Members directory

Bastille Networks Internet Security

Founded in 2014, Bastille is the leader in enterprise threat detection through software-defined radio. Bastille provides full visibility into the known and unknown mobile, wireless and Internet of Things (IoT) devices inside an enterprise?s corporate airspace ? together known as the Internet of Radios. Through its patented software-defined radio and machine learning technology, Bastille senses, identifies and localizes threats, providing security teams the ability to accurately quantify risk and mitigate airborne threats that could pose a danger to network infrastructure.

Bayshore Networks Inc.

Industrial Cyber Protection. Bayshore Networks? is the cyber protection leader for the Industrial Internet of Things (IIOT). Bayshore Networks? offers visibility, control, and protection for industrial Operational Technology, and transforms OT data for IT applications. Incorporating threat intelligence, and filtering open, standard, and proprietary protocols at a deep level, Bayshore parses OT protocol content and context, validating every command and parameter against logic-rich policies. Addressing zero day, internal, and rapidly evolving threats, Bayshore can allow, alert, and/or enforce policy at line speed ? allowing white-listed communication while blocking or modifying unauthorized communication and commands.Bayshore has strategic partnerships with leading technology companies including Yokogawa, SAP, Splunk, Cisco Systems, AT&T, and BAE Systems.


Claroty bridges the industrial cybersecurity gap between information technology (IT) and operational technology (OT) environments. Organizations with highly automated production sites and factories that face significant security and financial risk especially need to bridge this gap. Armed with the Claroty?s converged IT/OT solutions, these enterprises and critical infrastructure operators can leverage their existing IT security processes and technologies to improve the availability, safety, and reliability of their OT assets and networks seamlessly and without requiring downtime or dedicated teams. The result is more uptime and greater efficiency across business and production operations. Backed and adopted by leading industrial automation vendors, Claroty is deployed on all seven continents globally. The company is headquartered in New York City and has received $100 million in funding since being launched by the famed Team8 foundry in 2015.

CyberFlow Analytics

CyberFlow Analytics has been acquired by Webroot! CyberFlow Analytics has developed a disruptive approach to address securing the Industrial Internet of Things and Enterprise IT that uses a combination of Binocular Fusion Analytics, Threat Intelligence and Advanced Visualization. Founded by Dr. Hossein Eslambolchi and Tom Caldwell, CyberFlow Analytics is a San Diego-based startup with offices in San Diego. Steve Nye joined the company in 2016 as President and CEO.. Dr. William Wright leads the design and development of our innovative machine learning analytic for network anomaly detection.


CyberX accelerates digital innovation by delivering the simplest and most robust solution for reducing risk from unmanaged IoT/OT devices. Founded by blue-team experts with a track record of defending critical national infrastructure, CyberX is the only cybersecurity company with a patent for M2M-aware behavioral analytics and machine learning technology.


Dragos, founded by renowned Industrial Control Systems (ICS) practitioners trusted by the U.S. government, ally nations, and global firms to investigate, analyze and protect them from cyberattacks, is the solution industrial organizations have been waiting for. The team?s relentless expertise was honed responding to and analyzing the most significant ICS cyberattacks in history, including the 2015 and 2016 power grid offenses in Ukraine, as well as the 2017 Saudi petrochemical safety system attack. This mastery of known and unknown threats is fused into every aspect of the Dragos Platform, delivering actionable threat insight and playbooks with concise guidance and education that enable any analyst to investigate potential threats like an expert. The company was founded in 2016 and is based in Hanover, Maryland.


ESCRYPT is a pioneer and one of today?s leading solution providers for IoT security. At five German locations and in branch offices in the United Kingdom, Sweden, France, the United States, Canda, China, Korea, and Japan, our experts are concentrating on current data security issues, such as secure M2M communication, IT security in the internet of things, securing e-business models, and automotive security. The security products and solutions we are developing to tackle these issues are valued around the world. They are tailored especially to the requirements of embedded systems and relevant IT infrastructure and have proven themselves millions of times over in automotive production. ESCRYPT is a wholly owned subsidiary of ETAS GmbH and a Robert Bosch GmbH company. Shaping the future Security for the Internet of Things is a fascinating field characterized by new technologies in a fast-growing future market. The challenges in our field are evolving very quickly, so we have to make sure our products and solutions are always at the cutting edge of technological development. That makes working at ESCRYPT very demanding. We identify passionately with our projects and goals, and we share our enthusiasm with our customers and partners. We are proud that our security solutions are helping to shape the future of embedded technologies.

