OUR COMPANIES

We’ve supported over 100 companies to date, all led by ambitious entrepreneurs from over 35 nationalities focused on securing our digital future with innovative cyber security products.

STATUS: ACTIVE
End Point and Devices

Kapalya encrypts your confidential files by providing keys management, storage and sharing sensitive data across endpoints, public clouds and private clouds.

STATUS: ACTIVE
Application and Web

Scantist specialises in managing open source vulnerabilities and improving compliance at the application level.

STATUS: ACTIVE
Threat intelligence

Because 39% of cyber attacks go undetected, PencilDATA released Chainkit to detect invisible threats, root out stealth attacks and attest ISO, NIST, SOC integrity via irrefutable Chains of Custody as a Service.

STATUS: ACTIVE
IoT and Operational Technology

Olympus Sky Technologies has developed a new way to think about cybersecurity, up‐ending 30-years of static, heavy certificate‐based solutions. We secure and authenticate complex supply chains and provide secure communication, across hardware and software.

STATUS: ACTIVE
Identity and Access Management

neoEYED helps banks and enterprises to reduce fraud just by looking at the way users interact with application and devices.

STATUS: ACTIVE
Data Protection and Loss Prevention

Kinnami is an end-to-end data security firm that enables organisations to secure, proof, and audit sensitive information at rest and in-transit in data-sharing applications

STATUS: ACTIVE
Application and Web

Guardara provides fuzz testing for security and quality assurance.

STATUS: ACTIVE
Application and Web

Gamasec utilizes the newest and most advanced technologies to stop cyber-attacks via websites, reducing your cyber insurance exposure.

STATUS: ACTIVE
Threat intelligence

Assimil8's IDRIS tool provides decision makers with easy to read visual representations of large complex data sets without the need for data scientists.

STATUS: ACTIVE
Application and Web

Aiculus provides cybersecurity and AI products to help organisations embrace new technologies without increasing their risk profile.

STATUS: ACTIVE
Insider Threat

Blackscore develops automated risk scoring and classification of individuals based on emails, mobile devices or social media presence.

STATUS: ACTIVE
Threat intelligence

Buglab uses the power of Ethereum to enable attainable, versatile and reliable penetration testing for digital enterprise solutions.

STATUS: ACTIVE
Governance, Risk, Compliance

CryptoLynx provides blockchain intelligence and monitoring services to regulators, financial institutions and other virtual asset service providers.

STATUS: ACTIVE
Threat intelligence

Cyble provides visibility to supplier cyber threat and risks through automation, integration and intelligence.

STATUS: ACTIVE
Network Security

FlexibleIR provides tool agnostic, evolving and shareable playbooks for incident response.

STATUS: ACTIVE
Data Protection and Loss Prevention

Mimirium is a distributed user-owned personal database with an anonymous business interface.

STATUS: ACTIVE
Application and Web

Polaris is a next-generation web application firewall with enhanced threat intelligence.

STATUS: ACTIVE
Network Security

Protecting Critical Infrastructure protects SCADA (Supervisory Control and Data Acquisition) networks from cyber attacks by securing the HMI (Human-Machine Interface) and PLC (programmable logic controller) layer.

STATUS: ACTIVE
Identity and Access Management

Seknox empowers modern IT operations with strong and accessible security solutions.

STATUS: ACTIVE
Application and Web

For the modern organisation, unmaintained and insecure open-source code is a ticking time bomb. We defuse this problem with our managed and assured open-source supply-chain, providing security and accountability. We accomplish this by infusing the open-source ecosystem with security driven development, gamifying user interactions and incentivising contribution.

STATUS: ACTIVE
IoT and Operational Technology

A proven IoT platform for critical civil, industrial and commercial digital infrastructure.

STATUS: ACTIVE
Threat intelligence

We protect brands and defend democracy from harmful social media manipulation campaigns - also known as astroturfing.

STATUS: ACTIVE
Data Protection and Loss Prevention

eXate provides data access controls to ensure that sensitive data attributes are only viewed by the right people, at the right time and in the right location, in accordance with data privacy regulation.

