Overview | ||||||
Supplier Slogan | Scalable security layer for the IoT | |||||
HQ Location | United States | United Kingdom | Armenia | United States | Poland | Israel |
Year Founded | 2011 | 2013 | 2017 | 2014 | 2014 | 2018 |
Company Type | Private | Private | Private | Private | Private | Private |
Stock Ticker | DARK | |||||
Revenue | < $10m | $10-100m | < $10m | < $10m | < $10m | < $10m |
Employees | 11 - 50 | 201 - 1,000 | < 10 | 11 - 50 | 11 - 50 | 11 - 50 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | Red Balloon Security is exclusively focused on the development of robust security solutions for embedded device systems across all major industries, including consumer electronics, automobiles, manufacturing/industrial systems, building Controllers, homeland security, military, etc. Founded by Ang Cui, Red Balloon Security's core technology is Symbiote Defense, a universally-compatible, OS-agnostic, real-time host-based intrusion defense system which is capable of protecting any embedded device from Malware and malicious commands. Symbiote is a patented technology that already protects millions of devices around the world, and has logged more than 15 billion hours of runtime without a single recorded failure. It is currently under contract for use by the US government, as well as critical infrastructure and consumer devices, like HP LaserJet printers. | Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. Headquartered in Cambridge, UK, the company has 1,500 employees and over 30 offices worldwide. Darktrace was named one of TIME magazine’s ‘Most Influential Companies’ for 2021 | Grovf is an engineering company aimed to develop hardware and software products to assist Industrial Internet of Things (IIoT) and Big Data problems.
Here at Grovf we help our industrial customers to solve IoT generated Big Data storage problems using hardware (FPGA) implementation of DB functionality in order to close the gap between IoT generated data throughput and software database transaction speed, resulting 20x faster transactions and power saving. | Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users. Virgil Security's Encryption libraries and services, along with an accompanying public key management infrastructure, ease the pain of developing, deploying, and using strong Cryptography. Virgil Security enables a new generation of enhanced privacy and security for applications, cloud services, and the Internet of Things. | We help IoT vendors to get more revenue through enhancing their products with the best-in-class security layer.
We bring certainty and peace of mind to owners of smart factories, smart buildings, smart vehicles, that they won't lose money because of being hacked.
Olympus Sky is an R&D company that developed a holy grail of security in the world of the IoT. We work with startups, gov agencies, automotive and the big industry, bringing protection to their connected devices and their networks. | With a mission to secure the future and enable life-saving applications, Sternum has built a holistic, scalable and first of its kind on-device security and visibility solution that prevents attacks in real-time while providing insights into any connected device. Sternum was founded in 2018, by a team of highly experienced research, development and business leaders with a mission to fundamentally change the world of IoT Security. Bringing profound knowledge in embedded systems, the joint perspectives of the defender and the attacker, and an aspiration to alleviate the medical security standard, Sternum not only set out to build uncompromising innovative technology but also to create true impact. |
IoT Solutions | The First Universal Embedded Defense for all embedded devices
Symbiote is a platform-independent, OS-agnostic, real-time, host-based intrusion defense that works by layering specific defense modules and diverting unused CPU cycles for defense. Symbiote is designed to protect any and all embedded devices, from printers to PLCs. It can be applied to any device regardless of OS, CPU type, or hardware.
Borrowing from strategies seen in nature, like defense through diversification and defensive mutualism, Symbiote Defense keeps embedded systems safe against a wide variety of attacks. It defends devices without requiring any code change from the vendor, any additional or upgraded hardware, and all without impacting the functionality of the device. Red Balloon Symbiote Defense is interlaced into the binary code and data of the host it protects. It is injected into the Firmware in a randomized fashion. Once injected, it operates alongside the host program during runtime and continuously ensures that the code and data of the host device is untampered and never modified without permission. Symbiote Defense starts protecting the host the instant the host turns on, and will detect any unauthorized attempts to modify the firmware’s code or data within a fraction of a second, regardless of whether the device is in sleep mode, or busy servicing requests. | Industrial Immune System Fundamental AI technology for OT cyber defense. It works by passively learning what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber-threats in real time. This self-learning technology is protocol agnostic and can be deployed across a range of OT environments, providing full coverage of the organization without disrupting daily operations. Darktrace Antigena The world’s first Autonomous Response solution. Powered by award-winning Cyber AI, it responds to cyber-attacks in a matter of seconds - when security teams are overwhelmed or simply aren’t around. The technology works like a digital antibody, intelligently generating a targeted and proportionate response whenever a threatening incident arises in network, email or cloud environments. | The FPGA - Accelerated Time Series Database is a dedicated hardware for IoT data storage. Smart Sensors data pass directly into FPGA from Ethernet adapter bypassing any type of operating systems and software layers. All data processing takes place under FPGA on fly and streams into SSD for storage.
