company? Let’s change
that.
Don't see your company?
Create a company profileCrowdStrike has redefined security with the world’s most advanced cloud-native platform that protects and enables the people, processes and technologies that drive modern enterprise. Tested and proven, the world's largest organizations trust CrowdStrike to stop breaches with unparalleled protection against the most sophisticated cyberattacks. The CrowdStrike culture has been built upon our Core Values since the day we began. We are Fanatical About the Customer, Relentlessly Focused on Innovation and believe that our Limitless Passion drives Unlimited Potential for every CrowdStriker. As a purpose-built remote-first company, we believe cultivating a connected culture for every employee, no matter where they are in the world, is a key ingredient in building a high-performing, diverse team. We don’t have a mission statement. We’re on a mission—to stop breaches. Ready to join a mission that matters?
Cloudflare, Inc. is on a mission to help build a better Internet. Cloudflare’s suite of products protect and accelerate any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was awarded by Reuters Events for Global Responsible Business in 2020, named to Fast Company's Most Innovative Companies in 2021, and ranked among Newsweek's Top 100 Most Loved Workplaces in 2022.
Anduril is a defense products company. Unlike most defense companies, we don’t wait for our customers to tell us what they need. We identify problems, privately fund our R&D and sell finished products off the shelf. Ideas are turned into deployed capabilities in months, not years.
If your career aspiration when you were a child was to fight the “bad guys” while helping the good ones, keep reading. We’re Huntress. Through education, expertise and curiosity, our team protects our partners from today’s increasingly dangerous threat actors. Founded by former NSA Cyber Operators—and backed by a team of human ThreatOps researchers—we’re working to bring cybersecurity to the 99%: those businesses and mom-and-pop shops that lack the resources to defend themselves. Come join the hunt and make your childhood self proud (in a 21st century kind of way).
Our mission is to secure voice with trust, identity and intelligence. We're protecting people from spam and fraud calls, connecting businesses with their customers, and helping carriers secure their networks for all.
West Monroe is a digital services firm that was born in technology but built for business—partnering with companies in transformative industries to deliver quantifiable financial value. We believe that digital is a mindset—not a project, a team, or a destination—and it’s something companies become, not something they do. That’s why we work in diverse, multidisciplinary teams that blend management consulting, digital design, and product engineering to move companies from traditional ways of working to digital operating models—and create experiences that transcend the digital and physical worlds. Connected by the 13 founding values that drive our culture, our 2,000 employees work collaboratively across the firm with the belief that your success is our success.
Verkada protects people, assets, and privacy in physical spaces with its hybrid cloud security solution that makes it simple to manage devices at scale. Our vision is to power the modern, integrated building of the future.
ExtraHop secures the hybrid enterprise through network detection and response. ExtraHop provides cloud-native network detection and response for the hybrid enterprise. Our breakthrough approach analyzes all network interactions and applies cloud-scale machine learning for complete visibility, real-time detection, and intelligent response.
SpecterOps provides adversary-focused cybersecurity solutions to help organizations understand how threat actors maneuver against them, so they can successfully defend against advanced attacks.
Hybrid conflict. Non-state actors. Digital hacktivists. Tribal politics. Advanced technology. Ancient beliefs. Rapid adaptation. Strategic uncertainty. Declining resources. Rising extremism. Today’s national security challenges are complex and multidimensional, requiring adaptive, interagency responses. For more than a decade, IDS International has delivered innovative training, research and operational civil-military services to help address these 21st century challenges. We are seasoned soldiers, aid workers, diplomats, intelligence professionals, cyber warriors, technical experts, political advisors, and more with a common understanding of how to train for and operate in conflict zones and transitional areas. Our team of interagency experts and field practitioners operate and train together daily, building on our global multidisciplinary understanding of challenges, best practices and new approaches. This wide range of perspectives permits us to serve as a liaison between civil society, military, government and technology to enhance coordination and effectively solve complex security and political problems.
Defiant is the industry leader in website security. We provide software and services to millions of website owners to protect their reputations, customer data and their businesses.
OneLogin Access augments the SaaS Identity-as-a-Service functionality of the OneLogin Unified Access Management Platform to enable you to control access to web applications hosted on -premises, at remote data centers, and in private clouds, all from a single user interface.
Shujinko, the better way to build in the cloud. Take the easy path to secure, compliant cloud environments. Don't waste time and money building cloud environments that won't pass compliance. Stop collecting evidence manually for audits. Shujinko is ensuring compliance from the start and automatically collecting evidence to pass your audit!
Ekata provides global identity verification via APIs and a SaaS solution. Our product suite is powered by the Ekata Identity Engine that uses complex machine learning to derive unique data links from our customer network and graph to provide the standard in global identity verification to companies.
Security Innovation is a pioneer in software security and literally wrote the book on How to Break Software Security. Since 2002, organizations have relied on our assessment and training solutions to secure software wherever it runs. Our services clients are among the largest brands in the world - Microsoft, AWS, Symantec, Disney, State Farm, Verizon, just to name a few. They trust us to provide best-in-class software penetration testing, application security consulting and infrastructure security consulting. Our clients rely on our experts so much, that they asked us to train their internal teams to help scale their software security programs. So, we created CMD+CTRL Training combines role-based courses with hands-on cyber ranges to build skills that stick, a computer-based security training that has been recognized 6 times on the Gartner Magic Quadrant. With over 3.5 million users, CMD+CTRL helps all software security stakeholders address the risk of today’s tech stacks – flawed design, defenseless code, expanded attack surface, and misconfigured deployments.
Command Investigations, LLC is the preferred provider of Surveillance, SIU and Anti-Fraud Programming provided to P&C Carriers, Self-Insured Entities and Third-Party Administrators. Command is not a traditional vendor…but rather a strategic resource and committed investigative partner. We have successfully blended the most sophisticated technology platforms with the finest staff to create a unique combination that leverages man, woman and machine.
We enable organizations to easily connect, segment, revoke, cloak and manage any of their networked ‘things’ from the IoT edge to all major clouds. Our solutions address IP network vulnerabilities and stack fatigue that afflict today's enterprise networks; exposing them to breaches. We unify networking and security to cut complexity and reduce risk
Stabilitas is the first cloud and Artificial Intelligence based critical event management technology that helps companies protect their employees and resources in an unstable world. The Stabilitas platform detects potential threats from news, government feeds, social media, correlating the data via ML to identify at-risk scenarios to create alerts.
StrataCore is the premiere IT services broker for data center, cloud, connectivity and security. With more than 300 clients and 1,000 contracts negotiated worldwide, StrataCore delivers clients improved IT performance, at a lower cost. StrataCore offers unbiased, custom solutions while maintaining a clear view of the competitive landscape to optimi
Polyverse has changed the game for cybersecurity. We’ve taken the long-theoretical concept of Moving Target Defense and made it a reality. By forcing attackers into an impossible race against time, and perplexing them with a constantly changing target, we make their attack more trouble than it is worth. Polyverse completely disrupts the economics o
Work Your Passion. Live Your Purpose.