Loading

Company Description Country
Uniscon universal identity control GmbH Uniscon is the leading provider of cloud security solutions in Europe. Uniscon‘s patented Sealed Cloud ensures maximum data center security. Sealed Cloud protects data also … Germany
Uniken Uniken provides REL-ID, a distributed digital trust platform, which provisions trusted digital connections between an enterprise and its customers, partners & employees. It … United States
Unicept GmbH Unicept GmbH in Hannover is a German manufacturer, which specializes in product development in the security space; encryption and decryption of data and communications. Germany
UL Transaction Security UL is the global leader in safeguarding security, compliance and global interoperability. Offering advice, training, test and certification services, security evaluations and … Netherlands
Ucopia Communications UCOPIA develops access management solutions allowing mobile users, employees, visitors and guests to connect securely and seamlessly on public or private Wi-Fi networks. France
Tychon *Formerly CloudHASH Security Tychon is a solution that unifies the IT and security silos of enterprise environments. Out of the box and custom queries provide operators with data that is seconds old, … United States
Twistlock Twistlock is a Docker container security solution designed for DevOps – with seamless CI integration, extensive API support, and a security framework that extends from dev … United States
Tutanota GmbH Tutanota is an end-toend encrypted mailbox available worldwide. Because of its easy set-up it is particularly of interest to small and middle-sized companies. Tutanota stores … Germany
Tufin Tufin is the leader in Security Policy Orchestration, enabling enterprises to centrally manage, visualize and control security policies across hybrid cloud and physical … United States
Trustwave Trustwave helps businesses fight cybercrime, protect data and reduce security risk. United States
TrustPipe TrustPipe provides true endpoint protection. TrustPipe scans network traffic for markers, blocking attack vectors at the speed of the environment before a breach occurs. United States
TrustedSec, LLC TrustedSec is an information security consulting team at the forefront of attack simulations with a focus on strategic risk-management. Our goal is to help organizations … United States
Trusted Knight Corp. Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans. These trojans are now responsible for … United States
TRUSTe TRUSTe powers privacy compliance and trust by enabling businesses to use data across their customer, employee and vendor channels. We have nearly 20 years experience and a … United States
TruSTAR Technology TruSTAR is the first security intelligence exchange platform built to incentivize information sharing among enterprises. United States
Trusona The Trusona team is dedicated to shedding light on the darkest corners of the Internet. Trusona is designed to protect the most sensitive assets and committed to making the … United States
TrulyProtect Oy TrulyProtect secures creators of software – Independent Software Vendors and other Enterprises – against reverse engineering, modification and theft of algorithmic and … Finland
Tripwire, Inc. Tripwire is a leading provider of endpoint detection and response, security, compliance and IT operation solutions for enterprises, service providers and government agencies. United States
Tresys Technology LLC. Tresys provides customers with comprehensive security solutions that meet the challenges of the most demanding environments in the world. Whether it’s safeguarding … United States
Trend Micro Inc. Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. Trend Micro enables the smart protection … United States
Treetop Innovation AB Our ultimate vision is to make cyber security management a little simpler, a little less expensive and make the digital world safer for businesses – one server at a time. … Sweden
TrapX Security, Inc. TrapX Security is a leader in the delivery of deception based cyber security defense. Our solutions rapidly detect, analyze and defend against new zero day and APT attacks in … United States
TRAPMINE Inc. TRAPMINE is an endpoint security solution to protect organizations from Advanced Persistent Threats. Trapmine takes CPU-based protection approach to prevent attackers from … Turkey
Transmit Security Transmit Security combines biometrics with advanced behavioral profiling, security and anti-fraud technologies into one authentication platform. United States
Trace Security TraceSecurity is a leader in cloud-based cybersecurity solutions that help organizations of all sizes reduce the risk of cyber breaches and demonstrate compliance. United States
TowerSec Automotive Cyber Security *Acquired by HARMAN International Industries TowerSec is a pioneer provider of Cyber Security solutions to the automotive industry. In January 2016, HARMAN International Industries has acquired TowerSec to form HARMAN‘… United States
totemo ag totemo provides email encryption, secure managed file transfer and secure mobile communication solutions for organizations and institutions under the umbrella of totemomail®,… Switzerland
TopSpin Security Ltd. TopSpin is a leading provider of intelligent deception and detection solutions. TopSpin empowers security professionals to go on the offensive against APTs and other … Israel
Topsec Technology Ltd. Topsec Technology is a leading provider of cloud based managed email and web security solutions. Ireland
TokenOne TokenOne is a cyber security software company that provides high security business solutions to both enterprise and mass-market consumers built on our patented identity … Australia
TITUS Inc. Enable organizations to classify, protect and confidently share information, and meet regulatory compliance requirements by identifying and securing unstructured data. Canada
Titania LTD At Titania, we develop cyber security auditing software. Our security and compliance tools enable organisations to produce expert level security reports on their networks at … United Kingdom
TitanHQ TitanHQ provide Managed Service Providers with comprehensive network security protection through their award-winning suite of email and web security solutions including … Ireland
Titan IC Systems Ltd. Titan IC provides Deep Packet Inspection technology for the Cyber Security Analytics. Ireland
TigerText As healthcare’s largest provider of clinical communication solutions, TigerText helps physicians, nurses, and other staff communicate and collaborate more effectively, … United States
Tigera Tigera is solving the networking and security problems inherent in deploying and enforcing policy in large private, public, and hybrid enterprises. United States
TIE Kinetix N.V. TIE Kinetix transforms the digital supply chain by providing Total Integrated E-Commerce solutions. These solutions maximize revenue opportunities by minimizing the energy … Netherlands
TIBCO Software Inc. *Acquired by Vista Equity Partners TIBCO Software Inc. provides infrastructure and business intelligence software worldwide. The company offers products in the areas of integration and core infrastructure; … United States
Thycotic Thycotic prevents cyber attacks by securing passwords, protecting endpoints and controlling application access. Thycotic is one of the world’s fastest growing IT security … United States
ThreatWave ThreatWave has the largest email sensor network ever constructed – a source of information now publicly available to the online community. For enterprises and service … United States