766 Companies
Access all companiesSpotfolio tracks over one million companies in technology industries.
There are 766 companies in the field of Privacy on spotfolio that produce or deliver products, that utilize or research technologies or that are otherwise engaged in topics such as Privacy, Data, Security, Secure, Access, Users, Encrypted, Information .
Start-ups (268)
Early-stage companies (248)
Established companies (200)
The majority of these companies is located in the following countries.
United States (327)
United Kingdom (58)
Canada (42)
Germany (32)
Example Companies
Find companies in your areaJumbo Privacy

Access
- Technologies
- Core data such as location, employees, revenues
- Similar and peer companies
- and more
Web Quotes
new features. Smart Privacy for Google In one tap, Jumbo will change your Privacy Settings on Google, to better protect your privacy. For example, Jumbo
Hello, I write to you as Chief Privacy Officer of Jumbo Privacy. We are a company that is premised on the philosophy that privacy of our mobile app users, and ...
2020 at 8:54:44 AM Central European Summer Time Objet: Ques%ons related to data shared by Care19 to Google, Foursquare & Bugfunder Date: jeudi 21 mai 2020
we would not be able to do so. The personal data stays on your iPhone, encrypted. If you have more questions, please email email protected, thank you! ...
Blog DOWNLOAD /search.html April 09, 2019 Private and Secure. By Design. TLDR - Jumbo will never access any of your passwords (in fact, we can’t). ...
By Design. TLDR - Jumbo will never access any of your passwords (in fact, we can’t). - Jumbo will never access any of your personal content (in fact ...
or passwords. We have designed this architecture for security and privacy reasons. Security Jumbo, in order to work, asks you to login with apps like
well as gain access to protecting professional apps like LinkedIn. You’ll also have access to everything in Jumbo Plus. Jumbo Plus offers access to additional
related to data shared by Care19 to Google Date: jeudi 21 mai 2020 à 08:10:22 heure d’été d’Europe centrale De: Zoe Vilain À: privacy@google.com, data-access-requests@google
company that is premised on the philosophy that privacy of our mobile app users, and users we represent as authorized agent, is paramount. It has come to our
are a company that is premised on the philosophy that privacy of our users, and users we represent as authorized agent, is paramount. It has come to our
You can check out Fast Company’s article here. Jumbo was named #3 in the Security category. We know that privacy is on everyone’s minds and it means a lot
The Data Privacy Group

Access
- Technologies
- Core data such as location, employees, revenues
- Similar and peer companies
- and more
Web Quotes
/search About Us Privacy Office+ Resources Contact Back Insider News Premium Privacy Insights Forum Podcast White Papers & E-Books mailto:info@thedataprivacygroup
/search About Us Privacy Office+ Resources Contact Back Insider News Premium Privacy Insights Forum Podcast White Papers & E-Books mailto:info@thedataprivacygroup
to introduce a virus that then compromised the network". The hackers encrypted the firm's systems and data and demanded payment to release and repair ...
exploitation on the internet and says: > As we expand end-to-end encryption to secure people's private messages from hackers and criminals we remain committed
is now seeing some of those techniques being used on the dark web, an encrypted part of the internet that can be accessed using popular networks such as ...
Engadget Wide-ranging security flaws have been flagged in the Covid-19 contact-tracing app being piloted in the Isle of Wight. The security researchers involved ...
