Cofense tech stack

Optimize, Google Tag Manager, Selenium, Amazon EC2, and Google Cloud Platform are some of the popular tools that Cofense uses.

Analytics

Cofense is using the following analytics tools and software.

Application Hosting

Cofense is using the following application hosting tools and software.

Application Utilities

Cofense is using the following application tools and software.

Assets and Media

Cofense is using the following media tools and software.

Back Office

Cofense is using the following administrative tools and software.

Collaboration

Cofense is using the following collaboration tools and software.

Communications

Cofense is using the following communication tools and software.

Data Stores

Cofense is using the following data storage tools and software.

Design

Cofense is using the following design tools and software.

Development

Cofense is using the following development tools and software.

Languages & Frameworks

Cofense is using the following programming tools and software.

Libraries

Cofense is using the following programming tools and software.

Marketing and Sales Tools

Cofense is using the following marketing and sales tools and software.

Monitoring

Cofense is using the following monitoring tools and software.

Tech stacks at companies like Cofense

Discover the tools and technologies powering great remote companies operating in similar industries to Cofense.

View all companies
Mailprotector logo
Icons/design/feather/2 layers

50 tech stacks

Icons/design/feather/stars

2 benefits

Mailprotector’s parent company, Virtual Connect Technologies, was founded primarily as a website development company.

Guardtime logo
Icons/design/feather/2 layers

20 tech stacks

We were founded with the mission of creating a world free from the burden of trust.

DNSFilter logo
Icons/design/feather/2 layers

117 tech stacks

Icons/design/feather/stars

9 benefits

DNSFilter builds AI-powered DNS protection and content filtering.

Cmd logo
Icons/design/feather/2 layers

39 tech stacks

Icons/design/feather/stars

6 benefits

Cmd allows organizations to proactively secure their Linux environment like never before.

Icons/design/feather/2 layers

35 tech stacks

Icons/design/feather/stars

7 benefits

VGS eliminates the need for customers to hold sensitive data by decoupling and insulating customer systems and applications from sensitive data.

Optiv logo
Icons/design/feather/2 layers

50 tech stacks

Icons/design/feather/stars

11 benefits

At Optiv, we eat, sleep and breathe cybersecurity.

The latest jobs in your inbox

We'll keep you updated with the best new remote jobs.

Read about our privacy policy

Hiring remotely?
Start posting jobs today.

Start posting jobs for only $50.

Post remote jobs on Himalayas