| Name | Title | Contact Details |
|---|
PacketViper provides unique Deception, Intelligence, and Defense capabilities to internal and external networks. Our advanced detection methods such as Virtual Minefields, Interactive Forensics Modules, and unique geo-targeting together eliminate an upwards of 70% of the traffic volume with surgical precision and ease. DECEPTION At PacketViper, we wanted to bring something new to the table other than simple country blocking or the same third-party sourced intelligence. Our solution provides nimble deception capabilities for perimeters/interiors that are self-sustaining and reacting intelligence eco-systems capable of attracting, confusing, and detecting attackers while adjusting its defense posture in real-time. DEFENSE Our patented defensive capability provides unique geo-targeting that reduces logging and alerting without creating more false positives far beyond all geo capable solutions on the market today. Proper geo-targeting requires more than just blocking a country, network port, or static lists obtained from third-party sources. Our strategy includes your own threat intelligence gained using deception, sensors, and reactive geo-intelligent zones in real-time. INTELLIGENCE Our unique intelligence capabilities are not seen in a single solution together. We turn the "actionable" reporting into "applied" real-time intelligence. PacketViper comes with a point and click customizable dashboard, interactive real-time logging, NetCheck, country, and company traffic managers. Quickly recall, alert, schedule, and store data using our interactive Advanced Analytics, analyzers, and traffic summary modules. PacketViper not only eliminates the millions of known bad IP addresses sourced from third parties but also brings awareness to the customer of what IP address is trying to access their network. Our solution provides actual geo-targeting while deceiving, detecting, and reacting to the other unknown hundreds of millions of new threats coming.
Tru•Trace Technologies, Inc.(CSE: TTT, OTCQB: TTTSF) has developed the first integrated blockchain platform that registers and tracks intellectual property for the cannabis industry. Strain protection and genetic identification are major issues for growers and breeders, and this new technology allows them to identify and secure rights to their valuable intellectual property (IP). The StrainSecure cloud-based platform streamlines the administrative process of genetic registration and mandatory quality-control testing for legal cannabis, cutting the administrative time and expense in half. Tru•Trace`s proprietary, immutable, cryptographically-secure blockchain-technology establishes a global `single source of truth` for cannabis strains, their ownership, potency and chemical makeup. In an industry where a popular strain can be worth millions of dollars, quantifying genetics, potency and equivalencies between cannabis products are crucial to the future of legal marijuana. StrainSecure delivers needed transparency to growers, retailers, regulators, and consumers in who have struggled to find realistic solutions to these logistical challenges. The good news is that the blockchain technology implemented by StrainSecure is ideally suited to solve these kinds of problems by implementing an immutable and non-corruptible record of transactions.
Sedona Technologies is a Moline, IL-based company in the Computers and Electronics sector.
SEMYOUCloud Office: The Future Begins Now Intuitive operation, no installation and thoroughly secure! SEMYOU Cloud Office enables a new way to efficiently incorporate the cloud into your business, to lower costs and to increase flexibility. In-house developed business APPs are always available with just a click. A focus on cloud services / applications with Office character allows the cloud to merge with the local desktop PC. SEMYOU offers an integrative cloud software solution.
Advanced Cyber Security is a pioneer in endpoint security, with patented, proactive security solutions that stop advanced persistent threats in their initial stages and prevent advancement. Its products provide a first line of defense to a companys layered security protocol and protects the vulnerable endpoint from exposing sensitive information such as login credentials and private company information that can lead to a costly data or network breach. Advanced Cyber Securitys Multi Out-Of-Band Authentication with patented, true out-of-band authentications is currently used in multiple complex environments. Advanced Cyber Securitys EndpointLock product, which will be integrated into McAfee ePolicy Orchestrator, provides important desktop protection features. The keystroke encryption feature encrypts every keystroke at the point of origin to mitigate the risk of undetected keylogging malware from stealing corporate credentials and sensitive data. An anti-screen scraping technology prevents software from taking screen shots of a users desktop, and the kernel compromise feature monitors the operating system kernel to prevent compromises.