understood that at least one member of staff has raised the issue with the Information Commissioner. Source & full story: BBC News Facebook has billions of
significant step forward in our plans to help make sure smart products are secure and people’s privacy is protected….. I urge organisations to respond to
people access to users' direct messages. In a blog post, Twitter said that attackers could work “around Android system permissions” to gain access to a
on board! - Hayley Benbow, Compliance & Data Privacy Manager - Suzuki GB Access to experts Skilled teams are generally difficult and costly to hire directly
Papers & E-Books Contact Your Data Privacy, Managed! Posts in Data Privacy News /blog/2020/10/2/data-privacy-news-26 Data Privacy News #26 Belgian privacy
Contact Your Data Privacy, Managed! Posts in Data Privacy /blog/2020/9/12/data-privacy-news-23 Data Privacy News #23 In this week’s Data Privacy News…
meds reminders to patients ....... iOS 14 alerts reveal Redditt is reading users' clipboard data. Read More NewsPeter Borner10 July 2020Data Privacy News
profiles to support Donald Trump in the forthcoming US presidential election. Users of the online multiplayer game complained their profiles were hacked with
have targeted coronavirus vaccine research, a UK security agency has warned. The National Cyber Security Centre (NCSC) has warned that hackers linked to
consent or properly informing consumers of a 2016 move to combine personal information in Google accounts with browsing activities on non-Google websites. Commission
Cicada Security Technology

Access
- Technologies
- Core data such as location, employees, revenues
- Similar and peer companies
- and more
Web Quotes
to do if and when you suspect privacy has been is breached. Needless to say one extremely easy method to prevent privacy breaches is the use of Cicada ...
The Cicada Security Blog & Podcast Safe Assets, Secure Data, Simply. Menu Skip to content - Home How to handle a security breach One of the most common
Safe and in passing talks about people’s responses to the new Facebook Privacy Notice. Post navigation ← The Cicada Security Podcast, episode 10 The
screen, activating a siren on both the device and the host, dismounting an encrypted volume, and in more extreme cases, brick the host, or even destroy cryptographic ...
any information stored on, or is accessible from the active host is instantly protected, and the possibility of exposure of confidential information is
screen, activating a siren on both the device and the host, dismounting an encrypted volume, and in more extreme cases, brick the host, or even destroy cryptographic ...
any information stored on, or is accessible from the active host is instantly protected, and the possibility of exposure of confidential information is
The Cicada Security Blog & Podcast Safe Assets, Secure Data, Simply. Menu Skip to content - Home Interesting view on two-factor authentication Over
policy based actions to deter, protect and alert, including interruption of access to system resources, active sessions, and stored, cloud or network accessible
The Cicada Security Blog & Podcast Safe Assets, Secure Data, Simply. Menu Skip to content - Home Monthly Archives: December 2012 The Cicada Security
The Cicada Security Blog & Podcast Safe Assets, Secure Data, Simply. Menu Skip to content - Home Our Technology Cicada Security Technology Inc. (CST)
deployed should provide sufficient protection against vulnerabilities posed by users, and all levels of threat. The argument for the development of security
deployed should provide sufficient protection against vulnerabilities posed by users, and all levels of threat. The argument for the development of security
Cicada Security Blog & Podcast Safe Assets, Secure Data, Simply. Menu Skip to content - Home Category Archives: Podcast The Cicada Security Podcast
Cicada Security Blog & Podcast Safe Assets, Secure Data, Simply. Menu Skip to content - Home Monthly Archives: November 2012 The Cicada Security Podcast
Aravell Security
Access
- Technologies
- Core data such as location, employees, revenues
- Similar and peer companies
- and more
Web Quotes
Security team has over 20 years of experience in building security and privacy products and programs at many of the most influential security companies ...
Aravell Security team has over 20 years of experience in building security and privacy products and programs at many of the most influential security companies ...
the industry. Aravell Security brings this experience to address your information security needs. Vision: Security and Privacy for All Mission: Making
Aravell Security and the Tugboat Logic Virtual CISO Security and Privacy Program Management To do business online, your customers expect you to have documented
learn more Email, File and Data Encryption Send encrypted email to anyone, anytime. Click here to send encrypted email now Anti-Phishing, DMARC and Email Authentication ...
process - assesses your vendor risk Click here to learn more Email, File and Data Encryption Send encrypted email to anyone, anytime. Click here to send encrypted
Install the Outlook Plug-in or log into the easy Web Interface to send encrypted email That's IT! That's all you need to do to get up and running with
Login to HP SecureMail Click Here to Compose a SecureMail Message Send secure email using the HP SecureMail Cloud web interface. It's ideal for users ...
ideal for users who only have access to a browser on any platform. Click Here to Manage your HP SecureMail Cloud Account Access your account, administrator ...
secure email using the HP SecureMail Cloud web interface. It's ideal for users who only have access to a browser on any platform. Click Here to Manage ...
