Ghost Security provides the standard in application security for modern enterprises.
HiddenLayer is a provider of security solutions for machine learning algorithms and models. The company offers threat modeling, ML risk assessment training, and red team assessment services, as well as AI and ML model scanning. The company also offer MLs detection and response implementation services.
Petabyte scale, high performance, 10x easier, 10x cheaper, open source observability platform for everyone.
Passage is a modern identity for web and mobile applications. Passage is an innovator in the rapidly growing passwordless identity space. Founded in 2021, Passage is headquartered in Austin, Texas, United States.
Evo Security is a cybersecurity SaaS company that offers a multi-factor authentications solution called Evo MFA, which is designed specifically for MSP's, MSSP's, VAR's and Distributors/Agents as a re-sellable, white-labeled solution for their SME and SMB customers. With Evo Security, users can eradicate credential sharing, set up potent administrative permissions, implement login security en masse for their clients, and fulfill insurance and compliance standards.
Kibsi is an end-to-end, fully integrated environment designed for building computer vision applications. Our cloud native, low-code platform democratizes computer vision, allowing customers to focus on their business needs, not the complexity.
Zenduty is a provider of end-to-end incident alerting, on-call management and response orchestration platform.
At Accurics™, we envision a world where organizations can innovate in the cloud with confidence. Our mission is to enable cyber resilience through self-healing as organizations embrace cloud native infrastructure. The Accurics platform self-heals cloud native infrastructure by codifying security throughout the development lifecycle. It programmatically detects and resolves risks across Infrastructure as Code before infrastructure is provisioned, and maintains the secure posture in runtime by programmatically mitigating risks from changes. Accurics enables organizations of all sizes to achieve cloud cyber resilience through free cloud-based and open source tools such as Terrascan™.
Polly is a survey platform that helps teams to quickly collect feedback, allowing them to measure their workflows and improve employee and customer experiences. Its notable clients include Soylent, Auth0, and Grammarly. The company was founded in 2015 by former Microsoft engineers Samir Diwan and Bilal Aijazi. The startup is backed by Amplify Partners, Slack Fund, Fathom Capital, and Madrona Venture Group.
CloudKnox (2020 Gartner Cool Vendor for IAM) has built a multi-cloud permissions management platform that protects critical cloud infrastructure resources and identities by providing comprehensive visibility and enabling continuous, automated management of permissions (granted versus used) using patented Activity-Based Authorization technology. This platform continuously monitors, detects, and remediates over-permissioned machine and human identities across cloud infrastructure.
Cobalt infuses pentesting with speed, simplicity, and transparency. Our award-winning Pentest as a Service (PtaaS) model empowers organizations to keep pace with modern software development lifecycles in an agile world. Thousands of customers and hundreds of partners rely on Cobalt’s SaaS platform and closed community of more than 400 testers. We deliver pentests that support business drivers, maximize internal resources, and create stronger security programs so that organizations can maintain their competitive edge and velocity of innovation.
Tala provides security solutions to protect enterprise websites against formjacking, magecart, and advanced attacks. It helps websites and web apps enable a completely secure web experience for users. It has developed a completely agent-less solution that leverages new and powerful web standards such as Content Security Policy (CSP). The solution is fully automated and is compatible with all web technologies. This means that any website could use Tala to protect all of their end-users against web layer attacks, in a matter of minutes. Tala is led by industry veterans and successful entrepreneurs and is backed by VCs, angels and former executives at Symantec, and by the National Science Foundation (NSF).
Attivo Networks provides required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Attivo Networks provides accurate in-network threat detection, analysis, and accelerated response to advanced, credential, insider, and ransomware attacks. The Attivo Deception and Response Platform provide continuous visibility and efficient threat management for user networks, data centers, cloud, branch, IoT, ICS-SCADA, and POS environments. Camouflage dynamic deception sets high-interaction traps to misdirect and lure attackers into revealing themselves. The solution’s advanced attack analysis and lateral movement tracking automate investigation, and deliver evidence-based alerts, and in-depth forensic reports. Incident response is simplified with ThreatOps™ playbooks and 3rd party integrations for automated attack blocking, quarantine, and threat hunting.
