259 Companies

Access all companies

Find technology partners quickly.

Spotfolio tracks over one million companies in technology industries.

There are 259 companies in the field of Application Performance Management on spotfolio that produce or deliver products, that utilize or research technologies or that are otherwise engaged in topics such as Data, Application, Cloud, Software, Performance, Support, Management, Business, Security .

Start-ups (43)

Early-stage companies (73)

Established companies (137)

The majority of these companies is located in the following countries.

United States (112)

Canada (18)

India (17)

United Kingdom (13)

Example Companies

Find companies in your area

OEDIV

established

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

Network & Security SAP Hosting Architecture Consulting ECM / SAP Archiving Application Hosting Remote Application Hosting SAP HANA Data Center Security IT-Compliance ...

network infrastructure. In addition we provide you with next-generation security functions like intrusion detection/prevention, application control, or ...

consultancy and maintenance of security configurations as well as firewall rule sets, and we also support you in heightening the security level to protect services ...

compliance with German Federal Office for Information Security (BSI) regulations. Our network security concept is regularly reviewed and upgraded through ...

tests, and ISO 2001 certification to meet the growing demands put on the security of information processing components. back - The Company - Company philosophy ...

HANA - Managed Services - Database & Applications - Cloud - Network & Security - Application Management Service - EDI - Master data management - SAP

Network & Security SAP Hosting Architecture Consulting ECM / SAP Archiving Application Hosting Remote Application Hosting SAP HANA Data Center Security IT-Compliance ...

References Partner History Company Philosophy Security „Structured technical and organizational security management“ Our services are founded on a modern ...

the systems, our IT satisfies the most stringent security requirements. In addition to contiguous security checks on the systems and data networks, we guard ...

round-the-clock. More information: - IT-Compliance / Certification - Data Center Security „We support you with our experience in the protection of your critical ...

critical company assets.“ André Dyck, Executive Manager Architecture & Security - The Company - Company philosophy - History - Partner - References - Career ...

HANA - Managed Services - Database & Applications - Cloud - Network & Security - Application Management Service - EDI - Master data management - SAP

Marlabs Inc

established

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

Infrastructure - SAP - Cloud Migration - Microservices - Digital Security - Cyber Security Services - Blockchain - Digital Experience - User Experience ...

& Webinars - News & Press Releases - Corporate Citizenship - CYBER SECURITY, THREAT INTELLIGENCE, RISK MANAGEMENT AND PEN TEST. We are helping businesses ...

integrate tools and solutions that facilitate security management in their organisation. Cyber security is one of the biggest challenges for enterprises ...

important part of every business organization. To be secure and minimize security vulnerabilities is one of the primary focus and strategy today. With lack ...

monitor your cyber security operations every second. At Marlabs, with our holistic approach towards digital security/cyber security practice, we provide ...

application systems, networks, and database through our plethora of cyber security services. Our Risk Management Services, Threat Management Services, BlackOps360

Infrastructure - SAP - Cloud Migration - Microservices - Digital Security - Cyber Security Services - Blockchain - Digital Experience - User Experience ...

INTELLIGENCE Home Digital Security - Brochures CYBER THREAT INTELLIGENCE NextPrevious CYBER THREAT INTELLIGENCE By admin | Digital Security - Brochures | 28 September ...

Themes free download udemy course Brochure, Cyber security, cyber threat intelligence, Digital security, Marlabs, Risk management, Threat intelligence admin ...

admin More posts by admin Related Post Cyber Security Practice By admin | Comments are Closed A holistic approach with people, process & technology ...

vulnerability assessment is to raise awareness about the state of Web application security by identifying some of the most critical risks facing your organization ...

Offense is Defense | Hunting Cyber Threats By Marlabs | Comments are Closed Security isn’t the only thing that’s become better with time. Cyber-attacks are

Fusionbox

established

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

Database Consulting - Code Security Auditing - process - about us - contact Toggle Site Menu Do you have an application security plan? You need to. 84% ...

vulnerabilities often provide attack vectors that circumvent your network security. They also create risk for your customers. Application Testing Code Auditing ...

secure software, > NOT more security software. > --Website Security Statistics Report, White Hat Security Application Security Testing You don't know what ...

attacks another company's network. Fusionbox performs in depth Software Security audits of your web and mobile applications so you can find out about your ...