SecureMail Cloud Account Access your account, administrator and end-user information. Subscribe, add users or renew your licenses here. See the Administrator
Files to ANYONE...Quickly and Simply With SecureMail, everyone can send secure messages to anyone else...with the click of a button. Using SecureFile
document encryption capability to protect client confidentiality and comply with data breach disclosure and encryption laws. No Software Required Business users ...
data breach disclosure and encryption laws. No Software Required Business users can initiate secure messages with the click of a button – including from
Your InfoSec Partner Aravell Security can provide a comprehensive analysis of your cyber security needs and delivers solutions that are just right for
Halo Privacy

Access
- Technologies
- Core data such as location, employees, revenues
- Similar and peer companies
- and more
Web Quotes
navigation - Home - Solutions - Company - Contact “Halo Privacy™ delivers control…” “Halo Privacy delivers control over our digital domain. Mobile users ...
range of collaboration and messaging functions. The Halo-Crypt™ core enables secure connections from a multitude of devices providing a frictionless and familiar ...
productive and conversations stay on point while we remain in control of our data.” Josh H. – AMI The Halo Suite Our premium privacy solution tailored for ...
control…” “Halo Privacy delivers control over our digital domain. Mobile users and those in our office are more productive and conversations stay on point ...
Solutions Frictionless Security technology is only as good as it is easy to use. There is always a balance between security posture (which varies widely ...
levels of control. Halo-Drive™ (HDR) Why project all your sensitive information up into a cloud service? Halo-Drive™ provides the multi-platform functionality
Topics
Search by any topicOnly spotfolio allows for searching with detailed technology terms, as we provide you with all topics that technology companies talk about.
Companies addressing these topics might be of specific interest to you, as they share more specific, niche topics.
- About-Privacy
- Access-Requests
- Ad-Blocker
- Ad-Blocking
- Anonymization
- Anonymize
- Best-VPN
- Block-Ads
- Browse-Anonymously
- CCPA-Compliance
- Consent-Management
- Contain-OneTrust
- DNS-Leak
- DSAR
- Data-Subject
- Data-Subject-Access
- Decrypted
- Draeth
- End-Encrypted
- Forward-Secrecy
- Global-Privacy
- IAPP
- IKEv2
- Incognito-Mode
- Internet-Privacy
- LGPD
- OneTrust-Intellectual
- OpenVPN
- Other-Privacy
- Perfect-Forward-Secrecy
- Privacy-Law
- Privacy-Preserving
- Private-Internet
- Unblock-Websites
- VPN-App
- VPN-Protocol
- VPN-Providers
- VPN-Server
- VPN-Service
- WireGuard
- Zero-Knowledge
The following topics addressed by the majority of companies help you discover major players in the field.
- About
- Access
- Account
- App
- Attacks
- Authentication
- Blog
- CCPA
- Cloud
- Code
- Compliance
- Control
- Cyber
- Cybersecurity
- Data-Privacy
- Devices
- Digital
- Download
- Encrypted
- Encryption
- GDPR
- Identity
- Information
- Internet
- My
- Network
- Online
- Personal
- Personal-Data
- Platform
- Privacy-Compliance
- Privacy-Regulations
- Private
- Private-Data
- Protect
- Protection
- Read
- Risk
- Secure
- Sensitive
- Server
- Software
- Support
- Team
- Technology
- Trust
- Use
- Users
Use Cases
Register nowTechnology scouting is the basis for your innovation management, identifies new technological developments as early as possible and protects you from disruptive business models.
Collect technology leaders, providers, start ups and potential new partners in lists via simple tagging to take further steps with your team.