IT-Harvest Research
CYBER 150 2026 Winners
Access analyst briefings, live product demos, and technical resources from the 157 cybersecurity vendors selected for the 2026 Cyber 150 list.
157
Vendors
13
Live Demos
24
Categories
157 Companies

Anvilogic
Anvilogic is the AI-driven SOC platform for automated threat detection and incident response, modernizing security operations by decoupling detection from data storage across SIEMs and data lakes.

Cyera
As a pioneer in Data Security Posture Management (DSPM), Cyera instantly provides companies visibility over all of their sensitive data, context over the risk it represents & their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data.

Descope
Reduce user friction, prevent account takeover, and get a 360° view of your customer identities with the Descope CIAM platform. Trusted by hundreds of organizations including GoFundMe, Databricks, Navan, and You.com.

Dropzone AI
The Dropzone AI SOC analyst replicates the techniques of elite analysts to autonomously investigate and solve every alert. Deploys in minutes.

Exaforce
Breakthrough agentic AI that empowers the entire SOC lifecycle, across detection, triage, investigation, and response. Available as SaaS or MDR.

Noma Security
We need an entirely new solution to protect the Data & AI Lifecycle. That's where Noma comes in, providing complete visibility, security, protection, and compliance across the entire Data & AI Lifecycle — in a single platform.

Protect AI
Protect AI is the platform for AI security, delivering end-to-end protection for AI applications from model selection and testing to runtime and beyond with a Secure by Design methodology.

Radiant Security
Radiant Security is the agentic AI SOC platform that investigates 100% of alerts automatically across the entire security stack without requiring pre-built playbooks or manual configuration.

Simbian
Simbian's AI Agents autonomously run security operations, from defensive alert triage and remediation to offensive threat hunting and pentesting. Simbian unifies decentralized tools, data, and people into coordinated operations for faster, more accurate threat handling with humans always in control.

Strobes
Reduce threat exposure with Strobes Security. Streamline vulnerability management, prioritize risks, automate workflows, and ensure compliance efficiently.

Torq
Torq delivers the first AI-native, autonomous SecOps platform — HyperSOC — which eliminates SOAR's constraints, delivers machine-speed triage, investigation, and remediation and plugs into your entire stack, out of the box.

WitnessAI
WitnessAI is building the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security.

Zenity
Zenity empowers enterprises to enable AI Agents securely. Our platform ensures adaptive security and governance from buildtime to runtime — spanning tools, permissions, context, and actions across environments.

6clicks
6clicks enabling CISOs, information security leaders and risk managers to build resilient cyber risk and compliance programs powered by AI.

7AI
7AI deploys swarming AI agents that act on alerts, enrich data, perform investigations, and offload repetitive SOC tasks — delivering expert-level response at AI speed and precision.

Abstract Security
Break free from vendor lock-in with composable SIEM. Flexible data collection, AI-powered detection, and intelligent storage for modern SecOps teams. Move at your own pace.

Action1
Unified cross-platform patch management that just works.

Adaptive Security
Adaptive's next-generation security training and phishing simulation platform protects businesses from deepfakes, generative AI phishing, SMS attacks, voice phishing, and more emerging threats.

Admin By Request
Your one-stop endpoint security solution for protection, productivity, & compliance: Admin By Request Privileged Access Management. Local admin rights, managed. Control local admin rights without slowing your users down. Enterprise passwordless PAM that's simple to deploy, easy to manage.

Aikido
Detect, pentest, and block security threats across your entire stack - from one unified platform. Dependencies (SCA) SAST & AI SAST IaC AI Code Quality Secrets Malware Licenses (SBOM) Outdated Software Container ImagesUnified cloud security with real-time visibility.

Airlock Digital
Allowlist made simple. Airlock Digital provides enterprise-grade application control that is easy to manage and scalable. Built by experts to help organizations protect their most important assets.

