IT-Harvest Research

CYBER 150 2024 Winners

Access analyst briefings, live product demos, and technical resources from the 142 cybersecurity vendors selected for the 2024 Cyber 150 list.

142

Vendors

6

Live Demos

20

Categories

142 Companies

Cyera

Cyera

Zero TrustData Security

As a pioneer in Data Security Posture Management (DSPM), Cyera instantly provides companies visibility over all of their sensitive data, context over the risk it represents & their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data.

Full Demo RoomENTER →
Descope

Descope

APPSEC

Reduce user friction, prevent account takeover, and get a 360° view of your customer identities with the Descope CIAM platform. Trusted by hundreds of organizations including GoFundMe, Databricks, Navan, and You.com.

Full Demo RoomENTER →
Protect AI

Protect AI

AppSec

Protect AI is the platform for AI security, delivering end-to-end protection for AI applications from model selection and testing to runtime and beyond with a Secure by Design methodology.

Full Demo RoomENTER →
Radiant Security

Radiant Security

SOC Automation

Radiant Security is the agentic AI SOC platform that investigates 100% of alerts automatically across the entire security stack without requiring pre-built playbooks or manual configuration.

Full Demo RoomENTER →
Torq

Torq

SecOps

Torq delivers the first AI-native, autonomous SecOps platform — HyperSOC — which eliminates SOAR's constraints, delivers machine-speed triage, investigation, and remediation and plugs into your entire stack, out of the box.

Full Demo RoomENTER →
Zenity

Zenity

AI Security

Zenity empowers enterprises to enable AI Agents securely. Our platform ensures adaptive security and governance from buildtime to runtime — spanning tools, permissions, context, and actions across environments.

Full Demo RoomENTER →
Accertify

Accertify

Fraud Prevention

Our leaders are experts in the digital risk management industry, with a passion for driving innovation and empowering our clients to grow with confidence. They bring a wealth of experience from a variety of backgrounds and industries, and their diverse perspectives help us to stay agile and responsive to the evolving needs of our customers. Because many of our leaders started out as fraud managers and analysts, they understand the daily struggles our clients face and founded Accertify with keeping your experience at the forefront.

Demo RoomENTER →
Adlumin

Adlumin

Security Analytics

Adlumin brings technology and talent to be there to help modern organizations comply, detect, prioritize, and respond to cyber threats and IT operations in real-time. Because nobody wants to get caught in the dark.

Demo RoomENTER →
Airlock Digital

Airlock Digital

Endpoint Security

Allowlist made simple. Airlock Digital provides enterprise-grade application control that is easy to manage and scalable. Built by experts to help organizations protect their most important assets.

Demo RoomENTER →
AKITRA

AKITRA

GRC

Agentic AI’s intelligent agents continuously analyze data and adapt to new risks, making smarter compliance decisions as your environment evolves. Cut time and cost by automating tedious compliance tasks.

Demo RoomENTER →
Alert Enterprise

Alert Enterprise

IAM

As the only SaaS provider to connect physical security, IT, OT and HR systems, our AI-powered solutions enable organizations to unify, simplify and automate the entire workforce experience. And with compliance and data privacy built-in, you’ll protect people, places and assets while unlocking new levels of business. P.S.: No coding required.

Demo RoomENTER →
Alethea

Alethea

Threat Intelligence

Alethea’s mission is to protect organizations from harms caused by online risks, social media manipulation, influence operations. We don’t just listen to what’s out there, we predict how you can avoid risk.

Demo RoomENTER →
ANY.RUN

ANY.RUN

Endpoint Security

Cloud-based malware analysis service. Take your information security to the next level. Analyze suspicious and malicious activities using our innovative tools. Empowering SOC performance with cutting-edge .

Demo RoomENTER →
Astra

Astra

Application Security

Astra Security makes pentests continuous and scalable for thousands of businesses worldwide.

Demo RoomENTER →
Astrix Security

Astrix Security

GRC

Gain visibility and control over AI agents & NHIs. Astrix secures agent identities with governance, least-privilege access, and full audit trails. Identify and remediate AI agents and NHIs with excessive privileges, vulnerable configurations, abnormal activity, and policy violations.

Demo RoomENTER →
Becrypt

Becrypt

Data Security

As a trusted partner for government, we continue to deliver innovative high assurance products and services protecting public and private sector organisations from elevated cyber threat.

