Directory · US
Data Security Software Products in United States
A register of firms and the professionals working at them in the Data Security Software Products sector based in United States. Browse the public index, then filter or export on Kipplo.
Companies
486 on file
Icrimefighter
Founded in 2011 by two law enforcement officers in Minnesota, iCrimeFighter (iCF) is an AWS GovCloud-based and fully compliant (CJIS, SOCII, FIPS, HIPPA) digital evidence collection, storage, and transfer solution. It remains far superior than any other Digital Evidence Management System (DEMS) in the market, as it allows Law Enforcement Agencies, District Attorneys, Title IX Coordinators, Offices of Student Conduct at Colleges and Universities, Students, Citizens of the Community, and any other individual or agency involved in a case to safely and efficiently collaborate. Our solution provides agencies with a system that allows public safety professionals to seamlessly streamline digital evidence from the field to the courtroom; thus, rewarding valuable time back to law enforcement officers and county attorneys, so they can dedicate more of their time making a positive impact on the community.
11 to 50 staff
Indykite
IndyKite is building the system of intelligence — delivering contextual data access and retrieval that makes enterprise data usable the moment it is needed. The platform connects to data wherever it resides, applying rules and context automatically at the moment of use. This intelligence layer turns data from a static asset into a responsive force, giving applications and AI the context, access, and trust to shape outcomes in real time — enabling faster decisions, adaptive digital experiences, and entirely new classes of intelligent services.
51 to 200 staff
Monarx
Monarx offers a complete and advanced malware protection solution designed specifically for web hosts and server environments. Here are the key features and capabilities of Monarx's malware protection: Threat Removal Monarx provides real-time detection of malware, ensuring that threats are identified in real-time. Threat Removal If threats are found, Monarx safely removes the threat and restores the infected files to original functionality. Threat Shield When enabled will block new threats in realtime, preventing infection before it strikes your website. Server Protections Deep removal of additional areas that are often infected such as memory and hidden processes. HoneyNet This is our crowd-sourced data set that collects then protects in realtime. With direct access (via cloud) this our early warning detection system. Command Center & APIs Manage your fleet of servers from a single pane of glass and have full control via our Global API.
11 to 50 staff
Secuvy
Secuvy is the leading Data Security Posture Management (DSPM) platform that secures complex unstructured data, including PDFs, CAD files, images, contracts, and intellectual property that traditional security tools consistently miss. While most platforms rely on pattern-matching and manual tagging, Secuvy finds data anywhere, beyond patterns. Its self-learning AI autonomously discovers and classifies sensitive data across cloud, on-premise, SaaS, and hybrid environments without retraining when new data types emerge. Organizations deploy Secuvy in 45 minutes and reduce manual classification effort by up to 90%, transforming months-long projects into hours. What enterprises get from Secuvy- Advanced classification precision : Especially regulated datasets including complex unstructured data, including PDFs, CAD files, images, contracts, and intellectual property - AI & LLM Governance - Prevent sensitive data from leaking into Copilot, ChatGPT Enterprise, and AI training pipelines - Compliance & Risk Readiness : Automatically maintain correct labels and generate audit evidence for CMMC, HIPAA, GLBA, GDPR, NIST - Policy Enforcement : Apply the right controls automatically across all systems - Data Visibility : Know where sensitive data lives, how it's shared, and where misclassified files create risk Secuvy integrates with 250+ data sources and enhances Microsoft Purview, DLP, CASB, and compliance tools. By feeding accurate, contextual classification, enterprises gain the data intelligence they've never had before.
51 to 200 staff
Siemonster
We help MSSPs and enterprises deliver scalable, white-labeled SOC platforms under their own brand. SIEMonster is a customizable, multi-tenant cybersecurity operations platform designed for speed, autonomy, and global scale. Trusted by partners worldwide, our platform enables client-branded reporting, automated response, and outcome-driven threat visibility—without vendor noise or lock-in. We stay invisible—so you stay in control.
