NCSC For Startups: meet our members

And we’re still recruiting, so get in touch if you want to be next!

GOLDILOCK: UNBREACHABLE PHYSICAL DEFENCE AGAINST CYBER ATTACKS

Goldilock is on a mission to revolutionise the way sensitive data and critical infrastructure is protected. It challenges the idea that everything should be online all the time.

SOS INTELLIGENCE: REAL-TIME THREAT INTELLIGENCE FOR EVERYONE

SOS Intelligence wants to make cyber threat intelligence affordable and accessible to everyone. Its automation technology collects pre-selected keywords from organisations and then scans the dark web, ingesting threat data in any language and looking for mentions of those keywords in Telegram channels or hacker forums.

VALIDATO: (SAAS) SOLUTION THAT SIMULATES OFFENSIVE ATTACKS

Validato is a Software as a Service (SaaS) solution that simulates offensive attacks. It provides unbiased, real-time data that can validate the effectiveness of security controls against a wide range of threats. It can be used by SMEs and large enterprises alike.

VAULT SENTINEL: RECOVERY STARTS WITH JUST TWO CLICKS.

Vault Sentinel allows clients to recover from even the most catastrophic cyber attacks quickly, minimising the operational downtime. In just two clicks, an entire business service consisting of hundreds or thousands of technical objects can be retrieved from its cloud-based, secure vaults. This can be done regionally and globally at the same time in two clicks.

CYNTEGRA: FAST, LOCAL, AND COMPLETE RECOVERY FROM RANSOMWARE AND MAJOR CYBER ATTACKS.

Cyntegra has a patented solution that helps organisations recover from ransomware or other cyber attacks – including attacks that corrupt the operating system. The aim is to return to full operations in minutes or hours rather than days, weeks or even months.

ESPROFILER: MAXIMISING YOUR SECURITY ROI

ESPROFILER wants to help organisations maximise the value their security investments bring. It enables customers to understand what security products they own, what they’ve deployed and the threats those products should protect against.

LUPOVIS: LURING ADVERSARIES TO GAIN INSIGHTS

Lupovis is an AI-based deception solution that manipulates adversaries who have penetrated your network by engaging them through a sequence of decoys and luring them through the network using adaptive narrative and manipulation techniques.

TRACED: PRIVACY AND PROTECTION

Traced believes that businesses can be protected against cyber attacks and data breaches without invading the privacy of employees. Its Traced Control solution combines AI-powered protection and absolute employee privacy to manage cyber risk on mobile and enable organisations to take a Zero Trust approach to mobile security.

RANKEDRIGHT: VULNERABILITY PRIORITISATION

RankedRight supercharges the efforts of cybersecurity teams across the world with fast and effective vulnerability prioritisation that puts the user in control.

ENCLAVE: ZERO TRUST NETWORK ACCESS

Enclave helps organisations take a Zero Trust approach by using overlaying networks that make private systems invisible to the public internet until defined trust standards have been met. It’s on a mission to make security more convenient for organisations.

PORGiESOFT: HELPING EMPLOYEES STOP ONLINE FRAUD IN ITS TRACKS

PORGiESOFT wants to be the Grammarly of cyber fraud detection. Its SenseText product uses AI to calculate a fraud risk score, providing a second opinion on suspicious emails.

REBELLION DEFENCE: AUTOMATING PENETRATION TESTING FOR THE DEFENCE SECTOR

Rebellion Defence is a British-American software company building AI products exclusively for the defence sector and national security purposes. Its SECURE solution helps organisations look ahead, focus their resources and proactively defend their systems and networks.

METERIAN: SECURING APPS THAT RELY ON OPEN-SOURCE SOFTWARE

Using automation, Meterian secures open source software by building a scalable and sustainable line of defence for apps. It wants to empower time-pressured developers to become the first line of defence for security.

EXALENS: SECURING DIGITAL MANUFACTURING AGAINST DOWNTIME AND SAFETY EVENTS

Exalens equips SME manufacturers with advanced cybersecurity that tends to be reserved for large enterprises. It does this through its threat detection and response solution and cyber-physical AI – both of which don’t require an in-house security expert.