Overview | ||||||
Supplier Slogan | Innovate. Engineer. Transform. Scale. | We create trust | Where power gets smart | |||
HQ Location | United States | United Kingdom | United States | United States | Germany | Israel |
Year Founded | 2005 | 2013 | 2001 | 1997 | 1995 | 2012 |
Company Type | Private | Private | Private | Private | Private | Private |
Stock Ticker | DARK | |||||
Revenue | < $10m | $10-100m | $10-100m | $10-100m | $10-100m | < $10m |
Employees | 11 - 50 | 201 - 1,000 | 51 - 200 | 201 - 1,000 | 51 - 200 | 11 - 50 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research. Using an adversary-centric perspective driven by our elite team of analysts and developers, we improve our clients’ overall security posture, protect digital assets, harden existing technologies, secure infrastructures, and work with development teams to ensure product security prior to deployment. | Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. Headquartered in Cambridge, UK, the company has 1,500 employees and over 30 offices worldwide. Darktrace was named one of TIME magazine’s ‘Most Influential Companies’ for 2021 | Founded in 2001, Keyfactor empowers enterprises of all sizes to escape the exposure epidemic – when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line. Powered by an award-winning PKI as-a-service platform for certificate lifecycle automation and IoT device security, IT and infosec teams can easily manage digital certificates and keys. And product teams can build IoT devices with crypto-agility and at massive scale. | Softeq Development Corporation was founded in 1997 in Houston, TX, as a full-stack software development services provider. Over the years, we shifted our focus from mobile and web application development to niche solutions — particularly, Machine Learning, immersive technologies and software and hardware for the Internet of Things. | TÜV Informationstechnik (TÜViT) is 100 percent about IT security. It is part of our DNA, and has been since 1995. At TÜViT, IT security is not a trend and it is not hype: it is embedded in virtually everything we do and all of our 120 employees have signed up for. Our experience and skills are totally dedicated to security in information technology. Over 50 per cent of the DAX 30 and many international companies already benefit from TÜViT-tested security. Independence ... is our credo. The TÜViT experts are not subject to any conflicting goals, as they have no obligations towards product suppliers, system integrators, shareholders, interest groups or government agencies. In addition, numerous accreditations as well as certificates of national and international organisations prove our independence TÜViT continues to develop the best available technology in numerous research projects and (standardization) committees. What applies to cars, machines, plants or buildings is also offered by TÜViT as part of the TÜV NORD GROUP for your IT: for hardware, application systems, infrastructure, products, processes or software. The TÜV seal and the certificates indicate to your clients that they can rely on the products and services. And if you have to comply with certain standards and procedures for evaluation authorities, TÜViT shows you how you can best achieve this. TÜViT identifies risks well before they cause any harm, and joins you in guiding your business to success – you can rely on it. At the same time, we protect your most valuable asset, which is becoming more important all the time in the course of digitization: your data. New digital business ideas are based on data: With TÜViT, you have a reliable and experienced partner, which supports you not only with all your data, information and IT security issues, but also with Data Privacy. | Nation-E is a global leader in Critical Infrastructure Cyber Security. We offer innovative solutions for defending industrial infrastructure and the smart grid environments. In a turmoil world where cyber security attacks are on the rise, Nation-E is committed to protect vulnerable critical assets. Our cutting-edge solutions, Energy Firewall? and Energy Cerebrum?, are specifically tailored to offer maximum protection for the Operational Technology landscape, where most critical infrastructure assets are connected via serial ports. Focusing on the last-mile of distributed energy assets, our platforms embed cyber-security, risk management, big-data analytics, and full command and control capability into previously unprotected infrastructure. We excel in shielding from a variety of threats and vulnerabilities such as smart-grid hacking and insider threats. The company was founded in 2012 by Daniel Jammer, a renowned entrepreneur, industrialist and philanthropist. Our clients who are protecting their critical infrastructure include Air/Sea ports, Financial Services, HLS and Public Utilities and more. |
