AccuKnox is a Zero Trust Cloud Native Application Protection Platform (CNAPP). Developed in partnership with Stanford Research Institute, AccuKnox is built to scale runtime protection for complex cloud native applications that are rapidly developed, deployed, and iterated. It combines CSPM, KSPM, CWPP features into a comprehensive CNAPP, integrates with leading DevOps & security tools, and supports all cloud environments. AccuKnox’s, KubeArmor is an open source CNCF project with 200K+ users.
Alfahive transforms the way businesses analyze risk and build cyber resilience. Alfahive’s RiskNest security performance automation platform models the financial impact of cyber risks across your business functions and provides a roadmap of security controls to reduce risk. We enable CISOs to collaborate with the board, make data-driven investment decisions and manage security risk performance on an ongoing basis. RiskNest includes continuously researched cyber risk scenarios and machine learning techniques to help you save months of consulting effort.
ARMR enables every one of the 2M U.S. Service members and global forces to increase survivability with the world's first persistent, wearable high junctional tourniquet system.
Ascent AeroSystems designs and manufactures unique coaxial drones that are more portable and rugged than conventional multi-rotor drones. Ascent’s rugged cylinder-shaped vehicles scale to any size and are ideal for industrial, public safety and military markets where mission-critical operations in tough environments are the norm.
AuthNull provides a modern privileged access management (PAM) platform. It uses risk-based MFA to prevent unauthorized access to critical infrastructure resources. This is done using passwordless, vaultless strategies, which reduce both costs and complexity, addressing significant enterprise challenges for securing and managing large-scale infrastructure. AuthNull's features include machine-to-machine authentication and an AI security co-pilot designed to replace IT help desk support. AuthNull was conceptualized and is being implemented in stages at a Fortune 50 company.
Large and mid-size enterprises have an urgent need for up-to-date sector and country-specific information and expertise, in support of their operations across global markets. Today, these insights are locked in silos with policymakers, boutique lobby firms, and expensive consultancies. Axis is the first platform that instantly surfaces business-critical data, making it easily accessible, actionable, and integrated into key enterprise workflows.
Cyber Skyline provides a cloud-based platform that distributes cybersecurity technical evaluation, aggregates performance metrics, and tracks performance and growth by providing users with a single score and ranking that can be compared across specific skills within a group, company or an entire industry.
CYBERA provides a solution to disrupt financially motivated cybercrime. The FBI reports 1 in 600 Americans are victims of financial scams. Yet, lack of a comprehensive solution that coordinates a rapid response between victims, local law enforcement agencies and global banking institutions leaves both victims and banks losing billions annually in lost funds and reimbursement costs. CYBERA's solution automatically files criminal complaints to recover funds and alerts banks instantly to prevent money laundering and fraudulent transactions before victim losses occur.
Cylera uses machine learning-powered solutions to defend medical devices from cyber attacks, including zero day exploits, data breaches, and ransomware.
CyR3con (Cyber Reconnaissance) predicts cyber attacks before they occur using proprietary technology designed to uniquely address each customer’s threat landscape.
CYTRIO enables resource-constrained midsize organizations to comply with data privacy regulations swiftly and cost-effectively. Today, over 80% of enterprises use a manual approach to identify personal information (PI) and fulfill consumer data requests. Manual compliance is time-consuming, costly, and error-prone, resulting in regulatory fines and erosion of customer trust. CYTRIO’s SaaS platform solves these challenges with easy to use self-guided deployment, automated discovery and identification of PI data, and privacy rights fulfillment workflows.
Dash provides solutions for automating the compliance process in the public cloud and for managing vendor risk. The automated platform streamlines cloud security for enterprise organizations and allows companies to manage regulatory compliance without consultants and security experts.
Cloud Defense provides a multi-cloud data security platform that empowers security teams to intuitively discover high-risk data and proactively prioritize its protection. The agentless offering enables companies to continuously and collaboratively de-risk their crown jewels against increasingly sophisticated threats, including indirect and internal attacks.
Formotiv provides real-time predictive behavioral analytics of end-user intent detecting fraudulent data entry or manipulation and determining true user motives. Already trusted by banks, insurance companies, and other financial institutions, Formotiv uses machine learning to understand how users behave in both web-based and mobile apps.
Graphus automates protection against social engineering attacks, using a portal where end-users don't need to install any software, plugins, or end-point agent.
Havoc Shield is a cybersecurity platform designed for startups facing stringent security requirements and increasing threats. Like how TurboTax® simplified the complicated tax filing process, Havoc Shield provides a self-serve cybersecurity program executed by your existing non-security staff. It maps complex security requirements to plain-language modules and guides you through rolling out the integrated tools, policies, and changes needed to strengthen your defenses and certifiably prove your efforts, so you can focus on closing big deals.
