Directory · US
Data Security Software Products in United States
A register of firms and the professionals working at them in the Data Security Software Products sector based in United States. Browse the public index, then filter or export on Kipplo.
Companies
486 on file
Intruno
Intruno provides Patient Privacy Monitoring for healthcare organizations with a new, high-performance, cost-effective solution to detect inappropriate and malicious activities by insiders. Our patented “Ambient Cognitive Surveillance™” system reduces the risk of data breaches & privacy violations by proactive alerting. Intruno is a virtual monitoring shield that is cognitive, adaptive and evolving – which surveils all EMR user activity leveraging machine learning technologies. Intruno learns normal user's habits, patterns and behavior as they use medical records in any EMR application. Intruno is then able to detect anomalous, aberrant or deviant user patterns to promptly help in mitigating risk. Intruno is simple to use and increases efficiencies by streamlining workflows related HIPAA & HITECH compliance and regulations. For more information, visit or send an email to protect@intruno.com.
11 to 50 staff
Paramify
Paramify helps security and GRC teams automate compliance, manage risk, and build trust with buyers and agencies. Instantly create audit-ready documentation, centralize evidence, and run continuous monitoring and reporting 90% faster at 1/4 the typical cost. Built for Start-to-ConMon: • FedRAMP 20x • FedRAMP Rev 5 • GovRAMP • CMMC • FISMA Why teams choose Paramify: • Instant audit ready document generation • Continuous control validation and automated evidence • Risk-first workflows with clear POA & M ownership • Real-time dashboards for executives, auditors, and assessors • Scales from readiness to ongoing ConMon
11 to 50 staff
Prometheus Security Group Global Psg
Prometheus Security Group are the recognized subject matter experts (SME’s) in the security industry. Delivering next-generation security solutions, bridging the gap from legacy analog to advanced digital systems in critical environments. PSG enables physical security teams to do what IT has done for years—implement true Zero Trust Architecture (ZTA) at the edge. Our unified ZTA solution and integrated technologies provide continuous authentication and verification from edge sensors to the enterprise, enhancing response team safety, increasing awareness and mission success. At the core of PSG’s platform is a Security Command Center utilizing a cyber secure, high-performance computing cluster (HPC) which unifies access control, intrusion detection, video surveillance, into a single Zero Trust environment. High-security and critical asset facilities rely on PSG for clean, authenticated edge data to power AI-driven analytics which additionally lowers costs while increasing security and modernization. Backed by top federal certifications, three patents,$130 million+ in intellectual property, PSG meets the most rigorous security standards, including a FED-GOV PL1N Authority to Operate (ATO) on government networks. Headquartered in Austin, Texas – we operate globally—supporting defense, energy, critical infrastructure and enterprise markets.
51 to 200 staff
Strike Graph
Seattle-based Strike Graph is the #1 leader in customizable compliance management software. We empower businesses to streamline achieving and maintaining compliance with a wide range of security certifications including SOC 2, CMMC, ISO 27001, ISO 27701, HIPAA, NIST, FedRAMP, PCI DSS, CCPA, GDPR and TISAX.
11 to 50 staff
Votiro Now Part Of Menlo Security
Votiro is Zero Trust Content Security and Data Detection & Response rolled into one seamless platform. With our proactive file-borne threat prevention, real-time privacy and compliance capabilities, and actionable data insights, our Data Security solution protects organizations from countless digital threats that pose unnecessary risks to your employees, your customers, and your reputation. With over 500 customers globally, Votiro has offices in the US, Singapore, and Israel. For more information, visit
51 to 200 staff
Zartech
Organizations of all sizes and industries use Cyberator to improve their cyber security defenses, reduce business risk, and meet regulatory compliance needs. How We Do IT Our unique IT GRC solution help more effectively identify/manage cyber risk by leveraging its intelligence in merging and mapping cybersecurity frameworks against organization's existing and future posture, providing automatic tracking of all identified gap remediation efforts, along with full control of security road-map development. Cyberator also helps you become compliant with the data privacy laws of 80+ countries. Who We Are Our team of senior level security practitioners have worked at both small and large companies/government organizations around the world. We look forward to working with you in building or enhancing your security & privacy program. Contact us today @ 1-214-631-9353 Zartech is certified for ISO 27001
11 to 50 staff
Algemetric
Algemetric was founded as a deep-tech research company, focused on advancing the field of cryptography through original work in secure multi-party computation (MPC), homomorphic encryption (FHE), and other privacy-enhancing technologies (PETs), among other topics. Our early efforts resulted in foundational intellectual property, peer-reviewed publications, a reputation for technical excellence, and a selection of patents. As global demand for privacy-preserving data collaboration has accelerated, we’ve evolved our focus from research to productization. Now strategically positioned in Singapore, a global hub for digital trust and innovation, we’re building practical PETs solutions that make cutting-edge cryptography accessible and impactful for real-world use cases. Our strategy remains grounded in research, but with a clear focus on delivering solutions that address real world needs: enabling financial institutions, governments, and enterprises to extract value from sensitive data without compromising privacy or compliance. This evolution builds naturally on our foundation, extending our mission to bring PETs from the research lab to the market.
11 to 50 staff
Biometric Signature Id
We are a biometrics cyber security company. Our technology creates and manages online access credentials that are PII free and impossible to replicate by any other human or machine. Our patented behavioral biometric technology protects your online and real world identity. It links online digital access to the presence of a single authorized user, not to their credentials. It does this without collecting, transferring, or storing any personal identifiable information. It provides Complex Multi-Factor Authentication (CMFA) in a simple and reliable authorized user experience that no AI/ML algorithm or cyber criminal can replicate. About our patented CVL technology- PII-free behavioral biometric authentication - Simple form factor that exceeds FIPS requirements - Works with any computer, laptop or smart phone - Augments other MFA technologies and protocols - No extra, or special hardware required - ADA compliant
11 to 50 staff
Iron Mountain Iron Cloud
Is your organization ready? Cyber resilience is the ability to withstand and quickly recover in the event of an attack. Protect your valuable data against cyberattacks and ransomware with a comprehensive cyber resilience portfolio.
10001+ staff
Ironcore Labs
IronCore Labs, the leading provider of data security for modern cloud applications, makes products that help software developers and businesses rapidly add data protection and application-layer encryption into the heart of their software. IronCore protects data in modern GenAI systems and in classic databases, object stores, vector databases, and search indices with encryption-in-use technology that lets the data stay encrypted through its lifecycle, while allowing it to be utilized. Whether navigating Privacy Shield challenges, GDPR mandates, customer security requests, or just handling sensitive data safely, IronCore Labs removes the traditional obstacles to keeping data private and secure, while accelerating time to market for advanced security features.
11 to 50 staff
Mathcraft Security Technologies, Inc
MathCraft offers the most comprehensive security tools in the industry. Our products are compliant with 32 CFR Part 117, NISPOM Rule, and are available on-premises or in the cloud! As a trusted partner within the industrial security community, we work with government and corporate organizations of all sizes to streamline operations, maximize productivity, and improve efficiency. Our solutions are carefully engineered to enhance security processes, giving Facility Security Officers (FSOs), decision makers, and employees the information and applications that they need to manage data, monitor visitors, and automate workflows. • Access Commander® is our state-of-the-art industrial security management software for FSOs and other security professionals. Never fear an audit again! • Portal Commander™ is our employee self-service and leadership oversight platform for completing tasks and automating workflows. Industrial security meets enterprise management – all in one application! • ViSi Commander™ is our visitor management solution for cleared facilities, keeping your doors open and your assets safe! With MathCraft’s powerful line of industrial security applications, organizations can manage their classified facilities, personnel clearances, foreign travel and contacts, badges, training, and more. Compliance doesn’t have to be difficult. Let MathCraft simplify your industrial security efforts today!