AKITRA
Agentic AI’s intelligent agents continuously analyze data and adapt to new risks, making smarter compliance decisions as your environment evolves. Cut time and cost by automating tedious compliance tasks.

Alcatraz.ai
Transform enterprise security with Alcatraz AI's privacy-first facial authentication. Experience frictionless access & tailgating prevention, with easy integration - protecting your people and places without storing images. Add Alcatraz to your existing ACS without custom integration.

Andesite
We enable cybersecurity teams to automate and accelerate investigations, connect data silos, and decrease time to investigate and respond We don’t replace human talent and intelligence. We empower cybersecurity teams to make critical decisions, assess threats, reduce risk, and focus on prevention.

Andromeda Security
Automate Permissions and Lifecycle for Human and Non-Human Identities. Defend against identity breach using context, risk, and behavioral analysis. Suspendisse tincidunt sagittis eros. Quisque quis euismod lorem.

ANY.RUN
Cloud-based malware analysis service. Take your information security to the next level. Analyze suspicious and malicious activities using our innovative tools. Empowering SOC performance with cutting-edge .

Apono
Permission Management Made Easy. Automate and simplify permission granting for your entire cloud stack.

Armo Security
Zero-day and every day protection for your cloud applications with a complete explainable & traceable runtime security story.

Astrix Security
Gain visibility and control over AI agents & NHIs. Astrix secures agent identities with governance, least-privilege access, and full audit trails. Identify and remediate AI agents and NHIs with excessive privileges, vulnerable configurations, abnormal activity, and policy violations.

Aurascape.ai
Aurascape is the AI-native security platform that empowers enterprises with real-time visibility, intent-based controls, and protection for every AI interaction—securing innovation without slowing it down. Aurascape helps organizations securely build and operate AI agents and applications.

AuthMind
AuthMind delivers identity observability that empowers organizations to protect agentic AI, non-human, and human identities. By monitoring every access and understanding every activity, AuthMind transforms identity security from static, policy-based controls into dynamic, AI-driven protection.

Axiado
NEWS Axiado Receives Gold Award in the AI Security Solution Category of the Cybersecurity Excellence Awards NEWS Sampling now, a single-chip platform security innovation for cloud and 5G/edge markets Axiado Trusted Control/Compute Unit (TCU) provides requisite Integration of infrastructure security and management into a system-on-chip (SoC) with.

Bedrock
Gain full visibility, reduce risk, and scale governance—without exposing your data. Bedrock Data autonomously classifies petabytes in hours to drive native policy enforcement. Bedrock Data provides the visibility and control needed to secure your data and govern your AI with an architecture that ensures scanning stays entirely within your perimeter.

BlackCloak
Personal cybersecurity and digital privacy protections for individuals and companies. Stay informed with our comprehensive collection of DEP news and insights, in-depth reports, and the top tips for staying secure. Prevent deepfakes targeting your executive team.

Blackwall
Blackwall provides security and traffic management solutions for hosting providers and service operators, protecting over 2.3 million websites globally across 30+ countries.

Blink Ops
Agentic security operations at scale with AI agents that think, act, and execute with speed and precision. We partner with you to design, build, and maintain your agents, ensuring you realize tangible value in days, not months.

Blockaid
Trusted by chains, protocols, wallets, exchanges, banks, and digital asset managers to understand and secure what matters most. Introducing Crypto Fraud Prevention a new solution for stopping fraud in real time. Purpose-built for exchanges and custodial applications to detect, prevent, and investigate push payment fraud.

BotGuard
Protect your web site from hacking, content theft, crawling, and cloning! BotGuard Raises EUR 45mm Round B Led By Dawn Capital, Rebrands to Blackwall Operating at the web traffic entry point, GateKeeper performs deep traffic inspection and filtering to neutralize malicious requests in real time.

