OUR COMPANIES

We’ve supported over 100 companies to date, all led by ambitious entrepreneurs from over 35 nationalities focused on securing our digital future with innovative cyber security products.

STATUS: ACTIVE
Cloud Security

Deep forensic analysis for cloud, container, and on-premise systems.

STATUS: ACTIVE
Communications Security

Email security with unparalleled visibility into human behavior.

STATUS: ACTIVE
Training and Awareness

Empowering organizations to increase, measure and demonstrate human capabilities in every part of their cybersecurity.

STATUS: ACTIVE
Threat intelligence

Countering money laundering, terrorism and criminal networks by supporting global companies and governments to detect criminal behaviour.

STATUS: ACTIVE
Application and Web

Vulnerability management for enterprise clients, simplified.

STATUS: ACTIVE
Governance, Risk, Compliance

DynaRisk improves cyber hygiene and reduces online risks for businesses and individuals.

STATUS: ACTIVE
Application and Web

Aiculus helps organisations fully utilise technology in a secure manner, applying advances in AI to secure APIs.

STATUS: ACTIVE
Governance, Risk, Compliance

CyberSmart is the easiest way to achieve government standard security certification.

STATUS: ACTIVE
Communications Security

Secure collaboration, cloud storage and data access control for enterprise.

STATUS: ACTIVE
Identity and Access Management

The world's first biometric and advance passenger information validation platform for airlines and governments.

STATUS: ACTIVE
Network Security

Senseon’s platform uses unique 'AI Triangulation' to automate threat detection and response capabilities.

STATUS: ACTIVE
Identity and Access Management

Zero-trust authentication to protect your remote workforce and enable strong customer authentication with just a look.

STATUS: ACTIVE
Network Security

The Sweepatic platform discovers all internet-facing assets within your online attack surface and analyses their exposure to risk.

STATUS: ACTIVE
Threat intelligence

Chainkit enables cybersecurity leaders to confidently trust the integrity of their data by safeguarding it from anti-forensic techniques, ransomware, and more.

STATUS: ACTIVE
Application and Web

Gamasec utilizes the newest and most advanced technologies to stop cyber-attacks via websites, reducing your cyber insurance exposure.

STATUS: ACTIVE
Network Security

A unique centralised alert operations management solution to enhance SOC operational efficiency.

STATUS: ACTIVE
Governance, Risk, Compliance

CyGov delivers a SaaS cyber risk management platform, empowering organizations to understand their cyber risks and how best to deal with them.

STATUS: ACTIVE
IoT and Operational Technology

LGN is developing optimal edge AI algorithms to achieve human-level perception on autonomous systems.

STATUS: ACTIVE
Governance, Risk, Compliance

Beauceron makes it faster, easier and less complex for organisations to measure, manage and monitor human-centric cyber risk.

STATUS: ACTIVE
Governance, Risk, Compliance

Risk Ledger enables companies to measure, monitor and mitigate their supply chain security risk.

STATUS: ACTIVE
Data Protection

Hazy generates synthetic data that you can drop straight into your existing workflow to improve your fraud detection and risk models.

STATUS: ACTIVE
Threat intelligence

Cyble provides visibility to supplier cyber threat and risks through automation, integration and intelligence.

STATUS: ACTIVE
Network Security

Re-imagining security operations for small teams by solving the problem of alert fatigue using stateful correlation.

STATUS: ACTIVE
Communications Security

The first global platform for communication of private and confidential business and personal messaging.

STATUS: ACTIVE
Data Protection

Simplifying the way that data is safely and securely accessed, shared and governed through DataSecOps.

STATUS: ACTIVE
Identity and Access Management

neoEYED helps banks and enterprises to reduce fraud just by looking at the way users interact with application and devices.

STATUS: ACTIVE
IoT and Operational Technology

A platform agnostic solution which eliminates certificate exchange, certificate processing and the exchange of bulk encryption keys.

STATUS: ACTIVE
Threat intelligence

Provides decision makers with easy to read visual representations of large complex data sets without the need for data scientists.

STATUS: ACTIVE
Application and Web

Helping securing the world's open source code, allowing enterprises to move faster and more securely.

