Security companies in California (144 found)
Orbital Insight is providing governments and businesses with objective, real-time data at a time when reliable information is scarce. They offer geospatial analytics to help government agencies, promote public health, reduce supply chain risk, and support business continuity.
Orca Security is the cloud security innovation pioneer, provides cloud-wide, workload-deep security and compliance for AWS, Azure, and GCP - without the gaps in coverage, alert fatigue, and operational costs of agents.
OSI Systems provides security and inspection systems, turnkey screening operations, and integrated solutions, all supported by a global service and maintenance network. They also provide specialised electronic components and electronic manufacturing services to their Security and Healthcare divisions.
Pacific National Security provide unmatched service and security solutions by creating a positive partnership with our security professionals and our clients.
Panasonic Avionics are recognized globally for the experience and leadership in product innovation and customisation, system reliability, and customer care. They provide NEXT Cloud platform, which can manage enterprise data, develop and deploy applications faster, and deliver actionable insights.
Panzura offers complete data management for the cloud age. Panzura’s multi-cloud data management platform is a single, unified data engine designed to securely power even the most rigorous, large scale multi-site enterprise data workflows across the globe. Intelligent edge technologies enable LAN performance with cloud economics together with simplified data management.
Pelion was originally founded as an incubation unit within Arm, the designer of key technologies at the heart of computing. With a unique combination of global IoT connectivity and device management from a single vendor, Pelion breaks down barriers to IoT adoption for anyone looking to transform their industry.
Permiso provides Cloud Identity Detection and Response and weaves events from different systems together to give the user a full story of what the identity of interest has been up to in the cloud.
Pfister is a renowned manufacturer of washroom equipment, faucets and plumbing fixtures for over 100 years now.
PGYTECH is a pioneering company creating accessories for drones and action cameras.
The Physical Security Interoperability Alliance is a global consortium of over 65 physical security manufacturers and systems integrators focused on promoting interoperability of IP-enabled security devices across all segments of the security industry. The company's currently five active working groups: IP video, video analytics, recording and content management, area control and systems.
Proofpoint provides the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, and social media.
Founded in 2016,Proxy's mission is to digitise identity and make it universally accessible, secure and private. Proxy revolutionises how people access the workplace and opens the door to smarter workplace experiences tailored to each individual.
Pure Storage helps innovators build a better world with data. Pure's data solutions enable SaaS companies, cloud service providers, and enterprise and public sector customers to deliver real-time, secure data to power their mission-critical production, DevOps, and modern analytics environments in a multi-cloud environment. Pure Storage enables customers to quickly adopt next-gen technologies, including AI to help maximise the value of their data.
Qualcomm Technologies provides end-to-end solutions which help users to manage their automated devices. Qualcomm provides smart homes solutions, secure home solutions, health care solutions, IoT security solutions, and more.
Radiant Security is an autonomous SecOps platform that automates security operations using machine learning and AI to triage and investigate incidents with consistency, accuracy, and scale only achievable via software. Deployed in minutes via API, Radiant Security provides rapid time to value and immediately reduces analyst workloads by as much as 95%.
RedSeal—through its cloud security solution and professional services —helps government agencies and Global 2000 companies measurably reduce their cyber risk by showing them what’s in all their network environments and where resources are exposed to the internet.
RetailNext is the first retail vertical IoT integrated platform to bring e-commerce style shopper analytics and optimising the shopper experience. RetailNext's analytics software and retail expertise have been adopted by more than 300 retailers in over 60 countries to increase sales, reduce theft, and eliminate unnecessary costs.
Revelstoke SOAR is the first low-code, high-speed Security Orchestration, Automation, and Response Platform built on a Unified Data Layer. Their next-gen SOAR gives SOC teams the power to work smarter, faster, and more effectively than ever before.
Rhombus Systems provides next-generation video security for modern enterprises, organisations, and partners around the world. Powered by the latest in AI and computer vision, the company unlocks a suite of powerful video security features including – cloud-management, facial recognition, people analytics, and seamless IT integrations.
Rubrik delivers instant application availability for recovery, search, cloud, and development. Hybrid Cloud enterprises benefit from Rubrik’s Cloud Data Management platform with simplicity, instant data access, app-mobility, policy-driven automation, Ransomware protection, and analytics at scale.
Ruckus Networks, an ARRIS company, provides wired and wireless networking equipment and software. The company provides solutions for physical security, network and data security. Their product range consists of software like Cloudpath Enrollment System, Ruckus IoT Suite and ICX Switches. Ruckus also provides training to their customers and partners on technology basics as well as wired and wireless product and solutions.
SafeBreach’s mission is to change the way the industry deals with security and risk, and enable companies to use the security technologies they have invested in to the fullest.
Salt Security delivers an API Threat Protection solution focused on securing the ubiquitous APIs connecting everything from web and mobile applications to microservices and IoT devices. These are the APIs that one develops and own and are at the core of connecting the applications and data.
Sciens Building Solutions is a trusted provider committed to delivering complete fire protection, security, communications and electrical solutions that not only protect lives but ensure business continuity of the customers, too.
Secu365 is a cloud-based security solution built to be flexible, without ever compromising security. Very easy to install and use, it is a system combining access control, remote video surveillance, time attendance and alarm contact sensor. It provides one platform and one integrated multi-site solution with no on-premises computers required.
Security Integration, Inc. is a reliable, advanced security company in California. They offer the latest video security technologies and surveillance solutions to help solve security challenges for schools, businesses, and homes. They also offer a comprehensive set of security services ranging from site survey and needs assessment to local installations, technical support, and post-installation maintenance.
Security Technology Group (STG) is a professional company specialising in corporate, retail, distribution and industrial security solutions.
Sentry's platform helps developers diagnose, fix, and optimize the performance of their code. Each day, Sentry processes billions of exceptions and transactions from some of the most popular products on the internet. With Sentry, developers around the world save time, energy, and probably a few therapy sessions.
The Shape technology platform, covered by 50+ patents, stops automated fraud and other attacks on web and mobile applications, including credential stuffing, account takeover, scraping, and unauthorised aggregation. Shape is one of the largest processors of login traffic in the world and protects more than 1.3 billion user accounts.
Browse security companies
Related white papers
The key to unlocking K12 school safety grants
Selecting the right network video recorder (NVR) for any vertical market
The security challenges of data centers
Upcoming security events in United States of America (USA)
CES 2025
- 7 - 10 Jan, 2025
- Las Vegas, United States of America (USA)
SANS Cyber Threat Intelligence Summit & Training 2025
- 27 - 3 Jan, 2025
- Virginia, United States of America (USA)
SPIE Photonics West 2025
- 28 - 30 Jan, 2025
- San Francisco, United States of America (USA)
UAV Technology USA 2025
- 3 - 4 Feb, 2025
- Arlington, United States of America (USA)
Zero Trust World 2025 (ZTW25)
- 19 - 21 Feb, 2025
- Orlando, United States of America (USA)
Aprés-Cyber Slopes Summit 2025
- 6 - 7 Mar, 2025
- Dr Park City, United States of America (USA)
20th International Conference on Cyber Warfare and Security
- 28 - 29 Mar, 2025
- Williamsburg, United States of America (USA)
ISC West 2025
- 31 - 4 Mar, 2025
- Las Vegas, United States of America (USA)
Innovate Cybersecurity Summit – Nashville 2025
- 6 - 8 Apr, 2025
- Nashville, United States of America (USA)
RSA Conference 2025
- 28 - 1 Apr, 2025
- San Francisco, United States of America (USA)
46th IEEE Symposium on Security and Privacy
- 12 - 15 May, 2025
- San Francisco, United States of America (USA)
Community Risk Reduction Leadership Conference 2025
- 13 - 15 May, 2025
- Glendale, United States of America (USA)
SIA GovSummit 2025
- 20 - 21 May, 2025
- Washington, DC, United States of America (USA)
Security LeadHER 2025
- 9 - 10 Jun, 2025
- Detroit, United States of America (USA)
Prevention Strategies Conference 2025
- 23 - 24 Jun, 2025
- Las Vegas, United States of America (USA)
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
DownloadEnhanced security with S617 video door station
Remote Guarding Video Series Part 1: Overview and Basics.
Remote Guarding Video Series Part 5: Future and Technology