MACH37
MACH37 is the premier accelerator for entrepreneurs and startups that are solving important problems in the fields of cybersecurity, autonomous vehicles, artificial intelligence, cyber-physical systems, IoT, industrial controls, or other cyber-related fields where security is critically important. We go beyond the traditional model of typical startup accelerators by bringing our innovators focused mentorship and support from our exclusive Stars Mentor Network that is comprised of visionaries, practitioners, and successful entrepreneurs from across the cyber industry. Twice a year, MACH37 invests in a cohort of 5-10 cyber startups, each of which participates in an intensive 3-month program that emphasizes coaching, mentorship, and validation of their solution for product/market fit. Throughout the program, startups are introduced to investors and key public and private sector organizations in the Washington DC metro area. Our program is designed to propel cyber startups into the marketplace, equipped with the skills to connect with customers, grow and compete for funding, and generate traction. The program culminates with a Demo Day presentation to 150-200 investors. MACH37 was established in 2013 as a division of the Virginia-based Center for Innovative Technology (CIT) with funding from the Commonwealth of Virginia. In 2017 CIT partnered with VentureScope, a strategic innovation consultancy and venture investment firm, to revamp MACH37's operating model and curriculum. In 2018, VentureScope acquired majority ownership of MACH37. Following a successful partnership between CIT and VentureScope, MACH37 became fully owned and operated by VentureScope in 2020. MACH37 focuses primarily on honing and strengthening startups' product-market fit through extensive customer discovery and market research, expanding emerging companies' professional networks, fostering founder wellbeing, and providing emerging companies in the cyber security industry with access to investment capital and an immediate customer base. In an October 2020 article, Forbes named MACH37 'the Granddaddy' of top cyber accelerators giving a nod to the fact that MACH37 was one of the first accelerators in the world dedicated to cyber and cyber adjacent technologies and has lasted far longer than many of its peer accelerators while strengthening over time. The name 'MACH37' is a reference to the escape velocity of Earth's atmosphere and the accelerator's goal to help cyber startups GET LAUNCHED. VentureScope receives 5% equity from each MACH37 startup. Qualifying MACH37 startups are also eligible for an equity investment.
HyperQube is a “cyber range as a service” offering that enables enterprises to quickly and easily build an exact copy of any IT infrastructure. Their virtualized test environments can be built in minutes and just as easily modified, re-used and shared. With the ability to look to the future and explore infrastructures in a risk-free environment, engineers will save hours on labor, security officers will feel assured and executives will conserve thousands of dollars.
Hideez is a cybersecurity startup providing the last-mile solution for a physical and logical access. We are Mach37 cybersecurity accelerator alumni with offices in USA and Ukraine (R&D).
We've created and introduced to the market the Hideez Key – hybrid (hardware + software) solution for wireless authentication, password management, credentials for RFID doors and digital signature.
Hideez Key is based on encrypted Bluetooth connectivity, RFID, and NFC technologies.
Key features:
Hybrid functionality, adaptivity and world-class security | Proprietary encryption protocols | Platform agnostic | B2B and B2C ready | Supplement to the existing market solutions by the top vendors
We help to protect your digital valuables and make complex IAAM solutions easy and convenient.
HyperQube is a “cyber range as a service” offering that enables enterprises to quickly and easily build an exact copy of any IT infrastructure. Their virtualized test environments can be built in minutes and just as easily modified, re-used and shared. With the ability to look to the future and explore infrastructures in a risk-free environment, engineers will save hours on labor, security officers will feel assured and executives will conserve thousands of dollars.
INFRA is a complete platform for Monitoring and Vulnerability Assessment, from Information Gathering to Vulnerability Scanning, including Web Application Fuzzing and DataBase Scanning, Automated Exploiting and Integration with other software. Their platforms are completely automated, Corporate friendly and available in many many languages.
Having more devices in the home means more risk for one’s personal data. For most people, preventing viruses and other threats from compromising their data is complicated - especially as they add more devices to their home networks. Our router add-on, which plugs straight into the router and sets up in seconds, stays up to date and keeps all the devices in the home secure with no effort.
NS8 Inc. is a fraud prevention and user experience protection platform based in Las Vegas, Nevada, with additional offices in Miami Beach, Florida, and Amsterdam, the Netherlands. Founded in 2016, the company offers a suite of tools designed to help online businesses minimize risk through its NS8 Antifraud platform. This platform utilizes machine learning, behavioral analytics, real-time scoring, and fraud pattern detection to identify and address fraudulent activities. It provides insights into bot detection and hidden session segmentation, enabling users to understand effective traffic sources. Additionally, NS8's platform offers consumer metrics that allow businesses to display customized content and track the performance of various sales techniques. The company serves a diverse range of industries, including ecommerce platforms, online merchants, payment gateways, and event ticketing sectors. In October 2020, NS8 filed for reorganization under Chapter 11 in the U.S. Bankruptcy Court for the District of Delaware.
