The National Science Foundation (NSF), established in 1950 and located in Alexandria, Virginia, is an independent federal agency dedicated to advancing fundamental research and education across all scientific and engineering disciplines. With an annual budget of approximately $7.8 billion, the NSF operates America's Seed Fund, which allocates nearly $200 million each year to support startups and small businesses through the Small Business Innovation Research (SBIR) program. This initiative provides non-dilutive funding of up to $1.5 million to assist in research and development efforts, thereby facilitating the transformation of scientific discoveries into commercially viable products and services. By helping to de-risk technology, the NSF plays a crucial role in fostering innovation and addressing societal challenges through scientific advancements.
CipherMode is a new data utilization and sharing platform which preserves the confidentiality of data even during the computation itself. This is possible through the use of CipherMode’s cutting-edge encryption that allows for computation on encrypted data without decryption. Aside from higher security, enterprises will be able to seamlessly leverage their data across different organizations and/or jurisdictions while remaining compliant and protecting against data breaches. In addition, CipherMode allows secure collaboration between multiple enterprises. Applications range anywhere from co-marketing to drug discovery to fraud detection. CipherMode is a cryptographic software-only solution that unlike other privacy enhancing technologies, e.g., trusted execution environments and differential privacy, provides provable security guarantees. Compared to Homomorphic Encryption, CipherMode is between two to three orders of magnitude faster. The technology is based on more than seven years of academic research.
RaySecur Inc. specializes in advanced 3D package scanning technology designed to detect concealed and potentially dangerous items such as powders, solids, liquids, and various composite threats. Based in Cambridge, Massachusetts, the company offers the MailSecur system, which provides real-time 3D imaging capabilities that surpass traditional X-ray methods. Founded in 2018, RaySecur's innovative solutions utilize scalable terahertz scanners and millimeter-wave technology, allowing for the effective examination of suspicious letters, flat envelopes, and small parcels. Their devices are lightweight, portable, and user-friendly, requiring minimal training for mail screening. RaySecur's technology is employed by Fortune 500 companies and government organizations globally, enhancing security and safety for personnel and critical assets.
Cambrian Works is a space technology development firm focused on advancing fault-tolerant communications networks for both Earth and lunar constellations. The company specializes in creating hardware and software solutions that serve as a space network provider, enabling flexible connectivity to meet diverse client requirements. Its technologies are designed to facilitate low-latency and secure communication, allowing clients to efficiently implement networks that connect to bus processors and manage cross-link and downlink communications terminals. Cambrian Works can operate as a standalone software package on satellite processors or be integrated into the GigRouter for enhanced connectivity and routing capabilities.
Supranational develops hardware and software solutions for verifiable and secure computing. The company was founded in 2019 with the goal of developing products at the intersection of cryptography and computer architecture.
Ossillate is a security testing platform focused on open-source software, founded in 2020 and based in Auburn, Alabama. The company's platform assists developers in evaluating and managing cybersecurity and operational risks associated with open-source dependencies in their software supply chain. By providing tools for identifying malicious, vulnerable, and unwanted code, Ossillate enables developers to safely adopt pre-vetted third-party code, thereby facilitating the creation of secure digital products and services.
Google was founded to organize the world’s information and make it universally accessible and useful. Inspired by Google, we, a team with decades of experiences on cybersecurity, started DeepBits, to provide indexing and searching for the world’s binary code. We are focused on organizing the world’s binary code to provide cybersecurity solutions for various devices. Backed up by over a decade multimillion dollars research sponsored by National Science Foundation and Department of Defense, we are now able to identify vulnerabilities in your computer, mobile phones, and IoT devices in a split of second, and we are able to classify malware and trace back to the source despite that they often try to transform themselves and hide their identities. Wanna know more details? Check out our company - DeepBits Technology.