attack vectors. But it's our Ethical Hacking that differentiates us. Our security engineers know how to think like hackers and they'll approach your system ...

and dynamic) - Web Application Penetration Testing - Mobile Application Security Testing > Only 9% of victimized companies discovered data breaches of

App Development - UX / UI Design - PostgreSQL Database Consulting - Code Security Auditing - process - about us - contact Toggle Site Menu Custom Software ...

configuration, security, and management; and certified PostgreSQL services. Read more about Fusionbox's love for well-designed data > /services/code-security-auditing/ ...

diting/ Application Security Application Security Assessment and Secure Software Development Fusionbox specializes in security, which is important to ...

want to minimize their risk and the risk to their customer base. We offer security assessment services like ethical hacking, penetration testing, and dynamic ...

goes through our application security testing to ensure it's ready for the real world. Read more about Application Security at Fusionbox > We love working

Moviri

established

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

Analytics - Security - Products - Solutions - Mobile Performance Management - TSCO Solution Packs - Customers - Partners Services IT Security Today ...

IT Risks, preserve Security and ensure Compliance while being responsive to Business requirements and timelines. Enterprise Security Intelligence Enterprise ...

and internal systems that impact the IT security and risk posture of an enterprise. The goal of Enterprise Security Intelligence is to provide actionable ...

any size organization. Moviri Capabilities - Security Information & Event Management (SIEM) - Security Orchestration Automation and Response (SOAR) - ...

User and Entity Behavioral Analysis (UEBA) - Threat Identification and Security Intelligence Fraud and Risk Intelligence Online Services Protection ...

Threat Intelligence Security Service Digital Identity Identity and Business Services An Identity and Access Governance security strategy provide visibility

Troubleshooting - Operations & Cloud - Capacity Management - Analytics - Security - Products - Solutions - Mobile Performance Management - TSCO Solution ...

portfolio of Performance, Functional and Security tests in the industry. - Performance Testing - Functional Testing - Security Testing Performance Testing Today ...

test assets, training, knowledge transfer Security Testing Security testing can greatly reduce the security risks associated with running your business ...

combining Static Application Security Testing and Dynamic Application Security Testing, offers the most comprehensive security testing service for enterprise ...

applications during the software development lifecycle. Static Application Security Testing (SAST) Static Testing involves testing the application by examining ...

inputs - Does not require the application to be running Dynamic Application Security Testing (DAST) Dynamic Testing is a methodology that is best aimed at

Avecto Avecto Ltd

established

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

Services - Training - Events - Company Security Protecting our customers is our first priority and industry-leading security goes into every product and every ...

Products Designed with Security at the Forefront Businesses today must not only meet increasingly stringent company security policies, but many are also ...

to industry compliance mandates such as HIPAA or PCI. With BeyondTrust, security professionals can control and monitor privileged access and remotely access ...

organization meet security goals. Privileged Identity Security Protect privileged accounts and prevent cyber-threats. Privileged Access Security Monitor privileged ...

attack surface. Remote Support Security Secure remote access to desktops and critical systems. BeyondTrust Cloud Security BeyondTrust Cloud offers more

Learn more about Active Directory Bridging Active Directory Security Active Directory security is vital to protect user credentials, company systems, sensitive ...

applications, data, and various other aspects of their organization’s network. A security compromise of AD can essentially undermine the integrity of your identity ...

about Active Directory Security C Cloud Security/Cloud Computing Security Cloud security—also called cloud computing security—refers to the discipline ...

cloud computing environments, applications, data, and information. Cloud security entails securing cloud environments against unauthorized use/access, distributed ...

and other risks. While cloud security applies to security for cloud environments, the related term, cloud-based security, refers to the software as a service ...

model of security services, which are hosted in the cloud rather than deployed via on-premise hardware or software. Learn more about Cloud Security/Cloud

Use detailed technology terms.

Only spotfolio allows for searching with detailed technology terms, as we provide you with all topics that technology companies talk about.

Use Cases

Register now

Why Technology Scouting?

Technology scouting is the basis for your innovation management, identifies new technological developments as early as possible and protects you from disruptive business models.

Identify technology partners

Boost your market research

Look beyond major players

Build long and short lists

Collect technology leaders, providers, start ups and potential new partners in lists via simple tagging to take further steps with your team.