Explore Top Tech Companies
All Filters
Location

Office Type

Industry

Size

Open Jobs

Remote Jobs

Perks

DEI

Tech Stack

Top Tech Companies (875)

Software • Cybersecurity
2 Offices
422 Employees

Data Security Designed for the Data-driven Enterprise Awards and accolades: 2024 Globee Disriptors 2023 Data Security Platform of the Year - Data Breakthrough Awards 2023 Cloud Data Security Product of the year - Cloud Computing Magazine Cyera at a glance: Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management (DSPM), Cyera instantly provides companies visibility over all of their sensitive data, context over the risk it represents & their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data. How Cyera is different: Cyera takes a data-centric approach to security, assessing the exposure to your sensitive data, everywhere. Our DataGraph automatically and continuously learns from your environment, assessing your threat surface, data access, and security controls across multiple dimensions of risk. Because Cyera applies deep data context holistically across your data landscape, we are the only solution that can empower security teams to know where their data is, what exposes it to risk, and take immediate action to remediate exposures and assure compliance without disrupting the business. Why your business needs Cyera: Mass migration to multi-cloud and work from anywhere has broken traditional security. It has never been easier for siloed projects, rapid dev cycles, or human error to result in a data breach or ransomware attack. Cyera dynamically develops deep context about the sensitive data across your hybrid cloud landscape, assessing your threat surface, data access, and security controls and quickly remediating exposures to your most valuable & vulnerable data. Case Studies: Healthcare - https://www.cyera.io/use-case/healthcare Finance - https://www.cyera.io/use-case/finance Tech - https://www.cyera.io/use-case/technology


Information Technology • Security • Software • Cybersecurity
Boston, Massachusetts, USA
62 Employees

We are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers that since 2014 share the same dream: make technology a safer place. Every day, we work side by side with our customers to help them safely navigate digital opportunities, while growing their business. And we do it with passion, determination, and constant curiosity about the unexpected. Our purpose is to make people’s life easier and free from the threats hidden in the digital ecosystem. That’s why we designed a real-time technology that enables fraud management teams in financial institutions to detect and prevent financial fraud across all digital channels, while ensuring a safe and seamless experience for the end-users. Recognized as a market leader by industry analysts, today we protect over 60M+ users of top-tier retail and corporate banks against financial online fraud


Cannabis • Mobile • Cybersecurity
Summit, New Jersey, USA
39 Employees

ETF Managers Group (ETFMG) is a thematic ETF issuer founded in 2014 with a vision of developing innovative thematic exchange-traded funds (ETFs) that provide investors unique exposure to new markets. To date, 80% of our ETFs are first-to-market products that include direct access to industries such as cannabis, cybersecurity and mobile payments. We turn portfolio management strategies into successful ETFs by partnering with market segment experts bringing long-term growth opportunities to investors. Fund prospectuses/risk disclosures: www.etfmg.com. Distributed by ETFMG Financial.


Cybersecurity
San Francisco, California, USA
50 Employees

Elevate Security was founded in 2017 by two former Salesforce security executives to address one of the most challenging aspects of building an enterprise security program: getting ahead of breaches before they happen. Our solutions help enterprise security leaders gain deep visibility into their biggest organizational risks to prevent ransomware, account takeover, and data loss. Elevate Security enables CISOs to transform beyond managing incidents to proactively addressing these risks with automated playbooks to get in front of the next breach. Elevate Security’s cloud-based platform integrates with leading security technologies to identify users most likely to cause a breach and automatically orchestrate additional security to minimize the likelihood of an incident. Elevate Security is trusted by leading enterprises in industries such as financial services, technology, healthcare, and more who rely on our proactive solution to strengthen their organizational security posture. For more information, visit: https://elevatesecurity.com/


Healthtech • Cybersecurity
Charlotte, North Carolina, USA

Founded in 2013, Aspida recognized a need for affordable, easy to use and compliant technology solutions for businesses to meet healthcare regulations. Their first offering, Aspida Mail, has proven to be one of the easiest and safest HIPAA Compliant encrypted email solutions in the industry. Following Aspida Mail, the company released additional solutions including Aspida Wall, a Managed Network Firewall, and Aspida Recovery, a Data Backup & Recovery solution. Aspida works closely with internal developers and select partners to offer high quality solutions.


Cloud • Information Technology • Software • Cybersecurity
2 Offices
33 Employees

Abusix offers email and network security solutions for ISPs, Telcos as well as Cloud & Hosting providers to stop the rapidly growing problem of email-borne threats and other kinds of network abuse. Check out our products and services at https://www.abusix.com/. Any more questions? Send us an email at [email protected].


Artificial Intelligence • Cybersecurity
New York, New York, USA
279 Employees

CHEQ is the global leader in Go-to-Market Security, trusted by over 15,000 customers worldwide to protect their marketing, revenue and data operations. With CHEQ, organizations can secure their entire Go-to-Market effort, eliminating bots, fake users, client-side threats, cyber attacks, data contamination and compliance risk. We are proud to be Great Place to Work certified.