STATUS: ACTIVE
Application and Web

oneclick™ is the easiest, fastest and safest way to connect users with all business applications and data.

STATUS: ACTIVE
IoT and Operational Technology

Safetech is an IDS and IPS system that protects SCADA (Supervisory Control and Data Acquisition) and Industrial IoT systems against cyber attacks and operational threats.

STATUS: ACTIVE
Communications Security

Salvador Technologies developed innovative, low cost, device that by one press of a button, recovers your computer in zero time.

STATUS: ACTIVE
Network Security

SIRP is a security orchestration, automation and response platform that helps organizations manage a risk-driven security operations.

STATUS: ACTIVE
Communications Security

The first global platform for communication of private and confidential business and personal messaging.

STATUS: EXITED
Threat intelligence

BinaryEdge analyses and correlates data from across the web to create real-time threat intelligence reports which detail a users full attack surface.

STATUS: ACTIVE
Governance, Risk, Compliance

CyGov delivers a SaaS cyber risk management platform, empowering organizations to understand their cyber risks and how best to deal with them.

STATUS: ACTIVE
IoT and Operational Technology

LGN is a software company developing optimal edge AI algorithms to achieve human-level perception on autonomous systems.

STATUS: EXITED
Communications Security

Pubguard is an advert verification and malware detection service that protects international publishers by identifying inappropriate and ineffective ads for app developers.

STATUS: ACTIVE
Application and Web

Sevren is an application security management and orchestration platform for modern development environments.

STATUS: ACTIVE
Network Security

SOC.OS is re-imagining security operations for small teams by solving the problem of alert fatigue using stateful correlation.

STATUS: ACTIVE
Training and Awareness

OutThink is a web-based SaaS platform that has been developed specifically to identify and reduce risky workforce behaviours and build a risk aware culture.

STATUS: ACTIVE
Communications Security

689Cloud provides a cloud-based content security platform that empowers enterprises to protect, track, and control business critical content after it has been shared.

STATUS: ACTIVE
Governance, Risk, Compliance

Seconize enables enterprises to manage their cyber risks through its continuous predictive risk intelligence product.

STATUS: ACTIVE
Communications Security

PhishBase is an intelligent mail analyser utilising fuzzy logic to prevent phishing attacks, data loss and more.

STATUS: ACTIVE
Data Protection and Loss Prevention

KIY is a cryptographic token that empowers data owners to protect their digital data privacy without third party intervention. KIY is a patented product for addressing data privacy and security that runs on a decentralised, user-controlled security system. Coupled with an applications marketplace, users can download relevant apps to take full advantage of their KIY token. KIY transfers security control from service providers to data owners, changing the future of the security landscape.

STATUS: ACTIVE
Network Security

LOKI provides a cloud based platform that enables non-technical people to understand, manage and secure their networks.

STATUS: ACTIVE
Identity and Access Management

Keyless is a privacy-first platform for authentication and identity management driven by user-friendly, secure biometrics that makes data privacy and security the rule, not the exception.

STATUS: ACTIVE
Threat intelligence

INFRA develops artificial intelligence for hacking and finding IT security liabilities. INFRA builds automated solutions for assessment and intelligence without the need for security analysts, eliminating human error and maximising reliability. Vulnerability assessments conducted on computer networks, servers, websites and IoT are standardised and automated in place of human analysts that work manually. INFRA manages all phases of the assessment and finds vulnerabilities automatically and ahead of malicious entities.

STATUS: ACTIVE
Application and Web

GuardRails provides continuous security feedback that empowers developers to find, fix, and prevent vulnerabilities and enables teams to create web and mobile applications securely, without needing external expertise.

STATUS: ACTIVE
Identity and Access Management

Aversafe is a credential issuance and verification network eradicating forgery and counterfeiting of licenses and credentials. Aversafe provides a first-line-of-defense against credential fraud. Aversafe’s credential issuance and verification network connects employers, individuals and credential issuers such as universities, professional licensors and public agencies together to prevent forgery and counterfeiting of credentials and licenses. Aversafe’s network-based approach improves graduate mobility while protecting individual privacy and enabling cross-border verifications instantly. This allows employers, banks, insurers and public agencies to cut costs, improve trust and reduce liability.