Hideez solves the stolen login credentials problem using its flagship product The Hideez Security Key. It differentiates itself from other hardware key solutions by including an embedded password vault, which enables organizations to make the transition from a password-based to password-less world. Hideez also provides an Enterprise Manager for administering keys in a large enterprise deployment.
i2Chain is a SaaS platform allowing companies to securely share sensitive documents with anyone within or outside the organization. i2Chain enables mortgage companies, banks, accounting firms, hospitals, and others to safely share their customers’ PII, IP, and PHI with co-processing entities in compliance with GDPR, CCPA privacy regulations.
JustProtect reduces the average compliance assessment process from 6-8 weeks to just one day, using a platform that focuses on behavioral analytics and analyzing potential discrepancies.
Lineaje is a software supply chain security company. The most damaging attacks in cybersecurity in recent years have featured software supply chain compromises where existing security controls and cloud security products had failed to detect them. From SolarWinds to Kaseya to open-source software (OSS) compromises, these attacks put software & digital brands and their customers at risk. Lineage addresses this unsolved problem by attesting software bill of materials (SBOM) integrity and detecting threats throughout the software supply chain.
LOCH Technologies fortifies networks from Internet of Things (IoT) risks through non-intrusive wireless monitoring across the entire electromagnetic spectrum (Wifi, LTE, Bluetooth, etc). LOCH Technologies’ products are used across a wide range of industries for asset management and security monitoring, giving organizations the ability to prevent network breaches and avoid data loss due to infiltration from wireless networks.
Neuralys simplifies the risk mitigation process by providing enterprises transparency, accountability, and governance to improve collaboration between security teams and business units, drastically reducing risk mitigation times.
Nirmata is a Kubernetes policy and governance solution. Nirmata’s game-changing Policy and Governance platform, powered by the popular open source policy engine Kyverno, leverages the power of policy-as-code to tackle risk early in the delivery cycle. With Nirmata, platform teams seamlessly create, manage, and enforce policies, ensuring unrivaled security, operational excellence, and compliance throughout the entire software supply chain.
NVISNx is a SaaS security product that helps companies visually profile their data to better protect their most valuable digital assets and dispose of digital liabilities that may be toxic or have no value.
Oort is an identity threat detection and response platform. Oort automatically identifies vulnerable user accounts and triggers alerts related to behavioral anomalies, best practices, or policies not being followed. Oort also identifies inactive, overactive, overprivileged, or unusual behavior to reduce the identity attack surface and prevent account takeover before it happens.
Spec provides a no-code identity abuse & fraud prevention platform. Today, Fintechs and eCommerce providers are under constant pressure from automated attacks and onerous regulatory requirements, which limits their ability to focus engineering efforts on business needs. Spec addresses this challenge with a cloud-native solution at the edge that can be commissioned in minutes and managed by fraud investigation teams without any code modifications.
Swif.ai is an AI-powered tool to supercharge your device's security and compliance. Swif was designed from scratch to support hybrid device management on Mac, Windows, and Linux devices. We are the first company to merge device management, compliance automation, and AI to assist companies with their device security and compliance needs. Swif provides a one-click checklist to secure your device for compliance requirements, like automatically deploying policies, malware protection, and password management in one. Swif.ai is being used by over 100 organizations of various sizes.
System Surveyor is a B2B SaaS platform and marketplace that connects physical security IoT product manufacturers and systems integrators. Using intelligent features System Surveyor streamlines cumbersome planning, design, procurement and implementation; it cuts project timelines from weeks to days, improving margins and profitability across the supply chain.
TestifySec is software supply chain attestation solution. Ensuring the integrity of software artifacts and the software development process is a significant challenge for organizations, as they face sophisticated attacks across the supply chain. This requires visibility, auditability, and integrations throughout the various stages that a software artifact passes through during development and deployment. TestifySec is the first solution to utilize the CNCF accepted in-toto framework to automatically document and validate each step of the software development process, from the initial commit to production deployment. TestifySec provides policy-based cryptographic attestations as well as automation and AI features, which simplify security, compliance, and user onboarding.
Tidal Cyber is a threat-informed defense platform. Despite a multitude of cybersecurity products, security analysts spend considerable time analyzing new threats to answer basic questions, "Should we care?" and "Are we protected?". By leveraging The MITRE ATT&CK framework to map adversary tactics, techniques and procedures (TTPs) to the enterprise's cyber defenses, Tidal empowers analysts to efficiently assess, organize and optimize their cyber defenses based on a deep understanding of the threats and adversaries that are most relevant to them.
ThreatWarrior focuses on cyber attacks that are evolving and mutating to avoid detection. ThreatWarrior provides constantly evolving protection by analyzing massive data sets utilizing both AI and unsupervised neural networks.
V2verify is a voice biometric technology that can authenticate users within 2 seconds, eliminating the need for passwords, PINs, or knowledge-based questions. The technology contains built-in multi-factor authentication and works across all channels and customer touchpoints.
ZeroEyes uses is a video-based system leveraging artificial intelligence to detect weapons and send real-time alerts, improving situational awareness and decreasing response times for first responders. Guarding schools, houses of worship, and other often-targeted locations, ZeroEyes delivers a fast, highly automated solution that alerts first responders to weapons drawn and potential mass shootings shaving minutes off of response times during extreme potential loss of life situations.