Secure by Design Pledge Signers
302 Companies
1touch.io | 21Packets | Accops | Action1 | Adaptiva | Advanced Cyber Defence Systems | Afero |
Akamai | Akhenaten | Allthenticate | Amazon Web Services | Andesite AI | Anthracene | Apiiro |
Apona Security | Arctic Wolf | Arkose Labs | Armis | Asimily | Assumed | AttackIQ |
Automox | Avant Assessment | Aveva Public Health Solutions | Axonius | Backslash Security | Barracuda Networks | Bastazo |
Beyond Identity | BeyondTrust | BFB Consulting | BigCommerce | BigID | BioTone LLC | Bitdefender |
BitGo | BitSight Technologies | Black Duck Software | Black Kite | BlackBerry | BlackCloak | BlastWave |
Bluescape | Botdoc | Bugcrowd | Business Cyber Guardian | Call Box | Cervello Security | Chainguard |
Check Point Software Technologies | Checkmarx | Chief AI | Cisco | Claroty | ClassLink | Clever |
Cloud Software Group - Citrix | CloudCover | Cloudera | Cloudflare | CMD+CTRL Security | CobbleStone Systems | Code42 |
CodeEye | CodeLock | CodeSecure | Cohesity | Commvault | Compliance Scorecard | ConnectWise |
CPSI | Cribl | Criticality Sciences | CrowdStrike | Cybeats | Cyber Resilience | Cycode |
CYLUS | Cynomi | Cyware | D2L | Dashlane | DataMotion | Dataparency |
Dazz | Deep Instinct | Deepwatch | DigitalXForce | Dragos | Drata | Druva |
Dymium | Echo360 | eCourtDate | Edera | Edith AI | Elastic | Emsisoft |
Endor Labs | ESET | Everfox | Exiger | Extreme Networks | F5 | FARO Software Solutions |
Fastly | Field Effect | Figma | Finite State | Flock Safety | Focus School Software | Forcepoint |
Forescout | Fortinet | Fortra | Fortuna Cysec | Genua | Gigamon | GitHub |
GitLab | Gomboc.ai | GoSecure | GovTrust | Guardian | HackerOne | |
Hashgraph | HeroDevs | Hewlett Packard Enterprise | HiddenLayer | Hitachi Vantara | HP | Huntress |
HYPR | IBM | Identity Automation | ImmuniWeb | Imperva | Infoblox | InfoSec Global |
InstaSafe | Internet Infrastructure Services Corp | IriusRisk | Ironclad | IronCore Labs | Issio Solutions | Ivanti |
Jobready360 | Keeper Security | Key9 Identity | Kisi | Kiteworks | KnectIQ | Kontent.ai |
Kusari | Lasso Security | Legit Security | Lemongrass | Lenovo | Lineaje | LinkIt! |
Linx Security | Lookout | Lucidus Technology | Lumens Technologies | Lumos | Manage1to1 | Manifest Cyber |
MARIO Education | Mark43 | Material Security | Microsoft | MicroWorld Technologies (eScan) | Moveworks | MyDigital |
MyLigo | N-able | NetApp | NetFoundry | Netgear | Netskope | Netwrix |
New Harbor | NewPush | Nextech | Niratech.io | NowSecure | NRI SecureTechnologies | Nucleus Security |
NXT1 | Object First | Okta | Oleria | Onboard Cyber | Onfido | Opswright |
Optiv+ClearShark | Palantir | Palo Alto Networks | Pangea | Pax8 | Performetriks | Phoenix Security |
Pontera | Poppulo | Prime Security | Proofpoint | Protect AI | Qualys | Quindar |
R2 Utility | Rancher Government | Rapid7 | RapidFort | RapidSOS | Red Queen Dynamics | Resiliant |
Reveald | ReversingLabs | Rewind Software | RSA | Rubrik | Ruffian | RunSafe Security |
SafeStack | Sailpoint | Salesforce | SandboxAQ | Saviynt | Scale AI | Screenly |
Scribe Security | Sec1 | Seconize | SecOps Solution | Secure Code Warrior | Secureframe | Secureworks |
Securin | Security Compass | SecurityScorecard | SEMPRE | SentinelOne | SettleTop | Shadowbox |
ShiftControl | Sicura | Snowflake | Socket Security | SOCRadar | Software.com | Sonatype |
Sophos | SOS Software | Space and Time Labs | Spyglass | Start Left Security | SteelCloud | Strata Identity |
Stravito | Sun Ridge Systems | Symplr | Synack | Synology | Tanium | Tego Cyber |
Tenable | Tenex Software Solutions | Thales Cloud Protection and Licensing | ThreatModeler | ThreatQuotient | ThriveDX | Tidelift |
Tines | T-Mobile | Torq | TP-Link | TraitWare | Trellix | Trend Micro |
Trustwave | twinsync Corporation | US AI | Vanta | Veeam Software | Veracode | Versa Networks |
Versasec | vFairs | Videri | Vigilant Ops | Virtik | Wiz | Xage Security |
Xiid | XSOC CORP | Xylem | Yealink Network Technology | ZEDEDA | Zimperium | Zscaler |
Zyxel |