Demo RoomENTER →
Bfore.ai

Bfore.ai

Threat Intelligence

Our mission is to develop cybersecurity to a preventive posture, leaving detection and response where it can’t be done otherwise.

Demo RoomENTER →
BI.ZONE

BI.ZONE

Threat Intelligence

BI.ZONE is an expert in digital risks management. We help organizations develop their businesses safely in cyberspace

Demo RoomENTER →
BlackCloak

BlackCloak

Threat Intelligence

Personal cybersecurity and digital privacy protections for individuals and companies. Stay informed with our comprehensive collection of DEP news and insights, in-depth reports, and the top tips for staying secure. Prevent deepfakes targeting your executive team.

Demo RoomENTER →
Blumira

Blumira

Security Analytics

Blumira's automated detection and response platform enables the faster resolution of threats to help organizations of all sizes stop ransomware attacks and prevent data breaches. Try it free today: blumira.com/trial

Demo RoomENTER →
Bolster

Bolster

Email Security

Phishing and impersonation attacks have gone multi-channel. Our mission is to stop these evolving attacks across all channels with near-perfect AI accuracy, protecting users from online scams and threats.

Demo RoomENTER →
BRANDEFENSE

BRANDEFENSE

Threat Intelligence

With over 20 years of experience, a team of 100+ dedicated professionals, more than 1,000 satisfied clients, and a stellar 4.8 customer rating, we continue to set the standard for quality and customer satisfaction.

Demo RoomENTER →
Breachlock

Breachlock

GRC

BreachLock delivers penetration testing services across your entire attack surface using human-delivered, AI-powered, and automated solutions. We give you the flexibility and versatility to choose what works best for you.

Demo RoomENTER →
Cayosoft

Cayosoft

IAM

Cayosoft delivers the only unified solution enabling organizations to securely manage, continuously monitor for threats or suspect changes, and instantly recover their Microsoft platforms (on-premises Active Directory (AD), hybrid AD, Entra ID (formerly Azure AD), Microsoft 365, Teams, & Intune).

Demo RoomENTER →
Censys

Censys

GRC

Censys empowers security teams with the most comprehensive, accurate, and up-to-date map of the internet to defend attack surfaces and hunt for threats.

Demo RoomENTER →
Chainguard

Chainguard

Application Security

Built by the industry's leading experts on software supply chain security, open source software, and cloud native development.

Demo RoomENTER →
CloudSEK

CloudSEK

Threat Intelligence

At CloudSEK, we combine the power of Cyber Intelligence, Brand Monitoring, Attack Surface Monitoring, Infrastructure Monitoring and Supply Chain Intelligence to give context to our customers’ digital risks.

Demo RoomENTER →
Compass Security AG

Compass Security AG

Data Security

Compass Security is a Swiss company with over 70 employees and offices in Switzerland, Germany and Canada. Founded in 1999 by Walter Sprenger and Ivan Bütler, Compass Security has developed into a technically outstanding and IT-Security consulting company recognized throughout Europe.

Demo RoomENTER →
Concentric AI

Concentric AI

Data Security

Autonomous data discovery, classification, risk monitoring, and remediation with Concentric AI, the Data Security Governance Platform.

Demo RoomENTER →
Coralogix

Coralogix

Operations

We’re rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

Demo RoomENTER →
CyberFOX

CyberFOX

IAM

We excel at cybersecurity because it’s all we do. As a global cybersecurity company, our cybersecurity solutions help managed service providers (MSPs) and IT professionals implement password and privileged access to more easily manage the infrastructure of your company or those of your clients.

Demo RoomENTER →
Cyble

Cyble

Threat Intelligence

Cyble empowers organizations to take control of their cyber risks with AI-driven, cybersecurity platforms. We specialize in uncovering critical insights from across the Deep Web, Dark Web, and Surface Web, ensuring that our clients stay ahead of emerging threats in an ever-evolving digital landscape.

Demo RoomENTER →
Dazz

Dazz

Application Security

Dazz unifies exposure data across code, clouds, apps, and infrastructure; prioritizes the riskiest findings to address first; and generates smart remediation plans that enable security and engineering teams to fix exposures in hours instead of weeks.

