Explore Top Tech Companies
All Filters
Office Type

Industry

Size

Open Jobs

Remote Jobs

Perks

DEI

Tech Stack

Top Tech Companies (1,328)

Security
11 Employees

Plan Forward provides a dental membership platform designed to offer in-house membership plans.


Security
13 Employees

Zylo provides a SaaS management platform designed to optimize cloud-based subscription.


Security
64 Employees

Cavirin protects your digital assets across the enterprise hybrid cloud by delivering CyberPosture Intelligence. We permit enterprises to maintain their ‘golden security posture’ via continuous visibility, automated scoring against the widest set of industry best practices, regulations, and benchmarks, and remediation leveraging predictive analytics and by integrating security into the DevOps cycle.


Security
693 Employees

Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions. Malwarebytes completely replaces antivirus with artificial intelligence-powered technology that stops cyberattacks before they can compromise home computers and business


Security
155 Employees

Based in Redwood City, California, Synack is a security company revolutionizing how enterprises view cybersecurity: through a hacker’s eyes. Synack’s private, managed hacker-powered security solution arms clients with hundreds of the world's most skilled, highly vetted ethical hackers who provide a truly adversarial perspective to clients’ IT environments.


Security
112 Employees

Independent Security Evaluators is a security firm dedicated to aggressive defense strategies through advanced science.


Security
567 Employees

Stability Networks is a managed service provider based in Boise, Idaho.


Security
134 Employees

Demisto Enterprise is the first and only comprehensive, Security Operations Platform to combine security orchestration, incident management and interactive investigation. Demisto’s orchestration engine automates security product tasks and weaves in the human analyst tasks and workflows. It's the first machine learning incident response platform that gets smarter with every analyst action. Using Demisto enables security teams to reduce MTTR, create consistent incident management process and increase analyst productivity.


Security
184 Employees

RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprise networks to be resilient to cyber events. RedSeal helps customers understand their network from the inside out – providing actionable intelligence, situational awareness and a Digital Resilience Score to help enterprises measure and improve their resilience. Government agencies and Global 2000 companies around the world rely on RedSeal to help them improve their overall security posture, accelerate incident response and increase the productivity of their security and network teams. Founded in 2004, RedSeal is headquartered in Sunnyvale, California and serves customers through a direct and channel partner network.


Security
65 Employees

Introducing FileString, a better way to share your important files. FileString is an easy to use cloud-based service that attaches a digital string to the important files you share, so you can control your content even after someone downloads it to their computer or mobile device. With FileString, you can protect files you share from being viewed, forwarded, printed or edited. You can track every time your file is viewed or printed. You can remotely update distributed copies to the latest version. And you can revoke access to files so they can never be opened again by people to whom you’ve sent them. FileString makes it simple to manage the files you’ve shared with control. It’s available on any Internet-connected computer or mobildevice and it works whether you’re online or off. FileString also automatically syncs your sent and received files – so you’ll always have access, when and where you need it. Now there is a new option to share your most important files. Don’t regret emailing an attachment and losing control of your important content. Don’t regret giving access to your shared cloud based folder permitting the download of your important file. Now you can add intelligence to your important files, and control them on all the devices you share with. Now you can “string” your most important files. Share with confidence, share with control. “String it …with File String”.


Security
31 Employees

Proofpoint Digital Risk & Compliance is the leading provider of enterprise social media brand protection, governance and compliance solutions. Our solutions let you centrally discover, audit, and secure your firm’s social media presence to protect your company, customers, and brand, while ensuring compliance across your entire social media infrastructure. Proofpoint’s Social Protection is used by over 200 of the largest financial services, media, entertainment, technology, healthcare, automotive, manufacturing, and retail brands around the globe. With Proofpoint, these organizations keep their brands safe, prevent hacks, and avoid costly compliance violations and audits by eliminating the risk on social media.


Security
409 Employees

Lookout is a cybersecurity company for the post-perimeter, cloud-first, mobile-first world. Powered by the largest dataset of mobile code in existence, the Lookout Security Cloud provides visibility into the entire spectrum of mobile risk. Lookout is trusted by hundreds of millions of individual users, enterprises and government agencies and partners such as AT&T, Verizon, Vodafone, Microsoft, Apple and others. Headquartered in San Francisco, Lookout has offices in Amsterdam, Boston, London, Sydney, Tokyo, Toronto and Washington, D.C.


Security
226 Employees

Zylo provides a SaaS management platform designed to optimize cloud-based subscription.