Cerby
Cerby is the identity automation platform that secures the applications traditional tools leave behind—extending control, security, and compliance everywhere. Evaluating Agentic AI . Automate password management and enable SSO and MFA for any app—even without SAML or OIDC.

CleanStart
Build on verified, near-zero-vulnerability container images with cryptographic provenance and compliance alignment.

Cloaked
We keep your data private, protecting what matters most. Take our free assessment to see if you’ve been compromised.

Cloudsmith
Cloudsmith is securing applications throughout the development lifecycle from code to deployment. The company helps organizations strengthen their security posture and protect critical assets.

Clutch Security
Secure all Non-Human Identities with Clutch’s NHI security platform.

Compyl
GRC Your way Your business has evolved. Turn your data into ... GRC Your Way Compyl 26. 1 Is Live — See What’s New and How GRC Just Got Faster.

Concentric AI
Autonomous data discovery, classification, risk monitoring, and remediation with Concentric AI, the Data Security Governance Platform.

ConductorOne
ConductorOne is leveraging artificial intelligence to detect, prevent, and respond to cyber threats in real-time. The company helps organizations strengthen their security posture and protect critical assets.

Corelight
Disrupt future attacks with complete network visibility, next-level analytics, faster investigations, and expert threat hunting. From device discovery to threat hunting, fuel Microsoft Defender for IoT and Sentinel with Corelight's Open NDR Platform.

Cork
Gain visibility across 100+ integrations. Cork helps MSPs surface real risks, build client trust, and protect revenue with warranty-backed financial protection.

Cyberhaven
Bring together DSPM, DLP, and insider risk management to prevent data exfiltration across SaaS, endpoints, cloud, and AI tools using Cyberhaven’s AI and data security platform. 🥇 Trusted by 4/5 top Forbes AI 50. 🚀 Fastest growing AI & data security in Silicon Valley.

Cynomi
MSSPs and consulting firms leverage Cynomi’s vCISO platform to provide full virtual CISO services at scale - without scaling their existing .

Cytactic
Cytactic is leveraging artificial intelligence to detect, prevent, and respond to cyber threats in real-time. The company helps organizations strengthen their security posture and protect critical assets.

D-Fend Solutions
RF Cyber Counter-Drone System Facilitates Agility To truly take full control of a dangerous drone situation, the key is taking control of the drone itself, and staying in control throughout the incident. EnforceAir automatically executes cyber-driven drone detection and takeover mitigation of rogue drones for safe landings and outcomes.

DataBahn
Collect, integrate, route, and optimize telemetry data with AI-enabled precision and zero friction. Lorem ipsum dolor sit amet consectetur elit Trusted by the world's most ambitious companies and .

DeleteMe
Your Personal Data is Yours Again. DeleteMe makes it quick, easy and safe to remove your personal data online. Say goodbye to complex enrollment procedures and hello to a seamless process experience. Submit your personal information for removal from search engines and data broker sites.

Doppel
By pairing cutting-edge AI with expert analysis, we outpace threats like phishing, impersonation, and disinformation—delivering comprehensive coverage, speed, and precision. Attackers now weaponize AI to scale personalized, multi-channel threats faster than humans can react.

DoveRunner
DoveRunner is securing applications throughout the development lifecycle from code to deployment. The company helps organizations strengthen their security posture and protect critical assets.

Dream Security
National Sovereign Artificial Intelligence National Sovereign AI After 3 years working with CyberSecurity for Governments, we discovered that national organizations don’t lack data, they lack the ability to operationalize it inside sovereign environments and to gain actionable insights.

Endor Labs
Endor Labs is an application security platform built for AI-generated and human-written code, helping teams prioritize and fix real risk across the SDLC. e-removeCustomize your preferencesEssential RequiredThese items are required to enable basic website functionality.

Enginsight
Cybersecurity für den Mittelstand. Mit Automatisierung & KI mehr Sicherheit für Ihre IT: Monitoring, Pentesting, Inventarisierung, ISMS und mehr für Server und Clients.