IoT Solutions | Threat Modeling System resiliency doesn’t happen by chance; instead, its’ roots can be traced directly back to Threat Modeling. A threat model is a critical aspect of any security program, and is the foundation upon which any resilient system must be built. In most engagements, ISE works with the customer to build out the threat model, identifying and describing the three primary components of this crucial security plan: assets, adversaries, and attack surfaces. Without a threat model, an organization does not have a security plan in place. With a threat model, an organization can effectively consider risk and make informed decisions about how to reduce it. Manual Assessment Adversaries are human. As such, we use human intelligence to perform manual assessments to discover all possible ways compromise could occur. Manual assessment entails thorough investigation of ways in which a dedicated adversary could manipulate a system’s functionality for unintended consequences. ISE investigates manually in order to emulate the level of care that a committed adversary would apply in the pursuit of an attack. Automated tools do serve a purpose in any investigation, as running such tools is the first step that any attacker would take. However, it is only with manual assessment that higher level, sophisticated, custom attacks can be defended against. Custom Tests We dig deeper because it matters. Customization is a critical component to any successful security assessment. As all systems are custom, so, too, are all ISE security hardening processes. ISE utilizes a white box methodology, wherein ISE reviews all publicly and privately available documentation and design documents, workflow diagrams, firewall rules, and any other supporting documentation. ISE interfaces with key engineers as well as business and technical leadership. From there, ISE designs and performs custom tests, both to gather more information about how a system operates and is implemented, as well as to test for custom-tailored, unique security vulnerabilities. These assessment tasks are predominantly manual, and involve strategic thinking from the perspective of the adversary. Mitigation Roadmap ISE does not perform security assessments for the sole purpose of finding problems. Instead, we do it to provide solutions. While it is important to identify security problems, it is equally important to identify effective solutions. ISE devises proven mitigation strategies that dovetail with business objectives, and then works with client engineers to ensure they are well understood, properly implemented, and do not introduce any new vulnerabilities. ISE assists the customer in developing and adapting the mitigation roadmap as business needs, industry conditions, and stakeholder demands evolve over time. | Industrial Immune System Fundamental AI technology for OT cyber defense. It works by passively learning what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber-threats in real time. This self-learning technology is protocol agnostic and can be deployed across a range of OT environments, providing full coverage of the organization without disrupting daily operations. Darktrace Antigena The world’s first Autonomous Response solution. Powered by award-winning Cyber AI, it responds to cyber-attacks in a matter of seconds - when security teams are overwhelmed or simply aren’t around. The technology works like a digital antibody, intelligently generating a targeted and proportionate response whenever a threatening incident arises in network, email or cloud environments. | Keyfactor, formerly Certified Security Solutions (CSS), is a leading provider of secure digital Identity Management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world. | Softeq creates IoT solutions for personal and business-specific needs, including low-level software which ensures device-to-device/device-to-app connectivity and data exchange, full-scale software infrastructures for connected device implementation and management, and custom hardware. Our expertise encompasses:
|
| |
Key Customers | We serve numerous industries and have been honored to partner with some of the world’s leading pioneers like Disney, Google, Amazon, Microsoft, Netflix, Warner Brothers, Qualcomm and many more. | Network18, KPMG, BT, T-Mobile, Ocado, Peugeot, ebay | Softeq works with large and medium-sized enterprises and Fortune 500 companies, including Verizon, NVIDIA, Epson, Disney, Microsoft, HP, and AMD. | Applied Technologies Avea BioID GmbH DB Schenker Deutsche Post DHL Equinix HiSilicon Deutsche Telekom SEW Eurodrive
