Back to Directory
computer & network security logo

Truesec | Company Profile

11/25/2025

Contact Information

👤
Truesec
🏢
Truesec
📍
Luntmakargatan 18, Sweden, Denmark, Suomi, Norway, Germany, US 11137, SE

Industry & Market

Primary Industry
computer & network security
All Industries
computer & network securityinformation technology & services
Location
Stockholm, Stockholm County, Sweden

Company Metrics

👥Total Employees
124
⚙️Engineering
19
💼Sales Team
5
📈Marketing
2
📅Founded
2005
💰Revenue
35M
Alexa Ranking#831436

Funding Information

Annual Revenue
$35,000,000
Publicly traded company

Headcount Distribution

Total Employees
124
Departments
19

By Department

Department Breakdown

Consulting
Engineering
Operations
Education
Information Technology
Finance
Others

Technology Stack

Analytics & Tracking

Google Tag Manager

Social & Marketing

Facebook Custom AudiencesFacebook Login (Connect)Facebook WidgetGoogle Dynamic RemarketingLinkedin Marketing Solutions

Video & Media

VimeoYouTube

Email & Communication

Outlook
Total: 26 technologies

Keywords & Focus Areas

it securitysecure developmentit infrastructureworkshops it securityinfrastructureconsultation it securityhandson labstrainingsseminars it securitypenetration testingthreat intelligencesecurity posturecloud securitycyber defensezero trustthreat hunting toolscybersecurity risk managementsecurity monitoringmanufacturingcyber attack mitigation+10 more
30 total keywords

Truesec

Overview

Truesec is an international cybersecurity company based in Stockholm, Sweden, founded in 2005. With over 300 specialists across Sweden, Denmark, Finland, and Germany, it offers a wide range of cybersecurity services, including incident response, IT infrastructure security, secure development, and threat intelligence. The company focuses on preventing breaches and minimizing their impact through a balanced security approach.

Services include Managed Detection and Response (MDR) for 24/7 monitoring, a Managed Microsoft XDR SOC Service, penetration testing, and red teaming to enhance proactive security. Its cybersecurity platform integrates expert tools and services for comprehensive protection and risk management. Emphasis is also placed on human threat intelligence and training with workshops and support for managing risks during international travel and events, serving a diverse clientele, particularly in the Nordic region.

Basic Information

Industrycomputer & network security
Founded2005
Revenue35M
Headquarters18 Luntmakargatan, 111 37 Stockholm, Stockholm County, Sweden
LanguagesEnglish
Parent OrganizationIK Partners
Alexa Ranking831436

Contact Details

Key Focus Areas & Initiatives

  • IT security
  • Secure development
  • IT infrastructure
  • Workshops in IT security
  • Infrastructure
  • Consultation in IT security
  • Hands-on labs
  • Trainings
  • Seminars in IT security
  • Penetration testing
  • Threat intelligence
  • Security posture
  • Cloud security
  • Cyber defense
  • Zero trust
  • Threat hunting tools
  • Cybersecurity risk management
  • Security monitoring
  • Manufacturing
  • Cyber attack mitigation
  • Cyber threat detection tools
  • Cybersecurity platform
  • Government
  • Incident response automation
  • Threat hunting
  • Risk management
  • Cyber breach management
  • Cybersecurity
  • Cyber incident management
  • Cloud security solutions
  • Incident response services
  • Cybersecurity innovation hub
  • Cyber attack prevention strategies
  • Cyber threat actor tracking
  • Security consulting
  • Cybersecurity strategy
  • Security automation tools
  • B2B
  • Cybersecurity threat hunting techniques
  • Cyber threat hunting
  • Cyber threat intelligence center
  • Vulnerability management
  • Cyber threat intelligence platform
  • SOC as a Service
  • Cyber threat detection software
  • Services
  • Vulnerability assessment
  • Cyber attack response
  • Cybersecurity analytics
  • Cybersecurity training
  • Cybersecurity for government agencies
  • Cyber risk management
  • Cyber threat intelligence
  • Network security
  • Cybersecurity threat intelligence feeds
  • Cybersecurity threat analysis
  • Cybersecurity consulting services
  • Cybersecurity consulting
  • Cybersecurity threat hunting
  • Cyber resilience building
  • Nordic cybersecurity
  • Cybersecurity for critical infrastructure
  • Cyber threat detection
  • Cyber threat mitigation
  • Cyber attack simulation exercises
  • Cybersecurity threat analysis reports
  • Managed detection and response
  • Cyber threat analysis
  • Cybersecurity incident management
  • Financial services
  • Cybersecurity monitoring
  • Incident response team
  • Security automation
  • Cybersecurity services
  • Security operations center
  • Cyber attack response toolkit
  • Cybersecurity threat landscape
  • Security incident response
  • Cybersecurity threat mitigation strategies
  • Cyber resilience
  • Cybersecurity knowledge sharing
  • Information technology and services
  • Computer systems design and related services
  • Cybersecurity platform integration
  • Cybersecurity solutions
  • Vulnerability management tools
  • Cyber risk assessment
  • Cybersecurity for financial services
  • Cybersecurity expertise
  • Consulting
  • Cyber attack prevention
  • Cybersecurity compliance
  • Security operations
  • Cybersecurity incident response planning
  • Incident response
  • Cyber threat detection AI
  • Cyber attack simulation
  • Compliance
  • Digital forensics
  • Identity access management
  • Security compliance
  • Red team exercises
  • Advisory services
  • Security vetting
  • Endpoint protection
  • Cloud-native security
  • Data breach response
  • Security assessments
  • RAT detection
  • Social engineering
  • Human threat intelligence
  • Penetration testing services
  • Early warning systems
  • Users access controls
  • Tactical attack simulations
  • Application security measures
  • GDPR compliance
  • Audit and compliance
  • Security improvements
  • Threat prediction
  • SIEM solutions
  • EPP solutions
  • Digital security strategies
  • 24/7 monitoring
  • Enterprise security management
  • Security incident management
  • Threat actor profiles
  • Malware detection
  • Cybersecurity workshops
  • Attack mitigation strategies
  • Security technology integration
  • Finance
  • Computer & network security
  • Information technology & services
  • Mechanical or industrial engineering

Technologies Used

  • AI
  • Adobe Media Optimizer
  • Cedexis Radar
  • DoubleClick
  • DoubleClick Conversion
  • Facebook Custom Audiences
  • Facebook Login (Connect)
  • Facebook Widget
  • Google Dynamic Remarketing
  • Google Tag Manager
  • Hubspot
  • IoT
  • Leadfeeder
  • Linkedin Marketing Solutions
  • MailJet
  • Mobile Friendly
  • Outlook
  • Ruby On Rails
  • Shutterstock
  • Twitter Advertising
  • Vercel
  • Vimeo
  • WP Engine
  • WordPress.org
  • YouTube
  • Zscaler

Affiliated Organizations & Regional Branches

Need more information?

Find decision makers, more insights and contact information about this company on Bitscale

Start For Free

Schedule your demo now!

See how BitScale can supercharge your outbound sales in a 30-minute demo

Start for Free
SayData

© 2026 Bitscale. Featherflow Technology Pvt Ltd

LinkedInTwitterInstagramYouTube