Cyber Hygiene

Automox
Cloud Based Patch Manager
Keep Windows, OS X & Linux system free from vulnerabilities
www.automox.com
Cryptonite
Moving Target
Defense

Stop internal network recon & lateral movement without agents
cryptonitenxt.com
Cyber Training & Recruiting
Build your cyber training program & use it to recruit new hires
www.cybrary.it
Counter Drone
Solution

Prevent drones from spying on your facilities, employees & WiFi
department13.com
Mobile & Desktop Collaboration
More secure & scalable alternative to Slack
highside.io
Secure
Voice & Messaging

Enterprise grade mobile secure voice solution that sounds great
koolspan.com
Cloud First VPN
Enable access to data-center & cloud aps without exposing Internet ports
newedge.io
Privileged Account Management
Control & monitor IT admin activity to cloud & SaaS apps
www.onionid.com
Software Defined Data Storage
Advanced security, encryption, monitoring & compliance controls
racktopsystems.com
Continuous Red Team Automation
Makes red teams more efficient & provide better blue team training
www.scythe.io
Automated Breach Simulation
Performs benign network & system attack simulations
threatcare.com
Online Identity Protection
Protects your identity & assets from data miners & ID thieves
www.trackoff.com

Threat Management

Threat Intelligence Gateway
Blocks more than 100m IOCs increasing SOC efficiency
banduracyber.com
Network Breach Detection
Security analytics & forensics of SaaS APIs & network meta data
eastwindnetworks.com
Business Risk Intelligence
Market leading commercial threat intelligence provider
flashpoint-intel.com
Large Scale Data Analytics
High performance Splunk & LogStash alternative, ideal for threat hunting
www.gravwell.io
Breach Detection
Detects malicious persistence on Windows computers for MSPs & MSSPs
huntresslabs.com
Phishing Prevention
Prevents false emails through artificial inteligence & machine learning
www.inky.com
Endpoint Phishing Prevention
Stops phishing attacks with computer vision
pixm.net
Memory augmentation platform
Makes cyber teams smarter with interactive heads up displays
polarity.io
Deep Learning Malware Analysis
Forces evasive malware to detonate through binary re-writing
www.secondwrite.com
Threat Intel
Platform

Organizes threat intel & playbooks across all security products
threatconnect.com

Web Security

Runtime Application Self Protection
Stop web attacks from within the web application
www.contrastsecurity.com
Unikernel Infrastructure
Run legacy & modern apps faster, safer & with less cost using single process unikernels
nanovms.com
Serverless Security
Monitor AWS Lambda applications for permission vulnerabilities & security issues
www.protego.io
Container Adaptive Threat Protection
Docker/DevOps security monitoring & intrusion prevention
www.stackrox.com
Stops Web Browser Attacks
Agentless web layer attack protection for PCs & mobile devices
www.talasecurity.io
Web Advertising Fraud Prevention
Saves advertising budget by removing botnets from web leads
www.whiteops.com

Success Stories