Creative technologies for PC, Mobile & IoT
United Kingdom
< $10m
11 - 50
Open website

SentryBay has a track record of solving key security challenges, including some of the core building blocks needed to secure mobile and IoT - where the number and type of attack surfaces are expanding exponentially. These technologies are patented and used within proprietary products - as well as licensed to industry leaders in banking, e-commerce, enterprise, telecommunications and even IT security companies.

Read More
Software that ingests data and visualises it to generate insights to answer specific questions
Software that focus on securing devices, machines, and communications between them.
Bringing together software, hardware, middleware, and infrastructure components to build an end-to-end solution based on specific client requirements.
Number of Similar Suppliers8
Synapt, an IoT division of Prodapt, offers a wide range services in the machine-to-machine (M2M) and internet of things (IoT) domains. Prodapt is a leading software engineering and operations service provider in the Information and Communication Technology (ICT) industry. Prodapt has partnered with Fortune 500 companies to help establish its strong leadership in this domain. Year founded: 1999
Infinias provides high quality market leading IP hardware and software technology for physical access control, with products ranging from access controllers to browser-based access control software. The Infinias line of high-performance access control solutions incorporate the latest technology and features available in access control. Some key products for Infinias arePoE Controllers and Intelli-M Access Software.
HYPR is a startup and the leading provider of decentralized authentication with millions of password-less users secured across the Fortune 500. HYPR is already trusted by major enterprises such as Mastercard and Samsung to eliminate fraud, enhance user experience, and minimize the risk of a breach.In a nutshell, HYPR solution ensures that your users’ credentials always remain safe on personal devices. Eliminating centralized passwords enables HYPR to remove the target and provide a secure password-less experience for your customers and employees.By decentralizing user authentication, HYPR minimizes the risk of a breach, eliminates credential reuse, and enables enterprises to Trust Anyone.
Download PDF Version
test test