Vulnerability & Exploit Management

    Thompson

    Scantist

    Thompson is Scantist’s Software Composition Analysis tool designed to help you manage security and legal-compliance risks of your open source..
    API Security

    The Aiculus API Protector

    Aiculus

    The Aiculus API protector uses Machine Learning to detect fraud and misuse in API traffic. In addition to security, the..
    5G / WiFi

    Vision

    Pipeline

    Managed Threat Intelligence, Protective DNS and Policy Management for IoT, Service providers, and Telecommunication operators.
    Big Data Analytics

    DatalaiQ

    Pipeline

    DatalaiQ is an ultra-fast machine data analytics solution that helps businesses search, monitor, and analyze log, telemetry, and binary data..
    Managed Detection and Response

    IDRIS

    Assimil8

    IDRIS represents a step-change in threat analysis. As the attack surface becomes increasingly broad and complex, traditional analogue approaches to..
    Managed Detection and Response

    Brizo Sensor

    Threatspan

    Brizo Sensors provide continuous cyber monitoring for vessel IT and OT networks in a subcompact, rugged form factor ideal for..
    Managed Detection and Response

    Tridens Platform

    Threatspan

    Tridens is the first nautical resilience platform designed for shipping and maritime enterprises. Our solution combines intrusion detection, resilience monitoring,..
    Managed Detection and Response

    GamaShield

    GamaSec

    GamaSec’s Web application scanner, which protects applications and servers from hackers, is an automated security service that searches for software..
    Managed Detection and Response

    Managed Detection and Incident Response

    HWG S.R.L

    In cyber security, machine learning and Artificial Intelligence play a fundamental role. In fact, their use guarantees a high level..
    Managed Detection and Response

    ThreatIDR

    Pipeline

    Our managed protective DNS blocks malware, ransomware, phishing attacks, viruses, malicious sites, and spyware at the source, making the network..
    Operational Technology (OT) Security

    Managed Security Service

    First Watch

    Monitoring service from our OT platform integrating also network traffic monitoring NOC-lite and firewall log data. Regular reporting and recommended..
    Operational Technology (OT) Security

    Software Inventory

    First Watch

    Complete inventory of software installed on managed computers. Version, package, installer, user. Matched to known vulnerabilities. Priority upgrades package issues.
    Operational Technology (OT) Security

    PLC Guard

    First Watch

    Internal ICS firewall managing and authenticating traffic flows to and from the PLC to ensure only authenticated data flows.
    Operational Technology (OT) Security

    HMI Guard

    First Watch

    Software installed on the HMI enforcing cyber secure policies on the computer including whitelisting, user management, event control, connection management,..
    Operational Technology (OT) Security

    First Watch Platform

    First Watch

    Aggregates events from across the OT network triggering alarms and alerts.
    Internet Of Things (IoT) Security

    OpenSDK / OEM

    ArcRan

    OpenWRT Compatible SDK for IOT Security detect API for statistics, tracking, integrate with CCTV video analysis
    Internet Of Things (IoT) Security

    ISecMaster V2X Security Detector

    ArcRan

    WiFi / BLE / ZigBee / DSRC RF Signal detect un-approved devices and abnormal behaviour in V2X Fields
    Internet Of Things (IoT) Security

    IoT Honeypot

    ArcRan

    Gather information about the motives and tactics of attackers by luring them into interacting with the system.
    Internet Of Things (IoT) Security

    ISecMaster IoT Security Detector

    ArcRan

    WiFi / BLE / ZigBee Signal detect un-approved devices and behaviours in Smart Factory / Hospital field
    Internet Of Things (IoT) Security

    MADS

    Datakrew

    MADS is a distributed IoT Platform for large-scale IoT applications, supporting real-time data-intensive enterprise applications. MADS removes the complexities of..
    Internet Of Things (IoT) Security

    ITUS

    Datakrew

    ITUS is a secure IoT gateway with end-to-end double-layer encryption. ITUS’ core differentiator is its high-frequency edge analytics capabilities and..
    Mobile Security

    REL-ID Platform

    Uniken

    Uniken’s REL-ID Platform makes your mobile app the centerpiece of your digital strategy. The REL-ID platform enables you to deliver..
    Mobile Security

    Trusted Application Kit

    Build38

    The Trusted Application Kit (T.A.K) secures mobile apps to diagnose and protect themselves at runtime with Build38 next generation RASP..
    Cyberspace Resiliency