ETHIACK
Ethiack combines AI-powered pentesting with expert insight to continuously uncover, validate and prioritize real risks. Act fast and reduce exposure, 24/7. We blend AI-powered pentesting agents with the creativity and diligence of ethical hackers to help companies stay ahead of threats — not just react to them.

Exein
Protect your IoT devices in real time with Exein’s AI-powered embedded cybersecurity platform. Secure your connected . Exein RuntimeImagine a self-updating vaccine that empowers your devices to identify threats and block attacks in real-time. Runtime is what builds and evolves your cybersecurity Immune System.

Eye Security
Become part of Europe’s fastest growing cybersecurity platform. In-house incident response.

Fable
Reimagine human risk with AI‑powered interventions. Assess human risk, shape secure behavior, and report on security compliance, all delivered like magic. Five must-haves of modern human risk management The strategic playbook for data-driven, AI-powered human risk management at enterprise scale.

Feroot Security
Feroot Security is securing applications throughout the development lifecycle from code to deployment. The company helps organizations strengthen their security posture and protect critical assets.

Filigran
OpenCTI is an open source threat intelligence platform enabling users to collect, correlate, and leverage threat data at strategic, operational & tactical levels. Organize your cyber threat intelligence to enhance and disseminate actionable insights with our open-source threat intelligence platform.

Fingerprint
The Fingerprint device intelligence platform works across web and mobile applications to identify all visitors with industry-leading accuracy — even if they’re anonymous. Fingerprint helps Booking. com stop fraud while building customer trust.

Firefly
"This integration with Firefly brings immense value by enabling us to run automatic campaigns to prevent resource end-of-life instances and validate backups. " "It became easy to understand when EC2 instances were isolated from security groups, and where configuration was lacking for a specific component...

Flare
Flare equips your team to shut down cybercrime before it escalates. Detect, prioritize, and remediate external cyber threats with automated Threat Exposure Management. 2026 State of Enterprise Infostealer Identity Exposure PlatformWhat is Flare. It helps us protect our brand and financial .

Fleet
Open-source IT and security for teams with lots of workstations and servers.

Formal
Formal is a protocol-aware reverse proxy that secures access to your databases, APIs, and infrastructure. Dynamic masking, real-time policies, zero-trust access. A programmable reverse proxy that parses 15+ wire protocols and enforces security policies inline — query-level, every identity, sub-10ms.

Frenos
Frenos is optimizing security operations with automation, orchestration, and incident response capabilities. The company helps organizations strengthen their security posture and protect critical assets.

Fudo Security
Fudo Security offers advanced Privileged Access Management (PAM) .

GetReal
GetReal is leveraging artificial intelligence to detect, prevent, and respond to cyber threats in real-time. The company helps organizations strengthen their security posture and protect critical assets.

Gravitee.io
Gravitee is an open-source scalable API management platform with an event-native API gateway, agent mesh & support for event streaming across all protocols Get a 4x faster API Gateway Use our Java-based API gateway for event-native and traditional APIs. Deploy via cloud, on-prem, or hybrid. Or deploy within Kubernetes.

Guardio
Protect all your devices online. Keep your personal and business data safe from phishing, malware, and identity theft. Start Guardio's 7-day .

Gytpol
Preemptive Cybersecurity for Risk-Free Results. Fast deployment, non-disruptive remediation, and on-demand rollback. Traditional tools only flag the problem, leaving remediation to error-prone, manual efforts. Remedio closes the loop, automating fixe across your devices, identity, and AI stack.

Hadrian
Hadrian's agentic pentesting platform empowers your defense with continuous asset mapping, risk discovery, and remediation prioritization for hardened external attack surfaces.

Halcyon
Halcyon is the cyber resilience platform that Global 2000 companies rely upon to defeat ransomware-as-a-service-borne attacks.

Harmonic Security
Scale AI use safely with complete visibility and control. Detect sensitive data, enforce guardrails, and enable secure AI adoption across your organization. AI Governance & Control PlatformSecurely enable all web, desktop, and agentic AI workflows. Your submission has been received!

Horizon3.ai
Continuously assess, fix, and verify your security posture. Securing enterprises across many attack surfaces. Additional visibility into Iranian-backed threat actor activity | Available now to all . Autonomous Attack Validation Is How You Get There.

Hoxhunt
The next generation of security awareness is designed for employees and built for enterprises. Our industry-leading results are powered by cognitive automation.

Hypernative
Institutional-grade Web3 security platform protecting protocols, chains, asset managers, exchanges & data platforms. Stop Web3 hacks before they cause damage.

incident.io
io is an all-in-one incident management platform unifying on-call scheduling, real-time incident response, and integrated status pages – helping teams resolve issues faster and reduce downtime. New: AI-native post-mortems are here!

inforcer
inforcer helps MSPs standardize Microsoft 365 security across all client tenants, from policy deployment to compliance monitoring.

Intezer
Using AI agents and forensic-grade investigation for every SIEM, EDR, identity, cloud, and network alert to boost SOC productivity and security. Take a spin through Intezer's AI SOC to .

Lasso Security
Lasso’s AI Security Platform gives enterprises visibility, control, and protection across AI models, agents, and apps.

LayerX
LayerX secures all user and agentic interactions across any browser, app and IDE.

Legion Security
Legion Security is the first browser-native AI SOC Analyst that learns your team’s actual workflows and scales that knowledge across your organization. Grow your own AI SOCComplement your team with an AI companion that observes your best analysts' investigations, learns their unique workflows, and scales them.

LetsDefend
Online soc analyst and incident response training platform for blue team members FreeSOC FundamentalsThis training explains how SOC works and which tools we use for investigation. Very good start for beginners.

LinkShadow
Protection against advanced cyber-attacks, zero-day malware and ransomware, with rapid insight into the effectiveness of your existing security investments Ensure data integrity & compliance across environments. Advanced detection of anomalies and threats in network traffic. Break free from siloed tools.

Linx Security
The AI-native platform for identity security, visibility, and governance. Summit Utilities accelerates identity security & governance with Linx Greater Visibility, Lower Risk: How SmartCentres Modernized Identity Governance with Linx Security Continuously map every identity, entitlement, and resource to surface dormant accounts, admin sprawl, SSO.

Miggo Security
Miggo Security is securing applications throughout the development lifecycle from code to deployment. The company helps organizations strengthen their security posture and protect critical assets.

Mimic
Mimic's new enterprise ransomware defense technology provides a last line of defense against ransomware attacks and protects your critical data against theft and encryption.

MIND
MIND data security platform puts data loss prevention (DLP) and insider risk management (IRM) on autopilot - automatically identify, detect & prevent data leaks Stress-Free DLPMIND™ is the first-ever data security platform that puts data loss prevention (DLP) and insider risk management (IRM) programs on autopilot, so you can automatically.

Mitiga
Achieve cyber resilience with Mitiga’s award-winning Zero-Impact Cloud Detection and Response (CDR) platform for Cloud & SaaS. Detect fast & recover instantly. No one can prevent attacks – but we can prevent their impact.

Mitigata
Mitigata provides End-to-end cybersecurity, insurance and compliances for businesses, individuals & executives.

Moderne
Moderne builds the knowledge, discovery, and execution tools coding agents rely on to operate faster, more accurately, and at far lower cost across real-world software systems. Powered by the OpenRewrite Lossless Semantic Tree (LST), the industry’s most comprehensive context model for code for understanding and transforming your code at scale.

Moxso
Moxso is streamlining governance, risk management, and compliance processes for modern enterprises. The company helps organizations strengthen their security posture and protect critical assets.

