Explore Top Tech Companies
All Filters
Office Type

Industry

Size

Open Jobs

Remote Jobs

Perks

DEI

Tech Stack

Top Tech Companies (1,328)

Security
68 Employees

Elastica is the leader in Data Science Powered™ Cloud Application Security. Its CloudSOC™ platform empowers the companies to confidently leverage Cloud and SaaS applications while staying safe, secure and compliant. The following Elastica Apps on the extensible CloudSOC™ platform enable full life cycle of visibility & security for the Cloud and SaaS applications being used in your company: - Audit: Uncovers Shadow IT and highlights vulnerabilities in cloud apps being used by employees - Detect: Uses machine learning to detect intrusions and threats based on account activity in cloud apps - Protect: Provides defense against intrusions and compliance violations in cloud apps being used - Investigate: Enables forensic investigations on historic account activity on cloud apps being used Elastica, acquired by Blue Coat in 2015, is headquartered in San Jose, CA. Learn more about Elastica at https://www.elastica.net. Follow us on Twitter @ElasticaInc.


Security
169 Employees

Attivo Networks®, the leader in deception technology, provides an active defense for early detection, forensics, and automated incident response to in-network cyberattacks. The Attivo ThreatDefend™ Deception Platform provides a comprehensive and customer-proven platform for proactive security and accurate threat detection within user networks, data centers, clouds, and a wide variety of specialized attack surfaces. The portfolio includes expansive network, endpoint, application, and data deceptions designed to efficiently misdirect and reveal attacks from all threat vectors. Advanced machine-learning makes preparation, deployment, and operations fast and simple to operate for organizations of all sizes. Comprehensive attack analysis and forensics provide actionable alerts, and native integrations automate the blocking, quarantine, and threat hunting of attacks for accelerated incident response. The company has won over 50 awards for its technology innovation and leadership. For more information, visit www.attivonetworks.com.


Security
49 Employees

Brighterion, a Mastercard company, offers a portfolio of artificial intelligence and machine learning technologies, providing real-time intelligence from all data sources regardless of type, complexity and volume. Brighterion’s best-in-class technology is and serves as a general-purpose AI platform across varying industries to manage anti-money laundering, acquiring fraud, omni-channel fraud, early delinquency/collections and credit risk for businesses, governments and health care organizations through personalization, adaptability and self-learning that enables discovery, identification and mitigation of anomalous activities. Brighterion’s artificial intelligence platform eliminates the need for data scientists to analyze and prepare data for each model. Brighterion’s patented AI engine automatically discovers important features and associations, creates new fields and enriches the data. It automatically builds and tests millions of artificial intelligence and machine learning models in parallel. Models are merged together (combining knowledge learned by the AI technologies from the best models) to create production ready models that are extremely accurate and durable. Rather than trying to anticipate every possible scenario or rely on pre-trained models, Brighterion’s unique Smart Agent technology tracks and adaptively learns the specific behavior of every entity over time. This continuous, 1-to-1 behavioral analysis enables personalization, adaptability and self-learning by creating a virtual representation of every entity, and learns and builds a continual profile of that entity’s actions and activities. Brighterion has won enterprise-wide acclaim for its technological leadership, and has received multiple awards including for our best-in-class technologies, including: the Fraud Innovation World Series Award, the Payment Security Product Excellence Award and the Best Analytical Solution Award.


Security
80 Employees

Corelight is the most powerful network visibility solution for information security professionals. We provide real-time data that organizations use to understand, detect, and prevent cyber attacks. Our solution is built on Zeek, the powerful and widely-used open source monitoring framework. Questions? Contact us at https://www.corelight.com/contact


Security
327 Employees

The world's leading banks, airlines, retailers, hotel chains, and federal agencies rely on Shape as their primary line of defense against sophisticated cybercrime. The Shape technology platform, covered by 50+ patents, stops automated fraud and other attacks on web and mobile applications, including credential stuffing, account takeover, scraping, and unauthorized aggregation. Shape is one of the largest processors of login traffic in the world and protects more than 1.3 billion user accounts. Shape prevented more than $1 billion in fraud losses last year. Shape was recognized in Fortune Magazine as one of the leading companies in artificial intelligence in 2018 and listed in CNBC's top 50 most disruptive companies in the world.


Security
327 Employees

The world's leading banks, airlines, retailers, hotel chains, and federal agencies rely on Shape as their primary line of defense against sophisticated cybercrime. The Shape technology platform, covered by 50+ patents, stops automated fraud and other attacks on web and mobile applications, including credential stuffing, account takeover, scraping, and unauthorized aggregation. Shape is one of the largest processors of login traffic in the world and protects more than 1.3 billion user accounts. Shape prevented more than $1 billion in fraud losses last year. Shape was recognized in Fortune Magazine as one of the leading companies in artificial intelligence in 2018 and listed in CNBC's top 50 most disruptive companies in the world.


