Cloud Security

1,123 Companies

Access all companies

Find technology partners quickly.

Spotfolio tracks over one million companies in technology industries.

There are 1,123 companies in the field of Cloud Security on spotfolio that produce or deliver products, that utilize or research technologies or that are otherwise engaged in topics such as Security, Cloud, Data, Secure, IT, Attacks, Threats, Access .

Start-ups (320)

Early-stage companies (340)

Established companies (405)

The majority of these companies is located in the following countries.

United States (492)

Japan (73)

United Kingdom (51)

Canada (44)

Example Companies

Find companies in your area

Spiceware Spiceware Co., Ltd.

established

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

firewall and network perimeter protection are no longer valid. As potential threats increase, security risks are also increasing. As a result, companies need ...

and affordability, migration to cloud is becoming an inevitable move for businesses. However, data stored in the cloud is scattered, impossible to keep ...

Management Service - Data Security Module - ✓ Spice.agent - ✓ Secure API Gateway - ✓ Secure REST APIs Spiceware for Enterprise Ask For Quote email protected ...

information with a simple installation of an agent. Real-time management of PII Access Log Monitor the system in real time to detect threats and prevent accidents ...

Spiceware. The most productive and convenient way to protect PII in the era of data economy. Problem Due to scalability, agility, availability and affordability ...

optimized for cloud environments, making it simple to operate without modification of source codes. Best of all, it completely eliminates the possibility ...

handful of solutions work properly, not to mention there is a lack of cloud security experts. Conventional solutions can't be installed at all or only a ...

Traditional security approach which focus on firewall and network perimeter protection are no longer valid. As potential threats increase, security risks are

customer’s agent is assumed to be 100% available for the part of the month when it was not operated. “Unavailable” means service failure situations when the

Xiid Xiid Corporation

start-up

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

non-reusable, credential-less access points without ever worrying about security threats. Xiid is the only vendor to provide secure Remote Desktop Protocol (RDP) ...

Xiid.IM provides ultra-secure Identity Management for hybrid cloud networks. It uses One-time Code (OTC) authentication for identity verification behind your

non-reusable, credential-less access points without ever worrying about security threats. Hire Us Now or Let's Talk © COPYRIGHT 2018. ALL RIGHTS RESERVED. SOLUTIONS

Comments Five Hybrid Cloud Security Challenges and their Solutions The overwhelming majority of computer networks today are hybrid cloud configurations.

Hybrid Cloud Security Challenges and their Solutions 08 Sep 2020    The overwhelming majority of computer networks today are hybrid cloud configurations

Xiid.DATA Xiid.Data is our secure database access solution. It uses both passive and encrypted JSON data formats along with the OpenData paradigm, which ...

Xiid.DATA Xiid.Data is our secure database access solution. It uses both passive and encrypted JSON data formats along with the OpenData paradigm, which

SOLUTIONS Database Access Xiid offers a hyper-secure solution for querying on-premises databases from the cloud. Xiid.Data allows you to query any database ...

SOLUTIONS Database Access Xiid offers a hyper-secure solution for querying on-premises databases from the cloud. Xiid.Data allows you to query any database

Xiid Sealed Channel Platform has No Boundaries Ubiquity of Secure Data Access Wherever, Whenever, End-to-End Read More Our Solutions Hybrid Cloud ...

Xiid Xiid Sealed Channel Platform has No Boundaries Ubiquity of Secure Data Access Wherever, Whenever, End-to-End Read More Our Solutions Hybrid ...

Wherever, Whenever, End-to-End Read More Our Solutions Hybrid Cloud Security Single Sign-on Portal Remote Desktop Protocol One-time Code Authentication

on-premises, private, and public cloud services. But the staggering increase in data breaches and identity theft has proven that security has not kept pace with ...

