87 Companies

Access all companies

Find technology partners quickly.

Spotfolio tracks over one million companies in technology industries.

There are 87 companies in the field of Browser Extensions on spotfolio that produce or deliver products, that utilize or research technologies or that are otherwise engaged in topics such as Chrome, Extension, Firefox, Users, Web, Install, Add, Support, Security .

Start-ups (8)

Early-stage companies (21)

Established companies (49)

The majority of these companies is located in the following countries.

United States (37)

India (6)

Israel (5)

Germany (4)

Example Companies

Find companies in your area

SaaSID

established

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

BACKUP & FILE SHARING SecuriSync Backup & File Sharing Outlook Backup SECURITY & COMPLIANCE Email Archiving Email Encryption Intermedia Email Protection ...

HostPilot® by Intermedia Intermedia’s Worry-Free Experience™ Overview Security Reliability Onboarding Support Compliance Infrastructure Success Stories ...

Challenges The Costs of IT Management of Services Lack of Key Features Security and Compliance Improving Infrastructure - Industries - IT challenges - ...

"worry-free" security? Comprehensive protection across 7 areas of data and physical security Data replication at the server and client level Security measures ...

Quote - Overview - Security Private cloud availability Private clouds are available for customers that want customized security or integrations. - ...

- Logging/Monitoring/Alerting - Security Analytics - Internal Security Practices Security information and event management - Logs are centrally collected

BACKUP & FILE SHARING SecuriSync Backup & File Sharing Outlook Backup SECURITY & COMPLIANCE Email Archiving Email Encryption Intermedia Email Protection ...

HostPilot® by Intermedia Intermedia’s Worry-Free Experience™ Overview Security Reliability Onboarding Support Compliance Infrastructure Success Stories ...

Challenges The Costs of IT Management of Services Lack of Key Features Security and Compliance Improving Infrastructure - Industries - IT challenges - ...

local reseller - IT Challenges - Security & Compliance Security & Compliance Businesses of all makes and size face security threats due to their IT setup ...

need to implement. Infrastructure Cost Lack of Features Security & Compliance Management SECURITY & COMPLIANCE How do I make sure my email and file system ...

Read article SECURITY & COMPLIANCE How should we maintain our files and emails to help facilitate corporate auditing? Read article SECURITY & COMPLIANCE

otto by DEVCON DEV/CON DETECT INC

start-up

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

/cart Skip to Content Products JavaScript Secure AdTech Security® CSP otto~mate Endpoint otto~matic ShopSecure with otto Pricing Documentation Code Integration ...

Integration Login Open Menu Close Menu Products JavaScript Secure AdTech Security® CSP otto~mate Endpoint otto~matic ShopSecure with otto Pricing Documentation ...

Login Open Menu Close Menu Folder: Products Back JavaScript Secure AdTech Security® CSP otto~mate Current Page: Endpoint otto~matic ShopSecure with otto Pricing ...

Pricing Folder: Documentation Back Code Integration Login Employee Security Secure your remote staff. Control beyond the Network. EndpointOtter® Install ...

plugin protects your employees working remote. Extend your control over security polices, monitoring, anti-phishing and DLP with the EndpointOtter employee ...

& repo templates for all industries In-browser alerts let employees & security teams know when malicious activity is detected and blocked. Real-time

/cart Skip to Content Products JavaScript Secure AdTech Security® CSP otto~mate Endpoint otto~matic ShopSecure with otto Pricing Documentation Code Integration ...

Integration Login Open Menu Close Menu Products JavaScript Secure AdTech Security® CSP otto~mate Endpoint otto~matic ShopSecure with otto Pricing Documentation ...

Login Open Menu Close Menu Folder: Products Back JavaScript Secure AdTech Security® CSP otto~mate Endpoint otto~matic ShopSecure with otto Pricing Folder: ...

of Contents Client-Side Security Code Accessing the code Client-side Functionality Latency Client-side Blocking Ad Tech Security Code Accessing the code ...

throughout the entire CI/CD pipeline. Real-time JavaScript Security for websites and users allows security oversight into client-side enviornments that are traditionally ...

static and dynamic analysis that first and third-party code analysis. - Security teams can use the platform and tools to control and automate rules about

SurfEasy

established

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

Android WiFi hotspot protection Access your favorite sites while on the go Security from hackers and snoops Anonymous web surfing Get SurfEasy VPN SurfEasy ...

traffic coming in and out of your device to protect your online privacy and security. Protect your Android device and surf on your phone or tablet with ease ...

SurfEasy VPN is also compatible with iOS, Mac and Windows. Privacy and Security at your Fingertips Our bank-grade encryption technology hides your online

iOS WiFi hotspot protection Access your favorite sites while on the go Security from hackers and snoops Anonymous web surfing Get SurfEasy VPN iPad ...

protect your online privacy and security. SurfEasy VPN is also compatible with Android, Mac and Windows Privacy and Security at your Fingertips Our bank-grade

MailTag.io

start-up

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

report a security vulnerability? Please email us at: Hi@MailTag.io - Responsible vulnerability disclosure policy. This policy is addressed to security researchers ...

researchers interested in reporting security vulnerabilities to MailTag (hereby collectively referred to as “THE MAILTAG COMPANY”), and must be read in the ...

MailTag Terms of Use and Purchase. If you believe you've discovered a security vulnerability on a MailTag property or application, we strongly encourage ...

when performing vulnerability research. Do not request compensation for security vulnerability reports either from MailTag or external vulnerability marketplaces ...

scanning tools and send us the output without confirming the issue is present. Security tools often output false positives that should be confirmed by the reporter ...

phishing attack and not an application vulnerability (e.g. disabling browser security features, sending the attacker critical information to complete the attack

Pocket Read It Later Inc

established

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

positions at Pocket, please visit our Jobs Page. Security If you believe you have discovered a security vulnerability in Pocket, please follow Mozilla’s ...

reporting process documented on Mozilla’s Security page. For questions related to security, please contact us at security@getpocket.com. Follow Us Pocket Blog

- Migrating Accounts to OAuth - Application Naming - Terms of Service - Security - Developer FAQ - Developer Support Introducing Pocket Preferences for

Use detailed technology terms.

Only spotfolio allows for searching with detailed technology terms, as we provide you with all topics that technology companies talk about.

Use Cases

Register now

Why Technology Scouting?

Technology scouting is the basis for your innovation management, identifies new technological developments as early as possible and protects you from disruptive business models.

Identify technology partners

Boost your market research

Look beyond major players

Build long and short lists

Collect technology leaders, providers, start ups and potential new partners in lists via simple tagging to take further steps with your team.