11 to 50 staff
Neeve
Neeve is a cloud PaaS company transforming smart buildings, spaces and critical infrastructure, making them simpler, smarter, and more secure. As a trusted partner to owners, occupiers, operators, and integrators, our edge and cloud technology is securing operational technology (OT) and enabling the AI transformation of OT operations around the world. We are committed to being human, keeping it simple and always improving.
51 to 200 staff
Netarx
Real-time deepfake detection for enterprise voice, video and email.
11 to 50 staff
Nuts Technologies
NUTS Technologies is a hard tech startup pioneering in Data Centric Security. We have implemented an ecosystem powered by secure data capsules, called nuts, which always protect your most sensitive data in any environment. Some features provided by the data centric ecosystem includes insider threat mitigation, ransomware protection, ransomware recovery, automatic cryptography, automated file sharing and cryptographic data ownership. This is the only system that can minimize insider threat risks in a technical way. We want to help bolster our National Security by helping DoD address the insider threat problem by IT administrators.
1 to 10 staff
Securitystudio
SecurityStudio (or S2) is a Software as Service (or SaaS) company dedicated to making safety, privacy, and cybersecurity simple and attainable for everyone. Bruce Schneier said it best when he said "Complexity is the Worst Enemy of Security" The S2 platform is built around a simple language called the S2Score and we make fundamental tools available to the market including: • S2Org - the organizational information security risk management tool used by organizations of all sizes, but primarily developed for small to medium-sized businesses. • S2School - the education-specific version of S2Org, used by K12 and higher education institutions everywhere. • S2Vendor - the simple vendor/third-party information security risk management tool, integrated with S2Org for optimal efficiency. • S2Team - the information security portal leveraged by organizations to help their employees at home (and ultimately help themselves too). • S2Me - the free safety and cybersecurity risk management tool built for everyday people to use at home for better personal and family protection. We believe that information security is about people above all else.
11 to 50 staff
Shareid
ShareID primarily serves financially regulated companies and their trusted service providers, operating at the core of the digital trust ecosystem. ShareID is a modular digital trust platform designed for user identification and authentication, compliant with eIDAS 2.0, GDPR, PSD2, and MICA. It enables regulated institutions to build tailor-made user workflows for onboarding and authentication needs using identity documents, biometric liveness, EUDI Wallet attestations, and privacy-preserving authentication technologies, without storing personal or biometric data. Products: 1. Doc IDV for document authenticity with eIDas 2.0 assurance levels (Low, Substantial, High). Liveness IDV for active and passive liveness detection in line with ETSI norms (Basic, Substantial, Advanced). EUDI Wallet attestation issuance and verification of EAA and QEAA attestations. MFA 3.0 for strong customer authentication compliant with eIDas 2.0. EUDI Wallet strong authentication
11 to 50 staff
Snippetsentry
SnippetSentry™ is dedicated to delivering comprehensive, secure mobile messaging app communications solutions that are regulatory compliant.
11 to 50 staff
Thefence
THEFENCE™is a modularly built identity governance and administration (IGA) platform tailored for organizations of all sizes. Our software is offering innovative cybersecurity solutions such as- TheFence ARM (Access Risk Management: SoD & Least Privilege Access Control)- TheFence UAR Plus (AI-powered periodic User Access Review automation)- TheFence DAPP (AI-supported, identity level Dynamic Access Profile Packaging)- TheFence IDM Lite (Identity lifecycle automation, Access Request Management) THEFENCE™, “the vulnerability scanner of access rights”, provides a scheduled and automated discovery of users and their roles, their validity, and entitlement data in different systems and applications. It then automatically performs a measurable, scoring-based risk analysis, which is captured in actionable reports and sent to designated managers or departments. Finance, HR, IT security, internal audit, or IT operations respectively can then revoke excessive, unnecessary, or conflicting (SoD) access rights or delete inactive users from systems. The THEFENCE™ risk policy framework includes a scoring-based high privilege and segregation-of-duties (SoD) rule set that can easily be extended to meet the specific needs and requirements of any organization. The monitored systems can range from business applications to different IT infrastructure layers or cloud platforms, network technologies, operating systems, middleware, or database layers. Moreover, any other custom application or individual technology can easily be developed and connected. THEFENCE™ is also capable of detecting cross-application conflicts of interest, i.e. conflicting access rights between multiple systems (cross-system SoD).
11 to 50 staff
Vaulted Memory Coins
Vaulted is a consumer technology company and the creator of Memory Coins. Our software connects objects with "tap technology" to authenticate and vault, manage provenance, preserve memories, and available to curate the digital archives to share stories and preserve legacies. Vaulted offers end to end services from asset authentication, to memory creation, vault management, and memory events for community engagement. Vaulted collaborates with hall of fame organizations, schools and colleges, awards + gifting companies, commercial organizations, tourism centers, and family will + trust + estate management.#vaultedmemories #getvaulted #becauseeverythinghasastory
11 to 50 staff
Witnessai
WitnessAI is the confidence layer for enterprise AI, providing the unified platform enterprises trust to observe, control, and protect all AI activity. We govern your entire workforce, human employees and AI agents alike, with network-level visibility that illuminates shadow AI and intent-based controls that understand context rather than just keywords. We deliver runtime security for models, applications, and agents, deployable through network integration or lightweight APIs, blocking novel threats before they compromise your systems and filtering harmful outputs before they reach users. Our single-tenant architecture ensures data sovereignty and compliance, transforming security into the enabler of your AI strategy. Learn more at https://witness.ai.
51 to 200 staff
Airmdr, Inc
AirMDR delivers the first Managed Detection and Response (MDR) service primarily operated by AI-powered virtual analysts. This innovation materially improves the speed and accuracy of incident investigation and response, lowers costs, and reduces the workload of human security analysts. With an AI virtual analyst first approach, customers enhance their threat detection and threat intelligence while gaining uninterrupted 24/7 incident response that is backstopped by live expert humans.
11 to 50 staff
Caseguard
CaseGuard is the world’s leading AI-powered Redaction and Investigation Solution. Trusted by law enforcement, government agencies, legal departments, and educational institutions worldwide, it runs locally and on-premise for all file types- video, audio, images, and documents.
51 to 200 staff
Confidencial.Io
Confidencial's patented technology, originally developed under DARPA—an entity of the U.S. Department of Defense known for pioneering national security innovations—was incubated at SRI, a global hub for technological breakthroughs. This technology was initially created to meet the military's critical need for protecting sensitive and proprietary information, enabling safe and predictable privacy-preserving data sharing while avoiding large-scale compromise. In 2021, Confidencial was spun out to bring this cutting-edge technology to the wider market. Today, the company is a leader in data-centric security solutions, specializing in advanced encryption and AI-powered technologies that automatically identify, classify, and protect sensitive information, whether stored in the cloud or on-premises. Confidencial’s team, composed of PhDs, innovators, and field experts, is dedicated to pushing the boundaries of unstructured data protection. Our mission is to provide seamless, strong data security without disrupting workflows. Trusted by organizations in highly regulated industries such as healthcare, finance, and the public sector, Confidencial ensures compliance with key industry standards like HIPAA, SOC, and ISO 27001.
11 to 50 staff
Digitalxforce
DigitalXForce,"Digital Trust for the New Era," is the Unified Enterprise Security Risk Posture Management (ESRPM) SaaS Platform enabling Real-time, Continuous and automated GRC through Cybersecurity Mesh Architecture. By leveraging data-driven insights, security blueprints, and regulatory control mapping, DigitalXForce optimizes and automates the digital risk posture of organizations. The platform offers a comprehensive range of solutions, including attack surface management, risk quantification, automated audit & compliance, third party risk management and much more. Its innovative approach empowers organizations to enhance their security posture while maximizing their investments in digital transformation.
51 to 200 staff