Demo RoomENTER →
DealRoom

DealRoom

Data Security

We collect millions of unstructured data points each month and turn it into actionable intelligence. Create signal from the noise with Dealroom Signal and unlock predictive intelligence throughout the entire startup lifecycle.

Demo RoomENTER →
Dedrone

Dedrone

Network Security

Dedrone is revolutionizing drone defense with our advanced AI-Driven Autonomous C2 platform. We have gone beyond the limits of simple sensor correlation.

Demo RoomENTER →
DeleteMe

DeleteMe

Data Security

Your Personal Data is Yours Again. DeleteMe makes it quick, easy and safe to remove your personal data online. Say goodbye to complex enrollment procedures and hello to a seamless process experience. Submit your personal information for removal from search engines and data broker sites.

Demo RoomENTER →
Dispel

Dispel

IoT Security

Get secure remote access to industrial control systems for operators, third-party vendors, and machine builders. Learn why manufacturers, utilities, and governments choose Dispel Zero Trust Access for IoT, OT, XIoT, and other cyber-physical systems.

Demo RoomENTER →
Doppel

Doppel

AI Security

By pairing cutting-edge AI with expert analysis, we outpace threats like phishing, impersonation, and disinformation—delivering comprehensive coverage, speed, and precision. Attackers now weaponize AI to scale personalized, multi-channel threats faster than humans can react.

Demo RoomENTER →
Dream Security

Dream Security

Network Security

National Sovereign Artificial Intelligence National Sovereign AI After 3 years working with CyberSecurity for Governments, we discovered that national organizations don’t lack data, they lack the ability to operationalize it inside sovereign environments and to gain actionable insights.

Demo RoomENTER →
DTEX Systems

DTEX Systems

GRC

DTEX leads insider risk management with an AI-driven, unified platform for DLP, UAM, and UEBA. InTERCEPT™ protects data and people at scale with proactive, privacy-first solutions used globally.

Demo RoomENTER →
Dune Security

Dune Security

GRC

Led by a team of industry experts, we're on a mission to fight AI with AI. We know that for today's enterprises, CISOs' biggest risk lies in their users, not their systems. By utilizing contextualized testing and training to significantly reduce employee error, our platform is eliminating social engineering risk with automated remediation.

Demo RoomENTER →
DuploCloud

DuploCloud

Application Security

Deploy secure, compliant infrastructure in days—not months. No manual setup, no complexity. With DuploCloud’s intelligent automation, you’ll accelerate time to market, cut costs, and focus on innovation.

Demo RoomENTER →
Elisity

Elisity

IAM

Elisity is a solution that provides identity-based microsegmentation for an existing access layer switching infrastructure. This allows for non-disruptive deployment, rapid time to value, and both north-south and east-west microsegmentation all the way down to users and devices within the same VLAN.

Demo RoomENTER →
Endor Labs

Endor Labs

Application Security

Endor Labs is an application security platform built for AI-generated and human-written code, helping teams prioritize and fix real risk across the SDLC. e-removeCustomize your preferencesEssential RequiredThese items are required to enable basic website functionality.

Demo RoomENTER →
Entersekt

Entersekt

IAM

Industry-leading banking and payment authentication for financial institutions.

Demo RoomENTER →
Faddom

Faddom

Operations

Faddom was built on the principle of collecting all IT infrastructure information that is possible to collect without being intrusive with agents and without doing anything active that can impact performance such as accessing servers or scanning.

Demo RoomENTER →
Filigran

Filigran

Threat Intelligence

OpenCTI is an open source threat intelligence platform enabling users to collect, correlate, and leverage threat data at strategic, operational & tactical levels. Organize your cyber threat intelligence to enhance and disseminate actionable insights with our open-source threat intelligence platform.

Demo RoomENTER →
Firefly

Firefly

Operations

"This integration with Firefly brings immense value by enabling us to run automatic campaigns to prevent resource end-of-life instances and validate backups. " "It became easy to understand when EC2 instances were isolated from security groups, and where configuration was lacking for a specific component...

Demo RoomENTER →
Flare

Flare

Threat Intelligence

Flare equips your team to shut down cybercrime before it escalates. Detect, prioritize, and remediate external cyber threats with automated Threat Exposure Management. 2026 State of Enterprise Infostealer Identity Exposure PlatformWhat is Flare. It helps us protect our brand and financial .

