Centerity
Overview
Every enterprise has a multitude of edge devices – from POS systems and ATM machines to vehicles and refrigerators. Enterprises have amassed these devices across all of their regional sites and locations. Enterprise customers are now engaging with enterprises at these edge devices – their experience with these devices today shapes and determines the enterprise’s reputation. For this reason, managing edge devices is more essential than ever. It’s hard. It’s time-consuming. It’s expensive. This is why enterprises lack visibility, context and control at the edge – it’s a problem too big and messy most vendors just don’t want to touch. Not Centerity – this is their mission.
Many enterprises often push this challenge to their service providers, employing their help to centrally connect, secure, monitor and manage their distributed enterprise edge environments. Centerity makes the complex edge simple.
Veriti
Overview
Veriti believes that managing cybersecurity can be simplified by normalizing all disparate sources into a single language. Their consolidated security platform continuously analyzes all data sources, culls all irrelevant data and generates intelligible, actionable insights.
Talon Cyber Security
Overview
Talon Cyber Security delivers the leading enterprise browser designed to bring security to managed and unmanaged devices, regardless of location, device type or operating system. They are at the forefront of harnessing this global shift, defining a brand-new security approach that enables the hybrid workforce. At Talon they look to empower organizations to adopt flexible, dynamic and productive ways of working with rock-solid cyber protection and enhanced visibility via TalonWork, a secure and isolated browser-centric environment, for enterprise managed and unmanaged devices.
Swimlane
Overview
Swimlane provides cloud-scale, low-code security automation for organizations of all industries and sizes. Its technology is relied upon by major security-forward organizations including Sony, Lumen, Sagicor and Toshiba. Customers consistently rate them as the #1 trusted low-code security automation platform. Swimlane Turbine harnesses the power of the world’s most extensible security automation engine to unlock the potential of automation beyond the security operations center (SOC) and serve as the system of record for the entire security organization. Their mission is to prevent breaches and enable continuous compliance via a low-code security automation platform that serves as the system of record for the entire security organization.
Sepio
Overview
Sepio provides actionable visibility to continuously manage risk of all known and shadow assets at any scale. Actionable visibility, objective truth, and infinite scalability are the pillars of Sepio’s Asset Risk Management (ARM) solution that enable organizations to grow securely and efficiently.
The company’s mission is to instill confidence for enterprises that need to manage risk of their continuously expanding, uncontrolled ecosystem of connected assets. With Sepio, security and IT teams will manage asset risk with confidence, painlessly relieving them of the burden of complicated and expensive deployments, noise, or cost.
Oxeye
Overview
Oxeye is laser focused on a huge global opportunity: a soaring need to secure more than 500 million cloud-native apps to be deployed by 2023, according to IDC. To secure these apps, developers must test them – and be absolutely sure apps are safe in deployment. Their vision is to help organizations develop cloud-native applications with high confidence that their code is risk-free – all with minimal effort. They help Dev, AppSec, and DevOps join forces and deliver secure cloud native applications faster without friction.
Infosec Global
Overview
Infosec Global is a developer of a cryptographic lifecycle management software designed to resolve cryptographic threats and vulnerabilities. The company’s software automatically generates an inventory of cryptographic algorithms and certificates, finds risks and susceptibility as well as accelerates compliance and post-quantum readiness, enabling governments and enterprises to secure data and achieve trust through compliance and regulations.
Finite State
Overview
Finite State enables product security teams – the guardians of the connected world – to protect the devices relied upon every day through market-leading software threat, vulnerability, and risk management. They do this by analyzing every piece of information in device firmware, from third-party code to configuration settings and enabling secure device manufacturing at scale. Their products and services integrate seamlessly into existing development and SecOps processes and providing actionable security metrics to address product and supply chain risk.
Enso
Overview
Enso was made by application security professionals for application security professionals. The platform is designed to let your AppSec team bring their own unique skills, approach and knowledge of their mission scope into full effect. The team at Enso understands how much more can be accomplished by eliminating tactical work and simplifying visibility. This is why they consolidate data to eliminate breakers in searching and tracking it and integrate with native collaboration tools to reduce and optimize manual work.
Dig
Overview
Dig discovers all data assets stored in platform-as-a-service (PaaS), infrastructure-as-a-service (IaaS) and database-as-a-service (DBaaS). It classifies structured and unstructured data and provides the industry’s first real-time data detection and response (DDR) solution – a contextualized real-time alerting system that provides insights into the way data is moving and used in the organization. Unlike other solutions that have attempted to tackle cloud data security, Dig is fully agentless and works out-of-band.