STATUS: ACTIVE
Insider Threat

Blackscore develops automated risk scoring and classification of individuals based on emails, mobile devices or social media presence.

STATUS: ACTIVE
Threat intelligence

Buglab uses the power of Ethereum to enable attainable, versatile and reliable penetration testing for digital enterprise solutions.

STATUS: EXITED
Identity and Access Management

AimBrain's technology leveraged deep neural networks for fraud detection.

STATUS: ACTIVE
Data Protection

A data security company that equips organisations with the tools they need to secure and protect highly confidential documents and data.

STATUS: ACTIVE
Network Security

An Incident Response system providing vendor agnostic process based Playbooks.

STATUS: ACTIVE
Application and Web

Guardara provides fuzz testing for security and quality assurance.

STATUS: ACTIVE
Data Protection

Mimirium is a distributed user-owned personal database with an anonymous business interface.

STATUS: ACTIVE
Application and Web

Polaris is a next-generation web application firewall with enhanced threat intelligence.

STATUS: ACTIVE
Network Security

Protects core files and equipment and streams real-time provenance-guaranteed data from core devices to a centralised monitoring service.

STATUS: ACTIVE
End Point and Devices

An encryption mangement platform, empowering businesses and their employees to securely store sensitive files.

STATUS: ACTIVE
Identity and Access Management

Seknox empowers modern IT operations with strong and accessible security solutions.

STATUS: ACTIVE
Governance, Risk, Compliance

CryptoLynx provides blockchain intelligence and monitoring services to regulators, financial institutions and other virtual asset service providers.

STATUS: ACTIVE
Threat intelligence

We protect brands and defend democracy from harmful social media manipulation campaigns - also known as astroturfing.

STATUS: ACTIVE
Application and Web

The easiest, fastest and safest way to provision all business applications and data and connect users with it.

STATUS: ACTIVE
IoT and Operational Technology

SafeTech's OTShield detects, prevents and analyses cyber-attacks in SCADA and Industrial IoT systems.

STATUS: ACTIVE
Network Security

SIRP is a security orchestration, automation and response platform that helps organizations manage a risk-driven security operation.

STATUS: EXITED
Threat intelligence

BinaryEdge analyses and correlates data from across the web to create real-time threat intelligence reports.

STATUS: EXITED
Communications Security

An advert verification and malware detection service.

STATUS: ACTIVE
Application and Web

Immediate system recovery from cyber attacks, offering continuous operation and low cost.

STATUS: ACTIVE
Communications Security

Salvador Technologies developed innovative, low cost, device that by one press of a button, recovers your computer in zero time.

STATUS: ACTIVE
Training and Awareness

OutThink helps businesses identify and reduce risky workforce behaviours and build a risk aware culture.

STATUS: ACTIVE
Communications Security

A cloud-based content security platform that empowers enterprises to protect, track, and control critical content after it has been shared.

STATUS: ACTIVE
Governance, Risk, Compliance

Seconize enables enterprises to manage their cyber risks through its continuous predictive risk intelligence product.

STATUS: ACTIVE
Communications Security

PhishBase is an intelligent mail analyser utilising fuzzy logic to prevent phishing attacks, data loss and more.

STATUS: ACTIVE
Data Protection

oneKIY is a security platform of applications built around the 'Keep It Yourself' patented security system.

STATUS: ACTIVE
Network Security

LOKI provides a cloud based platform that enables non-technical people to understand, manage and secure their networks.

STATUS: ACTIVE
Threat intelligence

INFRA develops artificial intelligence for hacking and finding IT security liabilities.

STATUS: ACTIVE
Application and Web

Empowering development teams to find, fix and prevent security vulnerabilities in their applications.

STATUS: ACTIVE
Identity and Access Management

A credential issuance and verification network eradicating forgery and counterfeiting of licenses and credentials.

STATUS: ACTIVE
Training and Awareness

An eLearning security platform which empowers, motivates and nudges employees to change their online behaviour.

STATUS: ACTIVE
Governance, Risk, Compliance

Enabling organisations to identify and respond to cyber risks and ensure data is managed in line with corporate and regulatory requirements.

