Date: 05 Nov 2019
Home / Blog /
ICE71 Accelerate 3 Demo Day: It’s TODAY!
Stay tuned for updates as we unveil who and what’s on for our ICE71 Accelerate 3 Demo Day.
Today is the day for our Accelerate 3 cohort—10 startups, 10 innovative cybersecurity products and 7 countries! Each startup will give a 3-minute pitch to an audience of over 100 people, including investors and corporates, at Singtel Comcentre. Together with our programme partner CyLon, we’re so excited for our startups! Here they are:
1. Aiculus (from Australia and incorporated in Singapore)
Aiculus specialises in applying advanced Artificial Intelligence (AI) to secure Application Programming Interfaces (APIs). The Aiculus’ API product monitors an organisation’s API traffic in real time, and automatically detects malicious API calls that try to infiltrate and manipulate the organisation’s data and services. This allows organisations to leverage the benefits of APIs without increasing their risk profile as their privacy, data and systems are protected. Through the ICE71 Accelerate programme, Aiculus has validated its new product at the Trustwave cyber-range and is working on pilots with an Australian bank and two Singaporean banks.
2. BlackScore (from Singapore)
BlackScore has developed an AI-based risk assessment platform for digital identities which can be used for border control and social scoring for credit-worthiness. The platform harnesses the latest development in AI technology to achieve unparalleled insights and inferences. Using billions of data points of mostly unstructured data, it constructs and scores a digital identity, and allows users to use specific scoring methods to customise results according to their relevance and needs. It also incorporates continuous learning to adapt to rapidly changing risk landscapes. BlackScore has recently concluded its proof of concept with the immigration authority in the Middle East and is in the final stages of procurement.
3. Buglab (from France)
Buglab connects companies with a global network of expert cybersecurity researchers through its platform which taps on the power of blockchain to enable attainable, versatile, and reliable penetration testing for digital enterprise solutions for a fixed price no matter the size of the scope (with a money-back guarantee if no vulnerability is discovered). Buglab helps companies discover and fix vulnerabilities on their digital solutions or assets. Through one of its programmes, the Buglab Contest, clients are linked with a global network of certified cybersecurity penetration testers who are rewarded based on their cumulative discoveries in time-limit competitions. Through the Vigilante Protocol programme, Buglab provides an avenue for whitehats to share their own vulnerability discoveries, then works with worldwide government Computer Emergency Response Teams (CERTS) / Computer Security Incident Response Teams (CSIRTs) to verify the discoveries and alert companies at risk.
4. Cyble (from Australia)
Cyble provides real-time and holistic visibility of supplier cyber threats and risks through automation, integration and intelligence. Using an AI-powered security scoring mechanism, its platform helps organisations assess cybersecurity risk in their supply chain, provides customised notifications of threats and risks related to their enterprise, operations and supply chain, and allows them to manage cyber secure workflows with their vendors. Cyble reduces costs and increases efficiency by using machine learning, open-source intelligence, deep web and dark web data sources. In September 2019, Cyble was recognised as one of Columbia Venture Community’s top-rated companies in the Fall 2019 review process, and this recognition is awarded to no more than 15% of their applicants. The Columbia Venture Community is one of the entrepreneurship-focused communities in the Columbia innovation ecosystem, serving more than 5,000 members in 50+ countries.
5. Cylynx (from Singapore)
Cylynx specialises in blockchain analytics and forensics to simplify compliance processes for regulators, financial institutions and other virtual asset service providers. Cylynx combines open-source intelligence and graph analytics capabilities to trace the provenance of funds on major blockchains. It uses machine learning to detect anomalous patterns and flag suspicious activities. Its risk-based monitoring platform screens blockchain transactions, making compliance seamless, worry-free and secure. In January 2019, Cylynx came in third in a two-day hackathon held by Binance during Binance Blockchain Week, where more than 100 developers were tasked to build an open platform that protects crypto users against scams, hacks, and money laundering schemes.
6. First Watch (from New Zealand)
First Watch provides industrial and commercial security solutions. Its patent-pending technology protects core files and equipment, and streams real-time provenance-guaranteed data from core Operational Technology devices to a centralised monitoring service. Security teams can analyse and observe an attack as it unfolds, shut down attack vectors and wall off vulnerable devices accurately and swiftly. First Watch’s solution, “SCADA safe,” complements existing solutions and critical infrastructure, allowing organisations to deploy cost-effective measures to secure their networks. Its solution was first piloted in a dairy plant in New Zealand and has since been secured by joint sales for deployment. Pilot testing at a second site, a water utility, will commence in early 2020.
7. FlexibleIR (from India)
FlexibleIR equips organisations with effective incident response capabilities by providing tool-agnostic, evolving and shareable playbooks to guide teams throughout their training, assessment and incident response journey. FlexibleIR’s platform allows individual analysts to respond to small to large-scale incidents without straining resources. With readily deployable playbooks for multiple clients, it not only helps enterprises of different sizes to improve overall response times and precision, but also improves efficacy and reduces costs for managed security service providers (MSSPs). For example, it has successfully reduced the cost of breach by over 25% on average at a major security service provider in India that is globally managed.
8. Mimirium (from Bulgaria)
Mimirium is a distributed user-owned personal database with an anonymising business interface. It collects users’ information and stores it securely on their devices, forming a decentralised network which can be used to extract aggregated anonymous information. Mimirium ensures total anonymity of their users and provides full protection of their privacy and data – their raw data is not shared with anyone, and can only be accessed by the owner. All users participating in the Mimirium Network are paid for taking part in the campaigns. This is a win-win as it allows businesses to perform effective targeted advertising that is compliant with the General Data Protection Regulation. Earlier this year, Mimirium partnered the National Statistics Institute of Bulgaria for a case study on the use of the Internet of Things (IoT) for Smart Cities as part of the ESSnet Big Data project of Eurostat. Part of Mimirium’s involvement is to make cities’ pedestrian crossings more accessible to the handicapped through IoT.
9. Polaris (from Singapore)
Polaris builds next-generation application security solutions that secure the web presence of internet-facing organisations. Its platform automates traffic analysis and monitoring across multiple web applications with its patented AI engine to improve the accuracy of threat detection, reduce false positives and predict coordinated stealth attacks. The solution is highly customisable and provides round-the-clock managed detection and response. In September 2019, Polaris Infosec partnered BGP.net to offer full-stack attack mitigation solutions to internet-facing organisations. Polaris’ Web Presence Protection (WPP) platform will be fully interoperable with the entire BGP.net infrastructure across more than 20 Points of Presence globally.
10. Seknox (from Nepal)
Seknox’s zero trust access control platform manages secure access to internal servers and services within the organisation (a zero trust platform verifies the identity of every user and device trying to connect to its system before granting access to its network resources). The solution unifies adaptive authentication, privileged access management and endpoint security monitoring into a single integrated product which ensures compromised or malicious user access are detected and prevented in real time. Currently, its zero trust platform protects almost 82% of malicious access requests per for its clients.
Watch out for updates on our ICE71 web and social media spaces!