Automox
Cloud Based Patch Manager
Keep Windows, OS X & Linux system free from vulnerabilities
Automox
Threat Intelligence Gateway
Blocks more than 100m IOCs increasing SOC efficiency
Contrast
Runtime Application Self Protection
Stop web attacks from within the web application
Cybrary
Cyber Training & Recruiting
Build your cyber training program & use it to recruit new hires
Department 13
Counter Drone Solution
Detects & prevents drone usage with non-jamming & non-kinetic techniques
Eastwind
Network Breach Detection
Security analytics & forensics of cloud telemetry (O365, Salesforce, .etc) & on-premise network traffic
Gravwell
Large Scale Data Analytics
High performance data analytics, ideal for threat hunting & working with petabytes of data
Highside
Mobile & Desktop Collaboration
More secure & scalable alternative to Slack with cloud & on-premise options
Huntress
Breach Detection
Detects malicious persistence on Windows computers for MSPs & MSSPs
Inky
Phishing Prevention
Prevents false emails through artificial intelligence & machine learning
NanoVMs
Unikernel Infrastructure
Run legacy & modern apps faster, safer & with less cost using single process unikernels
NewEdge
Cloud First VPN
Enable access to data-center & cloud apps without exposing Internet ports
OnionID
Privileged Account Management
Control & monitor IT admin activity to cloud & SaaS apps
Pixm
Endpoint Phishing Prevention
Stops phishing attacks with computer vision
Polarity
Memory augmentation platform
Makes cyber teams smarter with interactive heads up displays & threat intelligence enrichment
Protego
Serverless Security
Monitor AWS Lambda applications for permission vulnerabilities & security issues
Racktop
Software Defined Data Storage
Advanced security, encryption, monitoring & compliance controls
Secondwrite
Deep Learning Malware Analysis
Forces evasive malware to detonate through binary re-writing
StackRox
Container Adaptive Threat Protection
Docker/DevOps security monitoring & intrusion prevention
Scythe
Continuous Red Team Automation
Makes red teams more efficient & provides realistic blue team training
ThreatConnect
Threat Intel Platform
Organizes threat intel & playbooks across all security products
Tala
Stops Web Browser Attacks
Agentless web layer attack protection for PCs & mobile devices
ThreatCare
Automated Breach Simulation
Performs benign network & system attack simulations
TrackOff
Online Identity Protection
Protects your identity & assets from data miners & ID thieves
WhiteOps
Web Advertising Fraud Prevention
Saves advertising budget by removing botnets from web leads