Other Computer Related Services

Companies with NAICS Code 541519

Back to Industries

Cohesity

cohesity.com

San Jose, California

This business specializes in AI-powered data security and management solutions, offering services such as immutable backups, early threat detection, and rapid data recovery to protect against ransomware. Their platform is designed to be simple, secure, and scalable, catering to various industries including financial services, healthcare, and government. They provide both self-managed software and SaaS options, focusing on data resilience and cyber recovery.

Data Security and Management

Veritas

veritas.com

Mountain View, California

This business specializes in enterprise data management, providing comprehensive solutions for data protection, compliance, and governance. Their offerings include backup and recovery services, cloud data management, and application resiliency, targeting large enterprises across various industries. They emphasize security, compliance, and operational efficiency, helping organizations manage and protect their critical data effectively.

Enterprise Data Management and Cybersecurity

BreachLock

breachlock.com

New York, NY

This business provides comprehensive security solutions focused on Attack Surface Discovery and Penetration Testing. Their services include Penetration Testing as a Service (PTaaS), Attack Surface Management (ASM), and Red Team as a Service (RTaaS). They aim to continuously identify and mitigate vulnerabilities across various digital assets, including web applications, mobile apps, and cloud environments. Their unique approach combines automated algorithms with human expertise to ensure thorough security assessments and rapid remediation of identified risks.

Cybersecurity

SonicWall

sonicwall.com

San Jose, California

This business specializes in providing cybersecurity solutions, including firewalls, secure remote access, and advanced threat protection. Their offerings cater to various sectors, including small to medium-sized enterprises and large organizations, focusing on protecting networks and data from cyber threats. They emphasize innovation and comprehensive security management to help businesses safeguard their digital assets.

Cybersecurity

Fortinet

fortinet.com

Sunnyvale, California

This business specializes in providing comprehensive cybersecurity solutions and services that protect the entire digital attack surface, including devices, data, and applications. Their offerings include advanced network security, enterprise networking, cloud security, and security operations, catering to a wide range of industries such as healthcare, education, and manufacturing. They leverage AI-powered security technologies and centralized management systems to enhance security effectiveness and operational efficiency.

Cybersecurity

Enpass

enpass.io

This business offers a secure password and passkey management solution that allows users to store and sync their sensitive information across various cloud storage services or offline. It emphasizes user control over data, enabling individuals and organizations to manage their passwords, credit cards, and other important documents in a secure environment. The service includes features like password auditing, autofill for online shopping, and the ability to create multiple vaults for personal and business use.

Cybersecurity and Password Management

Prevalent

prevalent.net

The business provides comprehensive third-party vendor risk management solutions that integrate intelligence and automation to mitigate security risks associated with vendors, suppliers, and other third parties. Their platform supports the entire vendor lifecycle, including sourcing, onboarding, risk assessment, monitoring, and compliance management, with a focus on IT vendor risks and supplier management. The solutions are designed to help organizations streamline their risk management processes, enhance compliance with regulations, and improve overall vendor performance.

Third-party risk management and compliance solutions.

UpGuard

upguard.com

This platform specializes in third-party risk and attack surface management, providing tools for monitoring data breaches, assessing vendor risks, and automating security questionnaires. It serves various industries, including financial services, technology, and healthcare, by enhancing their cybersecurity posture through continuous monitoring and real-time alerts. The platform also offers integrations with existing tools and expert analyst services to support organizations in managing their vendor risks effectively.

Cybersecurity and Risk Management

Bitsight

bitsight.com

Boston, MA

This business specializes in cyber risk management, providing solutions that help organizations identify, assess, and mitigate cyber risks across their digital ecosystems. Their offerings include security performance management, external attack surface management, cybersecurity analytics, and vendor risk management. They cater to various industries such as financial services, healthcare, and government, focusing on enhancing security visibility and compliance for their clients.

Cybersecurity and Risk Management

Vault by HashiCorp

vaultproject.io

Boston, MA

This business provides a solution for managing secrets and protecting sensitive data through a centralized system. It offers tools for securely storing and controlling access to tokens, passwords, certificates, and encryption keys. The platform integrates with trusted identity sources to automate access management and credential issuance, catering to applications and systems across various environments, including cloud and on-premises. Key functionalities include dynamic secrets generation, automated credential rotation, and identity-based access management, making it suitable for enterprises looking to enhance their security posture.

