Explore Top Tech Companies
All Filters
Office Type

Industry

Size

Open Jobs

Remote Jobs

Perks

DEI

Tech Stack

Top Tech Companies (1,328)

Security
850 Employees

World-Leading Cyber AI


Security
155 Employees

Based in Redwood City, California, Synack is a security company revolutionizing how enterprises view cybersecurity: through a hacker’s eyes. Synack’s private, managed hacker-powered security solution arms clients with hundreds of the world's most skilled, highly vetted ethical hackers who provide a truly adversarial perspective to clients’ IT environments.


Security
86 Employees

Koda has developed a data-driven, personalized, interactive, video-based platform to navigate difficult conversations in healthcare.


Security
161 Employees

nstart helps hundreds of leading enterprises around the world deliver a faster, safer, and more profitable digital experience. Our Digital Experience Cloud helps our customers improve the performance, consumer experience and security of their cloud, web and mobile applications - resulting in higher revenue and better customer satisfaction. E-commerce companies will enjoy 5-8% higher revenue after deploying our platform. Digital advertisers will see 3-15% higher revenue. Cloud and mobile applications for the Global 2000 will run 20% to 80% faster, look better and be safer. Instart’s digital experience management platform combines artificial intelligence, application and device awareness, and open APIs with a broad suite of integrated and automated capabilities spanning Cloud, Web and Mobile Application Performance Optimization, Image Optimization, Digital Advertising and Marketing Analytics Recovery, Advertising Acceleration, Web Application Firewall, DDoS Protection, Bot Management and a Content Delivery Network. With over 100+ patents using artificial intelligence and machine learning, Instart’s unique technology continually optimizes the online consumer experience, learning from every interaction across devices and networks.


Security
71 Employees

Founded in 2016 and headquartered in San Jose, California, HyperGrid™ is helping enterprises and managed service providers master the challenge of managing hybrid and multi-cloud environments as technologies and requirements increase in complexity. Our HyperCloud™ Intelligent Cloud Management Platform (CMP) provides powerful capabilities in a singl


Security
203 Employees

Seclore’s Rights Management solution enables organizations to control the usage of files wherever they go, both within and outside of organizations’ boundaries. The ability to remotely enforce and audit who can do what with a file (view, edit, copy, screen capture, print, run macros), from which device, and when empowers organizations to embrace BYOD, Cloud services, Enterprise File Sync and Share (EFSS) and external collaboration with confidence.


Security
4 Employees

Founded in 2005, EXO5 provides computer tracking and lockdown services for enterprise customers. The company's Remote Kill™ service has quickly become the must-have security service for financial services companies and other business sectors that handle sensitive data. The company's Software-as-a-Service (SaaS) model delivers two critical benefits to customers: low cost and fast deployment. Customers pay only for what they use, with no setup fees or servers to build. Most EXO5 deployments are completed within 24 hours - as a result, EXO5 has become the first line of defense in organizations where security is a ongoing priority. EXO5 is located in San Francisco's Financial District, with network operations in Silicon Valley and redundant operation centers on the US East Coast and in Europe.


Security
207 Employees

OPSWAT is a global cyber security company that has provided security solutions for enterprises since 2002. Trusted by over 1,000 organizations worldwide, OPSWAT prevents corporate damage by enabling the most effective solutions to eliminate security risks from data and devices coming into and out of an organization. MetaDefender by OPSWAT is a powerful and flexible security solution for ISVs, IT admins, and malware researchers, providing simultaneous access to data sanitization (CDR), vulnerability assessment, multiple anti-malware engines, heuristics, and additional threat protection technologies residing on a single system. At the heart of the solution, the MetaDefender multi-scanning engine uses 30+ anti-malware engines to scan files for threats, significantly increasing malware detection. MetaDefender can be used to analyze a large database of files and provide extensive data points about which engines have detected each threat. It is also easy to use alongside other analysis software, including dynamic analysis solutions, to provide detailed contextual information about files. To learn more about OPSWAT’s innovative and unique solutions, please visit https://www.opswat.com.


Security
693 Employees

Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions. Malwarebytes completely replaces antivirus with artificial intelligence-powered technology that stops cyberattacks before they can compromise home computers and business endpoints. More than 60,000 businesses and millions of people worldwide trust and recommend Malwarebytes solutions. Our team of threat researchers and security experts process emerging and established threats every day, from all over the globe. Founded in 2008, the company is headquartered in California, with offices in Europe and Asia. For more information, please visit us at http://www.malwarebytes.com/.


Security
65 Employees

Introducing FileString, a better way to share your important files. FileString is an easy to use cloud-based service that attaches a digital string to the important files you share, so you can control your content even after someone downloads it to their computer or mobile device. With FileString, you can protect files you share from being viewed, forwarded, printed or edited. You can track every time your file is viewed or printed. You can remotely update distributed copies to the latest version. And you can revoke access to files so they can never be opened again by people to whom you’ve sent them. FileString makes it simple to manage the files you’ve shared with control. It’s available on any Internet-connected computer or mobildevice and it works whether you’re online or off. FileString also automatically syncs your sent and received files – so you’ll always have access, when and where you need it. Now there is a new option to share your most important files. Don’t regret emailing an attachment and losing control of your important content. Don’t regret giving access to your shared cloud based folder permitting the download of your important file. Now you can add intelligence to your important files, and control them on all the devices you share with. Now you can “string” your most important files. Share with confidence, share with control. “String it …with File String”.


