Software services in San Francisco (67 found)

3Data offers the most advanced 3D platform currently on the market for Operations and IT, helping organisations make critical decisions quickly through remote, real-time data modeling and visualisation.

Abnormal Security provides the leading cloud-native email security platform that leverages behavioural data science to stop modern email attacks. The Abnormal Security platform uses an innovative AI-based approach that deeply understands the people, relationships, and business processes to stop the most sophisticated cyber-attacks.

Appthority deals with protection against mobile cyber attack. The company provides solutions like Appthority MTP which is the only mobile threat defense solution that fully protects enterprises from mobile threats to enterprise data and employee privacy. Appthority solutions go beyond simple classification of malware and malicious apps, they uncover high impact threats to company data and privacy that other solutions can’t find.

Autodesk is changing how the world is designed and made. Technology spans architecture, engineering, construction, product design, manufacturing, media, and entertainment, empowering innovators everywhere to solve challenges big and small. From greener buildings to smarter products to more mesmerising blockbusters, Autodesk software helps customers to design and make a better world for all.

Accelerating change, growth, and success. CE/ IoT Partners and BlueSalve are now bluesalve partners. Global consultancy with a core focus on Consumer Technology, Consumer #IoT, and Consumer Goods. Bring together some of the most experienced minds in the industry to help strengthen and grow the business.

BreachRx streamlines and automates the incident reporting & response processes. Reduce risk and stay agile by continuously maintaining tailored and automated response plans taking into account the impact of constantly shifting contractual and regulatory requirements so incidents stay routine instead of escalating into a crisis.

Bugcrowd is a crowdsourced security company. It offers a pay-for-results security platform that plugs on-demand expertise into organisations. The security platform combines contextual intelligence with actionable skills from the world’s security researchers to help organisations identify and fix critical vulnerabilities before attackers exploit them.

C3M Cloud Control is a 100% API based Cloud Security Posture Management and Compliance Assurance platform that offers an enterprise complete cloud control through actionable cloud security intelligence across your AWS, GCP, and Azure infrastructure. They provide cloud security, compliance, real-time visbility, automation and much more.

Civic Technologies allows people to control the use of their identity information by providing a secure identity platform. The company uses blockchain identity verification technology to secure and protect personal information transfer.

The Cloud Native Computing Foundation (CNCF) hosts critical components of the global technology infrastructure. CNCF brings together the world’s top developers, end users, and vendors and runs the largest open source developer conferences. Cloud native computing uses an open source software stack to deploy applications as micro-services, packaging each part into its own container, and dynamically orchestrating those containers for resource use.

Coalition is the world’s first Active Insurance company, designed to prevent digital risk before it strikes. The team at Coalition brings together in-depth technology, cybersecurity, and insurance expertise, applying near real-time data to help organizations assess, prevent, and cover an emerging set of digital risks.

Corelight is one of the most powerful network visibility solution for information security professionals. The company provide real-time data that organisations use to understand, detect, and prevent cyber attacks. Their cyber security solution is built on Zeek, the powerful and widely-used open source monitoring framework. They also provide Intrusion Detection, Cyber Security, Zeek, Network Security Monitoring, NSM, Network Traffic Analysis.

Cribl, the Data Engine for IT and Security, empowers organisations to transform their data strategy. Powered by a data processing engine purpose-built for IT and Security, Cribl’s product suite is a vendor-agnostic data management solution capable of collecting data from any source, processing billions of events per second, automatically routing data for optimized storage, and analyzing any data, at any time, in any location.

Cybellum enables automotive OEMs and their suppliers to continuously manage their cyber security risks. They provide Cyber Security, Automotive, Risk Assessment, Firmware Analysis, Vulnerability Management, ISO 21434, UNECE WP.29, and Compliance Validation

CyberCube delivers data-driven cyber analytics built specifically for the insurance industry. CyberCube is focused on solving the most difficult and important cyber risk challenges in insurance with world-class analytics. They provide Cyber Insurance, Cyber Security, Cyber Insurance Analytics, Insurance Analytics, Cyber Underwriting , and Cyber Risk Modeling services.

Databricks is a data and AI company. More than 5,000 organizations worldwide — including Comcast, Condé Nast, H&M, and over 40% of the Fortune 500 — rely on the Databricks Lakehouse Platform to unify their data, analytics and AI.

Digital Shadows minimises digital risk by identifying unwanted exposure and protecting against external threats. Organisations can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital Shadows SearchLight helps users minimise these risks by detecting data loss, securing their online brand, and reducing attack surface.

Domotz was founded in 2015, and is currently one of the premier remote monitoring and management platform. They offer network management software for integrators, security professionals, and business owners. They provide network support and diagnosis in more than 90 countries.

Expanse protects the world’s most important organizations by discovering risks on the Internet no one else can find. They provide cybersecurity, network security, internet security, enterprise software, SaaS, attack surface management, vulnerability management, asset inventory, cloud governance and much more.

Fastly helps the world’s most popular digital businesses keep pace with their customer expectations by delivering fast, secure, and scalable online experiences. Businesses trust the Fastly edge cloud platform to accelerate the pace of technical innovation, mitigate evolving threats, and scale on demand.

ForgeRock is the digital identity management company transforming the way organisations interact securely with customers, employees, devices, and things. Organisations adopt the ForgeRock Identity Platform as their digital identity system of record to monetise customer relationships, address stringent regulations for privacy and consent, and leverage the internet of things.

GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate and build software. From idea to production, GitLab helps teams improve cycle time from weeks to minutes, reduce development costs and time to market while increasing developer productivity.

Handle.com is construction software that helps contractors and material suppliers to solve two giant issues within the industry: late payments and access to capital. Handle.com also provides funding for construction businesses in the form of invoice factoring, material supply trade credit, and mechanics lien purchasing.

Harbor is an open-source registry that secures artifacts with policies and role-based access control, ensures images are scanned and free from vulnerabilities, and signs images as trusted. Harbor, a CNCF Graduated project, delivers compliance, performance, and interoperability to help you consistently and securely manage artifacts across cloud-native compute platforms like Kubernetes and Docker.

HashiCorp is a remote-first company headquartered in San Francisco that solves development, operations, and security challenges in infrastructure so organisations can focus on business-critical tasks. They also deliver cloud infrastructure automation for operations, security, networking, and application delivery.

The NodeZero™ platform empowers organisation to continuously find, fix, and verify exploitable attack surfaces. Reduce security risk by autonomously finding weaknesses in the network, knowing how to prioritise and fix them, and immediately verifying that fixes work. NodeZero delivers production-safe autonomous pentests and other key assessment operations.

Instabase is democratising access to deep learning to empower any organization to solve unstructured data problems with unprecedented accuracy. From understanding complex financial data for the world’s largest banks to transforming manual processes for insurers and federal agencies alike, automating unstructured data represents the largest opportunity for digital transformation in the enterprise.

Joyent, Inc. is a team that pioneered public cloud computing (and hybrid cloud), nurtured and grew Node.js into a de facto standard for web, mobile and IoT architectures, and was among the first to embrace and industrialise containers, compute-centric object storage, and what is now coming to be known as serverless computing.

Kenna is a software-as-a-service Risk and Vulnerability Intelligence platform that accurately measures risk and prioritises remediation efforts before an attacker can exploit an organisation’s weaknesses.

Life360 is the world's largest network for families available for Android and iPhone. Using proprietary location-based technology and bank-level security, Life360 processes over 1.5 billion location requests per day and enables over 50 million families to stay coordinated and know that their loved ones are safe.

Upcoming security events in United States of America (USA)

Quick poll
Which feature is most important in a video surveillance system?