Information Technology • Consulting • Cybersecurity
Fort Worth, Texas, USA
14 Employees

Since 2016, Hotman Group has worked with hundreds of business leaders to help them feel more confident in their cybersecurity programs. We take the build - implement - run approach to ensure each client is fully equipped to do the right thing when it comes to cybersecurity. First, we start with an assessment to determine where you are based on a benchmark within a security compliance framework like SOC 2, NIST CSF, and others. Then, we strategically prioritize your action items based on the risks to your business. Lastly, we help you set the bar based on the objective you'd like to reach.From a self-governed discipline to an all-inclusive cybersecurity program to the strictest audits, we help you handle it all. Most companies look at their cybersecurity piecemeal, inadvertently putting themselves at risk. With Hotman Group, we approach cybersecurity strategically, with a plan so you can be fully protected. Specialities: vCISO/ Fractional CISO, Cybersecurity, Risk Assessment, Gap Assessment, Maturity, Assessment, SOC 2, HITRUST, HIPAA, NIST CSF, NIST 800-53, ISO 27001, FFIEC, SOC 2 Readiness, Remediation, Auditor Support, Regulator Support, SOC 2 Audit, Data Protection (PHI, PII, PI), Risk Management (ERM), Privacy (GDPR, CCPA, SOC 2), GRC, Third Party Risk Management (TPRM), Supply Chain Risk, Vendor Risk, Business Continuity, Disaster Recovery, Business Impact Analysis (BIA), Metrics, Breach Support, Incident Response (IR), Tabletops


Big Data • Professional Services • Analytics • Business Intelligence • Consulting • Cybersecurity • Data Privacy
4 Offices
2 Employees

Reveille Advisors is a collection of senior-level private investigators, data analysts, and PR consultants. We are experts at exploiting the internet, public domain, digital media, human sources, and data for our clients and their objectives. Common tasks include corporate intelligence services, physical penetration tests, opposition research, finding the homeless and missing persons, and helping clients with online privacy and security. Contact us today!


Cybersecurity
Reston, Virginia, USA
25 Employees

Veros Technologies is an innovative small business based in Northern Virginia, focused on providing premier technical consulting services to private and public sector clients. Established in 2013, our principal offerings are in the domains of cyber security, systems and network engineering, and technical operations consulting. Driven by technical excellence and uncompromising principles, Veros Technologies’ mission is to solve our clients’ toughest technical challenges while being set apart in our actions. A key element that separates us is our dedication to giving back; by partnering with and serving strategic organizations, Veros aims to make a lasting impact in our communities, nation, and abroad.


Cloud • Information Technology • Productivity • Professional Services • Security • Cybersecurity • Infrastructure as a Service (IaaS)
3 Offices
95 Employees

We are a full service technology company providing customized solutions for cloud telephones, voice over IP (VoIP), managed IT services, video conferencing, cyber security, data backup, security cameras, access control, fiber internet services, and more. In-Telecom goes beyond being an ordinary IT provider; we are your dedicated technology partner committed to your company’s objectives and expansion. Positioned at the forefront of emerging technology trends, we possess expertise in technology integration, support, and development. What sets us apart is our knowledge and skills that surpass other MSPs and our distinctive story, process, and exceptional team. We’re motivated by the mindset that we must achieve our personal, company, and partner goals. We call it the 3 W’s. When our clients win, our company wins, and our community wins. Creating the In-Telecom Experience and lasting partnerships requires a proven process for ensuring client success. We’ve developed The ITC Way to ensure the best experience for all of our partners from discovery to impllementation and beyond.


Cybersecurity
Austin, Texas, USA
47 Employees

Sevco Security is a company of cyber experts building services and products for cyber experts. Designing solutions to solve hard problem(s) associated with quickly discovering the context for who, what, where, why and how network connected devices relate on your network.


Cloud • Security • Cybersecurity
Mountain View, California, USA
312 Employees

Menlo Security enables organizations to outsmart threats, completely eliminating attacks and fully protecting productivity with a one-of-a-kind, isolation-powered cloud security platform. It’s the only solution to deliver on the promise of cloud security—by providing the most secure Zero Trust approach to preventing malicious attacks; by making security invisible to end users while they work online; and by removing the operational burden for security teams. Now organizations can offer a safe online experience, empowering users to work without worry while they keep the business moving forward.