Demo RoomENTER →
Garland Technology

Garland Technology

IoT Security

We believe that securing and monitoring your network is the ultimate goal. Our TAP to ToolTM philosophy empowers the solution by architecting to the tool, not competing with them. Garland Technology provides the scalability and flexibility to deploy what you need, when you need it, so you can focus on what's important - performance and cybersecurity.

Demo RoomENTER →
Graylog

Graylog

Operations

Graylog v6.1 simplifies both security and IT operations, offering smarter ways to manage data and gain critical insights. With enhanced tools to reduce alert fatigue, cut storage costs, and streamline investigations, this release empowers teams to work more efficiently without sacrificing performance.

Demo RoomENTER →
Group-IB

Group-IB

Threat Intelligence

Group-IB is a creator of cybersecurity technologies to investigate, prevent and fight digital crime, and to protect businesses, citizens and support law enforcement operations.

Demo RoomENTER →
Gutsy

Gutsy

Operations

At Gutsy we’re redefining how the world does vulnerability management. We believe that security is about people, process, and technology, but customers didn't have a good way to understand how those worked together.

Demo RoomENTER →
Gytpol

Gytpol

GRC

Preemptive Cybersecurity for Risk-Free Results. Fast deployment, non-disruptive remediation, and on-demand rollback. Traditional tools only flag the problem, leaving remediation to error-prone, manual efforts. Remedio closes the loop, automating fixe across your devices, identity, and AI stack.

Demo RoomENTER →
Hackmetrix

Hackmetrix

GRC

Creamos un método para tí, no importa que no seas especialista en ciberseguridad. En unos pocos meses estarás listo para cumplir o certificarte e incrementar la seguridad de tu empresa.

Demo RoomENTER →
Halcyon

Halcyon

Endpoint Security

Halcyon is the cyber resilience platform that Global 2000 companies rely upon to defeat ransomware-as-a-service-borne attacks.

Demo RoomENTER →
HarfangLab

HarfangLab

Endpoint Security

Your endpoints, our protection! Empower your analysts, overcome the threats

Demo RoomENTER →
HiddenLayer

HiddenLayer

Application Security

The HiddenLayer team was born out of a real-world adversarial artificial intelligence attack in 2019. Learn about how we are fighting back.

Demo RoomENTER →
Horizon3.ai

Horizon3.ai

Network Security

Continuously assess, fix, and verify your security posture. Securing enterprises across many attack surfaces. Additional visibility into Iranian-backed threat actor activity | Available now to all . Autonomous Attack Validation Is How You Get There.

Demo RoomENTER →
Hoxhunt

Hoxhunt

GRC

The next generation of security awareness is designed for employees and built for enterprises. Our industry-leading results are powered by cognitive automation.

Demo RoomENTER →
Huntress Labs

Huntress Labs

Operations

Get managed detection, investigation, and response for your endpoints, identities, and more. Our technology is custom-built for growing organizations like yours and is backed by an elite threat hunting team that watches over your business 24/7.

Demo RoomENTER →
Immunefi

Immunefi

Application Security

Review code. Prevent hacks. Build rep. Get paid.

Demo RoomENTER →
incident.io

incident.io

Operations

io is an all-in-one incident management platform unifying on-call scheduling, real-time incident response, and integrated status pages – helping teams resolve issues faster and reduce downtime. New: AI-native post-mortems are here!

Demo RoomENTER →
Intel 471

Intel 471

Threat Intelligence

Over the past decade, Intel 471 has elevated our CTI by combining high-fidelity automated collection with Cyber HUMINT, revealing the mystery behind pre-attack planning by providing deeper visibility into the tools, tactics and methodologies threat actors use.

Demo RoomENTER →
Island

Island

Network Security

Island is a reimagining of enterprise work. A single space, where everything organizations need to work safely and productively is built in. And everything else is out of the way.

Demo RoomENTER →
Kaseware

Kaseware

Security Analytics

Founded by former FBI Special Agents, our platform is guided by former law enforcement and safety professionals who understand your needs — because we’ve done the job.

Demo RoomENTER →
Kriptos

Kriptos

Data Security

At Kriptos, we empower businesses to manage sensitive information with advanced AI-driven data classification, enhancing cybersecurity posture and compliance with major regulations.

Demo RoomENTER →
LayerX

LayerX

Endpoint Security

LayerX secures all user and agentic interactions across any browser, app and IDE.

