Overview | ||||||
Supplier Slogan | Cybersecurity for Decentralized Systems | Perfection in Protection, Licensing and Security | ||||
HQ Location | United States | Germany | United Kingdom | United States | United States | United States |
Year Founded | 2013 | 1989 | 2013 | 2010 | 2016 | 2002 |
Company Type | Private | Private | Private | Private | Private | Public |
Stock Ticker | DARK | NASDAQ:TENB | ||||
Revenue | < $10m | $10-100m | $10-100m | < $10m | < $10m | $10-100m |
Employees | 11 - 50 | 51 - 200 | 201 - 1,000 | 11 - 50 | < 10 | 201 - 1,000 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | Rivetz is building a Global Attestation and Identity Network, powered by the Rivetz Token (RvT) n the Blockchain, in order to improve the security of the devices on which we rely on everyday. Rivetz’s goal is to change the way we access the internet, redefine what Network Security means in the Blockchain era, prove intent in crypto transactions, secure the IoT, and give developers tools to build-in security. The Rivetz solution takes advantage of the Trusted Execution Environment (TEE) that exists in most of the devices we use everyday. This provides Rivetz with an isolated execution environment within the main processor to execute code that cannot be observed or altered by the operating system. This vault on the processor enables Rivetz to store and process sensitive data, and assure that policy and controls are executed as expected. | WIBU-SYSTEMS AG, a privately held company founded by Oliver Winzenried and Marcellus Buchheit in 1989, is an innovative security technology leader in the global software licensing market. In its mission to offer the most secure, unique, and highly versatile technology, Wibu-Systems has developed CodeMeter, a comprehensive, award-winning suite of hardware and software-based solutions for computers, embedded systems, mobile devices, PLCs, and microcontrollers that incorporates internationally patented processes dedicated to protecting the integrity of digital assets. Through its motto “Perfection in Protection, Licensing and Security”, Wibu-Systems safeguards the intellectual property of software publishers and Intelligent Device manufacturers against illicit and fraudulent use, reverse engineering and tampering attacks, sabotage and espionage actions, while generating new digital business models fully integrated with ERP, CRM, and e-commerce platforms. | Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. Headquartered in Cambridge, UK, the company has 1,500 employees and over 30 offices worldwide. Darktrace was named one of TIME magazine’s ‘Most Influential Companies’ for 2021 | CENTRI provides advanced security for the Internet of Things. Our technology helps organizations secure what matters most – their data – by seamlessly integrating into their existing applications and services in the cloud, data centers, connected devices and products. CENTRI eliminates the risk of data exfiltration and loss of equipment command by establishing trusted devices and advanced Encryption technology while retaining complete visibility to your data. IoT developers and innovators rely on CENTRI to protect the full lifecycle of their data – in transit, at rest and on the Endpoint. | MedCrypt provides data security as a service to medical device OEMs. From medical imaging device, to implantable devices like pacemakers, MedCrypt ensures that devices act only on instructions from trusted sources. | Tenable transforms security technology for the business needs of tomorrow through comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organization. Tenable eliminates blind spots, prioritizes threats and reduces exposure and loss. With more than one million users and more than 21,000 customers worldwide, organizations trust Tenable for proven security innovation. Tenable customers range from Fortune Global 500 companies, to the global public sector, to mid-sized enterprises in all sectors, including finance, government, healthcare, higher education, retail and energy. |
IoT Solutions | Rivetz reealises there needs to be a high level of Assurance that the device will always function correctly, and if they get compromised, the devices should be locked automatically. The TEE can be used as a device identifier, therefore Rivetz uses that to encrypt a message or file and only allow it to be decrypted by a particular TEE. This gives IoT devices end-to-end Encryption using the TEE as the Authentication and Access Point. Strong device identity and registration prevents cloning or rogue devices. Verifiable conditions to detect and prevent tampering of distributed devices stops machines from unwarranted spending. Application developers will be able to use the Rivetz Toolkit to include this security measure also. | Industrial Immune System Fundamental AI technology for OT cyber defense. It works by passively learning what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber-threats in real time. This self-learning technology is protocol agnostic and can be deployed across a range of OT environments, providing full coverage of the organization without disrupting daily operations. Darktrace Antigena The world’s first Autonomous Response solution. Powered by award-winning Cyber AI, it responds to cyber-attacks in a matter of seconds - when security teams are overwhelmed or simply aren’t around. The technology works like a digital antibody, intelligently generating a targeted and proportionate response whenever a threatening incident arises in network, email or cloud environments. | CRYPTOGRAPHY API
Call MedCrypt’s APIs within your device’s software for common Security Functions, like encrypting Data at Rest and in transit, and cryptographically signing all instructions sent to your device with unique key pairs.
BEHAVIOR MONITORING
MedCrypt devices can send event data (not PHI) to our monitoring service, allowing us to detect when a device is under attack. This helps you satisfy the FDA's requirement that devices incorporate "intrusion detection".
