The National Science Foundation (NSF), established in 1950 and located in Alexandria, Virginia, is an independent federal agency dedicated to advancing fundamental research and education across all scientific and engineering disciplines. With an annual budget of approximately $7.8 billion, the NSF operates America's Seed Fund, which allocates nearly $200 million each year to support startups and small businesses through the Small Business Innovation Research (SBIR) program. This initiative provides non-dilutive funding of up to $1.5 million to assist in research and development efforts, thereby facilitating the transformation of scientific discoveries into commercially viable products and services. By helping to de-risk technology, the NSF plays a crucial role in fostering innovation and addressing societal challenges through scientific advancements.
Megaprojects are a significant and growing portion of global GDP accounting for several trillion dollars (USD) of economic activity each year. They deliver critical industrial and infrastructure developments that underpin modern society. Most are inefficient: approximately one in a thousand projects is a success, defined as on target for cost, scope and benefits, accounting for trillions in costs and unrealized benefits. Cybereum will transform project governance using 5th generation Blockchain Tech that combines DAG DLT and smartcontracts. On the cybereum™ platform, you can create self-regulating project networks of stakeholders & milestones referencing a consensus-based, distributed single-source-of-truth with the property of trustless verification, where contract execution & value exchange can be automated. The project will become a responsive symbiotic goal-seeking organism holistically comprised of all stakeholders. We are creating its nervous system by combining incentive engineering, cryptographic methods, & AI.
CipherMode is a new data utilization and sharing platform which preserves the confidentiality of data even during the computation itself. This is possible through the use of CipherMode’s cutting-edge encryption that allows for computation on encrypted data without decryption. Aside from higher security, enterprises will be able to seamlessly leverage their data across different organizations and/or jurisdictions while remaining compliant and protecting against data breaches. In addition, CipherMode allows secure collaboration between multiple enterprises. Applications range anywhere from co-marketing to drug discovery to fraud detection. CipherMode is a cryptographic software-only solution that unlike other privacy enhancing technologies, e.g., trusted execution environments and differential privacy, provides provable security guarantees. Compared to Homomorphic Encryption, CipherMode is between two to three orders of magnitude faster. The technology is based on more than seven years of academic research.
RaySecur Inc. specializes in advanced 3D package scanning technology designed to detect concealed and potentially dangerous items such as powders, solids, liquids, and various composite threats. Based in Cambridge, Massachusetts, the company offers the MailSecur system, which provides real-time 3D imaging capabilities that surpass traditional X-ray methods. Founded in 2018, RaySecur's innovative solutions utilize scalable terahertz scanners and millimeter-wave technology, allowing for the effective examination of suspicious letters, flat envelopes, and small parcels. Their devices are lightweight, portable, and user-friendly, requiring minimal training for mail screening. RaySecur's technology is employed by Fortune 500 companies and government organizations globally, enhancing security and safety for personnel and critical assets.
Cambrian Works is a space technology development firm focused on advancing fault-tolerant communications networks for both Earth and lunar constellations. The company specializes in creating hardware and software solutions that serve as a space network provider, enabling flexible connectivity to meet diverse client requirements. Its technologies are designed to facilitate low-latency and secure communication, allowing clients to efficiently implement networks that connect to bus processors and manage cross-link and downlink communications terminals. Cambrian Works can operate as a standalone software package on satellite processors or be integrated into the GigRouter for enhanced connectivity and routing capabilities.
Computer Science for All (CS4All) is a 10-year initiative designed to provide a meaningful, high-quality computer science education to public school students in the NYC school system at each school level—elementary, middle and high school. By 2025, the NYC Department of Education (DOE) will train nearly 5,000 teachers who will bring CS education to the city’s 1.1 million public school students. CS4All is a public-private partnership between the DOE and NYC that is supported by a range of foundations, corporations, nonprofits, and individuals.
Supranational develops hardware and software solutions for verifiable and secure computing. The company was founded in 2019 with the goal of developing products at the intersection of cryptography and computer architecture.
Google was founded to organize the world’s information and make it universally accessible and useful. Inspired by Google, we, a team with decades of experiences on cybersecurity, started DeepBits, to provide indexing and searching for the world’s binary code. We are focused on organizing the world’s binary code to provide cybersecurity solutions for various devices. Backed up by over a decade multimillion dollars research sponsored by National Science Foundation and Department of Defense, we are now able to identify vulnerabilities in your computer, mobile phones, and IoT devices in a split of second, and we are able to classify malware and trace back to the source despite that they often try to transform themselves and hide their identities. Wanna know more details? Check out our company - DeepBits Technology.
Ossillate is a security testing platform focused on open-source software, founded in 2020 and based in Auburn, Alabama. The company's platform assists developers in evaluating and managing cybersecurity and operational risks associated with open-source dependencies in their software supply chain. By providing tools for identifying malicious, vulnerable, and unwanted code, Ossillate enables developers to safely adopt pre-vetted third-party code, thereby facilitating the creation of secure digital products and services.
