Conquest Cyber
Our enemies are not simply amateur hackers, but highly motivated, well-funded nation states and criminal organizations. These forces covet your valuable data, want to sow chaos wherever they can, and are chartered to build a competitive advantage for our adversaries. By targeting our nation’s defense and critical infrastructure sectors, cyber attacks threaten to disrupt the way we live.
MORE INFORisk Based Security
Risk Based Security® (RBS) is a global leader in vulnerability intelligence, breach data and risk ratings. RBS provides actionable insight into the cybersecurity risks your organization faces, even from threat sources that are often overlooked.
MORE INFORSA
We empower you to embrace digital transformation and take pride in helping you manage digital risk
MORE INFOSecurityScorecard
SecurityScorecard is the global leader in cybersecurity ratings and the only service with millions of organizations continuously rated.
MORE INFOSiloBreaker
Silobreaker helps security, business and intelligence professionals make sense of the overwhelming amount of data on the web. Our mission is to build technology that tackles today’s proliferation of data. To offer products that analyse, contextualise and bring meaning to any kind of information.
MORE INFOWhite Source
WhiteSource helps companies secure their software by not only detecting vulnerabilities, but also by fixing them. As the pioneer of software composition analysis (SCA), WhiteSource has been a leader in open source application security for more than 10 years, and now offers custom code security through static application security testing (SAST).
MORE INFOWiz
Wiz redefines cloud security, combining what used to be addressed by standalone CSPM and CWPP products with our innovative Cloud Risk Engine to reveal effective risk.
MORE INFOZenity
Zenity is the first and only governance and security platform for low-code/no-code applications. Zenity creates a win-win environment where IT and information security can give business and pro developers the independence they want to move the business forward while retaining full visibility and control.
MORE INFOAlyne
At Alyne, we build the technology to help organisations navigate the complex world of cyber security, risk and regulatory compliance without slowing business down.
MORE INFOCyberGRX
Defend Yourself Differently. With 360-degree correlated data and rich, diverse analytics to support real-time decision making, you have more insight into your third-party cyber risk surface than ever before.
MORE INFOCyral
Cyral delivers enterprise data security and governance across all data services such as S3, Snowflake, Kafka, MongoDB, Oracle and more.
MORE INFODataguard
Your company is now a data company, whether you like it or not. DataGuard helps you to process and monetise data in a way that is transparent and fully in line with the latest regulations.
MORE INFODigital Shadows
Digital Risk Protection Software designed to protect you from external threats, continually identifying where your assets are exposed, providing sufficient context to understand the risk, and options for remediation.
MORE INFODiligent Corporation
After two decades helping boards and c-suites build strong governance practices with our market-leading board application, we are expanding our solutions to help companies connect insights from their risk, compliance and audit teams to their leaders, facilitating more purpose-driven leadership.
MORE INFOForgerock
Our mission is to create identity experiences for people at work, at home, or on the go, that are so simple and secure that two things happen
MORE INFOGurucul
Gurucul is a global cybersecurity company that is changing the way organizations protect their most valuable assets, data and information from insider threats and external cyberattacks, both on-premises and in the cloud. Gurucul’s real-time Unified Security and Risk Analytics technology delivers one platform for all cyber risks: security, identity and fraud.
MORE INFOIllumio
Protect your most important data and applications with the leader in Zero Trust segmentation.
MORE INFOInteros
Interos is the operational resilience company — reinventing how companies manage their supply chains and business relationships — through a breakthrough SaaS platform that uses artificial intelligence to model and transform the ecosystems of complex businesses into a living global map, down to any single supplier, anywhere.
MORE INFOIntsights
The IntSights vision is to make external intelligence instantly accessible for organizations of any type or size by synthesizing complex signals captured from across the clear, deep, and dark web into contextualized, prioritized, and actionable intelligence.
