Founded in 2017 by cloud and cybersecurity experts, Orkus has solved the most critical, hard-to-manage risk vector that enterprises face today in hybrid cloud computing - securing access to data, applications, and infrastructure. The Orkus Access Governance platform enables companies to prevent data exposure, tighten privileged identity access and protect critical infrastructure and applications from unauthorized access. Orkus is privately funded and based in San Jose, CA. For more information visit https://www.orkus.com.
Aqua Security enables enterprises to secure their virtual container environments from development to production, accelerating container adoption and bridging the gap between DevOps and IT security. Aqua’s Container Security Platform provides full visibility into container activity, allowing organizations to detect and prevent suspicious activity and attacks in real time. Integrated with container lifecycle and orchestration tools, the Aqua platform provides transparent, automated security while helping to enforce policy and simplify regulatory compliance. Aqua was founded and backed by TLV Partners, Microsoft Ventures, and IT security leaders, and is based in Israel and San Francisco, CA. For more information, visit www.aquasec.com or follow us on twitter.com/AquaSecTeam.
Founded in 2013 by IDF cyber experts, CyberX provides the most widely deployed platform for securing industrial control systems (ICS). The CyberX platform combines continuous, non-invasive vulnerability monitoring and advanced behavioral analytics with proprietary ICS-specific threat intelligence. This enables critical infrastructure and industrial organizations to immediately detect risk and mitigate risk, including targeted threats and industrial malware in their Operational Technology (OT) networks.
CyberX has racked up numerous awards and industry accolades including being named a "Cool Vendor" by Gartner. CyberX is also the only industrial cybersecurity vendor selected for the SINET16 Innovator Award sponsored by the US DHS and DoD, and the only ICS security vendor recognized by the International Society of Automation (ISA).
An active member of the Industrial Internet Consortium (IIC) and the ICS-ISAC, CyberX also provides groundbreaking ICS threat intelligence research that was recently featured in the popular McGraw-Hill book series, "Hacking Exposed ICS." For more information visit CyberX-Labs.com.
Founded by members of the Israeli military's elite cyber-security corps, Unit 8200, Cybereason's technology is based on their deep understanding of complex hacking operations. The Cybereason Endpoint Detection and Response Platform leverages big data, behavioral analytics and machine learning to uncover, in real time, complex cyber attacks designed to evade traditional defenses. It automates the forensic investigation process, connects isolated malicious events and visually presents the full malicious operation. The platform is available as either an on-premise solution or a cloud-based service. Cybereason is privately held and headquartered in Boston with offices in Tel Aviv, Israel.
For more information, visit www.cybereason.com.
- Agiliance Inc.
- AirTight Network
- Avancer, Inc.
- Center for Internet Security
- Certicom, Inc.
- Check Point Software Technologies, Inc.
- CREDANT Technologies, Inc.
- Cydelity (acquired by Digital River in 2006)
- Granite Edge Networks (now called Vantos)
- GreenBorder (sold to Google in 2006)
- The Institute for Cyber Security at the University of Texas at San Antonio
- The Intrepidus Group
- IP Wireless
- KSR, Inc.
- Safe Mashups Inc.
- Secure Islands (acquired by Microsoft in 2015)
- Sybari Software (sold to Microsoft in 2004)
- Sygate (sold to Symantec in 2005)
- Thor Technologies (sold to Oracle in 2005)
- TriCipher (acquired by VMware in 2010)
- Trigo (sold to IBM in 2004)
- Uroam (sold to F5 Networks in 2004)
- Wombat Security Technologies
- Xceedium Inc.