API Security
The Aiculus API Protector
Aiculus
The Aiculus API protector uses Machine Learning to detect fraud and misuse in API traffic. In addition to security, the..
Managed Detection and Response
Brizo Sensor
Threatspan
Brizo Sensors provide continuous cyber monitoring for vessel IT and OT networks in a subcompact, rugged form factor ideal for..
Managed Detection and Response
Tridens Platform
Threatspan
Tridens is the first nautical resilience platform designed for shipping and maritime enterprises. Our solution combines intrusion detection, resilience monitoring,..
Managed Detection and Response
GamaShield
GamaSec
GamaSec’s Web application scanner, which protects applications and servers from hackers, is an automated security service that searches for software..
Managed Detection and Response
Managed Detection and Incident Response
HWG S.R.L
In cyber security, machine learning and Artificial Intelligence play a fundamental role. In fact, their use guarantees a high level..
Operational Technology (OT) Security
Managed Security Service
First Watch
Monitoring service from our OT platform integrating also network traffic monitoring NOC-lite and firewall log data. Regular reporting and recommended..
Operational Technology (OT) Security
Software Inventory
First Watch
Complete inventory of software installed on managed computers. Version, package, installer, user. Matched to known vulnerabilities. Priority upgrades package issues.
Operational Technology (OT) Security
PLC Guard
First Watch
Internal ICS firewall managing and authenticating traffic flows to and from the PLC to ensure only authenticated data flows.
Operational Technology (OT) Security
HMI Guard
First Watch
Software installed on the HMI enforcing cyber secure policies on the computer including whitelisting, user management, event control, connection management,..
Operational Technology (OT) Security
First Watch Platform
First Watch
Aggregates events from across the OT network triggering alarms and alerts.
Internet Of Things (IoT) Security
IoT Security Suite
Sixscape Communications
Securing IoT/IIoT nodes and platforms using digital certificates, for deployment and security lifecycle management of IoT/IIoT devices. Thus ensuring secure..
Internet Of Things (IoT) Security
OpenSDK / OEM
ArcRan
OpenWRT Compatible SDK for IOT Security detect API for statistics, tracking, integrate with CCTV video analysis
Internet Of Things (IoT) Security
ISecMaster V2X Security Detector
ArcRan
WiFi / BLE / ZigBee / DSRC RF Signal detect un-approved devices and abnormal behaviour in V2X Fields
Internet Of Things (IoT) Security
IoT Honeypot
ArcRan
Gather information about the motives and tactics of attackers by luring them into interacting with the system.
Internet Of Things (IoT) Security
ISecMaster IoT Security Detector
ArcRan
WiFi / BLE / ZigBee Signal detect un-approved devices and behaviours in Smart Factory / Hospital field
Mobile Security
Secure Unified Communications Suite
Sixscape Communications
End to end encrypted chat and audio/video communications platform with file transfer, providing 100% secure communication over IPv6 with digital..
Mobile Security
Secure Authentication Suite
Sixscape Communications
Password-less crypto-challenge-based authentication for workstations, web, and SaaS. Using your mobile device/smart card, private key, and biometrics to authenticate you..
Mobile Security
REL-ID Platform
Uniken
Uniken’s REL-ID Platform makes your mobile app the centerpiece of your digital strategy. The REL-ID platform enables you to deliver..
Mobile Security
Trusted Application Kit
Build38
The Trusted Application Kit (T.A.K) secures mobile apps to diagnose and protect themselves at runtime with Build38 next generation RASP..
Cyberspace Resiliency
Playbook as a Service (PbaaS)
FlexibleIR
FlexibleIR can provide you on demand experts to help build Playbooks/SoPs for your SoC/SIEM use cases.
Endpoint Security
X-PHY AI Embedded Cyber Secure SSD
Flexxon
X-PHY® is the world’s first AI Embedded Cyber Secure Solid-State Drive (SSD) that eliminates human intervention and vulnerable software defense...
Endpoint Security
SecureAPlus
SecureAge Technology
SecureAPlus keeps your endpoints secure with intuitive application control. Powered by an intelligent AI engine it offers multiple layers of..
Endpoint Security
Percept Endpoint Detection and Response (Percept EDR)
Sequretek
Percept EDR is an intelligent, easy-to-manage, simple-to-deploy product that works efficiently in heterogeneous environments. Percept EDR uses AI-ML and endpoint..
Extended Detection and Response (XDR)
A platform to build cyber Incident Response capabilities
FlexibleIR
Visually easy playbooks aiding analysts to build muscle memory. A library of 150+ playbooks for on-premise and cloud use cases...
Extended Detection and Response (XDR)
Percept Extended Detection and Response (Percept XDR)
Sequretek
Percept Extended Detection and Response (Percept XDR) ensures end-to-end security, threat detection and response while allowing enterprises to focus on..