| ||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Cybersecurity & Privacy | Cybersecurity & PrivacyApplication Infrastructure & MiddlewareInfrastructure as a Service (IaaS) | Cybersecurity & PrivacyApplication Infrastructure & MiddlewareAutomation & Control | Analytics & ModelingApplication Infrastructure & MiddlewareCybersecurity & PrivacyDronesInfrastructure as a Service (IaaS)Platform as a Service (PaaS)Wearables | Cybersecurity & Privacy | Cybersecurity & Privacy |
Industries | EducationEquipment & MachineryFinance & InsuranceHealthcare & HospitalsRenewable EnergyRetailSecurity & Public SafetyTelecommunicationsTransportation | AutomotiveFinance & InsuranceHealthcare & HospitalsRetail | AutomotiveEducationElectronicsHealthcare & HospitalsOil & GasRenewable Energy | AutomotiveSecurity & Public SafetySemiconductorsTelecommunications | BuildingsOil & GasUtilities | |
Use Cases | CybersecurityProcess Control & Optimization | Cybersecurity | Predictive MaintenanceProcess Control & OptimizationRemote CollaborationTrack & Trace of Assets | Security Claims Evaluation | ||
Functions | Field Services | Business Operation | Business OperationProduct Research & Development | Process Manufacturing | ||
Services | Cybersecurity Services | Cybersecurity Services | Cybersecurity ServicesCloud Planning, Design & Implementation Services | Cybersecurity ServicesHardware Design & Engineering ServicesSoftware Design & Engineering ServicesCloud Planning, Design & Implementation Services | Cybersecurity ServicesSoftware Design & Engineering ServicesTesting & Certification | Cybersecurity Services |
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | Moderate | None | Minor | None | None |
Platform as a Service (PaaS) | None | None | None | Minor | None | None |
Application Infrastructure & Middleware | None | Minor | Minor | Moderate | None | None |
Analytics & Modeling | None | None | None | Moderate | None | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | Moderate | Moderate | Moderate | Minor | Moderate | Minor |
Networks & Connectivity | None | None | None | None | None | None |
Processors & Edge Intelligence | None | None | None | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | Minor | None | None | None |
Robots | None | None | None | None | None | None |
Drones | None | None | None | Minor | None | None |
Wearables | None | None | None | Minor | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners |
Overview | ||||||
Supplier Slogan | Innovate. Engineer. Transform. Scale. | We create trust | Where power gets smart | |||
HQ Location | United States | United Kingdom | United States | United States | Germany | Israel |
Year Founded | 2005 | 2013 | 2001 | 1997 | 1995 | 2012 |
Company Type | Private | Private | Private | Private | Private | Private |
Stock Ticker | DARK | |||||
Revenue | < $10m | $10-100m | $10-100m | $10-100m | $10-100m | < $10m |
Employees | 11 - 50 | 201 - 1,000 | 51 - 200 | 201 - 1,000 | 51 - 200 | 11 - 50 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research. Using an adversary-centric perspective driven by our elite team of analysts and developers, we improve our clients’ overall security posture, protect digital assets, harden existing technologies, secure infrastructures, and work with development teams to ensure product security prior to deployment. | Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. Headquartered in Cambridge, UK, the company has 1,500 employees and over 30 offices worldwide. Darktrace was named one of TIME magazine’s ‘Most Influential Companies’ for 2021 | Founded in 2001, Keyfactor empowers enterprises of all sizes to escape the exposure epidemic – when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line. Powered by an award-winning PKI as-a-service platform for certificate lifecycle automation and IoT device security, IT and infosec teams can easily manage digital certificates and keys. And product teams can build IoT devices with crypto-agility and at massive scale. | Softeq Development Corporation was founded in 1997 in Houston, TX, as a full-stack software development services provider. Over the years, we shifted our focus from mobile and web application development to niche solutions — particularly, Machine Learning, immersive technologies and software and hardware for the Internet of Things. | TÜV Informationstechnik (TÜViT) is 100 percent about IT security. It is part of our DNA, and has been since 1995. At TÜViT, IT security is not a trend and it is not hype: it is embedded in virtually everything we do and all of our 120 employees have signed up for. Our experience and skills are totally dedicated to security in information technology. Over 50 per cent of the DAX 30 and many international companies already benefit from TÜViT-tested security. Independence ... is our credo. The TÜViT experts are not subject to any conflicting goals, as