Explore Top Tech Companies
All Filters
Remote jobs

Industry

DEI

Tech Stack

Perks

Size

Top Tech Companies (116)

Don't see your company?

Create a company profile
Security
Sacramento, California, USA

Contact American Global Security today if you require the most professional VIP protection and personal security services available. Our specialists will assist you in determining the best security measures for your specific needs, ensuring that you are getting the best.


Artificial Intelligence • Information Technology • Security • Software

We simplify endpoint protection. Ziften’s endpoint protection platform is one product with one agent delivering best-in-class zero-day protection, complete investigation, the most flexible response, plus security posture analysis. The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have.


Security
San Francisco, California, USA

We are San Francisco's #1 Security Guard Company! American Global Security invites you to contact us today to learn more about our customized security solutions for your Grand Junction business, event, or personal need.


Security

HID powers the trusted identities of the world's people, places and things. Every day millions of people in more than 100 countries use our products and services to securely access physical and digital places. Over 2 billion things that need to be identified, verified and tracked are connected through HID Global’s technology.


Security

Whisel makes it easy to make responsible choices about personal security. Whisel is a network of trained and licensed personal security professionals who are on the ground in city neighborhoods. Coordinated through the Whisel app, our Security Partners are available to be there—at your side—just in case.


Fintech • Security
Austin, Texas, USA

Based in Austin, Texas, Solis was founded in 2003 as an Information Security company focused on helping financial institutions build robust and effective security programs. Today, Solis now helps companies across industries throughout the country to solve their business problems with a holistic approach including information security and information technology services. Solis also offers a full range of managed IT services to augment your technical engineering and support resources. Our managed services practice has earned awards relating to our ability to deliver service excellence and our ability to develop automated solutions. We are not a cookie cutter tech support shop, we get to know your business, your culture and your expectations to custom deliver a effective solution.


Security • Software
2 Employees

Groove.id helps SMB IT teams simplify & secure employee access to all the technology used at work. Our identity & access management platform is a central place to automate, manage & control access across all your software applications. Groove.id helps save IT time, ensure everyone has the right access (nothing more) and avoid wasted software fees.


Internet of Things • Productivity • Sales • Security

Safer Technologies formerly Campus Watch is a personal security platform that helps people access first responders when in danger. We serve a variety of commercial applications across multiple industries. We help companies bring better security to their human assets through aggregation and geolocation.


Information Technology • Internet of Things • Security • Software
Austin
42 Employees

HYAS, a First Nations word meaning “great and powerful,” is the world’s leading authority on cyber adversary infrastructure and communication to that infrastructure. HYAS provides the industry’s first security solution that integrates into an organization’s existing security technology stack to proactively detect and mitigate cyber risks before attacks happen and identify the infrastructure where attacks originate. Threat and fraud response teams use HYAS to hunt, find, and identify adversaries while enterprises can proactively block phishing and ransomware attacks at the network layer. With HYAS, enterprises are able to adopt a more proactive and adaptive security posture that protects against both known and not-yet-launched attacks, and identifies the infrastructure adversaries use to launch attacks.


Hardware • Information Technology • Professional Services • Security
5 Employees

We offer network administration, desktop, mobile device support, and deployment services for a variety of technologies. We also offer web, email, application and cloud services hosting and management. If it has a power plug, we can likely help you with it. We are open when our clients are open is our motto. With over 2 decades in technology services in the region many of our customers began as a one person operation and now have multiple locations in multiple states.


Security

Kaprica Security Inc. is expert in mobility and security, providing hosted and on-premise solutions. Kaprica was founded in 2011 by a team of cyber security experts from Lockheed Martin and Carnegie Mellon University, with the goals of delivering high quality cyber security services to a wide government and enterprise audience, and simultaneously developing easy to use and deploy software tools to support them. Today, clients range from DARPA, to the Department of Transportation, Lockheed, Intel and the University of Maryland. Kaprica is a Silver-Level Samsung partner and its enterprise software products include the Skorpion™, Tachyon™ and RunSafe™ lines and associated patents. Kaprica is headquartered just outside Washington, DC, in Reston, VA, with offices in Austin, TX. Learn more at www.kaprica.com. 


Security

Identropy is a leading Identity and Access Management consulting services firm with over 12 years of experience delivering IAM success. We help clients build successful IAM programs by combining vendor agnostic advisory with deep and broad technology implementation expertise.


Cloud • Security

CloudEntr brings simplicity and security to your cloud-based business applications. It lets your business take advantage of the cloud, without giving up control over who’s accessing business data or burdening employees with complex password policies. Whether you are running a small shop or building a business empire, CloudEntr lets you focus on your future by securing and simplifying cloud application access.


Blockchain • Security

Transmute builds next-gen cloud-based identity management solutions for enterprises, leveraging blockchain technology to streamline and enforce identity authorization via key-based signatures, verifiable credentials, and immutable logging.


Security

We provide testing, visibility, and security solutions to strengthen applications across physical and virtual networks. Organizations use our tools and capabilities to test, secure and visualize their networks so their applications run stronger.


Security

Threatcare simplifies product evaluations, security controls monitoring, carrying out on-demand simulations, and training security staff.


Security • Software
15 Employees

SiteOwl helps security system owners and integrators easily design, install, and manage incredible security solutions. SiteOwl seamlessly integrates all aspects of security integration and system ownership into a simple, powerful workflow.


Information Technology • Security • Software
20 Employees

Most cybersecurity companies take a defensive approach — seeking to prevent known adversaries and cyber threats from penetrating your defenses. We play offense. Infocyte helps security teams proactively detect and respond to hidden and unknown threats (the sophisticated attacks that prevention and defensive tools are prone to miss).


Blockchain • Security • Software • Cryptocurrency • Web3
Fully Remote, USA
23 Employees

Unit 410 is an experienced team of security, infrastructure, and cryptocurrency engineers. We empower the largest stakeholders to use their crypto in secure and novel ways. To do so, we build institutional-grade systems and solutions for secure network participation. Before Unit 410, we’ve worked at companies like Coinbase, Google, and NASA’s Jet Propulsion Laboratory. We’ve long believed in the potential of cryptocurrency and are excited to continue pushing forward the state of the art through industry-leading key generation, encryption, and network participation. As we engineer systems and solutions, we often find pieces that we think should exist. So we build them, and whenever possible share those back with the community.


Information Technology • Security • Software • Business Intelligence • Cybersecurity
Austin, Texas, USA
61 Employees

Living Security’s mission is to transform human risk to drive dramatic improvement in human behaviors, organizational security culture, and infosec program effectiveness. With our Human Risk Management platform, Living Security engages each employee with innovative and relevant context and content, while simultaneously providing the ability for leadership to identify, report on and directly mitigate the risk brought on by human behavior. Living Security is trusted by security-minded organizations like MasterCard, Verizon, MassMutual, Biogen, AmerisourceBergen, Hewlett Packard, and Target. Learn more at www.livingsecurity.com.