European Cybersecurity Companies

Estonia became Europe's de facto centre for military cyber after hosting NATO's Cooperative Cyber Defence Centre of Excellence since 2008, and the country's model of embedding private companies into national cyber resilience has been replicated across the Baltics. The EU committed €1 billion to cyber defence programmes through the European Defence Fund's 2024-2025 work programme, with Germany, France and the Netherlands absorbing the largest contract volumes. Most roles in the sector require national security vetting, making local hiring in high-trust jurisdictions like Tallinn, Helsinki and The Hague the dominant pattern.

Filigran
FiligranParis, France · 51-200

Open-source cyber threat intelligence and adversarial exposure validation platforms used by 6,000+ organisations worldwide, from national intelligence agencies to global enterprises.

OpenCTI
OpenCTI
Open-source cyber threat intelligence platform that collects, correlates and operationalises threat data using the STIX 2.1 standard. It connects to 300+ intelligence feeds and security tools, maps threats to MITRE ATT&CK and provides automation and agentic AI to cut enrichment time from hours to seconds. Available as a self-hosted community edition and a licensed enterprise edition with advanced access controls, AI features and SaaS hosting.
OpenAEV
OpenAEV
Open-source adversarial exposure validation platform that simulates realistic attack scenarios to test an organisation's technical controls, processes and people. Scenarios are built from threat intelligence and MITRE ATT&CK mappings, covering everything from atomic breach simulations to full crisis tabletop exercises across CISO, IT, legal and executive teams. Integrates with 30+ security tools including SIEM, EDR and XDR platforms.
15 roles
Quarkslab
QuarkslabParis, France · 100-500

Provides offensive and defensive cybersecurity services and software protection tools for software manufacturers, government agencies and defence organisations.

QShieldQLab
13 roles
Sekoia.ioParis, France · 51-200

Builds a SOC platform combining extended detection and response (XDR) with cyber threat intelligence for European enterprises and government organisations.

Sekoia Defend
Sekoia Defend
An open XDR and SIEM platform that collects and correlates security data from endpoints, networks and cloud environments. It combines built-in threat intelligence, SIGMA-based correlation rules, retro-hunting and SOAR automation playbooks to detect and respond to attacks. Named a Leader in the Frost Radar for XDR in 2023.
Sekoia Intelligence
Sekoia Intelligence
A cyber threat intelligence platform fed by 299 sources and 150+ exclusive trackers monitoring attacker infrastructure daily. It produces indicators of compromise in STIX 2.1 format and provides finished intelligence on threat actors, malware families and attack campaigns, available via API or natively integrated with Sekoia Defend.
10 roles
Stormshield
StormshieldIssy-les-Moulineaux, France · 201-500

Develops network firewalls, endpoint protection and data encryption products for European defence, government and critical infrastructure organisations, as a subsidiary of Airbus CyberSecurity.

SNxr1200
SNxr1200
Extra-ruggedised encryption firewall designed for embedding in military vehicles, aircraft and spacecraft operating in critical environments with TEMPEST classification.
SNi10 Industrial Firewall
SNi10 Industrial Firewall
Compact DIN-rail firewall for industrial OT environments, providing network segmentation and intrusion prevention for SCADA and industrial control systems.
SN-XL Series (SN6200)
SN-XL Series (SN6200)
High-performance enterprise firewall with modular interface slots delivering up to 80 Gbps throughput, ANSSI-qualified for protecting NIS2 Essential and Important Entities.
10 roles
CyberneticaTallinn, Estonia · 51-200

Builds secure data exchange platforms, digital identity systems and maritime surveillance infrastructure for governments in 40+ countries, with roots in creating the technology behind e-Estonia.

Border & Coastal Surveillance SystemUnified eXchange Platform (UXP)SplitKeySharemind MPC
8 roles
SECQAILondon, United Kingdom · 1-10

Designs memory-safe semiconductors with post-quantum cryptography for securing servers, edge devices and critical infrastructure against both current and quantum-era threats.

SE01 Q-Locked TPM
8 roles
HarfangLab
HarfangLabParis, France · 100-500

Builds endpoint detection and response software for European enterprises and government agencies, with cloud and on-premises deployment options certified by ANSSI and the German BSI.

EDR (Endpoint Detection and Response)EPP (Endpoint Protection Platform)Attack Surface Management (ASM)
6 roles
Ajax Systems
Ajax SystemsKyiv, Ukraine · 1000+

Manufacturer of professional wireless security systems providing intrusion protection, fire detection, video surveillance, and automation solutions. Develops advanced security technologies for critical infrastructure protection and defence applications.