ForeScout Technologies

Forescout Technologies, Inc. actively defends the Enterprise of Things by identifying, segmenting and enforcing compliance of every connected thing. Fortune 1000 companies trust Forescout as it provides the most widely deployed, enterprise-class platform at scale across IT, IoT, and OT managed and unmanaged devices. Forescout arms customers with more device intelligence than any other company in the world, allowing organizations across every industry to accurately classify risk, detect anomalies and quickly remediate cyberthreats without disruption of critical business assets. Don?t just see it. Secure it


ForgeRock?, the leader in digital identity, delivers modern and comprehensive Identity and Access Management solutions for consumers, employees and things to simply and safely access the connected world. Using ForgeRock, more than a thousand global customer organizations orchestrate, manage, and secure the complete lifecycle of identities from dynamic access controls, governance, APIs, and storing authoritative data ? consumable in any cloud or hybrid environment. The company is privately held, and headquartered in San Francisco, California, with offices around the world.


The Fortinet Security Fabric platform secures the largest enterprise, service provider, and government organizations around the world. More than 455,000 customers trust Fortinet to protect their organizations.

Profile picture of ID RnD

ID R&D is an award-winning provider of AI-based voice and face biometrics and liveness detection. With one of the strongest R&D teams in the industry, ID R&D consistently delivers innovative, best-in-class biometric capabilities that raise the bar in terms of usability and performance.


Indegy, a leader in industrial cyber security, protects industrial control system (ICS) networks from cyber threats, malicious insiders and human error. The Indegy Industrial Cybersecurity Suite with Indegy CIRRUS cloud service (ICSaaS), is powered by patented technology that arms security and operations teams with full visibility, security and control of ICS activity and threats. Indegy combines policy-based monitoring, network anomaly detection and signature detection with unique device integrity checks powered by active technology threat detection. Indegy solutions are installed in manufacturing, pharmaceutical, automotive, power and energy, water utilities and other industrial organizations and critical infrastructures around the world.

Inside Secure

Inside Secure (Euronext Paris ? INSD) is at the heart of security solutions for mobile and connected devices, providing software, silicon IP, tools and know-how needed to protect customers? transactions, content, applications, and communications. With its deep security expertise and experience, the company delivers products having advanced and differentiated technical capabilities that span the entire range of security requirement levels to serve the demanding markets of network security, IoT security, content & application protection, mobile payment & banking. Inside Secure?s technology protects solutions for a broad range of customers including service providers, content distributors, security system integrators, device vendors and semiconductor manufacturers.

Ionic Security

With Machina? - the first system of record for data access policy management, encryption key management, and real-time policy enforcement - Ionic enables scalable, sustainable, and consistent data protection, accelerating your innovation initiatives wherever you are in your journey to the cloud


LogRhythm empowers more than 4,000 customers across the globe to measurably mature their security operations program. LogRhythm's award-winning NextGen SIEM Platform delivers comprehensive security analytics; user and entity behavior analytics (UEBA); network detection and response (NDR); and security orchestration, automation, and response (SOAR) within a single, integrated platform for rapid detection, response, and neutralization of threats. Built by security professionals for security professionals, LogRhythm enables security professionals at leading organizations like Cargill, NASA, and XcelEnergy to promote visibility for their cybersecurity program and reduce risk to their organization each and every day. LogRhythm is the only provider to earn the Gartner Peer Insights? Customer Choice for SIEM designation three years in a row.


Mocana provides cyber protection for IoT, operational technology (OT) and mission-critical systems. Our proven on-device cybersecurity software and lifecycle management platform enable manufacturers and industrial companies to build self-defending systems that are tamper-resistant. Mocana?s tightly integrated solutions help companies to minimize the risk of a cyber breach, comply with industry standards, and protect intellectual property by ensuring that devices and processes are trusted end-to-end, from device manufacturing to deployment. Unlike IT network security approaches, Mocana enables devices to protect themselves and prevent malware from being installed. Founded in 2002, Mocana protects more than 100 million devices and is trusted by the world?s largest aerospace, industrial, energy, healthcare, and telecommunications companies


The original pioneers of ICS/SCADA visualization and monitoring, US-owned and operated NexDefense empowers industrial control system operators with the real-time knowledge needed to improve system and process integrity and combat cyber security threats. Through Integrity?, engineers, security and control system operators can covertly maintain direct visibility, insight and awareness over risks to the resiliency of engineered networks without sacrificing productivity or performance. Our technology predates the company, as the US DOE funded and originally developed the software in 2010/2011. Later, the Battelle Energy Alliance signed a Patent and Copyright License giving NexDefense exclusive rights to commercialize its patent-pending Sophia software. Integrity? is the next evolution of Sophia, and the NexDefense Integrity? product suite can be found in utilities, oil & gas, defense & critical infrastructure (incl. water/wastewaster), manufacturing & mining, transportation, and building automation.