Demo RoomENTER →
Legit Security

Legit Security

GRC

From your software factory to code to runtime, Legit delivers a unified view of AppSec risk. The context we provide makes it easy to pinpoint issues that matter most, quickly remediate and prevent future issues.

Demo RoomENTER →
Link11

Link11

Network Security

Link11 is a specialized global IT security provider and offers modern solutions in the areas of Network Security, Web Protection and Web Performance. The company is headquartered in Germany and has offices worldwide in Europe, North America, Asia and the Middle East.

Demo RoomENTER →
Lumos

Lumos

IAM

First Autonomous Identity Platform to eliminate sprawl and identity fatigue. Discover and manage access to all apps with enhanced security, increased productivity, and reduced cost – all in one platform.

Demo RoomENTER →
Memcyco

Memcyco

Threat Intelligence

Finally preempt, detect, and counter scams as they unfold, right as customers are attacked. Get full visibility of attack, attacker and each individual victim

Demo RoomENTER →
MineOS

MineOS

GRC

Cut costs, enhance data visibility, and seamlessly integrate privacy into your operations with custom compliance infrastructure for all your teams

Demo RoomENTER →
Netcraft

Netcraft

GRC

Combining detection, threat intelligence and robust disruption & takedown, Netcraft’s automated digital risk protection platform keeps your organization and customers safe from phishing, scams, fraud and cyber attacks.

Demo RoomENTER →
Nirmata

Nirmata

GRC

Prevent misconfigurations with real-time security enforcement in CI/CD pipelines, Kubernetes clusters, and cloud environments.

Demo RoomENTER →
Nu Quantum

Nu Quantum

Data Security

Nu Quantum was founded in 2018 as a spin-out of the University of Cambridge to commercialise research generated over the last decade at the Cavendish Laboratory. Since then, we have built a strong IP portfolio and multidisciplinary team to develop market-led quantum networking solutions.

Demo RoomENTER →
Oasis Security

Oasis Security

AI Security

Non Human Identity Management Platform | Oasis Security unlocks lifecycle management and security for non human identities and AI Identities Oasis secures AI agents and non-human identities across IaaS, SaaS, PaaS, and on-prem environments, from AWS, Azure, and BigQuery to GitHub, ChatGPT, Salesforce, Office 365, and Copilot.

Demo RoomENTER →
Oleria

Oleria

IAM

Imagine innovating in the digital world, confident and secure. You're free to create how you want, uninhibited by barriers and cumbersome processes. With that kind of freedom, opportunities are boundless.

Demo RoomENTER →
Oligo Security

Oligo Security

Application Security

The AI runtime security platform - Everything Runtime by Oligo Security: detect, stop, and investigate threats across cloud, Code, and Ai in real time. Applications and the infrastructure that powers them are the front lines of today's business.

Demo RoomENTER →
Oloid

Oloid

IAM

OLOID is a B2B SaaS platform for advanced physical identity and access at all workplaces, with a mobile-first approach.

Demo RoomENTER →
Onum

Onum

Security Analytics

Onum empowers enterprises to derive value from their data in transit, helping IT and Security teams move at the speed of business. With real-time data processing, Onum reduces inefficiencies, optimizes pipelines through reduction, transformation, enrichment, and orchestration, and minimizes the impact on analytical platforms—enabling actionable responses in milliseconds, not minutes.

Demo RoomENTER →
Opal Security

Opal Security

IAM

Who has access to what, and what can they do with that access? Opal's platform helps organizations answer that question and drive down access risk with just a few clicks.

Demo RoomENTER →
Owl Cyber Defense

Owl Cyber Defense

Network Security

Elite edge security, cross domain solutions, and proven expertise for high-assurance network protection and secure data transfers

Demo RoomENTER →
OX Security

OX Security

Application Security

Only a fraction of AppSec issues are exploitable, reachable and impactful. OX enables AppSec and DevOps teams to go deeper than generic prioritization and fix the 5% of issues that matter before they get to the cloud — from design to runtime.

Demo RoomENTER →
Permiso Security

Permiso Security

Operations

Prevent and detect credential compromise, account takeover and insider threat for all identities, across all environments.

