CTOs on the Move

Acceptto

www.acceptto.com

 
Acceptto is a transformative cybersecurity company challenging the norms of identity access. Our AIML-driven Biobehavioral technology analyzes and verifies your identity through real-time threat analytics using Cognitive AuthenticationTM, a multi-context combination of behaviors, attributes and spatiotemporal velocity to detect and prevent identity access fraud across the enterprise and end consumers. We deliver the smartest, most resilient and evasion-proof identity validation technology commercially available today for physical, web, mobile, cloud and IoT devices. Acceptto is headquartered in Portland, USA with satellite offices in Lisbon, Portugal, and Vancouver, Canada, serving global active customers in healthcare, education, telco, financial services and fintech.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million
  • www.acceptto.com
  • 111 SW 5th Avenue Suite 3150,
    Portland, OR USA 97204
  • Phone: 844.487.6300

Executives

Name Title Contact Details

Similar Companies

VSBI

VSBI is a Brandon, FL-based company in the Computers and Electronics sector.

Vision Dynamix

Vision Dynamix is a Novi, MI-based company in the Computers and Electronics sector.

DVR Softek

DVR Softek is a Edison, NJ-based company in the Computers and Electronics sector.

The Long Reach Corporation

The Long Reach Corporation is a Manotick, ON-based company in the Computers and Electronics sector.

CounterFlow AI

CounterFlow AI is addressing the growing network visibility gap created by the rise of encrypted traffic. Its ThreatEye® cloud-native analytics integrate cryptanalysis, packet dynamics, and machine learning techniques to identify patterns associated with network faults, anomalies, and threats in real-time. Unlike subversive SSL decryption methods, ThreatEye`s approach preserves privacy and renders deep insights into both encrypted and unencrypted traffic. Offered on a subscription basis, CounterFlow`s software is designed for hybrid cloud deployments to easily extend the visibility of network and security operations across an entire enterprise.