    GamaSure

    GamaSec

    GamaWaf will begin monitoring your website traffic and filter out all malicious traffic. Then it will forward safe and trustworthy..
    Cyberspace Resiliency

    Playbook as a Service (PbaaS)

    FlexibleIR

    FlexibleIR can provide you on demand experts to help build Playbooks/SoPs for your SoC/SIEM use cases.
    Application Security

    Guardara

    Guardara

    We bring DAST into the IDE.
    Endpoint Security

    X-PHY AI Embedded Cyber Secure SSD

    Flexxon

    X-PHY® is the world’s first AI Embedded Cyber Secure Solid-State Drive (SSD) that eliminates human intervention and vulnerable software defense...
    Endpoint Security

    SecureAPlus

    SecureAge Technology

    SecureAPlus keeps your endpoints secure with intuitive application control. Powered by an intelligent AI engine it offers multiple layers of..
    Endpoint Security

    Fense

    Pipeline

    AI Powered Real-time Endpoint Monitoring and Protection for Servers, Desktop & Mobile Devices
    Endpoint Security

    Percept Endpoint Detection and Response (Percept EDR)

    Sequretek

    Percept EDR is an intelligent, easy-to-manage, simple-to-deploy product that works efficiently in heterogeneous environments. Percept EDR uses AI-ML and endpoint..
    Extended Detection and Response (XDR)

    A platform to build cyber Incident Response capabilities

    FlexibleIR

    Visually easy playbooks aiding analysts to build muscle memory. A library of 150+ playbooks for on-premise and cloud use cases...
    Extended Detection and Response (XDR)

    Percept Extended Detection and Response (Percept XDR)

    Sequretek

    Percept Extended Detection and Response (Percept XDR) ensures end-to-end security, threat detection and response while allowing enterprises to focus on..
    Zero Trust Content Security

    Secure File Gateway

    Votiro

    Votiro introduces Secure File Gateway – the only solution that guarantees complete protection from weaponized files. Unlike detection-based file security..
    Messaging Security

    Secure Email Attachment

    Digify

    Send secure emails & files in Gmail and Outlook. Complete encryption, control and tracking for emails and files.
    Messaging Security

    DMARC Forensics

    SendForensics

    DMARC compliance, processing & analytics platform. Simplifies enterprise-wide authentication and compliance, with global visibility of legitimate and illegitimate sending patterns.
    Personal Security

    Fireser

    Seknox

    Fireser is a mobile app that helps you secure your personal online accounts.
    Advanced Identity Management & Zero Trust

    Pre-Transaction Monitoring for Compliance

    Cylynx

    Move beyond identity verification – prioritise risk cases and improving screening efficiency
    Advanced Identity Management & Zero Trust

    REL-ID

    Uniken

    REL-ID delivers invisible, mutual, multi-factor authentication, while totally eliminating credentials, passwords, and knowledge-based authentication (KBA). Your customers can now safely..
    Advanced Identity Management & Zero Trust

    Digital Rights Management

    Digify

    Digital rights management enables you to set and impose copyright protection for your intellectual property such as market research, eBooks,..
    Advanced Identity Management & Zero Trust

    eSignature

    Keyless

    Keyless provides the ability for users to electronically sign documents using their face biometrics, from any device.
    Advanced Identity Management & Zero Trust

    Customer MFA

    Keyless

    Strong authentication doesn’t mean bad user experiences.
    Advanced Identity Management & Zero Trust

    PSD2 SCA

    Keyless

    Transforming the payments experience with privacy-first biometric solutions.
    Advanced Identity Management & Zero Trust

    Passwordless Remote Access

    Keyless

    Unify all of your remote login experiences from VPN to VDI and through RDP access.
    Advanced Identity Management & Zero Trust

    Passwordless Desktop MFA

    Keyless

    Secure desktop logins with a universal passwordless MFA experience.
    Advanced Identity Management & Zero Trust

    Passwordless SSO

    Keyless

    Secure application access with a universal passwordless MFA login.
    Advanced Identity Management & Zero Trust

    Percept Identity Governance and Administration (Percept IGA)

    Sequretek

    Percept IGA is the cloud-native offering for identity & access management of users. Percept IGA reduces access risks & ensures..
    Advanced Identity Management & Zero Trust

    TRASA

    Seknox

    TRASA is a free and open source project that provides modern security features and enables best practice security to protect..
    Cloud Security