MORE INFOJumpcloud
JumpCloud changes the way IT administrators manage their organizations by providing a comprehensive and flexible cloud directory platform. From one pane of glass, manage user identities and resource access, secure Mac, Windows, and Linux devices, and get a full view of your environment.
MORE INFOJupiterOne
Secure your enterprise via cyber asset management. Rapidly add context to your cloud security, compliance, IAM, vulnerability management processes and more.
MORE INFOKenna Security
A tidal wave of vulnerabilities, but you can’t fix them all. Rely on extensive threat intel and patented prioritization to cut costs, save time, and keep your teams efficiently focused on reducing the biggest risks to your business. This is Modern Risk-Based Vulnerability Management.
MORE INFOLepide
Our unique combination of detailed auditing, anomaly detection, real time alerting, and real time data discovery and classification allows you to identify, prioritize and investigate threats - fast.
MORE INFOLumu
Creators of the Continuous Compromise Assessment™ model. Our vision? To measure the world’s cyber-compromise by enabling any organization to continuously and intentionally measure and understand compromise to close the breach detection gap from months to minutes.
MORE INFOMicrosoft
Microsoft Security helps protect people and data against cyberthreats to give you peace of mind.
MORE INFOMitiga Solutions
Mitiga was founded in 2018, but before it was anything more than a dream, our founders were making their names in the industry for over 20 years, leading international conferences and publishing research articles about their risk models.
MORE INFONetsparker
Netsparker, the web application security solution that automatically verifies identified vulnerabilities, was first released on the market in 2009.
MORE INFOOnapsis
Onapsis doesn't just provide business-critical application security. We provide confidence. By safeguarding your company at its core, the applications you depend on each and every day will be secure, compliant and available.
MORE INFOOneTrust
OneTrust is the #1 fastest-growing company on Inc. 500 and the category-defining enterprise platform to operationalize trust.
MORE INFOOnSpring
The best result of centralized visibility is faster collaboration at scale, especially for governance, risk and compliance (GRC) & IT service management (ITSM).
MORE INFOOrdr
Secure all connected devices --- from traditional devices like workstations, servers, PCs and tablets to newer and more vulnerable loT, IoMT and OT devices, in any industry and for a wide range of use cases.
MORE INFOPKWare
PK Protect is the most comprehensive enterprise data protection suite ever created, allowing businesses to eliminate security gaps, take control of sensitive data and meet the most stringent data compliance requirements.
MORE INFOProofpoint
Proofpoint protects your people, data and brand against advanced threats and compliance risks.
MORE INFOQualiware
With our Enterprise Architecture and Business Management tool, QualiWare X, we are helping you evolve and transform your organization with smart management and intelligent collaboration to bridge the gap between strategy and execution, the easy way.
MORE INFORapid7
We remove the barriers that make cybersecurity complex and overwhelming. Our expert-built technology gives protectors a smooth path to securing their business and reducing the compliance challenge.
MORE INFOResilinc
Resilinc is where the world’s top companies connect with their suppliers to build resilience. We expose the most vulnerable geographic hotspots, the single points of failure and the “diamond shaped supply chain”.
MORE INFOResponsum
A key component of privacy and security programs is awareness. Creating a culture that is resilient against security threats and where privacy is upheld, will help you to meet regulatory requirements.
MORE INFOSailpoint
As technology continues to bring more users, applications and data together, these connections also bring more vulnerability.
MORE INFOViclarity
ViClarity is an award-winning provider of governance, risk and compliance (GRC) management software solutions for highly regulated industries, such as healthcare, insurance and financial services. Organisations of all sizes utilize our GRC tools to enhance and automate their risk and compliance processes. A technology-centric organisation with a legacy focus on making GRC easier, ViClarity serves organisations in multiple industries.
MORE INFOWSO2
WSO2 solutions give enterprises the flexibility to deploy applications and services on-premises, on private or public clouds, or in hybrid environments and easily migrate between them as needed.
MORE INFO