Overview | |||||
Supplier Slogan | |||||
HQ Location | United States | United Kingdom | United States | United States | China |
Year Founded | 2007 | 2013 | 1982 | 2016 | 1995 |
Company Type | Private | Private | Public | Private | Private |
Stock Ticker | DARK | NYSE: DELL | |||
Revenue | $10-100m | $10-100m | $100m-1b | < $10m | $10-100m |
Employees | 51 - 200 | 201 - 1,000 | 1,001 - 10,000 | < 10 | 51 - 200 |
Website | Open website | Open website | Open website | Open website | Open website |
Company Description | CloudLock was launched in 2011 with one simple goal in mind: to transform cloud security into a business enabler. From that initial goal, they have built out a unified security fabric that helps organizations protect their sensitive data in Public Cloud applications such as Google Apps, Salesforce, Dropbox, Box, ServiceNow, Office 365, Third-party connected and other apps. | Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. Headquartered in Cambridge, UK, the company has 1,500 employees and over 30 offices worldwide. Darktrace was named one of TIME magazine’s ‘Most Influential Companies’ for 2021 | RSA Security LLC, formerly RSA Security, Inc. and doing business as RSA, is an American computer and Network Security company. RSA was named after the initials of its co-founders, Ron Rivest, Adi Shamir and Len Adleman, after whom the RSA public key Cryptography algorithm was also named. Among its products include the RSA BSAFE Cryptography libraries and the SecurID Authentication token. RSA is known for allegedly incorporating backdoors developed by the NSA in its products. It also organizes the annual RSA Conference, an information security conference. Founded as an independent company in 1982, RSA Security, Inc. was acquired by EMC Corporation in 2006 for US$2.1 billion and operates as a division within EMC. RSA is based in Bedford, Massachusetts, with regional headquarters in Bracknell (UK) and Singapore, and numerous international offices. Year founded: 1982 Stock ticker: RSA | MedCrypt provides data security as a service to medical device OEMs. From medical imaging device, to implantable devices like pacemakers, MedCrypt ensures that devices act only on instructions from trusted sources. | Topsec Cloud Solutions is a major provider of managed email and web security solutions in the cloud. For almost two decades we have served a diverse range of customers in Government, Healthcare, Engineering, Information Technology and other industries. Anti-spam, Anti-virus, Email security, Email content filtering, Sandboxing, Email archiving, File sharing, and Domain management are among our services. In summary, we match our clients’ security demands and assist them in securing and managing their corporate information with no upfront costs. |
IoT Solutions | As a platform, the CloudLock Cloud Security Fabric takes a programmatic approach to cloud security. In addition to leveraging APIs from cloud services, CloudLock is itself a collection of RESTful, API-based Microservices. Using this approach, CloudLock dynamically applies individual security services (such as Cloud DLP) to customer apps on any platform, whether those apps are running on a well-known services such as Amazon Web Services (AWS) or an On-Premises server. | Industrial Immune System Fundamental AI technology for OT cyber defense. It works by passively learning what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber-threats in real time. This self-learning technology is protocol agnostic and can be deployed across a range of OT environments, providing full coverage of the organization without disrupting daily operations. Darktrace Antigena The world’s first Autonomous Response solution. Powered by award-winning Cyber AI, it responds to cyber-attacks in a matter of seconds - when security teams are overwhelmed or simply aren’t around. The technology works like a digital antibody, intelligently generating a targeted and proportionate response whenever a threatening incident arises in network, email or cloud environments. | CRYPTOGRAPHY API
Call MedCrypt’s APIs within your device’s software for common Security Functions, like encrypting Data at Rest and in transit, and cryptographically signing all instructions sent to your device with unique key pairs.
BEHAVIOR MONITORING
MedCrypt devices can send event data (not PHI) to our monitoring service, allowing us to detect when a device is under attack. This helps you satisfy the FDA's requirement that devices incorporate "intrusion detection".
