SubProcessors
Name Category Purpose Country Data Processed
Ekco Security Ltd Cloud Services Security-first managed cloud services - -
Armis Cybersecurity Asset visibility and security - -
Zscaler Cybersecurity Secure network and application transformation - -
Foxit Software Software PDF products and services - -
Security Risk Advisors Cybersecurity Specialized security services including Penetration Testing and Cybersecurity Operations - -
Z IT SECURITY Cybersecurity Ethical hacking and cyber security training - -
Recorded Future Cybersecurity Intelligence-led security - -
Cisco Ireland Networking Digital society and cybersecurity solutions - -
Cohesity Data Management Data protection and insights - -
Bitdefender ltd Security Threat prevention and response solutions - -
Weve Cybersecurity Alert volume reduction and automated investigations - -
Bytes Software Services IT Services Cybersecurity consultancy and services - -
Ergo IT Services Managed Security Services and Security Consulting - -
Arctic Wolf Networks Cybersecurity Security Operations Cloud - -
VMGroup Cybersecurity Digital forensics and information security consulting - -
Logicalis IT Services Digital enablement services - -
Clonmel Enterprises Ltd Construction - - -
Exclusive Networks Cybersecurity - - -
WhatsExposed Cybersecurity - - -
Varonis Systems (Ireland) Limited Cybersecurity - - -
Cytidel Cybersecurity - - -
IT Solutions Ltd IT Services - - -
PFH Technology Group ULC IT Services - - -
Kyndryl Ireland Limited IT Services - - -
Renaissance Distribution - - -
Tines Automation - - -
Proofpoint Cybersecurity - - -
Cyble Cybersecurity - - -
Aviatrix Cloud Networking - - -
Triangle Technology Services IT Services - - -
Waystone Compliance Solutions (IE) Compliance - - -
Slandail Research Limited Consulting - - -
Google Cloud Security Cloud Services - - -
Edgescan Cybersecurity - - -
Grant Thornton Consulting - - -

Your data may flow beyond direct subprocessors. Click to expand and see the chain.

Loading data flow...

No changes recorded yet. Changes will appear here after the next scan detects updates.

Summary

35 Total Subprocessors
0 Countries
13 Categories
0% in

Subprocessors by Country

Subprocessors by Category

Biggest overlap with

Other companies using the most of the same subprocessors

Common in your industry

Top subprocessors used by other Cybersecurity companies