Zero Trust Content Security
Secure File Gateway
Votiro
Votiro introduces Secure File Gateway – the only solution that guarantees complete protection from weaponized files. Unlike detection-based file security..
Messaging Security
Secure Email Attachment
Digify
Send secure emails & files in Gmail and Outlook. Complete encryption, control and tracking for emails and files.
Messaging Security
DMARC Forensics
SendForensics
DMARC compliance, processing & analytics platform. Simplifies enterprise-wide authentication and compliance, with global visibility of legitimate and illegitimate sending patterns.
Advanced Identity Management & Zero Trust
IDcentral
Sixscape Communications
The IDcentral platform, available on-prem or hosted is the core identity and authentication infrastructure behind Sixscape’s portfolio of products. IDcentral..
Advanced Identity Management & Zero Trust
Pre-Transaction Monitoring for Compliance
Cylynx
Move beyond identity verification – prioritise risk cases and improving screening efficiency
Advanced Identity Management & Zero Trust
Digital Rights Management
Digify
Digital rights management enables you to set and impose copyright protection for your intellectual property such as market research, eBooks,..
Advanced Identity Management & Zero Trust
eSignature
Keyless
Keyless provides the ability for users to electronically sign documents using their face biometrics, from any device.
Advanced Identity Management & Zero Trust
Advanced Identity Management & Zero Trust
Passwordless Remote Access
Keyless
Unify all of your remote login experiences from VPN to VDI and through RDP access.
Advanced Identity Management & Zero Trust
Passwordless Desktop MFA
Keyless
Secure desktop logins with a universal passwordless MFA experience.
Advanced Identity Management & Zero Trust
Advanced Identity Management & Zero Trust
Percept Identity Governance and Administration (Percept IGA)
Sequretek
Percept IGA is the cloud-native offering for identity & access management of users. Percept IGA reduces access risks & ensures..
Cloud Security
Cloud Security Monitor
InsiderSecurity
Cloud Security Monitor is a simple-to-use SaaS for enterprises to monitor their data security in Microsoft 365. Discover the internal..
Cloud Security
Reblaze
Reblaze Technologies
Reblaze offers an all-in-one private virtual cloud-based solution (VPC) that includes IPS/WAF, DoS/DDoS protection, bot detection and exclusion, anti-scraping, and..
Web Application &API Security
Polaris WAAP
Polaris Infosec
Polaris Web Application & API Protection (WAAP) uses next-generation Artificial Intelligence (AI) and Machine Learning (ML) to actively detect and..
Cyber Risk Management
ISMS Implementation
Privasec
ISO 27001:2013 allows companies to use world class risk management standards to strategise and coordinate their security investments whilst getting..
Cyber Risk Management
DeRisk Center
Seconize
Seconize DeRisk Center is an automated risk management product that Continuously identifies cyber risks and translates to business impact. Prioritizes..
Cyber Risk Management
Strobes
Strobes Security Inc
Strobes is a SaaS-based risk-centered vulnerability management platform built with the goal of making vulnerability management easier and efficient for..
Cyber Risk Management
Cyber Advisory
Responsible Cyber
Responsible Cyber offers a complete suite of cybersecurity services that can be adapted according to your needs and budget to..
Cyber Risk Management
IMMUNE Platform
Responsible Cyber
IMMUNE helps your organization understand your overall cybersecurity readiness by generating an Immunity Report based on publicly obtainable information. It..
Cyber Risk Management
Crystal Eye XDR
Red Piranha
Crystal Eye XDR (Extended Detection & Response) protects, detects and responds to threats across your whole organisation, all from a..
Cyber Risk Management
neoEYED Digital Body Language
neoEYED
Digital body language (DBA) collects data from end users during customer onboarding. DBA responds with a risk score to the..
Cyber Risk Management
neoEYED Behavioral Biometrics AI
neoEYED
Behavioral Biometrics captures mobile and web sensor data and creates a profile of the user to prevent impersonation frauds both..
Darkweb; Cybercrime; Cyberwarfare
Advanced Ransomware Countermeasures (ARC)
Kapalya Inc.
Our second generation, patent-protected product, based on Artificial Intelligence and Machine Learning, will be released in Q2 2022. This solution..
Darkweb; Cybercrime; Cyberwarfare
AmIBreached
Cyble
AmIBreached enables consumers and organizations to identify, prioritize and mitigate darkweb risks.
Cyber Threat Landscape & Intelligence
SearchLight
Digital Shadows
SearchLight protects against external threats, continually identifying where your assets are exposed, providing sufficient context to understand the risk, and..
Cyber Threat Landscape & Intelligence
Cyble Hawk
Cyble
Cyble Hawk helps law enforcement and government agencies gather, analyze, and respond to the exposure of extremely sensitive information, enriched..
Cyber Threat Landscape & Intelligence
Cyble Vision
Cyble
Cyble provides a unified view of your organization’s external threat landscape by consolidating intelligence from the darkweb, deepweb, and surfaceweb.