STATUS: ACTIVE
Training and Awareness

Blue Phish demystifies, assesses and trains the workforce in cybersecurity awareness, building human firewalls.

STATUS: ACTIVE
Governance, Risk, Compliance

Apvera provides a suite of security, risk and compliance solutions that enable organisations to identify and respond to cyber risks and ensure data is managed in line with corporate and regulatory requirements.

STATUS: ACTIVE
End Point and Devices

Cloudpurge provides endpoint protection from browser, email and document-based malware, ransomware and phishing attacks. Cloudpurge’s isolated, disposable browsers allow users to browse web content remotely, shifting risk away from virtual machines and endpoints.

STATUS: ACTIVE
Identity and Access Management

Secucial has developed a digital idenitty wallet, ‘Sovrin’, based on a distributed ledger and private blockchain network technologies. Sovrin is a mobile application that links a users’ physical identity with their digital identites and provides users with complete control over personal data.

STATUS: ACTIVE
Cloud Security

Silicon Cloud International establishes secure and private cloud computing infrastructure and workflows for scientific and engineering applications.

STATUS: ACTIVE
Network Security

SocView improves the security posture of organisations by creating innovative software solutions that simplify processes and enhance efficiency and effectiveness of their security operations teams. SocView is an open and standalone security automation platform that can be rapidly configured to meet unique and specific needs of an organisation. Its Security Operations Centre (SOC) offering helps centralise different SOC teams into a single pane of glass solution. SocView helps eliminate duplicate alerts across all teams, streamlines ticket management while providing organizations with 360-degree real time dashboards that cover the entire SOC function. Its Vulnerability Remediation Management (VRM) offering helps organisations automate and streamline vulnerability remediation management. Scans from AppSec, Network and VA/PT scanners are directly integrated with SocView to provide a 360-degree real time vulnerability dashboard covering the entire vulnerability stack.

STATUS: ACTIVE
Threat intelligence

InCyber predicts insider threats within a company based on client's logs and data, integrative data inputs of internal and external sources, advanced mathematics and InCyber's own Crystal Ball Ranking Method™. InCyber’s Pro-Active System ("PAS" ) provides advance warning of impending insider attacks before they can damage, steal, or publicize sensitive data.

STATUS: FOLDED
IoT and Operational Technology

IOTSploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IOT vulnerabilities.

STATUS: ACTIVE
Network Security

Safehouse provides military-grade cyber security for enterprise and government. SafeHouse core-tech conducts analysis of the user’s traffic, with the ability to detect and prevent cyber threats in real time.

STATUS: ACTIVE
IoT and Operational Technology

Threat9 develops software for securing global network of connected devices. The company offers Threat9 Intruder, a software that scans user's network and provide real-time alerts when Internet of things (IoT) device vulnerabilities are discovered; Threat9 Guard, a solution which deploys signatures to user's network devices and prevent attacks; and RouterSploit, an open source software which allows penetration testers to target embedded device vulnerabilities.

STATUS: ACTIVE
Application and Web

WebARX is a complete website security and monitoring platform including web application firewall, up-time monitoring, domain reputation checks, and security scans on a single dashboard.

STATUS: ACTIVE
Application and Web

AttackFlow helps customers to identify weaknesses in their software before hackers do. Using a real-time static analytical solution integrated directly into the development environment, developers can identify and locate vulnerabilities in their software as they code.

STATUS: ACTIVE
Communications Security

Keepnet Labs is an anti-phishing and cyber security awareness platform that aims to prevent security breaches and data loss.

STATUS: ACTIVE
Governance, Risk, Compliance

Risk Ledger enables companies to measure, monitor and mitigate their supply chain security risk.

STATUS: FOLDED
IoT and Operational Technology

Sauron Security is a real-time, active cyber defence software for Enterprise IoT systems. It enables threat detection, automatic remediation and visual monitoring of cyber attacks in real-time.

