Una empresa de ciberseguridad de segunda generación aborda la crisis del sector de las tarjetas de pago
noviembre 12, 2020GM Sectec: entre las mejores empresas de ciberseguridad en el mundo
enero 27, 2021Sausalito, Calif. – Ene. 5, 2021
En la última década se han creado miles de startups centradas en la lucha contra la ciberdelincuencia, que se prevé que cueste al mundo 6 billones de dólares anuales en 2021, frente a los 3 billones de 2015.
La segunda lista anual de los Hot 150, elaborada por Cybersecurity Ventures, reconoce a las empresas más innovadoras del mercado de la ciberseguridad. La lista se compone de empresas puras centradas exclusiva o principalmente en la ciberseguridad. Todas las empresas se ganan su lugar en base a sus méritos, no hay «pay-to-play», no hay costo para aplicar o para estar en la lista.
The definitive list of cybersecurity companies for 2021
Company | Year | Headquarters | Description |
---|---|---|---|
1Password | 2005 | Toronto, Canada | Secure Enterprise Password Manager |
A10 Networks | 2004 | San Jose CA | Secure Cloud Application Services |
Abnormal Security | 2018 | San Francisco CA | Cloud Native Email Security |
Absolute | 1993 | Vancouver, Canada | Endpoint Defense Platform |
Agari | 2009 | Foster City CA | Email & Phishing Threat Protection |
Aqua Security | 2015 | Ramat Gan, Israel | Cloud Native Application Protection |
Arcserve | 1983 | Eden Prairie MN | Data & Ransomware Protection |
Arctic Wolf | 2012 | Eden Prairie MN | Cloud Native Security Operations |
Attivo Networks | 2011 | Fremont CA | Cyber Threat Detection Platform |
Auth0 | 2013 | Bellevue WA | Identity Platform for Developers |
Avanan | 2014 | New York City NY | Cloud Email Security Platform |
Avast | 1988 | Prague, Czechia | Antivirus, VPN & Security |
Axonius | 2017 | New York City NY | Cybersecurity Asset Management |
Barracuda | 2003 | Campbell CA | Email, Network & Cloud Security |
Beyond Identity | 2019 | New York City NY | Passwordless Identity Management |
BeyondTrust | 2006 | Johns Creek GA | Privileged Access Management |
BigID | 2015 | New York City NY | Data Privacy & Protection |
BioCatch | 2010 | Tel Aviv, Israel | AI-Driven Behavioral Biometrics |
Bitdefender | 2001 | Bucharest, Romania | Cybersecurity for Home & Business |
Bitglass | 2013 | Campbell CA | Cloud Data & Threat Protection |
BitSight | 2011 | Boston MA | Security Ratings Platform |
BlackBerry | 1984 | Waterloo, Canada | End-to-End IoT Security Solutions |
BlueVoyant | 2017 | New York City NY | Managed Security Services |
BreachLock | 2018 | Amsterdam, Netherlands | PenTesting-as-a-Service |
Bugcrowd | 2011 | San Francisco CA | Crowdsourced Security Platform |
BVSystems | 1972 | Metuchen NJ | Wireless Threat Detection Tools |
Cato Networks | 2015 | Tel Aviv, Israel | Cloud Network Security Platform |
Centrify | 2004 | Santa Clara CA | Privileged Identity Management |
Check Point | 1993 | Tel Aviv, Israel | Cybersecurity Solutions & Services |
Checkmarx | 2006 | Ramat Gan, Israel | Software Security for DevOps |
Cimcor | 1997 | Merrillville IN | IT Integrity, Security & Compliance |
Claroty | 2014 | New York City NY | Operational Technology Security |
Cloud Range | 2018 | Nashville TN | Next Generation Cyber Range |
Cloudflare | 2009 | San Francisco CA | Cybersecurity for the Internet |
Coalition | 2017 | San Francisco CA | Cybersecurity & Cyberinsurance |
Code42 | 2001 | Minneapolis MN | Insider Risk Detection & Response |
Contrast Security | 2014 | Los Altos CA | Application Security Platform |
CrowdStrike | 2011 | Sunnyvale CA | Endpoint Protection Platform |
CyberArk | 1999 | Petach Tikva, Israel | Privileged Access Security |
Cyberbit | 2015 | Ra’anana, Israel | Cyber Range Training & Simulation |
Cybereason | 2012 | Boston MA | Cyber Defense & Response Platform |
CyberGRX | 2015 | Denver CO | Cyber Risk Management Platform |
Cymulate | 2016 | Rishon LeZion, Israel | Breach & Attack Simulation Platform |
Darktrace | 2013 | Cambridge, UK | Cyber AI Technology & Platform |
Deep Instinct | 2015 | New York City NY | Deep Learning Cybersecurity |
Deepwatch | 2015 | Denver CO | Managed Security Services |
Devo | 2011 | Cambridge MA | Cloud Native Security Analytics |
Digital Guardian | 2003 | Waltham MA | Enterprise Data Loss Prevention |
Digital Shadows | 2011 | London, UK | Digital Risk Protection Solutions |
DomainTools | 2002 | Seattle WA | Threat Intelligence & Investigation |
Dragos, Inc. | 2013 | Hanover MD | Industrial Control Systems Security |
Entrust | 1994 | Minneapolis MN | Digital Security & Issuance |
Enveil | 2016 | Fulton MD | Data Encryption & Security |
eSentire | 2001 | Waterloo, Canada | Managed Detection & Response |
ESET | 1992 | Bratislava, Slovakia | Cybersecurity for Home & Business |
Expel | 2016 | Herndon VA | Managed Detection & Response |
ExtraHop | 2013 | Seattle WA | Cloud-Native Detection & Response |
F-Secure | 1999 | Helsinki, Finland | Cybersecurity for Home & Business |
F5 | 1996 | Seattle WA | Application & Infrastructure Security |
FireEye | 2004 | Milpitas CA | Cybersecurity Solutions & Services |
Forcepoint | 2016 | Austin TX | Integrated Cloud Security Platform |
Forescout | 2000 | San Jose CA | Unified Device Visibility for IT & OT |
ForgeRock | 2010 | San Francisco CA | Identity & Access Management |
Fortalice | 2008 | Charlotte NC | Customized Cyber Defense Services |
Fortinet | 2000 | Sunnyvale CA | End-to-End Infrastructure Security |
GM Sectec | 1970 | San Juan, Puerto Rico | Managed Security Services |
Guardicore | 2013 | Tel Aviv, Israel | Hybrid Cloud Security Platform |
GuidePoint Security | 2011 | Herndon VA | Cybersecurity Solutions & Services |
HackerOne | 2012 | San Francisco CA | Hacker Powered Security Platform |
HYPR | 2014 | New York City NY | Secure Authentication Platform |
Hysolate | 2016 | Tel Aviv, Israel | Workplace-as-a-Service Platform |
iboss | 2003 | Boston MA | Cloud Network Security Platform |
Illumio | 2013 | Sunnyvale CA | Security Segmentation Platform |
Immuta | 2014 | College Park MD | Data Privacy & Security Platform |
Imperva | 2002 | San Mateo CA | Data & Application Security |
Imprivata | 2001 | Lexington MA | Healthcare Digital Identity |
INTRUSION | 1983 | Plano TX | Security-as-a-Service Appliance |
IntSights | 2015 | New York City NY | Threat Intelligence Platform |
IronNet | 2014 | McLean VA | Cyber Defense Platform & Services |
IronScales | 2013 | Tel Aviv, Israel | Self-Learning Email Security |
Karamba Security | 2015 | Hod Hasharon, Israel | Automotive Security & IoT Protection |
Kaspersky | 1997 | Moscow Russia | Cybersecurity for Home & Business |
Keeper Security | 2011 | Chicago IL | Enterprise Password Management |
Kenna Security | 2009 | Santa Clara CA | Modern Vulnerability Management |
KnowBe4 | 2010 | Clearwater FL | Security Awareness Training Platform |
LogRhythm | 2003 | Boulder CO | Next Generation SIEM Platform |
Lookout | 2007 | San Francisco CA | Mobile Endpoint Security |
McAfee | 1987 | Santa Clara CA | Cybersecurity for Home & Business |
Menlo Security | 2012 | Mountain View CA | Web & Email Security Platform |
Mimecast | 2003 | London, UK | Email Security & Continuity |
Mitek | 1986 | San Diego CA | Digital Identity Verification |
NCC Group | 1999 | Manchester UK | Cybersecurity & Risk Mitigation |
Netskope | 2012 | Santa Clara CA | Cloud, Network & Data Security |
NortonLifeLock | 1982 | Tempe AZ | Cyber Safety Protection |
Okta | 2009 | San Francisco CA | Identity & Access Management |
OneLogin | 2009 | San Francisco CA | Identity & Access Management |
OneTrust | 2016 | Atlanta GA | Privacy, Security & Data Governance |
Onfido | 2012 | London, UK | Biometric & Document Verification |
Orca Security | 2019 | Los Angeles CA | Cloud Security Platform |
Palo Alto Networks | 2005 | Santa Clara CA | Cyber Threat Detection & Prevention |
Perimeter 81 | 2018 | Tel Aviv, Israel | Secure Access for Remote Workforce |
Pindrop Security | 2011 | Atlanta GA | Cybersecurity for Call Centers |
Ping Identity | 2001 | Denver CO | Intelligent Identity Platform |
Privitar | 2014 | London, UK | Enterprise Data Privacy |
Proofpoint | 2002 | Sunnyvale CA | Enterprise Security & Compliance |
Prove | 2008 | New York City NY | Security Platform for Phone Identity |
Qualys | 1999 | Foster City CA | Cloud Based Security Platform |
RangeForce | 2014 | Manassas VA | Cloud Based Cyber Range Platform |
Rapid7 | 2007 | Boston MA | Security & Compliance Solutions |
Recorded Future | 2009 | Somerville MA | Universal Threat Intelligence Solution |
Refirm Labs | 2017 | Fulton MD | Firmware Security Analysis |
ReliaQuest | 2007 | Tampa FL | SaaS Security Platform |
ReversingLabs | 2009 | Cambridge MA | Advanced Malware Analysis Platform |
RSA | 1982 | Bedford MA | Digital Risk Management Solutions |
SailPoint | 2005 | Austin TX | Cloud Identity Governance Platform |
SCADAfence | 2014 | New York City NY | OT & IOT Cybersecurity Platform |
Secure Code Warrior | 2015 | Sydney, Australia | Developer Secure Code Training |
Secureworks | 1999 | Atlanta GA | Cybersecurity Solutions & Services |
Securiti | 2018 | San Jose CA | Data Privacy & Security Platform |
SecurityScorecard | 2013 | New York City NY | Security Ratings & Risk Management |
Semperis | 2013 | Ramat Gan, Israel | Identity Driven Cyber Resilience |
SentinelOne | 2013 | Mountain View CA | AI Powered Security Platform |
Skybox Security | 2002 | Herzliya Israel | Security Posture Management |
Snyk | 2015 | London, UK | Cloud Native Application Security |
Sonatype | 2008 | Fulton MD | Open Source Security Management |
SonicWall | 1991 | Milpitas CA | Cybersecurity Products & Services |
Sophos | 1985 | Abingdon, UK | Cybersecurity for Home & Business |
SparkCognition | 2013 | Austin TX | AI & ML Powered Cyber Defense |
Sumo Logic | 2010 | Redwood City CA | Cloud Security Platform |
Synack | 2013 | Redwood City CA | Crowdsourced Penetration Testing |
Sysdig | 2013 | San Francisco CA | Secure DevOps Platform |
Tanium | 2007 | Kirkland WA | Endpoint Management Platform |
Telos | 1969 | Ashburn VA | Cybersecurity Solutions & Services |
Tenable | 2002 | Columbia MD | Vulnerability Management Platform |
ThetaRay | 2013 | Hod Hasharon, Israel | Big Data Security Analytics |
ThreatConnect | 2011 | Arlington VA | Threat-Centric Security Operations |
Trend Micro | 1988 | Tokyo, Japan | Cloud Security Services Platform |
Tripwire | 1997 | Portland OR | Security & Compliance Solutions |
Trusona | 2015 | Scottsdale AZ | Enterprise-wide Passwordless MFA |
Tufin | 2005 | Boston MA | Network Security Policy Automation |
ValiMail | 2015 | San Francisco CA | Cloud-Based Email Security |
vArmour | 2011 | Los Altos CA | Application Security Management |
Varonis | 2005 | New York City NY | Enterprise Data Security Platform |
Vectra | 2010 | San Jose CA | Cyber Threat Detection & Response |
Venafi | 2000 | Salt Lake City UT | Machine Identity Protection |
Veracode | 2006 | Burlington MA | Application Security Platform |
WatchGuard | 1996 | Seattle WA | Network & Endpoint Security |
ZeroFOX | 2013 | Baltimore MD | Digital Risk Protection Platform |
Zix | 1988 | Dallas TX | Email Encryption & Security Solutions |
Zscaler | 2008 | San Jose CA | Enterprise Cloud Security Platform |