QR codes systems for COVID-19.
Simple tools for bars, restaurants, offices, and other small proximity businesses.
Identity And Access Management Microservices
IAM Dockables are implemented as autonomous services that; integrate and future proof existing IAM services, pack a powerful punch, are easily orchestrated, and run anywhere. Microservices introduce an agile and lightweight approach to building customer's IAM services. ...
Thoughtful Home Protection
BeON takes the familiar light bulb form factor and creates a solution that makes security and safety available and accessible for everyone, every day. Home security works best in layers, and the best home security starts before the break-in happens. BeON embraces ...
The best self-installed wireless home security system.
For 100 years the home security industry has been selling outdated technology at highway-robbery prices. Often sales reps will try to scare customers into signing long-term contracts that are full of nasty fine print. We believe being safe should be simple. SimpliSafe ...
The referral community
Invitation App is a social network where people post their referral codes and collect rewards on autopilot.
Investing in the next generation of cyber security startups
To provide opportunities for members to obtain outstanding financial returns by investing in early-stage cyber security companies and accelerating them to market leadership.
Impostor Detection technology prevents targeted phishing attacks
Target, Boston University, New York Times have all been victims of targeted email phishing attacks. Hackers use names and email addresses of known contacts and brands to get employees to open emails and unwittingly share credentials or get infected. AstraID's ...
McAfee SiteAdvisor software is a free browser plug-in that provides simple Web site safety ratings and a Secure Search box so you can surf, search and shop more safely.
Invite-only mailing list.
We search the best weekend and long-haul flight deals so you can book before everyone else.
Eliminate APT attacks
UTAR builds a high level of trust in users identity and uses big data to identify APT attacks.
Continuous Security Monitoring
Threat Stack provides continuous security monitoring for public, private, and hybrid cloud infrastructures protecting servers, and the data they access, from intrusion and data loss. Built in the cloud, for the cloud, Threat Stack is the first and only intrusion ...
Protects consumers by unmasking online counterfeits
FACT ONE: "The sale of counterfeit products online is a $250 billion-a-year problem." FACT TWO: "8 out of 10 online counterfeit purchases are made by "duped" consumers who were simply trying bargain-shop online." Counterfy is a first-of-its-kind anti-counterfeit ...
Predictive, collective threat intelligence.
GreatHorn is the world's first big-data driven predictive security platform, using deep learning to help information security professionals understand threats before they become breaches, and reducing the time, cost, and experience required to meet complex regulatory ...
BitSight is a well funded startup and is quickly establishing itself as the standard for security ratings.
The online privacy company
We're the leader in consumer online privacy. BLUR protects PASSWORDS, PAYMENTS, AND PRIVACY. https://www.abine.com/index.html Our mission, unchanged since 2009, is to put everyday consumers back in control of their identity and their privacy. The security, ...