STATUS: ACTIVE
Cloud Security

Secberus helps manage cloud security risk. By automating the security assessment and enforcement of controls across multiple public cloud infrastructures, Secberus enables companies to have security confidence in their cloud environments by providing end-to-end network visibility and real-time compliance reporting.

STATUS: ACTIVE
Network Security

Senseon’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

STATUS: ACTIVE
Network Security

Sweepatic provides reconnaissance and counterintelligence solutions. Sweepatic's platform mimics the cyber attacker. By running the latest and most refined reconnaissance techniques across all internet-facing assets, the Sweepatic platform builds an extensive inventory of a company's attack surface and its exposure to cyber risk.

STATUS: ACTIVE
Governance, Risk, Compliance

Beauceron makes it faster, easier and less complex for organisations to measure, manage and monitor human-centric cyber risk. Their comprehensive, automated cybersecurity platform covers cybersecurity education, social engineering simulations, executive surveys, and dashboards as well as business process, and technology gap assessment and analysis.

STATUS: ACTIVE
Governance, Risk, Compliance

Zercurity provides a comprehensive health-check of the security status of every asset, application, and device within an organisation.

STATUS: ACTIVE
Governance, Risk, Compliance

DeepView protects companies from data leakage by staff. Real time alerts to public data leaks and opt-in encrypted channel recording make personal devices in the workplace safer. DeepView’s unrivalled, patent pending technology and AI algorithm is built to read photos. It is the only solution that allows companies to manage data leakage from photos, videos and text shared by employees. Thereby protecting companies from inadvertent and intentional data leaks. The advanced, slick encryption recording is the only solution to meet GDPR and MiFID II standards. The platform instantly notifies you to confidential company data being shared for immediate action. Whilst also recording and archiving all business communications across current and emerging social channels.

STATUS: ACTIVE
Identity and Access Management

Keyp has developed the world’s first 'Identity Terminal', which connects any number of identity solutions and can be integrated into any identity management system. Keyp provides the fastest, most straightforward way to conduct legally compliant identity checks.

STATUS: ACTIVE
Application and Web

Meterian finds software vulnerabilities originating from open source components, providing a one-stop shop to easily, efficiently and affordably reduce security risks before software is released into production.

STATUS: ACTIVE
IoT and Operational Technology

MatiCy provides tools that enable internet-connected devices, individuals, enterprises, operators and AI platforms to provision, secure, run and connect cyber-physical infrastructure.

STATUS: ACTIVE
Communications Security

Lattice Security's cloud-based platform uses machine learning to instantly classify and protect data as it is created, enabling secure collaboration across the organisation.

STATUS: ACTIVE
Network Security

Idrisi provides organisations with a complete picture of their security posture, allowing them to reduce network risk and increase business agility.

STATUS: ACTIVE
Data Protection and Loss Prevention

Galaxkey provides quick, straightforward data management services to business, enabling companies to protect data and retain their customers’ ownership and control of it.

STATUS: FOLDED
Training and Awareness

Hook runs pay-as-you-go, personalised phishing tests which aim to identify employees who may fall for a scam email and put internal data at risk.

STATUS: ACTIVE
Application and Web

TripleCheck enables companies to find licenses and plagiarized source code snippets inside their software. It provides independent software copyright audits as well as training for open source software inside closed source products.

STATUS: ACTIVE
Identity and Access Management

AppsPicket helps organisations and individuals access cloud, web and mobile in a seamless and secure manner. Their innovative Two Factor Authentication technology permits users to be authenticated without the hassles of OTPs/hardware tokens or additional Authenticator apps.

STATUS: FOLDED
Application and Web

Codified Security tests mobile apps for security issues before they are released. The solution helps to find and fix vulnerabilities quickly and without the need for a complete penetration test.

STATUS: ACTIVE
Threat intelligence

Conatix is building a semi-automated business intelligence system based on recent advances in machine learning. This enables companies to discover, source, structure and share previously unstructured data and information from outside their organisations.

STATUS: ACTIVE
Cloud Security

Drie provides cloud-based services to organisations using encryption and isolation technologies to ensure that data is held safely.

STATUS: ACTIVE
Data Protection and Loss Prevention

MyDocSafe empowers companies to design and deploy their own client sign-up processes, including secure forms, KYC/AML checks, contract signing and payment facility setup. It also offers blockchain and cyber security solutions to help clients protect the integrity of their data.

STATUS: ACTIVE
Identity and Access Management

Nettoken is an identity management platform designed to encourage awareness of our ever expanding digital footprint and personal cybersecurity. It finds all of a users digital accounts and keeps track of them, making everything accessible from a single control panel that is secure and easy to manage.

STATUS: EXITED
Governance, Risk, Compliance

ThreatInformer provide advanced security metrics tailored for cyber insurance underwriters. Their solution empowers insurers to make smarter, well-informed decisions and transforms the way cyber policies are measured and built.

STATUS: ACTIVE
Identity and Access Management

VChain connects each human being to a digital identity which is as unique as their DNA. Using proof-scoring instead of trust, VChain provides reliable and trustworthy identification and verification. Its platform helps institutions secure data and ensures organisations meet API requirements & The Privacy by Design / EU Data Reform Act.

STATUS: ACTIVE
Data Protection and Loss Prevention

Hazy generates synthetic data that you can drop straight into your existing workflow to improve your fraud detection and risk models. Training with Hazy data makes your existing fraud detection and risk models perform an average 10% better on data sets with low frequency signal.

STATUS: ACTIVE
End Point and Devices

Deceptive Bytes provides endpoint defensive and offensive solution based on deception. By using the same defenses and techniques against viruses as the viruses use themselves, the solution deceives viruses into believing they’re in a hostile or unattractive environment to attack.

STATUS: ACTIVE
Communications Security

HighSide secures internal communications and file sharing layers, massively reducing an organisation's business risk associated with cybercrime, data breaches, customer attrition, shadow IT, reputational damages, financial loss and more.

STATUS: ACTIVE
Training and Awareness

Immersive Labs is a cyber learning platform offering a range of practical labs that help identify, measure and develop cyber security skills.

STATUS: ACTIVE
Network Security

Lantaca specialises in cloud-based security solutions for modern networks. Lantaca's range of solutions covers all aspects of cloud security including incident response, threat intelligence, network security, wi-fi protection and targeted attacks.

STATUS: ACTIVE
Application and Web

Spherical Defense has developed a web application firewall for structured data. Using AI and deep learning, the web application firewall learns the grammar and syntax used by applications to communicate with each other. From this, it can detect and deter anomalous traffic.

STATUS: ACTIVE
Threat intelligence

TitanGrid is a counter-intelligence platform focused on cyber attack prevention, providing an overview of a user’s weaknesses and how they can be remediated.

STATUS: FOLDED
Identity and Access Management

Pico was a 5-year research project at the University of Cambridge, conceived and led by Professor Frank Stajano and funded by the European Research Council. The company is now being dissolved and its founders are no longer working together. Most of the Pico software has been released as GPL v3 open source on github on an "as is" basis.

STATUS: ACTIVE
Governance, Risk, Compliance

CyberSmart is an automation platform that helps businesses get and stay secure with recognised certification standards. The CyberSmart app is easily deployed and provides insights into the current security status of all devices within an organisation.

STATUS: EXITED
Identity and Access Management

AimBrain delivers the industry’s first and only multi-module biometrics platform that allows institutions to easily, securely, and accurately authenticate their customer’s identity on any device, across any channel. Using a patent-pending, context-based step-up authentication methodology, AimBrain is helping some of the world’s largest financial institutions confirm whether their users really are who they say they are.

STATUS: FOLDED
Network Security

Cyberlytic detects and prioritises sophisticated web threats. Cyberlytic uses artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data. The company developed a unique risk-based approach and owns patents that relate to detection through real-time risk assessment and prioritisation of cyber-attacks.

STATUS: ACTIVE
Application and Web

Intruder is a proactive vulnerability scanner that helps organisations to keep a constant watch over internet-facing systems. Intruder regularly assesses an organisation's internet-facing systems for weaknesses that hackers could exploit, and provides risk ratings and threat notifications for every weakness, as well as detailed guidance for remediation.

