IT-Harvest Research
CYBER 150 2024 Winners
Access analyst briefings, live product demos, and technical resources from the 142 cybersecurity vendors selected for the 2024 Cyber 150 list.
142
Vendors
6
Live Demos
20
Categories
142 Companies

Cyera
As a pioneer in Data Security Posture Management (DSPM), Cyera instantly provides companies visibility over all of their sensitive data, context over the risk it represents & their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data.

Descope
Reduce user friction, prevent account takeover, and get a 360° view of your customer identities with the Descope CIAM platform. Trusted by hundreds of organizations including GoFundMe, Databricks, Navan, and You.com.

Protect AI
Protect AI is the platform for AI security, delivering end-to-end protection for AI applications from model selection and testing to runtime and beyond with a Secure by Design methodology.

Radiant Security
Radiant Security is the agentic AI SOC platform that investigates 100% of alerts automatically across the entire security stack without requiring pre-built playbooks or manual configuration.

Torq
Torq delivers the first AI-native, autonomous SecOps platform — HyperSOC — which eliminates SOAR's constraints, delivers machine-speed triage, investigation, and remediation and plugs into your entire stack, out of the box.

Zenity
Zenity empowers enterprises to enable AI Agents securely. Our platform ensures adaptive security and governance from buildtime to runtime — spanning tools, permissions, context, and actions across environments.

Accertify
Our leaders are experts in the digital risk management industry, with a passion for driving innovation and empowering our clients to grow with confidence. They bring a wealth of experience from a variety of backgrounds and industries, and their diverse perspectives help us to stay agile and responsive to the evolving needs of our customers. Because many of our leaders started out as fraud managers and analysts, they understand the daily struggles our clients face and founded Accertify with keeping your experience at the forefront.

Adlumin
Adlumin brings technology and talent to be there to help modern organizations comply, detect, prioritize, and respond to cyber threats and IT operations in real-time. Because nobody wants to get caught in the dark.

Airlock Digital
Allowlist made simple. Airlock Digital provides enterprise-grade application control that is easy to manage and scalable. Built by experts to help organizations protect their most important assets.

AKITRA
Agentic AI’s intelligent agents continuously analyze data and adapt to new risks, making smarter compliance decisions as your environment evolves. Cut time and cost by automating tedious compliance tasks.

Alert Enterprise
As the only SaaS provider to connect physical security, IT, OT and HR systems, our AI-powered solutions enable organizations to unify, simplify and automate the entire workforce experience. And with compliance and data privacy built-in, you’ll protect people, places and assets while unlocking new levels of business. P.S.: No coding required.

Alethea
Alethea’s mission is to protect organizations from harms caused by online risks, social media manipulation, influence operations. We don’t just listen to what’s out there, we predict how you can avoid risk.

ANY.RUN
Cloud-based malware analysis service. Take your information security to the next level. Analyze suspicious and malicious activities using our innovative tools. Empowering SOC performance with cutting-edge .

Astra
Astra Security makes pentests continuous and scalable for thousands of businesses worldwide.

Astrix Security
Gain visibility and control over AI agents & NHIs. Astrix secures agent identities with governance, least-privilege access, and full audit trails. Identify and remediate AI agents and NHIs with excessive privileges, vulnerable configurations, abnormal activity, and policy violations.

Becrypt
As a trusted partner for government, we continue to deliver innovative high assurance products and services protecting public and private sector organisations from elevated cyber threat.

Bfore.ai
Our mission is to develop cybersecurity to a preventive posture, leaving detection and response where it can’t be done otherwise.

BI.ZONE
BI.ZONE is an expert in digital risks management. We help organizations develop their businesses safely in cyberspace

BlackCloak
Personal cybersecurity and digital privacy protections for individuals and companies. Stay informed with our comprehensive collection of DEP news and insights, in-depth reports, and the top tips for staying secure. Prevent deepfakes targeting your executive team.

Blumira
Blumira's automated detection and response platform enables the faster resolution of threats to help organizations of all sizes stop ransomware attacks and prevent data breaches. Try it free today: blumira.com/trial

Bolster
Phishing and impersonation attacks have gone multi-channel. Our mission is to stop these evolving attacks across all channels with near-perfect AI accuracy, protecting users from online scams and threats.

BRANDEFENSE
With over 20 years of experience, a team of 100+ dedicated professionals, more than 1,000 satisfied clients, and a stellar 4.8 customer rating, we continue to set the standard for quality and customer satisfaction.

Breachlock
BreachLock delivers penetration testing services across your entire attack surface using human-delivered, AI-powered, and automated solutions. We give you the flexibility and versatility to choose what works best for you.

Cayosoft
Cayosoft delivers the only unified solution enabling organizations to securely manage, continuously monitor for threats or suspect changes, and instantly recover their Microsoft platforms (on-premises Active Directory (AD), hybrid AD, Entra ID (formerly Azure AD), Microsoft 365, Teams, & Intune).

Censys
Censys empowers security teams with the most comprehensive, accurate, and up-to-date map of the internet to defend attack surfaces and hunt for threats.

Chainguard
Built by the industry's leading experts on software supply chain security, open source software, and cloud native development.

CloudSEK
At CloudSEK, we combine the power of Cyber Intelligence, Brand Monitoring, Attack Surface Monitoring, Infrastructure Monitoring and Supply Chain Intelligence to give context to our customers’ digital risks.

Compass Security AG
Compass Security is a Swiss company with over 70 employees and offices in Switzerland, Germany and Canada. Founded in 1999 by Walter Sprenger and Ivan Bütler, Compass Security has developed into a technically outstanding and IT-Security consulting company recognized throughout Europe.

Concentric AI
Autonomous data discovery, classification, risk monitoring, and remediation with Concentric AI, the Data Security Governance Platform.

Coralogix
We’re rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

CyberFOX
We excel at cybersecurity because it’s all we do. As a global cybersecurity company, our cybersecurity solutions help managed service providers (MSPs) and IT professionals implement password and privileged access to more easily manage the infrastructure of your company or those of your clients.

Cyble
Cyble empowers organizations to take control of their cyber risks with AI-driven, cybersecurity platforms. We specialize in uncovering critical insights from across the Deep Web, Dark Web, and Surface Web, ensuring that our clients stay ahead of emerging threats in an ever-evolving digital landscape.

Dazz
Dazz unifies exposure data across code, clouds, apps, and infrastructure; prioritizes the riskiest findings to address first; and generates smart remediation plans that enable security and engineering teams to fix exposures in hours instead of weeks.

DealRoom
We collect millions of unstructured data points each month and turn it into actionable intelligence. Create signal from the noise with Dealroom Signal and unlock predictive intelligence throughout the entire startup lifecycle.

Dedrone
Dedrone is revolutionizing drone defense with our advanced AI-Driven Autonomous C2 platform. We have gone beyond the limits of simple sensor correlation.

DeleteMe
Your Personal Data is Yours Again. DeleteMe makes it quick, easy and safe to remove your personal data online. Say goodbye to complex enrollment procedures and hello to a seamless process experience. Submit your personal information for removal from search engines and data broker sites.

Dispel
Get secure remote access to industrial control systems for operators, third-party vendors, and machine builders. Learn why manufacturers, utilities, and governments choose Dispel Zero Trust Access for IoT, OT, XIoT, and other cyber-physical systems.

Doppel
By pairing cutting-edge AI with expert analysis, we outpace threats like phishing, impersonation, and disinformation—delivering comprehensive coverage, speed, and precision. Attackers now weaponize AI to scale personalized, multi-channel threats faster than humans can react.

Dream Security
National Sovereign Artificial Intelligence National Sovereign AI After 3 years working with CyberSecurity for Governments, we discovered that national organizations don’t lack data, they lack the ability to operationalize it inside sovereign environments and to gain actionable insights.

DTEX Systems
DTEX leads insider risk management with an AI-driven, unified platform for DLP, UAM, and UEBA. InTERCEPT™ protects data and people at scale with proactive, privacy-first solutions used globally.

Dune Security
Led by a team of industry experts, we're on a mission to fight AI with AI. We know that for today's enterprises, CISOs' biggest risk lies in their users, not their systems. By utilizing contextualized testing and training to significantly reduce employee error, our platform is eliminating social engineering risk with automated remediation.

DuploCloud
Deploy secure, compliant infrastructure in days—not months. No manual setup, no complexity. With DuploCloud’s intelligent automation, you’ll accelerate time to market, cut costs, and focus on innovation.

Elisity
Elisity is a solution that provides identity-based microsegmentation for an existing access layer switching infrastructure. This allows for non-disruptive deployment, rapid time to value, and both north-south and east-west microsegmentation all the way down to users and devices within the same VLAN.

