| Name | Title | Contact Details |
|---|
Accertify is a Itasca, IL-based company in the Computers and Electronics sector.
Princeton Identity is the identity management company that makes security more convenient, accurate and reliable than ever before. Using iris recognition and other biometric technology, Princeton Identity enables businesses, global organizations and borders to simplify identity management, resulting in improved safety and protection.
Computer Security Inc is a Pickering, ON-based company in the Computers and Electronics sector.
Blue Cedar Networks was founded on the principle that the app is the optimal control endpoint for the modern organization. The Atlas platform provides our customers with the most secure, scalable, and user-friendly capabilities to safely and seamlessly connect and protect their enterprise apps across the extended enterprise — the user population comprised of employees and non-employees that can drive or derive value from those apps and data. Blue Cedar Networks has over 150 customers spanning every major industry vertical, including some of the largest financial services, wireless and telecommunications, CPG, manufacturing, healthcare, and government organizations in the world.
Virsec revolutionizes cyber security by detecting and remediating previously “indefensible” advanced memory-based attacks on critical applications and server endpoints. Using patented, non-signature based technology, Virsec is able to protect applications “full-stack” — from the memory to web layer — without generating false positives, a huge win for security teams drowning in bells and alarms or using needle in a haystack approaches. Our deterministic Trusted Execution™ approach provides runtime application visibility and protection at the CPU-level and in memory to ensure real-time detection and remediation in microseconds. Virsec is unique in its ability to detect file-less, memory corruption and even ROP chain attacks on server endpoints, as well as protecting web applications against web application attacks in one unified platform. This unprecedented level of cyber security breadth and depth enables enterprises to release applications faster and achieve advanced hacking protection, with full assurance of protection against zero-day or unidentified vulnerabilities.