Section is an Edge Compute Platform that enables engineers to run any workload, anywhere, underpinned by modern DevOps principles. It now has offices in both Sydney, Australia, and Boulder, Colorado, and is backed by major Venture Capital groups including Foundry Group and Techstars Ventures. The Section team is comprised of dedicated individuals who come from diverse backgrounds in engineering, agile development, marketing, sales, and product. Section's industry-leading edge compute platform gives engineers the flexibility and control to run any workload, anywhere, underpinned by modern DevOps principles. With its container-based (Docker/Kubernetes) approach to HTTP traffic delivery, the platform includes an extensive library of highly available and highly performant edge compute modules that can be deployed anywhere along the edge continuum, including the ability to build/bring your own edge containers. Section operates across the HTTP delivery path from origin to distributed network, is hosting provider-agnostic (cloud, on-premise, self-hosted), and has already been proven to address challenges far beyond traditional CDN workloads. Section was founded in Australia in 2012 and moved its headquarters to the US in 2016.
CyberGRX provides the most comprehensive third-party cyber risk management platform to cost-effectively identify, assess, mitigate and monitor an enterprise’s risk exposure across its entire partner ecosystem. Through automation and advanced analytics, the CyberGRX solution enables enterprises to collaboratively mitigate threats presented from their increasing interdependency on vendors, partners and customers. CyberGRX is based in Denver, CO. For more information, visit www.cybergrx.com or follow @CyberGRX on Twitter.
Tigera provides Calico, a unified network security and observability platform to prevent, detect and mitigate security breaches in Kubernetes clusters. Tigera’s open-source offering, Calico Open Source, is the most widely adopted container networking and security solution. Powering more than 100M containers across 8M+ nodes in 166 countries, Calico software is supported across all major cloud providers and Kubernetes distributions, and is used by leading companies including Discover, Chipotle, NBCUniversal, HanseMerkur, Box, Siemens Healthineers, Playtech, Royal Bank of Canada, and Bell Canada.
Demisto Enterprise is a security operations platform that combines intelligent automation and collaboration into a single ChatOps interface. It combines security orchestration and automation, incident management, and interactive investigation to help security teams meet these challenges and best leverage existing and new security investments. Demisto’s automation is provided by DBot who interacts with your team via ChatOps for playbook-based workflows, cross-correlation, and information sharing, helping security teams scale while working and learning the way humans are wired to – together. The company was founded in 2015 and is based in Cupertino, California.
JASK is modernizing security operations by delivering an advanced SIEM platform that provides better visibility, better automation and a better architecture. Built on cloud-native technologies, the JASK ASOC platform streamlines security analyst workflows by automating many of the repetitive tasks that restrict productivity, freeing them for higher-value roles like threat hunting and vulnerability management, while addressing the escalating talent shortage.
Icebrg is a provider of a network security software platform intended for risk reduction. It provides a machine-recognition-based platform that allows business developers to deploy enterprise-level security without writing custom code to protect proprietary and consumer data that enable organizations and governments to respond rapidly by reducing risk while cutting mean time to respond with real-time forensics. Icebrg was founded in 2014 and is headquartered in Seattle, Washington.
KeyNexus is a cloud-based encryption-key storage and provisioning service purpose-built for developers of Cloud-based, Enterprise, SaaS or Mobile applications. Secured and powered by FIPS 140-2 compliant, enterprise-grade encryption appliances, KeyNexus allows businesses to employ encryption in their cloud or enterprise environments while maintaining secure, offsite storage of their encryption keys, effectively separating the lock from the key.
Spot something off? Help us improve by flagging any incorrect or outdated information. Just email us at
support@teaserclub.com. Your feedback is most welcome.