Security software companies (158 found)
NordLayer helps organisations secure networks in a stress-free way. They enhance internet security and modernise network and resource access with technical improvements aligning with the best regulatory compliance standards. Helping organisations to adopt ZTNA and SWG principles, NordLayer is focused on the Security Service Edge of cybersecurity services. Quick and easy to integrate with existing infrastructure, hardware-free, and designed with ease of scale in mind, NordLayer meets the varying growth pace and ad-hoc cybersecurity requirements of agile businesses and distributed workforces today.
451 Research is a preeminent information technology research and advisory company. They have a core focus on technology innovation and market disruption, and provide essential insight for leaders of the digital economy. 451 Research analysts cover emerging technology segments such as cloud computing, datacentre technologies and mobility. Founded in 2000 and headquartered in New York, 451 Research is a division of The 451 Group.
8th Sensus Inc. represents a revolution in the identity access management space. They have completely removed passwords, pins, tokens, complicated hardware and recovery procedures with unique behaviours.
A+ Technology & Security Solutions, Inc. is the provider-of-choice for customers seeking integrated, state-of-the-art technology, including a wide range of security, IT infrastructure and audio/video solutions. Their solutions and services are employed by customers across many industries, including K-12, higher education, commercial and industrial, governments and municipalities, healthcare and transportation.
Abacus Group is an innovative, award-winning IT service provider focused on helping alternative investment firms by providing an enterprise technology platform specifically designed for the unique needs of the financial services industry.
ABI Research delivers digital business initiatives for Fortune 500 companies, technology startups, and governments throughout the world. Their services include reports, market data, executive foresights and analysis of compelling transformative technologies. Some of their leading research services include AI and machine learning, M2M, Iot & IoE, Digital security, Smart cities & spaces, to name a few.
Actuate automatically detects firearms in existing security camera feeds, providing early warning and dramatically improving law enforcement response. The software provides first responders with real-time intelligence on the suspect, allowing them to neutralise the threat and render aid to victims much more rapidly than before.
ACV is a high-growth technology company that provides a vibrant digital marketplace for wholesale vehicle transactions and data services. ACV's marketplace called ACV Auctions offers transparent and accurate vehicle information to customers powered by technology innovations and data insights.
Adirondack Direct is a one-stop shop for quality commercial products, services, and support. They provide services such as surveillance & 24/7 monitoring, digital signage, audio systems, music licensing, installation products & services, custom flooring and many more.
Advanced Alarm, Inc. designs, installs, monitors and services a full line of security products for residential and commercial applications. Their range of products and solutions include home automation, intrusion detection, perimeter protection, wireless smoke and heat detectors, video surveillance and security alarm solutions.
The American Conference Institute have developed and hosted conferences, summits and executive briefings providing the business intelligence that decision makers need, to react decisively and effectively to challenges and opportunities in the marketplace.
Antar-Com, Inc. specialises in bridging the gap between highly developed electronic communications and security technologies. As system integrators, we work with over 500 different suppliers and vendors to design, install and maintain state-of-the-art, turn-key communication and security & access control systems.
Apiiro enables security & development teams to proactively remediate critical risks in their cloud-native applications such as design flaws, secrets, IaC misconfigurations, API & OSS vulnerabilities across the software supply chain.
Applied Sciences Group provides technically superior software engineering solutions for applications involving research, industrial and manufacturing environments, design-oriented engineering services, technical project management, and training.
AppViewX is an advanced cybersecurity and network management, automation and orchestration platform provider for Enterprise IT organisations. The AppViewX Platform is a modular, low-code software application that enables the automation and orchestration of network infrastructure using an intuitive, context-aware, visual workflow.
Armstrong Fluid Technology is known as an innovator in the design, engineering and manufacturing of intelligent fluid-flow equipment. This global fluid technology solutions company's solutions are applied in residential, commercial and industrial installations in some of the worlds premier facilities.
Asher Group has grown from a one-person solutions firm originally known as Sam Asher Computing Services, Inc., into a well-respected computer systems integrator of business and IT services with a focus on communications technology. They have hundreds of clients across three continents.
Atakama is the pioneer in multifactor encryption, enabling unrivaled data protection through distributed cryptographic key management. Organisations rely on Atakama to protect their most sensitive data, even when identity and rules-based access controls fail. Atakama removes the conventional trade-off between data security and accessibility to protect data, simplify the user experience, and visualise data usage and security trends.
AT&I is the premier Security Technology Solutions provider in South Florida. They work with building owners, property managers, corporations, government agencies, and not-for-profit organisations to deliver true integrated technology-based security solutions.
Augury is a pioneer in digitisation of manufacturing organisations by providing the foundational element of AI-based machine health and performance insights in real-time. Augury’s full-stack IIoT solution and turnkey approach uncovers machine health blindspots and provides value to industrial customers from day one and drives scalable performance from the plant to the global level.
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. They provide cybersecurity asset management, security SaaS, asset inventory, IT asset visibility, cybersecurity solutions, network security, security policy validation, and cyber hygiene.
Behavioral Science Applications LLC provides telephonic operational support sessions in online meeting rooms to address issues of task saturation, burn-out, and the powerful effects of stress on key personal, such as executive leaders, Incident Management - Crisis Management Team members, and others. These sessions are facilitated by highly experienced behavioral health experts familiar with working in the most extreme stress environments.
Beyond Identity provides the most secure authentication platform in the world. Breaking down barriers between cybersecurity, identity, and device management, Beyond Identity fundamentally changes the way the world logs in–eliminating passwords and providing users with a frictionless multi-factor login experience. Beyond passwordless, the company provides the zero-trust access needed to secure hybrid work environments.
BigID’s data intelligence platform helps organizations proactively discover, manage, protect, and get more value from their regulated, sensitive, personal, and critical data across their data landscape.
Blue Bite is an IoT software platform that connects physical products to the internet through NFC technology. With Blue Bite's patented technology, companies create and deliver personalised and dynamic content, increasing product value and improving customer experiences.
BlueVoyant is an analytics-driven cyber security company based in New York City, whose mission is to defend businesses around the world against agile and well-financed cyber attackers by providing unparalleled visibility, insight and responsiveness.
Browse security companies
Related white papers
How to overcome the storage challenges of adopting surveillance AI
How to get buy-in from IT departments on IP video installations
Wavestore and the Linux advantage
Upcoming security events in United States of America (USA)
CES 2025
- 7 - 10 Jan, 2025
- Las Vegas, United States of America (USA)
SANS Cyber Threat Intelligence Summit & Training 2025
- 27 - 3 Jan, 2025
- Virginia, United States of America (USA)
SPIE Photonics West 2025
- 28 - 30 Jan, 2025
- San Francisco, United States of America (USA)
UAV Technology USA 2025
- 3 - 4 Feb, 2025
- Arlington, United States of America (USA)
Zero Trust World 2025 (ZTW25)
- 19 - 21 Feb, 2025
- Orlando, United States of America (USA)
Aprés-Cyber Slopes Summit 2025
- 6 - 7 Mar, 2025
- Dr Park City, United States of America (USA)
20th International Conference on Cyber Warfare and Security
- 28 - 29 Mar, 2025
- Williamsburg, United States of America (USA)
ISC West 2025
- 31 - 4 Mar, 2025
- Las Vegas, United States of America (USA)
Innovate Cybersecurity Summit – Nashville 2025
- 6 - 8 Apr, 2025
- Nashville, United States of America (USA)
Community Risk Reduction Leadership Conference 2025
- 13 - 15 May, 2025
- Glendale, United States of America (USA)
SIA GovSummit 2025
- 20 - 21 May, 2025
- Washington, DC, United States of America (USA)
Security LeadHER 2025
- 9 - 10 Jun, 2025
- Detroit, United States of America (USA)
Prevention Strategies Conference 2025
- 23 - 24 Jun, 2025
- Las Vegas, United States of America (USA)
ISC East 2025
- 18 - 20 Nov, 2025
- New York, United States of America (USA)
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
DownloadEnhanced security with S617 video door station
Remote Guarding Video Series Part 1: Overview and Basics.
Remote Guarding Video Series Part 5: Future and Technology