Intufo
Intufo is advancing cybersecurity by shifting the focus from perimeter-based defenses to data-centric protection. We empower data to act as its own intelligent defense—delivering adaptive security that travels with the […]
PayEm, Inc.
PayEm is a comprehensive spend management and procurement platform that empowers businesses—and their partners—to automate every step of the purchasing process, from request to reconciliation. Designed with scale and control in […]
Defendify
Defendify is an all-in-one cybersecurity platform designed for busy IT teams who need enterprise-grade protection without the complexity or cost. We’re trusted by over 3,500 IT teams across 60+ countries, […]
ConnectSecure
ConnectSecure is a global cybersecurity company that amplifies managed service providers’ (MSP’s) ability to assess client risk, build recurring revenue, and overcome the challenges of the ever-evolving cyber threat landscape. […]
RADICL
Radicl is a cybersecurity company dedicated to protecting small and mid-sized businesses (SMBs) from today’s most sophisticated cyber threats. Recognizing that SMBs often lack the resources of large enterprises, Radicl […]
Lookout
Lookout, Inc. is a leading cybersecurity company specializing in mobile endpoint security and cloud-native data protection for enterprises and government agencies. For more information, visit: lookout.com.
Blacksmith Infosec
Blacksmith InfoSec is a cybersecurity company that offers a scalable Compliance-as-a-Service (CaaS) platform tailored for Managed Service Providers (MSPs) and small to medium-sized businesses (SMBs). Founded by cybersecurity veterans Jared […]
Object First
Object First believes in a world where data is well‑protected against malicious encryption. That’s why we created Ootbi (Out-of-the-Box Immutability,) the best storage for Veeam. Ransomware-proof Ootbi by Object First […]
Beauceron Security
Simply providing cybersecurity knowledge is not enough to reduce cyber risk; it’s necessary to understand people’s behavior and motivate them to know and act. Through a positive approach to cybersecurity, […]