Open Web Application Security Project

The Open Web Application Security Project (OWASP) is a worldwide free and open community focused on improving the security of software. Our mission is to make application security "visible,"? so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a 501c3 not-for-profit charitable organization that ensures the ongoing availability and support for our work.

Pwnie Express

Pwnie Express closes the IoT security gap exposed by the deployment of IoT in the enterprise. By continuously identifying and assessing all devices and IoT systems, our security platform prevents IoT based threats from disrupting business operations. All without the need for agents, or changes to network infrastructure.

Red Balloon Security

Red Balloon Security is a venture backed startup cyber security company headquartered in New York City. Our mission is to provide embedded device manufacturers with strong host-based firmware security. We believe all embedded devices require strong protections against malware and intrusions, and seek to provide these protections to our customers. Our key markets include enterprise equipment, automotive, aviation, unified communications, SCADA, Internet-of-Things, network infrastructure and more. There is a vast universe of vulnerable embedded devices deployed around the world that need security. We have created a means to inject our Symbiote host-based security technology onto any device, regardless of CPU type, regardless of functionality, regardless of operating system and without changing the performance and functionality of the device. We do not require access to customer source code, nor do we require manufacturers to change their product design to accommodate our security solution.


SecuriThings enables organizations to protect their IoT devices while maximizing their operational efficiency. SecuriThings Horizon is the first IoTOps solution to provide risk detection, predictive maintenance and automated operations, in one unified view. The software-only solution has been deployed in major airports, universities, cities and large enterprises, and is already monitoring millions of devices globally. SecuriThings has established partnerships with leading system integrators, management systems and device vendors.


Shodan is the world's first search engine for the Internet of Things and premier provider of Internet intelligence. The Shodan platform allows organizations to monitor their network, assess 3rd-party cyber risk, gather market intelligence and understand the global Internet landscape in real-time. Our data feeds are consumed by 80+ of the Fortune 100 companies, thousands of universities and millions of users around the world.


SparkCognition builds leading artificial intelligence solutions to advance the most important interests of society. We help customers analyze complex data, empower decision making, and transform human and industrial productivity with award-winning machine learning technology and expert teams focused on defense, IIoT, and finance.


Symantec Enterprise Security Products are now part of Broadcom. The consumer division of Symantec Corp. is now NortonLifeLock Inc. -- a standalone company dedicated to consumer cyber safety.


We are Tempered, creators of Airwall, banishers of risk, warriors of enterprise, guardians of the invaluable, and visionary rebels to the core. We protect networks by making them invisible.

Thales e-Security

Thales Digital Identity & Security is a global leader in digital security, bringing trust to an increasingly connected world. We design and deliver a wide range of products, software and services based on two core technologies: digital identification and data protection. Our technology is at the heart of modern life, from payment to enterprise security and the internet of things. It enables our clients to deliver secure digital services for billions of individuals and things. We are part of the Thales group, a ?19bn international organization with more than 80,000 employees in 68 countries worldwide.

Virgil Security

Virgil Security, Inc., makes every software developer into an applied cryptologist. Virgil provides password-free authentication, encryption, distributed immutable data storage via Blockchain, and verification of data, devices, and identities that is quickly and easily integrated into developer products. Virgil provides this via a cloud-based service in combination with open sourced libraries that are available for desktop, embedded (IoT), mobile, and cloud / web applications with support for a wide variety of modern programming languages.


Zingbox detects and protects the connected equipment. It provides unparalleled visibility into the Internet of Things (IoT) infrastructure to reveal existing vulnerabilities and hidden threats.Zingbox is a real-time IoT security solution that protects enterprises from cyber and insider threats. Deployed in a non-intrusive way, Zingbox discovers, identifies and classifies assets into IoT categories. It then learns and generates a baseline of normal device behavior and identifies its risk profile. Zingbox detects anomalous behavior to provide real-time policy enforcement. Founded by industry veterans with deep expertise in networking and security, Zingbox is backed by leaders in enterprise security