Top Tech Companies (64)
Crypto-based PKI authentication and communication supporting IPv4/IPv6 dual-stack and leveraging market drivers such as IoT and 5G at scale using IRP (Identity Registration Protocol) - IANA allocated port 4604. Crypto-based PKI authentication and and extending out to IPv6 and ultimately taking advantage of market drivers such as IoT and 5G to allow deployment at scale. - SixMail - Windows/Mac/iOS/Android S/Mime...
At Polaris, we believe that cybersecurity and securing your business’ web presence should be cost efficient, effective, and effortless. Operating on advanced machine learning algorithms, Polaris automates web application protection in identifying malicious attacks before they gain access to your network. With our uniquely tailored profiling function, Polaris reduces false positives with exceptional threat detection accuracy. Highly customizable. Cloud or...
ITSEC is a leading APAC cybersecurity company, listed on the Indonesian stock exchange (IDX), with over 270 employees in five countries. We deliver end-to-end cybersecurity services and solutions, including Consulting Services, Security Solutions Integration and Managed Security Services. ITSEC provides continuous IT infrastructure protection against multiplying cybersecurity threats, and compliance with increasingly demanding data protection and critical infrastructure regulations. Our expertise...
UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to operation. With deep domain expertise and a future-proof philosophy, UST embeds...
Where do we stand in the whole ecosystem of Web3? We are at the epicenter of Web3’s security threats. At QuillAudits, we believe that the primary barrier to a decentralized and community-owned internet is the security of Web3 protocols. Year by year, we witness a significant volume of funds being stolen from various Web3 platforms. With a vision and mission to create a secure...
Your Cost-effective, Cross-continental, Digital Innovation Partner. With over 15 years of experience in software development, we plan and build new applications that are meant to succeed. Scopic goes beyond the realms of desktop, web, and mobile app development. With over 1000+ successful projects delivered to worldwide clients, we take pride in being a one-stop shop for industry innovation Our core services include: Web, Mobile,...
Cyberteq is an innovative Information and Communication Technology Consulting Company. In the era of digitalization, Cyberteq enables its customers to take full advantage of the latest technologies in a secure manner. Cyberteq is a team of highly dedicated cyber security specialists. As information security veterans, we secure customers in different markets: Governments, Banks and Financial Institution, Telecom Operators, Services Providers,...
Established in 2008 by Cyber Security veterans, we are the Industry Leader in Cyber Security services and solutions. We are certified to ISO/IEC 27001:2013 and are CREST accredited for the provision of penetration testing services. At Firmus, our mission is to build a secured business environment for our clients. Through our integrated team of domain experts in Assessment, Assurance, Operational Technology,...
Headquartered in Boston with offices and 1000 employees around the world, Recorded Future works with over 1,800 businesses and government organizations across more than 75 countries to provide real-time, unbiased and actionable intelligence. Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the internet across the open...
We are building SolidityScan.com, a cloud-based smart contract security scanner that provides audit reports with a click of a button.
Welcome to our LinkedIn, where we specialise in modernising workplaces, strengthening infrastructures, securing digital endpoints, and leveraging data & AI for business integration. Our commitment is to foster environments where collaboration excels, powered by secure, efficient technologies. Cybersecurity for Infrastructure & Endpoints: Our cybersecurity strategy is twofold, protecting the heart of your digital operations and the frontlines—endpoints. We deploy advanced solutions...
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of disruptive cloud-based security, compliance and IT solutions with more than 10,000 subscription customers worldwide, including a majority of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and automate their security and compliance solutions onto a single platform for greater agility, better business outcomes, and substantial cost...
The mission of the Shentu Chain is to empower people to trust in the blockchain. By utilizing cutting-edge technologies and techniques to prove trustworthiness in the underlying systems, the Shentu Chain aims to raise the standards of security and trustworthiness in the blockchain
CyWreck is a leading cybersecurity company committed to fortifying the digital landscapes of businesses across the globe. With a passion for staying ahead of cyber threats, we've developed comprehensive cybersecurity solutions that provide all-rounded protection for your valuable assets. WreckBot, our cutting-edge AI product designed to revolutionize the way businesses approach cybersecurity. WreckBot is not just a tool; it's your...
At Horangi, we’re passionate about building a safer cyberspace and creating software that solves challenging cybersecurity problems. Horangi focuses on building partnerships with our customers, developing an understanding of their business goals and building a security strategy that helps achieve their objectives. Horangi’s personnel have an extensive engineering experience and strong background in penetration testing, incident response and strategic consulting...
Amber Group is a global leading digital asset company providing crypto financial services to both institutional and high-net-worth investors globally. We offer best-in-class liquidity solutions and cutting-edge trading infrastructure across major exchanges, applications, and networks. With over $1 trillion in cumulative trading volume, our deep liquidity helps power the digital asset ecosystem. Beyond trading, our full-suite of offerings includes wealth...
McDonald’s is the world’s leading global foodservice retailer with over 38,000 locations in over 100 countries. We feed 68 million people every day and, along with our franchisees, employ 1.9 million people worldwide. We're a household name across the globe, and we’re in the midst of a tech revolution in our business, doubling down on tech and creating a tech...
A deeptech, cybersecurity company, MicroSec is solving the intrinsic challenges in securing IoT devices, and is the first in the world to achieve Security-by-Design for constrained IoT devices. A global market leader in IoT security for OT environments, MicroSec prevents and stops Zero-Day attacks starting from the Edge. MicroSec's industry expertise includes critical infrastructure, utilities, industry 4.0, smart cities, and...
Enea is a world-leading specialist in software for telecom and cybersecurity. The company’s cloud-native solutions connect, optimize, and secure services for mobile subscribers, enterprises, and the Internet of Things. More than 100 communication service providers and 4.5 billion people rely on Enea technologies every day. Enea has strengthened its product portfolio and global market position by integrating a number of...
Silence Laboratories is a cybersecurity company that focuses on the fusion of cryptography, sensing, and design to support seamless authentication experience. We have built a unique decentralized MFA (Multi-Factor Authentication) framework and MPC-based threshold signature implementation for solving fundamental authentication and account recovery pains faced by our B2B customers. Our libraries are heavily based on a proof-based ecosystem. Our company...













.png)