At PCPursuit, our mission is to make information security effective, affordable and easy to use. Our unconventional approach to security—tying badge swipes to Windows logins—delivers unparalleled value to customers and unmatched ease of use. The business is robustly designed with multiple revenue streams (including software, services and maintenance) and we have “future proofed” our product roadmap to account for migration to the cloud. Our powerful “badge in to log in” solution is less expensive, faster and easier to implement than any competing solution. PCPursuit’s technology delivers unparalleled value to our customers because it instantly solves two of the industry’s most intractable information security problems: weak passwords and tailgating. Best of all, our product does this at very low cost because PCPursuit simply adds new capabilities to the assets our customers already own. Our flagship product, PCPursuit, integrates Microsoft Windows Active Directory with cardkey security access management (CSAM) systems. We will initially integrate with Genetec and Honeywell, and plan to add additional integrations with all leading physical access control system (PACS) vendors. As is typical in the industry, we additionally plan to offer integration, support and software maintenance services.
Anatrope
Seed Round in 2015
Anatrope develops fleet management, geo-fencing, and fee collection sensor technology for personal and commercial automobile industry. The company is based in the United States.
Companies today have a lack of visibility and control over their networks. Eunomic creates software for network switches that takes away the attacker’s advantage and makes critical networks secure. Their solution runs on commodity processors to reduce the total cost of ownership.
JeKudo is focused on creating user-friendly privacy tools, with an emphasis on group messaging applications. The company has developed a platform that enables users to engage in private chats with selected friends and colleagues, allowing them to share content and messages securely. Led by CEO Elissa Shevinsky, JeKudo has garnered support from the Mach37 cyber-security accelerator in Northern Virginia, positioning itself to enhance communication while prioritizing user privacy.
Atomicorp Ltd. develops security solutions for the protection and support of cloud, virtual, shared, and dedicated Web hosting environments. It offers Atomic Secured Linux, a security solution for Linux Web servers that provides solutions for site defacement and comment spams, Web application vulnerabilities, PCI-DSS and other regulatory compliance, rootkits and malware, denial of service attacks, XML attacks, SQL injections and cross site scripting, CSRF attacks, file and code injections, cookie and credential thefts, persistent threats, recursion attacks, data thefts and information leakages, malware uploads, and more. The company also offers Atomicorp GotRoot ModSecurity Rules, a Web server module that allows users to build a Web application firewall to protect Web applications; Atomicorp Nucleus Repository, a commercial archive that provides PHP 5.3 and related legacy support packages; and Atomicorp Repository, a Linux/MySQL/PHP archive. In addition, it offers a database of signatures, rules, and countermeasures against metacharacter attacks, remote code inclusion, XML schema attacks, buffer overflows, LDAP injection, dangling pointer attacks, and other application and Web based attacks. The company serves commercial enterprises and government agencies. It also sells its products online. The company was founded in 2007 and is based in Chantilly, Virginia. Atomicorp Ltd. operates as a subsidiary of Prometheus Global, Inc.
PierceMatrix (formerly PierceGTI) is a security product company that reduces your risk chain exposure. It shares information on known threats, learns about new threats and provides reports, dashboards and targeted recommendations to help you secure your network. Pierce uses artificial intelligence developed for the US military and a unique distributed architecture to optimize your security processes so you spend less time researching security problems and more time fixing security problems! Pierce uses the information gathered from thousands of client networks and industry data sources to detect botnets, attackers, compromised machines, and corporate IP reputation. The Pierce dashboard and reports provide you with up-to-the minute security intelligence on your risk chain.
BiJoTi offers Security Performance Monitoring. BiJoTi provides next generation security event correlation, vulnerability detection and case management. This makes compliance and security an informed, continuous process. BiJoTi's Security Performance Monitoring automates making healthy and effective cybersecurity decisions.
Syncurity unifies security teams with solutions that optimize and integrate people, processes, and technology to realize better cybersecurity outcomes. Their solution IR-Flow, a rapidly deployable cybersecurity incident response (IR) workspace, helps security professionals streamline their operations, embed smart compliance, and transition to a collaborative IR process to produce better outcomes. This virtual SOC is scalable from small business to full enterprise deployments.
It was acquired by Swinlane.
Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users. Virgil Security’s encryption libraries and services, along with an accompanying public key management infrastructure, ease the pain of developing, deploying, and using strong cryptography. Virgil Security enables a new generation of enhanced privacy and security for applications, cloud services, and the Internet of Things.