Security
79 Employees

tCell is a Next-Gen Cloud WAF designed to protect applications, APIs, and microservices where they are most vulnerable. tCell’s technology provides unparalleled visibility into application behavior, dramatically reducing false positives, protecting applications from attacks and providing actionable data to prevent future attacks. Best suited for CI/CD pipelines, tCell’s flexible deployment models enable Security and DevOps organizations to deploy industry-leading security alongside mission-critical applications and used by leading organizations like Veeva, Zenefits, and John Muir Health. tCell is funded by Menlo Ventures and led by executives from Splunk, Okta, and Skyhigh Networks. Learn more at tcell.io.


Security
349 Employees

Best-in-class Cybersecurity Management Software The software uses analytics to prioritize on organization’s risk exposures and recommends informed action to best address those exposures. These capabilities extend across highly complex networks, including those in physical, virtual, cloud and operational technology (OT) environments. By integrating with more than 120 networking and security technologies, the company’s broad platform, the Skybox™ Security Suite, enables organizations to reduce security risks that attackers can find and exploit, such as device misconfigurations and policy violations, as well as exposed and unpatched vulnerabilities. Established in 2002, Skybox is a privately held company with worldwide sales and support teams serving an international customer base of more than 500 enterprises in over 50 countries.


Security
112 Employees

integrata security provides innovative cyber security solutions that improve network infrastructure security.


Security
238 Employees

Zylo provides a SaaS management platform designed to optimize cloud-based subscription.


Security
63 Employees

Uniquely advanced, AI-powered application security platform designed for the modern web applications and APIs. Wallarm organically combines vulnerability detection with next-generation web application firewall (WAF). Smart out of the box, it gets smarter with machine learning to scale security in-step business growth. And its stronger security comes with zero-ops or disruption to your CI/CD. Wallarm is developed on top of NGINX, an increasingly popular high-performance web server and load balancer used by 35% of the busiest 1000 websites. It targets clients with high loaded web projects in e-commerce, SaaS/PaaS, big data, news media, communication and online payments markets. Our security solutions are unique, everyday tools built by security professionals for security professionals. Key features include: - machine learning for detection of 0day attacks and vulnerabilities they are targeting - replaying attacks from traffic to evaluate their actual severity - Continuous vulnerability checks for the new part of the protected application - Statistics algorithms resulting in low false positives and resistance to spam in the interface - Integration with popular bug trackers to automate secure development life-cycle (SDLC) and continuous integration Get more info at www.wallarm.com.


Security
58 Employees

Founded in 2010, CloudPassage® is a security pioneer awarded the first-ever patents for universal cloud infrastructure security and is a leading innovator in cloud asset visibility. CloudPassage Halo® is an award-winning security solution purpose-built for the cloud that helps customers automatically discover cloud assets, reduce their attack surface, and find and respond to critical risks other tools miss. It provides unrivaled visibility and continuous compliance for the cloud deployments of some of the world’s most demanding IT shops in technology, finance, security, media, e-commerce, and hospitality. CloudPassage is backed by leading Silicon Valley firms Benchmark, Four Rivers Group, Lightspeed Venture Partners, Meritech Capital, Musea Ventures, Shasta Ventures, Sozo Ventures, and Tenaya Capital.


Security
10 Employees

Resilient Network Systems'​ Resilient Access™ is a policy-driven contextual access control solution for securely sharing data and connecting organizations. Our policy workflow engine discovers, organizes and resolves the information or attributes required to provide the context to make smarter access decisions. Resilient’s unique network-based architecture scales quickly to extend an organization’s reach across its entire ecosystem. Resilient Network Systems has customers in the U.S. Government, law enforcement and healthcare, and is a privately held, venture-backed company based in San Francisco. Visit us at www.Resilient-Networks.com


Security
232 Employees

Zylo provides a SaaS management platform designed to optimize cloud-based subscription.


Security
65 Employees

Introducing FileString, a better way to share your important files. FileString is an easy to use cloud-based service that attaches a digital string to the important files you share, so you can control your content even after someone downloads it to their computer or mobile device. With FileString, you can protect files you share from being viewed, forwarded, printed or edited. You can track every time your file is viewed or printed. You can remotely update distributed copies to the latest version. And you can revoke access to files so they can never be opened again by people to whom you’ve sent them. FileString makes it simple to manage the files you’ve shared with control. It’s available on any Internet-connected computer or mobildevice and it works whether you’re online or off. FileString also automatically syncs your sent and received files – so you’ll always have access, when and where you need it. Now there is a new option to share your most important files. Don’t regret emailing an attachment and losing control of your important content. Don’t regret giving access to your shared cloud based folder permitting the download of your important file. Now you can add intelligence to your important files, and control them on all the devices you share with. Now you can “string” your most important files. Share with confidence, share with control. “String it …with File String”.


Security
235 Employees

Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity. The AWN CyberSOC™ service is anchored by Concierge Security™ teams who provide custom threat hunting, alerting, and reporting. Arctic Wolf’s purpose-built, cloud-based service offers 24x7 monitoring, vulnerability assessment, threat detection, and response.