We’ve supported over 100 companies to date, all led by ambitious entrepreneurs from over 35 nationalities focused on securing our digital future with innovative cyber security products.
Kapalya encrypts your confidential files by providing keys management, storage and sharing sensitive data across endpoints, public clouds and private clouds.
Scantist specialises in managing open source vulnerabilities and improving compliance at the application level.
Because 39% of cyber attacks go undetected, PencilDATA released Chainkit to detect invisible threats, root out stealth attacks and attest ISO, NIST, SOC integrity via irrefutable Chains of Custody as a Service.
Olympus Sky Technologies has developed a new way to think about cybersecurity, up‐ending 30-years of static, heavy certificate‐based solutions. We secure and authenticate complex supply chains and provide secure communication, across hardware and software.
neoEYED helps banks and enterprises to reduce fraud just by looking at the way users interact with application and devices.
Kinnami is an end-to-end data security firm that enables organisations to secure, proof, and audit sensitive information at rest and in-transit in data-sharing applications
Guardara provides fuzz testing for security and quality assurance.
Gamasec utilizes the newest and most advanced technologies to stop cyber-attacks via websites, reducing your cyber insurance exposure.
Assimil8's IDRIS tool provides decision makers with easy to read visual representations of large complex data sets without the need for data scientists.
Aiculus provides cybersecurity and AI products to help organisations embrace new technologies without increasing their risk profile.
Blackscore develops automated risk scoring and classification of individuals based on emails, mobile devices or social media presence.
Buglab uses the power of Ethereum to enable attainable, versatile and reliable penetration testing for digital enterprise solutions.
CryptoLynx provides blockchain intelligence and monitoring services to regulators, financial institutions and other virtual asset service providers.
Cyble provides visibility to supplier cyber threat and risks through automation, integration and intelligence.
FlexibleIR provides tool agnostic, evolving and shareable playbooks for incident response.
Mimirium is a distributed user-owned personal database with an anonymous business interface.
Polaris is a next-generation web application firewall with enhanced threat intelligence.
Protecting Critical Infrastructure protects SCADA (Supervisory Control and Data Acquisition) networks from cyber attacks by securing the HMI (Human-Machine Interface) and PLC (programmable logic controller) layer.
Seknox empowers modern IT operations with strong and accessible security solutions.
For the modern organisation, unmaintained and insecure open-source code is a ticking time bomb. We defuse this problem with our managed and assured open-source supply-chain, providing security and accountability. We accomplish this by infusing the open-source ecosystem with security driven development, gamifying user interactions and incentivising contribution.
A proven IoT platform for critical civil, industrial and commercial digital infrastructure.
We protect brands and defend democracy from harmful social media manipulation campaigns - also known as astroturfing.
eXate provides data access controls to ensure that sensitive data attributes are only viewed by the right people, at the right time and in the right location, in accordance with data privacy regulation.
oneclick™ is the easiest, fastest and safest way to connect users with all business applications and data.
Safetech is an IDS and IPS system that protects SCADA (Supervisory Control and Data Acquisition) and Industrial IoT systems against cyber attacks and operational threats.
Salvador Technologies developed innovative, low cost, device that by one press of a button, recovers your computer in zero time.
SIRP is a security orchestration, automation and response platform that helps organizations manage a risk-driven security operations.
The first global platform for communication of private and confidential business and personal messaging.
BinaryEdge analyses and correlates data from across the web to create real-time threat intelligence reports which detail a users full attack surface.
CyGov delivers a SaaS cyber risk management platform, empowering organizations to understand their cyber risks and how best to deal with them.
LGN is a software company developing optimal edge AI algorithms to achieve human-level perception on autonomous systems.
Pubguard is an advert verification and malware detection service that protects international publishers by identifying inappropriate and ineffective ads for app developers.
Sevren is an application security management and orchestration platform for modern development environments.
SOC.OS is re-imagining security operations for small teams by solving the problem of alert fatigue using stateful correlation.
OutThink is a web-based SaaS platform that has been developed specifically to identify and reduce risky workforce behaviours and build a risk aware culture.
689Cloud provides a cloud-based content security platform that empowers enterprises to protect, track, and control business critical content after it has been shared.
Seconize enables enterprises to manage their cyber risks through its continuous predictive risk intelligence product.
PhishBase is an intelligent mail analyser utilising fuzzy logic to prevent phishing attacks, data loss and more.
KIY is a cryptographic token that empowers data owners to protect their digital data privacy without third party intervention. KIY is a patented product for addressing data privacy and security that runs on a decentralised, user-controlled security system. Coupled with an applications marketplace, users can download relevant apps to take full advantage of their KIY token. KIY transfers security control from service providers to data owners, changing the future of the security landscape.