    Cloud Security Monitor

    InsiderSecurity

    Cloud Security Monitor is a simple-to-use SaaS for enterprises to monitor their data security in Microsoft 365. Discover the internal..
    Cloud Security

    Reblaze

    Reblaze Technologies

    Reblaze offers an all-in-one private virtual cloud-based solution (VPC) that includes IPS/WAF, DoS/DDoS protection, bot detection and exclusion, anti-scraping, and..
    Web Application &API Security

    Polaris WAAP

    Polaris Infosec

    Polaris Web Application & API Protection (WAAP) uses next-generation Artificial Intelligence (AI) and Machine Learning (ML) to actively detect and..
    Cyber Risk Management

    ISMS Implementation

    Privasec

    ISO 27001:2013 allows companies to use world class risk management standards to strategise and coordinate their security investments whilst getting..
    Cyber Risk Management

    DeRisk Center

    Seconize

    Seconize DeRisk Center is an automated risk management product that Continuously identifies cyber risks and translates to business impact. Prioritizes..
    Cyber Risk Management

    Strobes

    Strobes Security Inc

    Strobes is a SaaS-based risk-centered vulnerability management platform built with the goal of making vulnerability management easier and efficient for..
    Cyber Risk Management

    Cyber Advisory

    Responsible Cyber

    Responsible Cyber offers a complete suite of cybersecurity services that can be adapted according to your needs and budget to..
    Cyber Risk Management

    IMMUNE Platform

    Responsible Cyber

    IMMUNE helps your organization understand your overall cybersecurity readiness by generating an Immunity Report based on publicly obtainable information. It..
    Cyber Risk Management

    Crystal Eye XDR

    Red Piranha

    Crystal Eye XDR (Extended Detection & Response) protects, detects and responds to threats across your whole organisation, all from a..
    Cyber Risk Management

    neoEYED Digital Body Language

    neoEYED

    Digital body language (DBA) collects data from end users during customer onboarding. DBA responds with a risk score to the..
    Cyber Risk Management

    neoEYED Behavioral Biometrics AI

    neoEYED

    Behavioral Biometrics captures mobile and web sensor data and creates a profile of the user to prevent impersonation frauds both..
    Cyber Risk Management

    DeTCT

    CYFIRMA

    The company is also behind the cutting-edge digital risk protection platform, DeTCT. DeTCT helps clients uncover their attack surfaces, know..
    Darkweb; Cybercrime; Cyberwarfare

    Advanced Ransomware Countermeasures (ARC)

    Kapalya Inc.

    Our second generation, patent-protected product, based on Artificial Intelligence and Machine Learning, will be released in Q2 2022. This solution..
    Darkweb; Cybercrime; Cyberwarfare

    AmIBreached

    Cyble

    AmIBreached enables consumers and organizations to identify, prioritize and mitigate darkweb risks.
    Cyber Threat Landscape & Intelligence

    SearchLight

    Digital Shadows

    SearchLight protects against external threats, continually identifying where your assets are exposed, providing sufficient context to understand the risk, and..
    Cyber Threat Landscape & Intelligence

    DeCYFIR

    CYFIRMA

    The company’s flagship product, DeCYFIR, arms governments and businesses with personalized intelligence where insights are tailored to their industry, geography..
    Cyber Threat Landscape & Intelligence

    Cyble Hawk

    Cyble

    Cyble Hawk helps law enforcement and government agencies gather, analyze, and respond to the exposure of extremely sensitive information, enriched..
    Cyber Threat Landscape & Intelligence

    Cyble Vision

    Cyble

    Cyble provides a unified view of your organization’s external threat landscape by consolidating intelligence from the darkweb, deepweb, and surfaceweb.
    Active Directory Protection

    Active Directory Protection

    Attivo Networks

    Attacking Active directory and obtaining admin-level access is attackers’ primary objectives. Active Directory and Domain controllers are prime reconnaissance targets..
    Deception Technology

    ThreatDefend Platform

    Attivo Networks

    The Attivo ThreatDefend® Platform delivers unparalleled attack prevention, detection, and adversary intelligence collection based on cyber deception and data concealment..
    Network Security

    Driverless & Software Data Diode

    Amaris.AI

    Amaris.AI’s driverless data diode is a lightweight, common criteria EAL2 certified usb-based data diode that is used to secure critical..
    AIML and Automation

    Motif Graph Intelligence Platform

    Cylynx

    Motif is a graph intelligence software that translates graph data into business insights, speeding up data exploration, analysis and collaboration..
    AIML and Automation