Kapalya Inc. is a technology company that specializes in secure data access and encryption management through its mobile application available on both Apple iOS and Android platforms. Founded in 2015 and headquartered in Honolulu, Hawaii, with an additional office in Berkeley, California, Kapalya's application allows users to securely navigate and transfer files between various corporate and cloud storage solutions, including SharePoint, Windows file shares, and Oracle reports, utilizing fingerprint recognition for authentication. The company offers real-time encryption key management, ensuring that sensitive files are protected both at-rest and in-transit across multiple platforms. Kapalya serves a diverse clientele, including chief information officers and enterprise users, by enabling them to share encrypted files securely across various cloud services.
Corsha is a cybersecurity company focused on API security, addressing the rising threats to enterprise data and applications in hybrid and multi-cloud environments. Its innovative API Security Platform offers a unique solution with the first fully automated dynamic multi-factor authentication (MFA) specifically designed for APIs. This platform safeguards API calls by cryptographically defining the network, ensuring that only authorized machines can access applications and data. Corsha's system provides security professionals with comprehensive visibility and control over all API activities through a central management console. The platform is versatile, available as Corsha Cloud (SaaS) or Corsha Enterprise (self-hosted), and is compatible with modern DevOps pipelines. By integrating MFA principles that have effectively protected traditional systems, Corsha enables enterprises to confidently utilize public cloud resources while enhancing their overall return on investment.
Semiotic AI provides encrypted computing services in the cloud based on Fully Homomorphic Encryption (FHE). Using Semiotic's services, organizations can offer data analytics on sensitive data without compromising security and privacy. In addition to data security, Semiotic's technology can protect proprietary models by encrypting them before deployment. Privacy and security will play a pivotal role in business growth in the era of cloud computing, AI, and 5G. Semiotic's founders bring decades of experience in cryptography, AI, and acceleration to prepare you for this future. It was founded in 2020 and is headquartered in Los Altos, California.
Grid7
Grant in 2021
Grid7’s project, E-Blockchain: A Scalable Platform for Secure Energy Transactions and Control, aims to use blockchain technology to address power plant cybersecurity issues and explore how a decentralized approach can improve the reliability of energy networks.
Developer of security software designed to prevent malware and application vulnerabilities from compromising computer systems. The company's software offers a non-bypassable application hardening ability that works within existing software to protect against cyber threats, enabling businesses to have a preventative layer of defense.
Silicon Assurance is a technology company founded in 2021 and based in Gainesville, Florida, specializing in hardware security software aimed at enhancing the trust and security of silicon chips. The company develops automated tools that expedite the security assessment of chip designs, effectively preventing data leakage and safeguarding revenue for businesses. Silicon Assurance's technologies focus on mitigating risks associated with reverse engineering and identifying both intentional and unintentional design flaws in semiconductor intellectual property (IP) cores. By providing security services tailored for the electronics supply chain, which includes components like system-on-chips (SoCs) and printed circuit boards (PCBs), the company addresses critical vulnerabilities in smart-connected devices, such as self-driving cars and Internet of Things (IoT) applications.
Qunnect, LLC is a technology company based in Stony Brook, New York, specializing in the development of light-based modular devices designed for transmitting, storing, and receiving encrypted information. Founded in 2017 as a spin-off from the Quantum Information Technology group at Stony Brook University, Qunnect focuses on creating advanced quantum devices that leverage principles of quantum physics to facilitate ultra-secure networks. These devices ensure that any observation of data is detected by the sender or recipient, enhancing cybersecurity. The company's offerings include solutions in quantum computing, quantum sensors, quantum cryptography, and quantum networks, among others. By engineering novel quantum memories and sources, Qunnect aims to revolutionize information networks and quantum computing, contributing to the evolution of cybersecurity into real-time threat detection systems.
Curated Networks develops a disruptive link-layer/network layer routing and forwarding paradigm. The company was founded in 2019 and is headquartered in Santa Cruz, California.
Grid7
Grant in 2020
Grid7’s project, E-Blockchain: A Scalable Platform for Secure Energy Transactions and Control, aims to use blockchain technology to address power plant cybersecurity issues and explore how a decentralized approach can improve the reliability of energy networks.
Supranational develops hardware and software solutions for verifiable and secure computing. The company was founded in 2019 with the goal of developing products at the intersection of cryptography and computer architecture.
Developer of a pioneering encryption method and tools designed for data in use. The company's method enables data owners to encrypt confidential data and process it while encrypted, without constraints or the need to decrypt it first, allowing them to migrate their encrypted confidential data to the cloud, use it for analyses or machine learning, or share and monetize it as a service with full privacy and security.
Trusted CI is to lead in the development of an NSF Cybersecurity Ecosystem with the workforce, knowledge, processes, and cyberinfrastructure that enables trustworthy science and NSF’s vision of a nation that is a global leader in research and innovation. Are you an NSF project in need of cybersecurity
RaySecur Inc. specializes in advanced 3D package scanning technology designed to detect concealed and potentially dangerous items such as powders, solids, liquids, and various composite threats. Based in Cambridge, Massachusetts, the company offers the MailSecur system, which provides real-time 3D imaging capabilities that surpass traditional X-ray methods. Founded in 2018, RaySecur's innovative solutions utilize scalable terahertz scanners and millimeter-wave technology, allowing for the effective examination of suspicious letters, flat envelopes, and small parcels. Their devices are lightweight, portable, and user-friendly, requiring minimal training for mail screening. RaySecur's technology is employed by Fortune 500 companies and government organizations globally, enhancing security and safety for personnel and critical assets.
Developer of production-ready cryptographic security services intended to specialize in the area of quantum-safe cryptography. The company's services include classical cryptography, hybrid cryptography, and post-quantum cryptography embedded in smart IoT devices and clouds, enabling their clients to increase their crypto-agility for future transitions.
NXM Labs develops software that enables devices to work together automatically to stop hackers and protect devices against evolving cyber threats, including those using quantum computers, while safeguarding personal privacy and orchestrating data at the edge to empower AI systems. The Company is the recipient of Frost & Sullivan’s 2019 North American Visionary Innovation Leadership Award in IoT Security.
Public safety is one of the largest concerns faced by governments and security agencies as public and private places become targets for attacks. The detection and mitigation of potential threats in real time are essential to security and public safety. Steel City Optronics has developed a new camera that detects concealed weapons and explosives from almost any distance, on subjects in motion — before they become dangerous to people and property. This fast and thorough security screening of moving objects is a crucial ability in today’s rapidly globalizing, fast-paced world. Metal detectors and security checkpoints are no longer sufficient to ensure public safety. Too often, dangerous threats are simply not detected by these traditional safety precautions, leaving people and property at risk. Since many recent threats have targeted public access areas ahead of the security checkpoints, a better security solution is clearly necessary. Explosives and weapons that people are carrying, while in motion, currently go largely undetected in real-world situations. Steel City Optronics addresses these, and other, issues with our state-of-the-art millimeter wave security camera. In addition to security monitoring for public safety, our cameras can see through common obscurants like smoke, fog, dust, and rain, making them ideal for situational awareness, object avoidance, and navigation.
Stateless, Inc. specializes in providing innovative network architecture solutions for organizations utilizing private or hybrid cloud infrastructures. Founded in 2016 and headquartered in Boulder, Colorado, the company offers a software-defined interconnect network platform known as Luxon, which enables colocation providers to deliver dynamic routing, security, and automation services at network interconnection points. Stateless focuses on enhancing connectivity by allowing providers to control and connect various endpoints, including data centers, tenant sites, and hyperscale clouds. Through its enterprise software platform, Stateless integrates scalable, fault-tolerant network functions with virtualization capabilities, facilitating the creation of multi-tenant connectivity services that are flexible, scalable, and cost-effective for cloud service providers.
inFocus Networks develops high-bandwidth network fabrics that enable networked systems through novel photonic technologies. The company was founded in 2018 and is based in San Diego, California.
Codecraft Works, LLC is an educational technology company focused on providing a blended learning approach to computer science, engineering, and cybersecurity curricula for students and educators. The company offers a variety of programs, including block programming, JavaScript programming, and platform game development, aimed at enhancing technical skills and addressing the STEM talent gap. Codecraft's labs, clubs, and camps are designed for students aged 8 to 18, creating a collaborative environment where learners of all skill levels can engage with hands-on, self-paced activities. These programs emphasize real-world applications, helping students understand the relevance of their education in everyday life. Codecraft Works aims to inspire and equip the next generation of technical innovators.
Google was founded to organize the world’s information and make it universally accessible and useful. Inspired by Google, we, a team with decades of experiences on cybersecurity, started DeepBits, to provide indexing and searching for the world’s binary code. We are focused on organizing the world’s binary code to provide cybersecurity solutions for various devices. Backed up by over a decade multimillion dollars research sponsored by National Science Foundation and Department of Defense, we are now able to identify vulnerabilities in your computer, mobile phones, and IoT devices in a split of second, and we are able to classify malware and trace back to the source despite that they often try to transform themselves and hide their identities. Wanna know more details? Check out our company - DeepBits Technology.
Developer of production-ready cryptographic security services intended to specialize in the area of quantum-safe cryptography. The company's services include classical cryptography, hybrid cryptography, and post-quantum cryptography embedded in smart IoT devices and clouds, enabling their clients to increase their crypto-agility for future transitions.
Intentionet is a developer of management software that specializes in analyzing network configurations to identify and rectify errors. The company's software automates the testing of changes within both on-premises and cloud-based networks, proactively addressing potential issues that could lead to outages or security breaches. By providing clients with enhanced visibility into their network's security posture and connectivity, Intentionet facilitates rapid deployment and ongoing maintenance of network systems without the risk of service interruptions or compliance violations.
Public safety is one of the largest concerns faced by governments and security agencies as public and private places become targets for attacks. The detection and mitigation of potential threats in real time are essential to security and public safety. Steel City Optronics has developed a new camera that detects concealed weapons and explosives from almost any distance, on subjects in motion — before they become dangerous to people and property. This fast and thorough security screening of moving objects is a crucial ability in today’s rapidly globalizing, fast-paced world. Metal detectors and security checkpoints are no longer sufficient to ensure public safety. Too often, dangerous threats are simply not detected by these traditional safety precautions, leaving people and property at risk. Since many recent threats have targeted public access areas ahead of the security checkpoints, a better security solution is clearly necessary. Explosives and weapons that people are carrying, while in motion, currently go largely undetected in real-world situations. Steel City Optronics addresses these, and other, issues with our state-of-the-art millimeter wave security camera. In addition to security monitoring for public safety, our cameras can see through common obscurants like smoke, fog, dust, and rain, making them ideal for situational awareness, object avoidance, and navigation.
Tala provides security solutions to protect enterprise websites against formjacking, magecart, and advanced attacks. It helps websites and web apps enable a completely secure web experience for users.
It has developed a completely agent-less solution that leverages new and powerful web standards such as Content Security Policy (CSP). The solution is fully automated and is compatible with all web technologies. This means that any website could use Tala to protect all of their end-users against web layer attacks, in a matter of minutes.
Tala is led by industry veterans and successful entrepreneurs and is backed by VCs, angels and former executives at Symantec, and by the National Science Foundation (NSF).
Stateless, Inc. specializes in providing innovative network architecture solutions for organizations utilizing private or hybrid cloud infrastructures. Founded in 2016 and headquartered in Boulder, Colorado, the company offers a software-defined interconnect network platform known as Luxon, which enables colocation providers to deliver dynamic routing, security, and automation services at network interconnection points. Stateless focuses on enhancing connectivity by allowing providers to control and connect various endpoints, including data centers, tenant sites, and hyperscale clouds. Through its enterprise software platform, Stateless integrates scalable, fault-tolerant network functions with virtualization capabilities, facilitating the creation of multi-tenant connectivity services that are flexible, scalable, and cost-effective for cloud service providers.
Qubitekk, Inc. is a privately-held company based in Vista, California, established in 2012. It specializes in quantum key distribution and develops components and systems aimed at the quantum sensing, quantum cryptography, and quantum computing markets. The company focuses on creating innovative cybersecurity solutions based on quantum optics, which ensure secure and tamper-free communications, particularly for electric grid automation equipment. Funded by Ellis Energy Investments, Qubitekk is guided by an experienced Board of Directors, positioning itself at the forefront of emerging technologies in the cybersecurity landscape.
Axion Technologies
Grant in 2016
Axion Technologies is a cyber security company. The goal is to develops cutting edge encryption and 2-factor authentication capabilities.
Codecraft Works, LLC is an educational technology company focused on providing a blended learning approach to computer science, engineering, and cybersecurity curricula for students and educators. The company offers a variety of programs, including block programming, JavaScript programming, and platform game development, aimed at enhancing technical skills and addressing the STEM talent gap. Codecraft's labs, clubs, and camps are designed for students aged 8 to 18, creating a collaborative environment where learners of all skill levels can engage with hands-on, self-paced activities. These programs emphasize real-world applications, helping students understand the relevance of their education in everyday life. Codecraft Works aims to inspire and equip the next generation of technical innovators.
Intentionet is a developer of management software that specializes in analyzing network configurations to identify and rectify errors. The company's software automates the testing of changes within both on-premises and cloud-based networks, proactively addressing potential issues that could lead to outages or security breaches. By providing clients with enhanced visibility into their network's security posture and connectivity, Intentionet facilitates rapid deployment and ongoing maintenance of network systems without the risk of service interruptions or compliance violations.
Developer of intelligent code repair tool designed to fix bugs and avoid threatening security. The company's tool helps software developers achieve higher security, reliability, and compliance goals by analyzing source code to detect and automatically fix critical programming errors, enabling businesses to meet the secure coding standard for security and reliability.
Virta Laboratories, Inc. develops monitoring and anti-malware solutions. It provides PowerGuard, a pass-through plug that analyzes equipment’s power consumption for anomalies and signs of malware. Virta Laboratories, Inc. has a strategic alliance with Coalfire. The company was founded in 2013 and is headquartered in Ann Arbor, Michigan.
Tortuga Logic, Inc. is a cybersecurity company based in San Jose, California, specializing in hardware threat detection. Founded in 2013, the company provides innovative solutions to identify and prevent security vulnerabilities in semiconductor designs. Its flagship products, Radix-STM and Radix-M, are designed to enhance the security verification process by enabling design teams to detect system-wide exploits related to hardware roots of trust and to perform security validation of firmware in complex system-on-chip designs. By facilitating a Secure Development Lifecycle (SDL), Tortuga Logic's offerings help ensure that vulnerabilities are addressed from the initial stages of chip design through to runtime, thereby enhancing overall hardware security.
Network Perception is providing a pioneering network device configuration analysis software to visualize and manage their network. The company delivers a pioneering solution that enables corporate compliance and cybersecurity managers to gain a complete view of their network security and to immediately determine if its configuration is in alignment with best practices and regulatory standards
Network Perception was launched in 2014 at the University of Illinois at Urbana-Champaign Research Park.
SecondWrite LLC specializes in creating automated malware analysis solutions aimed at detecting advanced persistent threats (APTs), targeted attacks, and zero-day evasions. The company's flagship product, the SecondWrite Sandbox, is designed to identify evasive malware, capture indicators of compromise (IOCs), and process various file types while integrating seamlessly with existing security systems. Founded in 2010 and based in College Park, Maryland, SecondWrite serves a diverse clientele that includes network security providers, endpoint security firms, security operations centers (SOCs) at enterprises, managed security service providers (MSSPs), incident response teams, and threat intelligence vendors. The company's technology, developed in collaboration with university partners, employs a patent-pending approach that reveals hidden paths in malware and executes them to ensure comprehensive code coverage.
Immunant is a systems software consultancy company that specializes in system security, compilers, and operating systems. The company was founded in 2014 and is headquartered in Irvine, California.
Virta Laboratories, Inc. develops monitoring and anti-malware solutions. It provides PowerGuard, a pass-through plug that analyzes equipment’s power consumption for anomalies and signs of malware. Virta Laboratories, Inc. has a strategic alliance with Coalfire. The company was founded in 2013 and is headquartered in Ann Arbor, Michigan.
