Transcend is a data privacy infrastructure that makes it simple for companies to give their users control over their personal data. Personal data is disorganized, hard to spot, and stored across many systems. That makes offering data rights like deleting data. Transcend automatically fulfills data subject requests inside companies, across all of their data systems and vendors
Explore similar companies to Transcend

Cape
A new ultra-private and secure mobile carrier.
Cybersecurity · Series B · Onsite · Based in Washington, DC

Cape
A new ultra-private and secure mobile carrier.
Cybersecurity · Series B · Onsite · Based in Washington, DC

Cape
A new ultra-private and secure mobile carrier.
Cybersecurity · Series B · Onsite · Based in Washington, DC

Cape
A new ultra-private and secure mobile carrier.
Cybersecurity · Series B · Onsite · Based in Washington, DC

Torq
Autonomous security operations.
Cybersecurity · Series D · Remote · Based in New York

Torq
Autonomous security operations.
Cybersecurity · Series D · Remote · Based in New York

Torq
Autonomous security operations.
Cybersecurity · Series D · Remote · Based in New York

Torq
Autonomous security operations.
Cybersecurity · Series D · Remote · Based in New York

Truffle Security
Unearth your secrets.
Cybersecurity · Series B · Remote · Based in San Francisco

Truffle Security
Unearth your secrets.
Cybersecurity · Series B · Remote · Based in San Francisco

Truffle Security
Unearth your secrets.
Cybersecurity · Series B · Remote · Based in San Francisco

Truffle Security
Unearth your secrets.
Cybersecurity · Series B · Remote · Based in San Francisco

Echo
Delivering CVE-free container base images.
Cybersecurity · Series A · Remote · Based in New York

Echo
Delivering CVE-free container base images.
Cybersecurity · Series A · Remote · Based in New York

Echo
Delivering CVE-free container base images.
Cybersecurity · Series A · Remote · Based in New York

Echo
Delivering CVE-free container base images.
Cybersecurity · Series A · Remote · Based in New York

Delve
AI-native compliance.
Cybersecurity · Series A · Remote · Based in San Francisco

Delve
AI-native compliance.
Cybersecurity · Series A · Remote · Based in San Francisco

Delve
AI-native compliance.
Cybersecurity · Series A · Remote · Based in San Francisco

Delve
AI-native compliance.
Cybersecurity · Series A · Remote · Based in San Francisco

Cloaked
Protect your data by generating unlimited identities.
Cybersecurity · Series A · Onsite · Based in New York

Cloaked
Protect your data by generating unlimited identities.
Cybersecurity · Series A · Onsite · Based in New York

Cloaked
Protect your data by generating unlimited identities.
Cybersecurity · Series A · Onsite · Based in New York

Cloaked
Protect your data by generating unlimited identities.
Cybersecurity · Series A · Onsite · Based in New York

Clover Security
AI-driven product security.
Cybersecurity · Seed · Remote · Based in Tel Aviv

Clover Security
AI-driven product security.
Cybersecurity · Seed · Remote · Based in Tel Aviv

Clover Security
AI-driven product security.
Cybersecurity · Seed · Remote · Based in Tel Aviv

Clover Security
AI-driven product security.
Cybersecurity · Seed · Remote · Based in Tel Aviv

Tenzai
AI hacker for security teams.
Cybersecurity · Seed · Remote · Based in Tel Aviv

Tenzai
AI hacker for security teams.
Cybersecurity · Seed · Remote · Based in Tel Aviv

Tenzai
AI hacker for security teams.
Cybersecurity · Seed · Remote · Based in Tel Aviv

Tenzai
AI hacker for security teams.
Cybersecurity · Seed · Remote · Based in Tel Aviv

Doppel
AI-native digital risk protection.
Cybersecurity · Series C · Remote · Based in San Francisco

Doppel
AI-native digital risk protection.
Cybersecurity · Series C · Remote · Based in San Francisco

Doppel
AI-native digital risk protection.
Cybersecurity · Series C · Remote · Based in San Francisco

Doppel
AI-native digital risk protection.
Cybersecurity · Series C · Remote · Based in San Francisco