SOLUTIONS Hybrid Cloud Security Most of today’s computing environments are hybrid cloud networks. Increasingly, IT architectures mix on-premises, private

Our Blog 9/7/2020 0 Comments Five Hybrid Cloud Security Challenges and their Solutions The overwhelming majority of computer networks today are hybrid

ABOUT XIID Driven by Passion Leadership Driven by a passion for security, Xiid’s leaders combine the expertise of two leading Silicon Valley professionals

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

how to strengthen your security control environments, reduce consistent threats, and provide standardized risk management during the Cloud Governance &

this document is to provide guidance for the countermeasures to the risks, threats, and vulnerabilities in hybrid cloud environments. Request to download

Certificate of Cloud Security Knowledge - Exam Bundle This course includes the CCSK exam token and teaches the fundamentals of cloud security including: ...

token and teaches the fundamentals of cloud security including: architecture, data security, managing risk and more. Purchase | $795 Already purchased? Sign ...

Certificate of Cloud Security Knowledge - Exam Bundle This course includes the CCSK exam token and teaches the fundamentals of cloud security including: architecture

Levels View Registry Submit to Registry Provide Feedback STAR Tools CAIQ Cloud Controls Matrix GDPR Code of Conduct CAIQ-Lite CSA-OneTrust VRM Tool STAR

to the limited size and lack of innate security making them difficult to secure with traditional security controls and methodologies. It is a combination

Advanced hands-on training for secure cloud operations. Learn advanced techniques for designing, deploying and managing secure cloud architectures and being

adoption. Download Now You may also access CAIQ-Lite online within the Whistic Platform, ideal for digital access &self-assessment. Below is a brief CAIQ-Lite

providers and government representatives. As a member, your company will have access to exclusive discounts to CSA events and volume discounts when purchasing

Maturity as cyber risk is the 3rd biggest risk of doing business today. Data Security and Privacy are increasing challenges in today’s cloud-based environments

program will fill the gap in the market for technical education for cloud IT auditing. This credential leverages CSA’s cloud expertise and ISACA’s traditional

cloud security skillsets. The CCSK was recently lauded as the most valuable IT certification in terms of average salary by Certification Magazine. Who should

Trainings Overview CCAK CCSK Lectures CCSK Lectures + Labs Advanced Cloud Security Practitioner Governance and Compliance Certificates Overview CCSK CCAK

Trainings Overview CCAK CCSK Lectures CCSK Lectures + Labs Advanced Cloud Security Practitioner Governance and Compliance Certificates Overview CCSK CCAK

Trainings Overview CCAK CCSK Lectures CCSK Lectures + Labs Advanced Cloud Security Practitioner Governance and Compliance Certificates Overview CCSK CCAK

CipherCloud CipherCloud, Inc.

established

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

users. The Top Threats Working Group of the Cloud Security Alliance published a comprehensive report on the Cloud Computing Top Threats and identified

deletes, logins, and logouts. CipherCloud UEBA Delivers Detect insider threats Track user activity in the cloud CipherCloud UEBA Delivers: The Anomalous

Clouds - Office 365 Cloud Security - Google Suite Cloud Security - Slack Cloud Security - Box Cloud Security - Salesforce Cloud Security - SAP SuccessFactors

and government institutions in over 25 countries protect and secure their cloud information with CipherCloud. Download our CASB+ white paper below. Download ...

Compliance - Zero-Day Threat Protection - Secure Remote Workforce - Cloud Security Posture Management - Zero Trust Network Access (ZTNA) - Secure Access ...

