Filter Program:
Batch 0Batch 1
  • Actifile Logo
    Actifile
    Actifile Logo
    Actifile
    Actifile is an Israeli company operating in an evolving segment of the information security market: protection of data originating from business applications and cloud services. Tailored for the “no perimeter” environment, where employees and contingent workforce work on sensitive data everywhere, Actifile’s innovative approach provides organizations an artificial intelligence and encryption-based solution, enabling them to secure sensitive data and comply with privacy regulations with minimum influence on productivity.
  • Aves Netsec Logo
    Aves Netsec
    Aves Netsec Logo
    Aves Netsec
    Cybersecurity has a problem - defenders need to win 100% of the fights, all the time, while attackers need to only execute successfully once to win. Aves helps the defenders get the upper hand again through their cloud-based deception service. Easy to set up - easy to scale up - easily one the best security investments you can make.
  • BotDoc Logo
    BotDoc
    BotDoc Logo
    BotDoc
    BotDoc is the 'Secure FedEx of Data', making the secure transport of documents and data ridiculously easy. No logins, pins/passwords, apps or interface issues with cloud storage services. Over time as security has increased (and continues to increase), convenience factors have decreased. Like a child's seesaw, one goes up the other goes down. BotDoc broke the seesaw.
  • Certus Logo
    Certus
    Certus Logo
    Certus
    Certus has developed a multi-layer, smartphone-based authentication platform that offers the only password-free login that enables businesses and online users to conduct streamlined, yet highly secure web-based transactions. The patented, unique approach results in a frictionless user experience, streamlined customer acquisition for online services and new business opportunities created by a persistent, personal connection to clients.
  • CloudeAssurance Logo
    CloudeAssurance
    CloudeAssurance Logo
    CloudeAssurance
    CloudeAssurance is a Cyber Security Rating Services (SRS) focused on cloud security assessments, scoring, benchmarking and training using a 10-year proven Predictive Breach Matrix Model algorithm. This platform protects customers by measuring and assuring cloud service providers’ ability to safely and securely deliver cloud services in accordance with industry cloud best practices, standards and regulatory compliance.
  • Cyberlytic Logo
    Cyberlytic
    Cyberlytic Logo
    Cyberlytic
    Advanced web application security software that uses AI to detect and prioritise web attacks. The Profiler protects against some of the most common cyberattacks, including XSS and SQL injection attacks. The Profiler detects anomalies in web traffic and determines the risk of each attack in real-time. Cutting through web ‘noise’ and only notifying users when a risk threshold is reached.
  • Delvelabs Logo
    Delvelabs
    Delvelabs Logo
    Delvelabs
    AI-driven vulnerability assessment solution (Smart VA) that can provide 100% continuous asset coverage without human intervention. Our solution allows enterprise security to scale through continuous, autonomous asset discovery and vulnerability scanning.
  • Digify Logo
    Digify
    Digify Logo
    Digify
    Digify is a cloud-based document security platform. With Digify, users have access to built-in digital rights management, encryption, copy protection, watermarking, and file tracking to maintain control over confidential information after sending. It is the winner of multiple international awards, including RSA Innovation Sandbox APJ. Prominent clients include WeWork, Accel Partners, University of Chicago.
  • Dispel Logo
    Dispel
    Dispel Logo
    Dispel
    The Dispel Deal Center is a secure collaboration space built for multiparty and internal project-specific communications. Designed to support financial institutions grappling with issues of data governance, transmission security, access control, and segmentation,
  • Eastwind Logo
    Eastwind
    Eastwind Logo
    Eastwind
    Eastwind offers the only breach analytics cloud that provides complete visibility as you undergo your digital transformation. We analyze the flight data flowing across your hybrid networks, cloud providers, hosted applications, logs and mobile workforce – with speed and precision. Always watching, our automated hunters enable you to identify malicious activity that evades other security solutions.
  • Kiana Analytics Logo
    Kiana Analytics
    Portfolio
    Kiana Analytics Logo
    Kiana Analytics
    Portfolio
    Kiana provides patented cloud-based real-time device detection and presence analytics for customers to improve operations, strengthen on-site security and execute real-time targeted services. www.kiana.io
  • OverWatchID Logo
    OverWatchID
    OverWatchID Logo
    OverWatchID
    OverWatchID, is a Denver-based identity security software provider. OverWatchID leverages more than 20 years of enterprise development experience in identity security and delivers a feature-rich platform that comprises privileged access management (PAM), identity access management (IAM), multi-factor authentication (MFA), and cloud access security brokering (CASB). OverWatchID's rapid, frictionless deployment reduces subscription, implementation and administration costs by up to 80 percent.
  • ThreatLocker Logo
    ThreatLocker
    ThreatLocker Logo
    ThreatLocker
    ThreatLocker provides onsite and cloud based solutions to organizations to protect from malware, viruses and other security threats. Our market leading ThreatLocker Control service gives organizations the complete control over what runs on their servers, desktops and laptops.
  • Vir2us Logo
    Vir2us
    Vir2us Logo
    Vir2us
    The company provides Vir2us Immunity suite of software and hardware solutions; Xerogate XE server solutions; Xerogate XP computing solutions for military, government, and critical infrastructure applications for desktop and mobile computing; Genesis Portable Server Appliance that restores computers and servers; and Genesis InteliPak that performs computer restoration.
  • ZecOps Logo
    ZecOps
    Portfolio
    ZecOps Logo
    ZecOps
    Portfolio
    ZecOps, Inc. Automates Threat Analysis at scale. Based in San Francisco/Tel Aviv, ZecOps is a cybersecurity firm that transforms the way corporations deal with the mounting number of cyber attacks with limited resources. With the combination of ZecOps Automated-Threat-Analysis (ATA), Reverse Bounty and Actionable Threat Intelligence, ZecOps enables the organization to boost SOC productivity while reducing TCO on data acquisition, analysis, headcount, and traditional security services.
  • Trillium Logo
    Trillium
    Portfolio
    Trillium Logo
    Trillium
    Portfolio
    Trillium is a Designer and Provider of Custom, Multilayer Adaptive Cyber-systems. Specialising in Vehicular & Transportation applications for the vehicles of today and tomorrow.
  • Swimlane Logo
    Swimlane
    Swimlane Logo
    Swimlane
    Swimlane is a leader in security automation and orchestration (SAO). Our platform empowers organizations to manage, respond to and neutralize cyber threats with the adaptability, efficiency and speed necessary to combat today’s rapidly evolving cyber threats.
  • SIEMonster Logo
    SIEMonster
    SIEMonster Logo
    SIEMonster
    SIEMonster provide solutions for Managed Security Providers and security administrators in all sized companies.
  • ReSec Technologies Logo
    ReSec Technologies
    ReSec Technologies Logo
    ReSec Technologies
    Ultimate protection from known and unknown file-based malware threats, using patented Content Disarm and Reconstruction (CDR) technology.
  • PFP Cybersecurity Logo
    PFP Cybersecurity
    PFP Cybersecurity Logo
    PFP Cybersecurity
    PFP provides device security using AI and power analysis for detection, remediation and prevention.
  • Paygilant Logo
    Paygilant
    Paygilant Logo
    Paygilant
    Paygilant's mission is to deliver a fraud prevention platform for mobile payments. Paygilant on-device disruptive technology makes in-store payments, eWallet and online transactions easy and secure, increasing conversion rates and reducing friction. Issuers (banks), merchants, PSPs and eWallet providers also benefit from a significant risk and operational cost reduction.
  • Indegy Logo
    Indegy
    Indegy Logo
    Indegy
    Indegy’s Industrial Cyber Security solution enables organizations to gain visibility, security and control of their industrial operations, OT and IT networks.
  • CybeReady Logo
    CybeReady
    CybeReady Logo
    CybeReady
    CybeReady is a SaaS based fully-automated learning solution that enables continuous training and constant adaptation to phishing threats that lowers security risks significantly.
  • CyberCentric Logo
    CyberCentric
    CyberCentric Logo
    CyberCentric
    CyberCentric enables organizations to better understand their most sensitive data with our AI engine that reads data across the network, determines what’s important, and automates of the process to ensure data safety.
  • Cog Logo
    Cog
    Cog Logo
    Cog
    Cog leverages modularity to isolate critical functions and services on IoT, securing devices by reducing attack surface and points of failure.
  • Blacksands Inc. Logo
    Blacksands Inc.
    Blacksands Inc. Logo
    Blacksands Inc.
    Blacksands, an Enterprise Remote Connectivity leader, provides Dynamic Point-to-Point Encrypted Connections to Applications and Devices.
  • Bit Discovery Logo
    Bit Discovery
    Bit Discovery Logo
    Bit Discovery
    A complete portfolio of your company's websites. Instantly created. Automatically updated.
  • Anonybit Logo
    Anonybit
    Anonybit Logo
    Anonybit
    Anonybit is a decentralized, community-based, biometric identification platform.
  • AnchorID Logo
    AnchorID
    AnchorID Logo
    AnchorID
    AnchorID is the world’s first rewards program for user authentication, using a cryptocurrency called IDcoin to motivate stronger user security, which has been proven to reduce both fraud and customer service expenses.
  • Alcatraz.ai Logo
    Alcatraz.ai
    Alcatraz.ai Logo
    Alcatraz.ai
    Replace badging as an access point identification method by leveraging facial recognition, 3D sensing and artificial intelligence to enable highly secure and frictionless entry into physical locations.