Veriflow is a technology company that focuses on enhancing network security and reliability through formal verification of network infrastructure. Founded in 2013 and headquartered in San Jose, California, Veriflow employs continuous network verification technology to predict potential outages and vulnerabilities before they can impact business operations. This proactive approach allows IT teams to maintain secure and resilient networks by identifying and addressing issues quickly, often in just a few clicks. Supported by notable investors such as New Enterprise Associates, Menlo Ventures, the National Science Foundation, and the U.S. Department of Defense, Veriflow is dedicated to ensuring that enterprises can effectively manage their network performance and security.
PFP is an agile (cloud-based or on-premise) platform that uses dynamic power behavior analysis to detect dangerous implant-based attacks in hardware, firmware, and configuration. PFP constantly monitors the power behavior of devices/IoT in data centers, critical infrastructure, and more; then, data is sent to the cloud where PFP detects malicious actors; dashboards display continuous monitoring and/or are alerted. Remediation occurs with or without human interaction. PFP then has continuous monitoring 24/7 which authenticates, detects, and remediates.
SecondWrite LLC specializes in creating automated malware analysis solutions aimed at detecting advanced persistent threats (APTs), targeted attacks, and zero-day evasions. The company's flagship product, the SecondWrite Sandbox, is designed to identify evasive malware, capture indicators of compromise (IOCs), and process various file types while integrating seamlessly with existing security systems. Founded in 2010 and based in College Park, Maryland, SecondWrite serves a diverse clientele that includes network security providers, endpoint security firms, security operations centers (SOCs) at enterprises, managed security service providers (MSSPs), incident response teams, and threat intelligence vendors. The company's technology, developed in collaboration with university partners, employs a patent-pending approach that reveals hidden paths in malware and executes them to ensure comprehensive code coverage.
Network Perception is providing a pioneering network device configuration analysis software to visualize and manage their network. The company delivers a pioneering solution that enables corporate compliance and cybersecurity managers to gain a complete view of their network security and to immediately determine if its configuration is in alignment with best practices and regulatory standards
Network Perception was launched in 2014 at the University of Illinois at Urbana-Champaign Research Park.
Silverside Detectors Inc. is a technology company. They develop nuclear radiation detection technologies to protect cities and citizens from nuclear terrorism. It designs and develops advanced and adaptable radiation detectors. These detectors can be installed in urban and transit infrastructure for nuclear detection. The company develops inexpensive thermal neutron detectors that can be a building block for large-area networked scanning and other future solutions for nuclear threat reduction. Silverside Detectors Inc was founded by Sarah Haig and Andrew Inglis in 2013; and is headquartered in Boston, Massachusetts.
Tortuga Logic, Inc. is a cybersecurity company based in San Jose, California, specializing in hardware threat detection. Founded in 2013, the company provides innovative solutions to identify and prevent security vulnerabilities in semiconductor designs. Its flagship products, Radix-STM and Radix-M, are designed to enhance the security verification process by enabling design teams to detect system-wide exploits related to hardware roots of trust and to perform security validation of firmware in complex system-on-chip designs. By facilitating a Secure Development Lifecycle (SDL), Tortuga Logic's offerings help ensure that vulnerabilities are addressed from the initial stages of chip design through to runtime, thereby enhancing overall hardware security.
Impulse Network is a developer of a trusted computing platform that focuses on secure and efficient data management. The company integrates advanced technologies such as privacy computing, blockchain, and artificial intelligence to offer solutions that ensure reliable and private data exchanges. Its cloud platform supports distributed computing, allowing enterprises to engage in joint data processing, multi-party data modeling, and secure storage. Impulse Network also facilitates trusted supply chain finance and cross-chain services, promoting safe and collaborative data circulation among various organizations. By leveraging these technologies, Impulse Network aims to establish a robust infrastructure for Web3.0, emphasizing privacy, security, and decentralization in data operations.
Observable offers Network Security-as-a-Service providing automated security analytics and modeling to continuously analyze the behavior of all network devices. Observable Networks, the Clayton-based network security startup.
Sensys Networks, Inc. is a wireless technology company specializing in integrated traffic data systems and traffic management solutions. It provides a range of products including FlexMag sensors for vehicle detection, MicroRadar for bicycle detection, and technology for collecting MAC addresses from Bluetooth or Wi-Fi devices. The company also offers solutions such as FlexControl, Access Point Controller Cards, and Repeaters to manage communications and data processing for wireless sensor networks. Additionally, Sensys Networks provides SNAPS, a software solution for automated vehicle detection data processing, VIMS Analyzer for cloud-based vehicle identification, and TrafficDOT for configuration management. The company’s offerings cater to various traffic management needs, including adaptive control, parking detection, and travel time measurement. Sensys Networks serves a global customer base, with over 150 clients across North America, Europe, Asia, and beyond. Founded in 2003 and based in Berkeley, California, Sensys Networks operates as a subsidiary of TagMaster AB.
Private Machines was founded by world-renowned Computer Science PhDs and Professors doing research in Cyber Security and Cloud Computing for decades. We have PhDs write security proofs for our technology and certify it with NIST. They do not believe in pseudo-security or security by obscurity. They do not use “order preserving” encryption, “tokenization” or other marketing-driven approaches. Security is extremely difficult to get right and the devil always lies in the details.
Adrenaline Mobility specializes in providing secure backend services for mobile applications, focusing on enhancing development processes while ensuring data protection. The company employs military-grade end-to-end encryption to safeguard users' information both at rest on mobile devices and in transit to cloud servers. Adrenaline offers a developer-friendly library that simplifies the integration of encrypted data storage in popular cloud platforms such as Amazon, Google, and Dropbox. This allows developers to bypass complex security challenges, including key management and encrypted query processing. Additionally, Adrenaline's cloud-based services include features like push notifications, distributed storage, a web-based console for user management, and messaging capabilities, facilitating the seamless incorporation of robust backend functionality into mobile applications, ultimately improving the user experience.
Veriflow is a technology company that focuses on enhancing network security and reliability through formal verification of network infrastructure. Founded in 2013 and headquartered in San Jose, California, Veriflow employs continuous network verification technology to predict potential outages and vulnerabilities before they can impact business operations. This proactive approach allows IT teams to maintain secure and resilient networks by identifying and addressing issues quickly, often in just a few clicks. Supported by notable investors such as New Enterprise Associates, Menlo Ventures, the National Science Foundation, and the U.S. Department of Defense, Veriflow is dedicated to ensuring that enterprises can effectively manage their network performance and security.
Numerica Corporation specializes in space domain awareness, focusing on the detection, tracking, and characterization of factors that could impact space operations and the security of the nation and its allies. The company operates a multiple target tracking platform that provides data fusion services across space, air, and missile defense sectors. Its platform enhances precision domain awareness in space and supports advanced surveillance for critical air defense missions. By ensuring the safety of homeland security through missile defense systems, Numerica enables law enforcement, government, and industry clients to engage in data-driven strategic planning and management for various operational needs.
SecondWrite LLC specializes in creating automated malware analysis solutions aimed at detecting advanced persistent threats (APTs), targeted attacks, and zero-day evasions. The company's flagship product, the SecondWrite Sandbox, is designed to identify evasive malware, capture indicators of compromise (IOCs), and process various file types while integrating seamlessly with existing security systems. Founded in 2010 and based in College Park, Maryland, SecondWrite serves a diverse clientele that includes network security providers, endpoint security firms, security operations centers (SOCs) at enterprises, managed security service providers (MSSPs), incident response teams, and threat intelligence vendors. The company's technology, developed in collaboration with university partners, employs a patent-pending approach that reveals hidden paths in malware and executes them to ensure comprehensive code coverage.
Pindrop Security, Inc. specializes in providing enterprise solutions to secure phone and voice communications, focusing on fraud prevention and customer verification. The company has developed patented technologies, including Phoneprinting, which analyzes phone calls to identify malicious behaviors and confirm legitimate callers. Additionally, Pindrop Express offers a risk-based authentication solution that validates customer phone numbers before calls reach contact centers. Its services are designed to combat various fraud tactics, such as caller ID spoofing and social engineering. Pindrop's solutions are utilized by numerous sectors, including finance, healthcare, insurance, retail, and travel, helping organizations detect fraudulent activities and authenticate callers efficiently. Established in 2011 and headquartered in Atlanta, Georgia, Pindrop is backed by prominent venture capital firms and plays a significant role in enhancing security and customer experience in voice interactions.
Observable offers Network Security-as-a-Service providing automated security analytics and modeling to continuously analyze the behavior of all network devices. Observable Networks, the Clayton-based network security startup.
PFP is an agile (cloud-based or on-premise) platform that uses dynamic power behavior analysis to detect dangerous implant-based attacks in hardware, firmware, and configuration. PFP constantly monitors the power behavior of devices/IoT in data centers, critical infrastructure, and more; then, data is sent to the cloud where PFP detects malicious actors; dashboards display continuous monitoring and/or are alerted. Remediation occurs with or without human interaction. PFP then has continuous monitoring 24/7 which authenticates, detects, and remediates.
Private Machines was founded by world-renowned Computer Science PhDs and Professors doing research in Cyber Security and Cloud Computing for decades. We have PhDs write security proofs for our technology and certify it with NIST. They do not believe in pseudo-security or security by obscurity. They do not use “order preserving” encryption, “tokenization” or other marketing-driven approaches. Security is extremely difficult to get right and the devil always lies in the details.
BitSight Technologies, Inc., founded in 2011 and based in Boston, Massachusetts, specializes in data analytics and security software focused on managing information security risks. The company offers a Security Ratings Platform that utilizes sophisticated algorithms to generate daily security ratings, which range from 250 to 900. These ratings assist organizations in managing third-party risk, underwriting cyber insurance policies, benchmarking performance, conducting mergers and acquisitions due diligence, and assessing aggregate risk. BitSight's technology is widely adopted, with over 1,000 customers, including major cyber insurers, Fortune 500 companies, and leading investment banks, who rely on its services for critical risk and business decision-making. The platform is recognized as the most widely used Security Ratings Service globally.
BitSight Technologies, Inc., founded in 2011 and based in Boston, Massachusetts, specializes in data analytics and security software focused on managing information security risks. The company offers a Security Ratings Platform that utilizes sophisticated algorithms to generate daily security ratings, which range from 250 to 900. These ratings assist organizations in managing third-party risk, underwriting cyber insurance policies, benchmarking performance, conducting mergers and acquisitions due diligence, and assessing aggregate risk. BitSight's technology is widely adopted, with over 1,000 customers, including major cyber insurers, Fortune 500 companies, and leading investment banks, who rely on its services for critical risk and business decision-making. The platform is recognized as the most widely used Security Ratings Service globally.
Whisper Communications is an Atlanta-based company that specializes in wireless networking services, leveraging innovative physical layer security technologies. Utilizing a patent-pending encoding methodology developed from research at the Georgia Institute of Technology, Whisper's technology ensures that data signals transmitted beyond its designated "cone of silence" are rendered meaningless to potential eavesdroppers. This approach allows IT companies to effectively monitor, track, and control devices located in fixed environments, enhancing data security by linking it to proximity to the data source. Whisper Communications aims to provide robust solutions that address the growing need for secure wireless communication in various sectors.
NortonLifeLock Inc. is a prominent company in the field of consumer cyber safety, focusing on securing the digital lives of around 50 million users. The company offers a range of services designed to protect devices, identities, and online privacy, while also addressing the needs of families in an increasingly complex digital landscape. By providing reliable security solutions, NortonLifeLock aims to be a trusted partner for consumers navigating various online threats and challenges.
Spot something off? Help us improve by flagging any incorrect or outdated information. Just email us at support@teaserclub.com. Your feedback is most welcome.