Cybrary is the fastest growing, fastest-moving catalog in the industry. By working with an elite community of instructors, experts, and thought leaders, as well as cutting edge hands-on learning providers, we deliver relevant and high-quality content that is accessible anytime, anywhere. Cyber security and IT companies on Cybrary can play a role in the learning by contributing courses and content. Companies can also use their presence to recruit talent. Finally, companies looking to train their employees can use Cybrary's ''Teams'' product, to manage the training that their employees are taking on the platform. The product also provides hands-on CTF style challenges, practical labs and skill assessments.
SaaS Adoption
SaaS Adoption indicates the level of adoption by this company of software as a service services.
Cloud Adoption
Cloud Adoption indicates the level of adoption by this company of cloud services.
IT Footprint
IT Footprint gives a relative indication of how much IT services this company consumes.
IT Spend
IT Spend shows roughly how much this client spends on IT per year in USD.
Enlyft tracks the use of over 15,000 technologies and has proprietary data on over 18 million companies worldwide.
Cybrary uses 5 different technologies from 63 different vendors. They have above average use of several technologies including Microsoft Azure, Marketo and Amazon AWS.
Cybrary uses products from 62 different product categories. They are particularly heavy users of products in Network Security, Software Development Tools, and Software Frameworks.
Enlyft tracks the use of over 15,000 technologies and has proprietary data on over 18 million companies worldwide.
| Technology | Category | Vendor | Usage |
|---|---|---|---|
| Linux | Operating Systems | The Linux Foundation | ![]() |
| Rapid7 | Endpoint Security | Rapid7 | ![]() |
| Metasploit | Software Testing Tools | Rapid7 | ![]() |
| Apple xCode | Software Development Tools | Apple, Inc. | ![]() |
| Android Studio | Mobile Development | Android | ![]() |
What other companies use Linux?
Who are the biggest users of Endpoint Security?
What countries, industries, and company sizes are most likely to use Metasploit?