Threatcare’s automated Breach and Attack Simulation solutions provide real-time insights and actionable recommendations that enable organizations to build, measure, and maintain strong cybersecurity programs.
SecureDB provides an encrypted User Management as a Service to Web and Mobile developers. SecureDB stores Authentication Credentials, Account Profile information, Credit Card information, PII and PHI securely, on the cloud (or on premise).
Fast Orientation, Inc., founded in 2014 and based in Washington, D.C., provides organizations with tools to analyze and respond to enterprise events in real time. The company’s products enable businesses to make informed decisions regarding security and operations by automatically identifying patterns and anomalies within their IT environments. Fast Orientation offers critical insights through rich semantic profiles of user, device, and application activities, which are often lacking in other security solutions. The user-friendly interface allows IT and risk professionals to easily pose questions and quickly find answers, significantly reducing response times and fostering a culture of continuous awareness and operational health.
AXON Ghost Sentinel, Inc. has pivoted away from security, all founders and execs have moved on and company is now called AxonAI.
IDentia, Inc. provides identity and access control management services for identity trust and privacy protection. It offers IDentia, an identity as a service solution for enterprises in support of cloud computing. The company’s products also include IDentia Identity Provider that provides centralized user authentication capabilities for distributed Web applications and services; IDentia Attribute Service, a security assertion markup language compliant Web service to support attribute queries and assertion; IDentia Policy Admin Service that provides policy store and lifecycle management to ensure policy creation and distribution to various policy decision and enforcement points across the enterprise; and IDentia RP, a client component for enabling Web applications and services with user authentication. IDentia, Inc. was incorporated in 2014 and is headquartered in Herndon, Virginia.
DISRUPT6, Inc. develops security platform for gathering and analyzing data in a full dual stack environment. The company provides early-warnings of threats based on cyber-attack profiling, data monitoring, and enhanced attribution analytics. Its platform offers visibility into customer migration, workflow management, and intrusion detection. DISRUPT6, Inc. was founded in 2001 and is based in Leesburg, Virginia.
CardKill Inc. develops a software package that automatically locates and terminates stolen credit and debit cards before fraudulent transactions occur. Its platform identifies cash-out transactions and blocks the purchase during the authorization cycle. CardKill Inc. is based in Largo, Florida with an additional location in Herndon, Virginia.
MSB, Incorporated provides cybersecurity, systems development and engineering, and program management services for government, institutional, and commercial enterprises. It offers life-cycle management support, information technology consulting, technical and software engineering, internal revenue, and monitoring analysis services; and assessing, planning, executing, and monitoring services. The company serves the Department of Homeland Security. MSB, Incorporated was incorporated in 1997 and is headquartered in Alexandria, Virginia.
Sikernes Risk Management, Inc. is a company that specializes in cloud-based cybersecurity analytics software designed for organizations of all sizes. Founded in 2011 and headquartered in Bozeman, Montana, the company’s software helps risk managers, IT analysts, security analysts, and business analysts assess and optimize cybersecurity effectiveness. By incorporating a comprehensive view of threats, technologies, security controls, policies, and potential consequences, Sikernes Risk Management enables organizations to reduce their risk exposure while maximizing the return on investment in existing security infrastructure. Its automated and actionable threat and vulnerability analysis provides valuable insights for enhancing overall security strategies.
Key Cybersecurity, Inc. specializes in digital forensics solutions aimed at monitoring and reporting abusive behavior related to file downloading and sharing. The company's primary product, CyberMerlin, is a sophisticated hash algorithm and vision technology forensics tool designed to proactively identify illicit files and the activities of malicious users across commercial, federal, and educational networks. This innovative solution addresses both known and unknown files that existing security measures may overlook. CyberMerlin automatically monitors network activity, provides alerts, and generates comprehensive forensics reports to assist investigators and law enforcement agencies. Founded in 2013 and headquartered in Dumfries, Virginia, Key Cybersecurity is dedicated to enhancing the cybersecurity landscape with its advanced monitoring and reporting capabilities.
Conatix is reinventing business research, helping companies to do market, investment and strategic research better, faster and cheaper. Conatix is building a semi-automated business intelligence system based on recent advances in machine learning to enable companies to discover, source, structure and share previously unstructured data and information from outside their organizations. The system will be licensed to companies to use for all of their research work on a per-month, per-seat online knowledge management as a service (KaaS) basis. Conatix disrupts the business research value chain: rethinking online search and discovery, organizing the research process, creating a system that learns, and iterating the process to create knowledge that scales. Companies need to do more than one-off keyword searches using an advertising-driven consumer search tool. Conatix does not just sell a technical solution to the narrow problem of internet search, or a search engine. Conatix sells an end-to-end business system solving a business problem to a business customer, developed in response to a real business need.