ACRETO
Acreto delivers a Security-as-a-Utility capability that protects distributed and mobile platforms. It can help you protect any technology, operating on any type of network, from anywhere.
Website: acreto.io
ANZEN TECHNOLOGY SYSTEMS
The company’s patented technology allows organisations to securely move highly sensitive or classified data from on-premises storage to the public cloud, while retaining their data sovereignty.
Website: anzentechsystems.com
AVNOS
This cloud-based security platform can expand perimeter defence beyond the enterprise network, providing cloud-delivered protection for devices.
Website: avnos.io
CONTINGENT
Contingent is an AI-powered enterprise platform that quickly reduces the enormous burden of collecting, verifying and monitoring supply chain risk data.
Website: contingenton.com
IRIUSRISK
IriusRisk helps companies build secure software by embedding security in the design of their systems.
Website: iriusrisk.com
DARKBEAM
Darkbeam’s non-invasive threat reconnaissance platform gives you digital risk insights in seconds.
Website: darkbeam.com
HEIMDAL SECURITY
This cyber company builds products that anticipate threatscape trends. Its proactive security suite helps individuals and organisations protect their valuable data.
Website: heimdalsecurity.com
KEYLESS
Keyless is a deeptech cybersecurity company that’s building the world’s first privacy-preserving biometric authentication and personal identity management platform which eliminates the need for businesses to centrally store and manage biometric data, passwords, and any other sensitive information without compromising on convenience or privacy.
Website: keyless.io
KINNAMI
The data security company equips organisations with the tools they need to secure and protect highly confidential documents and data.
Website: kinnami.com
L7 DEFENSE
The company’s solution autonomously monitors, detects and blocks API attacks to a very high level of accuracy, freeing security teams from managing endless configurations and rules.
Website: l7defense.com
ORPHEUS
The company’s award-winning technologies collect huge volumes of cyber risk data, which they analyse using machine learning and a highly skilled team to enable you to stop your cyber risks before they happen.
Website: orpheus-cyber.com
OSIRIUM
Specialising in privileged access security, the company’s software allows customers to securely and cost-effectively manage all privileged access and automate complex business and IT processes.
Website: osirium.com
RISK LEDGER
Risk Ledger’s vendor risk management solution combines a secure social network with a risk management platform. This enables organisations to run a gold standard risk assurance programme against their vendors while making it easy for vendors to respond.
Website: riskledger.com
SHIELDIOT
ShieldIOT enables integrators and service providers to secure large-scale critical IoT networks in settings such as smart cities, smart grid and transportation.
Website: shieldiot.io
SURECERT
SureCert’s digital identity platform makes background checking for recruitment and ID verification quicker and more efficient. Like a credit check, it turns personal information into a score, making sure that sensitive personal information is kept securely.
Website: surecert.com
THREATAWARE
Helping companies monitor and manage their cyber protection in real time, ThreatAware is a single pane of glass on every aspect of an organisation’s cybersecurity – including all hardware, software, cloud services and IT compliance standards.
Website: threataware.com
LICEL
The company provides application shielding solutions to clients around the world, from fintech to government to medtech, military, aerospace and beyond.
Website: licelus.com
VARITI
Variti specialises in malicious bot detection and associated shielding technologies, especially for the verticals most at risk such as ecommerce, media, entertainment and financial sectors. It protects websites, apps and APIs from fraud and attacks without affecting the end user.
Website: variti.com
VIVIDA
VIVIDA combines storytelling and interactive virtual reality to develop the most impactful cybersecurity awareness and education. Its VR experiences are designed to change attitudes and behaviour, make cybersecurity play a bigger role in a company’s culture and reduce the risk factor.
Website: vivida.co.uk
WESTGATE CYBER SECURITY
The company helps organisations darken their networks and prevent cyber attacks with invisible network access gates which only materialise when certain trust standards are met. Its technology makes connectivity within enterprises (and their supply chains) easier to arrange and safer to operate by ensuring connecting systems are completely invisible to third parties.
Website: westgatecyber.com