they have no obligations towards product suppliers, system integrators, shareholders, interest groups or government agencies. In addition, numerous accreditations as well as certificates of national and international organisations prove our independence TÜViT continues to develop the best available technology in numerous research projects and (standardization) committees. What applies to cars, machines, plants or buildings is also offered by TÜViT as part of the TÜV NORD GROUP for your IT: for hardware, application systems, infrastructure, products, processes or software. The TÜV seal and the certificates indicate to your clients that they can rely on the products and services. And if you have to comply with certain standards and procedures for evaluation authorities, TÜViT shows you how you can best achieve this. TÜViT identifies risks well before they cause any harm, and joins you in guiding your business to success – you can rely on it. At the same time, we protect your most valuable asset, which is becoming more important all the time in the course of digitization: your data. New digital business ideas are based on data: With TÜViT, you have a reliable and experienced partner, which supports you not only with all your data, information and IT security issues, but also with Data Privacy. | Nation-E is a global leader in Critical Infrastructure Cyber Security. We offer innovative solutions for defending industrial infrastructure and the smart grid environments. In a turmoil world where cyber security attacks are on the rise, Nation-E is committed to protect vulnerable critical assets. Our cutting-edge solutions, Energy Firewall? and Energy Cerebrum?, are specifically tailored to offer maximum protection for the Operational Technology landscape, where most critical infrastructure assets are connected via serial ports. Focusing on the last-mile of distributed energy assets, our platforms embed cyber-security, risk management, big-data analytics, and full command and control capability into previously unprotected infrastructure. We excel in shielding from a variety of threats and vulnerabilities such as smart-grid hacking and insider threats. The company was founded in 2012 by Daniel Jammer, a renowned entrepreneur, industrialist and philanthropist. Our clients who are protecting their critical infrastructure include Air/Sea ports, Financial Services, HLS and Public Utilities and more. |
IoT Solutions | Threat Modeling System resiliency doesn’t happen by chance; instead, its’ roots can be traced directly back to Threat Modeling. A threat model is a critical aspect of any security program, and is the foundation upon which any resilient system must be built. In most engagements, ISE works with the customer to build out the threat model, identifying and describing the three primary components of this crucial security plan: assets, adversaries, and attack surfaces. Without a threat model, an organization does not have a security plan in place. With a threat model, an organization can effectively consider risk and make informed decisions about how to reduce it. Manual Assessment Adversaries are human. As such, we use human intelligence to perform manual assessments to discover all possible ways compromise could occur. Manual assessment entails thorough investigation of ways in which a dedicated adversary could manipulate a system’s functionality for unintended consequences. ISE investigates manually in order to emulate the level of care that a committed adversary would apply in the pursuit of an attack. Automated tools do serve a purpose in any investigation, as running such tools is the first step that any attacker would take. However, it is only with manual assessment that higher level, sophisticated, custom attacks can be defended against. Custom Tests We dig deeper because it matters. Customization is a critical component to any successful security assessment. As all systems are custom, so, too, are all ISE security hardening processes. ISE utilizes a white box methodology, wherein ISE reviews all publicly and privately available documentation and design documents, workflow diagrams, firewall rules, and any other supporting documentation. ISE interfaces with key engineers as well as business and technical leadership. From there, ISE designs and performs custom tests, both to gather more information about how a system operates and is implemented, as well as to test for custom-tailored, unique security vulnerabilities. These assessment tasks are predominantly manual, and involve strategic thinking from the perspective of the adversary. Mitigation Roadmap ISE does not perform security assessments for the sole purpose of finding problems. Instead, we do it to provide solutions. While it is important to identify security