Filter Program:
Batch 0
  • Actifile Logo
    Actifile
    Actifile Logo
    Actifile
    Actifile is an Israeli company operating in an evolving segment of the information security market: protection of data originating from business applications and cloud services. Tailored for the “no perimeter” environment, where employees and contingent workforce work on sensitive data everywhere, Actifile’s innovative approach provides organizations an artificial intelligence and encryption-based solution, enabling them to secure sensitive data and comply with privacy regulations with minimum influence on productivity.
  • Aves Netsec Logo
    Aves Netsec
    Aves Netsec Logo
    Aves Netsec
    Cybersecurity has a problem - defenders need to win 100% of the fights, all the time, while attackers need to only execute successfully once to win. Aves helps the defenders get the upper hand again through their cloud-based deception service. Easy to set up - easy to scale up - easily one the best security investments you can make.
  • BotDoc Logo
    BotDoc
    BotDoc Logo
    BotDoc
    BotDoc is the 'Secure FedEx of Data', making the secure transport of documents and data ridiculously easy. No logins, pins/passwords, apps or interface issues with cloud storage services. Over time as security has increased (and continues to increase), convenience factors have decreased. Like a child's seesaw, one goes up the other goes down. BotDoc broke the seesaw.
  • Certus Logo
    Certus
    Certus Logo
    Certus
    Certus has developed a multi-layer, smartphone-based authentication platform that offers the only password-free login that enables businesses and online users to conduct streamlined, yet highly secure web-based transactions. The patented, unique approach results in a frictionless user experience, streamlined customer acquisition for online services and new business opportunities created by a persistent, personal connection to clients.
  • CloudeAssurance Logo
    CloudeAssurance
    CloudeAssurance Logo
    CloudeAssurance
    CloudeAssurance is a Cyber Security Rating Services (SRS) focused on cloud security assessments, scoring, benchmarking and training using a 10-year proven Predictive Breach Matrix Model algorithm. This platform protects customers by measuring and assuring cloud service providers’ ability to safely and securely deliver cloud services in accordance with industry cloud best practices, standards and regulatory compliance.
  • Cyberlytic Logo
    Cyberlytic
    Cyberlytic Logo
    Cyberlytic
    Advanced web application security software that uses AI to detect and prioritise web attacks. The Profiler protects against some of the most common cyberattacks, including XSS and SQL injection attacks. The Profiler detects anomalies in web traffic and determines the risk of each attack in real-time. Cutting through web ‘noise’ and only notifying users when a risk threshold is reached.
  • Delvelabs Logo
    Delvelabs
    Delvelabs Logo
    Delvelabs
    AI-driven vulnerability assessment solution (Smart VA) that can provide 100% continuous asset coverage without human intervention. Our solution allows enterprise security to scale through continuous, autonomous asset discovery and vulnerability scanning.
  • Digify Logo
    Digify
    Digify Logo
    Digify
    Digify is a cloud-based document security platform. With Digify, users have access to built-in digital rights management, encryption, copy protection, watermarking, and file tracking to maintain control over confidential information after sending. It is the winner of multiple international awards, including RSA Innovation Sandbox APJ. Prominent clients include WeWork, Accel Partners, University of Chicago.
  • Dispel Logo
    Dispel
    Dispel Logo
    Dispel
    The Dispel Deal Center is a secure collaboration space built for multiparty and internal project-specific communications. Designed to support financial institutions grappling with issues of data governance, transmission security, access control, and segmentation,
  • Eastwind Logo
    Eastwind
    Eastwind Logo
    Eastwind
    Eastwind offers the only breach analytics cloud that provides complete visibility as you undergo your digital transformation. We analyze the flight data flowing across your hybrid networks, cloud providers, hosted applications, logs and mobile workforce – with speed and precision. Always watching, our automated hunters enable you to identify malicious activity that evades other security solutions.
  • Kiana Analytics Logo
    Kiana Analytics
    Portfolio
    Kiana Analytics Logo
    Kiana Analytics
    Portfolio
    Kiana provides patented cloud-based real-time device detection and presence analytics for customers to improve operations, strengthen on-site security and execute real-time targeted services. www.kiana.io
  • OverWatchID Logo
    OverWatchID
    OverWatchID Logo
    OverWatchID
    OverWatchID, is a Denver-based identity security software provider. OverWatchID leverages more than 20 years of enterprise development experience in identity security and delivers a feature-rich platform that comprises privileged access management (PAM), identity access management (IAM), multi-factor authentication (MFA), and cloud access security brokering (CASB). OverWatchID's rapid, frictionless deployment reduces subscription, implementation and administration costs by up to 80 percent.
  • ThreatLocker Logo
    ThreatLocker
    ThreatLocker Logo
    ThreatLocker
    ThreatLocker provides onsite and cloud based solutions to organizations to protect from malware, viruses and other security threats. Our market leading ThreatLocker Control service gives organizations the complete control over what runs on their servers, desktops and laptops.
  • Vir2us Logo
    Vir2us
    Vir2us Logo
    Vir2us
    The company provides Vir2us Immunity suite of software and hardware solutions; Xerogate XE server solutions; Xerogate XP computing solutions for military, government, and critical infrastructure applications for desktop and mobile computing; Genesis Portable Server Appliance that restores computers and servers; and Genesis InteliPak that performs computer restoration.
  • ZecOps Logo
    ZecOps
    Portfolio
    ZecOps Logo
    ZecOps
    Portfolio
    ZecOps, Inc. Automates Threat Analysis at scale. Based in San Francisco/Tel Aviv, ZecOps is a cybersecurity firm that transforms the way corporations deal with the mounting number of cyber attacks with limited resources. With the combination of ZecOps Automated-Threat-Analysis (ATA), Reverse Bounty and Actionable Threat Intelligence, ZecOps enables the organization to boost SOC productivity while reducing TCO on data acquisition, analysis, headcount, and traditional security services.