Nagomi Security
Nagomi turns fragmented data into decisive steps—empowering you to protect your business with confidence and precision. One platform to continuously detect, investigate, and remediate live exposure across controls, assets, threats, and vulnerabilities.

Nexos
Nexos is leveraging artificial intelligence to detect, prevent, and respond to cyber threats in real-time. The company helps organizations strengthen their security posture and protect critical assets.

NINJIO
Build lasting defense with NINJIO’s cybersecurity awareness training and Human Risk Management—personalized coaching that reduces real-world risk. Cybersecurity awareness training that changes behavior Phish testing & susceptibility profile building Personalized security coaching and training on our human risk management platform.

Oasis Security
Non Human Identity Management Platform | Oasis Security unlocks lifecycle management and security for non human identities and AI Identities Oasis secures AI agents and non-human identities across IaaS, SaaS, PaaS, and on-prem environments, from AWS, Azure, and BigQuery to GitHub, ChatGPT, Salesforce, Office 365, and Copilot.

Obsidian Security
Obsidian Security delivers complete SaaS security—gain control, stop threats, and ensure compliance across all your business apps. Take control of your SaaS risk posture with a continuously updated view of every misconfiguration, access drift and compliance gap.

Oligo Security
The AI runtime security platform - Everything Runtime by Oligo Security: detect, stop, and investigate threats across cloud, Code, and Ai in real time. Applications and the infrastructure that powers them are the front lines of today's business.

OnDefend
OnDefend uncovers hidden risks traditional testing misses with elite penetration testing, red teaming, and adversary simulation for enterprise security teams.

OneLayer
Enterprise Grade Security Dedicated for Private LTE/5G Networks · The desired standard of security for your private cellular network Adopt existing IT security methodologies without requiring any cellular expertise. ALAN MCINTYRE, VICE PRESIDENT OF ENGINEERING AND OPERATIONS J.

Optery
Take back your privacy. Optery’s opt‑out software uncovers and removes your personal info from hundreds of data brokers, delivers live before‑and‑after screenshots, and offers a 30‑day money‑back guarantee.

Orchid Security
Orchid Security is managing digital identities and access controls to ensure the right people have the right access. The company helps organizations strengthen their security posture and protect critical assets.

OutThink
Move from traditional security awareness to adaptive security with the world’s first AI-native cybersecurity human risk management platform.

Paramify
Generate accurate digital POA&M and SSP docs. Cut compliance documentation and implementation workloads, timelines, and costs by 90%. Focus on security, not the documentation. Automate Compliance DocsSave time and money with SSP automation.

Phantom
Phantom is safeguarding sensitive data across cloud and on-premise environments with advanced encryption and access controls. The company helps organizations strengthen their security posture and protect critical assets.

Privado
Privado is securing applications throughout the development lifecycle from code to deployment. The company helps organizations strengthen their security posture and protect critical assets.

Prophet Security
Prophet Security’s AI SOC Platform uses agentic AI (AI SOC Agents) to automate alert triage. investigations, and response, accelerating and improving SecOps.

Protectt.ai
ai is defending endpoints including desktops, laptops, and mobile devices from sophisticated threats.

Protexxa
Don’t Just Find Cyber Threats. Protect your people, your reputation, and your bottom line with Protexxa Defender Let Us Show You How of consumers say businesses bear responsibility for digital privacy Protexxa is a B2B SaaS cybersecurity platform that leverages Artificial Intelligence to rapidly identify, evaluate, predict, and resolve cyber issues.

Push Security
Push is the security tool built for the browser. Detect threats like phishing and session hijacking in real time. No new browser required. Browser extension securityShine a light on risky browser extensions.

Qevlar
Let your SOC team focus on real threats. Not alert firefighting. Qevlar AI investigates every alert like your top analyst would. So your SOC focuses on real threats, not alert firefighting When alerts are treated in silos, real threats are missed Investigate alerts in <3 minutes.