Data-centric - Comprehensive Security Capabilities - Out-of-the-box-Deployment - Enterprise-class Performance - Email Security and Protection - Flexible Deployment

businesses secure data. Learn why the world’s largest global enterprises and government institutions in over 25 countries protect and secure their cloud

businesses secure data. Learn why the world’s largest global enterprises and government institutions in over 25 countries protect and secure their cloud

modern technology stacks. - Platform Overview - Deep Visibility - Adaptive Access Control - Strong Information Protection - Governance, Risk & Compliance

modern technology stacks. - Platform Overview - Deep Visibility - Adaptive Access Control - Strong Information Protection - Governance, Risk & Compliance

Search Close Free Trial Free Trial - Why CipherCloud? - Data Centric - Comprehensive Security Capabilities - Out-of-the-box deployment - Enterprise-class

- Why CipherCloud? Why CipherCloud CASB+? - Data-centric - Comprehensive Security Capabilities - Out-of-the-box-Deployment - Enterprise-class Performance

Management (DRM) - Email Information Protection - Data Discovery - Shadow IT - Visibility & Control - User Behavior Analytics (UEBA) - Encryption & Tokenization

Management (DRM) - Email Information Protection - Data Discovery - Shadow IT - Visibility & Control - User Behavior Analytics (UEBA) - Encryption & Tokenization

Compliance - Zero-Day Threat Protection - Secure Remote Workforce - Cloud Security Posture Management - Zero Trust Network Access (ZTNA) - Secure Access

Data-centric - Comprehensive Security Capabilities - Out-of-the-box-Deployment - Enterprise-class Performance - Email Security and Protection - Flexible Deployment

CyberDuo CyberDuo, Inc.

established

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

Training. Learn about threats that can affect your business in your office. Let us train your team. Know more about cybersecurity and threats. Cybersecurity

assessments. First thing we will do is audit IT systems and identify any threats or vulnerabilities. Once any issues have been resolved, we have implemented

About Cloud Computing. Build and scale in the cloud. Take advantage of fast, reliable and affordable IT infrastructure in Azure, GCP and AWS. Cloud computing

Clients Our Team About Jan 6 Written By Kevin @ CyberDuo > Microsoft Azure Cloud Migration for Trinity Capital > Trinity Capital is an investment banking ...

created the infrastructure on Microsoft Azure. Second phase was to migrate the data from old on-premises servers to the Azure cloud. Finally, third phase to

About Securing Remote Employees During COVID-19. Work from home should be secure. Full Security Stack. Managed Endpoint Protection Monitoring and preventing ...

happens. Managed Cloud Security Protect your cloud-based systems, data, and infrastructure. Microsoft Azure and Google Cloud security assessment and architecture ...

Content Home Current Page: Cybersecurity Managed Services Microsoft + Security Case Studies Our Company Our Clients Our Team About Open Menu Close Menu

formal HIPAA assessment to identify possible vulnerabilities and establish secure procedures. Failing to comply can lead to heavy penalties, so working with

Deny or limit USB file storage access, enable enhanced password policies, set user screen timeouts, and limit user access. Did you know? 1 5 81% 97% in

and Spectre. These vulnerabilities affect many modern processors and gain access to data in system memory (RAM). Meltdown breaks down the most fundamental ...

modern processors. These hardware vulnerabilities allow programs to steal data which currently processed on the computer. This might include your passwords

Studies Folder: Our Company Back Our Clients Our Team About IT Company in Los Angeles Managed IT Services - Cyber Security - Cloud Computing - Business Continuity

Team About We’re IT experts CyberDuo is the winning combination of IT services and IT security. Contact Now Cybersecurity and Managed IT Services in Los

Cloud and Cloud Security Cloud introduces more and more cybersecurity challenges on a daily basis. That’s why you need our cloud security services to

Microsoft + Security Case Studies Our Company Our Clients Our Team About Open Menu Close Menu Home Cybersecurity Managed Services Microsoft + Security Case

Use detailed technology terms.

Only spotfolio allows for searching with detailed technology terms, as we provide you with all topics that technology companies talk about.

Use Cases

Register now

Why Technology Scouting?

Technology scouting is the basis for your innovation management, identifies new technological developments as early as possible and protects you from disruptive business models.

Identify technology partners

Boost your market research

Look beyond major players

Build long and short lists

Collect technology leaders, providers, start ups and potential new partners in lists via simple tagging to take further steps with your team.