Top 11 Cloud Security companies in Redwood City, California, United States
These top-tier companies are leading the charge in innovation and growth in this dynamic sector.
Use Kryptnostic's Encrypted Search SDK to search your data in the cloud while it remains protected at rest, in flight, and during use. Search text server-side without revealing the contents of the query or your documents. Our servers never have access to your keys and all encryption or decryption is performed client side.
Lokker protects companies and their customers from the unauthorized behavior of third parties so they can block, allow, or anonymize their users' information in real time. Lokker's Continuous Privacy Monitoring and Protection (CPMP) gives organizations a new model for web privacy and compliance.
Cyral delivers visibility, control, and security for the Data Cloud. It has developed a lightweight service to intercept all requests from all apps, tools, and users to any structured or semi-structured data store, without impacting performance or scalability. It helps companies with assurance, segmentation, and governance of their data services in the cloud. Benefits for organizations using Cyral include the Identity Federation and Zero Trust - unified data access management for all data repositories using your existing identity provider. Identify users behind shared service credentials from BI tools and apps. Simplify privileged access approvals and break glass procedures; Data Segmentation - enforce the least privilege and segregation of duties across all your users and data repositories. Protect data spillage from one application tenant to another due to logic and configuration errors. Secure data from exfiltration without requiring any changes to applications; and Data Activity Monitoring - provide a complete, real-time activity trail of all accesses to data, by underlying user or tenant, and track who did what. Speed up audits and forensics, troubleshoot performance issues faster, and simplify compliance checks.
Styra offers a platform that allows companies to enforce and monitor authorization policies across cloud-native applications. Styra delivers a fully managed Open Policy Agent platform with a built-in library of policies that allow customers to implement authorization policy-as-code. Prerunning supports the monitoring and validating of policy changes before committing, mitigating risk predeployment. Meanwhile, declarative models outline the desired state to prevent security drift and eliminate errors before they occur. Styra works with cloud-native APIs to define, enforce, and keep tabs on policies before runtime. The platform takes in a business context and outputs security decisions across namespaces and clusters, letting customers write policy once and enact it where necessary.
Certus Cybersecurity is a leading provider of information security services. Specializing in application security, cloud security, IoT security and payment security services, Certus Cybersecurity currently serves Fortune 100 enterprises, leading law global firms, and innovative, high-growth businesses worldwide.
FireLayers enables IT to proactively protect the usage of cloud applications via rule-based policies while ensuring that they maintain the required security and compliance levels. They protect cloud application usage from initial user identification to the safe retrieval of data and request fulfillment. They add a layer of proactive protection and monitoring to any cloud application identifying all users, applications, and actions.
Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide, including over half of the Fortune 100. Our customers range from small businesses to the world's largest financial institutions, intelligence agencies, and critical infrastructure companies.
Twingate is a solution for securing remote access to an organization’s private applications, data, and environments, whether they are on-premise or in the cloud. Built to make life easier for DevOps, IT, and infrastructure teams, as well as end users, it replaces outdated and insecure business VPNs which were not built to handle a world in which "work from anywhere" and cloud-based assets are now the norm. Twingate’s modern zero trust-based approach to securing remote access focuses on improving security, while not compromising on usability and maintainability.
Oxygen’s unique technology connects users, devices, storage and identity together into an Enterprise Cloud. Unlike consumer clouds, Oxygen's Enterprise Cloud provides powerful user data management across company-issued and personal devices, and private and public storage, all controllable by enterprise identity and policy. Only Oxygen containerizes and secures the data from within the device all the way to the storage infrastructure. This enables IT professionals to own and manage user data more intelligently and completely than ever before. This also enables corporate data to be securely available anywhere, online or offline, right from your desktop, tablet or phone and from your favorite applications.
Altor is giving customers unprecedented visibility into and granular control over virtual network traffic. Purpose-built for virtual environments, its Altor VF virtual firewall is dramatically improving the security of virtual servers in data centers while reducing administrative overhead. The award winning technology has been architected to support multiple virtualization platforms from vendors such as VMware, Microsoft, and Citrix. Multi-platform support will allow enterprises to use whatever virtualization products they need, now and in the future. Altor Networks’ pioneering innovations include: Enforcing a rule-based security policy on a single VM or group of VMs Securing VMs during VMotion events, without dropping connections Enabling low cost intrusion detection in the virtual network by mirroring selected traffic to external devices Enforcing a default policy automatically on newly created or “rogue†VMs
Total Defense is a global leader in malware detection and anti-crimeware solutions. Over 40,000 businesses across a wide spectrum of industries have deployed the Company’s solutions, including some of the most sophisticated buyers of security technology worldwide, and over four million consumers worldwide use Total Defense’s products. Total Defense’s solutions include the industry’s first complete cloud security platform, providing fully integrated endpoint, web and email security through a single Web-based management console with a single set of enforceable security policies. The Company also offers a broad portfolio of leading security products for the consumer market. Total Defense is a former business of CA Technologies, one of the largest software companies in the world, and has operations in New York, California, Europe, Israel and Asia.