Software systems integrators in San Francisco (35 found)
Appthority deals with protection against mobile cyber attack. The company provides solutions like Appthority MTP which is the only mobile threat defense solution that fully protects enterprises from mobile threats to enterprise data and employee privacy. Appthority solutions go beyond simple classification of malware and malicious apps, they uncover high impact threats to company data and privacy that other solutions can’t find.
Autodesk is changing how the world is designed and made. Technology spans architecture, engineering, construction, product design, manufacturing, media, and entertainment, empowering innovators everywhere to solve challenges big and small. From greener buildings to smarter products to more mesmerising blockbusters, Autodesk software helps customers to design and make a better world for all.
BlackFog is a cybersecurity company that has pioneered on-device anti-data exfiltration (ADX) technology to protect companies from global security threats such as ransomware, spyware, malware, phishing, unauthorized data collection and profiling. Its software monitors enterprise compliance with global privacy regulations and prevents cyberattacks across all endpoints.
Civic Technologies allows people to control the use of their identity information by providing a secure identity platform. The company uses blockchain identity verification technology to secure and protect personal information transfer.
The Cloud Native Computing Foundation (CNCF) hosts critical components of the global technology infrastructure. CNCF brings together the world’s top developers, end users, and vendors and runs the largest open source developer conferences. Cloud native computing uses an open source software stack to deploy applications as micro-services, packaging each part into its own container, and dynamically orchestrating those containers for resource use.
Cloudflare, Inc. is the pioneering connectivity cloud company. It empowers organisations to make their employees, applications and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare’s connectivity cloud delivers the most full-featured, unified platform of cloud-native products and developer tools, so any organisation can gain the control they need to work, develop, and accelerate their business.
Cribl, the Data Engine for IT and Security, empowers organisations to transform their data strategy. Powered by a data processing engine purpose-built for IT and Security, Cribl’s product suite is a vendor-agnostic data management solution capable of collecting data from any source, processing billions of events per second, automatically routing data for optimized storage, and analyzing any data, at any time, in any location.
Domino powers model-driven business for the world’s most advanced enterprises, including over 20% of the Fortune 100. Enterprise MLOps platform speeds up the development and deployment of data science work while increasing collaboration and governance, to scale data science into a competitive advantage.
Domotz was founded in 2015, and is currently one of the premier remote monitoring and management platform. They offer network management software for integrators, security professionals, and business owners. They provide network support and diagnosis in more than 90 countries.
Expanse protects the world’s most important organizations by discovering risks on the Internet no one else can find. They provide cybersecurity, network security, internet security, enterprise software, SaaS, attack surface management, vulnerability management, asset inventory, cloud governance and much more.
Fastly helps the world’s most popular digital businesses keep pace with their customer expectations by delivering fast, secure, and scalable online experiences. Businesses trust the Fastly edge cloud platform to accelerate the pace of technical innovation, mitigate evolving threats, and scale on demand.
GitHub brings teams together to work through problems, move ideas forward, and learn from each other along the way. From flexible hosting to granular access controls, GitHub has got the security requirements of their clients covered.
Hopae is the digital identity technology provider that organisations use to transform identity verification management from a complex challenge into a strategic advantage. Hopae offers a comprehensive suite of solutions encompassing Decentralised Identity (DID) infrastructure, customisable SDKs, identity verification APIs, and eID-as-a-service, with a strong emphasis on hybrid verification processes.
The NodeZero™ platform empowers organisation to continuously find, fix, and verify exploitable attack surfaces. Reduce security risk by autonomously finding weaknesses in the network, knowing how to prioritise and fix them, and immediately verifying that fixes work. NodeZero delivers production-safe autonomous pentests and other key assessment operations.
Ignite Prism is the most comprehensive cloud intelligence platform. Through computer vision, Ignite Prism unlocks valuable information from video that can be immediately understood, shared, and acted upon.
Incode is the identity company that is reinventing the way humans authenticate and verify their identity online to power a world of trust. Incode’s products are being used by some of the world’s largest financial institutions, governments, marketplaces, hotels, and hospitals.
Joyent, Inc. is a team that pioneered public cloud computing (and hybrid cloud), nurtured and grew Node.js into a de facto standard for web, mobile and IoT architectures, and was among the first to embrace and industrialise containers, compute-centric object storage, and what is now coming to be known as serverless computing.
Kong Inc., a pioneering developer of cloud API technologies, is on a mission to enable companies around the world to become “API-first” and securely accelerate AI adoption. Kong helps organisations globally — from startups to Fortune 500 enterprises — unleash developer productivity, build securely and accelerate time to market
Lucidworks believes that the core to a great digital experience starts with search and browse. Lucidworks captures user behaviour and utilises machine learning to connect people with the products, content, and information they need. The world’s largest brands, including Crate & Barrel, Lenovo, Red Hat, and Cisco Systems rely on Lucidworks’ suite of products to power commerce, customer service, and workplace applications that delight customers.