LOKI provides a cloud based platform that enables non-technical people to understand, manage and secure their networks.
Keyless is a privacy-first platform for authentication and identity management driven by user-friendly, secure biometrics that makes data privacy and security the rule, not the exception.
INFRA develops artificial intelligence for hacking and finding IT security liabilities. INFRA builds automated solutions for assessment and intelligence without the need for security analysts, eliminating human error and maximising reliability. Vulnerability assessments conducted on computer networks, servers, websites and IoT are standardised and automated in place of human analysts that work manually. INFRA manages all phases of the assessment and finds vulnerabilities automatically and ahead of malicious entities.
GuardRails provides continuous security feedback that empowers developers to find, fix, and prevent vulnerabilities and enables teams to create web and mobile applications securely, without needing external expertise.
Aversafe is a credential issuance and verification network eradicating forgery and counterfeiting of licenses and credentials. Aversafe provides a first-line-of-defense against credential fraud. Aversafe’s credential issuance and verification network connects employers, individuals and credential issuers such as universities, professional licensors and public agencies together to prevent forgery and counterfeiting of credentials and licenses. Aversafe’s network-based approach improves graduate mobility while protecting individual privacy and enabling cross-border verifications instantly. This allows employers, banks, insurers and public agencies to cut costs, improve trust and reduce liability.
Blue Phish demystifies, assesses and trains the workforce in cybersecurity awareness, building human firewalls.
Apvera provides a suite of security, risk and compliance solutions that enable organisations to identify and respond to cyber risks and ensure data is managed in line with corporate and regulatory requirements.
Cloudpurge provides endpoint protection from browser, email and document-based malware, ransomware and phishing attacks. Cloudpurge’s isolated, disposable browsers allow users to browse web content remotely, shifting risk away from virtual machines and endpoints.
Secucial has developed a digital idenitty wallet, ‘Sovrin’, based on a distributed ledger and private blockchain network technologies. Sovrin is a mobile application that links a users’ physical identity with their digital identites and provides users with complete control over personal data.
Silicon Cloud International establishes secure and private cloud computing infrastructure and workflows for scientific and engineering applications.
SocView improves the security posture of organisations by creating innovative software solutions that simplify processes and enhance efficiency and effectiveness of their security operations teams. SocView is an open and standalone security automation platform that can be rapidly configured to meet unique and specific needs of an organisation. Its Security Operations Centre (SOC) offering helps centralise different SOC teams into a single pane of glass solution. SocView helps eliminate duplicate alerts across all teams, streamlines ticket management while providing organizations with 360-degree real time dashboards that cover the entire SOC function. Its Vulnerability Remediation Management (VRM) offering helps organisations automate and streamline vulnerability remediation management. Scans from AppSec, Network and VA/PT scanners are directly integrated with SocView to provide a 360-degree real time vulnerability dashboard covering the entire vulnerability stack.
InCyber predicts insider threats within a company based on client's logs and data, integrative data inputs of internal and external sources, advanced mathematics and InCyber's own Crystal Ball Ranking Method™. InCyber’s Pro-Active System ("PAS" ) provides advance warning of impending insider attacks before they can damage, steal, or publicize sensitive data.
IOTSploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IOT vulnerabilities.
Safehouse provides military-grade cyber security for enterprise and government. SafeHouse core-tech conducts analysis of the user’s traffic, with the ability to detect and prevent cyber threats in real time.
Threat9 develops software for securing global network of connected devices. The company offers Threat9 Intruder, a software that scans user's network and provide real-time alerts when Internet of things (IoT) device vulnerabilities are discovered; Threat9 Guard, a solution which deploys signatures to user's network devices and prevent attacks; and RouterSploit, an open source software which allows penetration testers to target embedded device vulnerabilities.
WebARX is a complete website security and monitoring platform including web application firewall, up-time monitoring, domain reputation checks, and security scans on a single dashboard.
AttackFlow helps customers to identify weaknesses in their software before hackers do. Using a real-time static analytical solution integrated directly into the development environment, developers can identify and locate vulnerabilities in their software as they code.
Keepnet Labs is an anti-phishing and cyber security awareness platform that aims to prevent security breaches and data loss.
Risk Ledger enables companies to measure, monitor and mitigate their supply chain security risk.
Sauron Security is a real-time, active cyber defence software for Enterprise IoT systems. It enables threat detection, automatic remediation and visual monitoring of cyber attacks in real-time.
Secberus helps manage cloud security risk. By automating the security assessment and enforcement of controls across multiple public cloud infrastructures, Secberus enables companies to have security confidence in their cloud environments by providing end-to-end network visibility and real-time compliance reporting.
