Privacy

766 Companies

Access all companies

Find technology partners quickly.

Spotfolio tracks over one million companies in technology industries.

There are 766 companies in the field of Privacy on spotfolio that produce or deliver products, that utilize or research technologies or that are otherwise engaged in topics such as Privacy, Data, Security, Secure, Access, Users, Encrypted, Information .

Start-ups (268)

Early-stage companies (248)

Established companies (200)

The majority of these companies is located in the following countries.

United States (327)

United Kingdom (58)

Canada (42)

Germany (32)

Example Companies

Find companies in your area

Jumbo Privacy

start-up

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

new features. Smart Privacy for Google In one tap, Jumbo will change your Privacy Settings on Google, to better protect your privacy. For example, Jumbo

Hello, I write to you as Chief Privacy Officer of Jumbo Privacy. We are a company that is premised on the philosophy that privacy of our mobile app users, and ...

2020 at 8:54:44 AM Central European Summer Time Objet: Ques%ons related to data shared by Care19 to Google, Foursquare & Bugfunder Date: jeudi 21 mai 2020

we would not be able to do so. The personal data stays on your iPhone, encrypted. If you have more questions, please email email protected, thank you! ...

Blog DOWNLOAD /search.html April 09, 2019 Private and Secure. By Design. TLDR - Jumbo will never access any of your passwords (in fact, we can’t). ...

By Design. TLDR - Jumbo will never access any of your passwords (in fact, we can’t). - Jumbo will never access any of your personal content (in fact ...

or passwords. We have designed this architecture for security and privacy reasons. Security Jumbo, in order to work, asks you to login with apps like

well as gain access to protecting professional apps like LinkedIn. You’ll also have access to everything in Jumbo Plus. Jumbo Plus offers access to additional

related to data shared by Care19 to Google Date: jeudi 21 mai 2020 à 08:10:22 heure d’été d’Europe centrale De: Zoe Vilain À: privacy@google.com, data-access-requests@google

company that is premised on the philosophy that privacy of our mobile app users, and users we represent as authorized agent, is paramount. It has come to our

are a company that is premised on the philosophy that privacy of our users, and users we represent as authorized agent, is paramount. It has come to our

You can check out Fast Company’s article here. Jumbo was named #3 in the Security category. We know that privacy is on everyone’s minds and it means a lot

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

/search About Us Privacy Office+ Resources Contact Back Insider News Premium Privacy Insights Forum Podcast White Papers & E-Books mailto:info@thedataprivacygroup

/search About Us Privacy Office+ Resources Contact Back Insider News Premium Privacy Insights Forum Podcast White Papers & E-Books mailto:info@thedataprivacygroup

to introduce a virus that then compromised the network". The hackers encrypted the firm's systems and data and demanded payment to release and repair ...

exploitation on the internet and says: > As we expand end-to-end encryption to secure people's private messages from hackers and criminals we remain committed

is now seeing some of those techniques being used on the dark web, an encrypted part of the internet that can be accessed using popular networks such as ...

Engadget Wide-ranging security flaws have been flagged in the Covid-19 contact-tracing app being piloted in the Isle of Wight. The security researchers involved ...

understood that at least one member of staff has raised the issue with the Information Commissioner. Source & full story: BBC News Facebook has billions of

significant step forward in our plans to help make sure smart products are secure and people’s privacy is protected….. I urge organisations to respond to

people access to users' direct messages. In a blog post, Twitter said that attackers could work “around Android system permissions” to gain access to a

on board! - Hayley Benbow, Compliance & Data Privacy Manager - Suzuki GB Access to experts Skilled teams are generally difficult and costly to hire directly

Papers & E-Books Contact Your Data Privacy, Managed! Posts in Data Privacy News /blog/2020/10/2/data-privacy-news-26 Data Privacy News #26 Belgian privacy

Contact Your Data Privacy, Managed! Posts in Data Privacy /blog/2020/9/12/data-privacy-news-23 Data Privacy News #23 In this week’s Data Privacy News…

meds reminders to patients ....... iOS 14 alerts reveal Redditt is reading users' clipboard data. Read More NewsPeter Borner10 July 2020Data Privacy News

profiles to support Donald Trump in the forthcoming US presidential election. Users of the online multiplayer game complained their profiles were hacked with

have targeted coronavirus vaccine research, a UK security agency has warned. The National Cyber Security Centre (NCSC) has warned that hackers linked to

consent or properly informing consumers of a 2016 move to combine personal information in Google accounts with browsing activities on non-Google websites. Commission

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

to do if and when you suspect privacy has been is breached. Needless to say one extremely easy method to prevent privacy breaches is the use of Cicada ...

