

Attivo Networks, the leader in deception technology, provides an active defense for early detection, forensics, and automated incident response to in-network cyberattacks. The Attivo ThreatDefend™ Deception Platform provides a comprehensive and customer-proven platform for proactive security and accurate threat detection within user networks, data centers, clouds, and a wide variety of specialized attack surfaces. The portfolio includes expansive network, endpoint, application, and data deceptions designed to efficiently misdirect and reveal attacks from all threat vectors. Advanced machine-learning makes preparation, deployment, and operations fast and simple to operate for organizations of all sizes. Comprehensive attack analysis and forensics provide actionable alerts, and native integrations automate the blocking, quarantine, and threat hunting of attacks for accelerated incident response. The company has won over 50 awards for its technology innovation and leadership.
Kisi develops cloud technology to build secure access control systems that use a combination of sensors and mobile devices to grant facility access to authorized personnel. Designed for commercial and enterprise applications, the Kisi system provides an added layer of intelligence and enhanced experience at all access points of the facility. The system software streamlines access management for operations teams while generating sophisticated data visualizations and personnel tracking for advanced IT departments. For the end user, Kisi works in the background to detect their presence and timely unlock doors for them as they approach.
Nyotron's PARANOID, the industry's first OS-Centric Positive Security, is a game-changing endpoint protection solution. By distinguishing between legitimate program or user activities and attack activities, PARANOID creates an almost impenetrable defense against sophisticated attacks. They Provide a Last Line of Defense. After threats bypass all perimeter and endpoint security layers - PARANOID protects your data from deletion, exfiltration, encryption, sabotage and more.
