These fast-growing companies, pitching on October 20, have been selected by WIRED for their potential to radically upgrade security capabilities. Head to the WIRED Security Startup Stage to catch a first glimpse of the security world's future disruptors.
Irra Ariella Khi, Vchain
Vchain produces software as a service ID verification for storing documents. It claims to be unhackable using fully de-personalised, distributed system allowing digital validation with no personally identifiable data.
Ionut Ionescu, EclecticIQ
EclecticIQ is an applied cyber threat intelligence technology provider that helps its clients regain control of threat reality and mitigate risks and vulnerabilities.
Raz Ghafoor, ThirdEye Labs
ThirdEye uses computer vision to help businesses automate video data analysis. Its algorithms can predict and detect crime before and as it occurs using surveillance footage.
Andrew Martin, DynaRisk
DynaRisk helps its customers protect themselves online. It gives its users a personal cyber-risk score and provides tailored actions to help prevent attacks.
Ben Southworth, Yoti
Yoti aims to be the world’s most trusted identity system. Its products help personal account holders and businesses to securely share their information, online and in person.
Kerri-Lynn Hauck, Fabric
Fabric combines the latest encryption protocols with voice codecs to give its customers a secure communications tool that’s easy to install and deploy for mobile.
Tim Sadler, CheckRecipient
CheckRecipient is a security technology that prevents sensitive information being sent to the wrong person. Its AI and machine learning identifies anomalies in outgoing emails.
Andrew Bud, iProov
iProov provides secure online authentication through face verification, protecting against theft or phished biometric credentials on smartphones, laptops and tablets.
https://www.checkmarx.com/products/codebashing-enterprise-application-security-training
John Yeo, Codebashing
Codebashing provides application security training for developers. It teaches using interactive vulnerable applications that enable developers to observe issues in real time and see live code fixes.
Stuart Laidlaw, Cyberlytic
Cyberlytic provides security intelligence software that prioritises the workload of security teams – reducing cyber-attack response times from days to seconds.
Chris Wallis, Intruder
Intruder identifies weaknesses in companies’ digital assets, informs them of the risks and helps them identify potential breaches before they occur. Its system of proactive security assessment provides continual defence against attacks by hackers.
https://www.spearsec.com/index.html
Edward Myung, SpearSec
SpearSec quantifiably monitors and mitigates businesses’ risk of phishing scams. It uses continuous threat simulation to test and train employee phishing awareness.
Peter Bradley, Torsion
Torsion controls insider security risks and streamlines compliance with automated, intelligent information-access control, reporting across all of the systems where your business’ information is stored and shared.
https://panaseer.com/#challenge-section
Nik Whitfield CEO, Panaseer
Panaseer’s big-data analytics platform gives security leaders and their boards the timely, accurate insights required to demonstrate strong control over risk, and justify security priorities.
This article was originally published by WIRED UK