Cloud • Information Technology • Software • Consulting • Cybersecurity
Chino, California, USA

We are a global technology company that is committed to helping people and businesses all over the world harness the power of technology and help traverse its capabilities. With the help of rapid innovation, we mold services and solutions to your needs. We believe that everyone should have the option to integrate technology into their business for the better. Technology is and will be the main factor to paving the road to a diverse set of opportunities for businesses to explore. We provide a wide array of technology related services and solutions handled and worked on by our top notch team consisting of experienced, talented and skillful resources, positioned all over the world to conduct operations with ease. #FOCUS: 1) Customers' success 2) Efficiency with measurable returns 3) QTV (Quality, Timely and Value-based engagement). #EXPERTISE: with Enterprise tech stack, Custom / Product Development, Mobile, Web, Cloud, Analytics with solutions [CRM/ CPQ, Sales, Services, Manufacturing, Nonprofit/ NPSP, FSC, FSL, ERP/ SD, MM, SCM, ITSM, FS/ Lending]. and more. #SOLUTIONS: CRM [Salesforce/ Platform, Sales Cloud, CPQ, Service Cloud, FSL, Marketing Cloud, Pardot, Manufacturing Cloud, FS, FF, MS Dynamics 365, MS Dynamics Customer Engagement, MS Dynamics BC/ F&O, MS Dynamics Power Platform, MS Power BI, MS Dynamics Power Apps, Heroku, Siebel, Zoho, Hubspot] Integration [Mulesoft, Boomi] DB [Oracle, MySQL, NoSQL] ERP [SAP C4C, Netsuite, ERPNext, Concur] and more. #AUTOMATION: Sales Ops, Service and Support Ops, Marketing Ops, Collaboration, Inventory / Supply Chain Ops, Logistics Ops, Sales & Distribution Ops, eCommerce Ops, Healthcare Ops, Finance Ops, Enterprise Ops. Your Technology Partner


Aerospace • Information Technology • Cybersecurity
Fully Remote, USA
21 Employees

Founded in 1999, Topia Technology spent the last decade securely moving and managing data in complex distributed environments for programs with the US Army, FAA, Air Force and TSA. Each of these customers required security coupled with strict performance metrics—challenges met by Topia’s innovative solutions and seasoned engineering team. With a growing focus on data breaches in and around the enterprise and the need to ensure best-in-class levels of data security in highly regulated industries, Topia introduces its military-grade security platform, Secrata, to offer unmatched security, flexibility and performance for the enterprise. Secrata is an innovative patented technology that shreds and encrypts data end-to-end to harden security for cloud, mobile and Big Data. Secrata is the only triple-layer enterprise security platform providing encryption and separation end-to-end, and protects against brute force attacks and more innovative security threats. The solution ensures a new level of security, privacy and compliance for all enterprise data regardless of where it is stored or how it is accessed. Blockchain Powered Security. http://www.topiatechnology.com/


Cybersecurity
Allen, Texas, USA
5 Employees

CyAlly is a Global Cyber Solutions, Intelligence and Forensic Advisory organization. Our seasoned staff supports, Cyber Hardening, Cyber Audit, and Advisory Practices to help industry leaders. Headquartered in Texas, CyAlly’s team support companies that include Fortune 500 companies, cyber insurance firms, law firms, and financial institutions to mitigate risk and uncover mission-critical information in a customized and cost-effective manner.


Information Technology • Cybersecurity
Rohnert Park, California, USA
17 Employees

Red Condor is revolutionizing spam fighting technology. Red Condor’s highly accurate Email DNA™ filter, hybrid architecture Vx Technology™, and fully managed appliances lead to a dramatic reduction in the cost of owning a premium spam filter. With solutions for small business, as well as solution providers with millions of email inboxes, Red Condor has a cost effective, time saving solution that is rapidly gaining market share. The system’s design has built-in zero tolerance for lost email, and a near zero false-positive rate while achieving long-term spam block rates greater than 99%. This next generation technology is backed by a 24x7 customer care center staffed by email security experts at Red Condor’s headquarters.


Information Technology • Cybersecurity
Pittsford, New York, USA
71 Employees

IGI Cybersecurity solves cybersecurity challenges with a people-first approach, creating personalized cyber defense with individualized business strategy, enterprise-wide expertise and unshakeable partnership. From incident remediation to our virtual CISO program, our people-driven cybersecurity bridges the gaps most providers can’t cover, solving cybersecurity with the human touch. IGI Cybersecurity. The cybersecurity people.


Information Technology • Cybersecurity
Emeryville, California, USA
43 Employees

LOCH is a global leader of next-generation wireless threat monitoring. The company provides actionable intelligence on all 5G cellular and wireless IoT devices to help organizations improve their security posture, reduce risk, and manage wireless data usage across the enterprise. Every wireless device needs to be visible and secure, regardless of what type of device it is, what protocol it uses, and who owns it. This guides everything we do and why LOCH aims to secure and enable the new world of wireless innovation that will drive the next generation of digital transformation. Find out more at www.LOCH.io.


Professional Services • Security • Cybersecurity
Falls Church, Virginia, USA
90 Employees

XOR Security is a professional services firm specializing in helping departments & agencies and commercial organizations understanding the complexity of cyber threat. From enterprise strategy and cyber threat analysis to incident response, XOR security takes innovative approaches to solving information security needs. We pair our understanding of emerging technologies and proven systems engineering and integration practice to overcome the hard to solve problems.