Demo RoomENTER →
Phosphorus

Phosphorus

IoT Security

Use Phosphorus to reduce risk and prevent threats by discovering, remediating, monitoring, and managing every IoT, OT, and IoMT Cyber-Physical System at scale.

Demo RoomENTER →
PointSharp AB

PointSharp AB

IAM

Pointsharp is a European cybersecurity company that enables organizations to secure data, identities, and access in a user-friendly way.

Demo RoomENTER →
Portnox

Portnox

Endpoint Security

By eliminating the need for any on-premises footprint common among traditional systems, Portnox allows companies–no matter their size, geo-distribution, or architecture–to deploy, scale, enforce and maintain zero trust security policies with unprecedented ease.

Demo RoomENTER →
Privado

Privado

Application Security

Privado is securing applications throughout the development lifecycle from code to deployment. The company helps organizations strengthen their security posture and protect critical assets.

Demo RoomENTER →
Private AI

Private AI

GRC

Detect, anonymize, and replace 50+ personal information entities, on-premises or in the cloud, in 50+ languages with less than half the error rate of alternatives.

Demo RoomENTER →
ProcessUnity

ProcessUnity

GRC

ProcessUnity is a leading provider of cloud-based solutions for third-party risk and cybersecurity performance management, unifying how businesses assess, measure, and mitigate risk through automation

Demo RoomENTER →
Protexxa

Protexxa

AI Security

Don’t Just Find Cyber Threats. Protect your people, your reputation, and your bottom line with Protexxa Defender Let Us Show You How of consumers say businesses bear responsibility for digital privacy Protexxa is a B2B SaaS cybersecurity platform that leverages Artificial Intelligence to rapidly identify, evaluate, predict, and resolve cyber issues.

Demo RoomENTER →
Purevpn

Purevpn

Network Security

Imagine this: everything on internet is accessible with complete privacy at exceptional value. Sounds like a dream, no?

Demo RoomENTER →
Pyramid Computer GmbH

Pyramid Computer GmbH

Network Security

We are specialists in digital automation. Industry? Retail? Catering systems? Healthcare? SME or corporation? We have the right hardware and services for every sector and use case. Standardized or customized.

Demo RoomENTER →
Qohash

Qohash

GRC

Qohash was born out of necessity. Our background in defense and security meant that we had witnessed too many times the implications of mishandling highly sensitive data. The spark was ignited by a series of high-profile data breaches involving employees with access to high-risk unstructured data.

Demo RoomENTER →
Qomplx

Qomplx

Security Analytics

QOMPLX Identity Threat Detection and Response (ITDR) continuously validates to prevent network takeovers

Demo RoomENTER →
Raonsecure

Raonsecure

IAM

Due to digitalization across our society and the transition to a contactless society, it is ever more critical to proactively respond to evolving security threats and securely prove one’s identity in the digital world.

Demo RoomENTER →
Resecurity

Resecurity

Endpoint Security

Cyber Security Services ➦ Resecurity . ☑ Detecting, protecting, and eliminating any digital threats. ⇒ Working in USA and all over the world. Cyber Services – defense & solution: ✐ contact@resecurity.

Demo RoomENTER →
Safe Security

Safe Security

GRC

If you ask a CEO, how would they evaluate their status of risk exposure to cybersecurity and what are they doing as key elements, it’s piecemeal. The CEO would probably struggle. And that’s what Modi got, that others didn’t.

Demo RoomENTER →
SafeBase

SafeBase

GRC

Build customer trust upfront with secure Trust Center access to security and compliance information. Generate accurate, real-time questionnaire responses with AI, boost team productivity, and prove security ROI — all from the SafeBase Trust Center platform.

Demo RoomENTER →
SandboxAQ

SandboxAQ

Data Security

In the tech and data intelligence worlds, a sandbox is where innovation is born. It’s a place where the brightest free-thinking minds from across disciplines come together to reimagine what’s possible. A collaborative environment where the whole is infinitely greater than the sum of the parts.

Demo RoomENTER →
Savvy

Savvy

Operations

See every app, control every identity—without the integration overhead of traditional tools.

Demo RoomENTER →
Scrut Automation

Scrut Automation

GRC

Scrut is a risk-focused compliance automation platform that helps simplify and streamline information security for cloud-native companies.