STATUS: FOLDED
Data Protection and Loss Prevention

Mentat is developing technology for streaming data analytics at scale using cutting edge statistical techniques and infrastructure.

STATUS: ACTIVE
Threat intelligence

Ripjar develops unique technology for global threat detection. Illuminating financial crimes across any data source, Ripjar’s scalable approach to threat detection exposes increasingly hidden and complex criminal behaviour. Using automated analytics, and machine learning, Ripjar’s vision is to provide a new approach to detect threats proactively, and reduce the cost and overhead of financial compliance.

STATUS: FOLDED
End Point and Devices

Ruuta is a faster, more reliable and secure next-generation Wi-Fi router. You can easily set it up and configure it from all your devices. It finds the best network settings and solves connection problems for you.

STATUS: EXITED
End Point and Devices

Sphere Soc provides advanced solutions for cyber incidents preventions, data analysis and the applications that use a large amounts of information for the people physical protection.

STATUS: ACTIVE
Communications Security

SQR Systems provides secure communications the fintech and regtech sectors to protect their mobile and Internet of Things (IoT) devices. SQR System's patented technology ensures effective compliance, control and security of data for enterprises and individuals over unpredictable networks.

STATUS: ACTIVE
Network Security

Aves Netsec’s solution adds a new layer of security into a network which robs the attacker of its ability to function, capturing attackers and drawing intelligence from them. This enables enterprises to understand attacker motives, build risk profiles, quantify attack impacts, and subsequently improve their security posture.

STATUS: ACTIVE
Network Security

BitNinja is an easy-to-use complete server security tool. BitNinja is able to protect any server by providing immediate protection against a wide range of cyber attacks.

STATUS: FOLDED
Communications Security

DYRNAN Communications provides trusted, secure and compliant communication tools to enterprises and governments worldwide

STATUS: FOLDED
Network Security

Mazor offers the unique “Beholder Technology”, a network monitoring solution which targets and alerts on suspicious network activity occurring at the firewalls, indicating malware presence, malicious activity or weak configuration at your Firewalls and Network infrastructure.

STATUS: ACTIVE
Communications Security

Torsion Information Security controls insider security threats and simplifies compliance, using automated, precise information access control. Torsion works with existing information systems, either as a service in the cloud, or software installed in data centres, to provide organisations with control over who accesses confidential information.

STATUS: FOLDED
Data Protection and Loss Prevention

Ukkobox helps SMEs deal with personal data in a secure and compliant manner. Ukkobox safely encrypts and spreads user files to existing cloud providers worldwide. Because only parts of each file is stored on each provider files are secured and accessible even if some of these providers suffer an outage or are hacked.

STATUS: FOLDED
Data Protection and Loss Prevention

Verity allows users to protect the integrity of digital assets. Users verify themselves and use their identity to sign any type of digital file. Once signed, files are validated by others. People and applications verify the user's identity and confirm the file was issued by the user.

STATUS: ACTIVE
Communications Security

Tessian is a machine intelligent email security platform to automatically prevent cybersecurity threats like spear phishing, misaddressed emails, unauthorized emails (data loss) and non-compliance. Tessian uses machine learning to understand normal email communication patterns in order to automatically identify email security threats in real time, without the need for end user behaviour change or pre-defined rules and policies.

STATUS: EXITED
Application and Web

Codebashing's platform is an innovative, hands-on, gameified training platform of real world vulnerabilities that focuses on a highly interactive and intuitive learn-by-doing model for application security training, all delivered through the web browser.

STATUS: ACTIVE
Network Security

CyberSparta delivers unique cyber attack monitoring, detection and automation using AI.

STATUS: ACTIVE
Governance, Risk, Compliance

DynaRisk combines personal risk factors with external data and algorithms to determine an individual’s level of risk online. Its solution not only tells someone what their risk level is, but also what they can do about it.

If you’re an investor or would like more information on any of our companies please contact mail@cylonlab.com
X