OUR COMPANIES

We’ve supported over 65 companies to date, all led by ambitious entrepreneurs from over 30 nationalities focused on securing our digital future with innovative cyber security products.

STATUS: ACTIVE

Cohort: 1 - Singapore

Governance, Risk, Compliance

Apvera provides a suite of security, risk and compliance solutions that enable organisations to identify and respond to cyber risks and ensure ...

Apvera provides a suite of security, risk and compliance solutions that enable organisations to identify and respond to cyber risks and ensure data is managed in line with corporate and regulatory requirements.

Visit Website
X
STATUS: ACTIVE

Cohort: 1 - Singapore

End point and devices

Cloudpurge provides endpoint protection from browser, email and document-based malware, ransomware and phishing attacks. Cloudpurge’s isolated, disposable browsers allow users ...

Cloudpurge provides endpoint protection from browser, email and document-based malware, ransomware and phishing attacks. Cloudpurge’s isolated, disposable browsers allow users to browse web content remotely, shifting risk away from virtual machines and endpoints.

Visit Website
X
STATUS: ACTIVE

Cohort: 1 - Singapore

Identity and Access

Secucial has developed a digital idenitty wallet, ‘Sovrin’, based on a distributed ledger and private blockchain network technologies. Sovrin is a mobile ...

Secucial has developed a digital idenitty wallet, ‘Sovrin’, based on a distributed ledger and private blockchain network technologies. Sovrin is a mobile application that links a users’ physical identity with their digital identites and provides users with complete control over personal data.

Visit Website
X
STATUS: ACTIVE

Cohort: 1 - Singapore

Cloud security

Silicon Cloud International establishes secure and private cloud computing infrastructure and workflows for scientific and engineering applications....

Silicon Cloud International establishes secure and private cloud computing infrastructure and workflows for scientific and engineering applications.

Visit Website
X
STATUS: ACTIVE

Cohort: 1 - Singapore

Network security

SocView is a integrated security operations platform that manages multiple security processes within one centralized console, driving efficiencies and enhancing an organisation'...

SocView is a integrated security operations platform that manages multiple security processes within one centralized console, driving efficiencies and enhancing an organisation’s security posture.

Visit Website
X
STATUS: ACTIVE

Cohort: 6 - London

Insider Threat

InCyber predicts insider threats within a company based on client's logs and data, integrative data inputs of internal and external sources, ...

InCyber predicts insider threats within a company based on client’s logs and data, integrative data inputs of internal and external sources, advanced mathematics and InCyber’s own Crystal Ball Ranking Method™. InCyber’s Pro-Active System (“PAS” ) provides advance warning of impending insider attacks before they can damage, steal, or publicize sensitive data.

Visit Website
X
STATUS: FOLDED

Cohort: 6 - London

IoT

IOTSploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IOT vulnerabilities....

IOTSploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IOT vulnerabilities.

Visit Website
X
STATUS: ACTIVE

Cohort: 6 - London

Network security

Safehouse provides military-grade cyber security for enterprise and government. SafeHouse core-tech conducts analysis of the user’s traffic, with the ...

Safehouse provides military-grade cyber security for enterprise and government. SafeHouse core-tech conducts analysis of the user’s traffic, with the ability to detect and prevent cyber threats in real time.

Visit Website
X
STATUS: ACTIVE

Cohort: 6 - London

IoT

Threat9 develops software for securing global network of connected devices. The company offers Threat9 Intruder, a software that scans user's network ...

Threat9 develops software for securing global network of connected devices. The company offers Threat9 Intruder, a software that scans user’s network and provide real-time alerts when Internet of things (IoT) device vulnerabilities are discovered; Threat9 Guard, a solution which deploys signatures to user’s network devices and prevent attacks; and RouterSploit, an open source software which allows penetration testers to target embedded device vulnerabilities.

Visit Website
X
STATUS: ACTIVE

Cohort: 6 - London

Application and Web

WebARX is a complete website security and monitoring platform including web application firewall, up-time monitoring, domain reputation checks, and security scans ...

WebARX is a complete website security and monitoring platform including web application firewall, up-time monitoring, domain reputation checks, and security scans on a single dashboard.

Visit Website
X
STATUS: ACTIVE

Cohort: 7 - London

Training

AttackFlow helps customers to identify weaknesses in their software before hackers do. Using a real-time static analytical solution integrated directly into ...

AttackFlow helps customers to identify weaknesses in their software before hackers do. Using a real-time static analytical solution integrated directly into the development environment, developers can identify and locate vulnerabilities in their software as they code.

Visit Website
X
STATUS: ACTIVE

Cohort: 7 - London

Data Loss Prevention

Keepnet Labs is an anti-phishing and cyber security awareness platform that aims to prevent security breaches and data loss....

Keepnet Labs is an anti-phishing and cyber security awareness platform that aims to prevent security breaches and data loss.

Visit Website
X
STATUS: ACTIVE

Cohort: 7 - London

Governance, Risk, Compliance

Risk Ledger enables companies to measure, monitor and mitigate their supply chain security risk....

Risk Ledger enables companies to measure, monitor and mitigate their supply chain security risk.

Visit Website
X
STATUS: ACTIVE

Cohort: 7 - London

IoT

Sauron Security is a real-time, active cyber defence software for Enterprise IoT systems. It enables threat detection, automatic remediation and visual ...

Sauron Security is a real-time, active cyber defence software for Enterprise IoT systems. It enables threat detection, automatic remediation and visual monitoring of cyber attacks in real-time.

Visit Website
X
STATUS: ACTIVE

Cohort: 7 - London

Cloud security

Secberus helps manage cloud security risk. By automating the security assessment and enforcement of controls across multiple public cloud infrastructures, Secberus enables ...

Secberus helps manage cloud security risk. By automating the security assessment and enforcement of controls across multiple public cloud infrastructures, Secberus enables companies to have security confidence in their cloud environments by providing end-to-end network visibility and real-time compliance reporting.

Visit Website
X
STATUS: ACTIVE

Cohort: 7 - London

Network security

Senseon’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps ...

Senseon’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

Visit Website
X
STATUS: ACTIVE

Cohort: 7 - London

Network security

Sweepatic provides reconnaissance and counterintelligence solutions. Sweepatic's platform mimics the cyber attacker. By running the latest and most refined reconnaissance techniques ...

Sweepatic provides reconnaissance and counterintelligence solutions. Sweepatic’s platform mimics the cyber attacker. By running the latest and most refined reconnaissance techniques across all internet-facing assets, the Sweepatic platform builds an extensive inventory of a company’s attack surface and its exposure to cyber risk.

Visit Website
X
STATUS: ACTIVE

Cohort: 8 - London

Governance, Risk, Compliance

Beauceron makes it faster, easier and less complex for organisations to measure, manage and monitor human-centric cyber risk. Their comprehensive, automated ...

Beauceron makes it faster, easier and less complex for organisations to measure, manage and monitor human-centric cyber risk. Their comprehensive, automated cybersecurity platform covers cybersecurity education, social engineering simulations, executive surveys, and dashboards as well as business process, and technology gap assessment and analysis.

Visit Website
X
STATUS: ACTIVE

Cohort: 8 - London

Governance, Risk, Compliance

Zercurity provides a comprehensive health-check of the security status of every asset, application, and device within an organisation....

Zercurity provides a comprehensive health-check of the security status of every asset, application, and device within an organisation.

Visit Website
X
STATUS: ACTIVE

Cohort: 8 - London

Governance, Risk, Compliance

DeepView protects companies from data leakage by staff. Real time alerts to public data leaks and opt-in encrypted channel recording make ...

DeepView protects companies from data leakage by staff. Real time alerts to public data leaks and opt-in encrypted channel recording make personal devices in the workplace safer. DeepView’s unrivalled, patent pending technology and AI algorithm is built to read photos. It is the only solution that allows companies to manage data leakage from photos, videos and text shared by employees. Thereby protecting companies from inadvertent and intentional data leaks. The advanced, slick encryption recording is the only solution to meet GDPR and MiFID II standards. The platform instantly notifies you to confidential company data being shared for immediate action. Whilst also recording and archiving all business communications across current and emerging social channels.

Visit Website
X
STATUS: ACTIVE

Cohort: 8 - London

Identity and Access

Keyp has developed the world’s first 'Identity Terminal', which connects any number of identity solutions and can be integrated into any ...

Keyp has developed the world’s first ‘Identity Terminal’, which connects any number of identity solutions and can be integrated into any identity management system. Keyp provides the fastest, most straightforward way to conduct legally compliant identity checks.

Visit Website
X
STATUS: ACTIVE

Cohort: 8 - London

Application and Web

Meterian finds software vulnerabilities originating from open source components, providing a one-stop shop to easily, efficiently and affordably reduce security risks ...

Meterian finds software vulnerabilities originating from open source components, providing a one-stop shop to easily, efficiently and affordably reduce security risks before software is released into production.

Visit Website
X
STATUS: ACTIVE

Cohort: 8 - London

IoT

MatiCy provides tools that enable internet-connected devices, individuals, enterprises, operators and AI platforms to provision, secure, run and connect cyber-physical ...

MatiCy provides tools that enable internet-connected devices, individuals, enterprises, operators and AI platforms to provision, secure, run and connect cyber-physical infrastructure.

X
STATUS: ACTIVE

Cohort: 8 - London

Data Loss Prevention

Lattice Security's cloud-based platform uses machine learning to instantly classify and protect data as it is created, enabling secure collaboration ...

Lattice Security’s cloud-based platform uses machine learning to instantly classify and protect data as it is created, enabling secure collaboration across the organisation.

Visit Website
X
STATUS: ACTIVE

Cohort: 8 - London

Network security

Idrisi provides organisations with a complete picture of their security posture, allowing them to reduce network risk and increase business agility....

Idrisi provides organisations with a complete picture of their security posture, allowing them to reduce network risk and increase business agility.

Visit Website
X
STATUS: ACTIVE

Cohort: 3 - London

Data Protection

Galaxkey provides quick, straightforward data management services to business, enabling companies to protect data and retain their customers’ ownership and control of ...

Galaxkey provides quick, straightforward data management services to business, enabling companies to protect data and retain their customers’ ownership and control of it.

Visit Website
X
STATUS: ACTIVE

Cohort: 3 - London

Training

Hook runs pay-as-you-go, personalised phishing tests which aim to identify employees who may fall for a scam email and ...

Hook runs pay-as-you-go, personalised phishing tests which aim to identify employees who may fall for a scam email and put internal data at risk.

Visit Website
X
STATUS: ACTIVE

Cohort: 3 - London

Application and Web

TripleCheck enables companies to find licenses and plagiarized source code snippets inside their software. It provides independent software copyright audits as well ...

TripleCheck enables companies to find licenses and plagiarized source code snippets inside their software. It provides independent software copyright audits as well as training for open source software inside closed source products.

Visit Website
X
STATUS: ACTIVE

Cohort: 4 - London

Identity and Access

AppsPicket helps organisations and individuals access cloud, web and mobile in a seamless and secure manner. Their innovative Two Factor Authentication technology ...

AppsPicket helps organisations and individuals access cloud, web and mobile in a seamless and secure manner. Their innovative Two Factor Authentication technology permits users to be authenticated without the hassles of OTPs/hardware tokens or additional Authenticator apps.

Visit Website
X
STATUS: ACTIVE

Cohort: 4 - London

Application and Web

Codified Security tests mobile apps for security issues before they are released. The solution helps to find and fix vulnerabilities quickly and ...

Codified Security tests mobile apps for security issues before they are released. The solution helps to find and fix vulnerabilities quickly and without the need for a complete penetration test.

Visit Website
X
STATUS: ACTIVE

Cohort: 4 - London

Insider Threat

Conatix is building a semi-automated business intelligence system based on recent advances in machine learning. This enables companies to discover, source, ...

Conatix is building a semi-automated business intelligence system based on recent advances in machine learning. This enables companies to discover, source, structure and share previously unstructured data and information from outside their organisations.

Visit Website
X
STATUS: ACTIVE

Cohort: 4 - London

Cloud security

Drie provides cloud-based services to organisations using encryption and isolation technologies to ensure that data is held safely....

Drie provides cloud-based services to organisations using encryption and isolation technologies to ensure that data is held safely.

Visit Website
X
STATUS: ACTIVE

Cohort: 4 - London

Data Protection

MyDocSafe empowers companies to design and deploy their own client sign-up processes, including secure forms, KYC/AML checks, contract signing and ...

MyDocSafe empowers companies to design and deploy their own client sign-up processes, including secure forms, KYC/AML checks, contract signing and payment facility setup. It also offers blockchain and cyber security solutions to help clients protect the integrity of their data.

