| Name | Title | Contact Details |
|---|
South Western Communications is a Newburgh, IN-based company in the Computers and Electronics sector.
Elephant Outlook is a Winter Haven, FL-based company in the Computers and Electronics sector.
SolPass, based in Denver, is the developer of an innovative hardware and software identity verification solution that is designed to build a chain of trust from the individual user to the server. Using biometrics, SolPass assures that only authorized users of the system are given access. SolPass implements a rights management system that prevents further unauthorized access. By focusing on the prevention of cyber crime and data breaches, SolPass has introduced a new perspective on cyber security.
ThreatConnect enables security operations and threat intelligence teams to work together for more efficient, effective, and collaborative cyber defense and protection. With ThreatConnect, organizations infuse threat intelligence and cyber risk quantification into their work, allowing them to orchestrate and automate processes to respond faster and more confidently than ever before. Nearly 200 enterprises and thousands of security operations professionals rely on ThreatConnect every day to protect their most critical systems.
Deep Instinct is the first company to apply deep learning to cybersecurity. Deep learning is inspired by the brain`s ability to learn. Once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct`s artificial brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. As a result, zero-day and APT attacks are detected and prevented in real-time with unmatched accuracy. Deep Instinct brings a completely new approach to cybersecurity that is proactive and predictive. Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization`s endpoints, servers, and mobile devices. Deep learning`s capabilities of identifying malware from any data source results in comprehensive protection on any device, any platform, and operating system.