Overview | ||||||
Supplier Slogan | Identity for Everything | Safely and Securely | ||||
HQ Location | United States | United Kingdom | United States | United States | Israel | United States |
Year Founded | 2016 | 2013 | 1996 | 2012 | 2018 | 2017 |
Company Type | Private | Private | Private | Private | Private | Private |
Stock Ticker | DARK | |||||
Revenue | < $10m | $10-100m | $10-100m | < $10m | < $10m | < $10m |
Employees | 11 - 50 | 201 - 1,000 | 51 - 200 | 11 - 50 | 11 - 50 | 51 - 200 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | Sepio in Latin means watch over and guard. Sepio is a leader in the Rogue Device Mitigation (RDM) market, and the developer of Sepio Prime - a SaaS solution for protecting organizations from hardware based attacks and threats. Sepio Prime provides security teams with full visibility into their hardware assets and their behavior in real time. A comprehensive policy enforcement module allows administrators to easily define granular device usage rules and continuously monitor and protect their infrastructure. Leveraging a combination of physical fingerprinting technology together with device behavior analytics, Sepio's software-only solution offers instant detection and response to any threat or breach attempt coming from a manipulated or infected element. | Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. Headquartered in Cambridge, UK, the company has 1,500 employees and over 30 offices worldwide. Darktrace was named one of TIME magazine’s ‘Most Influential Companies’ for 2021 | GlobalSign is the leading provider of trusted identity and security solutions enabling businesses, large enterprises, cloud service providers and IoT innovators around the world to secure online communications, manage millions of verified digital identities and automate Authentication and Encryption. Its high-scale PKI and identity and access management (IAM) solutions support the billions of services, devices, people and things comprising the Internet of Everything (IoE). The company has offices in the Americas, Europe and Asia. | Bayshore Networks, Inc. develops cyber security software for the Industrial Internet of Things (IoT). The company's platform protects operational technology (OT) machines, networks, applications, and workers and provides inspection and filtering of network flows, policy building and enforcement, and detection of segment industrial protocols.
Its products include Bayshore IT/OT Gateway, Bayshore IC (Industrial Controls), Bayshore SE (Secure Enterprise), Bayshore SingleView, and Bayshore PallatonIt Policy Engine. The company has strategic partnerships with Cisco Systems, BAE Systems, and VMware.
Year founded: 2012 | With a mission to secure the future and enable life-saving applications, Sternum has built a holistic, scalable and first of its kind on-device security and visibility solution that prevents attacks in real-time while providing insights into any connected device. Sternum was founded in 2018, by a team of highly experienced research, development and business leaders with a mission to fundamentally change the world of IoT Security. Bringing profound knowledge in embedded systems, the joint perspectives of the defender and the attacker, and an aspiration to alleviate the medical security standard, Sternum not only set out to build uncompromising innovative technology but also to create true impact. | Medigate owns and operates a medical device security platform that protects all connected medical devices on health care provider networks. The platform offers threat detection and attack prevention services.
|
IoT Solutions | SEPIO PROVIDES COMPLETE MITIGATION FOR MALICIOUS HARDWARE ATTACKS BEFORE THEY CAN CAUSE ANY HARM 1. Discovery of rogue devices and ghost devices 2. Hardware finger printing and behavior analytics 3. Alert and block any usage breach or attack attempt 4. Granular security policies at the device level 5. Cloud based threat intelligence and early warning | Industrial Immune System Fundamental AI technology for OT cyber defense. It works by passively learning what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber-threats in real time. This self-learning technology is protocol agnostic and can be deployed across a range of OT environments, providing full coverage of the organization without disrupting daily operations. Darktrace Antigena The world’s first Autonomous Response solution. Powered by award-winning Cyber AI, it responds to cyber-attacks in a matter of seconds - when security teams are overwhelmed or simply aren’t around. The technology works like a digital antibody, intelligently generating a targeted and proportionate response whenever a threatening incident arises in network, email or cloud environments. | Device Discovery (DPI) The success of your security strategy depends on your ability to know for certain what is on your network, each device down to the most granular detail. Communications / Behavioral Profiles We define 'baselines' based on the intended use and clinical workflows then generate policies (ACLs) for effective detection of suspicious communications and prevention of attacks. Risk & Threat Analysis Our comprehensive method of calculating risk scores is enhanced with insights from published industry best practices, government guidelines, leading medical device manufacturers and healthcare customers. Device Utilization We uniquely extract device utilization data and automatically export it into your CMMS platform, making it easily accessible for preventative maintenance processes and making actionable decisions. | |||
Key Customers | Network18, KPMG, BT, T-Mobile, Ocado, Peugeot, ebay | |||||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Cybersecurity & Privacy | Cybersecurity & PrivacyApplication Infrastructure & MiddlewareInfrastructure as a Service (IaaS) | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & PrivacyPlatform as a Service (PaaS) | Cybersecurity & PrivacyPlatform as a Service (PaaS) |
Industries | EducationEquipment & MachineryFinance & InsuranceHealthcare & HospitalsRenewable EnergyRetailSecurity & Public SafetyTelecommunicationsTransportation | Finance & Insurance | ChemicalsRenewable EnergyUtilities | Healthcare & Hospitals | ||
Use Cases | Cybersecurity | CybersecurityProcess Control & Optimization | Cybersecurity | |||
Functions | ||||||
Services | Cybersecurity Services | Cybersecurity Services | ||||
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | Moderate | None | None | None | None |
Platform as a Service (PaaS) | None | None | None | None | Minor | Minor |
Application Infrastructure & Middleware | None | Minor | None | None | None | None |
Analytics & Modeling | None | None | None | None | None | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | Minor | Moderate | Moderate | Moderate | Moderate | Minor |
Networks & Connectivity | None | None | None | None | None | None |
Processors & Edge Intelligence | None | None | None | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | None | None | None | None |
Robots | None | None | None | None | None | None |
Drones | None | None | None | None | None | None |
Wearables | None | None | None | None | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners |
Overview | ||||||
Supplier Slogan | Identity for Everything | Safely and Securely | ||||
HQ Location | United States | United Kingdom | United States | United States | Israel | United States |
Year Founded | 2016 | 2013 | 1996 | 2012 | 2018 | 2017 |
Company Type | Private | Private | Private | Private | Private | Private |
Stock Ticker | DARK | |||||
Revenue | < $10m | $10-100m | $10-100m | < $10m | < $10m | < $10m |
Employees | 11 - 50 | 201 - 1,000 | 51 - 200 | 11 - 50 | 11 - 50 | 51 - 200 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | Sepio in Latin means watch over and guard. Sepio is a leader in the Rogue Device Mitigation (RDM) market, and the developer of Sepio Prime - a SaaS solution for protecting organizations from hardware based attacks and threats. Sepio Prime provides security teams with full visibility into their hardware assets and their behavior in real time. A comprehensive policy enforcement module allows administrators to easily define granular device usage rules and continuously monitor and protect their infrastructure. Leveraging a combination of physical fingerprinting technology together with device behavior analytics, Sepio's software-only solution offers instant detection and response to any threat or breach attempt coming from a manipulated or infected element. | Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. Headquartered in Cambridge, UK, the company has 1,500 employees and over 30 offices worldwide. Darktrace was named one of TIME magazine’s ‘Most Influential Companies’ for 2021 | GlobalSign is the leading provider of trusted identity and security solutions enabling businesses, large enterprises, cloud service providers and IoT innovators around the world to secure online communications, manage millions of verified digital identities and automate Authentication and Encryption. Its high-scale PKI and identity and access management (IAM) solutions support the billions of services, devices, people and things comprising the Internet of Everything (IoE). The company has offices in the Americas, Europe and Asia. | Bayshore Networks, Inc. develops cyber security software for the Industrial Internet of Things (IoT). The company's platform protects operational technology (OT) machines, networks, applications, and workers and provides inspection and filtering of network flows, policy building and enforcement, and detection of segment industrial protocols.
Its products include Bayshore IT/OT Gateway, Bayshore IC (Industrial Controls), Bayshore SE (Secure Enterprise), Bayshore SingleView, and Bayshore PallatonIt Policy Engine. The company has strategic partnerships with Cisco Systems, BAE Systems, and VMware.
Year founded: 2012 | With a mission to secure the future and enable life-saving applications, Sternum has built a holistic, scalable and first of its kind on-device security and visibility solution that prevents attacks in real-time while providing insights into any connected device. Sternum was founded in 2018, by a team of highly experienced research, development and business leaders with a mission to fundamentally change the world of IoT Security. Bringing profound knowledge in embedded systems, the joint perspectives of the defender and the attacker, and an aspiration to alleviate the medical security standard, Sternum not only set out to build uncompromising innovative technology but also to create true impact. | Medigate owns and operates a medical device security platform that protects all connected medical devices on health care provider networks. The platform offers threat detection and attack prevention services.
|
IoT Solutions | SEPIO PROVIDES COMPLETE MITIGATION FOR MALICIOUS HARDWARE ATTACKS BEFORE THEY CAN CAUSE ANY HARM 1. Discovery of rogue devices and ghost devices 2. Hardware finger printing and behavior analytics 3. Alert and block any usage breach or attack attempt 4. Granular security policies at the device level 5. Cloud based threat intelligence and early warning | Industrial Immune System Fundamental AI technology for OT cyber defense. It works by passively learning what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber-threats in real time. This self-learning technology is protocol agnostic and can be deployed across a range of OT environments, providing full coverage of the organization without disrupting daily operations. Darktrace Antigena The world’s first Autonomous Response solution. Powered by award-winning Cyber AI, it responds to cyber-attacks in a matter of seconds - when security teams are overwhelmed or simply aren’t around. The technology works like a digital antibody, intelligently generating a targeted and proportionate response whenever a threatening incident arises in network, email or cloud environments. | Device Discovery (DPI) The success of your security strategy depends on your ability to know for certain what is on your network, each device down to the most granular detail. Communications / Behavioral Profiles We define 'baselines' based on the intended use and clinical workflows then generate policies (ACLs) for effective detection of suspicious communications and prevention of attacks. Risk & Threat Analysis Our comprehensive method of calculating risk scores is enhanced with insights from published industry best practices, government guidelines, leading medical device manufacturers and healthcare customers. Device Utilization We uniquely extract device utilization data and automatically export it into your CMMS platform, making it easily accessible for preventative maintenance processes and making actionable decisions. | |||
Key Customers | Network18, KPMG, BT, T-Mobile, Ocado, Peugeot, ebay | |||||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Cybersecurity & Privacy | Cybersecurity & PrivacyApplication Infrastructure & MiddlewareInfrastructure as a Service (IaaS) | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & PrivacyPlatform as a Service (PaaS) | Cybersecurity & PrivacyPlatform as a Service (PaaS) |
Industries | EducationEquipment & MachineryFinance & InsuranceHealthcare & HospitalsRenewable EnergyRetailSecurity & Public SafetyTelecommunicationsTransportation | Finance & Insurance | ChemicalsRenewable EnergyUtilities | Healthcare & Hospitals | ||
Use Cases | Cybersecurity | CybersecurityProcess Control & Optimization | Cybersecurity | |||
Functions | ||||||
Services | Cybersecurity Services | Cybersecurity Services | ||||
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | Moderate | None | None | None | None |
Platform as a Service (PaaS) | None | None | None | None | Minor | Minor |
Application Infrastructure & Middleware | None | Minor | None | None | None | None |
Analytics & Modeling | None | None | None | None | None | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | Minor | Moderate | Moderate | Moderate | Moderate | Minor |
Networks & Connectivity | None | None | None | None | None | None |
Processors & Edge Intelligence | None | None | None | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | None | None | None | None |
Robots | None | None | None | None | None | None |
Drones | None | None | None | None | None | None |
Wearables | None | None | None | None | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners |