Company Logo

Authy

Authentication, Cybersecurity, Digital Security, Man-In-The-Middle & Phishing Prevention, Multi-Factor Authentication, Phone Verification, Push Authentication, SMS & TOTP, Strong Auth

  • Company Type

    Private

  • Employee

    201-500

  • Industry

    Cybersecurity

  • Revenue

    $1 to $5 million

Price: $99.00
Add To icon

WANT TO FIND OUT MORE ABOUT THIS REPORT?

Email Us

Overview

Authy works in the Cybersecurity industry, specialising in Authentication, Cybersecurity, Digital Security, Man-In-The-Middle & Phishing Prevention, Multi-Factor Authentication, Phone Verification, Push Authentication, SMS & TOTP, Strong Auth. The company was incorporated in 2012 and is located in San Francisco, United States. Authy has an estimated revenue and employee in the range of $1 to $5 million and 201-500 respectively.

Why Buy this Report?

The purpose of this report is to provide vital facts about Authy and help in key decision making process, via market and competitive benchmarks and key metrics. The report will surely add value to your business development process, deal sourcing and should save countless hours of research and analytical work for the buyer.

  • Company Overview
    • Key Facts
    • Business Overview
    • Business Units (Products / Services)
    • Business Model
    • Company Values
    • Subsidiary Companies
    • Corporate Memberships
    • Historical Events
    • Organization Chart
    • Ownership Structure
    • Shareholders
    • Board of Directors
    • Management Team
    • Clients / Customers
    • Partners / Vendors
    • Awards
  • Analysis of Financial Statements
    • Key Financials
    • Income Statement Analysis
    • Balance Sheet Analysis
    • Cash Flow Analysis
    • Ratio Analysis
    • Stock Analysis
  • Investment Activities
    • Key Investors
    • Major Investment
    • Mergers and Acquisitions
  • Industry Overview & Positioning
  • Competitors Analysis
  • Web Traffic Analysis
  • News and Events
  • SWOT Analysis

Disclaimer: The above flow of report may change depending upon the availability of information in secondary sources. If any particular portion is not found, the report will be created based on available information.

  • Company Websites
  • Industry research
  • News
  • M&A deals
  • Royalty agreements
  • Industry codes
  • Social Media
  • Original documents
  • Agency ratings
  • PIEs
  • Patents
  • AML documents
  • Stock data and earnings estimates
  • Public tenders
  • Directories & Associations
  • Books & Journals

Q What is the source of data collection?

Answer

The data is collected from trusted and authentic sources like company websites, government portals, news, association, industry reports, company annual reports, directories and paid databases.

Answer

We ensure 99 percent accurate data in every report but feel the real accuracy level depends on the accuracy of data available in secondary sources. So, better the data availability, higher would be the actual accuracy of the insights presented.

Answer

Yes, we offer customized services as well from our product basket catering to your need at additional charges. If you don’t find report of your choice, we will create one based on your requirement.

Answer

All the products are delivered in PDF format. If requested, we can send them in MS-Word format as well.

Answer

We intend to follow the same structure in all reports. But that depends on availability of information available in web. As you may know, private companies may have limited information. Thus, reports are created based on what is available in web.

Answer

The products are emailed at registered email addresses after payment confirmation, ideally within 24 hours. We ensure that current data is provided, thus we do quality check prior to sending them.

Answer

All the reports featured within the website offer contact information ideally of C-level executives like name, designation, job title, phone, LinkedIn Link and email addresses. We limit the number of contacts to a maximum of 10 for each company. If requested, we can share all available profiles at an additional costing.

Answer

The contact details are collected from professional sites like networking websites, company websites and such like. Hence, we offer a thoroughly scrutinized contact database and hence guarantee 95% accuracy.

Answer

According to client request, the contact information can be verified though primary research at additional charges pre-determined before commencing the process.

Answer

Every product is updated quarterly.

Information Security Forum

Authority Guidance Solutions

$99.00 Buy Now

Check Point Software Technologies

Cyber Security, Endpoint Protection, Information Security, Malware Prevention, Mobile Security, Network Security, SSL VPN

$99.00 Buy Now

Digital Shadows

Brand Exposure, Cyber Intelligence, Cyber Monitoring, Cyber Security, Data Exposure, Data Leakage, Digital Risk, Digital Risk Management, Digital Risk Monitoring, Infrastructure Exposure

$99.00 Buy Now

Sysdig

Containers, Cybersecurity, DevOps, Docker, ECS, Kubernetes, Mesos, Monitoring, Security, Troubleshooting

$99.00 Buy Now

Agari

Anti-Phishing, Data Analytics, Email Security, SaaS, Security

$99.00 Buy Now

Area 1 Security

BEC, Big Data, Cybersecurity, Phishing, Security, Social Engineering, Threat Intelligence

$99.00 Buy Now

McAfee

Develops, Email Protection Solutions, Firewall, Server, Spyware Removal

$99.00 Buy Now

Fortinet

Antispam, Antivirus, Application Control & Visibility, Email Security, Enterprise Firewall, Firewall, Intrusion Prevention System (Ips), Network Security, Next Generation Firewall (Ngfw), Unified Threat Management (Utm), VPN

$99.00 Buy Now

Proofpoint

Advanced Threat Protection, Archiving, Compliance, Digital Risk Protection, Email Protection, Information Protection, Social Media Protection

$99.00 Buy Now

WatchGuard Technologies

Data Loss Prevention, Email Security, Next-Generation Firewall, Unified Threat Management Appliances, Web Security

$99.00 Buy Now
Add To icon

CUSTOM RESEARCH

If you have any specific requirment, speak to our custom research team

Contact Us

Testimonials

  • Firehouse
  • Firehouse
  • Firehouse
  • Firehouse
  • Firehouse
  • Firehouse
  • Firehouse
  • Firehouse
  • Firehouse
  • Firehouse