| Name | Title | Contact Details |
|---|
Awake Security provides the only advanced security analytics solution that delivers deep visibility and answers to questions that cannot even be asked today, improving productivity tenfold. The company`s patent-pending Security Knowledge Graph™ data model uses machine learning and data science to automate painstaking analyses expert investigators perform. It identifies and tracks network entities as humans think of them and highlights entity attributes, relationships, behaviors and activities. This enables analysts to proactively detect, hunt, investigate and respond to threats. Awake is built on a foundation of more than two years of research with hundreds of security professionals and more than a dozen security teams.
Built on a foundation of machine learning and automation, GreatHorn delivers the industry`s most effective and comprehensive email security solution, and can be deployed and operational in less than 5 minutes. With its proprietary dataset built from hundreds of millions of uniquely analyzed threats, GreatHorn combines the intelligence, fidelity and precision necessary to prevent attacks from becoming breaches.
For over a decade, Celestix has developed innovative security solutions enabling organizations to leverage leading and emerging technologies. Founded in 1999, Celestix Networks has delivered solutions to thousands of corporate and government organizations worldwide. Celestix is headquartered in Fremont, California with offices in Singapore; Reading, UK and Tokyo, Japan. We want to be the one of the leaders in providing secure connectivity to the mobile users and distributed offices on both on-premises and the cloud environment. We intend to achieve this goal by leading the industry in developing new products, pricing competitively, controlling costs, supporting customers, and expanding partner channels. Celestix understands the dynamics of the industry and is prepared to move decisively to exploit new opportunities.
Immunity was founded in 2002 and was immediately noticed for its breakthrough technologies and industry-recognized team. Immunity has since evolved into a global leader in the assessment and penetration testing space. Immunity is known for its aggressive and real-world approach to assessments. By maintaining its independence from external investors, Immunity has grown its unique technology offerings and consulting services based on customer demand. Immunity delivers products and services to Fortune and Global 500 companies and smaller organizations across all vertical markets. Immunity also serves Government departments from all over the world. A concentration on purely offensive techniques and technologies distinguishes Immunity from other professional organizations who attempt to address both offensive and defensive security postures in their service or product lines. Immunity's employees are motivated by a desire to develop new penetration technologies including exploits, implants, and evasion techniques. Immunity's product line remains focused on attack and penetration. The team is made up leading experts, each recognized for deep technical knowledge and cutting edge research within their field. Immunity products include exploitation development tools, vulnerability assessment tools, and remote control technologies. Immunity delivers consulting services including penetration testing, vulnerability management, and Immunity's experts provide regular training classes. Immunity also serves as an information hub within the global security community, hosting the popular DailyDave mailing list and often serving as a source for analysis and opinion on new threats, as reflected in various media coverage. Immunity is an independent, one hundred percent American-owned business and has been headquartered in Miami Beach, Florida since 2005. Most employees are based in the Miami Beach headquarters with others in Washington, DC, and internationally from Argentina, Canada, and Italy.
Isovalent is the company building eBPF, Cilium, and re-inventing networking & security for the age of microservices.