Endor Labs
Endor Labs is an application security platform built for AI-generated and human-written code, helping teams prioritize and fix real risk across the SDLC. e-removeCustomize your preferencesEssential RequiredThese items are required to enable basic website functionality.

Entersekt
Industry-leading banking and payment authentication for financial institutions.

Faddom
Faddom was built on the principle of collecting all IT infrastructure information that is possible to collect without being intrusive with agents and without doing anything active that can impact performance such as accessing servers or scanning.

Filigran
OpenCTI is an open source threat intelligence platform enabling users to collect, correlate, and leverage threat data at strategic, operational & tactical levels. Organize your cyber threat intelligence to enhance and disseminate actionable insights with our open-source threat intelligence platform.

Firefly
"This integration with Firefly brings immense value by enabling us to run automatic campaigns to prevent resource end-of-life instances and validate backups. " "It became easy to understand when EC2 instances were isolated from security groups, and where configuration was lacking for a specific component...

Flare
Flare equips your team to shut down cybercrime before it escalates. Detect, prioritize, and remediate external cyber threats with automated Threat Exposure Management. 2026 State of Enterprise Infostealer Identity Exposure PlatformWhat is Flare. It helps us protect our brand and financial .

Garland Technology
We believe that securing and monitoring your network is the ultimate goal. Our TAP to ToolTM philosophy empowers the solution by architecting to the tool, not competing with them. Garland Technology provides the scalability and flexibility to deploy what you need, when you need it, so you can focus on what's important - performance and cybersecurity.

Graylog
Graylog v6.1 simplifies both security and IT operations, offering smarter ways to manage data and gain critical insights. With enhanced tools to reduce alert fatigue, cut storage costs, and streamline investigations, this release empowers teams to work more efficiently without sacrificing performance.

Group-IB
Group-IB is a creator of cybersecurity technologies to investigate, prevent and fight digital crime, and to protect businesses, citizens and support law enforcement operations.

Gutsy
At Gutsy we’re redefining how the world does vulnerability management. We believe that security is about people, process, and technology, but customers didn't have a good way to understand how those worked together.

Gytpol
Preemptive Cybersecurity for Risk-Free Results. Fast deployment, non-disruptive remediation, and on-demand rollback. Traditional tools only flag the problem, leaving remediation to error-prone, manual efforts. Remedio closes the loop, automating fixe across your devices, identity, and AI stack.

Hackmetrix
Creamos un método para tí, no importa que no seas especialista en ciberseguridad. En unos pocos meses estarás listo para cumplir o certificarte e incrementar la seguridad de tu empresa.

Halcyon
Halcyon is the cyber resilience platform that Global 2000 companies rely upon to defeat ransomware-as-a-service-borne attacks.

HarfangLab
Your endpoints, our protection! Empower your analysts, overcome the threats

HiddenLayer
The HiddenLayer team was born out of a real-world adversarial artificial intelligence attack in 2019. Learn about how we are fighting back.

Horizon3.ai
Continuously assess, fix, and verify your security posture. Securing enterprises across many attack surfaces. Additional visibility into Iranian-backed threat actor activity | Available now to all . Autonomous Attack Validation Is How You Get There.

Hoxhunt
The next generation of security awareness is designed for employees and built for enterprises. Our industry-leading results are powered by cognitive automation.

Huntress Labs
Get managed detection, investigation, and response for your endpoints, identities, and more. Our technology is custom-built for growing organizations like yours and is backed by an elite threat hunting team that watches over your business 24/7.

Immunefi
Review code. Prevent hacks. Build rep. Get paid.

incident.io
io is an all-in-one incident management platform unifying on-call scheduling, real-time incident response, and integrated status pages – helping teams resolve issues faster and reduce downtime. New: AI-native post-mortems are here!

Intel 471
Over the past decade, Intel 471 has elevated our CTI by combining high-fidelity automated collection with Cyber HUMINT, revealing the mystery behind pre-attack planning by providing deeper visibility into the tools, tactics and methodologies threat actors use.

Island
Island is a reimagining of enterprise work. A single space, where everything organizations need to work safely and productively is built in. And everything else is out of the way.

Kaseware
Founded by former FBI Special Agents, our platform is guided by former law enforcement and safety professionals who understand your needs — because we’ve done the job.

Kriptos
At Kriptos, we empower businesses to manage sensitive information with advanced AI-driven data classification, enhancing cybersecurity posture and compliance with major regulations.

LayerX
LayerX secures all user and agentic interactions across any browser, app and IDE.

Legit Security
From your software factory to code to runtime, Legit delivers a unified view of AppSec risk. The context we provide makes it easy to pinpoint issues that matter most, quickly remediate and prevent future issues.

Link11
Link11 is a specialized global IT security provider and offers modern solutions in the areas of Network Security, Web Protection and Web Performance. The company is headquartered in Germany and has offices worldwide in Europe, North America, Asia and the Middle East.

Lumos
First Autonomous Identity Platform to eliminate sprawl and identity fatigue. Discover and manage access to all apps with enhanced security, increased productivity, and reduced cost – all in one platform.

Memcyco
Finally preempt, detect, and counter scams as they unfold, right as customers are attacked. Get full visibility of attack, attacker and each individual victim

MineOS
Cut costs, enhance data visibility, and seamlessly integrate privacy into your operations with custom compliance infrastructure for all your teams

Netcraft
Combining detection, threat intelligence and robust disruption & takedown, Netcraft’s automated digital risk protection platform keeps your organization and customers safe from phishing, scams, fraud and cyber attacks.

Nirmata
Prevent misconfigurations with real-time security enforcement in CI/CD pipelines, Kubernetes clusters, and cloud environments.

Nu Quantum
Nu Quantum was founded in 2018 as a spin-out of the University of Cambridge to commercialise research generated over the last decade at the Cavendish Laboratory. Since then, we have built a strong IP portfolio and multidisciplinary team to develop market-led quantum networking solutions.

Oasis Security
Non Human Identity Management Platform | Oasis Security unlocks lifecycle management and security for non human identities and AI Identities Oasis secures AI agents and non-human identities across IaaS, SaaS, PaaS, and on-prem environments, from AWS, Azure, and BigQuery to GitHub, ChatGPT, Salesforce, Office 365, and Copilot.

Oleria
Imagine innovating in the digital world, confident and secure. You're free to create how you want, uninhibited by barriers and cumbersome processes. With that kind of freedom, opportunities are boundless.

Oligo Security
The AI runtime security platform - Everything Runtime by Oligo Security: detect, stop, and investigate threats across cloud, Code, and Ai in real time. Applications and the infrastructure that powers them are the front lines of today's business.

Oloid
OLOID is a B2B SaaS platform for advanced physical identity and access at all workplaces, with a mobile-first approach.

Onum
Onum empowers enterprises to derive value from their data in transit, helping IT and Security teams move at the speed of business. With real-time data processing, Onum reduces inefficiencies, optimizes pipelines through reduction, transformation, enrichment, and orchestration, and minimizes the impact on analytical platforms—enabling actionable responses in milliseconds, not minutes.

Opal Security
Who has access to what, and what can they do with that access? Opal's platform helps organizations answer that question and drive down access risk with just a few clicks.

Owl Cyber Defense
Elite edge security, cross domain solutions, and proven expertise for high-assurance network protection and secure data transfers

OX Security
Only a fraction of AppSec issues are exploitable, reachable and impactful. OX enables AppSec and DevOps teams to go deeper than generic prioritization and fix the 5% of issues that matter before they get to the cloud — from design to runtime.

Permiso Security
Prevent and detect credential compromise, account takeover and insider threat for all identities, across all environments.

Phosphorus
Use Phosphorus to reduce risk and prevent threats by discovering, remediating, monitoring, and managing every IoT, OT, and IoMT Cyber-Physical System at scale.

PointSharp AB
Pointsharp is a European cybersecurity company that enables organizations to secure data, identities, and access in a user-friendly way.

Portnox
By eliminating the need for any on-premises footprint common among traditional systems, Portnox allows companies–no matter their size, geo-distribution, or architecture–to deploy, scale, enforce and maintain zero trust security policies with unprecedented ease.

Privado
Privado is securing applications throughout the development lifecycle from code to deployment. The company helps organizations strengthen their security posture and protect critical assets.

Private AI
Detect, anonymize, and replace 50+ personal information entities, on-premises or in the cloud, in 50+ languages with less than half the error rate of alternatives.

ProcessUnity
ProcessUnity is a leading provider of cloud-based solutions for third-party risk and cybersecurity performance management, unifying how businesses assess, measure, and mitigate risk through automation

Protexxa
Don’t Just Find Cyber Threats. Protect your people, your reputation, and your bottom line with Protexxa Defender Let Us Show You How of consumers say businesses bear responsibility for digital privacy Protexxa is a B2B SaaS cybersecurity platform that leverages Artificial Intelligence to rapidly identify, evaluate, predict, and resolve cyber issues.

Purevpn
Imagine this: everything on internet is accessible with complete privacy at exceptional value. Sounds like a dream, no?

Pyramid Computer GmbH
We are specialists in digital automation. Industry? Retail? Catering systems? Healthcare? SME or corporation? We have the right hardware and services for every sector and use case. Standardized or customized.

Qohash
Qohash was born out of necessity. Our background in defense and security meant that we had witnessed too many times the implications of mishandling highly sensitive data. The spark was ignited by a series of high-profile data breaches involving employees with access to high-risk unstructured data.

Qomplx
QOMPLX Identity Threat Detection and Response (ITDR) continuously validates to prevent network takeovers

Raonsecure
Due to digitalization across our society and the transition to a contactless society, it is ever more critical to proactively respond to evolving security threats and securely prove one’s identity in the digital world.

Resecurity
Cyber Security Services ➦ Resecurity . ☑ Detecting, protecting, and eliminating any digital threats. ⇒ Working in USA and all over the world. Cyber Services – defense & solution: ✐ contact@resecurity.

Safe Security
If you ask a CEO, how would they evaluate their status of risk exposure to cybersecurity and what are they doing as key elements, it’s piecemeal. The CEO would probably struggle. And that’s what Modi got, that others didn’t.

SafeBase
Build customer trust upfront with secure Trust Center access to security and compliance information. Generate accurate, real-time questionnaire responses with AI, boost team productivity, and prove security ROI — all from the SafeBase Trust Center platform.

SandboxAQ
In the tech and data intelligence worlds, a sandbox is where innovation is born. It’s a place where the brightest free-thinking minds from across disciplines come together to reimagine what’s possible. A collaborative environment where the whole is infinitely greater than the sum of the parts.

Savvy
See every app, control every identity—without the integration overhead of traditional tools.

Scrut Automation
Scrut is a risk-focused compliance automation platform that helps simplify and streamline information security for cloud-native companies.

Scytale
The only complete compliance solution, helping companies get compliant and stay compliant with security and privacy frameworks. 🎉 Scytale named 2026 G2 Best Software Award winner in GRC.

Seclore
Seclore’s mission is to protect sensitive data, giving organizations complete control over critical information with innovative solutions. Founded on the principle that traditional cybersecurity is no longer sufficient, we aim to be the leading provider of data-centric security solutions. Our vision is to deliver unparalleled protection and control over sensitive information on all platforms and devices. We’re committed to providing exceptional customer service, with innovative technology that helps organizations protect their valuable assets and achieve digital transformation goals while ensuring the highest levels of security and compliance.

Second Front Systems
We’re on a mission to secure a strategic advantage for the world’s democracies by accelerating government access to emerging technologies.

Securden
IT security sphere has always been synonymous with sky-high pricing, complexity, and undue dependence on consultancy services. Companies often have to choose between a complicated and super-expensive solution and a super-complicated and expensive one.

SecureW2
Fully managed Cloud PKI, RADIUS Authentication, and Device Onboarding services provide a simple foundation for certificate-driven security.

Silverfort
Silverfort was founded by leading cybersecurity and cryptography experts from the 8200 elite cyber unit of the Israeli Intelligence Corps.

SoSafe
Security awareness training and human risk management that puts people first. Our platform reduces human risk by leveraging behavioral science to sharpen employees’ security instincts.

Spin Technology
Enhance cyber resilience, streamline security operations, and protect SaaS data for your mission-critical applications.

Spring Labs
AI-Native conversational intelligence turns chatter into actionable insight. Help your compliance, operations, and product teams get faster and smarter.

Sprinto
Ambitious tech companies all over the world trust Sprinto to power their security compliance programs and sprint through audits without breaking their stride.

Stream.Security
The Industry's Only Real-Time Cloud Threat & Exposure Detection and Response Solution

strongDM
Once a customer, forever a fan. There’s a reason why StrongDM has a 98% customer retention rate year-over-year. Yes, our product works. Yes, it makes life easier and more operationally effective for technical experts. Yes, it is secure-by-design. How do we do it? Our values keep us true to our mission.

