Adaptive Shield
Adaptive Shield's mission is to give you back control over your SaaS perimeter, SaaS applications and collaborative tools. The latter, widely adopted and growing in number, require constant vigilance to prevent security breaches.
Market leader in Europe and France, our references include renowned companies such as Doctolib and Publicis, to name but a few.Beamy
Beamy is the leader in SaaS Management (Software-as-a-Service) for large companies, and counts major players such as LVMH, BNP Paribas, Clarins, Decathlon, Axa, Bouygues, etc. among its customers. Large companies are facing an explosion in the number of SaaS applications, often deployed by business departments (HR, Marketing, Product) without the knowledge of IT teams. This underground digitalization (or Shadow IT) is systemic, and generates major security and compliance risks.
Beamy helps CIOs and CISOs to securely manage their SaaS ecosystems, to empower employees' technological potential. Beamy is the SaaS governance platform for real-time detection and monitoring of business usage.
Censys
Cribl
Cybi
We offer innovative, automated cybersecurity solutions based on complex artificial intelligence and machine learning algorithms.
For example, our SCUBA platform automatically reproduces all the attack paths identified within an information system (Attack Path Management), deriving a risk analysis and proposing treatment plans adapted to the constraints of the beneficiaries.
Cyera
Dope Security
No stopovers. No outages. That’s the difference with dope.security, the Fly-Direct Secure Web Gateway (SWG). Eliminate the data center and perform all security checks directly on the endpoint. dope.swg provides stronger privacy, reliability, and performance speeds up to 4x faster—all with enterprise grade security.
Duokey
Flare
Keyfactor
Lovell Consulting
Mantra
Mokn
MokN offers the first real technical response to ID theft, ingeniously using deceptive technology. By luring attackers into believing they have an easy point of entry to the network (a fake SSL VPN, for example), the solution recovers credentials that may have been stolen before they are used.
Counterattack and Phish-Back your credentials.
Neotrust
P4S
Qevlar
Saporo
Secdojo
Seclab
Seclab was born to solve a basic problem that is impacting more and more industries: how to interconnect traditional OT (Operations technology) networks and IT (Information technology) networks:
By minimizing the risk of cyber-attacks
By continuing to use other existing cybersecurity technologies, in order to get closer to 0 risk.