|Supplier Slogan||Security for the Internet of Things||Your Network is Information||Securing the Industrial Internet|
|HQ Location||United States||United States||France||Belgium||United States||United States|
|Revenue||< $10m||$10-100m||< $10m||< $10m||< $10m||< $10m|
|Employees||11 - 50||51 - 200||51 - 200||11 - 50||< 10||< 10|
|Website||Open website||Open website||Open website||Open website||Open website||Open website|
Bastille is revolutionizing the way Enterprises approach security. As new threats emerge from the Internet of Things, Bastille is the only solution offering full spectrum scanning of the entire corporate airspace, delivering an unprecedented view of wireless risks before they have a chance to impact networks, people or assets. This visibility, combined with Machine Learning and behavioral analytics, provides a holistic view of wireless environments, complimenting Wi-Fi and traditional security architectures.
CloudLock was launched in 2011 with one simple goal in mind: to transform cloud security into a business enabler. From that initial goal, they have built out a unified security fabric that helps organizations protect their sensitive data in Public Cloud applications such as Google Apps, Salesforce, Dropbox, Box, ServiceNow, Office 365, Third-party connected and other apps.
Qosmos leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures. The company supplies software to vendors who embed real-time application visibility in their products for traffic optimization, service chaining, Quality of Service, analytics, cyber security and more. Qosmos customers benefit from fast time to market and continuous signature updates for their products. As the leading supplier of IP traffic classification and network intelligence software, Qosmos contributes actively to Open Source projects and international standards, and serves 75% of the market.
BadgeControl is an intuitive, clean and easy area access management tool. Take full control of your work areas, the easy way.
MedCrypt provides data security as a service to medical device OEMs. From medical imaging device, to implantable devices like pacemakers, MedCrypt ensures that devices act only on instructions from trusted sources.
CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Their flagship product, XSense, acts as an invisible layer that covers the OT Network, modeling it as a state machine. A plug and play solution, XSense is fully agnostic and easily integrates into any operational network, with no requirements for any changes or additional investments to be deployed. It operates in a completely unobtrusive manner, analyzing traffic only.
As a platform, the CloudLock Cloud Security Fabric takes a programmatic approach to cloud security. In addition to leveraging APIs from cloud services, CloudLock is itself a collection of RESTful, API-based Microservices. Using this approach, CloudLock dynamically applies individual security services (such as Cloud DLP) to customer apps on any platform, whether those apps are running on a well-known services such as Amazon Web Services (AWS) or an On-Premises server.
All employers can easily check in via BadgePoint, with automatic NSSO connection. Our web based platform and mobile applications allow for easy management. Wherever, whenever. Enjoy all advantages of checkinatwork, with added security assets such as complete site enclosure and gates for people as well as vehicles. Your construction site has never been more secure.
CRYPTOGRAPHY API Call MedCrypt’s APIs within your device’s software for common Security Functions, like encrypting Data at Rest and in transit, and cryptographically signing all instructions sent to your device with unique key pairs. BEHAVIOR MONITORING MedCrypt devices can send event data (not PHI) to our monitoring service, allowing us to detect when a device is under attack. This helps you satisfy the FDA's requirement that devices incorporate "intrusion detection". VULNERABILITY MONITORING MedCrypt knows which software libraries have been included in your device, and can monitor these libraries for known cybersecurity vulnerabilites long after it has been released.
NASA, HBO, Dreamworks Studio, Sunnova, Whirlpool, Acquia
|Technologies||Cybersecurity & Privacy||Cybersecurity & Privacy||Cybersecurity & PrivacyNetworks & Connectivity||Cybersecurity & PrivacySensorsPlatform as a Service (PaaS)||Cybersecurity & Privacy||Cybersecurity & Privacy|
|Industries||Renewable Energy||Telecommunications||Security & Public Safety||BuildingsChemicalsFinance & InsuranceHealthcare & HospitalsMiningOil & GasPharmaceuticalsRenewable EnergyRetail|
|Use Cases||Intrusion Detection Systems||CybersecurityTraffic Monitoring||Intrusion Detection SystemsOutdoor Environmental Monitoring||Intrusion Detection Systems||Water Utility Management|
|Functions||Logistics & Transportation|
|Infrastructure as a Service (IaaS)||None||None||None||None||None||None|
|Platform as a Service (PaaS)||None||None||None||Minor||None||None|
|Application Infrastructure & Middleware||None||None||None||None||None||None|
|Analytics & Modeling||None||None||None||None||None||None|
|Cybersecurity & Privacy||Minor||Moderate||Moderate||Minor||Moderate||Moderate|
|Networks & Connectivity||None||None||Minor||None||None||None|
|Processors & Edge Intelligence||None||None||None||None||None||None|
|Automation & Control||None||None||None||None||None||None|
|Partners||Amazon Web ServicesGoogleIBMMicrosoftZscalerVMware (DELL)RSA (DELL)||Rombit|