Transcend is a data privacy infrastructure that makes it simple for companies to give their users control over their personal data. Personal data is disorganized, hard to spot, and stored across many systems. That makes offering data rights like deleting data. Transcend automatically fulfills data subject requests inside companies, across all of their data systems and vendors
Explore similar companies to Transcend

Daylight Security
Managed agentic security services.
Cybersecurity · Series A · Remote · Based in New York

Daylight Security
Managed agentic security services.
Cybersecurity · Series A · Remote · Based in New York

Daylight Security
Managed agentic security services.
Cybersecurity · Series A · Remote · Based in New York

Daylight Security
Managed agentic security services.
Cybersecurity · Series A · Remote · Based in New York

Clover Security
AI-driven product security.
Cybersecurity · Seed · Remote · Based in Tel Aviv

Clover Security
AI-driven product security.
Cybersecurity · Seed · Remote · Based in Tel Aviv

Clover Security
AI-driven product security.
Cybersecurity · Seed · Remote · Based in Tel Aviv

Clover Security
AI-driven product security.
Cybersecurity · Seed · Remote · Based in Tel Aviv

Outtake
Cyber agents for any digital threat.
Cybersecurity · Series B · Onsite · Based in New York

Outtake
Cyber agents for any digital threat.
Cybersecurity · Series B · Onsite · Based in New York

Outtake
Cyber agents for any digital threat.
Cybersecurity · Series B · Onsite · Based in New York

Outtake
Cyber agents for any digital threat.
Cybersecurity · Series B · Onsite · Based in New York

Upwind
Cloud security happens at runtime.
Cybersecurity · Series B · Remote · Based in San Francisco

Upwind
Cloud security happens at runtime.
Cybersecurity · Series B · Remote · Based in San Francisco

Upwind
Cloud security happens at runtime.
Cybersecurity · Series B · Remote · Based in San Francisco

Upwind
Cloud security happens at runtime.
Cybersecurity · Series B · Remote · Based in San Francisco

Backline
AI agents to automate security backlogs.
Cybersecurity · Seed · Onsite · Based in Tel Aviv

Backline
AI agents to automate security backlogs.
Cybersecurity · Seed · Onsite · Based in Tel Aviv

Backline
AI agents to automate security backlogs.
Cybersecurity · Seed · Onsite · Based in Tel Aviv

Backline
AI agents to automate security backlogs.
Cybersecurity · Seed · Onsite · Based in Tel Aviv

Cape
A new ultra-private and secure mobile carrier.
Cybersecurity · Series B · Onsite · Based in Washington, DC

Cape
A new ultra-private and secure mobile carrier.
Cybersecurity · Series B · Onsite · Based in Washington, DC

Cape
A new ultra-private and secure mobile carrier.
Cybersecurity · Series B · Onsite · Based in Washington, DC

Cape
A new ultra-private and secure mobile carrier.
Cybersecurity · Series B · Onsite · Based in Washington, DC

Torq
Autonomous security operations.
Cybersecurity · Series D · Remote · Based in New York

Torq
Autonomous security operations.
Cybersecurity · Series D · Remote · Based in New York

Torq
Autonomous security operations.
Cybersecurity · Series D · Remote · Based in New York

Torq
Autonomous security operations.
Cybersecurity · Series D · Remote · Based in New York

Truffle Security
Unearth your secrets.
Cybersecurity · Series B · Remote · Based in San Francisco

Truffle Security
Unearth your secrets.
Cybersecurity · Series B · Remote · Based in San Francisco

Truffle Security
Unearth your secrets.
Cybersecurity · Series B · Remote · Based in San Francisco

Truffle Security
Unearth your secrets.
Cybersecurity · Series B · Remote · Based in San Francisco

Echo
Delivering CVE-free container base images.
Cybersecurity · Series A · Remote · Based in New York

Echo
Delivering CVE-free container base images.
Cybersecurity · Series A · Remote · Based in New York

Echo
Delivering CVE-free container base images.
Cybersecurity · Series A · Remote · Based in New York

Echo
Delivering CVE-free container base images.
Cybersecurity · Series A · Remote · Based in New York