201 to 500 staff
Sighthound
Founded in 2013, Sighthound has always believed in the power of making complex technology simple and accessible. With a passion for visual data, we've dedicated ourselves to pioneering computer vision solutions that transform industries and improve everyday processes. At the heart of Sighthound is a commitment to quality and customer success. We pride ourselves on creating intuitive AI tools that empower businesses and agencies to make smarter decisions, optimize their operations, and protect what matters most. Our products are designed to be both powerful and user-friendly, ensuring you get reliable insights without the complexity. Vehicle Identity Recognition Make Model Color Generation Automatic License Plate Recognition Edge AI Hardware: Compute Camera & Compute Node Smart Traffic Systems Person Detection Space Occupancy Video Redaction Image Redaction Audio Redaction Screen Redaction Document Redaction ID Redaction
11 to 50 staff
Sotero
Sotero is a global leader in data security and ransomware prevention. Our Data Security Platform offers a simple way to protect your data everywhere, all the time. Sotero uses a multi-layered approach to secure and keep your data private, even when it's being used. Our platform encrypts data throughout its entire lifecycle and stops threats with real-time detection and automated quarantine of malicious access. Our solution is easy to set up and manage without affecting the user experience. Organizations quickly gain full control over data privacy, compliance, and governance. We provide comprehensive data security to protect data at the edge, on IoT devices, in streaming data, and in collaboration systems. For more information, please visit
11 to 50 staff
Tachyon Networks
Tachyon provides data assurance solutions using proprietary technology founded upon a blockchain matrix architecture. When analysing data from disparate sources, the assurance of authenticity (where and who it came from) and pedigree of integrity (has it been altered) becomes crucial. Knowing both provides confidence and certainty to your decision making.
11 to 50 staff
Apura Cyber Corp
Apura Cyber Corp is a company with deep technical expertise and extensive experience in threat intelligence, digital forensics, incident response, and anti-fraud operations. Our premier product, BTTng, is an advanced OSINT and Cyber Threat Intelligence platform that provides broad, dynamic visibility into threats across the most comprehensive collection of monitored sources in the industry. Building on this foundation, Apura now offers BTTli, our dedicated Leak Intelligence platform. BTTli enables organizations to quickly identify, analyze, and act on data exposure incidents by securely processing leaked datasets within Apura’s protected environment. Apura is proud to have contributed for seven consecutive years to the development of the world’s most trusted cybersecurity publication, the Verizon Data Breach Investigations Report (DBIR), and honored to be part of FIRST, the premier global organization for incident response.
51 to 200 staff
Cranium
Incubated and funded in stealth inside of KPMG Studio, with additional institutional investment by SYN Ventures, Cranium emerged in 2023 with a mission to secure the AI revolution by delivering the industry’s leading AI security and trust solution. Whether organizations are builders and/or consumers of AI, Cranium offers a comprehensive platform that enables complete security, compliance, and trust across the entire AI supply chain. For more information, visit:
51 to 200 staff
Crashplan
CrashPlan provides cyber-ready data resilience and governance in a single platform for organizations whose ideas power their revenue. With its comprehensive backup and recovery capabilities for data stored on servers, on endpoint devices, and in SaaS applications, CrashPlan’s solutions are trusted by entrepreneurs, professionals, and businesses of all sizes worldwide. From ransomware recovery and breaches to migrations and legal holds, CrashPlan’s suite of products ensures the safety and compliance of your data without disruption. Headquartered in Minneapolis, Minnesota, CrashPlan protects more than world-class organizations, including the largest global brands.
51 to 200 staff
Evo Security
Evo Security simplifies Identity and Access Management (IAM) for Managed Service Providers (MSPs), Managed Security Service Providers (MSSPs), and their SMB and mid-market clients. Our unified platform consolidates MFA, SSO, RADIUS, Help Desk Verification, and Privileged Access Management (PAM)—empowering technicians and end-users with seamless, secure access in one solution tailored for the channel. We're backed and advised by some of the leading minds in the MSP space and world-class institutional investors. Our focus is building a fantastic product to serve (who we believe to be) the unsung heroes of modern business - IT Service Providers - and their vast client base of small to medium businesses and enterprises. One agent. One dashboard. Total identity management. Built for MSPs.
11 to 50 staff
Freeze
Freeze is the premium cybersecurity and privacy solution trusted by leading organizations to mitigate risks such as social engineering, phishing, financial fraud, hacks, attacks, physical security threats, and safeguard executive reputations. Our platform leverages advanced integrations, models, and AI to detect and thwart information reconnaissance targeting your company, vendors, partners, employees, and their families, bolstering your organization's cybersecurity by closing doors to threat actors and attack surface they leverage. Our extensive detection and removal capabilities offer the most comprehensive security and privacy protection. At our core, we prioritize customer satisfaction, continuous platform enhancement, privacy ethics leadership, and pioneering solutions, delivering excellence to our clients and the ecosystem.
