Showing 14 companies
Hunters Cyber
9 jobs
Security
Software
51 - 200
Series C+
Hunters’ autonomous threat hunting solution detects cyberattacks that bypass existing controls in every IT environment. Hunters.AI extends threat detection and response across every attack surface – a capability increasingly known as ‘XDR.’ It ingests rich security telemetry and intelligence from a wide array of data sources and IT environments like cloud and network, and enriches threat signals with unique tactics, techniques and procedure-based (TTP) attack intelligence. It then applies ML and cloud-based analytics to correlate threat patterns, and provide high fidelity attack stories for cybersecurity team response. Learn more at: Hunters.AI.
Karamba Security
5 jobs
Security
Software
Transportation
11 - 50
Series B
Karamba Security's patented software detects and prevents cyberattacks on a wide variety of connected devices and systems, including automotive ECUs, Industry 4.0 controllers, enterprise edge devices, and IoT endpoints. Karamba's security solutions are embedded within devices and work automatically, without any need for customer operation and with negligible performance impact.
Opus Security
6 jobs
Security
Software
11 - 50
𝗢𝗽𝘂𝘀 is a singular, overarching Cloud Security Orchestration and Remediation platform, transforming the way remediation is conducted in the cloud. 𝗢𝗽𝘂𝘀 empowers cloud security teams to see beyond alerts and threats and gain control, knowledge, and capabilities to resolve them. 𝗢𝗽𝘂𝘀 integrates with existing security tools and orchestrates the entire remediation process across all stakeholders and organizational environments, based on tried-and-tested, easily-deployed guidelines and playbooks. Leveraging selective automation, 𝗢𝗽𝘂𝘀 knows when sensitive issues demand human involvement and allows automation to resolve the rest, cutting down the time from detection to mitigation and conserving valuable resources. Finally, 𝗢𝗽𝘂𝘀 provides security and business executives with immediate and tangible insights based on remediation metrics, with comprehensive visibility into the state of their risk. For more information on how to reimagine your remediation in the cloud, visit opus.security.
Orca Security
18 jobs
Security
Software
201 - 1000
Series C+
Cloud Security, Cloud Compliance, Vulnerability Management, AWS Security, Microsoft Azure Security, Google Cloud Platform Security. Orca’s cloud-native solution reads a company’s cloud configuration and can detect malware, misconfigurations, and other vulnerabilities. It was founded in 2019 and headquartered in Los Angeles, California.
RideVision
1 jobs
DeepTech
Hardware
Software
Transportation
11 - 50
Series A
Ride Vision was created by technologists by day, motorbike riders by road, to give any motorcycle Predictive Vision. Ride Vision’s computer vision and neural network based CAT - Collision Aversion Technology leverages standard hardware and cameras to sense, predict and warn riders of threats on the road. Ride Vision can be incorporated into any new or traded motorbikes of any price range.
Satori Cyber
2 jobs
Security
Software
51 - 200
Series A
Satori Cyber’s Secure Data Access Cloud helps organizations maximize their data-driven competitive advantage by removing barriers to broad data access and usage while ensuring security, privacy, and compliance. The Satori Cyber Secure Data Access Cloud provides: - Continuous visibility and mapping for data flows and data stores - Activity-based discovery and classification of data in real-time - Data security through granular, field-level data access controls and anomaly detection - Compliance through continuous monitoring and enforcement of data privacy policies - Seamless integration into any cloud or hybrid environment without impacting existing user and application access
Spera
1 jobs
Security
Software
11 - 50
Seed
Prevent account takeovers, stolen credentials, and phishing attacks with Spera: The first comprehensive Identity Security Posture Management platform that acts as a force multiplier for identity teams - helping detect, prioritize, and remediate identity-driven breaches.