No lack of quality at CyberTech this year. CyberTech is part of the DLD Spark Innovation event happening this week in TLV.
Arriving early was beneficial to speaking with a lot of companies and getting a lot of swag.
I went from table to table, small, medium and large companies all boast a fabulous array of never seen before software applications from deepweb analysis, to vCISO, to regulatory, 3rd party application protection, one doesn’t need to scour the eco-system for value as it’s right there.
I ran into some interesting people, software and swag, and I’m going to list the ones I got to speak with:
B24Club [www.B24cyber.com]– Digital Wallet technology that comes with it’s own behavioral biometrics analysis software that analyses Typing Rhythm, Grip and Elevation, Hand Tremor, Keyswipe Dynamics, Speech patterns and Other indicators. I spoke to the duo at the Startup desk and this is what I wanted to know: What are you doing here; and What are you looking for. The answer is quite simply: “Investment”.
Nokod Security [http://www.nokodsecurity.com] – Low-code No code software governance and protection. “Discover issues and risks such as hardcoded secrets, data leakage, injection vulnerabilities, and unpatched applications and components.” Since I’ve never heard of anything like it, it struck me as quite magical. No jokes. It’s one of a future brand of products (and I know nothing about the competition).
SyMania [www.symania.com] – A totally innovative and very cool Passwordless game changer. This is a highly secured and authenticated method of access which looks very cute and acts like a game. It has a one-time sign-on after which you can use it at your leisure.
OpenLink Cobwebs [www.cobwebs.com] – When you want to know something that transpired or is transpiring on the deep web or the dark web right now, you can open a link with cobwebs and get a visual link analysis of real-time events via web discovery.
Waterfall Security [www.waterfall-security.com] – OT Protection of big industrial plants and more, oil rigs, nuclear power facilities “Leading the world’s OT unidirectional gateway market with superior solutions”.
Firedome [www.firedome.io] – Coffee machine – check – Firedome CurveTM “preemptively stop supply chain insider threat, ransomware, and other complex attacks that might otherwise evade detection by current security protocols and controls.”
Memcyco [www.memcyco.com] – Protection against site impersonation and scam. Shields, detects and proves site authenticity.
Albarius.io [https://www.linkedin.com/company/albarius-security/] Deploying precise optimizations to your network architecture.
Salvador [www.salvador-tech.com] Backup hardware for operational continuity and recovery for OT and ICS. PS I was very Wowed by this product which fits in your POCKET. It’s hard to explain. Go see.
Cynomi [www.cynomi.com] – vCISO services with automated risk and security assessment and immediate insights.
Reflectiz [https://www.reflectiz.com/] – Takes all your web assets and monitors their supporting components. The dashboard is much more than a discovery tool.
Foretech [www.fore-t.com] – Gain visibility and control over privileged credentials and secrets.
Ovalix [www.ovalix.io] – Visualize, Govern, and Optimize Your Security Processes – now you can manage your security posture, enhancing efficiency.
Cypago [www.cypago.com] Accelerate compliance – Cyber GRC across all frameworks and environments. Actually I have an affinity to this product as I had the role of ‘last human line of defense’ for regulatory cyber audits at EY (just a side-note).
Workato [www.workato.com] – Workato is already 1000 people strong and has been running for at least 10 years now. They full-proof your 3rd-party integration tools, providing security end-to-end.
Proofpoint [www.proofpoint.com] – Establishing personal security for your email and mitigating human-based risk.
Cysight [https://cysight.ai/] – “CySight is an MDR in a Box with integrated NDR, EDR, and network forensics providing accurate, intelligent and deep visibility into your network and cloud traffic, even when traffic is encrypted”
This Article was Published by Mor Getz @TechDocs
We write Technical Documentation specializing in Hardware and Software multi-disciplinary Operation Manuals for end-users, using best-of-brand tools and methodologies.. View more posts