Top Austin, TX Security Companies (98)
Trustgrid is enabling the next generation of distributed application and network architectures that are deployed, managed, and secured from the cloud to the edge. Trustgrid integrates cloud-native SD-WAN with an edge API & edge computing platform to solve the most complex cloud to edge enterprise networking challenges.
Better Systems. Better World. System Surveyor is a B2B SaaS company committed to making IoT system design easier and more accurate for everyone involved. From the very first interaction at a site survey, information can be captured visually all-in-one place. We help improve security, AV, IT and other mission-critical systems. Our users love it!
CynergisTek is a top-ranked cybersecurity and information management consulting firm dedicated to serving the healthcare industry. The company has been named in numerous research as a top firm that provider organizations turn to for privacy and security and won the 2017 Best in KLAS award for Cyber Security Advisory Services.
BeehiveID - verified online identity We use advanced identity technology, along with private and public data sources to establish the BeehiveID score - our measure of confidence that your users are backed by genuine, unique individuals.Beehive is based upon years of experience working with a wide variety of identity technologies, including social network analysis, face recognition, semantic text analysis, machine learning,...
We're an innovative, fast-growing provider of solutions to simplify IT Management. Everything we do, we do to make IT audit, migration and recovery challenges a thing of the past.
SwipedOn, the worlds leading visitor management platform. We're enabling business around the globe to reinvent their visitor experience and replace their paper-driven visitor books. We've partnered with the environment and plant one tree for every SwipedOn subscription we sell
Two Six Technologies provides cybersecurity and advanced technology solutions that support missions critical to U.S. national security. Our expertise includes R&D, innovation, productization and implementation in the technology fields of cyber, data science, mobile, microelectronics and information operations. We offer a family of operationally deployed products including Pulse, IKE™, SIGMA™, 8Wire™ and others. Major customers include DARPA, Department of State, U.S. Cyber...
Since its inception, RedBlue Security has been building a global, community-based, high-caliber security recruitment practice modeled around confidentiality, integrity and availability. From Linkedin and other common social media outlets to IRC channels and deep web forums, we abandon the boring job-board trawling for a far more exhilarating, far-reaching and sector relevant search process. We have represented ex-TAO members, Pwn2Own winners, PPP...
REALLY is the world’s first fully encrypted and privacy-focused phone service. The REALLY network combines a cutting edge people-powered network with America’s largest 5G network. We empower individuals with unprecedented security, privacy, speed, and coverage. Founded by Adam Lyons, founder and former CEO of TheZebra.com, REALLY is backed by the largest telecommunications seed round in U.S. history, promising safer and...
We simplify endpoint protection. Ziften’s endpoint protection platform is one product with one agent delivering best-in-class zero-day protection, complete investigation, the most flexible response, plus security posture analysis. The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have.
Temperature Detection and Gun Detection to help save lives. Check out our new temperature detection system at http://athena-security.com/temperature-detection
Trustgrid enables enterprises to execute their cloud migration strategies. We provide the next generation of SD-WAN technology designed specifically for hybrid cloud networking. By combining cloud to edge networking with containerized deployments and automated management we give organizations the flexibility to manage their hybrid environments.
HackNotice is the only company-wide threat awareness platform, making employees safer online. Users monitor, review, and take swift actions against their real cyber threats. The platform bridges the gap between security teams and other employees through real-time alerts, around-the-clock monitoring, recovery recommendations, and a full security training and assessment program. HackNotice’s mission is to make all employees threat-aware, creating a...
Brinqa is the only company that orchestrates the entire cyber risk lifecycle — understanding the attack surface, prioritizing vulnerabilities, automating remediation, and continuously monitoring cyber hygiene — across all security tools and programs. The Brinqa Attack Surface Intelligence Platform enables your organization to automate the cyber risk lifecycle across infrastructure, application and cloud security.
Netsync specializes in collaboration & unified communications, data center and cloud, network infrastructure and others. NETSYNC is an NMSDC-certified minority business enterprise (MBE), federally certified woman-owned small business (WOSB), and HUB-certified value-added reseller (VAR), specializing in the implementation of comprehensive IT life cycle solutions for a wide array of organizations. As a Cisco Gold, Master Collaboration, and Master Security Partner; an HP...
We believe that everyone should simply log in to apps and websites with Face ID, Touch ID, Windows Hello, or whatever's built in to their devices. Passage empowers developers to make it happen.
MerlinCryption develops infrastructure security software, delivering advanced encryption, authentication, and random data generators, for Cloud, VoIP, eCommerce, M2M, and USB hardware. The company focuses in critical-need verticals, including financial services, healthcare, and military. Forward-looking encryption technology secures data against the three known and critical risk factors, which are inherent in today’s encryption. Fortified with stealthy ASBE 2008 bit -2GB variable-key length...
























.png)



.png)
.jpg)