Artificial Intelligence algorithms are used to continuously evaluate interconnections between channels, classify and predict data. Device provides general functionality of software enabled time series database systems while implemented on hardware layer. FPGA’s native parallel feature is heavily used to achieve the data throughput in order of magnitude greater then all available software enabled time series database systems can offer.
| Easy-to-use developer tools for securing user data in mobile & web apps, the Cloud, and IoT products
IoT
Secure Industrial IoT deployment with lightweight SDKs that work between devices and apps.
Cloud
Secure your user passwords and sensitive data to prevent database breaches.
Automotive IoT
Easy-to-use IEEE 1609 API for integration across devices and services. | The Zeus Security Suite is a platform agnostic solution which eliminates certificate exchange, certificate processing and the exchange of bulk Encryption keys.
The result is a dramatic improvement in performance and an equally dramatic decrease in the cryptographic footprint.
Zeus is ideally suited for the IoT, including home automation, smart office, and automotive. | |
Key Customers | Network18, KPMG, BT, T-Mobile, Ocado, Peugeot, ebay | twilio, Nexmo, Back4App, Firebase, PubNub | ||||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Cybersecurity & Privacy | Cybersecurity & PrivacyApplication Infrastructure & MiddlewareInfrastructure as a Service (IaaS) | Analytics & ModelingApplication Infrastructure & MiddlewareCybersecurity & PrivacyProcessors & Edge Intelligence | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & PrivacyPlatform as a Service (PaaS) |
Industries | EducationEquipment & MachineryFinance & InsuranceHealthcare & HospitalsRenewable EnergyRetailSecurity & Public SafetyTelecommunicationsTransportation | Finance & InsuranceRetail | ||||
Use Cases | CybersecurityProcess Control & Optimization | Intrusion Detection Systems | ||||
Functions | ||||||
Services | Cybersecurity Services | |||||
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | Moderate | None | None | None | None |
Platform as a Service (PaaS) | None | None | None | None | None | Minor |
Application Infrastructure & Middleware | None | Minor | Strong | None | None | None |
Analytics & Modeling | None | None | Minor | None | None | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | Minor | Moderate | Moderate | Moderate | Moderate | Moderate |
Networks & Connectivity | None | None | None | None | None | None |
Processors & Edge Intelligence | None | None | Minor | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | None | None | None | None |
Robots | None | None | None | None | None | None |
Drones | None | None | None | None | None | None |
Wearables | None | None | None | None | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners |
Overview | ||||||
Supplier Slogan | Scalable security layer for the IoT | |||||
HQ Location | United States | United Kingdom | Armenia | United States | Poland | Israel |
Year Founded | 2011 | 2013 | 2017 | 2014 | 2014 | 2018 |
Company Type | Private | Private | Private | Private | Private | Private |
Stock Ticker | DARK | |||||
Revenue | < $10m | $10-100m | < $10m | < $10m | < $10m | < $10m |
Employees | 11 - 50 | 201 - 1,000 | < 10 | 11 - 50 | 11 - 50 | 11 - 50 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | Red Balloon Security is exclusively focused on the development of robust security solutions for embedded device systems across all major industries, including consumer electronics, automobiles, manufacturing/industrial systems, building Controllers, homeland security, military, etc. Founded by Ang Cui, Red Balloon Security's core technology is Symbiote Defense, a universally-compatible, OS-agnostic, real-time host-based intrusion defense system which is capable of protecting any embedded device from Malware and malicious commands. Symbiote is a patented technology that already protects millions of devices around the world, and has logged more than 15 billion hours of runtime without a single recorded failure. It is currently under contract for use by the US government, as well as critical infrastructure and consumer devices, like HP LaserJet printers. | Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. Headquartered in Cambridge, UK, the company has 1,500 employees and over 30 offices worldwide. Darktrace was named one of TIME magazine’s ‘Most Influential Companies’ for 2021 | Grovf is an engineering company aimed to develop hardware and software products to assist Industrial Internet of Things (IIoT) and Big Data problems.
Here at Grovf we help our industrial customers to solve IoT generated Big Data storage problems using hardware (FPGA) implementation of DB functionality in order to close the gap between IoT generated data throughput and software database transaction speed, resulting 20x faster transactions and power saving. | Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users. Virgil Security's Encryption libraries and services, along with an accompanying public key management infrastructure, ease the pain of developing, deploying, and using strong Cryptography. Virgil Security enables a new generation of enhanced privacy and security for applications, cloud services, and the Internet of Things. | We help IoT vendors to get more revenue through enhancing their products with the best-in-class security layer.
We bring certainty and peace of mind to owners of smart factories, smart buildings, smart vehicles, that they won't lose money because of being hacked.
