Explore Top Tech Companies
All Filters
Remote jobs

Industry

DEI

Tech Stack

Perks

Size

Top Tech Companies (115)

Don't see your company?

Create a company profile
Security • Software
3 Employees

Suvola is a cybersecurity company creating solutions for the three major shortcomings of current information technology systems in use today. These three major shortcomings are in the areas of identity, tampering and authentication and are responsible for the vast majority of cybercrime.


Security

We provide testing, visibility, and security solutions to strengthen applications across physical and virtual networks. Organizations use our tools and capabilities to test, secure and visualize their networks so their applications run stronger.


Security • Software • Cybersecurity
Austin, Texas, USA
454 Employees

Invicti Security is an international web app security company whose mission is to keep web apps awesome and the internet a safe place to be. Everything we do is increasingly connected and if it’s connected, it’s vulnerable. 2020 is the Decade of Cybersecurity. Want to make waves in the digital defense industry, a $81.7b market? Join our team today!


Security
7 Employees

Leading a quiet revolution to get humans back in the center of technology.


Security

We believe in the power of open source. Companies increasingly use open source to build our technologies today, faster and cheaper. We make open source safe to use by bridging gaps found in application security and legal compliance. We believe that risk management needs to be automated to move as fast as developers code.


Security
3 Employees

<p><span style="color: rgb(51, 51, 51); font-family: Helvetica, Arial, sans-serif; line-height: 17px;">BeehiveID - verified online identity&nbsp;</span><br style="color: rgb(51, 51, 51); font-family: Helvetica, Arial, sans-serif; line-height: 17px;"><span style="color: rgb(51, 51, 51); font-family: Helvetica, Arial, sans-serif; line-height: 17px;">We use advanced identity technology, along with private and public data sources to establish the BeehiveID score - our measure of confidence that your users are backed by genuine, unique individuals.</span><br style="color: rgb(51, 51, 51); font-family: Helvetica, Arial, sans-serif; line-height: 17px;"><br style="color: rgb(51, 51, 51); font-family: Helvetica, Arial, sans-serif; line-height: 17px;"><span style="color: rgb(51, 51, 51); font-family: Helvetica, Arial, sans-serif; line-height: 17px;">Beehive is based upon years of experience working with a wide variety of identity technologies, including social network analysis, face recognition, semantic text analysis, machine learning, sentiment analysis, and temporal profiling. Our identity score can be customized to a wide variety of use cases, validating a weak identity claim: "I am not a bot" all the way to a specific person: "I am John Smith who lives at 123 Main Street in Austin, TX". Engagement with users can be accomplished via a single click to our service, allowing us to give you an identity score in near real time.</span></p>


Security

Authenticated Reality provides a gateway to The New Internet® by creating a more authentic experience for users surfing the web in an environment where, for the first time, all users are verified and all URLs are open for comments/ratings, ensuring a complete system of checks and balances, and putting an end to unreliable information and false identities online.


Security

Threatcare simplifies product evaluations, security controls monitoring, carrying out on-demand simulations, and training security staff.


Security • Travel

Base Operations helps citizens avoid the crossfire of crime and make better everyday decisions about their safety and security.


Security

Identropy is a leading Identity and Access Management consulting services firm with over 12 years of experience delivering IAM success. We help clients build successful IAM programs by combining vendor agnostic advisory with deep and broad technology implementation expertise.


Artificial Intelligence • Security • Software
34 Employees

Temperature Detection and Gun Detection to help save lives. Check out our new temperature detection system at http://athena-security.com/temperature-detection


Artificial Intelligence • Fintech • Machine Learning • Security
55 Employees

In a rapidly digitalising economy, the number one risk is fraud. SEON was born from the need for a better anti-fraud system. One that allows online businesses to accept more transactions safely while protecting consumers. Over 5000 merchants globally already agree with us, and we are well on our way to expand globally. Joining us means working with the latest technologies and methodologies, supporting globally recognised digital brands. As we expand our operations globally in a year of rapid growth, you will also face challenges and gain experience that cannot be gained elsewhere. We are young and energetic, focused and determined at work, but our attitude is laid back. We want to meet our goals together so we support each other even if we face unfamiliar situations which are not uncommon in a rapidly changing environment.


Security
Austin
122 Employees

DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know. The world's most advanced security teams use our solutions to identify external risks, investigate threats, and proactively protect their organizations in a constantly evolving threat landscape. DomainTools constantly monitors the Internet and brings together the most comprehensive and trusted domain, website and DNS data to provide immediate context and machine-learning driven risk analytics delivered in near real-time. Visit domaintools.com to experience firsthand why DomainTools is the first stop for advanced security teams when they need to know.


Security • Software

Absolute provides persistent endpoint security and data risk management solutions for computers, tablets, and smartphones. Our customers depend on us to provide them with a unique and trusted layer of security so they can manage mobility while remaining firmly in control. By providing them with a reliable two-way connection with all of their devices, our customers can secure endpoints, assess risk, and respond appropriately to security incidents.


Security • Software
3 Employees

Cybersecurity is not just a technology problem. It’s a workforce problem, and a management problem – and a board governance problem. The Cybersecurity Maturity Oversight Model (CMOM) is the missing link that provides immediate visibility into cybersecurity operations, enabling leaders to work together to mitigate enterprise cyber risk.


Cloud • Information Technology • Security • Software
Austin

ALTR is the only complete data control and protection solution that allows customers to know, control, and protect sensitive data, wherever it is, so they can maximize its value while minimizing the risks. ALTR simplifies and unifies data governance and security, allowing anyone the ability to confidently store, share, analyze, and use their data. Customers gain unparalleled visibility into data usage across their organization, intelligence to create advanced policies, automated data access control, and patented data security. With ALTR’s no-code cloud platform, customers can implement data control and protection in minutes instead of months. To learn more, please visit ALTR.com.


Security • Pharmaceutical

<p>InView Technology Corporation develops and manufactures compressive sensing-based imaging and hyperspectral imaging products. The company offers shortwave and midwave infrared cameras and hyperspectral imagers for industrial process control, food and pharmaceutical inspection, energy audits, material research, surveillance, and security applications. It also offers its technology for use in hyperspectral imagers to deliver an image of a scene and spectral informational for pixels in the scene (a spectrometer per pixel).</p>


Consumer Web • Security

<p>Oui Agree® is a patented web-based system that enables multiple parties to collaboratively and securely negotiate and execute legally binding agreements online.</p>


Cloud • Security

<p><span style="color: rgb(64, 64, 64); font-family: Roboto, arial, sans-serif; line-height: 18.2000007629395px;">CloudEntr brings simplicity and security to your cloud-based business applications. It lets your business take advantage of the cloud, without giving up control over who’s accessing business data or burdening employees with complex password policies.&nbsp;</span><span style="color: rgb(64, 64, 64); font-family: Roboto, arial, sans-serif; line-height: 18.2000007629395px;">Whether you are running a small shop or building a business empire, CloudEntr lets you focus on your future by securing and simplifying cloud application access.</span></p>


Enterprise Web • Security
200 Employees

Enterprise IT Security Software Solutions.