Remote Cloud Security companies

Discover the best remote Cloud Security companies in the world. View a company's profile to learn about its mission, culture and values, tech stack, employee benefits, and open remote roles.

Search
Cloud Security
View items

16 companies

    nVisium logo
    2 jobs available
    Icons/design/feather/users

    11-50

    Icons/design/feather/2 layers

    61 tech stacks

    Icons/design/feather/stars

    5 benefits

    nVisium is dedicated to application security and research. Our approach to problem solving combines skilled technical analysis with a deep understanding of what matters most to our clients. nVisium was founded in 2009 to build a better way forward for securing software throughout the development life cycle. We offer services and solutions that can scale from one developer to thousands of developers.

    Okta logo
    2 jobs available
    Icons/design/feather/users

    1,001-5,000

    Icons/design/feather/2 layers

    111 tech stacks

    Icons/design/feather/stars

    11 benefits

    The foundation for secure connections between people and technology. Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With over 7,000 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely use the best technologies for their business.

    Sucuri logo
    0 jobs available
    Icons/design/feather/users

    51-200

    Icons/design/feather/2 layers

    37 tech stacks

    Icons/design/feather/stars

    11 benefits

    We've offered holistic website security solutions since 2008 including malware removal, malware monitoring, and website protection services. Our SiteCheck website security monitor is used by thousands of website owners every month to monitor their websites for malware, blacklist status, and other security issues, and our CloudProxy Firewall safeguards sites and those who visit them from attacks of all kinds.

    Cohesive Networks logo
    0 jobs available
    Icons/design/feather/users

    11-50

    Icons/design/feather/2 layers

    24 tech stacks

    Cohesive Networks provides cloud-class security and networking software for enterprises. VNS3 has recently been named a finalist in the Data Cloud Awards for Best Use of Cloud in Major Enterprise. With over 3,000 connected customers in more than 22 countries, Cohesive Networks has provided more than 500 million hours of application network security. VNS3 offers more dynamic network controls on top of cloud offerings, including multiple VLAN peering, end-to-end data encryption, application-layer firewall rules, multicast, and multi-region peering.

    Cmd logo
    0 jobs available
    Icons/design/feather/users

    51-200

    Icons/design/feather/2 layers

    39 tech stacks

    Icons/design/feather/stars

    6 benefits

    Cmd allows organizations to proactively secure their Linux environment like never before. Enjoy unprecedented real-time visibility into user actions, customizable controls, and the ability to stop commands pre-execution without the need for human intervention. Get ahead of the potential breach and block malicious attackers without blocking business. It’s the solution your DevOps and SecOps teams can finally agree upon.Cmd brings together talented problem solvers, thinkers and tinkerers around our mission to change the current landscape of cybersecurity.

    Mailprotector logo
    0 jobs available
    Icons/design/feather/users

    11-50

    Icons/design/feather/2 layers

    50 tech stacks

    Icons/design/feather/stars

    2 benefits

    Mailprotector’s parent company, Virtual Connect Technologies, was founded primarily as a website development company. At that time we had developed a couple of intranet sites whose users were fed up with spam, viruses, and the whole lot of issues that come with an unprotected email system. So we rolled up our sleeves and set ourselves to work, and soon we had engineered a basic email filtering system that worked beautifully for our customers.

    New Context logo
    0 jobs available
    Icons/design/feather/users

    51-200

    Icons/design/feather/2 layers

    52 tech stacks

    Icons/design/feather/stars

    6 benefits

    New Context is an innovator in the security of data for highly regulated industries including energy, telecommunications, finance and retail. We provide consulting services and build tools that help our customers around the globe prepare for security orchestration, building critical infrastructure that works with emerging tech. Drawing on our years of experience working with clients in the enterprise and industrial internet, New Context is developing tools that integrate security into software development holistically.

    Thycotic logo
    0 jobs available
    Icons/design/feather/users

    501-1,000

    Icons/design/feather/2 layers

    71 tech stacks

    Icons/design/feather/stars

    5 benefits

    IT Security That Works.Thycotic Software, Ltd. is committed to providing secure password management solutions. From managing privileged accounts to Active Directory self‐service resets, our software securely manages all credentials critical to your company's operations.SECRET SERVER, our password management software, allows teams to control access to all critical passwords in a one central, web‐based repository.

    VMware Carbon Black logo
    0 jobs available
    Icons/design/feather/users

    501-1,000

    Icons/design/feather/2 layers

    20 tech stacks

    Icons/design/feather/stars

    8 benefits

    VMware Carbon Black is a leader in cloud-native endpoint protection dedicated to keeping the world safe from cyberattacks. The VMware Carbon Black Cloud consolidates endpoint protection and IT operations into an endpoint protection platform (EPP) that prevents advanced threats, provides actionable insight and enables businesses of all sizes to simplify operations. By analyzing billions of security events per day across the globe, VMware Carbon Black has key insights into attackers’ behaviors, enabling customers to detect, respond to and stop emerging attacks.

