are informed by the Imperva Research Lab, a global threat intelligence community, that feeds the latest security and compliance expertise into our solutions.
The Accellion secure file sharing and governance platform empowers millions of corporate executives, attorneys, healthcare providers, investment advisors, government agents, and other professionals all over the world to share sensitive information with external partners simply, securely, and in compliance. When users click the Accellion button inside an email, mobile or enterprise app, they know it’s the simplest way to securely share sensitive information with the outside world. By giving users an easy, secure external communication channel, CISOs prevent data leaks, protect against malicious attacks, and eliminate shadow IT. Because CISOs cannot protect sensitive information if they don’t know where it’s located, the Accellion platform provides full visibility into where sensitive information is stored, who is accessing it, and with whom are they sharing it. A CISO dashboard monitors every file that enters or leaves the organization, providing a complete map of all intellectual property, personally identifiable information, and other sensitive information shared with external partners. And with on-premise, private cloud, hybrid and FedRAMP deployment options, the Accellion platform provides the security and governance CISOs need to protect their organizations, mitigate risk, and adhere to rigorous compliance regulations such as NIST 800-171, HIPAA, SOX, GDPR, GLBA, FISMA, and others. Accellion’s solutions have been used by more than 25 million end users and have been installed at more than 3,000 of the world’s leading corporations and government agencies including NYC Health + Hospitals; KPMG; Kaiser Permanente; Latham & Watkins; National Park Service; Umpqua Bank; Cargill; and the National Institute for Standards and Technology (NIST). To learn more, please visit our website at www.accellion.com.
SpinOne by Spin Technology is a SaaS data security management platform designed to monitor, secure, and back up your G Suite, Microsoft 365 and Salesforce data, protect against ransomware, improve compliance, and reduce IT costs. SaaS Backup Backup your Google Workspace, Microsoft Office365, or Salesforce data. Restore any damaged assets in a matter of seconds. Risk Assessment and Access Management Streamline risk assessment and access management of OAuth apps and browser extensions through security policies. Ransomware Protection Reduce downtime to 2 hours from a cloud ransomware attack. Save up to 90% of your recovery costs. SaaS Data Leak Protection Automated SaaS DLP control features and instant security alerts. Multiple Cloud Storage Options Store your data in AWS, GCP or Azure, in multiple storage regions around the world to meet local compliance regulations.
We are solving some of the most painful problems enterprise IT security teams face in cloud and data security space. We are a team of dedicated, self-driven, self-managed engineers who value: * focus, commitment and pragmatism in our actions * honesty and integrity in all our interactions * efficiency, trustworthiness and excellence as a way of life We offer fully remote positions with competitive compensation, stock options, excellent health insurance and 401k.
Providing essential security and compliance infrastructure, Very Good Security (VGS) enables startups and enterprises to focus on their core business instead of compliance and regulatory overhead. With one single integration, VGS customers unlock the value of sensitive data without the cost and liability of securing it themselves, while also accelerating compliances like PCI, SOC 2 and more.
Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts. The company’s core invention, the YubiKey, delivers strong hardware protection, with a simple touch, across any number of IT systems and online services. The YubiHSM, Yubico’s ultra-portable hardware security module, protects sensitive data stored in servers. Yubico is a leading contributor to both the FIDO2, WebAuthn, and FIDO Universal 2nd Factor open authentication standards, and the company’s technology is deployed and loved by 9 of the top 10 internet brands and by millions of users in 160 countries. Founded in 2007, Yubico is privately held, with offices in Sweden, UK, Germany, USA, Australia, and Singapore.
iSIGHT Partners specializes in providing cyber threat intelligence services.
UnifyID is now part of Prove. The Next Generation Platform for Identity and Authentication. Hate passwords? So do we. We believe that within five years, passwords will no longer be the predominant method of authentication. We are UnifyID, a company that is building a revolutionary identity platform based on implicit authentication. Our solution allows people to identify themselves in a unique way that is extremely difficult to forge or crack. Best of all, we are doing it in a way that respects user privacy. We are developing a revolutionary new technique for authentication that relies on implicit authentication. These are factors that are unique to you but don’t require any user action, such as your location, your habits, and various signals from the devices you carry and the sensors around you. We use proprietary machine learning algorithms to discover what makes you unique and calculate a confidence level of how likely it is you based on these signals. Latest Announcements - SXSW Security & Privacy Winner (#1 in 50 finalists, 400 applicants): https://www.sxsw.com/news/2017/2017-sxsw-accelerator-winners-pioneering-solutions-to-tomorrows-problems/ - RSA Innovation Sandbox Unanimous 2017 Winner (#1 in 50): https://www.rsaconference.com/press/73 - TechCrunch Disrupt SF Battlefield Runner-Up (#2 in 1000): https://blog.unify.id/2016/09/19/unifyid-disrupts-disrupt/ - Stanford StartX S15 startup: http://startx.com/companies For more: https://unify.id/press.html We're hiring! https://unify.id/careers.html
Deep Sentinel is the only security system that delivers the experience of a personal guard at every customer's property. Deep Sentinel's 24/7 guards review and respond to alerts from cameras positioned around the perimeter of customer's properties. This ensures that any suspicious activity is identified within seconds and crime can be stopped before a potential burglar even gets a chance to enter. The product uses deep learning with wireless security cameras to enable live guards to intervene within seconds of a perimeter breach and before the criminal enters the property -- at this price point, everyone can now access the protection of private security guards. The product is $699 for the 3-camera starter kit, including a smart hub, an extra battery and all the hardware needed to get set up. Security guards are on-duty 24/7 and customer service is available 8:30AM-5:00PM Pacific 7 days a week, and after-hours by appointment.
We believe cyber risk management has evolved from an IT problem into a business problem. Because of this shift, security executives must adapt how they communicate risk to the board. But since risk is hard to frame in the context of a business initiative, security executives need help putting risk into business terms that the board can use to make informed, strategic decisions to drive growth. Additionally, security teams are often seen as the team that says “no”, shutting down projects and initiatives due to risk, which limits growth and results in missed opportunities. At ZenGRC, we aim to make risk management more strategic, pulling it up from tactical “check-the-box” work to something more valuable to both the company and the security team. There’s an opportunity for security executives to go beyond just protecting their company and secure their role as a more valuable, strategic member of the team. We can help by giving them the business context they need to report risk to their board in a way that is easy to understand and act upon