5 roles
OsavulKyiv, Ukraine · 11-50

Builds OSINT-powered threat intelligence and disinformation detection platforms for governments, security agencies and enterprises.

JanusNebulaEcho
5 roles
CryptoNext Security
CryptoNext SecurityParis, France · 1-50

Builds post-quantum cryptography software that helps governments, financial institutions and critical infrastructure operators inventory their cryptographic assets and migrate to quantum-resistant encryption.

CryptoNext COMPASSCryptoNext ToolboxCryptoNext RemediationCryptoNext Captain
4 roles
Orasio
OrasioParis, France · 1-10

Develops AI-powered video analytics software that transforms video feeds into actionable intelligence for cities, homeland security forces, and businesses, with focus on European sovereignty and GDPR compliance.

3 roles
Scaleout Systems
Scaleout SystemsUppsala, Sweden · 11-50

Federated learning platform provider enabling secure, privacy-preserving machine learning across distributed data sources without centralizing sensitive data, supporting edge AI deployment in mission-critical environments.

3 roles
Tropic SquarePrague, Czech Republic

Czech semiconductor company developing auditable, tamper-resistant secure elements for IoT devices, digital identity, and critical infrastructure protection.

3 roles
Blackwall
BlackwallTallinn, Estonia · 11-50

AI-powered cybersecurity platform protecting businesses from malicious bot traffic, scrapers, and automated attacks. Rebranded from BotGuard. EUR45M Series B led by Dawn Capital.

2 roles
CybsafeLondon, United Kingdom

Cybsafe is an adaptive Human Risk Management platform that helps security teams reduce risky behaviors at scale. The GCHQ-accredited software delivers behavioral cybersecurity using science-backed approaches, powered by SebDB - the world's security behavior database.

2 roles
CyNation
CyNationLondon, United Kingdom · 1-50

Integrated risk management and analytics company focused on managing digital vulnerabilities inherent in third-party ecosystems. CyDesk platform uses AI and machine learning to automatically evaluate risks from over 900 data sources for cybersecurity, compliance, and business risk management.

2 roles
EclecticIQ
EclecticIQAmsterdam, Netherlands · 100-500

Builds threat intelligence platforms and tools that help security teams collect, process and act on cyber threat data across government, military and enterprise environments.

Intelligence CenterThreat ScoutThreat Intelligence Feeds
2 roles
Mindgard
MindgardLancaster, United Kingdom · 50-100

Automated AI red teaming and security testing. First company to apply dynamic application security testing methodology to AI systems.

2 roles
RepsenseVilnius, Lithuania · 1-10

AI-powered narrative intelligence platform that tracks disinformation and influence operations across text, broadcast and video media. Deployed by NATO Strategic Communications Centre of Excellence. Raised EUR 2M seed in December 2025.

2 roles
QuSide
QuSideBarcelona, Spain · 11-50

Builds quantum random number generators and randomness processing units that give encryption systems a hardware-verified source of entropy, covering embedded chipsets through to cloud-scale computing.

Nellite SeriesGarnet SeriesRuby SeriesEntropy Core
1 role
Advai
AdvaiLondon, United Kingdom · 1-50

UK leader in AI safety, security, and assurance providing testing, evaluation, and monitoring of AI systems. Works with UK Government's AI Safety Institute and Ministry of Defence to identify AI vulnerabilities and enable safe AI deployment in critical defence environments.

No listed roles
AxoflowBudapest, Hungary · 1-50

Provides automated security data curation pipeline for cybersecurity applications. Their platform helps enterprises achieve high-quality security data through automated collection, transformation and routing, enabling faster threat detection and response.

No listed roles
BforeAI
BforeAIMontpellier, France · 50-100

Predictive attack intelligence using behavioral AI. Advanced threat detection and prevention for critical infrastructure protection.

No listed roles
BPTIVilnius, Lithuania · 11-50

Private defence research institute specialising in AI, cybersecurity, military UX and IC component design for radar and electronic warfare. Coordinates the EUR 9.7M EDF-funded CYBER4DE project and participates in eight European Defence Fund programmes.

No listed roles
BreachLenseAhlen, Germany · 1-10

Darknet monitoring and leaked credential detection platform for defence and critical infrastructure. Indexes 80 billion accounts and 300 billion assets with AI-driven risk prioritization. DefenseTech-Inkubator.NRW member.

No listed roles
BulletProvePulawy, Poland · 1-10

R&D company building AI, computer vision and cybersecurity tools for defence and space, cleared to NATO SECRET and EU SECRET. Active in EDF projects across multiple EU countries.

No listed roles
CDeXWarsaw, Poland · 11-50

Builds a cyber range platform for military, critical infrastructure and enterprise cybersecurity training. Won NATO NCI Agency's Innovation Challenge as best cyber-defence training solution, with 250+ hours of automated attack scenarios.

No listed roles
Countercraft
CountercraftSan Sebastian, Spain · 50-100

Provides deception-powered threat intelligence solutions for active cyber defence. Creates controlled, deceptive environments that mimic organizational infrastructure to lure attackers away from real assets while gathering comprehensive threat intelligence.

No listed roles
CrowdSec
CrowdSecParis, France · 11-50

Open-source collaborative cybersecurity engine using crowd-sourced threat intelligence to block malicious activity in real time.

No listed roles
CybExer Technologies
CybExer TechnologiesTallinn, Estonia · 51-200

Provides comprehensive cyber security training solutions to increase organizational cyber resilience through advanced cyber range technology. NATO-awarded Estonian company offers highly realistic live-fire exercises that simulate real-world cyber attacks.

No listed roles
DataWalkWroclaw, Poland · 51-200

Graph and AI investigation platform that fuses siloed data into a unified knowledge graph, used by defence agencies, national intelligence services and financial institutions to uncover hidden networks and conduct complex investigations.

Graph AI PlatformLink Analysis SoftwareKnowledge Graph SoftwareIntelligence Analysis Software
No listed roles
DGTBydgoszcz, Poland · 51-200

Manufactures military-grade digital communication systems and field telephone exchanges for the Polish Armed Forces since 1991. Systems have been deployed on Polish military missions in Afghanistan, Iraq, Kosovo and other theatres.

No listed roles
DigitalPlatforms
DigitalPlatformsRome, Italy · 201-500

Italian industrial group providing end-to-end IoT and cybersecurity solutions for critical infrastructure, defence, and public administration sectors.

TEMPEST All-in-One PC
TEMPEST All-in-One PC
An SDIP 27/2-certified secure workstation with physical key lock and emission shielding, approved by NATO and the Council of the European Union for processing classified data.
TEMPEST Video Conference System
TEMPEST Video Conference System
An SDIP 27/2-certified video conferencing system for classified environments, available in multiple screen sizes and designed for secure communications in defence and critical infrastructure facilities.
No listed roles
Disruptive Industries
Disruptive IndustriesLondon, United Kingdom · 11-50

Multi-use technology company developing closed-source intelligence systems and threat detection platforms, focusing on OSINT capabilities and situational awareness solutions.

No listed roles
EMCA SoftwareWarsaw, Poland · 11-50

Develops Energy Logserver, a SIEM and log management platform used by critical infrastructure operators, banks and government institutions. Combines SIEM, EDR, UEBA and network traffic analysis for defence and public sector cybersecurity.

No listed roles
FactiverseOslo, Norway

Factiverse develops AI tools for countering harmful narratives and information threats, relevant to national security and information integrity. The company's AI detects false information by analyzing vast amounts of data, evaluating source credibility, and highlighting misinformation networks in 114 languages.

No listed roles
GatewatcherParis, France · 51-200

Network detection and response platform providing deep packet inspection for military networks and critical national infrastructure.

NDR Platform
NDR Platform
AI-powered network detection and response platform combining static, heuristic, and machine learning engines to detect known and zero-day threats in real time across IT, OT, and cloud environments.
Decision Center
Decision Center
Central intelligence module that consolidates detection outputs into a decision framework, evaluating threats on technical severity, intent, and business impact with AI-driven SOC assistant and actionable recommendations.
Deep Visibility
Deep Visibility
Advanced network monitoring module providing real-time application-level visibility with bandwidth analysis, flow classification, and traffic mapping for complete digital infrastructure understanding.
No listed roles
GLIMPS
GLIMPSRennes, France · 11-50

AI-powered malware analysis and cyber threat detection platform specializing in rapid automated binary analysis.

No listed roles
Goldilock
GoldilockLondon, United Kingdom · 11-50

Cybersecurity company that provides physical network disconnection technology through the FireBreak platform, enabling remote control of network connectivity without using the internet for ultimate protection against cyber threats.

No listed roles
GSMK CryptoPhoneBerlin, Germany · 11-50

Builds end-to-end encrypted mobile phones with 4096-bit key exchange and hardened OS. Pioneered the secure smartphone market in 2003 with patented Baseband Firewall that detects IMSI catchers. Used in 50+ countries.

No listed roles
GuardtimeTallinn, Estonia · 201-500

Blockchain-based cybersecurity infrastructure securing military, government, and ESA space systems with keyless signature technology.