VULNERABILITY MONITORING
MedCrypt knows which software libraries have been included in your device, and can monitor these libraries for known cybersecurity vulnerabilites long after it has been released. | ||
Key Customers | NASA, HBO, Dreamworks Studio, Sunnova, Whirlpool, Acquia | Network18, KPMG, BT, T-Mobile, Ocado, Peugeot, ebay | Adobe, Ameritas, Berkshire Bank, Shop Direct. | ||
Subsidiary | |||||
Parent Company | |||||
IoT Snapshot | |||||
Technologies | Cybersecurity & Privacy | Cybersecurity & PrivacyApplication Infrastructure & MiddlewareInfrastructure as a Service (IaaS) | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & PrivacyAnalytics & Modeling |
Industries | Renewable Energy | EducationEquipment & MachineryFinance & InsuranceHealthcare & HospitalsRenewable EnergyRetailSecurity & Public SafetyTelecommunicationsTransportation | Healthcare & Hospitals | Cities & MunicipalitiesEducationFinance & InsuranceHealthcare & HospitalsTransportation | |
Use Cases | CybersecurityProcess Control & Optimization | Intrusion Detection Systems | |||
Functions | |||||
Services | Cybersecurity Services | Cloud Planning, Design & Implementation ServicesTraining | Cybersecurity Services | ||
Technology Stack | |||||
Infrastructure as a Service (IaaS) | None | Moderate | None | None | None |
Platform as a Service (PaaS) | None | None | None | None | None |
Application Infrastructure & Middleware | None | Minor | None | None | None |
Analytics & Modeling | None | None | None | None | Minor |
Functional Applications | None | None | None | None | None |
Cybersecurity & Privacy | Moderate | Moderate | Moderate | Moderate | Moderate |
Networks & Connectivity | None | None | None | None | None |
Processors & Edge Intelligence | None | None | None | None | None |
Sensors | None | None | None | None | None |
Automation & Control | None | None | None | None | None |
Robots | None | None | None | None | None |
Drones | None | None | None | None | None |
Wearables | None | None | None | None | None |
Actuators | None | None | None | None | None |
Other | None | None | None | None | None |
Similar Suppliers | |||||
Similar Suppliers | |||||
Partners | |||||
Partners | Amazon Web ServicesGoogleIBMMicrosoftZscalerVMware (DELL)RSA (DELL) | VMware (DELL)VMware TanzuVirtustream (DELL) |
Overview | |||||
Supplier Slogan | |||||
HQ Location | United States | United Kingdom | United States | United States | China |
Year Founded | 2007 | 2013 | 1982 | 2016 | 1995 |
Company Type | Private | Private | Public | Private | Private |
Stock Ticker | DARK | NYSE: DELL | |||
Revenue | $10-100m | $10-100m | $100m-1b | < $10m | $10-100m |
Employees | 51 - 200 | 201 - 1,000 | 1,001 - 10,000 | < 10 | 51 - 200 |
Website | Open website | Open website | Open website | Open website | Open website |
Company Description | CloudLock was launched in 2011 with one simple goal in mind: to transform cloud security into a business enabler. From that initial goal, they have built out a unified security fabric that helps organizations protect their sensitive data in Public Cloud applications such as Google Apps, Salesforce, Dropbox, Box, ServiceNow, Office 365, Third-party connected and other apps. | Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. Headquartered in Cambridge, UK, the company has 1,500 employees and over 30 offices worldwide. Darktrace was named one of TIME magazine’s ‘Most Influential Companies’ for 2021 | RSA Security LLC, formerly RSA Security, Inc. and doing business as RSA, is an American computer and Network Security company. RSA was named after the initials of its co-founders, Ron Rivest, Adi Shamir and Len Adleman, after whom the RSA public key Cryptography algorithm was also named. Among its products include the RSA BSAFE Cryptography libraries and the SecurID Authentication token. RSA is known for allegedly incorporating backdoors developed by the NSA in its products. It also organizes the annual RSA Conference, an information security conference. Founded as an independent company in 1982, RSA Security, Inc. was acquired by EMC Corporation in 2006 for US$2.1 billion and operates as a division within EMC. RSA is based in Bedford, Massachusetts, with regional headquarters in Bracknell (UK) and Singapore, and numerous international offices. Year founded: 1982 Stock ticker: RSA | MedCrypt provides data security as a service to medical device OEMs. From medical imaging device, to implantable devices like pacemakers, MedCrypt ensures that devices act only on instructions from trusted sources. | Topsec Cloud Solutions is a major provider of managed email and web security solutions in the cloud. For almost two decades we have served a diverse range of customers in Government, Healthcare, Engineering, Information Technology and other industries. Anti-spam, Anti-virus, Email security, Email content filtering, Sandboxing, Email archiving, File sharing, and Domain management are among our services. In summary, we match our clients’ security demands and assist them in securing and managing their corporate information with no upfront costs. |
