Latka logo

Top 446 Other IT Security Software SaaS Companies in May 2026

As of May 2026, there are 446 SaaS companies in Other IT Security Software. They have combined revenues of $12B and employ 56.4K people. They have raised $17.8B and serve 1.9B customers combined.

Other IT Security Software encompasses a range of solutions designed to protect organizations from a variety of digital threats that do not fall under traditional cybersecurity solutions. These tools may be focused on specific areas such as identity and access management, data loss prevention, or compliance management, addressing unique challenges within the IT security landscape. Primary use cases for this category include managing user permissions, safeguarding sensitive data, and ensuring compliance with regulatory standards. Features commonly found in these products include robust reporting tools, automated risk assessments, and integration capabilities with other enterprise security tools to create a comprehensive defense strategy. The key buyer personas typically include IT security professionals, compliance officers, and risk management teams, all of whom are responsible for safeguarding an organization’s information assets. As businesses increasingly confront sophisticated cyber threats, the demand for specialized IT security solutions continues to grow, making it essential for organizations to invest in other IT security software that fills specific gaps in their overall security posture. Ultimately, these solutions play a crucial role in a holistic approach to cybersecurity, complementing other protective measures and tools within an organization.

Companies
446
Revenue
$12B
Funding
$17.8B
Employees
56.4K

Filters

Sorting: Highest -> Lowest

Filters

Top Other IT Security Software Companies

Showing 10 of 94 companies ranked by annual revenue.

1
Willdix

Tallinn, Estonia

The First Sales-Oriented Unified Communications Solution Your communications system can either boost your revenue or create bottlenecks that slow your business down. Turn it into the core of your operations and grow your business, all while saving time and maintaining total security. All in complete comfort, right from your browser. HOW CAN SMALL AND MEDIUM BUSINESSES INCREASE THEIR PRODUCTIVITY? It doesn’t take hours and hours of overtime. By choosing the right UC&C system, companies can improve communications and significantly increase productivity. Since 2005, Wildix has been helping companies grow their businesses through UC&C, by creating the first web-based VoIP PBX UC&C system. The first 100% secure, easy-to-use, professional web-based UC&C system. Wildix is for companies that want to increase their productivity with a secure-by-design tool. 👉 more business: +52% increase in web sales 👉 better efficiency: 25% time saved on everyday operations 👉 100% security Wildix brings value to companies around the world, with offices in Europe and the United States. The Center for Research and Development in Odessa, Ukraine has been in operation since 2007, deploying and supporting products. Only Wildix helps companies grow with 100% secure products that put the latest technology at their service. #Wildix #unifiedcommunications

Revenue
$100M
Customers
-
Year founded
2005
Funding
-
Team size
319
Growth
-
2
Sonar

Austin, Texas, United States

Sonar is the industry standard for code verification and automated code review, trusted by 75% of the Fortune 100 and analyzing over 750 billion lines of code daily. Founded in 2008 and headquartered in Austin, TX, Sonar serves enterprises, government agencies, and development teams worldwide. Its core platform, SonarQube, delivers automated code analysis, including static application security testing (SAST) and software composition analysis (SCA), across developer-written, third-party, and AI-generated code. As AI-assisted coding accelerates, Sonar has emerged as the essential governance layer, enabling organizations to adopt AI development tools confidently without compromising security, maintainability, or code integrity.

Revenue
$98.1M
Customers
-
Year founded
2008
Funding
$457M
Team size
869
Growth
-
3
Netelligent Corporation

Saint Louis, Missouri, United States

Netelligent provides companies with the technologies they need to run their business (security, phone system, servers/virtualization)

Revenue
$88.9M
Customers
-
Year founded
2003
Funding
$25M
Team size
23
Growth
2318.18%
4
CertiK

New York, New York, United States

CertiK is a pioneer in blockchain security, leveraging best-in-class AI technology to protect and monitor blockchain protocols and smart contracts.

Revenue
$87M
Customers
-
Year founded
2018
Funding
$252M
Team size
187
Growth
-
5
MiCamp Solutions

Scottsdale, Arizona, United States

Global fintech leader specializing in secure payment-processing solutions to alleviate payment challenges for merchants and partners

Revenue
$77.3M
Customers
-
Year founded
2007
Funding
-
Team size
165
Growth
-
6
Electric

New York, New York, United States

Electric is an information technology company that helps businesses manage their IT security, support, and devices in real-time.

Revenue
$75.7M
Customers
2K
Year founded
2016
Funding
$91.8M
Team size
401
Growth
-
7
Trackforce Valiant

San Diego, California, United States

Designer and developer of Web and mobile services for the security industry. The company's software suite provides tracking of the activities of security agents and mobile players.

Revenue
$73.8M
Customers
-
Year founded
2000
Funding
$7.4M
Team size
478
Growth
28.55%
8
Gorilla Technology Group

San Bruno, California, United States

Gorilla is a global leader in Video Big Data and Analytics technology, which supports a wide range of video-centric applications for broadcast media and entertainment, education, enterprise unified communication, business intelligence, and security. In addition to managing over 35 petabytes of content across 5 continents and in multiple languages, Gorilla solves key Video Big Data related issues derived from the volume, velocity and variety of videos generated by real-world applications in Smart Cities, logistics, retail and the connected home. Working with leading hardware and infrastructure partners such as Cisco, EMC and Dell. Gorilla offers scalable on-site products and solutions . In conjunction with data center and cloud infrastructure providers like Telstra, Gorilla provides a range of value-added services covering video and network intelligence, video management and delivery. Gorilla also works with service providers to develop value-added video entertainment and security services for the connected home. Gorilla Technology is a privately held company established in 2001 that has representation across the US, UK, Europe, the Middle East, South-East Asia, and China.

Revenue
$72M
Customers
-
Year founded
2001
Funding
$15M
Team size
139
Growth
-
9
Ledger

Paris, Ile-de-france, France

Ledger SAS. is a French technology company that specializes in developing hardware wallets for cryptocurrency storage and management. The company's flagship product is the Ledger Nano hardware wallet, which provides secure storage for private keys and enables users to securely manage their cryptocurrency assets.

Revenue
$70.9M
Customers
1.5M
Year founded
2014
Funding
$468.2M
Team size
698
Growth
93.29%
10
Truecopy Credentials Pvt. Ltd.

Pune, Maharashtra, India

Future-ready solution that truly helps you to go completely paperless. Sign all types of documents online. You have a choice of electronic signatures, Aadhaar signatures, and digital signatures in Hardware Security Module (HSM) / DSC tokens.

Revenue
$68.7M
Customers
-
Year founded
-
Funding
-
Team size
24
Growth
-

Inclusion Criteria

- Must provide solutions that address specific areas of IT security that do not include conventional antivirus or firewall functionalities. - Should include features related to identity and access management, data protection, or compliance enforcement. - Must offer integration capabilities with other IT security products to enhance overall cybersecurity strategy. - Should provide reporting and analytic functionalities to facilitate risk assessment and compliance tracking. - Target user base should include IT security teams, compliance officers, and data protection specialists. - Not limited to general-purpose cybersecurity tools; must focus on specialized IT security functions.