Explore Top Tech Companies
All Filters
Location

Remote jobs

Industry

DEI

Tech Stack

Perks

Size

Top Tech Companies (1,515)

Don't see your company?

Create a company profile
Security
Culver City, California, USA
18 Employees

The creators of EVC® Dynamic Security Code, the future of smartcards.


Cloud • Security
Stow, Ohio, USA
35 Employees

We are passionate about helping small and medium businesses control their technology so they can control their business. Since 1998, we’ve been providing leading-edge IT support to Northeast Ohio. We are proud to develop strategic partnerships with our clients and take care of all of their IT needs from help desk support to cybersecurity. Beyond our service offerings, we make it our responsibility to educate our clients and community on the latest in technology. We continue to stay rooted in our Service Values. These standards are a part of our daily culture and are used not only in our day-to-day activities but as a tool in our hiring process. They have become a grounding and an integral part of our culture and we will continue to build on them. AtNetPlus is proud to partner with our clients and communities and to serve in Northeast Ohio. AtNetPlus – we keep your technology connected, secure, and working.


Security
Oklahoma City, Oklahoma, USA
38 Employees

RFIP is a provider of outdoor wireless technology and enterprise security services.


Hardware • Security
Las Vegas, Nevada, USA
64 Employees

Wrap Technologies is develops security products for law enforcement and security personnel.


Security
Charlotte, North Carolina, USA
14 Employees

Brings cloud-based, enterprise-level security technology to small businesses at an affordable price.


Information Technology • Security
Indianapolis, Indiana, USA

Advanced Technology Center provides IT support and managed services.


Security
Los Angeles, California, USA

Before hiring the services of Los Angeles security guard companies, think about what you need. It's important to find out if the employers only hire people who are in good physical shape. What's the point of having security guards if they can't respond to emergencies quickly? Another certification that you should look for is first aid and CPR certification, which are both important. There are some security services that don't require this, but it is always a good skill to have and shows that you are working with a good company. Maybe the most important thing to look for in a security guard service is whether or not they are allowed to have guns or Tasers. American Global Security has developed a security guard service that we refer to as the Leading Expert. This team of guards and security professionals has an appropriate balance of more than 20 years in professional security, with decades of expertise between its members. Our clients may be certain that we are sufficiently prepared and skilled to manage even the most complex situations.


Information Technology • Security
Washington, District of Columbia, USA
99 Employees

Obsidian Global provides information technology & services, cybersecurity and DevOps solutions.


Hardware • Security • Software • Cybersecurity
Annapolis, Maryland, USA
59 Employees

At SIXGEN, we’ve cracked the code on meaningful and innovative ways to support the cyber mission. Our workforce provides incident response, operational and penetration testing, red teaming, tool development, cyber training development and continuous monitoring. Our on-site and remote assessments are used to identify vulnerabilities within the most critical networks. We lead cybersecurity innovation in product development by designing and evolving highly specialized hardware and software focused on Endpoint Detection and Response, Red Team, Data Science, and Threat Intelligence missions. We take pride in our work and the resulting enhanced cybersecurity posture for our customers around the globe.


Hardware • Security • Software
Jacksonville, Florida, USA
70 Employees

Duos Technologies provides intelligent video surveillance software featuring video analytics, as well as physical security information

BAE Systems, Inc. Thumbnail
Aerospace • Hardware • Information Technology • Security • Software • Cybersecurity • Defense
17 Offices
40000 Employees
LogicManager Thumbnail
Cloud • eCommerce • Security • Software • Cybersecurity
Fully Remote, USA
86 Employees
Hiro Systems Thumbnail
Blockchain • Fintech • Security • Software • Cryptocurrency • Cybersecurity • Web3
Fully Remote, USA
40 Employees
Brinqa Thumbnail
Cloud • Security • Software • Cybersecurity
Austin, Texas, USA
90 Employees
JumpCloud Thumbnail
Cloud • Information Technology • Security • Software
8 Offices
800 Employees
LogicGate Thumbnail
Cloud • Information Technology • Security • Software
2 Offices
230 Employees
Imprivata Thumbnail
Healthtech • Security • Software • Cybersecurity
6 Offices
957 Employees
Atlassian Thumbnail
Cloud • Information Technology • Productivity • Security • Software • App development • Automation
12 Offices
11000 Employees
Hiya Inc. Thumbnail
Artificial Intelligence • Cloud • Mobile • Security • Software
3 Offices
145 Employees

Big Data • Cloud • Information Technology • Security • Cybersecurity
Kansas City, Missouri, USA
211 Employees

Fishtech is a data-driven cybersecurity solutions provider for any computing platform. We identify gaps and solutions to help organizations minimize risk, maintain compliance, and increase efficiency. Fishtech Group includes the Security-as-a-Service operation CYDERES and the security analytics firm Haystax of McLean, VA. Our venture partners are Perch Security of Tampa, FL, and Foresite of Overland Park, KS.


