| Name | Title | Contact Details |
|---|
Beyond Identity is revolutionizing secure digital access for workforces, contractors, customers and developers. Our Universal Passkey Architecture provides the industry`s most secure and frictionless multi-factor authentication that prevents credential-based breaches, ensures device trust, and delivers secure and frictionless digital access, eliminating passwords entirely. Industry leaders like Snowflake, Unqork and Roblox rely on Beyond Identity to solve their access security challenges for their customers, employees, contractors and developers and to advance their journey toward Zero Trust Security.
Mikrotik is a Eden Prairie, MN-based company in the Computers and Electronics sector.
4iQ has indexed billions of exposed identities by scanning documents in 26 languages across search engines and social media, un-indexed, transient deep web sites like paste bins, hacker forums, irc channels, open databases, file - sharing sites, forums, black markets and dark web sites.
DefenseStorm provides an integrated platform of cyber risk assessment, governance, security, and fraud solutions that ensure financial institutions achieve and maintain cyber risk readiness. The only system specifically built for banking, it accounts for all the daunting challenges, regulations, and technology requirements financial institutions face. Their intelligent data engine, GRID ACTIVE, ensures real-time access, analysis, and action on all critical threat data. The Cyber Threat Surveillance Operations (CTS Ops) team offers access to managed resources 24x7x365, providing the help and expertise needed by financial institutions.
lllusive continuously discovers and automatically remediates privileged identity risks that are exploited in all ransomware and other cyberattacks. Despite best-practice investments to protect identities, including deployment of PAM and MFA, 1 in 6 enterprise endpoints holds exploitable identity risks. Illusive makes it easy for security teams to get visibility into the vulnerable identities sprawled across an organization`s endpoints and servers, then eliminate them or deploy deception-based detection techniques as a compensating control to stop attackers. Illusive has participated in over 140 red team exercises and has never lost one! Founded by nation state attackers, Illusive`s technology is trusted by large global financial companies, retailers, services organizations, and pharmaceutical companies.