Senseon’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.
Sweepatic provides reconnaissance and counterintelligence solutions. Sweepatic's platform mimics the cyber attacker. By running the latest and most refined reconnaissance techniques across all internet-facing assets, the Sweepatic platform builds an extensive inventory of a company's attack surface and its exposure to cyber risk.
Beauceron makes it faster, easier and less complex for organisations to measure, manage and monitor human-centric cyber risk. Their comprehensive, automated cybersecurity platform covers cybersecurity education, social engineering simulations, executive surveys, and dashboards as well as business process, and technology gap assessment and analysis.
Zercurity provides a comprehensive health-check of the security status of every asset, application, and device within an organisation.
DeepView protects companies from data leakage by staff. Real time alerts to public data leaks and opt-in encrypted channel recording make personal devices in the workplace safer. DeepView’s unrivalled, patent pending technology and AI algorithm is built to read photos. It is the only solution that allows companies to manage data leakage from photos, videos and text shared by employees. Thereby protecting companies from inadvertent and intentional data leaks. The advanced, slick encryption recording is the only solution to meet GDPR and MiFID II standards. The platform instantly notifies you to confidential company data being shared for immediate action. Whilst also recording and archiving all business communications across current and emerging social channels.
Keyp has developed the world’s first 'Identity Terminal', which connects any number of identity solutions and can be integrated into any identity management system. Keyp provides the fastest, most straightforward way to conduct legally compliant identity checks.
Meterian finds software vulnerabilities originating from open source components, providing a one-stop shop to easily, efficiently and affordably reduce security risks before software is released into production.
MatiCy provides tools that enable internet-connected devices, individuals, enterprises, operators and AI platforms to provision, secure, run and connect cyber-physical infrastructure.
Lattice Security's cloud-based platform uses machine learning to instantly classify and protect data as it is created, enabling secure collaboration across the organisation.
Idrisi provides organisations with a complete picture of their security posture, allowing them to reduce network risk and increase business agility.
Galaxkey provides quick, straightforward data management services to business, enabling companies to protect data and retain their customers’ ownership and control of it.
Hook runs pay-as-you-go, personalised phishing tests which aim to identify employees who may fall for a scam email and put internal data at risk.
TripleCheck enables companies to find licenses and plagiarized source code snippets inside their software. It provides independent software copyright audits as well as training for open source software inside closed source products.
AppsPicket helps organisations and individuals access cloud, web and mobile in a seamless and secure manner. Their innovative Two Factor Authentication technology permits users to be authenticated without the hassles of OTPs/hardware tokens or additional Authenticator apps.
Codified Security tests mobile apps for security issues before they are released. The solution helps to find and fix vulnerabilities quickly and without the need for a complete penetration test.
Conatix is building a semi-automated business intelligence system based on recent advances in machine learning. This enables companies to discover, source, structure and share previously unstructured data and information from outside their organisations.
Drie provides cloud-based services to organisations using encryption and isolation technologies to ensure that data is held safely.
MyDocSafe empowers companies to design and deploy their own client sign-up processes, including secure forms, KYC/AML checks, contract signing and payment facility setup. It also offers blockchain and cyber security solutions to help clients protect the integrity of their data.
Nettoken is an identity management platform designed to encourage awareness of our ever expanding digital footprint and personal cybersecurity. It finds all of a users digital accounts and keeps track of them, making everything accessible from a single control panel that is secure and easy to manage.
ThreatInformer provide advanced security metrics tailored for cyber insurance underwriters. Their solution empowers insurers to make smarter, well-informed decisions and transforms the way cyber policies are measured and built.
VChain connects each human being to a digital identity which is as unique as their DNA. Using proof-scoring instead of trust, VChain provides reliable and trustworthy identification and verification. Its platform helps institutions secure data and ensures organisations meet API requirements & The Privacy by Design / EU Data Reform Act.
Hazy generates synthetic data that you can drop straight into your existing workflow to improve your fraud detection and risk models. Training with Hazy data makes your existing fraud detection and risk models perform an average 10% better on data sets with low frequency signal.
Deceptive Bytes provides endpoint defensive and offensive solution based on deception. By using the same defenses and techniques against viruses as the viruses use themselves, the solution deceives viruses into believing they’re in a hostile or unattractive environment to attack.
HighSide secures internal communications and file sharing layers, massively reducing an organisation's business risk associated with cybercrime, data breaches, customer attrition, shadow IT, reputational damages, financial loss and more.
Immersive Labs is a cyber learning platform offering a range of practical labs that help identify, measure and develop cyber security skills.
Lantaca specialises in cloud-based security solutions for modern networks. Lantaca's range of solutions covers all aspects of cloud security including incident response, threat intelligence, network security, wi-fi protection and targeted attacks.