Quilr
Stop AI data leaks and shadow AI risks with QuilrAI’s comprehensive security platform for U. Real-time protection for prompts, agents, and workflows with human-guided defense. QuilrAI’s guardian agents analyze content, context, and intent in real time — safeguarding sensitive data, AI interactions, and human workflows without slowing you down.

RapidFort Inc.
Automate CVE patching with RapidFort’s near-zero CVE container images and Software Attack Surface Management.

Ray
Ray provides a data security platform that helps organizations discover, classify, and protect sensitive data across their environments.

Reach Security
Unleash your security superpowers. Reach finds and remediates misconfigured tools and configuration drift to supercharge your security posture.

RealDefense
RealDefense provides a monetization path for Antivirus, PC Optimization, Driver Updates, & VPN . RealDefense proactively identifies device issues Turn everyday customer touchpoints into revenue opportunities.

Reco Labs
Reco’s Dynamic SaaS Security platform keeps pace with ever-evolving SaaS sprawl—protecting your apps, identities, and data from discovery to threat detection.

RegScale
Future-proof your Cyber GRC and streamline your governance, risk, and compliance program with RegScale’s Continuous Controls Monitoring platform. Simplify and automate building and managing controls. Automate the process of real-time evidence collection. Validate the adequacy of controls through automation.

Relyance AI
AI security platform tracking data from code to cloud to AI models. Detect shadow AI, prevent data leaks, automate compliance. Are you ready for California’s DELETE Act? Is your privacy team still using spreadsheets?

Remedio
Remedio automatically secures device configurations across enterprise environments. The platform enables rapid deployment of security remediation without disrupting operations, while providing risk-free rollback capabilities.

Resecurity
Cyber Security Services ➦ Resecurity . ☑ Detecting, protecting, and eliminating any digital threats. ⇒ Working in USA and all over the world. Cyber Services – defense & solution: ✐ contact@resecurity.

Riot
Riot is the leading employee security posture management platform, keeping thousands of the world PlatformAwarenessStudioSimulationSonarInboxBreaches.

Root
Root delivers security that fixes itself—autonomously patching vulnerabilities across your containers and dependencies without rebuilds or workflow change. Drop-In Secure Images | Deep Dependency Patching | Self-Healing Open Source Welcome to remediation that doesn't suck. Everyone else forces you to migrate or upgrade.

Rootly
Built for fast-moving engineering teams to manage, learn from, and resolve incidents faster.

Scytale
The leading AI-powered security and compliance hub — combining automation, expert guidance, and AI agents to get companies compliant and keep them compliant across 60+ frameworks. Scytale named 2026 G2 Best Software Award winner in GRC.

Seal Security
Seal Security’s AppSec Remediation Agent delivers real, human-vetted, production-ready fixes for open source vulnerabilities - resolving risk directly in your applications without slowing teams down. It was the most smooth onboarding experience we have had. In the short amount of time, we were actually able to start seeing value from Seal Security.

Semgrep
An extensible developer-friendly application security platform that scans source code to surface true and actionable security issues with AI-assisted SAST, SCA, and Secrets Detection . Visit booth #1743 for AI Detection demos, swag & Builders' Lounge access.

Sentra
Your cloud data is constantly moving, leaving it extremely vulnerable. Secure your data with Sentra's Data Security Posture Management (DSPM) platform.

Silent Push
Expose pre-weaponized adversary infrastructure with Indicators of Future Attack™. “Silent Push has the most complete view of DNS activity compared to any service we have used. ” “I would have had to buy three separate data . ” "The platform is amazing and offers unmatched insights.

SIRP
SIRP delivers an AI-native Self-Driving SOC — a governed Autonomous SOC platform that detects, decides, and executes response actions within policy boundaries.

Socket
Socket is securing applications throughout the development lifecycle from code to deployment. The company helps organizations strengthen their security posture and protect critical assets.