Information Technology • Security • Database • Consulting
Alpharetta, Georgia, USA
85 Employees

Georgia IT, Inc. provides IT Consulting for a wide range of IT services and custom build turn-key enterprise solutions. GIT specializes in improving business scalability and efficiency through BSM and SBA Solutions. GIT transforms business with service management and service automation solutions. We are BMC & HP partners. GIT Services include custom built enterprise software and customer-centric web portals, network design and implementation, remote and site-to-site VPN, network and server security assessment and setup, server and desktop virtualization, and many others. GIT also provides IT Consulting in many areas such as Disaster Recovery Planning, Enterprise Data Backup Strategy, Long Term Strategic IT Planning and Augmentation Professional Services Solutions.


Security • Software
Palo Alto, California, USA
30 Employees

Deepfence is a security observability platform for cloud and container native environments. With both open source and enterprise solutions, Deepfence empowers all security teams to reduce the risk posed by vulnerable components that were missed by “shift left” processes, introduced through third-party and infrastructure code, or discovered from zero-day vulnerabilities. By evaluating vulnerabilities against the attack surface and highlighting those that pose the greatest risk of exploit right now, security teams receive actionable, prioritized information on what to fix first. Deepfence is also able to contextualize the data it collects to identify subtle indicators of attack and compromise for even deeper security.


Security
Lewes, Delaware, USA
89 Employees

Intelligence and Technology that enables proactive security teams with industry leading Adversary, Malware and Vulnerability Intelligence


Security • Software • Design
Los Angeles, California, USA
13 Employees

HackEDU’s spring 2022 acquisition of Security Journey brings together two powerful platforms to provide application security education for developers and the entire SDLC team. The two officially became one in August 2022 and are now Security Journey. Two platforms, one path to build a security-first development culture.


Security
4 Offices
3,833 Employees

We provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, and social media.


Security • Software
Philadelphia, Pennsylvania, USA
24 Employees

Connectify creates easy to use networking software to let users get faster Internet and share it with friends and co-workers.


Information Technology • Security • Software
Scottdale, Georgia, USA
11 Employees

Our vision is to help 1 billion people protect their privacy and data with a VPN by 2025. Everyone accessing the internet today needs a VPN to do so safely. Hackers are everywhere, especially at places where we access WiFi. Without a VPN your emails, documents, passwords and credit cards and no secure. Connecting to a fake WiFi might mean hand delivering a hacker all of this. Your work email, your personal email, your Facebook account, all hacked in the time it takes to drink a cup of coffee. With VPN.com we have one of the best domain names on the internet and since we are modeled after Hotels.com, our platform provides information and research to help readers find the best VPN that matches their needs and budget. If you need a VPN, or want to learn more please head over to VPN.com. After all, what better place to buy a VPN than VPN.com!


Big Data • Cloud • Information Technology • Security • Software
2 Offices
500 Employees

Advanced managed detection and response to secure the distributed enterprise Managed Detection & Response Our Managed Detection and Response (MDR) Services provide 24/7/365 threat monitoring, alerting, validation and proactive threat hunting. We provide comprehensive management of a suite of best-in-class security technologies and tightly integrate those with our innovative cloud SecOps platform and Deepwatch IP and applications to deliver unparalleled outcomes. The result is that we only alert you to the most sophisticated security incidents. Merging our SecOps platform with relentless customer service, we’re redefining the way managed security services are delivered. Our Approach Deepwatch MDR cyber security delivers an innovative, white glove solution for maintaining an updated view of information security risks across your organization. We provide senior leaders, IT and security personnel with around-the-clock monitoring of your organization’s assets using event monitoring of logs, automated mapping of use case data (SOAR), automated response and human contextual analysis, incident alerting and response, incident case management and threat hunting. What’s more, we assign a named Deepwatch team of experts to each customer — known as our Squad Model. This model ensures continuity in context, providing seamless coverage of all aspects of monitoring our customers’ security operations. Customers build strong relationships with our team, and know who to call for support, collaboration, and to resolve issues. As a result, we are hyper responsive and we partner closely with you to continually enhance your security posture and network defenses. Endpoint Detection and Response Management Complete solution for your security operations from endpoints to SIEM Unified visibility, detection, and remediation of threats with best-in-class endpoint detection and response (EDR) technologies integrated with one cybersecurity platform. Vulnerability Management Your business is only as strong as your security posture. Our continuous Vulnerability Management Services serve as a baseline for us to collaborate to discover the critical assets, threats and vulnerabilities relevant to your organization. Deepwatch provides the people, process and technologies to fully or partially administer vulnerability management programs that fit your unique needs and requirements.


Blockchain • Fitness • Security
San Francisco, California, USA
33 Employees

As leaders in the decentralized identity space, Civic is focused on real-world applications of its blockchain-powered technology. The company offers flexible identity verification technology for businesses and uses digital identity as a gateway for decentralized finance on the Solana blockchain. Civic uses identity.com’s open-source, blockchain-based ecosystem to verify credentials.