Name (a to z)
Name (z to a)
nVisium is dedicated to application security and research. Our approach to problem solving combines skilled technical analysis with a deep understanding of what matters most to our clients. nVisium was founded in 2009 to build a better way forward for securing software throughout the development life cycle. We offer services and solutions that can scale from one developer to thousands of developers.
Expanse protects the world’s most important organizations by discovering risks on the Internet no one else can find. Our customers comprise more than 10% of the routable Internet and rely on our products to discover, manage, and secure their global Internet assets. Born from DARPA, Expanse was founded in 2012 and is backed by more than $135M in funding.
We provide you with the skills, experience and knowledge you need to skyrocket through the ranks of the IT industry even if you have zero experience. Our job-ready training program (which is based on our thorough experience working at Cisco Systems, Dimension Data, Arista Networks, etc. and as IT instructors for the U.S. Air Force) and in-person certification will help you master the most in-demand networking skills in 6 months so that you can break into a tech job or get promoted.
IT Security That Works.Thycotic Software, Ltd. is committed to providing secure password management solutions. From managing privileged accounts to Active Directory self‐service resets, our software securely manages all credentials critical to your company's operations.SECRET SERVER, our password management software, allows teams to control access to all critical passwords in a one central, web‐based repository.
Our mission is to help organisations reduce cost and improve security by automating critical processes across their network infrastructure. Our solutions enable organisations to increase availability, security and compliance by automating critical tasks across their multi-vendor infrastructures. We work with reseller partners, distributors, managed service providers and technology partners such as Palo Alto, Check Point, Fortinet and ScienceLogic to enable customers to meet their network and security challenges and for partners to benefit from new revenue opportunities.
Mailprotector’s parent company, Virtual Connect Technologies, was founded primarily as a website development company. At that time we had developed a couple of intranet sites whose users were fed up with spam, viruses, and the whole lot of issues that come with an unprotected email system. So we rolled up our sleeves and set ourselves to work, and soon we had engineered a basic email filtering system that worked beautifully for our customers.
Your product team, on one page.Blossom helps hundreds of organizations to manage software projects as efficiently as possible. Among them are well known brands like Facebook, Twitter, Spotify, Netflix, Apple & NASA. In a nutshell Blossom is a lightweight project management tool for Lean & Agile Software Development.The software development industry moved from waterfall development to monthly releases, then to weekly releases and is now adopting continuous delivery.
Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks, heralding the new era of self-protecting software. Contrast's patented deep security instrumentation is the breakthrough technology that enables highly accurate assessment and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts.
VMware Carbon Black is a leader in cloud-native endpoint protection dedicated to keeping the world safe from cyberattacks. The VMware Carbon Black Cloud consolidates endpoint protection and IT operations into an endpoint protection platform (EPP) that prevents advanced threats, provides actionable insight and enables businesses of all sizes to simplify operations. By analyzing billions of security events per day across the globe, VMware Carbon Black has key insights into attackers’ behaviors, enabling customers to detect, respond to and stop emerging attacks.More than 6,000 global customers, including approximately one third of the Fortune 100, trust VMware Carbon Black to protect their organizations from cyberattacks.
Wordfence is the flagship product of Defiant Inc. Millions of WordPress site owners rely on Wordfence to protect their websites, their customer data and their investment. Install Wordfence today and lock down your WordPress site in minutes.Wordfence is incorporated as Defiant, Inc., a Delaware company. We are a small team that is passionate about software engineering and delivering excellent customer service.
We are transforming ideas with Ruby on Rails. HEDURIO is a project the result of which is the same name software. This software is a unique comprehensive information system (ERP - Enterprise Resource Planning) for the management of security agencies. HEDURIO is the online information system that can be easily used with any modern devices such as personal computers, laptops, tablets or smartphones.
Tigera provides Zero Trust network security and continuous compliance for Kubernetes platforms.Tigera Secure Enterprise Edition extends enterprise security and compliance controls to Kubernetes environments with support for on-premises, multi-cloud, and legacy environments. Tigera Secure Cloud Edition is available on the AWS marketplace and enables fine-grained security and compliance controls for Kubernetes on AWS and Amazon EKS.Tigera powers all of the major hosted Kubernetes environments including Amazon EKS, Azure AKS, Google GKE, and IBM Container Service.
Centilytics, an Intelligent cloud management platform, serves as a governance, security & optimization tool to save unnecessary cloud spend with 360-degree visibility. It pinpoints loopholes in the cloud infrastructure to put the resources into optimum utilization and check the entire infrastructure for threats and malicious attacks.With humble beginnings as a summer project in a Stanford dorm room, Centilytics has gone on to handle over $750 million in public cloud consumption.
Complete backup for businesses. Retrospect protects Mac, Windows and Linux, desktops and servers, as well as application-level protection for Exchange and SQL Server. Retrospect backs up to Disk, Tape and Cloud. Retrospect is used in over 80 countries, backing up data from as far away as the Hubble Telescope and as close by as your neighborhood dentist. We've been used to restore data nineteen years later as well as the laptop that was backed up - right before being kicked off the bed by the dog.
Our mission? To democratise security and make the internet a safer place for everyone. By reinventing the way we secure web applications, Sqreen makes security simple and accessible. We build modern, effective, and reliable security tools that automate application protection, threat detection, and security monitoring. But we don’t stop there. We believe that the key to a more secure future lies in closing the gap between developers and security teams, and in sharing information with our peers in the developer community.
Optimise your leadership meetings. SHERPANY is the fastest growing Tech company headquartered in Switzerland. Our mission is to get time back. We build innovative, mobile solutions for board and executive committees. With our technology we turn formal meetings from time-wasters into value-creators by driving focus on the output. We encourage the evolution of meeting culture through a delightful, easy to use and secure meeting management SaaS to drive focus on decision making to free up the wasted meeting time for value-adding work.
Invicti is an application security leader empowering organizations to continuously secure their web applications and APIs through all stages of the software development lifecycle. Exclusively focused on this space for more than 15 years, Invicti’s products Netsparker and Acunetix bring security and development teams together to protect company data from breach through industry-leading Discovery, Dynamic Application Security Testing (DAST), Interactive Application Security Testing (IAST) and Software Composition Analysis (SCA).
Advanced Secure Technologies merge a customer-focused mindset with extensive security knowledge to provide innovative and high-security solutions that protect organisations against fraud. Our approach ensures that our customers are free to focus on running their enterprise, with the peace of mind that Advanced Secure Technologies is protecting the organisation.
The latest jobs in your inbox
We'll keep you updated with the best new remote jobs.