11 to 50 staff
Invisus
INVISUS delivers proactive cyber risk management solutions for consumers and small to mid-sized businesses. for Business: Our innovative and proprietary InfoSafe Certification program makes it simple and affordable for small and mid-size businesses to get and stay compliant with data security and privacy requirements. for Home: From computer protection and technical support services, to identity theft protection and credit monitoring, our robust iDefend plans provide comprehensive protection against evolving cybersecurity and data privacy risks.
11 to 50 staff
Medcrypt
Medcrypt provides data security as a service to medical device OEMs. From medical imaging devices to pacemakers, Medcrypt ensures that devices act only on instructions from trusted sources.
11 to 50 staff
Netdiligence
NetDiligence® is a Cyber Risk Assessment and Data Breach Services company. Since 2001, we have conducted thousands of enterprise-level cyber risk assessments for a broad variety of corporate clients, including well-known names in banking, brokerage, mortgage, insurance, clearinghouse, and other financial service sectors. We have also assessed major Internet-based retailers, online auctions, B2B service providers, software companies, medical providers, universities, and a significant percentage of the Fortune NetDiligence services are used by leading insurers in the US and UK that offer "cyber risk insurance" for businesses. Insurers like ACE, Arch, Chubb, Zurich, Beazley, Hiscox, Aspen, Brit and other Lloyds of London syndicates rely on NetDiligence risk assessments to support both loss-control and educational objectives. As a complement to our cyber risk assessment services, NetDiligence hosts an annual Cyber Risk & Privacy Liability Forum. Featuring dozens of subject matter speakers across two days, our forum is attended by hundreds of risk managers and cyber liability insurance leaders from all over the world. NetDiligence is also an acknowledged leader in data and privacy breach prevention and recovery. Our eRiskHub® portal is licensed by a majority of cyber liability insurers to provide ongoing education and breach recovery services to their policyholders. NetDiligence technical experts assist many of these insurers with cyber liability claims investigations. Voted "Advisen 2015 Cyber Risk Pre-Breach Team of the Year" by industry peers
1 to 10 staff
Paperclip Inc
Paperclip enables enterprises to harness the power of their data without ever sacrificing security. As a trusted software technology partner, Paperclip creates operational efficiencies, improves digital communication, and secures valuable data for some of the largest globally recognized brands worldwide. With more than three decades of customer-centric innovation, Paperclip is a proven strategic partner that continues to revolutionize the content supply chain for highly-regulated industries. Paperclip solutions securely capture, transcribe, store, and exchange our client’s most sensitive data, such as PII, PHI, NPI, and corporate IP. Paperclip continues to innovate, adapt and excel within a rapidly changing digital world.
11 to 50 staff
Smartroom
SmartRoom is a leading provider of virtual data room solutions, engineered to streamline complex transactions and safeguard your most sensitive data. Trusted by professionals in M&A, private equity, legal, and corporate development sectors, our platform ensures a seamless, secure, and efficient environment for collaboration and decision-making. With a focus on robust security measures, user-friendly interfaces, and dedicated support, SmartRoom empowers your business to operate at peak performance, every time. Discover how our innovative solutions can elevate your data management and drive success in your critical business processes.
201 to 500 staff
Synergetics
Synergetics is proud to announce that our OpenFLIS platform has received JAB authorization, further cementing our reputation as a leading technology provider for Government agencies and Federal supply chain participants. OpenFLIS is a cutting-edge platform designed to serve our customers' data applications in a microservices deployment model. OpenFLIS is a major distinguishing factor for Synergetics when compared to other Government contractors. Our platform brings together CSP capabilities and an architecture that unifies the experience of interacting with data, granularly secures access, captures key analytics, and leverages powerful AI and infrastructure provided by MS Azure. At Synergetics, we believe that data is the key to unlocking success in today's world. That's why we have developed OpenFLIS as a powerful tool to help our customers make sense of their data and use it to drive their missions forward. With OpenFLIS, our customers can rest assured that their data is secure, accessible, and being used to its full potential. Whether it's providing real-time analytics, automating workflows, or uncovering insights, OpenFLIS is a valuable asset for any Government agency or Federal supply chain participant. At Synergetics, we are committed to providing our customers with the best technology solutions possible. Contact us today to learn more about how OpenFLIS and our other products and services can help you achieve your goals.