    Automated UEBA

    InsiderSecurity

    Detect malicious user activity early in your on-premise or cloud infrastructure. With today’s sophisticated hackers, a cyber breach has become..
    AIML and Automation

    TITAN: Smart Cyber Intelligence Management

    TAU Express

    TAU’s AI-enabled cyber threat intelligence analytics platform is capable of parsing, extracting and categorizing unstructured documents to enable intelligent retrieval..
    AIML and Automation

    AmAISound

    Amaris.AI

    AmAISound is Amaris.AI’s AI Sound Event Recognition System which recognizes the sound events and their respective temporal start and end..
    AIML and Automation

    ATAS-Guard

    Amaris.AI

    Amaris Take Action System-Guard (ATAS-Guard) is a next-gen surveillance system with action & event detection capabilities, that can be used..
    AIML and Automation

    Anonymizer

    Amaris.AI

    Amaris.AI’s Anonymizer is an automated AI tool that detects, anonymizes and redacts PII data with reporting and token reference capabilities.
    Encryption

    Health Vault

    Ziroh Labs Inc.

    Health Vault helps healthcare institutions to secure the privacy of their data from internal and external breaches.
    Encryption

    CPA Vault

    Ziroh Labs Inc.

    CPA Vault helps CPA firms to streamline their communication, and ensure their client’s data privacy, and compliance.
    Encryption

    Secure Numeric™

    Ziroh Labs Inc.

    Secure Numeric™ is a Homomorphic Encryption Library that enables users to perform multiple operations on encrypted numeric data without requiring..
    Encryption

    Secure String™

    Ziroh Labs Inc.

    Secure String™ is a Homomorphic Encryption Library that enables users to perform multiple operations on encrypted string data without requiring..
    Encryption

    Ziroh Analytics

    Ziroh Labs Inc.

    Ziroh Analytics connects developers, researchers, and scientists who need computing resources with individuals from across the world who can lend..
    Encryption

    Ziroh DB

    Ziroh Labs Inc.

    Ziroh DB helps users transform any existing database environment into an encrypted storage system with computing capabilities.
    Encryption

    Ziroh Store

    Ziroh Labs Inc.

    Ziroh Store helps users to make their files completely private on any cloud platform from a single interface.
    Encryption

    Ziroh Mail

    Ziroh Labs Inc.

    Ziroh Mail is a privacy-preserving email extension that enables users to communicate privately from their current email platform.
    Encryption

    Ziroh Drive

    Ziroh Labs Inc.

    Ziroh Drive is a secure, non-intrusive storage software that provides users a private space on any storage device to store,..
    Encryption

    SecureAge Security Suite

    SecureAge Technology

    The SecureAge Suite is endpoint license-based, comprised of our endpoint software tools, SecureData, SecureFile, SecureDisk and SecureEmail, this is a..
    Encryption

    KIY, Hide in Cloud and XeroServer

    OneKIY

    User-centric, De-centralised security system for data owner to safeguard their data relying and involving no others.
    Encryption

    Encryption Management (EMP)

    Kapalya Inc.

    Enterprise-wide encryption key management platform AES256 bit Symmetric keys in block cipher mode Meets FIPS140-2 compliance Deployed on-prem or in..
    Encryption

    AmAICrypt

    Amaris.AI

    AmAICrypt is our Next Gen Virtual Disk Encryption Tool (hard disk encryption) which is easy to manage and install, providing..
    Compliance & Data Loss Prevention

    PCI DSS Health Check

    Privasec

    Compliance with the PCI DSS enables you to protect the information your customers entrust you with. Compliance is mandatory for..
    Compliance & Data Loss Prevention

    SecureMail

    689Cloud

    SecureMail protects, tracks, and controls files sent by e-mail by replacing attachments with secure links from which recipients can view,..
    Enterprise Security and Data Protection

    Database Activity Monitor

    InsiderSecurity

    With data security regulations such as Singapore’s PDPA and EU’s GDPR, organisations increasingly need to keep the data in their..
    Enterprise Security and Data Protection

    AmiShare

    Kinnami Software Corporation

    Kinnami Hybrid Resilient Data Fabric, AmiShare, provides a unified way, which is easily administered, to manage data availability, protection, security,..
    Enterprise Security and Data Protection

    SecureDrive

    689Cloud

    SecureDrive is the only cloud content collaboration platform with built-in content security. Advanced rights management technology protects, tracks, and controls..
    No results found