Adaptive Shield

Adaptive Shield

Adaptive Shield's mission is to give you back control over your SaaS perimeter, SaaS applications and collaborative tools. The latter, widely adopted and growing in number, require constant vigilance to prevent security breaches.

Market leader in Europe and France, our references include renowned companies such as Doctolib and Publicis, to name but a few.
Beamy

Beamy

Beamy is the leader in SaaS Management (Software-as-a-Service) for large companies, and counts major players such as LVMH, BNP Paribas, Clarins, Decathlon, Axa, Bouygues, etc. among its customers. Large companies are facing an explosion in the number of SaaS applications, often deployed by business departments (HR, Marketing, Product) without the knowledge of IT teams. This underground digitalization (or Shadow IT) is systemic, and generates major security and compliance risks.

Beamy helps CIOs and CISOs to securely manage their SaaS ecosystems, to empower employees' technological potential. Beamy is the SaaS governance platform for real-time detection and monitoring of business usage.

Censys

Censys

Censys helps organizations, individuals, and researchers find and monitor every server on the Internet to reduce exposure and improve security.
Cribl

Cribl

Cribl puts your IT and Security data at the center of your data management strategy and provides a one-stop shop for analyzing, collecting, processing, and routing it all at any scale. Try the Cribl suite of products and start building your data engine today!
Cybi

Cybi

We offer innovative, automated cybersecurity solutions based on complex artificial intelligence and machine learning algorithms.

For example, our SCUBA platform automatically reproduces all the attack paths identified within an information system (Attack Path Management), deriving a risk analysis and proposing treatment plans adapted to the constraints of the beneficiaries.

Cyera

Cyera

Cyera is a data security platform makes it easy for your team to manage and protect sensitive data, empowering your business to realize transformative data-driven outcomes.
Dope Security

Dope Security

No stopovers. No outages. That’s the difference with dope.security, the Fly-Direct Secure Web Gateway (SWG). Eliminate the data center and perform all security checks directly on the endpoint. dope.swg provides stronger privacy, reliability, and performance speeds up to 4x faster—all with enterprise grade security.

Duokey

Duokey

DuoKey is a leader in cloud security, specializing in robust key management and advanced encryption for enterprise cloud environments, including Microsoft 365, Salesforce, Google and AWS.
Flare

Flare

Flare Threat Exposure Management seamlessly integrates cyber threat intelligence, digital risk protection and external attack surface management, enabling organizations to proactively detect, prioritize and mitigate the types of exposures commonly exploited by malicious actors.
Keyfactor

Keyfactor

Keyfactor brings digital trust to a hyperconnected world, with identity-based security for every machine and every person. By simplifying PKI, automating certificate lifecycle management and securing every device, every workload and every entity, Keyfactor helps companies rapidly deploy digital trust on a large scale - and keep it there. In a zero-trust world, every machine needs an identity, and every identity needs to be managed.
Lovell consulting

Lovell Consulting

Lovell Consulting is a consulting firm specializing in risk management and information systems security governance. In addition to an unbridled passion for consulting and cybersecurity, we wanted to bring simplicity to a profession that has sometimes become complex to the point of absurdity. Quite simply, we wanted to (re)give meaning to our profession!
Mantra

Mantra

Mantra is a new-generation cyber security awareness platform. Raise awareness and protect your employees in real time across all media (email, mobile, desktop), while benefiting from the latest advances in AI (GenAI).
Mokn

Mokn

MokN offers the first real technical response to ID theft, ingeniously using deceptive technology. By luring attackers into believing they have an easy point of entry to the network (a fake SSL VPN, for example), the solution recovers credentials that may have been stolen before they are used.

Counterattack and Phish-Back your credentials.

Neotrust

Neotrust

Neotrust is an innovative security company. We support managers in their operational transformation in an efficient and sustainable way, by integrating cyber innovation into their long-term security strategy. In an ever-changing digital age, cybersecurity has established itself as a central pillar of your corporate strategy. At Neotrust, our mission goes beyond securing your digital infrastructures: we transform your cybersecurity posture into a strategic growth lever.
P4S

P4S

P4S offers intelligent network interface controllers for integration into corporate, industrial and embedded network infrastructures. With its disruptive approach, P4S's SOFTLESS solution - which, as its name suggests, requires no software at all - delivers performance in terms of security and speed that no other solution can match. P4S SOFTLESS technology, the result of over 10 years' research, combines the advantages of hardware robustness and software agility, while delivering a high level of cybersecurity, performance, determinism, operational reliability and energy and environmental efficiency. P4S is a 100% French start-up whose ambition is to revolutionize the way we approach network infrastructures.
Qevlar AI

Qevlar

Investigation autonome des alertes traitées par les SOC sur la base d'une IA explicable. La solution s'intègre dans n'importe quel environnement et exploite de manière autonome les ressources disponibles pour effectuer des analyses approfondies. Elle fournit ensuite à l'analyste des résultats exploitables.
Saporo

Saporo

Saporo greatly reduces your identity attack surface with proper access segmentation. Identity is the top attack surface. 90% of attacks exploit poor access segmentation in Active Directory, Azure, AWS and other systems.
Secdojo

Secdojo

Secdojo's mission is to help the cyber industry put cyber competence into action, to ensure the effectiveness of cyber recruitment and the ongoing development of employee skills.
Seclab

Seclab

Seclab was born to solve a basic problem that is impacting more and more industries: how to interconnect traditional OT (Operations technology) networks and IT (Information technology) networks:

By minimizing the risk of cyber-attacks

By continuing to use other existing cybersecurity technologies, in order to get closer to 0 risk.

Surf Security

Surf Security

SURF directly benefits CIOs, CISOs, IT and Security teams, Compliance officers and DPOs by consolidating security controls, visibility, governance, and Zero Trust into one single tool.
Tyrex

Tyrex

Today a leader in the USB device decontamination sector, TYREX has been operating since 2017 in sensitive sectors such as defense, industry, transport, public bodies and governments as well as OIVs (Opérateurs d'Importance Vitale), protecting their critical infrastructures in the process.