problems, it is equally important to identify effective solutions. ISE devises proven mitigation strategies that dovetail with business objectives, and then works with client engineers to ensure they are well understood, properly implemented, and do not introduce any new vulnerabilities. ISE assists the customer in developing and adapting the mitigation roadmap as business needs, industry conditions, and stakeholder demands evolve over time. | Industrial Immune System Fundamental AI technology for OT cyber defense. It works by passively learning what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber-threats in real time. This self-learning technology is protocol agnostic and can be deployed across a range of OT environments, providing full coverage of the organization without disrupting daily operations. Darktrace Antigena The world’s first Autonomous Response solution. Powered by award-winning Cyber AI, it responds to cyber-attacks in a matter of seconds - when security teams are overwhelmed or simply aren’t around. The technology works like a digital antibody, intelligently generating a targeted and proportionate response whenever a threatening incident arises in network, email or cloud environments. | Keyfactor, formerly Certified Security Solutions (CSS), is a leading provider of secure digital Identity Management solutions that enables organizations to confirm authenticity, and ensure the right things are interacting in the right ways in our connected world. | Softeq creates IoT solutions for personal and business-specific needs, including low-level software which ensures device-to-device/device-to-app connectivity and data exchange, full-scale software infrastructures for connected device implementation and management, and custom hardware. Our expertise encompasses:
|
| |
Key Customers | We serve numerous industries and have been honored to partner with some of the world’s leading pioneers like Disney, Google, Amazon, Microsoft, Netflix, Warner Brothers, Qualcomm and many more. | Network18, KPMG, BT, T-Mobile, Ocado, Peugeot, ebay | Softeq works with large and medium-sized enterprises and Fortune 500 companies, including Verizon, NVIDIA, Epson, Disney, Microsoft, HP, and AMD. | Applied Technologies Avea BioID GmbH DB Schenker Deutsche Post DHL Equinix HiSilicon Deutsche Telekom SEW Eurodrive
| ||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Cybersecurity & Privacy | Cybersecurity & PrivacyApplication Infrastructure & MiddlewareInfrastructure as a Service (IaaS) | Cybersecurity & PrivacyApplication Infrastructure & MiddlewareAutomation & Control | Analytics & ModelingApplication Infrastructure & MiddlewareCybersecurity & PrivacyDronesInfrastructure as a Service (IaaS)Platform as a Service (PaaS)Wearables | Cybersecurity & Privacy | Cybersecurity & Privacy |
Industries | EducationEquipment & MachineryFinance & InsuranceHealthcare & HospitalsRenewable EnergyRetailSecurity & Public SafetyTelecommunicationsTransportation | AutomotiveFinance & InsuranceHealthcare & HospitalsRetail | AutomotiveEducationElectronicsHealthcare & HospitalsOil & GasRenewable Energy | AutomotiveSecurity & Public SafetySemiconductorsTelecommunications | BuildingsOil & GasUtilities | |
Use Cases | CybersecurityProcess Control & Optimization | Cybersecurity | Predictive MaintenanceProcess Control & OptimizationRemote CollaborationTrack & Trace of Assets | Security Claims Evaluation | ||
Functions | Field Services | Business Operation | Business OperationProduct Research & Development | Process Manufacturing | ||
Services | Cybersecurity Services | Cybersecurity Services | Cybersecurity ServicesCloud Planning, Design & Implementation Services | Cybersecurity ServicesHardware Design & Engineering ServicesSoftware Design & Engineering ServicesCloud Planning, Design & Implementation Services | Cybersecurity ServicesSoftware Design & Engineering ServicesTesting & Certification | Cybersecurity Services |
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | Moderate | None | Minor | None | None |
Platform as a Service (PaaS) | None | None | None | Minor | None | None |
Application Infrastructure & Middleware | None | Minor | Minor | Moderate | None | None |
Analytics & Modeling | None | None | None | Moderate | None | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | Moderate | Moderate | Moderate | Minor | Moderate | Minor |
Networks & Connectivity | None | None | None | None | None | None |
Processors & Edge Intelligence | None | None | None | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | Minor | None | None | None |
Robots | None | None | None | None | None | None |
Drones | None | None | None | Minor | None | None |
Wearables | None | None | None | Minor | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners |