ICE71 Accelerate Cohort1
ICE71 Accelerate Cohort 2 (Current)
689Cloud allows enterprises to manage, maintain control of and track shared documents and collaborate through a secure cloud environment. 689Cloud provides secure cloud collaboration solutions to enterprises that share documents internally and externally. In combination with rights management technology, 689Cloud allows users to maintain control over their documents throughout their life cycle, including after they have been shared
Blue Phish demystifies cybersecurity by changing human behaviour through cyber education. Blue Phish provides an online platform to drive cybersecurity awareness. E-learning modules are customisable, and allow clients to align the learning objectives with their organisation’s risk policies. Blue Phish offers a final assessment that reflect risk scores, providing clients with an understanding of their individual and organisational cyber hygiene and maturity.
Aversafe is a blockchain-backed credential issuance and verification network. Aversafe provides a first-line-of-defense against credential fraud. Aversafe’s credential issuance and verification network connects employers, individuals and credential issuers together to prevent forgery and counterfeiting of credentials and licenses.
GuardRails provides continuous security feedback for developers. GuardRails makes open-source security tools easily available in your GitHub Pull Requests. GuardRails has a unique and very distinctive take on security. It has been tuned to keep the noise low and only report high-impact and relevant security issues. GuardRails can be installed across all your repositories in minutes. Once installed, GuardRails identifies security problems in your codebase and helps you fix them.
INFRA develops artificial intelligence for hacking and finding IT security liabilities. INFRA builds automated solutions for assessment and intelligence without the need for security analysts, eliminating human error and maximising reliability. Vulnerability assessments conducted on computer networks, servers, websites and IoT are standardised and automated in place of human analysts that work manually. INFRA manages all phases of the assessment and finds vulnerabilities automatically and ahead of malicious entities.
Keyless is a decentralised protocol for authentication and identity management enabled by secure biometrics. Keyless allows users to seamlessly access and consume any digital product or service while keeping their personal credentials safe, encrypted and fully decentralised. Keyless is a generic and standardised construction for any blockchain, and solves previously intractable problems around secure and private biometric authentication, recovery, and revocation processes
Seconize aims to disrupt the enterprise IT risk assessment market with its flagship product – DeRisk Center. DeRisk Center is a next generation automated risk assessment product that identifies cyber risks and translates to continuous business impact. It automates gap analysis of numerous global and regional compliances requirements and regulations. DeRisk Center is a simple SaaS product for enterprises who want to embrace digitisation and be proactive at identifying digital risks.
PhishBase is a mail transfer agent, sitting between the organisation and the internet, analysing emails flowing in and out of the system; preventing data loss, quarantining messages and using fuzzy logic to detect bad emails. Current solutions for phishing detection are largely based on a variety of often inconsistent and conflicting rules. PhishBase aims to vastly improve the positive identification of phishing, and/or data leakage, and instill a system that is proactive in protecting the recipient from taking an ill-informed action
LOKI is a smart and intuitive device that allows users to manage and secure their networks without additional devices. LOKI provides cloud based, single point management cybersecurity and network management services for SMEs using SD-WAN technology in a SaaS model. LOKI’s built-in functions which include firewall, antivirus, web filter, captive portal, intrusion prevention and logging systems, create a zero-configuration experience for users while they focus on crucial functions at their offices
KIY is a cryptographic token that empowers data owners to protect their digital data privacy without third party intervention. KIY is a patented product for addressing data privacy and security that runs on a decentralised, user-controlled security system. Coupled with an applications marketplace, users can download relevant apps to take full advantage of their KIY token. KIY transfers security control from service providers to data owners, changing the future of the security landscape
GTRIIP is a document-less check-in and access platform that uses artificial intelligence and biometrics on smartphones to drive automated check-in and registration at commercial properties worldwide. GTRIIP partners with industry-leading property management systems, door locks, and other hardware manufacturers so verified humans can access properties, and control in-room electronic appliances & robotics. GTRIIP customers include hotels, member clubs, and co-working spaces.
The Cyber Assembly
Our mantra: To connect people to cyber skills. Our vision is to create a platform where people are recognised and rewarded for their skills and not have their potential limited by the bias of gender, age, disabilities and qualifications. We are a Singapore-based startup and Asean is our target region. We hope to play a part in the push for local innovation in cybersecurity and make a difference in the region.
AntiHack.Me is the first vulnerability coordination and bug bounty platform based in Singapore. We empower companies to protect their customer data, trust and loyalty by working with global security researchers to surface your most relevant security issues. We are cultivating a Bug Bounty culture and community within Asia and especially in Singapore.
Privasec is your Leading Governance and Cyber Security Partner. The governance and cyber risk landscape is rapidly changing, fueled by significant growth and sophisticated global cyber-attacks. All organisations need to plan for different cyber risks with different potential consequences because, these days, even the most patched and protected networks can still be infiltrated.