    Cocoon Data logo
    0 jobs available
    Icons/design/feather/users

    11-50

    Icons/design/feather/2 layers

    38 tech stacks

    Icons/design/feather/stars

    1 benefit

    Cocoon Data is a global technology company providing an ultra secure, encrypted file sharing platform, that enables business and Government to identify, protect, and control access to sensitive data.Cocoon Data is built on data security, compliance, and governance.Cocoon Data is an ultra-secure, ultra-simple file sharing and collaboration platform. Our intention is to make data security and compliance so simple, everyone can be part of it.We are ISO 27001 certified and utilize patented technology to deliver the most powerful solution for secure file sharing and collaboration.

    Wordfence logo
    0 jobs available
    Icons/design/feather/users

    1-10

    Icons/design/feather/2 layers

    24 tech stacks

    Icons/design/feather/stars

    10 benefits

    Wordfence is the flagship product of Defiant Inc. Millions of WordPress site owners rely on Wordfence to protect their websites, their customer data and their investment. Install Wordfence today and lock down your WordPress site in minutes.Wordfence is incorporated as Defiant, Inc., a Delaware company. We are a small team that is passionate about software engineering and delivering excellent customer service.

    Advanced logo
    0 jobs available
    Icons/design/feather/users

    11-50

    Icons/design/feather/2 layers

    6 tech stacks

    Advanced Secure Technologies merge a customer-focused mindset with extensive security knowledge to provide innovative and high-security solutions that protect organisations against fraud. Our approach ensures that our customers are free to focus on running their enterprise, with the peace of mind that Advanced Secure Technologies is protecting the organisation.At Advanced Secure Technologies, we specialise in reducing the risks of document, process and payment fraud.Our technologies secure the production and issuing of secure printed documents, secure electronic documents and secure payments.

    Retrospect logo
    0 jobs available
    Icons/design/feather/users

    11-50

    Icons/design/feather/2 layers

    22 tech stacks

    Icons/design/feather/stars

    2 benefits

    Complete backup for businesses. Retrospect protects Mac, Windows and Linux, desktops and servers, as well as application-level protection for Exchange and SQL Server. Retrospect backs up to Disk, Tape and Cloud. Retrospect is used in over 80 countries, backing up data from as far away as the Hubble Telescope and as close by as your neighborhood dentist. We've been used to restore data nineteen years later as well as the laptop that was backed up - right before being kicked off the bed by the dog.

    Horizon3.ai logo
    0 jobs available
    Icons/design/feather/users

    51-200

    Icons/design/feather/2 layers

    59 tech stacks

    Icons/design/feather/stars

    5 benefits

    We are a mix of US Special Operations, US National Security, and cybersecurity industry veterans. Our mission is to “turn the map around” – using the attacker’s perspective to help enterprises prioritize defensive efforts. Our team of nation-state-level, ethical hackers continuously identifies new attack vectors through autonomous pentesting and red team operations, leveraging collective intelligence to improve our products and strengthen our clients’ security.

    Invicti logo
    0 jobs available
    Icons/design/feather/users

    201-500

    Icons/design/feather/2 layers

    83 tech stacks

    Icons/design/feather/stars

    12 benefits

    Invicti is an application security leader empowering organizations to continuously secure their web applications and APIs through all stages of the software development lifecycle. Exclusively focused on this space for more than 15 years, Invicti’s products Netsparker and Acunetix bring security and development teams together to protect company data from breach through industry-leading Discovery, Dynamic Application Security Testing (DAST), Interactive Application Security Testing (IAST) and Software Composition Analysis (SCA).

    Sysdig logo
    0 jobs available
    Icons/design/feather/users

    201-500

    Icons/design/feather/2 layers

    102 tech stacks

    Icons/design/feather/stars

    6 benefits

    As cloud-native becomes the standard for application deployment, IT roles must adapt. Cloud teams are taking ownership for security, as well as application performance and availability. Tools must support a secure DevOps workflow to run Kubernetes and containers in production. Sysdig enables companies to confidently run cloud-native workloads in production. With the Sysdig Secure DevOps Platform, cloud teams embed security, maximize availability, and validate compliance.

The latest jobs in your inbox

We'll keep you updated with the best new remote jobs.

Read about our privacy policy

Hiring remotely?
Start posting jobs today.

Start posting jobs for only $50.

Post remote jobs on Himalayas