Service Provider

Save to My Lists

Rubicon Labs Reviews & Provider Details

Rubicon Labs Overview

What is Rubicon Labs?

Rubicon Labs is a cybersecurity startup founded by veterans of Apple and Broadcom with offices in San Francisco, California and Austin, Texas.

Rubicon Labs Details
Show LessShow More
Provider Description

Rubicon Labs is a cybersecurity startup founded by veterans of Apple and Broadcom with offices in San Francisco, California and Austin, Texas.


Seller Details
HQ Location
San Francisco, CA
Twitter
@0knowledgekeys
94 Twitter followers

Rubicon Labs Media

Answer a few questions to help the Rubicon Labs community
Have you used Rubicon Labs before?
Yes
G2 reviews are authentic and verified.

There are not enough reviews of Rubicon Labs for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cynomi vCISO Platform Logo
Cynomi vCISO Platform
4.9
(15)
Cynomi’s vCISO platform empowers MSSPs, MSPs and consultancies to offer structured cybersecurity services to SMEs at scale and provide them with proactive cyber resilience.  Combining proprietary AI algorithms with CISO-level knowledge, Cynomi’s platform streamlines the vCISO's work while automating manual time-consuming tasks.  Cynomi helps partners overcome the cybersecurity skill gap and scale their business, allowing them to offer new services and increase revenues while reducing operational costs.
2
Rapid7 Security Services Logo
Rapid7 Security Services
3.8
(11)
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations.
3
2nd Watch Logo
2nd Watch
4.5
(8)
2nd Watch is an APN Premier Consulting Partner providing managed cloud to enterprises. The company's subject matter experts, software-enabled services and cutting-edge solutions provide companies with tested, proven, and trusted solutions, allowing them to fully leverage the power of the public cloud.
4
NCC Group Logo
NCC Group
4.3
(4)
Through an unrivalled suite of services, we provide organizations with peace of mind that that their most important assets are protected, available and operating as they should be at all times.
5
Little Snitch Logo
Little Snitch
5.0
(2)
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to your benefit. But sometimes, like in case of tracking software, trojans or other malware, they don’t. But you don’t notice anything, because all of this happens invisibly under the hood. Little Snitch makes these Internet connections visible and puts you back in control!
6
Azure Dedicated HSM Logo
Azure Dedicated HSM
3.5
(2)
7
Thales Logo
Thales
4.0
(2)
Thales e-Security is the leader in advanced data security solutions and services, delivering trust wherever information is created, shared or stored.
8
JuiceSSH Logo
JuiceSSH
5.0
(1)
JuiceSSH is an SSH client for Android that includes SSH, Local Shell, and Telnet support.
9
Fingerprint Cards AB Logo
Fingerprint Cards AB
4.5
(1)
Fingerprint Cards AB (FPC) markets, develops and produces biometric components and technologies that through the analysis and matching of an individuals unique fingerprint verify the persons identity.
10
Mitnick Security Logo
Mitnick Security
5.0
(1)
As the worlds most famous hacker, Kevin Mitnick has been the subject of countless news, movies and magazine articles published throughout the world. He has made guest appearances on numerous television and radio programs. Kevin's unparalleled experience leads the Global Ghost Team in testing the security of the worlds leading corporations and governments.
Show More