TAC Security
Our leaders share the unanimous goal of securing the cyberspace and that makes them unstoppable.

TECH5
TECH5 is an international technology company, founded by experienced senior figures from the biometrics and identity industry. The company focuses on developing disruptive biometric and digital ID offerings through the application of AI and Machine Learning technologies.

TecSec
TecSec’s focus is on Information Security and Information Access Management, enforced through cryptography. TecSec provides consultation and design services, as well as software and hardware products based upon the company’s 7th generation, standards-based VEIL® technology, leveraging their large library of patents and still growing intellectual property.

Tenchi Security
Tenchi Security is a venture-backed startup specialized in Third-Party Cyber Security Posture Management. Zanshin, our SaaS offering, provides unprecedented visibility and systematic material reduction of Third-Party Cyber Risk in a cooperative, continuous and comprehensive fashion.

Teramind
Insider threat detection, data loss prevention, productivity analysis, and business process optimization powered by advanced user behavior analytics.

ThetaRay
Our Cognitive AI solutions identify hidden risks, streamline processes, build trust, and empower institutions to adapt, grow, and deliver seamless customer experiences.

ThreatLocker
An endpoint security platform that puts you in control with Application Allowlisting and Ringfencing™ to stop the misuse of vulnerable elevation, storage and network traffic.

ThreatModeler
A step-by-step guide to proactively mitigating risk across your applications and infrastructure.

Tines
Build, run, and monitor workflows with the most intuitive platform loved by security-minded teams.

Todyl
Consolidated. Comprehensive. Customizable. Our platform empowers businesses with comprehensive cybersecurity delivered through a single-agent platform. Leveraging our innovative modules, businesses can customize our capabilities to meet any need.

Traceable
The Traceable platform captures, correlates and analyzes all API-related activity over time, across your entire API ecosystem

Transcend
Improve compliance, cut costs, and enhance business innovation and customer trust by encoding privacy directly into your business systems.

TrustCloud
Integrated AI and API native platform for CISOs to consolidate and automate numerous security and GRC silos

Trustonic
Forward-thinking and fast-moving, Trustonic delivers advanced technology systems to drive innovation, protect revenue and enhance security for technology companies worldwide. We’re on a mission to connect the next billion smartphones and protect the things people care about.

Tutus
Tutus is a privately-held Swedish company that was founded in 1992. Ever since, the company has been developing top quality network encryption solutions.

UpGuard
See your attack surface and third-party risk with unrivaled clarity. Reduce your team’s workload at the same time.

Upwind
Combine the power of cloud security posture with runtime context and realtime protection— enabling your security team to prioritize accurately and respond fast to your most critical risks. Your browser does not support the video tag.

Very Good Security
Manage all your card data with a single API. Streamline card data management to improve payment performance and enhance customer experiences.

Vicarius
Vicarius' vRx bridges the gap between vulnerability discovery and remediation with automated patching, patchless protection, and custom scripting. Trusted by 500+ customers in 40+ countries.

Wallarm
Wallarm is an API security platform that finds and eliminates API threats. to discover API attack surface and respond to API security incidents, all while keeping their data safe and secure.

Wing Security
Protect critical SaaS applications with an end-to-end SSPM & ITDR solution by identifying risks, remediating threats, and protecting critical company data

XM Cyber
XM Cyber is the leader in attack path management, using the attacker’s perspective to find and remediate critical attack paths across on-premises and multi-cloud networks.

Zafran
Proactively stop vulnerability exploitation with Zafran's AI-native Exposure Management, unifying risk detection and mitigation to protect hybrid assets. Zafran is for security teams buried in vulnerabilities and manual work.

Zama
Zama is a cryptography company building open-source homomorphic encryption solutions for blockchain and AI, enabling a broad range of privacy-preserving use cases.

Zero Networks
Zero Networks delivers automated microsegmentation, securing assets on-prem, in the cloud, and OT/IoT. Deploy in 30 days with set-and-forget simplicity. Fully Automated for Zero Trust Segmentation and Remote Access Connect Remote Users Protect Third Party Access Compliance & Savings .

Zilla Security
Zilla is an Identity Security platform that combines identity governance with cloud security. The platform delivers access visibility, access reviews, lifecycle management, and policy-based security remediation that is automated, and easy to use.

Zluri
Zluri is a unified SaaS Management and Identity Governance platform designed to empower modern enterprises with complete visibility and control over their SaaS applications, access, and costs.