logo

Cyber Security Suppliers Directory


Kiuwan

Kiuwan

Kiuwan is a global organization providing an end-to-end application security platform. Our tools are designed to help your team identify vulnerabilities in your application code security.

MORE INFO

Snyk

Snyk

Our combination of developer-first tooling and best-in-class security intelligence enables businesses to build security into their continuous development process. Our core values support our connected culture, defining and strengthening us as we grow.

MORE INFO

ThreatLocker

ThreatLocker

ThreatLocker® combines Application Whitelisting with Ringfencing™ and Storage Control in ways that make security simple.

MORE INFO

Replicated

Replicated

Replicated helps software vendors quickly and easily deploy their applications to any customer using a single architecture.

MORE INFO

Synopsys

Synopsys

Synopsys technology is at the heart of innovations that are changing the way people work and play. Self-driving cars. Machines that learn. Lightning-fast communication across billions of devices in the datasphere. 

MORE INFO

Teleport

Teleport

Open source Teleport was designed to provide access to the infrastructure you need without slowing you down. With a single tool, engineers and security professionals get unified access to Linux and Windows servers, Kubernetes clusters, databases and DevOps applications like CI/CD, version control, and monitoring dashboards across all environments.

MORE INFO

Tenable

Tenable

Tenable®, Inc. is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk.

MORE INFO

Waratek

Waratek

Waratek is an award-winning pioneer in the next generation of application security solutions.  Using patented runtime protection technology, Waratek makes it easy for teams to secure business critical applications and securely extend the life of their legacy applications. 

MORE INFO

Webroot

Webroot

Webroot, an OpenText company, was the first to harness the cloud and artificial intelligence to stop zero-day threats in real time. Webroot secures businesses and individuals worldwide with threat intelligence and protection for endpoints and networks.

MORE INFO

White Source

White Source

WhiteSource helps companies secure their software by not only detecting vulnerabilities, but also by fixing them. As the pioneer of software composition analysis (SCA), WhiteSource has been a leader in open source application security for more than 10 years, and now offers custom code security through static application security testing (SAST). 

MORE INFO

Wiz

Wiz

Wiz redefines cloud security, combining what used to be addressed by standalone CSPM and CWPP products with our innovative Cloud Risk Engine to reveal effective risk.

MORE INFO

Zenity

Zenity

Zenity is the first and only governance and security platform for low-code/no-code applications. Zenity creates a win-win environment where IT and information security can give business and pro developers the independence they want to move the business forward while retaining full visibility and control.

MORE INFO

Akamai

Akamai

The Akamai Intelligent Edge is a place where proximity, scale, security, and innovation work together. All backed by a team of experts to help you unlock its full potential.

MORE INFO

Algosec

Algosec

Easily visualize and automate application connectivity and security policy across your entire hybrid network estate.

MORE INFO

Bridgecrew

Bridgecrew

Bridgecrew automates Cloud Security Posture Management, provides remediations as code, and streamlines the entire process from commit to cloud. 

MORE INFO

Checkmarx

Checkmarx

Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world’s developers and security teams. As the AppSec testing leader, we deliver the unparalleled accuracy, coverage, visibility, and guidance our customers need to build tomorrow’s software securely and at speed.  

MORE INFO

Contrast Security

Contrast Security

The only unified security platform built to get secure code moving through the entire application development pipeline and continuously protect your apps across the complete software lifecycle.

MORE INFO

DigitalXRAID

DigitalXRAID

DigitalXRAID are an award-winning managed security services provider dedicated to providing our clients with state-of-the-art cyber security solutions. We specialise in Vulnerability Management, Threat Intelligence, Information Security, PCI-DSS, Penetration Testing, Managed Security Services, Security Consultancy, and offer a fully managed Security Operations Centre (SOC) for your complete cyber security protection. 

MORE INFO

Drawbridge

Drawbridge

Drawbridge is a premier provider of cybersecurity software and solutions and a trusted partner to more than 600 funds in the alternative investment industry and their portfolio companies, with more than $1.3 trillion in Assets Under Management.

MORE INFO

Dynatrace

Dynatrace

Dynatrace provides software intelligence to simplify cloud complexity and accelerate digital transformation.

MORE INFO

F5

F5

F5’s portfolio of automation, security, performance, and insight capabilities empowers our customers to create, secure, and operate adaptive applications that reduce costs, improve operations, and better protect users. 

MORE INFO

Fastly

Fastly

Develop, deliver, and secure your apps and websites with Fastly’s powerful edge cloud network.

MORE INFO

Grammatech

Grammatech

At GrammaTech, we help our customers, partners, and government sponsors solve the most challenging software issues of today and tomorrow, safeguarding embedded mission-critical devices from failure and cyber attack.

MORE INFO

Guardsquare

Guardsquare

We’re a team of passionate developers dedicated to making the future of mobile secure. Out of our offices in Leuven (Belgium), Munich (Germany), Ontario (Canada) and Boston (USA), we’ve had the privilege of developing and supporting a suite of mobile app security solutions for businesses across industries, ranging from financial services to e-commerce, gaming and media.

MORE INFO

HCL Software

HCL Software

Powerful DevSecOps pinpoints application vulnerabilities, allowing for quick remediation in every phase of the development lifecycle. HCL AppScan delivers best-in-class application security testing tools to ensure your business and your customers are not vulnerable to attacks.

MORE INFO

Immersive Labs

Immersive Labs

You don’t need us to tell you that attacks and breaches happen. What’s most important is an organization’s response, and that response can’t be put solely in the virtual hands of technology, automation or artificially intelligent machines. The cyber humans of your business must stand prepared in the face of emerging threats.

MORE INFO

Invicti Security

Invicti Security

We’re a global team which provides solutions to ensure that web applications stay as safe as can be, helping organizations automate detection, streamline operations, anticipate threats and act fast.

MORE INFO

Jscrambler

Jscrambler

Jscrambler brings cutting-edge protection to Web and mobile hybrid apps

MORE INFO

Layer7

Layer7

2 out of 3 SAP systems experience security breaches. Protect your SAP applications against cyber threats with the Cybersecurity Extension for SAP Solutions

MORE INFO

NTT Application Security

NTT Application Security

Accelerating Application Security to the Speed of Modern Development

MORE INFO

Nucleus Security

Nucleus Security

Nucleus is on a mission to solve the real problems that organizations are facing with their vulnerability management programs, from end to end. 

MORE INFO

Onelogin

Onelogin

The Next Generation Identity and Access Management Protect your organization by securing and centralizing your applications, devices, and end-users all-in-one place.

MORE INFO

Security Compass

Security Compass

Our Balanced Development Automation platform enables you to build digital products faster by automating proactive security processes.

MORE INFO

ShiftLeft

ShiftLeft

With ShiftLeft CORE, developer-friendly workflows are the first principle. In order to maximize developer efficiency, the CORE workflow inserts into pull requests with fast feedback so developers can find and fix vulnerabilities within the code they are already working on.

MORE INFO

Trellix

Trellix

When your security learns and adapts at the speed of dynamic and malicious actors, tomorrow’s threats become today’s protection. We call this living security.

MORE INFO

TrustedSite

TrustedSite

Our agentless vulnerability scanning and discovery solutions, combined with manual penetration testing services, help thousands of organizations gain full visibility into the risk posture of their websites and applications.

MORE INFO