IoT Solutions | As a platform, the CloudLock Cloud Security Fabric takes a programmatic approach to cloud security. In addition to leveraging APIs from cloud services, CloudLock is itself a collection of RESTful, API-based Microservices. Using this approach, CloudLock dynamically applies individual security services (such as Cloud DLP) to customer apps on any platform, whether those apps are running on a well-known services such as Amazon Web Services (AWS) or an On-Premises server. | Industrial Immune System Fundamental AI technology for OT cyber defense. It works by passively learning what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber-threats in real time. This self-learning technology is protocol agnostic and can be deployed across a range of OT environments, providing full coverage of the organization without disrupting daily operations. Darktrace Antigena The world’s first Autonomous Response solution. Powered by award-winning Cyber AI, it responds to cyber-attacks in a matter of seconds - when security teams are overwhelmed or simply aren’t around. The technology works like a digital antibody, intelligently generating a targeted and proportionate response whenever a threatening incident arises in network, email or cloud environments. | CRYPTOGRAPHY API
Call MedCrypt’s APIs within your device’s software for common Security Functions, like encrypting Data at Rest and in transit, and cryptographically signing all instructions sent to your device with unique key pairs.
BEHAVIOR MONITORING
MedCrypt devices can send event data (not PHI) to our monitoring service, allowing us to detect when a device is under attack. This helps you satisfy the FDA's requirement that devices incorporate "intrusion detection".
VULNERABILITY MONITORING
MedCrypt knows which software libraries have been included in your device, and can monitor these libraries for known cybersecurity vulnerabilites long after it has been released. | ||
Key Customers | NASA, HBO, Dreamworks Studio, Sunnova, Whirlpool, Acquia | Network18, KPMG, BT, T-Mobile, Ocado, Peugeot, ebay | Adobe, Ameritas, Berkshire Bank, Shop Direct. | ||
Subsidiary | |||||
Parent Company | |||||
IoT Snapshot | |||||
Technologies | Cybersecurity & Privacy | Cybersecurity & PrivacyApplication Infrastructure & MiddlewareInfrastructure as a Service (IaaS) | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & PrivacyAnalytics & Modeling |
Industries | Renewable Energy | EducationEquipment & MachineryFinance & InsuranceHealthcare & HospitalsRenewable EnergyRetailSecurity & Public SafetyTelecommunicationsTransportation | Healthcare & Hospitals | Cities & MunicipalitiesEducationFinance & InsuranceHealthcare & HospitalsTransportation | |
Use Cases | CybersecurityProcess Control & Optimization | Intrusion Detection Systems | |||
Functions | |||||
Services | Cybersecurity Services | Cloud Planning, Design & Implementation ServicesTraining | Cybersecurity Services | ||
Technology Stack | |||||
Infrastructure as a Service (IaaS) | None | Moderate | None | None | None |
Platform as a Service (PaaS) | None | None | None | None | None |
Application Infrastructure & Middleware | None | Minor | None | None | None |
Analytics & Modeling | None | None | None | None | Minor |
Functional Applications | None | None | None | None | None |
Cybersecurity & Privacy | Moderate | Moderate | Moderate | Moderate | Moderate |
Networks & Connectivity | None | None | None | None | None |
Processors & Edge Intelligence | None | None | None | None | None |
Sensors | None | None | None | None | None |
Automation & Control | None | None | None | None | None |
Robots | None | None | None | None | None |
Drones | None | None | None | None | None |
Wearables | None | None | None | None | None |
Actuators | None | None | None | None | None |
Other | None | None | None | None | None |
Similar Suppliers | |||||
Similar Suppliers | |||||
Partners | |||||
Partners | Amazon Web ServicesGoogleIBMMicrosoftZscalerVMware (DELL)RSA (DELL) | VMware (DELL)VMware TanzuVirtustream (DELL) |