Cybersecurity and Data Protection

CyberArk

cyberark.com

Newton, Massachusetts

This business specializes in providing comprehensive identity security and access management solutions that enable secure access across various devices and environments. Their offerings include workforce access management, privileged access management, secrets management, and identity governance. They cater to a wide range of industries, ensuring that organizations can protect sensitive data and comply with regulatory requirements while maintaining productivity. The business leverages artificial intelligence to enhance its security capabilities and streamline identity management processes.

Cybersecurity and Identity Management

Everbridge

everbridge.com

Burlington, Massachusetts

This business provides a comprehensive suite of critical event management solutions designed to enhance organizational resilience. Their offerings include risk intelligence, mass notification, crisis management, and business continuity planning, aimed at ensuring the safety of people and assets during critical events. They serve a diverse range of industries, including healthcare, finance, education, and government, focusing on proactive risk mitigation and effective communication during emergencies.

Critical event management and business continuity solutions.

Exabeam

exabeam.com

Foster City, CA

This business specializes in providing a cloud-native security operations platform that leverages artificial intelligence for advanced threat detection, investigation, and response (TDIR). It offers flexible deployment options, including both cloud and on-premises solutions, catering to various industries such as financial services, government, healthcare, and manufacturing. The platform emphasizes automation and efficiency in security operations, helping organizations to detect high-risk threats, automate investigations, and optimize their security investments.

Cybersecurity and Compliance

ExtraHop

extrahop.com

Seattle, WA

This business specializes in providing cloud-native cybersecurity solutions that enable enterprises to detect and respond to advanced threats effectively. Their offerings include network detection and response (NDR) and network performance monitoring (NPM), which help organizations enhance their security posture and operational resilience. They cater to various sectors, including financial services, education, public sector, and defense, focusing on proactive threat detection, incident response, and maintaining network performance.

Cybersecurity and Network Performance Monitoring

Defiant

defiant.com

Remote, United States

This business specializes in providing comprehensive security solutions for WordPress websites, protecting them from known and emerging threats. They offer services such as incident response for breaches, continuous monitoring, and customized security solutions tailored for businesses with critical WordPress installations. Their flagship product, Wordfence, is a widely used firewall and malware scanner that secures over 4 million websites. The team consists of over 35 security professionals dedicated to maintaining high standards of security and customer support.

Cybersecurity for WordPress

Authy

authy.com

San Francisco, CA

This business provides a two-factor authentication (2FA) application that enhances online security by requiring an additional verification step beyond just passwords. The app is designed for ease of use, allowing users to set up 2FA for various online accounts and services. It supports multiple devices and offers secure cloud backup for authentication tokens. The target market includes individuals and organizations looking to protect their accounts from unauthorized access and cyber threats.

Cybersecurity and Identity Management

FixMeStick

fixmestick.com

Montreal, QC

This business offers innovative plug-and-play devices designed to enhance computer performance by removing viruses and malware. Their flagship product, a USB device, allows users to detect and eliminate threats that traditional antivirus software may miss. They also provide solutions for reviving old computers and backing up files, targeting both individual consumers and businesses. The company emphasizes user-friendliness and accessibility, with a strong customer base in the US and Canada.

Cybersecurity and computer maintenance

Checkmarx

checkmarx.com

This business specializes in application security testing, providing a comprehensive platform that integrates various security solutions to protect applications throughout their development lifecycle. Their offerings include Static Application Security Testing (SAST), Software Composition Analysis (SCA), Dynamic Application Security Testing (DAST), and AI-driven security solutions. They target enterprises looking to secure their applications from code to cloud, emphasizing developer experience and risk remediation. The platform is designed to simplify security management while reducing total cost of ownership (TCO) and fostering collaboration between security teams and developers.

Application Security

Cybereason

cybereason.com

Boston, MA

This business specializes in cybersecurity solutions, offering an AI-driven platform that provides predictive prevention, detection, and response to modern cyber threats, including ransomware. Their services include endpoint security, managed detection and response, incident response, and threat intelligence, catering to organizations looking to enhance their security posture and mitigate risks associated with cyber attacks.

Cybersecurity

Veracode

veracode.com

Burlington, MA

This business specializes in application security, providing a comprehensive platform that enables organizations to build and scale secure software from code to cloud. Their offerings include various security solutions such as Static Application Security Testing (SAST), Software Composition Analysis (SCA), and Dynamic Application Security Testing (DAST), aimed at preventing, detecting, and responding to security vulnerabilities throughout the software development lifecycle. They target enterprise and public sector development and security teams, emphasizing integration with existing tools and workflows to enhance security without hindering development speed.

Application Security