51 to 200 staff
Tac Security
TAC Security (NSE: TAC) TAC Security, a leading publicly listed global cybersecurity company specializing in vulnerability management, today serves clients across 100 countries and has emerged as the world’s 5th largest vulnerability management company. TAC Security’s flagship product, ESOF (Enterprise Securityin One Framework), excels in cyber scoring, cyber risk quantification, and leveraging advanced AI for vulnerability assessment and penetration testing. TAC Security partners with tech giants such as Google, Microsoft, and Meta for CASA (Cloud Application Security Assessment). Serving a diverse global clientele, TAC Security is committed to innovation and excellence in cybersecurity for Fortune 500, startups and Governments Globally. Recognised as "Great Place to Work" and third time in the row "Great People Manager Company" by GMI in association with Forbes and The Economic Times.
51 to 200 staff
Ubiq Security
Ubiq enables enterprises to encrypt, tokenize, and mask sensitive data at the individual record and file level and integrates with Identity Providers (Okta, Entra ID) to ensure only authorized users with appropriate permissions can access or manipulate sensitive data. This approach enables user-level context and enforces fine-grained, Zero Trust access controls. Delivered as a low-code/no-code solution, Ubiq integrates seamlessly into applications, databases, data warehouses, and API gateways without requiring agents, hardware, virtual machines, or proxies. Deployment is measured in hours, not days or weeks.
51 to 200 staff
Assertion Inc
At Assertion, we make collaboration applications safer for enterprises. Our expert solutions make cybersecurity for collaboration systems easier, simpler, and up-to-date. Our offerings include Session Border Controller Security, contact center security, and security for collaboration applications, such as MS Teams and Zoom.
11 to 50 staff
Canopy Software
We're the global leaders in incident response data mining software, and the only company that exclusively focuses on solving this fast-growing need. Powered by AI and machine learning, our patented technology is purpose-built to zero in on personally identifiable information (PII) in any data set, exceeding the technical limitations of comparable tools. When an organization experiences a cyber incident, they want their incident response team using Canopy's Data Breach Response Software to analyze the compromised data and identify the affected individuals. Why? So that they can notify quickly (both regulators and affected individuals), reducing their risk of compliance issues, penalties & fines, and reputational damage. Cyber insurers want IR firms using Canopy for these projects, too. Data mining is a notoriously expensive step in the overall process, but our purpose-built tech and workflows are the fastest, most accurate on the market, keeping payouts as low as possible and saving insurers millions per year.
11 to 50 staff
Ezyhire
You Don’t Need to be an Expert to Hire an Expert Recruiters' Future: AI-driven tech screenings, ID verification, background checks, and more—no tech team needed. Our Vision:Simplifying Tech Hiring for Global Success At Ezyhire, we are dedicated to transforming the recruitment landscape by empowering organizations to thrive and individuals to flourish. Through our unwavering commitment to integrity, innovation, and empathy, we aim to be the premier partner for employers and recruiters, fostering meaningful relationships built on trust and understanding. Key Features-Extensive Test Library: Access over advanced, pre-made tests backed by statistical evidence to ensure the highest quality assessments-Diverse Question Bank: Utilize a vast library of more than questions covering a wide range of technical and non-technical subjects-Ezyhire AI Evaluate: Leverage cutting-edge Generative AI technology to assess answers in innovative ways-Advanced AI-Based Proctoring: Prevent cheating and ensure fairness with sophisticated AI-based proctoring solutions-Comprehensive ID Verification: Verify candidate identities seamlessly to enhance trust and security in the hiring process-Thorough Background Checks: Conduct in-depth background checks to ensure the reliability and integrity of potential hires-Insightful #StaffingTools #AgencyRecruitmentTools #MSPStaffingTools #TalentIntelligence #TalentSolutions #VideoInterviewTools #AutoProctoredAssessments #OneWayInterviewTools #TalentAnalytics #LiveCodingEnabledVideoInterviews #CodingTests #PhoneInterviewTools #FreeRecruitmentTools #CandidateReport #RecruitmemtPlatform #EnterpriseHiringTools #VettedTalentPoolCreation #CompetencyBasedHiringTools #TalentCuration #DE & IRecruitment #UnbiasedStaffingTools #RealWorldAssessments #CustomisedAssessments #ADACompliantStaffingTools #PreBuiltTestLibrary #ContingentStaffingTools
11 to 50 staff