Visit Website
X
STATUS: ACTIVE

Cohort: 4 - London

Identity and Access

Nettoken is an identity management platform designed to encourage awareness of our ever expanding digital footprint and personal cybersecurity. It finds all ...

Nettoken is an identity management platform designed to encourage awareness of our ever expanding digital footprint and personal cybersecurity. It finds all of a users digital accounts and keeps track of them, making everything accessible from a single control panel that is secure and easy to manage.

Visit Website
X
STATUS: ACTIVE

Cohort: 4 - London

Governance, Risk, Compliance

ThreatInformer provide advanced security metrics tailored for cyber insurance underwriters. Their solution empowers insurers to make smarter, well-informed decisions and transforms ...

ThreatInformer provide advanced security metrics tailored for cyber insurance underwriters. Their solution empowers insurers to make smarter, well-informed decisions and transforms the way cyber policies are measured and built.

Visit Website
X
STATUS: ACTIVE

Cohort: 4 - London

Identity and Access

VChain connects each human being to a digital identity which is as unique as their DNA. Using proof-scoring instead of trust, ...

VChain connects each human being to a digital identity which is as unique as their DNA. Using proof-scoring instead of trust, VChain provides reliable and trustworthy identification and verification. Its platform helps institutions secure data and ensures organisations meet API requirements & The Privacy by Design / EU Data Reform Act.

Visit Website
X
STATUS: ACTIVE

Cohort: 5 - London

Data Protection

Hazy, enables ethical, effortless and GDPR-compliant data sharing for responsible businesses. Hazy's cloud-based platform uses AI to seek out ...

Hazy, enables ethical, effortless and GDPR-compliant data sharing for responsible businesses. Hazy’s cloud-based platform uses AI to seek out and anonymise personal data buried in datasets.

Visit Website
X
STATUS: ACTIVE

Cohort: 5 - London

End point and devices

Deceptive Bytes provides endpoint defensive and offensive solution based on deception. By using the same defenses and techniques against viruses as the ...

Deceptive Bytes provides endpoint defensive and offensive solution based on deception. By using the same defenses and techniques against viruses as the viruses use themselves, the solution deceives viruses into believing they’re in a hostile or unattractive environment to attack.

Visit Website
X
STATUS: ACTIVE

Cohort: 5 - London

Data Protection

HighSide secures internal communications and file sharing layers, massively reducing an organisation's business risk associated with cybercrime, data breaches, customer attrition, ...

HighSide secures internal communications and file sharing layers, massively reducing an organisation’s business risk associated with cybercrime, data breaches, customer attrition, shadow IT, reputational damages, financial loss and more.

Visit Website
X
STATUS: ACTIVE

Cohort: 5 - London

Training

Immersive Labs is a cyber learning platform offering a range of practical labs that help identify, measure and develop cyber security skills....

Immersive Labs is a cyber learning platform offering a range of practical labs that help identify, measure and develop cyber security skills.

Visit Website
X
STATUS: ACTIVE

Cohort: 5 - London

Network security

Lantaca specialises in cloud-based security solutions for modern networks. Lantaca's range of solutions covers all aspects of cloud security including ...

Lantaca specialises in cloud-based security solutions for modern networks. Lantaca’s range of solutions covers all aspects of cloud security including incident response, threat intelligence, network security, wi-fi protection and targeted attacks.

Visit Website
X
STATUS: ACTIVE

Cohort: 5 - London

Application and Web

Spherical Defense has developed a web application firewall for structured data. Using AI and deep learning, the web application firewall learns the ...

Spherical Defense has developed a web application firewall for structured data. Using AI and deep learning, the web application firewall learns the grammar and syntax used by applications to communicate with each other. From this, it can detect and deter anomalous traffic.

Visit Website
X
STATUS: ACTIVE

Cohort: 5 - London

Threat intelligence

TitanGrid is a counter-intelligence platform focused on cyber attack prevention, providing an overview of a user’s weaknesses and how they ...

TitanGrid is a counter-intelligence platform focused on cyber attack prevention, providing an overview of a user’s weaknesses and how they can be remediated.

Visit Website
X
STATUS: FOLDED

Cohort: 6 - London

Identity and Access

Pico was a 5-year research project at the University of Cambridge, conceived and led by Professor Frank Stajano and funded by ...

Pico was a 5-year research project at the University of Cambridge, conceived and led by Professor Frank Stajano and funded by the European Research Council. The company is now being dissolved and its founders are no longer working together. Most of the Pico software has been released as GPL v3 open source on github on an “as is” basis.

Visit Website
X
STATUS: ACTIVE

Cohort: 6 - London

Governance, Risk, Compliance

CyberSmart is an automation platform that helps businesses get and stay secure with recognised certification standards. The CyberSmart app is easily deployed ...

CyberSmart is an automation platform that helps businesses get and stay secure with recognised certification standards. The CyberSmart app is easily deployed and provides insights into the current security status of all devices within an organisation.

Visit Website
X
STATUS: ACTIVE

Cohort: 1 - London

Identity and Access

AimBrain delivers the industry’s first and only multi-module biometrics platform that allows institutions to easily, securely, and accurately authenticate their ...

AimBrain delivers the industry’s first and only multi-module biometrics platform that allows institutions to easily, securely, and accurately authenticate their customer’s identity on any device, across any channel. Using a patent-pending, context-based step-up authentication methodology, AimBrain is helping some of the world’s largest financial institutions confirm whether their users really are who they say they are.

Visit Website
X
STATUS: FOLDED

Cohort: 1 - London

Network security

Cyberlytic detects and prioritises sophisticated web threats. Cyberlytic uses artificial intelligence to combat the most sophisticated of web application threats, addressing the ...

Cyberlytic detects and prioritises sophisticated web threats. Cyberlytic uses artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data. The company developed a unique risk-based approach and owns patents that relate to detection through real-time risk assessment and prioritisation of cyber-attacks.

Visit Website
X
STATUS: ACTIVE

Cohort: 1 - London

Application and Web

Intruder is a proactive vulnerability scanner that helps organisations to keep a constant watch over internet-facing systems. Intruder regularly assesses an ...

Intruder is a proactive vulnerability scanner that helps organisations to keep a constant watch over internet-facing systems. Intruder regularly assesses an organisation’s internet-facing systems for weaknesses that hackers could exploit, and provides risk ratings and threat notifications for every weakness, as well as detailed guidance for remediation.

Visit Website
X
STATUS: ACTIVE

Cohort: 1 - London

Data Protection

Mentat is developing technology for streaming data analytics at scale using cutting edge statistical techniques and infrastructure....

Mentat is developing technology for streaming data analytics at scale using cutting edge statistical techniques and infrastructure.

Visit Website
X
STATUS: ACTIVE

Cohort: 1 - London

Threat intelligence

Ripjar develops unique technology for global threat detection. Illuminating financial crimes across any data source, Ripjar’s scalable approach to threat detection ...

Ripjar develops unique technology for global threat detection. Illuminating financial crimes across any data source, Ripjar’s scalable approach to threat detection exposes increasingly hidden and complex criminal behaviour. Using automated analytics, and machine learning, Ripjar’s vision is to provide a new approach to detect threats proactively, and reduce the cost and overhead of financial compliance.

Visit Website
X
STATUS: FOLDED

Cohort: 1 - London

End point and devices

Ruuta is a faster, more reliable and secure next-generation Wi-Fi router. You can easily set it up and configure it ...

Ruuta is a faster, more reliable and secure next-generation Wi-Fi router. You can easily set it up and configure it from all your devices. It finds the best network settings and solves connection problems for you.

Visit Website
X
STATUS: EXITED

Cohort: 1 - London

End point and devices

Sphere Soc provides advanced solutions for cyber incidents preventions, data analysis and the applications that use a large amounts of information for ...

Sphere Soc provides advanced solutions for cyber incidents preventions, data analysis and the applications that use a large amounts of information for the people physical protection.

Visit Website
X
STATUS: ACTIVE

Cohort: 1 - London

Application and Web

SQR Systems provides secure communications the fintech and regtech sectors to protect their mobile and Internet of Things (IoT) devices. SQR System'...

SQR Systems provides secure communications the fintech and regtech sectors to protect their mobile and Internet of Things (IoT) devices. SQR System’s patented technology ensures effective compliance, control and security of data for enterprises and individuals over unpredictable networks.

Visit Website
X
STATUS: ACTIVE

Cohort: 2 - London

Network security

Aves Netsec’s solution adds a new layer of security into a network which robs the attacker of its ability to function, ...