Active Directory Protection
Active Directory Protection
Attivo Networks
Attacking Active directory and obtaining admin-level access is attackers’ primary objectives. Active Directory and Domain controllers are prime reconnaissance targets..
Deception Technology
ThreatDefend Platform
Attivo Networks
The Attivo ThreatDefend® Platform delivers unparalleled attack prevention, detection, and adversary intelligence collection based on cyber deception and data concealment..
Network Security
Driverless & Software Data Diode
Amaris.AI
Amaris.AI’s driverless data diode is a lightweight, common criteria EAL2 certified usb-based data diode that is used to secure critical..
AIML and Automation
Motif Graph Intelligence Platform
Cylynx
Motif is a graph intelligence software that translates graph data into business insights, speeding up data exploration, analysis and collaboration..
AIML and Automation
Automated UEBA
InsiderSecurity
Detect malicious user activity early in your on-premise or cloud infrastructure. With today’s sophisticated hackers, a cyber breach has become..
AIML and Automation
TITAN: Smart Cyber Intelligence Management
TAU Express
TAU’s AI-enabled cyber threat intelligence analytics platform is capable of parsing, extracting and categorizing unstructured documents to enable intelligent retrieval..
AIML and Automation
ATAS-Guard
Amaris.AI
Amaris Take Action System-Guard (ATAS-Guard) is a next-gen surveillance system with action & event detection capabilities, that can be used..
AIML and Automation
Anonymizer
Amaris.AI
Amaris.AI’s Anonymizer is an automated AI tool that detects, anonymizes and redacts PII data with reporting and token reference capabilities.
Encryption
Email Security Suite
Sixscape Communications
The Email Security Suite for popular email clients for certificate-based digital signing and encryption of emails with support for multiple..
Encryption
Health Vault
Ziroh Labs Inc.
Health Vault helps healthcare institutions to secure the privacy of their data from internal and external breaches.
Encryption
CPA Vault
Ziroh Labs Inc.
CPA Vault helps CPA firms to streamline their communication, and ensure their client’s data privacy, and compliance.
Encryption
Secure Numeric™
Ziroh Labs Inc.
Secure Numeric™ is a Homomorphic Encryption Library that enables users to perform multiple operations on encrypted numeric data without requiring..
Encryption
Secure String™
Ziroh Labs Inc.
Secure String™ is a Homomorphic Encryption Library that enables users to perform multiple operations on encrypted string data without requiring..
Encryption
Ziroh Analytics
Ziroh Labs Inc.
Ziroh Analytics connects developers, researchers, and scientists who need computing resources with individuals from across the world who can lend..
Encryption
Ziroh DB
Ziroh Labs Inc.
Ziroh DB helps users transform any existing database environment into an encrypted storage system with computing capabilities.
Encryption
Ziroh Store
Ziroh Labs Inc.
Ziroh Store helps users to make their files completely private on any cloud platform from a single interface.
Encryption
Ziroh Mail
Ziroh Labs Inc.
Ziroh Mail is a privacy-preserving email extension that enables users to communicate privately from their current email platform.
Encryption
Ziroh Drive
Ziroh Labs Inc.
Ziroh Drive is a secure, non-intrusive storage software that provides users a private space on any storage device to store,..
Encryption
SecureAge Security Suite
SecureAge Technology
The SecureAge Suite is endpoint license-based, comprised of our endpoint software tools, SecureData, SecureFile, SecureDisk and SecureEmail, this is a..
Encryption
KIY, Hide in Cloud and XeroServer
OneKIY
User-centric, De-centralised security system for data owner to safeguard their data relying and involving no others.
Encryption
Encryption Management (EMP)
Kapalya Inc.
Enterprise-wide encryption key management platform AES256 bit Symmetric keys in block cipher mode Meets FIPS140-2 compliance Deployed on-prem or in..
Compliance & Data Loss Prevention
PCI DSS Health Check
Privasec
Compliance with the PCI DSS enables you to protect the information your customers entrust you with. Compliance is mandatory for..
Compliance & Data Loss Prevention
SecureMail
689Cloud
SecureMail protects, tracks, and controls files sent by e-mail by replacing attachments with secure links from which recipients can view,..
Enterprise Security and Data Protection
Database Activity Monitor
InsiderSecurity
With data security regulations such as Singapore’s PDPA and EU’s GDPR, organisations increasingly need to keep the data in their..
Enterprise Security and Data Protection
AmiShare
Kinnami Software Corporation
Kinnami Hybrid Resilient Data Fabric, AmiShare, provides a unified way, which is easily administered, to manage data availability, protection, security,..
Enterprise Security and Data Protection
SecureDrive
689Cloud
SecureDrive is the only cloud content collaboration platform with built-in content security. Advanced rights management technology protects, tracks, and controls..
No results found