Skip to content

Our Fourth Cohort

Acreto logo

ACRETO

Acreto delivers a Security-as-a-Utility capability that protects distributed and mobile platforms. It can help you protect any technology, operating on any type of network, from anywhere.

Website: acreto.io

ANZEN TECHNOLOGY SYSTEMS

The company’s patented technology allows organisations to securely move highly sensitive or classified data from on-premises storage to the public cloud, while retaining their data sovereignty.

Website: anzentechsystems.com

AVNOS

This cloud-based security platform can expand perimeter defence beyond the enterprise network, providing cloud-delivered protection for devices.

Website: avnos.io

CONTINGENT

Contingent is an AI-powered enterprise platform that quickly reduces the enormous burden of collecting, verifying and monitoring supply chain risk data.

Website: contingenton.com

IRIUSRISK

IriusRisk helps companies build secure software by embedding security in the design of their systems.

Website: iriusrisk.com

DARKBEAM

Darkbeam’s non-invasive threat reconnaissance platform gives you digital risk insights in seconds.

Website: darkbeam.com

HEIMDAL SECURITY

This cyber company builds products that anticipate threatscape trends. Its proactive security suite helps individuals and organisations protect their valuable data.

Website: heimdalsecurity.com

KEYLESS

Keyless is a deeptech cybersecurity company that’s building the world’s first privacy-preserving biometric authentication and personal identity management platform which eliminates the need for businesses to centrally store and manage biometric data, passwords, and any other sensitive information without compromising on convenience or privacy.

Website: keyless.io

KINNAMI

The data security company equips organisations with the tools they need to secure and protect highly confidential documents and data.

Website: kinnami.com

L7 DEFENSE

The company’s solution autonomously monitors, detects and blocks API attacks to a very high level of accuracy, freeing security teams from managing endless configurations and rules.

Website: l7defense.com

ORPHEUS

The company’s award-winning technologies collect huge volumes of cyber risk data, which they analyse using machine learning and a highly skilled team to enable you to stop your cyber risks before they happen.

Website: orpheus-cyber.com

Osirium logo

OSIRIUM

Specialising in privileged access security, the company’s software allows customers to securely and cost-effectively manage all privileged access and automate complex business and IT processes.

Website: osirium.com

Risk Ledger logo

RISK LEDGER

Risk Ledger’s vendor risk management solution combines a secure social network with a risk management platform. This enables organisations to run a gold standard risk assurance programme against their vendors while making it easy for vendors to respond.

Website: riskledger.com

SHIELDIOT

ShieldIOT enables integrators and service providers to secure large-scale critical IoT networks in settings such as smart cities, smart grid and transportation.

Website: shieldiot.io

SURECERT

SureCert’s digital identity platform makes background checking for recruitment and ID verification quicker and more efficient. Like a credit check, it turns personal information into a score, making sure that sensitive personal information is kept securely.

Website: surecert.com

THREATAWARE

Helping companies monitor and manage their cyber protection in real time, ThreatAware is a single pane of glass on every aspect of an organisation’s cybersecurity – including all hardware, software, cloud services and IT compliance standards.

Website: threataware.com

Licel logo

LICEL

The company provides application shielding solutions to clients around the world, from fintech to government to medtech, military, aerospace and beyond.

Website: licelus.com

VARITI

Variti specialises in malicious bot detection and associated shielding technologies, especially for the verticals most at risk such as ecommerce, media, entertainment and financial sectors. It protects websites, apps and APIs from fraud and attacks without affecting the end user.

Website: variti.com

VIVIDA

VIVIDA combines storytelling and interactive virtual reality to develop the most impactful cybersecurity awareness and education. Its VR experiences are designed to change attitudes and behaviour, make cybersecurity play a bigger role in a company’s culture and reduce the risk factor.

Website: vivida.co.uk

WESTGATE CYBER SECURITY

The company helps organisations darken their networks and prevent cyber attacks with invisible network access gates which only materialise when certain trust standards are met. Its technology makes connectivity within enterprises (and their supply chains) easier to arrange and safer to operate by ensuring connecting systems are completely invisible to third parties.

Website: westgatecyber.com