Spherical Defense has developed a web application firewall for structured data. Using AI and deep learning, the web application firewall learns the grammar and syntax used by applications to communicate with each other. From this, it can detect and deter anomalous traffic.
TitanGrid is a counter-intelligence platform focused on cyber attack prevention, providing an overview of a user’s weaknesses and how they can be remediated.
Pico was a 5-year research project at the University of Cambridge, conceived and led by Professor Frank Stajano and funded by the European Research Council. The company is now being dissolved and its founders are no longer working together. Most of the Pico software has been released as GPL v3 open source on github on an "as is" basis.
CyberSmart is an automation platform that helps businesses get and stay secure with recognised certification standards. The CyberSmart app is easily deployed and provides insights into the current security status of all devices within an organisation.
AimBrain delivers the industry’s first and only multi-module biometrics platform that allows institutions to easily, securely, and accurately authenticate their customer’s identity on any device, across any channel. Using a patent-pending, context-based step-up authentication methodology, AimBrain is helping some of the world’s largest financial institutions confirm whether their users really are who they say they are.
Cyberlytic detects and prioritises sophisticated web threats. Cyberlytic uses artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data. The company developed a unique risk-based approach and owns patents that relate to detection through real-time risk assessment and prioritisation of cyber-attacks.
Intruder is a proactive vulnerability scanner that helps organisations to keep a constant watch over internet-facing systems. Intruder regularly assesses an organisation's internet-facing systems for weaknesses that hackers could exploit, and provides risk ratings and threat notifications for every weakness, as well as detailed guidance for remediation.
Mentat is developing technology for streaming data analytics at scale using cutting edge statistical techniques and infrastructure.
Ripjar develops unique technology for global threat detection. Illuminating financial crimes across any data source, Ripjar’s scalable approach to threat detection exposes increasingly hidden and complex criminal behaviour. Using automated analytics, and machine learning, Ripjar’s vision is to provide a new approach to detect threats proactively, and reduce the cost and overhead of financial compliance.
Ruuta is a faster, more reliable and secure next-generation Wi-Fi router. You can easily set it up and configure it from all your devices. It finds the best network settings and solves connection problems for you.
Sphere Soc provides advanced solutions for cyber incidents preventions, data analysis and the applications that use a large amounts of information for the people physical protection.
SQR Systems provides secure communications the fintech and regtech sectors to protect their mobile and Internet of Things (IoT) devices. SQR System's patented technology ensures effective compliance, control and security of data for enterprises and individuals over unpredictable networks.
Aves Netsec’s solution adds a new layer of security into a network which robs the attacker of its ability to function, capturing attackers and drawing intelligence from them. This enables enterprises to understand attacker motives, build risk profiles, quantify attack impacts, and subsequently improve their security posture.
BitNinja is an easy-to-use complete server security tool. BitNinja is able to protect any server by providing immediate protection against a wide range of cyber attacks.
DYRNAN Communications provides trusted, secure and compliant communication tools to enterprises and governments worldwide
Mazor offers the unique “Beholder Technology”, a network monitoring solution which targets and alerts on suspicious network activity occurring at the firewalls, indicating malware presence, malicious activity or weak configuration at your Firewalls and Network infrastructure.
Torsion Information Security controls insider security threats and simplifies compliance, using automated, precise information access control. Torsion works with existing information systems, either as a service in the cloud, or software installed in data centres, to provide organisations with control over who accesses confidential information.
Ukkobox helps SMEs deal with personal data in a secure and compliant manner. Ukkobox safely encrypts and spreads user files to existing cloud providers worldwide. Because only parts of each file is stored on each provider files are secured and accessible even if some of these providers suffer an outage or are hacked.
Verity allows users to protect the integrity of digital assets. Users verify themselves and use their identity to sign any type of digital file. Once signed, files are validated by others. People and applications verify the user's identity and confirm the file was issued by the user.
Tessian is a machine intelligent email security platform to automatically prevent cybersecurity threats like spear phishing, misaddressed emails, unauthorized emails (data loss) and non-compliance. Tessian uses machine learning to understand normal email communication patterns in order to automatically identify email security threats in real time, without the need for end user behaviour change or pre-defined rules and policies.
Codebashing's platform is an innovative, hands-on, gameified training platform of real world vulnerabilities that focuses on a highly interactive and intuitive learn-by-doing model for application security training, all delivered through the web browser.
CyberSparta delivers unique cyber attack monitoring, detection and automation using AI.
DynaRisk combines personal risk factors with external data and algorithms to determine an individual’s level of risk online. Its solution not only tells someone what their risk level is, but also what they can do about it.