Demo RoomENTER →
Scytale

Scytale

GRC

The only complete compliance solution, helping companies get compliant and stay compliant with security and privacy frameworks. 🎉 Scytale named 2026 G2 Best Software Award winner in GRC.

Demo RoomENTER →
Seclore

Seclore

Data Security

Seclore’s mission is to protect sensitive data, giving organizations complete control over critical information with innovative solutions. Founded on the principle that traditional cybersecurity is no longer sufficient, we aim to be the leading provider of data-centric security solutions. Our vision is to deliver unparalleled protection and control over sensitive information on all platforms and devices. We’re committed to providing exceptional customer service, with innovative technology that helps organizations protect their valuable assets and achieve digital transformation goals while ensuring the highest levels of security and compliance.

Demo RoomENTER →
Second Front Systems

Second Front Systems

GRC

We’re on a mission to secure a strategic advantage for the world’s democracies by accelerating government access to emerging technologies.

Demo RoomENTER →
Securden

Securden

IAM

IT security sphere has always been synonymous with sky-high pricing, complexity, and undue dependence on consultancy services. Companies often have to choose between a complicated and super-expensive solution and a super-complicated and expensive one.

Demo RoomENTER →
SecureW2

SecureW2

IAM

Fully managed Cloud PKI, RADIUS Authentication, and Device Onboarding services provide a simple foundation for certificate-driven security.

Demo RoomENTER →
Silverfort

Silverfort

IAM

Silverfort was founded by leading cybersecurity and cryptography experts from the 8200 elite cyber unit of the Israeli Intelligence Corps.

Demo RoomENTER →
SoSafe

SoSafe

GRC

Security awareness training and human risk management that puts people first. Our platform reduces human risk by leveraging behavioral science to sharpen employees’ security instincts.

Demo RoomENTER →
Spin Technology

Spin Technology

GRC

Enhance cyber resilience, streamline security operations, and protect SaaS data for your mission-critical applications.

Demo RoomENTER →
Spring Labs

Spring Labs

Data Security

AI-Native conversational intelligence turns chatter into actionable insight. Help your compliance, operations, and product teams get faster and smarter.

Demo RoomENTER →
Sprinto

Sprinto

GRC

Ambitious tech companies all over the world trust Sprinto to power their security compliance programs and sprint through audits without breaking their stride.

Demo RoomENTER →
Stream.Security

Stream.Security

GRC

The Industry's Only Real-Time Cloud Threat & Exposure Detection and Response Solution

Demo RoomENTER →
strongDM

strongDM

IAM

Once a customer, forever a fan. There’s a reason why StrongDM has a 98% customer retention rate year-over-year. Yes, our product works. Yes, it makes life easier and more operationally effective for technical experts. Yes, it is secure-by-design. How do we do it? Our values keep us true to our mission.

Demo RoomENTER →
TAC Security

TAC Security

GRC

Our leaders share the unanimous goal of securing the cyberspace and that makes them unstoppable.

Demo RoomENTER →
TECH5

TECH5

IAM

TECH5 is an international technology company, founded by experienced senior figures from the biometrics and identity industry. The company focuses on developing disruptive biometric and digital ID offerings through the application of AI and Machine Learning technologies.

Demo RoomENTER →
TecSec

TecSec

Data Security

TecSec’s focus is on Information Security and Information Access Management, enforced through cryptography. TecSec provides consultation and design services, as well as software and hardware products based upon the company’s 7th generation, standards-based VEIL® technology, leveraging their large library of patents and still growing intellectual property.

Demo RoomENTER →
Tenchi Security

Tenchi Security

GRC

Tenchi Security is a venture-backed startup specialized in Third-Party Cyber Security Posture Management. Zanshin, our SaaS offering, provides unprecedented visibility and systematic material reduction of Third-Party Cyber Risk in a cooperative, continuous and comprehensive fashion.

Demo RoomENTER →
Teramind

Teramind

Operations

Insider threat detection, data loss prevention, productivity analysis, and business process optimization powered by advanced user behavior analytics.

Demo RoomENTER →
ThetaRay

ThetaRay

Security Analytics

Our Cognitive AI solutions identify hidden risks, streamline processes, build trust, and empower institutions to adapt, grow, and deliver seamless customer experiences.

Demo RoomENTER →
ThreatLocker

ThreatLocker

Endpoint Security

An endpoint security platform that puts you in control with Application Allowlisting and Ringfencing™ to stop the misuse of vulnerable elevation, storage and network traffic.