Security
85 Employees

4iQ is an identity intelligence company on a mission to empower intel analysts, security researchers, and criminal investigators with capabilities to discover, uncover, and disrupt adversaries. The 4iQ IDLake™ archives more than 14 billion identity records collected from open sources on the deep and dark web from breaches and other open sources. It powers, 4iQ IDHunt, a pioneering identity intelligence and attribution analysis solution used by Fraud Investigation Units, Anti-Money Laundering and Financial Crime Intel Units, and advanced Security Operations Centers. The 4iQ IDLake™ also powers 4iQ IDTheft, used by some of the largest Identity Theft Protection service providers to alert millions of consumers of exposed personal information. 4iQ is headquartered in Los Altos, CA and backed by Forgepoint Capital, C5 Capital, Adara Ventures, and Benhamou Global Ventures. [email protected] @4iq


Security
65 Employees

Introducing FileString, a better way to share your important files. FileString is an easy to use cloud-based service that attaches a digital string to the important files you share, so you can control your content even after someone downloads it to their computer or mobile device. With FileString, you can protect files you share from being viewed, forwarded, printed or edited. You can track every time your file is viewed or printed. You can remotely update distributed copies to the latest version. And you can revoke access to files so they can never be opened again by people to whom you’ve sent them. FileString makes it simple to manage the files you’ve shared with control. It’s available on any Internet-connected computer or mobildevice and it works whether you’re online or off. FileString also automatically syncs your sent and received files – so you’ll always have access, when and where you need it. Now there is a new option to share your most important files. Don’t regret emailing an attachment and losing control of your important content. Don’t regret giving access to your shared cloud based folder permitting the download of your important file. Now you can add intelligence to your important files, and control them on all the devices you share with. Now you can “string” your most important files. Share with confidence, share with control. “String it …with File String”.


Security
10 Employees

Net Xcellence is a full network installations and data migrations.


Security
85 Employees

4iQ is an identity intelligence company on a mission to empower intel analysts, security researchers, and criminal investigators with capabilities to discover, uncover, and disrupt adversaries. The 4iQ IDLake™ archives more than 14 billion identity records collected from open sources on the deep and dark web from breaches and other open sources. It powers, 4iQ IDHunt, a pioneering identity intelligence and attribution analysis solution used by Fraud Investigation Units, Anti-Money Laundering and Financial Crime Intel Units, and advanced Security Operations Centers. The 4iQ IDLake™ also powers 4iQ IDTheft, used by some of the largest Identity Theft Protection service providers to alert millions of consumers of exposed personal information. 4iQ is headquartered in Los Altos, CA and backed by Forgepoint Capital, C5 Capital, Adara Ventures, and Benhamou Global Ventures. [email protected] @4iq


Security
212 Employees

Big Switch Networks is the Cloud-First Networking company, bringing public cloud-style networking and hybrid cloud consistency to organizations around the world. The company provides data center switching, monitoring, visibility and security solutions for on-premises enterprise cloud, public cloud and Multi-cloud environments that enable companies of all sizes to dramatically increase operational efficiency, increase business agility, and reduce networking costs. Big Switch was founded in 2010, with roots in the original Stanford research team that invented software-defined networking. Big Switch has strategic partnerships with Dell EMC, HPE and Edgecore, delivering innovative software on industry-standard open networking hardware. Since its founding the company has been an active member and contributor to multiple open source communities. Big Switch Networks is headquartered in Santa Clara, CA, with a dedicated presence across more than 25 countries. To learn more: www.bigswitch.com


Security
349 Employees

Best-in-class Cybersecurity Management Software The software uses analytics to prioritize on organization’s risk exposures and recommends informed action to best address those exposures. These capabilities extend across highly complex networks, including those in physical, virtual, cloud and operational technology (OT) environments. By integrating with more than 120 networking and security technologies, the company’s broad platform, the Skybox™ Security Suite, enables organizations to reduce security risks that attackers can find and exploit, such as device misconfigurations and policy violations, as well as exposed and unpatched vulnerabilities. Established in 2002, Skybox is a privately held company with worldwide sales and support teams serving an international customer base of more than 500 enterprises in over 50 countries.


Security
10 Employees

Resilient Network Systems'​ Resilient Access™ is a policy-driven contextual access control solution for securely sharing data and connecting organizations. Our policy workflow engine discovers, organizes and resolves the information or attributes required to provide the context to make smarter access decisions. Resilient’s unique network-based architecture scales quickly to extend an organization’s reach across its entire ecosystem. Resilient Network Systems has customers in the U.S. Government, law enforcement and healthcare, and is a privately held, venture-backed company based in San Francisco. Visit us at www.Resilient-Networks.com