Security
85 Employees

4iQ is an identity intelligence company on a mission to empower intel analysts, security researchers, and criminal investigators with capabilities to discover, uncover, and disrupt adversaries. The 4iQ IDLake™ archives more than 14 billion identity records collected from open sources on the deep and dark web from breaches and other open sources. It powers, 4iQ IDHunt, a pioneering identity intelligence and attribution analysis solution used by Fraud Investigation Units, Anti-Money Laundering and Financial Crime Intel Units, and advanced Security Operations Centers. The 4iQ IDLake™ also powers 4iQ IDTheft, used by some of the largest Identity Theft Protection service providers to alert millions of consumers of exposed personal information. 4iQ is headquartered in Los Altos, CA and backed by Forgepoint Capital, C5 Capital, Adara Ventures, and Benhamou Global Ventures. [email protected] @4iq


Security
131 Employees

Bromium pioneered the next generation of endpoint protection that eliminates breaches. Just as virtualization transformed IT, Bromium is transforming security with its unique micro-virtualization technology. Bromium provides the world’s most advanced endpoint security, even against the most sophisticated zero-day malware. Unlike traditional security technologies, such as AV or virtual containers, which rely on detection, Bromium’s solution automatically isolates each user-task in a lightweight, CPU-enforced micro-VM. This enables users to click on anything without risk of compromise, protecting the enterprise. Bromium’s technological innovations have earned the company numerous industry awards.


Security
26 Employees

Outloud Group is a Detroit-based influencer marketing agency that specializes in media planning and talent representation.


Security
131 Employees

Bromium pioneered the next generation of endpoint protection that eliminates breaches. Just as virtualization transformed IT, Bromium is transforming security with its unique micro-virtualization technology. Bromium provides the world’s most advanced endpoint security, even against the most sophisticated zero-day malware. Unlike traditional security technologies, such as AV or virtual containers, which rely on detection, Bromium’s solution automatically isolates each user-task in a lightweight, CPU-enforced micro-VM. This enables users to click on anything without risk of compromise, protecting the enterprise. Bromium’s technological innovations have earned the company numerous industry awards.


Security
389 Employees

Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. By implementing least privilege access, Centrify minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity and costs for the modern, hybrid enterprise. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse.


Security
88 Employees

Level 10 is a for hire blockchain development company that builds blockchain, hyperledger and other Distributed Ledger Based products.


Security
32 Employees

Peerlyst is a social network exclusively for security professionals. Our community is an unbiased platform for security news, product reviews, discussions, and networking. Users range from consultants to CISOs, making us the best place to network with security professionals all over the world. Peerlyst is completely ad and spam free. Our motto is "the world is your analyst"​ because we connect peers to provide each other with authentic, unbiased information.


Security
1,418 Employees

CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service — all delivered via a single lightweight agent.


Security
16 Employees

Based in Silicon Valley, ShareRoot is positioned to become a major player in the marketing data and privacy protection ecosystem. The expanding global awareness around consumer data and privacy issues makes ShareRoot’s efforts and platforms more timely than ever. ShareRoot’s Legal Rights Management UGC platform was the first product the company created, with clients including Johnson and Johnson, McDonald's, and Costco. The company is currently in the process of launching their new MediaConsent platform which is the first platform to give consumers/citizens control of their data and privacy through a preference dashboard. The company also plans to integrate blockchain technology in order to further secure and guarantee the protection of data on its platforms and privacy of the consumers interacting with those platforms. For more information about ShareRoot please visit www.shareroot.co Check us out on the Australian Stock Exchange with our ticker symbol SRO


Security
58 Employees

SafeBreach helps answer the questions security leaders are being asked by their CEO/boards today - Are we secure?"​ and "Can a breach happen to us?"​ Our platform simulates hacker breach methods across the entire kill chain to identify breach scenarios in your environment before an attacker does. Think of it as your very own "virtual hacker"​ that performs continuous security validation so you can: - quantify your enterprise risks - validate your existing security controls - weaponize your threat intelligence We’re looking for hackers and trailblazers to join us. If you're passionate about technology and like to break things, we want to hear from you! Join us, and make an impact!


Security
230 Employees

Vectra® uses artificial intelligence to automate real-time cyber attack detection and response – from network users and IoT devices to data centers and the cloud. All internal traffic is continuously monitored to detect hidden attacks in progress. Detected threats are instantly correlated with host devices that are under attack and unique context shows where attackers are and what they are doing. Threats that pose the biggest risk to an organization are automatically scored and prioritized based on their severity and certainty, which, enables security operations teams to quickly focus their time and resources on preventing and mitigating loss. https://vectra.ai


Security
147 Employees

HyTrust’s mission is to make private, public and hybrid cloud infrastructure more trustworthy for enterprises, service providers and government agencies. HyTrust provides solutions that automate security controls for software-defined computing, networking and storage workloads to achieve the highest levels of visibility, granular policy control and data protection. HyTrust customers benefit from being able to accelerate cloud and virtualization cost savings while improving their security posture by automating and enforcing security policies in real time, adapting quickly to compliance requirements, and preventing unplanned outages.


Security
154 Employees

Menlo Security's patented Isolation Platform protects organizations from cyber attack by eliminating the threat of malware. The Platform isolates and executes all Web content in the cloud, enabling users to safely interact with websites, links and documents online without compromising security. Menlo Security is trusted by some of the world’s largest enterprises, including Fortune 500 companies and financial services institutions. The company is headquartered in Menlo Park, California. For more information, visit http://www.menlosecurity.com or @menlosecurity.


Security
127 Employees

SS8, the network intelligence company, provides solutions to help customers quickly identify, track and investigate suspects and devices of interest. By generating, storing and analyzing months, and even years, of high-definition records extracted from network packets, SS8 customers gain unprecedented intelligence for investigating what matter most. SS8 is trusted by six of the largest intelligence agencies, eight of the 14 largest communications providers and five of the largest systems integrators.