Olympus Sky is an R&D company that developed a holy grail of security in the world of the IoT. We work with startups, gov agencies, automotive and the big industry, bringing protection to their connected devices and their networks. | With a mission to secure the future and enable life-saving applications, Sternum has built a holistic, scalable and first of its kind on-device security and visibility solution that prevents attacks in real-time while providing insights into any connected device. Sternum was founded in 2018, by a team of highly experienced research, development and business leaders with a mission to fundamentally change the world of IoT Security. Bringing profound knowledge in embedded systems, the joint perspectives of the defender and the attacker, and an aspiration to alleviate the medical security standard, Sternum not only set out to build uncompromising innovative technology but also to create true impact. |
IoT Solutions | The First Universal Embedded Defense for all embedded devices
Symbiote is a platform-independent, OS-agnostic, real-time, host-based intrusion defense that works by layering specific defense modules and diverting unused CPU cycles for defense. Symbiote is designed to protect any and all embedded devices, from printers to PLCs. It can be applied to any device regardless of OS, CPU type, or hardware.
Borrowing from strategies seen in nature, like defense through diversification and defensive mutualism, Symbiote Defense keeps embedded systems safe against a wide variety of attacks. It defends devices without requiring any code change from the vendor, any additional or upgraded hardware, and all without impacting the functionality of the device. Red Balloon Symbiote Defense is interlaced into the binary code and data of the host it protects. It is injected into the Firmware in a randomized fashion. Once injected, it operates alongside the host program during runtime and continuously ensures that the code and data of the host device is untampered and never modified without permission. Symbiote Defense starts protecting the host the instant the host turns on, and will detect any unauthorized attempts to modify the firmware’s code or data within a fraction of a second, regardless of whether the device is in sleep mode, or busy servicing requests. | Industrial Immune System Fundamental AI technology for OT cyber defense. It works by passively learning what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber-threats in real time. This self-learning technology is protocol agnostic and can be deployed across a range of OT environments, providing full coverage of the organization without disrupting daily operations. Darktrace Antigena The world’s first Autonomous Response solution. Powered by award-winning Cyber AI, it responds to cyber-attacks in a matter of seconds - when security teams are overwhelmed or simply aren’t around. The technology works like a digital antibody, intelligently generating a targeted and proportionate response whenever a threatening incident arises in network, email or cloud environments. | The FPGA - Accelerated Time Series Database is a dedicated hardware for IoT data storage. Smart Sensors data pass directly into FPGA from Ethernet adapter bypassing any type of operating systems and software layers. All data processing takes place under FPGA on fly and streams into SSD for storage.
Artificial Intelligence algorithms are used to continuously evaluate interconnections between channels, classify and predict data. Device provides general functionality of software enabled time series database systems while implemented on hardware layer. FPGA’s native parallel feature is heavily used to achieve the data throughput in order of magnitude greater then all available software enabled time series database systems can offer.
| Easy-to-use developer tools for securing user data in mobile & web apps, the Cloud, and IoT products
IoT
Secure Industrial IoT deployment with lightweight SDKs that work between devices and apps.
Cloud
Secure your user passwords and sensitive data to prevent database breaches.
Automotive IoT
Easy-to-use IEEE 1609 API for integration across devices and services. | The Zeus Security Suite is a platform agnostic solution which eliminates certificate exchange, certificate processing and the exchange of bulk Encryption keys.
The result is a dramatic improvement in performance and an equally dramatic decrease in the cryptographic footprint.
Zeus is ideally suited for the IoT, including home automation, smart office, and automotive. | |
Key Customers | Network18, KPMG, BT, T-Mobile, Ocado, Peugeot, ebay | twilio, Nexmo, Back4App, Firebase, PubNub | ||||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Cybersecurity & Privacy | Cybersecurity & PrivacyApplication Infrastructure & MiddlewareInfrastructure as a Service (IaaS) | Analytics & ModelingApplication Infrastructure & MiddlewareCybersecurity & PrivacyProcessors & Edge Intelligence | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & PrivacyPlatform as a Service (PaaS) |
Industries | EducationEquipment & MachineryFinance & InsuranceHealthcare & HospitalsRenewable EnergyRetailSecurity & Public SafetyTelecommunicationsTransportation | Finance & InsuranceRetail | ||||
Use Cases | CybersecurityProcess Control & Optimization | Intrusion Detection Systems | ||||
Functions | ||||||
Services | Cybersecurity Services | |||||
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | Moderate | None | None | None | None |
Platform as a Service (PaaS) | None | None | None | None | None | Minor |
Application Infrastructure & Middleware | None | Minor | Strong | None | None | None |
Analytics & Modeling | None | None | Minor | None | None | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | Minor | Moderate | Moderate | Moderate | Moderate | Moderate |
Networks & Connectivity | None | None | None | None | None | None |
Processors & Edge Intelligence | None | None | Minor | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | None | None | None | None |
Robots | None | None | None | None | None | None |
Drones | None | None | None | None | None | None |
Wearables | None | None | None | None | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners |