Top San Francisco Bay Area, CA Cybersecurity Companies (207)
See Exactly What Attackers See. Take full control over your attack surface by uncovering and eliminating critical security risks – the ones you didn't know existed. Our botnet and discovery engine use graph data modeling to map and classify the assets across your attack surface
ProjectDiscovery is an open-source, cybersecurity company that builds a range of software for security engineers and developers. Our user base is among the largest in the InfoSec community, and we are used by security and developer teams at top internet companies such as Fastly, Microsoft, CloudFlare, Gitlab, Facebook, IBM, and many others. We are well-funded and recently raised $25M with our...
Paladin is cyber protection simplified. Our mission is to make cybersecurity accessible and practical for all companies. Cyber risk is human risk. Paladin Shield, our all-in-one cybersecurity suite, makes it easy to defend employees, systems, and data against cybercriminals.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined...
BlueRock delivers the first Compute Firewall, revolutionizing runtime security in an era of AI-speed cyberattacks and escalating third-party software risks. Traditional security tools and agents can't keep pace, leaving enforcement gaps exposed. Attackers now exploit vulnerabilities within minutes of disclosure, outpacing reactive detection methods. BlueRock solves this by embedding real-time, preemptive enforcement directly into the compute layer, halting exploits precisely...
SentinelOne is a leading provider of autonomous security solutions for endpoint, cloud, and identity environments. Founded in 2013 by a team of cybersecurity and defense experts, SentinelOne revolutionized endpoint protection with a new, AI-powered approach. Our platform unifies prevention, detection, response, remediation, and forensics in a single, easy-to-use solution. Our endpoint security product is designed to protect your organization's endpoints from...
Araali Networks is the finalist at the 2022 RSAC Innovation Sandbox Competition. We believe that cloud security and zero trust is a marriage made in heaven. They both speak the language of identity and least privileges. Bring on the complexity of cloud-native and ephemeral workloads. We help you build resiliency and good governance with the secret powers of zero trust delivered...
Backed by the Service Experience Promise, Open Systems simply and cost-effectively connects and secures hybrid environments and thus ensures your organization can meet business objectives. Open Systems uniquely focuses on a superior user experience when helping organizations reduce risk, improve efficiency, and accelerate innovation. The Open Systems SASE Experience delivers on the promise of ZTNA with a comprehensive, unified and...
The world's leading banks, airlines, retailers, hotel chains, and federal agencies rely on Shape as their primary line of defense against sophisticated cybercrime. The Shape technology platform, covered by 50+ patents, stops automated fraud and other attacks on web and mobile applications, including credential stuffing, account takeover, scraping, and unauthorized aggregation. Shape is one of the largest processors of login...
Comp AI is the open source platform that helps you automate compliance with frameworks like SOC 2, ISO 27001, and GDPR. Built for modern development teams, it integrates directly with your existing tools to streamline policy management, evidence collection, and control monitoring.Unlike legacy platforms that require sales calls and long onboarding, Comp AI is transparent and self-serve. You can deploy...
Organizations are shifting to an identity-first posture for cybersecurity with today’s distributed workforce and migration to the cloud. Attivo Networks, a SentinelOne company, provides Identity Threat Detection and Response (ITDR) and cyber deception solutions for protecting against identity compromise, privilege escalation, and lateral movement attacks. The platform efficiently prevents attacks across Active Directory, cloud environments, and devices through data cloaking,...
Industry’s first Real-time Attack Interception and Defense Platform built to deterministically detect and stop attackers navigating your infrastructure.
3rd party scripts have unlimited reign in the browser of your users. We change that. Monitoring, Securing & Optimizing 3rd party scripts.
UpGuard combines third-party security ratings, vendor questionnaires, and threat intelligence capabilities for a complete cyber risk solution.
Asimily is the only complete IoT, OT, and IoMT risk mitigation platform. Our mission is to mitigate risk with the depth and breadth of capability you need to keep all your devices secure. Our clients remediate threats to their network 10x faster with fewer resources to the top 2% of real-world vulnerabilities. Asimily provides an all-in-one platform including: • Risk Mitigation •...
ICE is a leading managed IT solution provider specializing in full-range, vendor-independent managed IT services to small and mid enterprises for over 24 years. 97% CSAT (Client Satisfaction Score) with over 5,000.00 client reviews, customer service is front and center at ICE. Our objective is to be Trusted IT Partner for our clients. We specialize in Cybersecurity and provide 24x7x365...
Axiado is a leading hardware-anchored platform security solutions company deploying a novel, AI-driven approach to platform security against ransomware, supply chain, side-channel, and other cyberattacks in the growing ecosystem of cloud data centers, 5G networks, and other disaggregated compute networks. We offer a new processor called the Trusted Control/Compute Unit (TCU) that redefines security from the ground-up. Its hardware-anchored and AI-driven...
Stellar Cyber Open XDR platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to successfully secure their environments. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering a 20X improvement in MTTD and an 8X improvement...
As the world moves to a mobile-first economy, businesses need to modernize how they acquire, engage with and enable consumers. Prove’s phone-centric identity tokenization and passive cryptographic authentication solutions reduce friction, enhance security and privacy across all digital channels, and accelerate revenues while reducing operating expenses and fraud losses. Over 1,000 enterprise customers use Prove’s platform to process 20 billion...
Every day at FireEye, we see firsthand the impact of cyber-attacks on real people. This is what inspires us to fulfill our mission to relentlessly protect our customers from the impact and consequences of cyber attacks. We have learned that technology alone isn’t enough to combat cyber attackers. Our fundamental belief is that hands-on front-line expertise and intelligence, combined with innovative...











.jpg)



















 Logo.png)