The Cicada Security Blog & Podcast Safe Assets, Secure Data, Simply. Menu Skip to content - Home How to handle a security breach One of the most common

Safe and in passing talks about people’s responses to the new Facebook Privacy Notice. Post navigation ← The Cicada Security Podcast, episode 10 The

screen, activating a siren on both the device and the host, dismounting an encrypted volume, and in more extreme cases, brick the host, or even destroy cryptographic ...

any information stored on, or is accessible from the active host is instantly protected, and the possibility of exposure of confidential information is

screen, activating a siren on both the device and the host, dismounting an encrypted volume, and in more extreme cases, brick the host, or even destroy cryptographic ...

any information stored on, or is accessible from the active host is instantly protected, and the possibility of exposure of confidential information is

The Cicada Security Blog & Podcast Safe Assets, Secure Data, Simply. Menu Skip to content - Home Interesting view on two-factor authentication Over

policy based actions to deter, protect and alert, including interruption of access to system resources, active sessions, and stored, cloud or network accessible

The Cicada Security Blog & Podcast Safe Assets, Secure Data, Simply. Menu Skip to content - Home Monthly Archives: December 2012 The Cicada Security

The Cicada Security Blog & Podcast Safe Assets, Secure Data, Simply. Menu Skip to content - Home Our Technology Cicada Security Technology Inc. (CST)

deployed should provide sufficient protection against vulnerabilities posed by users, and all levels of threat. The argument for the development of security

deployed should provide sufficient protection against vulnerabilities posed by users, and all levels of threat. The argument for the development of security

Cicada Security Blog & Podcast Safe Assets, Secure Data, Simply. Menu Skip to content - Home Category Archives: Podcast The Cicada Security Podcast

Cicada Security Blog & Podcast Safe Assets, Secure Data, Simply. Menu Skip to content - Home Monthly Archives: November 2012 The Cicada Security Podcast

Aravell Security

established

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

Security team has over 20 years of experience in building security and privacy products and programs at many of the most influential security companies ...

Aravell Security team has over 20 years of experience in building security and privacy products and programs at many of the most influential security companies ...

the industry. Aravell Security brings this experience to address your information security needs. Vision: Security and Privacy for All Mission: Making

Aravell Security and the Tugboat Logic Virtual CISO Security and Privacy Program Management To do business online, your customers expect you to have documented

learn more Email, File and Data Encryption Send encrypted email to anyone, anytime. Click here to send encrypted email now Anti-Phishing, DMARC and Email Authentication ...

process​​ - assesses your vendor risk Click here to learn more Email, File and Data Encryption Send encrypted email to anyone, anytime. Click here to send encrypted

Install the Outlook Plug-in or log into the easy Web Interface to send encrypted email That's IT! That's all you need to do to get up and running with

Login to HP SecureMail Click Here to Compose a SecureMail Message Send secure email using the HP SecureMail Cloud web interface. It's ideal for users ...

ideal for users who only have access to a browser on any platform. Click Here to Manage your HP SecureMail Cloud Account Access your account, administrator ...

secure email using the HP SecureMail Cloud web interface. It's ideal for users who only have access to a browser on any platform. Click Here to Manage ...

SecureMail Cloud Account Access your account, administrator and end-user information. Subscribe, add users or renew your licenses here. See the Administrator

Files to ANYONE...Quickly and Simply With SecureMail, everyone can send secure messages to anyone else...with the click of a button. ​Using SecureFile

document encryption capability to protect client confidentiality and comply with data breach disclosure and encryption laws. No Software Required Business users ...

data breach disclosure and encryption laws. No Software Required Business users can initiate secure messages with the click of a button – including from

Your InfoSec Partner Aravell Security can provide a comprehensive analysis of your cyber security needs and delivers solutions that are just right for

Halo Privacy

early-stage

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

navigation - Home - Solutions - Company - Contact “Halo Privacy™ delivers control…” “Halo Privacy delivers control over our digital domain. Mobile users ...

range of collaboration and messaging functions. The Halo-Crypt™ core enables secure connections from a multitude of devices providing a frictionless and familiar ...

productive and conversations stay on point while we remain in control of our data.” Josh H. – AMI The Halo Suite Our premium privacy solution tailored for ...

control…” “Halo Privacy delivers control over our digital domain. Mobile users and those in our office are more productive and conversations stay on point ...

Solutions Frictionless Security technology is only as good as it is easy to use. There is always a balance between security posture (which varies widely ...

levels of control. Halo-Drive™ (HDR) Why project all your sensitive information up into a cloud service? Halo-Drive™ provides the multi-platform functionality

Use detailed technology terms.

Only spotfolio allows for searching with detailed technology terms, as we provide you with all topics that technology companies talk about.

Use Cases

Register now

Why Technology Scouting?

Technology scouting is the basis for your innovation management, identifies new technological developments as early as possible and protects you from disruptive business models.

Identify technology partners

Boost your market research

Look beyond major players

Build long and short lists

Collect technology leaders, providers, start ups and potential new partners in lists via simple tagging to take further steps with your team.