KSI BlockchainActive IntegrityNATO Cyber Range Platform
No listed roles
ICSecPoznan, Poland · 11-50

First Polish manufacturer of cybersecurity products for industrial control systems. Developed SCADvance XP, a passive IDS for OT networks using deep packet inspection across 70+ industrial protocols.

No listed roles
Lab 1London, United Kingdom · 11-50

Leading exposed data intelligence platform with Gen AI Agents for threat detection that continuously monitors for exposed data and provides high fidelity intelligence for cybersecurity risk management.

Company Monitoring
Company Monitoring
A continuous alerting service that detects when an organisation or its third-party suppliers appear in data breaches, analysing exposed files to identify PII, credentials, financial documents, and source code.
Data Scanning
Data Scanning
AI-powered analysis of breached datasets that extracts and classifies exposed data entities at a rate of 629 per second, enabling incident response teams to triage and remediate data exposures 41x faster than manual methods.
Company Scoring
Company Scoring
A risk scoring engine that rates organisations based on the volume and sensitivity of their exposed data, used by cyber insurers, attack surface management providers, and supply chain security teams.
No listed roles
LiveDrop
LiveDropEindhoven, Netherlands · 11-50

Provides offline data transfer solutions enabling secure data exchange without internet connectivity. Specializes in air-gapped data transfer systems for sensitive environments.

No listed roles
Maltego TechnologiesMunich, Germany · 51-200

Builds OSINT and link analysis tools that help intelligence agencies, law enforcement and corporate investigators uncover hidden connections across open-source, dark web and commercial data sources.

Maltego GraphMaltego OneMaltego SearchMaltego Monitor
No listed roles
MAW TelecomWarsaw, Poland · 51-200

Provides military TETRA radio systems, electronic warfare equipment and cybersecurity tools to the Polish Armed Forces since 1990. Built the first military TETRA network in Poland.

No listed roles
NRD Cyber SecurityVilnius, Lithuania · 51-200

Cybersecurity company building national-scale SOCs, CSIRTs and threat intelligence platforms. Developed Lithuania's national cyber security strategy alongside the Ministry of Defence. Operates across multiple countries.

No listed roles
PKE PolskaWarsaw, Poland · 51-200

Defence security integrator holding NATO and EU classified information clearances. Provides perimeter security with radar, thermal imaging, CCTV analytics and counter-drone systems for military facilities and critical infrastructure across Poland.

No listed roles
PradeoMontpellier, France · 51-200

Mobile security platform protecting enterprise and defence mobile device fleets against advanced mobile threats and data leakage.

Mobile Threat DefenseSecure Private StoreYagaan Application Security Testing
No listed roles
Q*Bird
Q*BirdDelft, Netherlands · 11-50

Develops quantum key distribution (QKD) technology providing ultra-secure data communications and quantum networking solutions for critical infrastructure.

No listed roles
Quantum Dice
Quantum DiceOxford, United Kingdom · 11-50

Award-winning quantum technology spinout from Oxford University developing quantum random number generators (QRNGs) that provide verifiably secure random numbers for cybersecurity applications.

No listed roles
ResQuantLodz, Poland

Deep-tech cybersecurity company focused on hardware implementation of post-quantum cryptography standards. Their secure element chiplet integrates NIST-selected PQC algorithms at the silicon level.

No listed roles
Roseman LabsUtrecht, Netherlands · 11-50

Specializes in Multi-Party Computation technology enabling secure collaboration on encrypted data, allowing organizations to analyze sensitive datasets without exposing raw data.

Roseman Labs Encrypted Computing Platform
Roseman Labs Encrypted Computing Platform
Python-based data collaboration platform with 50+ ready-to-use functionalities including machine learning, where datasets are split into encrypted shares across three independent EU cloud servers so no single party ever sees the full data.
Multi-Party Computation Engine
Multi-Party Computation Engine
Privacy engine supporting private set intersection, statistical tests, fuzzy matching, and ML models (logistic regression, K-nearest neighbors, random forest) that computes on encrypted shares distributed across three servers, revealing only approved results.
Developer Integration Layer
Developer Integration Layer
SDKs, APIs, and connectors enabling integration with Databricks, Tableau, Power BI, and Microsoft Fabric, deployable on Kubernetes across multi-cloud (OVH, Scaleway, Cyso) or fully on-premise environments.
No listed roles
SecfenseKrakow, Poland · 11-50

Cybersecurity company building a User Access Security Broker that deploys multi-factor authentication and passwordless login across enterprise applications without code changes. Trusted by BNP Paribas Bank Polska and major Central European insurers.