Demo RoomENTER →
ThreatModeler

ThreatModeler

Application Security

A step-by-step guide to proactively mitigating risk across your applications and infrastructure.

Demo RoomENTER →
Tines

Tines

Operations

Build, run, and monitor workflows with the most intuitive platform loved by security-minded teams.

Demo RoomENTER →
Todyl

Todyl

Consolidated. Comprehensive. Customizable. Our platform empowers businesses with comprehensive cybersecurity delivered through a single-agent platform. Leveraging our innovative modules, businesses can customize our capabilities to meet any need.

Demo RoomENTER →
Traceable

Traceable

API Security

The Traceable platform captures, correlates and analyzes all API-related activity over time, across your entire API ecosystem

Demo RoomENTER →
Transcend

Transcend

GRC

Improve compliance, cut costs, and enhance business innovation and customer trust by encoding privacy directly into your business systems.

Demo RoomENTER →
TrustCloud

TrustCloud

GRC

Integrated AI and API native platform for CISOs to consolidate and automate numerous security and GRC silos

Demo RoomENTER →
Trustonic

Trustonic

IoT Security

Forward-thinking and fast-moving, Trustonic delivers advanced technology systems to drive innovation, protect revenue and enhance security for technology companies worldwide. We’re on a mission to connect the next billion smartphones and protect the things people care about.

Demo RoomENTER →
Tutus

Tutus

Data Security

Tutus is a privately-held Swedish company that was founded in 1992. Ever since, the company has been developing top quality network encryption solutions.

Demo RoomENTER →
UpGuard

UpGuard

GRC

See your attack surface and third-party risk with unrivaled clarity. Reduce your team’s workload at the same time.

Demo RoomENTER →
Upwind

Upwind

Operations

Combine the power of cloud security posture with runtime context and realtime protection— enabling your security team to prioritize accurately and respond fast to your most critical risks. Your browser does not support the video tag.

Demo RoomENTER →
Very Good Security

Very Good Security

GRC

Manage all your card data with a single API. Streamline card data management to improve payment performance and enhance customer experiences.

Demo RoomENTER →
Vicarius

Vicarius

Application Security

Vicarius' vRx bridges the gap between vulnerability discovery and remediation with automated patching, patchless protection, and custom scripting. Trusted by 500+ customers in 40+ countries.

Demo RoomENTER →
Wallarm

Wallarm

Application Security

Wallarm is an API security platform that finds and eliminates API threats. to discover API attack surface and respond to API security incidents, all while keeping their data safe and secure.

Demo RoomENTER →
Wing Security

Wing Security

Application Security

Protect critical SaaS applications with an end-to-end SSPM & ITDR solution by identifying risks, remediating threats, and protecting critical company data

Demo RoomENTER →
XM Cyber

XM Cyber

Operations

XM Cyber is the leader in attack path management, using the attacker’s perspective to find and remediate critical attack paths across on-premises and multi-cloud networks.

Demo RoomENTER →
Zafran

Zafran

AI Security

Proactively stop vulnerability exploitation with Zafran's AI-native Exposure Management, unifying risk detection and mitigation to protect hybrid assets. Zafran is for security teams buried in vulnerabilities and manual work.

Demo RoomENTER →
Zama

Zama

Data Security

Zama is a cryptography company building open-source homomorphic encryption solutions for blockchain and AI, enabling a broad range of privacy-preserving use cases.

Demo RoomENTER →
Zero Networks

Zero Networks

Network Security

Zero Networks delivers automated microsegmentation, securing assets on-prem, in the cloud, and OT/IoT. Deploy in 30 days with set-and-forget simplicity. Fully Automated for Zero Trust Segmentation and Remote Access Connect Remote Users Protect Third Party Access Compliance & Savings .

Demo RoomENTER →
Zilla Security

Zilla Security

GRC

Zilla is an Identity Security platform that combines identity governance with cloud security. The platform delivers access visibility, access reviews, lifecycle management, and policy-based security remediation that is automated, and easy to use.

Demo RoomENTER →
Zluri

Zluri

Operations

Zluri is a unified SaaS Management and Identity Governance platform designed to empower modern enterprises with complete visibility and control over their SaaS applications, access, and costs.

Demo RoomENTER →