Nozomi Networks provides industrial cyber security solutions for real-time visibility and efficient management of cyber threats, thereby improving resilience for industrial operations. They also provide cyber security, ICT, OT security, SCADA security, MES security, firewall integration, recognition and IIoT solutions.
Okera provides secure data access for innovation and growth. By ensuring that appropriate data access controls are in place and meet the evolving data privacy landscape, the Okera Active Data Access Platform can automatically discover and audit data lakes, create access policies using its visual policy engine, and enforce fine-grained access in hybrid and multi-cloud environments such as AWS and Azure.
OPSWAT protects critical infrastructure. The goal is to eliminate malware and zero-day attacks. They believe that every file and every device poses a threat. Threats must be addressed at all locations at all times—at entry, at exit, and at rest. Products focus on threat prevention and process creation for secure data transfer and safe device access. The result is productive systems that minimise the risk of compromise.
The Parablu team is led by security and data management experts with an illustrious track record of over three decades in engineering world-class software solutions used across thousands of enterprises globally. Their comprehensive suite of services includes cloud data backup, data backup software, and online data backup services, all tailored to meet the unique needs of modern enterprises.
Persona enables businesses to seamlessly verify customer identities with a drop-in widget that can be integrated into less than 10 lines of code. From selfie videos to government-issued IDs to database lookups, Persona offers a comprehensive suite of fully-automated identity verification components with worldwide coverage that can be configured, themed, and branded to create custom-tailored flows that cover any use case.
Pivotal offers a platform, tools, and methodology, for companies to unleash innovation and reduce time-to-market. Pivotal Cloud Foundry enables developers to spend more time writing code, and operators to improve security and uptime. The company provides solutions for the automotive, financial services, industrial, media, retail, government, technology, and telecommunications industries.
Pliancy specialises in providing end-to-end IT solutions and ongoing support for highest-executing Capital Management and Life Sciences organisations. Located in New York, San Francisco, Palo Alto, South San Francisco, San Diego, Austin, TX, and Boston, MA.
Radiant Security is an autonomous SecOps platform that automates security operations using machine learning and AI to triage and investigate incidents with consistency, accuracy, and scale only achievable via software. Deployed in minutes via API, Radiant Security provides rapid time to value and immediately reduces analyst workloads by as much as 95%.
Sift is the leader in Digital Trust & Safety, empowering digital disruptors to Fortune 500 companies to unlock new revenue without risk. Sift dynamically prevents fraud and abuse through industry-leading technology and expertise, an unrivaled global data network of 70 billion events per month, and a commitment to long-term customer partnerships.
The Linux Foundation is the organisation of choice for the world's top developers and companies to build ecosystems that accelerate open technology development and commercial adoption. Together with the worldwide open source community, it is solving the hardest technology problems by creating the largest shared technology investment in history.
Browse security companies
Related white papers
How to overcome the storage challenges of adopting surveillance AI
How to get buy-in from IT departments on IP video installations
Wavestore and the Linux advantage
Upcoming security events in United States of America (USA)
CES 2025
- 7 - 10 Jan, 2025
- Las Vegas, United States of America (USA)
SANS Cyber Threat Intelligence Summit & Training 2025
- 27 - 3 Jan, 2025
- Virginia, United States of America (USA)
SPIE Photonics West 2025
- 28 - 30 Jan, 2025
- San Francisco, United States of America (USA)
UAV Technology USA 2025
- 3 - 4 Feb, 2025
- Arlington, United States of America (USA)
Zero Trust World 2025 (ZTW25)
- 19 - 21 Feb, 2025
- Orlando, United States of America (USA)
Aprés-Cyber Slopes Summit 2025
- 6 - 7 Mar, 2025
- Dr Park City, United States of America (USA)
20th International Conference on Cyber Warfare and Security
- 28 - 29 Mar, 2025
- Williamsburg, United States of America (USA)
ISC West 2025
- 31 - 4 Mar, 2025
- Las Vegas, United States of America (USA)
Innovate Cybersecurity Summit – Nashville 2025
- 6 - 8 Apr, 2025
- Nashville, United States of America (USA)
RSA Conference 2025
- 28 - 1 Apr, 2025
- San Francisco, United States of America (USA)
46th IEEE Symposium on Security and Privacy
- 12 - 15 May, 2025
- San Francisco, United States of America (USA)
Community Risk Reduction Leadership Conference 2025
- 13 - 15 May, 2025
- Glendale, United States of America (USA)
SIA GovSummit 2025
- 20 - 21 May, 2025
- Washington, DC, United States of America (USA)
Security LeadHER 2025
- 9 - 10 Jun, 2025
- Detroit, United States of America (USA)
Prevention Strategies Conference 2025
- 23 - 24 Jun, 2025
- Las Vegas, United States of America (USA)
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
DownloadEnhanced security with S617 video door station
Remote Guarding Video Series Part 1: Overview and Basics.
Remote Guarding Video Series Part 5: Future and Technology