Aves Netsec’s solution adds a new layer of security into a network which robs the attacker of its ability to function, capturing attackers and drawing intelligence from them. This enables enterprises to understand attacker motives, build risk profiles, quantify attack impacts, and subsequently improve their security posture.

Visit Website
X
STATUS: ACTIVE

Cohort: 2 - London

Network security

BitNinja is an easy-to-use complete server security tool. BitNinja is able to protect any server by providing immediate protection against ...

BitNinja is an easy-to-use complete server security tool. BitNinja is able to protect any server by providing immediate protection against a wide range of cyber attacks.

Visit Website
X
STATUS: FOLDED

Cohort: 2 - London

Data Protection

DYRNAN Communications provides trusted, secure and compliant communication tools to enterprises and governments worldwide...

DYRNAN Communications provides trusted, secure and compliant communication tools to enterprises and governments worldwide

Visit Website
X
STATUS: FOLDED

Cohort: 2 - London

Network security

Mazor offers the unique “Beholder Technology”, a network monitoring solution which targets and alerts on suspicious network activity occurring at the firewalls, ...

Mazor offers the unique “Beholder Technology”, a network monitoring solution which targets and alerts on suspicious network activity occurring at the firewalls, indicating malware presence, malicious activity or weak configuration at your Firewalls and Network infrastructure.

Visit Website
X
STATUS: ACTIVE

Cohort: 2 - London

Data Loss Prevention

Torsion Information Security controls insider security threats and simplifies compliance, using automated, precise information access control. Torsion works with existing information systems, ...

Torsion Information Security controls insider security threats and simplifies compliance, using automated, precise information access control. Torsion works with existing information systems, either as a service in the cloud, or software installed in data centres, to provide organisations with control over who accesses confidential information.

Visit Website
X
STATUS: ACTIVE

Cohort: 2 - London

Data Protection

Ukkobox helps SMEs deal with personal data in a secure and compliant manner. Ukkobox safely encrypts and spreads user files to existing ...

Ukkobox helps SMEs deal with personal data in a secure and compliant manner. Ukkobox safely encrypts and spreads user files to existing cloud providers worldwide. Because only parts of each file is stored on each provider files are secured and accessible even if some of these providers suffer an outage or are hacked.

Visit Website
X
STATUS: FOLDED

Cohort: 2 - London

Data Protection

Verity allows users to protect the integrity of digital assets. Users verify themselves and use their identity to sign any type of ...

Verity allows users to protect the integrity of digital assets. Users verify themselves and use their identity to sign any type of digital file. Once signed, files are validated by others. People and applications verify the user’s identity and confirm the file was issued by the user.

Visit Website
X
STATUS: ACTIVE

Cohort: 3 - London

Data Loss Prevention

Tessian is a machine intelligent email security platform to automatically prevent cybersecurity threats like spear phishing, misaddressed emails, unauthorized emails (data loss) ...

Tessian is a machine intelligent email security platform to automatically prevent cybersecurity threats like spear phishing, misaddressed emails, unauthorized emails (data loss) and non-compliance. Tessian uses machine learning to understand normal email communication patterns in order to automatically identify email security threats in real time, without the need for end user behaviour change or pre-defined rules and policies.

Visit Website
X
STATUS: EXITED

Cohort: 3 - London

Training

Codebashing's platform is an innovative, hands-on, gameified training platform of real world vulnerabilities that focuses on a highly interactive and ...

Codebashing’s platform is an innovative, hands-on, gameified training platform of real world vulnerabilities that focuses on a highly interactive and intuitive learn-by-doing model for application security training, all delivered through the web browser.

Visit Website
X
STATUS: ACTIVE

Cohort: 3 - London

Network security

CyberSparta delivers unique cyber attack monitoring, detection and automation using AI....

CyberSparta delivers unique cyber attack monitoring, detection and automation using AI.

Visit Website
X
STATUS: ACTIVE

Cohort: 3 - London

Governance, Risk, Compliance

DynaRisk combines personal risk factors with external data and algorithms to determine an individual’s level of risk online. Its solution not ...

DynaRisk combines personal risk factors with external data and algorithms to determine an individual’s level of risk online. Its solution not only tells someone what their risk level is, but also what they can do about it.

Visit Website
X
If you’re an investor or would like more information on any of our companies please contact [email protected]
X