company? Let’s change
that.
Don't see your company?
Create a company profileOnapsis protects the mission-critical applications that run the global economy, from the core to the cloud. The Onapsis Platform uniquely delivers actionable insight, secure change, automated governance and continuous monitoring for critical systems—ERP, CRM, PLM, HCM, SCM and BI applications—from leading vendors such as SAP, Oracle, Salesforce and others. Onapsis is headquartered in Boston, MA, with offices in Heidelberg, Germany and Buenos Aires, Argentina. We proudly serve more than 300 of the world’s leading brands, including 20% of the Fortune 100, 6 of the top 10 automotive companies, 5 of the top 10 chemical companies, 4 of the top 10 technology companies and 3 of the top 10 oil and gas companies. The Onapsis Platform is powered by the Onapsis Research Labs, the team responsible for the discovery and mitigation of more than 800 zero-day vulnerabilities in mission-critical applications. The reach of our threat research and platform is broadened through leading consulting and audit firms such as Accenture, Deloitte, IBM, PwC and Verizon—making Onapsis solutions the de-facto standard in helping organizations protect their cloud, hybrid and on-premises mission-critical information and processes.
Belay Technologies, Inc. is a certified Service Disabled Veteran Owned Small Business (SDVOSB) located in the Baltimore-Washington area providing technology and engineering services to the Department of Defense (DoD) and expanding into the commercial market. Belay Technologies specializes in technical IT services including; software development, virtualization, systems administration, networking, and testing. Belay continues to expand, and we are always seeking top talent. Belay is more than just a company.....It's a culture. With our work hard, play hard edge and a family-like feel, our employees feel at home with Belay. We are a laid back, fun, innovative team that gets together monthly for lunches, enjoys company parties, bbq's and fun adventures together, and joins in volunteer and charity events as a socially aware company.
SpecterOps provides adversary-focused cybersecurity solutions to help organizations understand how threat actors maneuver against them, so they can successfully defend against advanced attacks. SpecterOps replicates adversary tradecraft, hardens systems against the attack cycle, and helps detect current advanced threat actor activity. Service offerings include internal program development, training courses, independent assessment options, and assessment operations support. With knowledge of the adversary, organizations are empowered to successfully prevent against devastating breaches. Contact us at [email protected].
Tenable®, Inc. is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 30 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.
Defendify is the leading all-in-one SaaS cybersecurity platform for organizations without security teams, including IT providers.
Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with other members of similar interests. It contains several challenges that are constantly updated. Some of them simulating real world scenarios and some of them leaning more towards a CTF style of challenge. As an individual, you can complete a simple challenge to prove your skills and then create an account, allowing you to connect to our private network (HTB Net) where several machines await for you to hack them. By hacking machines you get points that help you advance in the rankings.
Command Investigations, LLC is the preferred provider of Surveillance, SIU and Anti-Fraud Programming provided to P&C Carriers, Self-Insured Entities and Third-Party Administrators. Command is not a traditional vendor…but rather a strategic resource and committed investigative partner. We have successfully blended the most sophisticated technology platforms with the finest staff to create a unique combination that leverages man, woman and machine.
KINETIC creates wearable technology for the connected workforce. KINETIC's smart wearable, REFLEX, reduces the incidence of workplace injuries. REFLEX automatically detects unsafe postures and provides workers with feedback whenever a high-risk motion occurs. Over time, workers can use REFLEX to improve their biomechanics, resulting in fewer injuries and improved well-being. Safety managers can view risk data in the KINETIC dashboard, which can be used to make targeted changes to workplace processes that can help to reduce injury risk further.
In a world of stolen identities and compromised user credentials, Token is changing the way our customers secure their organizations by providing passwordless, biometric, multifactor authentication. We deliver the next generation of security that is invulnerable to social engineering, malware, and tampering for organizations where breaches, data loss, and ransomware must be prevented
SentinelOne is defining the future of cybersecurity through our XDR platform that automatically prevents, detects, and responds to threats in real-time. Singularity XDR ingests data and leverages our patented AI models to deliver autonomous protection. With SentinelOne, organizations gain full transparency into everything happening across the network at machine speed – to defeat every attack, at every stage of the threat lifecycle. We are a values-driven team where names are known, results are rewarded, and friendships are formed. Trust, accountability, relentlessness, ingenuity, and OneSentinel define the pillars of our collaborative and unified global culture. We're looking for people that will drive team success and collaboration across SentinelOne. If you’re enthusiastic about innovative approaches to problem-solving, we would love to speak with you about joining our team!
Stytch is the most powerful identity platform built for developers. By powerful, we mean: **Comprehensive:** Stytch has everything you need to identify, authenticate, and manage your users, including fraud prevention tools like device fingerprinting. **Adaptable:** Stytch is the only auth provider that enables you to build directly with our APIs or our suite of SDKs, so you can deliver the ideal experience to your users – whatever your architecture. **Ready to scale:** With a wide array of auth methods and sophisticated architecture underpinning our infrastructure, Stytch’s infrastructure is built to grow with you as your use cases expand and your needs become bigger and more complex. Whatever your tech stack, whatever your use case, we have the infrastructure and features you need to secure and scale your application. At Stytch, we believe our ultimate success will be determined by two factors: - Building a product that delights both customers and end users - Creating a work environment where everyone thrives These two cannot exist without the other — without a great culture, we won't be able to deliver a great product over the long run; similarly, having a great culture will be fleeting if we don't deliver a product that developers and users love.
An industry leader in managed security solutions and services since 1981, Datawatch Systems is trusted by building owners, property managers, and tenants across the U.S. to help protect their most valuable assets – property, employees, residents, and visitors – by remotely monitoring nearly 200,000 doors using nearly 3,000,000 credentials. Clients rely on Datawatch Systems’ portfolio of customized and integrated access control and emergency management products and services to help provide 24x7x365 peace of mind.
CYDERES is a human-led, machine driven security operations automation security-as-a-service solution for Managed Detection & Response.
Security guard services in Nashville, TN
Easterling Technologies aims at data backup, web development, server management, IT infrastructure, assessment and security services.
Since 1988, PSI teams have provided our government customers with innovative, cost effective solutions that solve today’s complex challenges, improve operational efficiencies, and meet challenges to our national security. PSI provides expertise across a broad spectrum of capabilities ranging from Cyber Security to Cloud Migration, Systems Engineering, Augmented/Mixed Reality, and DevSecOps. Mission: To provide value-added information technology and management consulting services and solutions while consistently delivering success to our customers. Vision: To be recognized as a world-class provider of innovative solutions that benefit our customers through a relentless commitment to our core values of people, service, and integrity. People – We operate in a climate of trust, respect, empowerment, teamwork and cooperation. Service – We conduct ourselves with unfailing commitment to our customers' success. Integrity – We are honest, open, and ethical in everything we do.
Circulate helps web, app & SDK publishers monetize their first-party data, on a privacy friendly basis.
Cozaint specializes in smart technology solutions for security, surveillance, monitoring and forensic analysis.
RiskAnalytics is an innovative cyber security company founded in 2002. Today, we serve thousands of customers worldwide.
Bluefire Security Technologies creates firewall technology for hand-held devices.