STATUS: ACTIVE
End Point and Devices

Cloudpurge provides endpoint protection from browser, email and document-based malware, ransomware and phishing attacks.

STATUS: ACTIVE
Identity and Access Management

A mobile application with an identity wallet, providing secure authentication with biometrics and contextual MFA.

STATUS: ACTIVE
Cloud Security

Establishes secure and private cloud computing infrastructure and workflows for scientific and engineering applications.

STATUS: ACTIVE
Threat intelligence

True prediction of insider threats, with minimum false positives.

STATUS: ACTIVE
Network Security

Providing seamless, multi-device, advanced security for end users, enterprises and governments.

STATUS: ACTIVE
IoT and Operational Technology

Threat9 provides a cyber threat detection and vulnerability assessment platform for enterprise IoT security.

STATUS: ACTIVE
Application and Web

Patchstack helps web developers to easily secure web apps from third-party component vulnerabilities.

STATUS: ACTIVE
Application and Web

AttackFlow helps customers to identify weaknesses in their software before hackers do, offering a new way of secure coding.

STATUS: ACTIVE
Communications Security

An anti-phishing and cyber security awareness platform that aims to prevent security breaches and data loss.

STATUS: ACTIVE
Cloud Security

Cloud security posture management platform (CSPM) with an embedded Continuous Adaptive Risk and Trust Assessments (CARTA) approach at its core.

STATUS: ACTIVE
Governance, Risk, Compliance

Zercurity provides a comprehensive health-check of the security status of every asset, application, and device within an organisation.

STATUS: ACTIVE
Governance, Risk, Compliance

A privacy-focused platform to monitor and archive business communications.

STATUS: ACTIVE
Application and Web

Ship software without vulnerabilities.

STATUS: ACTIVE
IoT and Operational Technology

Tools that enable internet-connected devices, individuals and enterprises to provision, secure, run and connect cyber-physical infrastructure.

STATUS: ACTIVE
Data Protection

Providing solutions for individuals and businesses to keep their data safe.

STATUS: ACTIVE
Application and Web

Avoid copyright infringements by finding the licenses and plagiarised source code snippets that are inside your software.

STATUS: ACTIVE
Identity and Access Management

Helping organisations and individuals access cloud, web and mobile in a seamless and secure manner.

STATUS: ACTIVE
Threat intelligence

Applying recent advances in AI to insider fraud.

STATUS: ACTIVE
Cloud Security

Drie provides cloud-based services to organisations using encryption and isolation technologies to ensure that data is held safely.

STATUS: ACTIVE
Data Protection

Secure eSign software for companies in diverse sectors, offering end-to-end document security and compliance.

STATUS: ACTIVE
Identity and Access Management

Nettoken is the control panel for your digital identity.

STATUS: EXITED
Governance, Risk, Compliance

ThreatInformer provided advanced security metrics tailored for cyber insurance underwriters.

STATUS: ACTIVE
End Point and Devices

Providing an Active Endpoint Deception platform that dynamically responds to attacks as they evolve.

STATUS: EXITED
Application and Web

An innovative, hands-on, gamified training platform.

STATUS: ACTIVE
Application and Web

AI Powered WAF for APIs, offering a 99.99% detection rate on all types of API attack.

STATUS: ACTIVE
Application and Web

An online vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

STATUS: EXITED
End Point and Devices

Sphere Soc provides advanced solutions for cyber incident prevention.

STATUS: ACTIVE
Communications Security

Controlling insider security threats and simplifying compliance, using automated, precise information access control.

STATUS: ACTIVE
Network Security

Protecting any server by providing immediate protection against a wide range of cyber attacks.

STATUS: ACTIVE
Network Security

Offering high-fidelity detection, available via a SaaS platform.

STATUS: ACTIVE
Communications Security

Offering the secure communications backbone for FinTech and RegTech, empowering control of data and privacy.

STATUS: ACTIVE
Network Security

Lantaca specialises in cloud-based security solutions for modern networks.

If you’re an investor or would like more information on any of our companies please contact [email protected]
X