Kapalya Inc. is a technology company that specializes in secure data access and encryption management through its mobile application available on both Apple iOS and Android platforms. Founded in 2015 and headquartered in Honolulu, Hawaii, with an additional office in Berkeley, California, Kapalya's application allows users to securely navigate and transfer files between various corporate and cloud storage solutions, including SharePoint, Windows file shares, and Oracle reports, utilizing fingerprint recognition for authentication. The company offers real-time encryption key management, ensuring that sensitive files are protected both at-rest and in-transit across multiple platforms. Kapalya serves a diverse clientele, including chief information officers and enterprise users, by enabling them to share encrypted files securely across various cloud services.
Corsha is a cybersecurity company focused on API security, addressing the rising threats to enterprise data and applications in hybrid and multi-cloud environments. Its innovative API Security Platform offers a unique solution with the first fully automated dynamic multi-factor authentication (MFA) specifically designed for APIs. This platform safeguards API calls by cryptographically defining the network, ensuring that only authorized machines can access applications and data. Corsha's system provides security professionals with comprehensive visibility and control over all API activities through a central management console. The platform is versatile, available as Corsha Cloud (SaaS) or Corsha Enterprise (self-hosted), and is compatible with modern DevOps pipelines. By integrating MFA principles that have effectively protected traditional systems, Corsha enables enterprises to confidently utilize public cloud resources while enhancing their overall return on investment.
Semiotic AI provides encrypted computing services in the cloud based on Fully Homomorphic Encryption (FHE). Using Semiotic's services, organizations can offer data analytics on sensitive data without compromising security and privacy. In addition to data security, Semiotic's technology can protect proprietary models by encrypting them before deployment. Privacy and security will play a pivotal role in business growth in the era of cloud computing, AI, and 5G. Semiotic's founders bring decades of experience in cryptography, AI, and acceleration to prepare you for this future. It was founded in 2020 and is headquartered in Los Altos, California.
Grid7
Grant in 2021
Grid7’s project, E-Blockchain: A Scalable Platform for Secure Energy Transactions and Control, aims to use blockchain technology to address power plant cybersecurity issues and explore how a decentralized approach can improve the reliability of energy networks.
Developer of security software designed to prevent malware and application vulnerabilities from compromising computer systems. The company's software offers a non-bypassable application hardening ability that works within existing software to protect against cyber threats, enabling businesses to have a preventative layer of defense.
Max Powers, founded in 2014 and headquartered in New York, NY, specializes in IT and electronics products and services, focusing on advanced technologies such as blockchain, cryptography, artificial intelligence, and Big Data. The company develops and encrypts routers and other devices, enhancing security and enabling anonymous communications and data publishing. By leveraging artificial intelligence and blockchain technology, Max Powers provides tools that empower users to safeguard their data against censorship and unauthorized access.
Silicon Assurance is a technology company founded in 2021 and based in Gainesville, Florida, specializing in hardware security software aimed at enhancing the trust and security of silicon chips. The company develops automated tools that expedite the security assessment of chip designs, effectively preventing data leakage and safeguarding revenue for businesses. Silicon Assurance's technologies focus on mitigating risks associated with reverse engineering and identifying both intentional and unintentional design flaws in semiconductor intellectual property (IP) cores. By providing security services tailored for the electronics supply chain, which includes components like system-on-chips (SoCs) and printed circuit boards (PCBs), the company addresses critical vulnerabilities in smart-connected devices, such as self-driving cars and Internet of Things (IoT) applications.
BluSphinx is a business consultancy firm based in Austin, Texas, specializing in customized enterprise resource planning solutions aimed at enhancing business performance. The company focuses on small to medium-sized manufacturing enterprises, offering tailored strategies that begin with an in-depth understanding of each client’s operational processes. By developing a comprehensive blueprint and planning the implementation of these strategies, BluSphinx helps clients streamline their operations, reduce costs, and achieve positive growth outcomes. Through its expert team, the firm provides critical insights and actionable plans designed to improve overall efficiency and effectiveness in business operations.
Qunnect, LLC is a technology company based in Stony Brook, New York, specializing in the development of light-based modular devices designed for transmitting, storing, and receiving encrypted information. Founded in 2017 as a spin-off from the Quantum Information Technology group at Stony Brook University, Qunnect focuses on creating advanced quantum devices that leverage principles of quantum physics to facilitate ultra-secure networks. These devices ensure that any observation of data is detected by the sender or recipient, enhancing cybersecurity. The company's offerings include solutions in quantum computing, quantum sensors, quantum cryptography, and quantum networks, among others. By engineering novel quantum memories and sources, Qunnect aims to revolutionize information networks and quantum computing, contributing to the evolution of cybersecurity into real-time threat detection systems.
Steg AI solves media protection and authentication with AI-powered tools. It enables its customers to identify images and videos that their users are uploading to their platforms- even if that media has been broadcast over television and recaptured with a smartphone camera, which other content attribution tools are unable to identify. It was founded in 2019 and is headquartered in New York, New York.
Curated Networks develops a disruptive link-layer/network layer routing and forwarding paradigm. The company was founded in 2019 and is headquartered in Santa Cruz, California.
Grid7
Grant in 2020
Grid7’s project, E-Blockchain: A Scalable Platform for Secure Energy Transactions and Control, aims to use blockchain technology to address power plant cybersecurity issues and explore how a decentralized approach can improve the reliability of energy networks.
Supranational develops hardware and software solutions for verifiable and secure computing. The company was founded in 2019 with the goal of developing products at the intersection of cryptography and computer architecture.
Developer of a pioneering encryption method and tools designed for data in use. The company's method enables data owners to encrypt confidential data and process it while encrypted, without constraints or the need to decrypt it first, allowing them to migrate their encrypted confidential data to the cloud, use it for analyses or machine learning, or share and monetize it as a service with full privacy and security.
Forward Edge AI develops artificial intelligence for public safety and national security. The company was founded in 2019 and is headquartered in San Antonio, Texas.
Trusted CI is to lead in the development of an NSF Cybersecurity Ecosystem with the workforce, knowledge, processes, and cyberinfrastructure that enables trustworthy science and NSF’s vision of a nation that is a global leader in research and innovation. Are you an NSF project in need of cybersecurity
RaySecur Inc. specializes in advanced 3D package scanning technology designed to detect concealed and potentially dangerous items such as powders, solids, liquids, and various composite threats. Based in Cambridge, Massachusetts, the company offers the MailSecur system, which provides real-time 3D imaging capabilities that surpass traditional X-ray methods. Founded in 2018, RaySecur's innovative solutions utilize scalable terahertz scanners and millimeter-wave technology, allowing for the effective examination of suspicious letters, flat envelopes, and small parcels. Their devices are lightweight, portable, and user-friendly, requiring minimal training for mail screening. RaySecur's technology is employed by Fortune 500 companies and government organizations globally, enhancing security and safety for personnel and critical assets.
Developer of production-ready cryptographic security services intended to specialize in the area of quantum-safe cryptography. The company's services include classical cryptography, hybrid cryptography, and post-quantum cryptography embedded in smart IoT devices and clouds, enabling their clients to increase their crypto-agility for future transitions.
Developer of a self-aware system designed to protect the lives of national security, public safety, and private security personnel. The company's system consists of a series of small, ruggedized Artificial intelligence-powered sensors built into the grips of a firearm that monitor utilization at the edge and provide analytics and insights using instant notification, enabling clients to save lives and protect people.
NXM Labs develops software that enables devices to work together automatically to stop hackers and protect devices against evolving cyber threats, including those using quantum computers, while safeguarding personal privacy and orchestrating data at the edge to empower AI systems. The Company is the recipient of Frost & Sullivan’s 2019 North American Visionary Innovation Leadership Award in IoT Security.
Public safety is one of the largest concerns faced by governments and security agencies as public and private places become targets for attacks. The detection and mitigation of potential threats in real time are essential to security and public safety. Steel City Optronics has developed a new camera that detects concealed weapons and explosives from almost any distance, on subjects in motion — before they become dangerous to people and property. This fast and thorough security screening of moving objects is a crucial ability in today’s rapidly globalizing, fast-paced world. Metal detectors and security checkpoints are no longer sufficient to ensure public safety. Too often, dangerous threats are simply not detected by these traditional safety precautions, leaving people and property at risk. Since many recent threats have targeted public access areas ahead of the security checkpoints, a better security solution is clearly necessary. Explosives and weapons that people are carrying, while in motion, currently go largely undetected in real-world situations. Steel City Optronics addresses these, and other, issues with our state-of-the-art millimeter wave security camera. In addition to security monitoring for public safety, our cameras can see through common obscurants like smoke, fog, dust, and rain, making them ideal for situational awareness, object avoidance, and navigation.
Agita Labs is a new startup in Ann Arbor, Michigan. The company is developing next-generation privacy-enhanced computing architectures that will facilitate the creation of new data markets while protecting data IP rights and respecting personal information.
Hard-to-reproduce bugs waste developers’ time. Cloudseal’s goal is to make computing reliable and predictable, with all bugs instantly and accurately reproducible. To that end, Cloudseal’s secure deterministic container technology enables efficient, always-on recording of software behavior.
Stabilitas Intelligence Communications, Inc. develops a platform which provide security and intelligence data. It provides data for security managers, intelligence teams, corporate protection teams, and travel managers. The company develops SigActs, a platform which provides information and context about risks around, and PACE Notify, a platform for communicating security data through SMS, voice, email, and application. The company was formerly known as A & H Stabilitas Ventures, Inc. Stabilitas Intelligence Communications, Inc. was incorporated in 2013 and is based in Seattle, Washington. As of August 11, 2020, Stabilitas Intelligence Communications, Inc. operates as a subsidiary of ONSOLVE, LLC.
Codecraft Works, LLC is an educational technology company focused on providing a blended learning approach to computer science, engineering, and cybersecurity curricula for students and educators. The company offers a variety of programs, including block programming, JavaScript programming, and platform game development, aimed at enhancing technical skills and addressing the STEM talent gap. Codecraft's labs, clubs, and camps are designed for students aged 8 to 18, creating a collaborative environment where learners of all skill levels can engage with hands-on, self-paced activities. These programs emphasize real-world applications, helping students understand the relevance of their education in everyday life. Codecraft Works aims to inspire and equip the next generation of technical innovators.
Saber Corporation
Grant in 2018
Saber Software Corporation develops and markets PC utility software products for local area networks.
Developer of a self-aware system designed to protect the lives of national security, public safety, and private security personnel. The company's system consists of a series of small, ruggedized Artificial intelligence-powered sensors built into the grips of a firearm that monitor utilization at the edge and provide analytics and insights using instant notification, enabling clients to save lives and protect people.
Secure Food Solutions, Inc. is a food safety company based in Martin, Tennessee, established in 2014. The company specializes in developing advanced technologies for the rapid detection of toxins, pathogens, and other contaminants in the global food supply. Among its notable innovations is a patented hyperspectral imaging technology specifically designed to identify corn contaminated with aflatoxin. Additionally, Secure Food Solutions offers rapid microbial tests that monitor and enumerate dangerous pathogens throughout the food and water supply chains. These diagnostic tools enable clients to enhance their food safety programs and mitigate the public health risks associated with foodborne illnesses and outbreaks, all while maintaining affordability.
At TAMOSI we have developed industry-leading technologies designed to change the way we think of computing, the Industrial Internet of Things (IIoT) and Industrial Control Systems (ICS) security.
Google was founded to organize the world’s information and make it universally accessible and useful. Inspired by Google, we, a team with decades of experiences on cybersecurity, started DeepBits, to provide indexing and searching for the world’s binary code. We are focused on organizing the world’s binary code to provide cybersecurity solutions for various devices. Backed up by over a decade multimillion dollars research sponsored by National Science Foundation and Department of Defense, we are now able to identify vulnerabilities in your computer, mobile phones, and IoT devices in a split of second, and we are able to classify malware and trace back to the source despite that they often try to transform themselves and hide their identities. Wanna know more details? Check out our company - DeepBits Technology.
Developer of production-ready cryptographic security services intended to specialize in the area of quantum-safe cryptography. The company's services include classical cryptography, hybrid cryptography, and post-quantum cryptography embedded in smart IoT devices and clouds, enabling their clients to increase their crypto-agility for future transitions.
The National Center for Supercomputing Applications (NCSA) offers high-performance computing resources and expert assistance to scientists and engineers. It facilitates advanced research by providing access to cutting-edge computational tools and technologies, enabling users to tackle complex scientific and engineering challenges. NCSA’s mission is to empower researchers across various disciplines by enhancing their ability to process and analyze large datasets, thereby fostering innovation and discovery in fields such as climate science, biology, and materials science. Through its services, NCSA plays a crucial role in advancing scientific knowledge and supporting the development of new methodologies in computational research.
Intentionet is a developer of management software that specializes in analyzing network configurations to identify and rectify errors. The company's software automates the testing of changes within both on-premises and cloud-based networks, proactively addressing potential issues that could lead to outages or security breaches. By providing clients with enhanced visibility into their network's security posture and connectivity, Intentionet facilitates rapid deployment and ongoing maintenance of network systems without the risk of service interruptions or compliance violations.
Public safety is one of the largest concerns faced by governments and security agencies as public and private places become targets for attacks. The detection and mitigation of potential threats in real time are essential to security and public safety. Steel City Optronics has developed a new camera that detects concealed weapons and explosives from almost any distance, on subjects in motion — before they become dangerous to people and property. This fast and thorough security screening of moving objects is a crucial ability in today’s rapidly globalizing, fast-paced world. Metal detectors and security checkpoints are no longer sufficient to ensure public safety. Too often, dangerous threats are simply not detected by these traditional safety precautions, leaving people and property at risk. Since many recent threats have targeted public access areas ahead of the security checkpoints, a better security solution is clearly necessary. Explosives and weapons that people are carrying, while in motion, currently go largely undetected in real-world situations. Steel City Optronics addresses these, and other, issues with our state-of-the-art millimeter wave security camera. In addition to security monitoring for public safety, our cameras can see through common obscurants like smoke, fog, dust, and rain, making them ideal for situational awareness, object avoidance, and navigation.
Tala provides security solutions to protect enterprise websites against formjacking, magecart, and advanced attacks. It helps websites and web apps enable a completely secure web experience for users.
It has developed a completely agent-less solution that leverages new and powerful web standards such as Content Security Policy (CSP). The solution is fully automated and is compatible with all web technologies. This means that any website could use Tala to protect all of their end-users against web layer attacks, in a matter of minutes.
Tala is led by industry veterans and successful entrepreneurs and is backed by VCs, angels and former executives at Symantec, and by the National Science Foundation (NSF).
Chaos Prime specializes in industrializing artificial intelligence through its EdgeOps software platform, which integrates big data and AI to enhance operational technology. The platform enables system designers to implement prescriptive maintenance and analytics, effectively predicting and prescribing outcomes that assist industrial firms in minimizing unplanned equipment downtime and maximizing yield. By utilizing prescriptive analytics, companies can transition from relying on forecasted events to making real-time adjustments based on actual occurrences, thereby optimizing production, shipments, and machine downtime to improve supply chain efficiency. Additionally, Chaos Prime provides a wireless connectivity solution that offers ultra-secure and highly reliable connectivity for the Internet of Things, facilitating seamless connections for semiconductor companies. The combination of these technologies positions Chaos Prime as a leader in enhancing industrial operations and connectivity.
Developer of SaaS tool designed to disrupt human trafficking, child abuse, and cyber fraud. The company uses artificial intelligence to get actionable insights out of big data to empower a victim-centered response and serve experts working on the front lines of public safety, the tool deploys graph analytics to detect organized crime, along with using purpose-driven algorithms to identify vulnerability indicators, enabling frontline workers in the public sector to protect the vulnerable and end systemic exploitation.
Developer of formal methods and formal verification techniques intended to improve the safety, reliability, and correctness of computing systems for aerospace, automotive, and blockchain industries. The company engages in applies formal methods to enhance computing safety for aerospace, automotive, and blockchain industries, enabling organizations to ensure accessible trustworthy computing.
Secure Food Solutions, Inc. is a food safety company based in Martin, Tennessee, established in 2014. The company specializes in developing advanced technologies for the rapid detection of toxins, pathogens, and other contaminants in the global food supply. Among its notable innovations is a patented hyperspectral imaging technology specifically designed to identify corn contaminated with aflatoxin. Additionally, Secure Food Solutions offers rapid microbial tests that monitor and enumerate dangerous pathogens throughout the food and water supply chains. These diagnostic tools enable clients to enhance their food safety programs and mitigate the public health risks associated with foodborne illnesses and outbreaks, all while maintaining affordability.
Qubitekk, Inc. is a privately-held company based in Vista, California, established in 2012. It specializes in quantum key distribution and develops components and systems aimed at the quantum sensing, quantum cryptography, and quantum computing markets. The company focuses on creating innovative cybersecurity solutions based on quantum optics, which ensure secure and tamper-free communications, particularly for electric grid automation equipment. Funded by Ellis Energy Investments, Qubitekk is guided by an experienced Board of Directors, positioning itself at the forefront of emerging technologies in the cybersecurity landscape.
Axion Technologies
Grant in 2016
Axion Technologies is a cyber security company. The goal is to develops cutting edge encryption and 2-factor authentication capabilities.
Codecraft Works, LLC is an educational technology company focused on providing a blended learning approach to computer science, engineering, and cybersecurity curricula for students and educators. The company offers a variety of programs, including block programming, JavaScript programming, and platform game development, aimed at enhancing technical skills and addressing the STEM talent gap. Codecraft's labs, clubs, and camps are designed for students aged 8 to 18, creating a collaborative environment where learners of all skill levels can engage with hands-on, self-paced activities. These programs emphasize real-world applications, helping students understand the relevance of their education in everyday life. Codecraft Works aims to inspire and equip the next generation of technical innovators.
Symbyon develops enterprise software and intellectual property for advanced error correction coding and machine learning. This technology has been proven and has been already deployed in storage devices. Their work resulting is the top choice for IEEE P1890 Standards for Error Correction Coding for Non-Volatile Memories. They are working with commercial partners to design their solution tailored to specific requirements for new applications.
Stabilitas Intelligence Communications, Inc. develops a platform which provide security and intelligence data. It provides data for security managers, intelligence teams, corporate protection teams, and travel managers. The company develops SigActs, a platform which provides information and context about risks around, and PACE Notify, a platform for communicating security data through SMS, voice, email, and application. The company was formerly known as A & H Stabilitas Ventures, Inc. Stabilitas Intelligence Communications, Inc. was incorporated in 2013 and is based in Seattle, Washington. As of August 11, 2020, Stabilitas Intelligence Communications, Inc. operates as a subsidiary of ONSOLVE, LLC.
Caduceus Intelligence Corporation (CIC) is a technology spin-off company of the University of Arizona (UA) located in Tucson, Arizona. CIC has an existing 10-year long non-exclusive licensing agreement with the University of Arizona to perform cutting edge research in the field of Healthcare IT. CIC has been awarded two National Science Foundation (NSF) SBIR/STTR Phase I grants (NSF Award ID 1417181 and NSF Award ID 1622788) for the work it is doing in partnership with the University of Arizona. CIC has extensive research and development partnerships with prestigious research institutes in Taiwan, China and Denmark and has also received research funding from the National Taiwan University and University of Southern Denmark.
Intentionet is a developer of management software that specializes in analyzing network configurations to identify and rectify errors. The company's software automates the testing of changes within both on-premises and cloud-based networks, proactively addressing potential issues that could lead to outages or security breaches. By providing clients with enhanced visibility into their network's security posture and connectivity, Intentionet facilitates rapid deployment and ongoing maintenance of network systems without the risk of service interruptions or compliance violations.
Developer of intelligent code repair tool designed to fix bugs and avoid threatening security. The company's tool helps software developers achieve higher security, reliability, and compliance goals by analyzing source code to detect and automatically fix critical programming errors, enabling businesses to meet the secure coding standard for security and reliability.
Virta Laboratories, Inc. develops monitoring and anti-malware solutions. It provides PowerGuard, a pass-through plug that analyzes equipment’s power consumption for anomalies and signs of malware. Virta Laboratories, Inc. has a strategic alliance with Coalfire. The company was founded in 2013 and is headquartered in Ann Arbor, Michigan.
Developer of SaaS tool designed to disrupt human trafficking, child abuse, and cyber fraud. The company uses artificial intelligence to get actionable insights out of big data to empower a victim-centered response and serve experts working on the front lines of public safety, the tool deploys graph analytics to detect organized crime, along with using purpose-driven algorithms to identify vulnerability indicators, enabling frontline workers in the public sector to protect the vulnerable and end systemic exploitation.
Tortuga Logic, Inc. is a cybersecurity company based in San Jose, California, specializing in hardware threat detection. Founded in 2013, the company provides innovative solutions to identify and prevent security vulnerabilities in semiconductor designs. Its flagship products, Radix-STM and Radix-M, are designed to enhance the security verification process by enabling design teams to detect system-wide exploits related to hardware roots of trust and to perform security validation of firmware in complex system-on-chip designs. By facilitating a Secure Development Lifecycle (SDL), Tortuga Logic's offerings help ensure that vulnerabilities are addressed from the initial stages of chip design through to runtime, thereby enhancing overall hardware security.
SensorHound Innovations LLC, founded in 2012 and based in West Lafayette, Indiana, specializes in Internet of Things (IoT) software products and services aimed at minimizing development and operational costs. The company has developed a proactive and automated operations monitoring platform that addresses the critical issues of reliability and security in IoT applications. By providing continuous monitoring, the platform detects failures, security vulnerabilities, and performance issues in real time, delivering immediate alerts and detailed diagnostic information to facilitate rapid root cause analysis. This innovative solution, built on over a decade of research by leading IoT experts, significantly enhances the efficiency of monitoring operations, ultimately reducing maintenance costs associated with IoT deployments.
Network Perception is providing a pioneering network device configuration analysis software to visualize and manage their network. The company delivers a pioneering solution that enables corporate compliance and cybersecurity managers to gain a complete view of their network security and to immediately determine if its configuration is in alignment with best practices and regulatory standards
Network Perception was launched in 2014 at the University of Illinois at Urbana-Champaign Research Park.
SecondWrite LLC specializes in creating automated malware analysis solutions aimed at detecting advanced persistent threats (APTs), targeted attacks, and zero-day evasions. The company's flagship product, the SecondWrite Sandbox, is designed to identify evasive malware, capture indicators of compromise (IOCs), and process various file types while integrating seamlessly with existing security systems. Founded in 2010 and based in College Park, Maryland, SecondWrite serves a diverse clientele that includes network security providers, endpoint security firms, security operations centers (SOCs) at enterprises, managed security service providers (MSSPs), incident response teams, and threat intelligence vendors. The company's technology, developed in collaboration with university partners, employs a patent-pending approach that reveals hidden paths in malware and executes them to ensure comprehensive code coverage.
The Cryptocurrency Research Group is the first formal cross-disciplinary research network focused on studying cryptocurrencies and other decentralized consensus technologies. CCRG affiliates span a wide range of disciplines including mathematics, cryptography, economics, and law. The goal of the CCRG is to understand decentralized consensus technology, its application and potential impact on the world, and to promulgate that understanding to the research community and to the public.
Developer of formal methods and formal verification techniques intended to improve the safety, reliability, and correctness of computing systems for aerospace, automotive, and blockchain industries. The company engages in applies formal methods to enhance computing safety for aerospace, automotive, and blockchain industries, enabling organizations to ensure accessible trustworthy computing.
Immunant is a systems software consultancy company that specializes in system security, compilers, and operating systems. The company was founded in 2014 and is headquartered in Irvine, California.
Clearton is a technology company that advances human augmentation through automation. The company was founded in 2011 and is headquartered in Rockville, Maryland.
Symbyon develops enterprise software and intellectual property for advanced error correction coding and machine learning. This technology has been proven and has been already deployed in storage devices. Their work resulting is the top choice for IEEE P1890 Standards for Error Correction Coding for Non-Volatile Memories. They are working with commercial partners to design their solution tailored to specific requirements for new applications.
Virta Laboratories, Inc. develops monitoring and anti-malware solutions. It provides PowerGuard, a pass-through plug that analyzes equipment’s power consumption for anomalies and signs of malware. Virta Laboratories, Inc. has a strategic alliance with Coalfire. The company was founded in 2013 and is headquartered in Ann Arbor, Michigan.
Veriflow is a technology company that focuses on enhancing network security and reliability through formal verification of network infrastructure. Founded in 2013 and headquartered in San Jose, California, Veriflow employs continuous network verification technology to predict potential outages and vulnerabilities before they can impact business operations. This proactive approach allows IT teams to maintain secure and resilient networks by identifying and addressing issues quickly, often in just a few clicks. Supported by notable investors such as New Enterprise Associates, Menlo Ventures, the National Science Foundation, and the U.S. Department of Defense, Veriflow is dedicated to ensuring that enterprises can effectively manage their network performance and security.
PFP is an agile (cloud-based or on-premise) platform that uses dynamic power behavior analysis to detect dangerous implant-based attacks in hardware, firmware, and configuration. PFP constantly monitors the power behavior of devices/IoT in data centers, critical infrastructure, and more; then, data is sent to the cloud where PFP detects malicious actors; dashboards display continuous monitoring and/or are alerted. Remediation occurs with or without human interaction. PFP then has continuous monitoring 24/7 which authenticates, detects, and remediates.
SecondWrite LLC specializes in creating automated malware analysis solutions aimed at detecting advanced persistent threats (APTs), targeted attacks, and zero-day evasions. The company's flagship product, the SecondWrite Sandbox, is designed to identify evasive malware, capture indicators of compromise (IOCs), and process various file types while integrating seamlessly with existing security systems. Founded in 2010 and based in College Park, Maryland, SecondWrite serves a diverse clientele that includes network security providers, endpoint security firms, security operations centers (SOCs) at enterprises, managed security service providers (MSSPs), incident response teams, and threat intelligence vendors. The company's technology, developed in collaboration with university partners, employs a patent-pending approach that reveals hidden paths in malware and executes them to ensure comprehensive code coverage.
Caduceus Intelligence Corporation (CIC) is a technology spin-off company of the University of Arizona (UA) located in Tucson, Arizona. CIC has an existing 10-year long non-exclusive licensing agreement with the University of Arizona to perform cutting edge research in the field of Healthcare IT. CIC has been awarded two National Science Foundation (NSF) SBIR/STTR Phase I grants (NSF Award ID 1417181 and NSF Award ID 1622788) for the work it is doing in partnership with the University of Arizona. CIC has extensive research and development partnerships with prestigious research institutes in Taiwan, China and Denmark and has also received research funding from the National Taiwan University and University of Southern Denmark.
Network Perception is providing a pioneering network device configuration analysis software to visualize and manage their network. The company delivers a pioneering solution that enables corporate compliance and cybersecurity managers to gain a complete view of their network security and to immediately determine if its configuration is in alignment with best practices and regulatory standards
Network Perception was launched in 2014 at the University of Illinois at Urbana-Champaign Research Park.
Silverside Detectors Inc. is a technology company. They develop nuclear radiation detection technologies to protect cities and citizens from nuclear terrorism. It designs and develops advanced and adaptable radiation detectors. These detectors can be installed in urban and transit infrastructure for nuclear detection. The company develops inexpensive thermal neutron detectors that can be a building block for large-area networked scanning and other future solutions for nuclear threat reduction. Silverside Detectors Inc was founded by Sarah Haig and Andrew Inglis in 2013; and is headquartered in Boston, Massachusetts.
Cirasys specializes in advanced control methodologies for power conversion, focusing on the development of analog-digital power controllers and converters that offer high precision. Founded in 2014 as a spinout from The University of Texas, Cirasys employs nonlinear control techniques and feedback linearization to streamline the design process of power converters. By simplifying the complex steps typically associated with power converter design, the company enhances design flexibility and improves the performance and capability of DC power conversion applications.
Tortuga Logic, Inc. is a cybersecurity company based in San Jose, California, specializing in hardware threat detection. Founded in 2013, the company provides innovative solutions to identify and prevent security vulnerabilities in semiconductor designs. Its flagship products, Radix-STM and Radix-M, are designed to enhance the security verification process by enabling design teams to detect system-wide exploits related to hardware roots of trust and to perform security validation of firmware in complex system-on-chip designs. By facilitating a Secure Development Lifecycle (SDL), Tortuga Logic's offerings help ensure that vulnerabilities are addressed from the initial stages of chip design through to runtime, thereby enhancing overall hardware security.
Observable offers Network Security-as-a-Service providing automated security analytics and modeling to continuously analyze the behavior of all network devices. Observable Networks, the Clayton-based network security startup.
SensorHound Innovations LLC, founded in 2012 and based in West Lafayette, Indiana, specializes in Internet of Things (IoT) software products and services aimed at minimizing development and operational costs. The company has developed a proactive and automated operations monitoring platform that addresses the critical issues of reliability and security in IoT applications. By providing continuous monitoring, the platform detects failures, security vulnerabilities, and performance issues in real time, delivering immediate alerts and detailed diagnostic information to facilitate rapid root cause analysis. This innovative solution, built on over a decade of research by leading IoT experts, significantly enhances the efficiency of monitoring operations, ultimately reducing maintenance costs associated with IoT deployments.
Charles River Analytics, Inc. specializes in developing intelligent systems tailored for government, defense, intelligence, and commercial sectors. The company provides a range of products, including cognitive systems, sensor processing, decision management tools, and autonomous robotic platforms designed for information management and command applications. Notable offerings include BNet, a network-building tool; VisionKit, which automates visual tasks through computer vision; and Verideo, a video annotation software. Their technologies incorporate various advanced methodologies such as data mining, expert systems, and neural networks. Additionally, Charles River Analytics offers outsourced software engineering services that focus on computer vision, intelligent agents, and multi-agent system development. Founded in 1983 and based in Cambridge, Massachusetts, the company primarily serves the U.S. federal government and the Department of Defense, aiming to transform data into actionable insights that facilitate critical assessment and decision-making.
Private Machines was founded by world-renowned Computer Science PhDs and Professors doing research in Cyber Security and Cloud Computing for decades. We have PhDs write security proofs for our technology and certify it with NIST. They do not believe in pseudo-security or security by obscurity. They do not use “order preserving” encryption, “tokenization” or other marketing-driven approaches. Security is extremely difficult to get right and the devil always lies in the details.
Adrenaline Mobility specializes in providing secure backend services for mobile applications, focusing on enhancing development processes while ensuring data protection. The company employs military-grade end-to-end encryption to safeguard users' information both at rest on mobile devices and in transit to cloud servers. Adrenaline offers a developer-friendly library that simplifies the integration of encrypted data storage in popular cloud platforms such as Amazon, Google, and Dropbox. This allows developers to bypass complex security challenges, including key management and encrypted query processing. Additionally, Adrenaline's cloud-based services include features like push notifications, distributed storage, a web-based console for user management, and messaging capabilities, facilitating the seamless incorporation of robust backend functionality into mobile applications, ultimately improving the user experience.
Numerica Corporation specializes in space domain awareness, focusing on the detection, tracking, and characterization of factors that could impact space operations and the security of the nation and its allies. The company operates a multiple target tracking platform that provides data fusion services across space, air, and missile defense sectors. Its platform enhances precision domain awareness in space and supports advanced surveillance for critical air defense missions. By ensuring the safety of homeland security through missile defense systems, Numerica enables law enforcement, government, and industry clients to engage in data-driven strategic planning and management for various operational needs.
Veriflow is a technology company that focuses on enhancing network security and reliability through formal verification of network infrastructure. Founded in 2013 and headquartered in San Jose, California, Veriflow employs continuous network verification technology to predict potential outages and vulnerabilities before they can impact business operations. This proactive approach allows IT teams to maintain secure and resilient networks by identifying and addressing issues quickly, often in just a few clicks. Supported by notable investors such as New Enterprise Associates, Menlo Ventures, the National Science Foundation, and the U.S. Department of Defense, Veriflow is dedicated to ensuring that enterprises can effectively manage their network performance and security.
SecondWrite LLC specializes in creating automated malware analysis solutions aimed at detecting advanced persistent threats (APTs), targeted attacks, and zero-day evasions. The company's flagship product, the SecondWrite Sandbox, is designed to identify evasive malware, capture indicators of compromise (IOCs), and process various file types while integrating seamlessly with existing security systems. Founded in 2010 and based in College Park, Maryland, SecondWrite serves a diverse clientele that includes network security providers, endpoint security firms, security operations centers (SOCs) at enterprises, managed security service providers (MSSPs), incident response teams, and threat intelligence vendors. The company's technology, developed in collaboration with university partners, employs a patent-pending approach that reveals hidden paths in malware and executes them to ensure comprehensive code coverage.
CyberLogic is a developer of ultrasound bone sonometers designed to assess and improve bone health by using ultrasonic bone assessment technology. The company's device integrates an ultrasound simulation software that combines net time delay technology to accurately measure bone mineral density by analyzing ultrasound data in real time, enabling orthopedic surgeons to diagnose and improve the status of bone health through ultrasonic assessment of bone for osteoporosis management that makes bone assessment quick, safe and painless. CyberLogic was establishd in 1992 in San Pedro, California.
Pindrop Security, Inc. specializes in providing enterprise solutions to secure phone and voice communications, focusing on fraud prevention and customer verification. The company has developed patented technologies, including Phoneprinting, which analyzes phone calls to identify malicious behaviors and confirm legitimate callers. Additionally, Pindrop Express offers a risk-based authentication solution that validates customer phone numbers before calls reach contact centers. Its services are designed to combat various fraud tactics, such as caller ID spoofing and social engineering. Pindrop's solutions are utilized by numerous sectors, including finance, healthcare, insurance, retail, and travel, helping organizations detect fraudulent activities and authenticate callers efficiently. Established in 2011 and headquartered in Atlanta, Georgia, Pindrop is backed by prominent venture capital firms and plays a significant role in enhancing security and customer experience in voice interactions.
Observable offers Network Security-as-a-Service providing automated security analytics and modeling to continuously analyze the behavior of all network devices. Observable Networks, the Clayton-based network security startup.
PFP is an agile (cloud-based or on-premise) platform that uses dynamic power behavior analysis to detect dangerous implant-based attacks in hardware, firmware, and configuration. PFP constantly monitors the power behavior of devices/IoT in data centers, critical infrastructure, and more; then, data is sent to the cloud where PFP detects malicious actors; dashboards display continuous monitoring and/or are alerted. Remediation occurs with or without human interaction. PFP then has continuous monitoring 24/7 which authenticates, detects, and remediates.
Private Machines was founded by world-renowned Computer Science PhDs and Professors doing research in Cyber Security and Cloud Computing for decades. We have PhDs write security proofs for our technology and certify it with NIST. They do not believe in pseudo-security or security by obscurity. They do not use “order preserving” encryption, “tokenization” or other marketing-driven approaches. Security is extremely difficult to get right and the devil always lies in the details.
CarleyTech specializes in social network analysis through analyzing dynamic meta-networks. CarleyTech provides social network strategies alongside communication networks and wireless network communicators. CarleyTech was established in 2007 in Sewickley, Pennsylvania.
Provider of information technology infrastructure services intended for enterprises and government. The company offers a variety of services which include cloud computing, digital transformation consultancy, data migration, public and private cloud security as well as data management solutions, thereby enabling clients to meet their information technology infrastructure and digital transformation needs.
Spot something off? Help us improve by flagging any incorrect or outdated information. Just email us at support@teaserclub.com. Your feedback is most welcome.