No listed roles
Sensity AI
Sensity AIAmsterdam, Netherlands · 11-50

AI-powered deepfake detection platform that identifies synthetic media and provides cybersecurity solutions against AI-generated threats.

Sensity AI Deepfake Detection Platform
Sensity AI Deepfake Detection Platform
Multilayer forensic analysis platform that examines pixels, file structures, and voice patterns to detect deepfakes in seconds, producing court-ready reports with confidence scores and explainability heatmaps.
Face Manipulation Detection
Face Manipulation Detection
Frame-by-frame AI face forgery analysis that identifies face swaps, lip syncs, reenactments, and morphing with pixel-level manipulation heatmaps showing exactly which regions were altered.
Deepfake Voice Detection
Deepfake Voice Detection
Acoustic analysis engine that detects synthetic voices and voice cloning by examining formant frequencies, pitch contours, and spectral features to differentiate between real human speech and AI-generated audio.
No listed roles
SeqredGdynia, Poland · 11-50

Provides OT, ICS and IoT cybersecurity services to industrial and critical infrastructure organisations, covering security audits, penetration testing, red team operations and NIS2 compliance.

Security Audits and Penetration TestingRed Team OperationsCritical Infrastructure ProtectionSmart Building Cybersecurity
No listed roles
Siren
SirenGalway, Ireland · 51-200

Provides an investigative intelligence platform that enables organizations to search, analyze, and visualize data for law enforcement, cybersecurity, fraud, and national security investigations.

Siren Investigate
Siren Investigate
An AI-powered investigative search platform with full-text search, link analysis, geospatial/temporal analysis, and real-time topic clustering that analysts say reduces investigation time by 70%, deployable on-premise or air-gapped environments.
No listed roles
SkudoTallinn, Estonia · 1-50

Hardware Security Modules and encryption technologies. Advanced cryptographic solutions for defence communications.

No listed roles
SnowpackParis, France · 11-50

European cybersecurity startup specializing in internet invisibility technology through their VIPN (Virtual & Invisible Private Network) system, making users, devices, and data invisible to prevent cyber attacks.

No listed roles
Sonovero R&DGoleniow, Poland · 1-10

Develops quantum computing hardware and secure access platforms for military IT applications. Part of the PLN 56 million MIKOK consortium building modular quantum computer infrastructure for the Polish Armed Forces under NCRD funding.

No listed roles
SpaceitTartu, Estonia · 11-50

Develops cloud-based satellite mission control software (MCSaaS) and operates a Space Cyber Range for space cybersecurity training. Spin-off of ESTCube-1, Estonia's first satellite mission. Prime contractor for ESA 4S Space Cyber Range and participant in NATO CCDCOE Locked Shields exercises.

No listed roles
TEHTRISBordeaux, France · 201-500

Extended detection and response (XDR) cybersecurity platform protecting enterprise and defence endpoints against advanced threats.

TEHTRIS XDR AI Platform
TEHTRIS XDR AI Platform
Unified cybersecurity console that orchestrates EDR, SIEM, MTD, NTA, Honeypots, and DNS Firewall modules into a single AI-powered detection and response platform, deployed in under 24 hours for enterprises with 100,000+ endpoints.
EDR OPTIMUS
EDR OPTIMUS
Endpoint detection and response agent with built-in NGAV using Deep Learning neural networks that detects unknown threats and performs 24/7 automatic remediation using only 1-3% CPU and 90 MB RAM.
SOAR
SOAR
Security orchestration and automation engine with no-code playbook builder that interconnects TEHTRIS modules and third-party tools like Zscaler and Proofpoint for hyperautomated incident response.
No listed roles
TransbitWarsaw, Poland · 51-200

Designs and manufactures tactical radio relay systems, UAV data links and command-and-control communications equipment for the Polish Armed Forces and NATO air defence programmes.

R-460A Radio Relay (HCLOS)UAV Radio Data LinksTactical RoutersTactical Switches
No listed roles
Tune Insight
Tune InsightLausanne, Switzerland · 11-50

Secure collaborative analytics platform enabling privacy-preserving computation on sensitive defence and intelligence data. EPFL spinoff.

No listed roles
Vector SynergyPoznan, Poland · 51-200

Provides security-cleared IT consultants and cyber defence tools to NATO, EU agencies and Europol. Operates the CDeX cyber-range exercise platform as a national asset.

No listed roles
WB Group
WB GroupWarsaw, Poland · 100-500

Poland's largest private defence company building C4ISR systems, tactical communications and reconnaissance drones. Products include the FlyEye ISR drone and Warmate loitering munition.

No listed roles