Directory Details

KOILBusiness Network

SecuredTouch offers risk and authentication platform for mobile apps, websites and ransactions, that detects fraud and removes friction, using touchscreen gestures analysis. Our innovative product continuously verifies mobile users identity by analyzing their physical behavior, in a way that is invisible to end users. We provide an SDK that can be easily integrated into any mobile channel and an API to receiving risk indications for mobile sessions in real-time.

Thursday, 18 February 2016 18:19

SecuredTouch

Written by

Safe-T Data is a provider of data security solutions for a wide range of industries, including: financial, healthcare, government and manufacturing organizations. Our solutions are scaled to make the transmission of Data Safe, Protect Users and Business while driving Agility across Global Ecosystems. They are well deployed and already protects thousands of users in sensitive businesses and government departments today.

Thursday, 18 February 2016 18:17

Safe-T Data

Written by

Radware is a global leader of cyber security and application delivery solutions for virtual, cloud and software defined data centers. Our awardwinning solutions portfolio delivers service level assurance for business-critical applications, while maximizing IT efficiency. Our solutions protect our customers’ data centers and critical applications and enable them to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. We serve over 10,000 customers worldwide with solutions deployed across networks serving financial institutions, ecommerce organizations, communication enterprises, government establishments and more.

Thursday, 18 February 2016 18:13

Radware

Written by

Nucleon is the next generation of Cyber Threat Intelligence. Nucleon is focus on monitoring the most dangerous threats on the internet and enable to block attacks before they reach the networks. Nucleon uses advanced Artificial Intelligence and a unique methodology to detect and track the most dangerous attacks, using a unique methodology to gather intelligence. Nucleon provides high quality actionable intelligence and can be easily install and integrated in the network focused for critical infrastructure, hospitals, banks and others.

Nucleon innovative technology has 2 patents being filed.

Thursday, 18 February 2016 18:10

Nucleon

Written by

Nubo uses Virtual Mobile Infrastructure (VMI) technology for enterprise mobility. Nubo allows mobile corporate users to work on mobile apps with ease and security by actually storing zero data on the device. Nubo provides one secured remote virtual workspace that delivers a native app experience on all iOS and Android devices. All employee apps and corporate data are saved and managed on a cloud-based or on premise remote server platform. Corporate applications as well as any android application could be dragged and dropped to Nubo Platform and accessed from the employee’s mobile devices.

Thursday, 18 February 2016 18:07

Nubo Software

Written by

KELA logo new

KELA provides our clients with intelligence about threats specifically targeting them (exposed IT systems and trading in access to clients’ servers, breached employee credentials, product vulnerabilities etc.).

We do this using the RaDark technology developed in house. RaDark emulates the reconnaissance process done by hackers, which precedes all APT attacks. It provides clients with the information available to the hacker community against their organization. RaDark uses advanced filtering algorithms that automatically scan Dark Net information sources.

Our intelligence is used by some of the largest organizations in the world across all verticals – financial services, oil and gas, telecoms, and others.

Thursday, 18 February 2016 18:03

KELA Targeted Cyber Threat Intelligence

Written by

Israeli security start-up IronScales, developers of the cyber security industry’s first ever employee-based intrusion prevention system with an automated phishing-mitigation response. IronScales’ comprehensive crowdwisdom-based phishing-mitigation solution helps protect enterprises from cyber-crimes whereby criminals attempt to deceive employees into revealing sensitive information such as usernames and passwords so they can then install spyware, remote-access Trojan horse attacks or ransomware. The IronScales solution is currently in use by dozens of customers in the financial sector, as well as security and telecom companies.

Thursday, 18 February 2016 17:59

IronScales

Written by

We in CYBERBIT understand that in order to detect and respond fast and efficiently to advanced threats organizational security has to be changed. Detection and response cycles must become optimal and short, leveraging past knowledge and experience, automating processes and capabilities, and allowing the organization to be agile, alert and prompt.

Thursday, 18 February 2016 17:54

Cyberbit

Written by

BondIT is the only algo-advice solution for bond portfolios managers and advisors. BondIT empowers fixed income investment managers with data-driven portfolio construction, ptimization, re-balance, analysis and monitoring capabilities. The SaaS platform and easy- to-use interface makes the solution highly accessible. While there are many robo-advisors for ETFs which address mass market investors (<$250k), our unique solution, supporting individual bonds, enables the introduction of the algorithmic advice revolution to the HNW and mass affluent investors’ portfolios. The BondIT solution is designed to enhance the entire bond portfolio management life cycle with actionable analytics and algorithmic recommendations for buying, selling and replacing bonds in the portfolio.

Thursday, 18 February 2016 17:47

BondIT

Written by

seworks

SEWORKS is a team of seasoned white hat hackers and security experts who build powerful mobile security solutions to protect businesses around the world.

SEWORKS' mission is to empower app developers to focus on building great products by providing strong yet easy-to-use security solutions.

Tuesday, 26 January 2016 14:12

SEWORKS

Written by

Page 1 of 2

Join Our Mailing List