SOCRadar
SOCRadar is providing actionable threat intelligence to help organizations stay ahead of emerging cyber threats. The company helps organizations strengthen their security posture and protect critical assets.

Sola Security
Everything stays read-only and Sola never touches more than it needs. Check out our Trust Center. Chat with your stack in plain language to get answers and insights.

SpecterOps
Stop identity attacks before they happen. SpecterOps provides Identity Attack Path Management from an attacker's perspective. Introducing BloodHound Scentry: Accelerate your APM practice.

Stoik
Stoïk is the first specialized underwriting agency for cyber risk in Europe aimed at SMEs. An easy-to-understand insurance policy, clear, transparent guarantees, and no hidden exclusions.

StrangeBee
The creators of TheHive and Cortex for advanced security case management. We are StrangeBee, the bees behind TheHive—a pioneer Security Case Management Platform trusted worldwide. Harness the power of our Cortex automation engine to resolve problems in the blink of an eye.

Strider Technologies
Strider transforms publicly available data into strategic intelligence to secure and advance innovation.

Strike.sh
HYBRID TESTING BoosterAn extra layer that amplifies the platform with human-led testing to uncover deeper risks and validate fixes faster. Deep-dive, human-led testing for specific assets or features requiring focused, high-impact analysis beyond the CTEM AI Platform’s coverage.

Sublime Security
Next-gen email security platform with autonomous AI agents. Stop phishing, BEC, and advanced threats with explainable detection and adaptive protection. Opaque verdicts leave you guessing why attacks are caught or missed.

Sweet Security
Runtime-powered CNAPP for cloud and AI applications. Complete visibility across every cloud workload and every environment Secure your traditional and agentic AI applications in one place Continuously map your entire environment.

Tailscale
The connectivity platform for devs, IT, and security teams. Zero Trust identity-based access that deploys in minutes and scales to every resource.

TENEX.AI
Human-led, AI-powered security operations. 100% of alerts analyzed. 98% of false positives eliminated. Better, Faster, More Cost-Effective – TENEX Leverages AI and Automation to Transform Security Operations Security teams are inundated with tickets.

Truffle Security
Truffle Security is an open-source security software . New Webinar: Google API Keys Weren't Secrets. But then Gemini Changed the Rules. TruffleHog™ uncovers exposed non-human identities (NHIs) and their secrets, securing everything from open-source projects to global enterprises.

Upwind
Combine the power of cloud security posture with runtime context and realtime protection— enabling your security team to prioritize accurately and respond fast to your most critical risks. Your browser does not support the video tag.

usecure
Automated human risk management platform for MSPs and IT teams to reduce cyber risk, prove compliance and save time with training, phishing and policies. Human Risk Reporting Track user progress and risk trends. Auto Enrol Put training delivery and reminders on autopilot.

VanishID
Prevent cyber and physical attacks before they start.

VulnCheck
Vulnerability intelligence that predicts avenues of attack with speed and accuracy. VulnCheck’s Initial Access Intelligence team has been tracking and analyzing half a dozen recent vulnerabilities in Cisco Catalyst SD-WAN Manager, several of which have begun to see in-the-wild exploitation.

Wiz
Wiz is the unified cloud security platform that provides complete visibility, risk prioritization, and remediation guidance across the full cloud stack.

XBOW
XBOW is an autonomous offensive security platform that delivers the depth and results of a premium pentesting engagement in a fraction of the time.

Zafran
Proactively stop vulnerability exploitation with Zafran's AI-native Exposure Management, unifying risk detection and mitigation to protect hybrid assets. Zafran is for security teams buried in vulnerabilities and manual work.

Zero Networks
Zero Networks delivers automated microsegmentation, securing assets on-prem, in the cloud, and OT/IoT. Deploy in 30 days with set-and-forget simplicity. Fully Automated for Zero Trust Segmentation and Remote Access Connect Remote Users Protect Third Party Access Compliance & Savings .