VULNERABILITY MONITORING
MedCrypt knows which software libraries have been included in your device, and can monitor these libraries for known cybersecurity vulnerabilites long after it has been released. | Tenable.io, the world’s first Cyber Exposure platform, arms Security with the visibility to see their entire cyber attack surface at all times (from IT to Cloud to IoT to OT) and arms the CISO, C-suite and Board of Directors with the insight to focus on the issues which matter most and make better strategic decisions. | ||
Key Customers | Telefonica, ARM-Trustsonic | Siemens, Motorola, Rohde & Schwarz, Kodak, ZTE, Toyota, Bosch, Fujitsu, Kontron, ABB, B&R | Network18, KPMG, BT, T-Mobile, Ocado, Peugeot, ebay | |||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & PrivacyApplication Infrastructure & MiddlewareInfrastructure as a Service (IaaS) | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & Privacy |
Industries | AutomotiveFinance & InsuranceHealthcare & HospitalsLife Sciences | EducationEquipment & MachineryFinance & InsuranceHealthcare & HospitalsRenewable EnergyRetailSecurity & Public SafetyTelecommunicationsTransportation | ||||
Use Cases | CybersecurityProcess Control & Optimization | Intrusion Detection Systems | ||||
Functions | ||||||
Services | Cybersecurity Services | |||||
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | None | Moderate | None | None | None |
Platform as a Service (PaaS) | None | None | None | None | None | None |
Application Infrastructure & Middleware | None | None | Minor | None | None | None |
Analytics & Modeling | None | None | None | None | None | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | Moderate | Moderate | Moderate | Moderate | Moderate | Moderate |
Networks & Connectivity | None | None | None | None | None | None |
Processors & Edge Intelligence | None | None | None | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | None | None | None | None |
Robots | None | None | None | None | None | None |
Drones | None | None | None | None | None | None |
Wearables | None | None | None | None | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners | Telefonica | IBMInfineonIntelOracleMicrosoftRockwell AutomationWind RiverCodesysDeutsche TelekomQNX Software SystemsTrumpfDell TechnologiesFraunhofer IOSB |
Overview | ||||||
Supplier Slogan | Cybersecurity for Decentralized Systems | Perfection in Protection, Licensing and Security | ||||
HQ Location | United States | Germany | United Kingdom | United States | United States | United States |
Year Founded | 2013 | 1989 | 2013 | 2010 | 2016 | 2002 |
Company Type | Private | Private | Private | Private | Private | Public |
Stock Ticker | DARK | NASDAQ:TENB | ||||
Revenue | < $10m | $10-100m | $10-100m | < $10m | < $10m | $10-100m |
Employees | 11 - 50 | 51 - 200 | 201 - 1,000 | 11 - 50 | < 10 | 201 - 1,000 |
Website | Open website | Open website | Open website | Open website | Open website | Open website |
Company Description | Rivetz is building a Global Attestation and Identity Network, powered by the Rivetz Token (RvT) n the Blockchain, in order to improve the security of the devices on which we rely on everyday. Rivetz’s goal is to change the way we access the internet, redefine what Network Security means in the Blockchain era, prove intent in crypto transactions, secure the IoT, and give developers tools to build-in security. The Rivetz solution takes advantage of the Trusted Execution Environment (TEE) that exists in most of the devices we use everyday. This provides Rivetz with an isolated execution environment within the main processor to execute code that cannot be observed or altered by the operating system. This vault on the processor enables Rivetz to store and process sensitive data, and assure that policy and controls are executed as expected. | WIBU-SYSTEMS AG, a privately held company founded by Oliver Winzenried and Marcellus Buchheit in 1989, is an innovative security technology leader in the global software licensing market. In its mission to offer the most secure, unique, and highly versatile technology, Wibu-Systems has developed CodeMeter, a comprehensive, award-winning suite of hardware and software-based solutions for computers, embedded systems, mobile devices, PLCs, and microcontrollers that incorporates internationally patented processes dedicated to protecting the integrity of digital assets. Through its motto “Perfection in Protection, Licensing and Security”, Wibu-Systems safeguards the intellectual property of software publishers and Intelligent Device manufacturers against illicit and fraudulent use, reverse engineering and tampering attacks, sabotage and espionage actions, while generating new digital business models fully integrated with ERP, CRM, and e-commerce platforms. | Darktrace, a global leader in cyber security AI, delivers world-class technology that protects over 6,500 customers worldwide from advanced threats, including ransomware and cloud and SaaS attacks. The company’s fundamentally different approach applies Self-Learning AI to enable machines to understand the business in order to autonomously defend it. Headquartered in Cambridge, UK, the company has 1,500 employees and over 30 offices worldwide. Darktrace was named one of TIME magazine’s ‘Most Influential Companies’ for 2021 | CENTRI provides advanced security for the Internet of Things. Our technology helps organizations secure what matters most – their data – by seamlessly integrating into their existing applications and services in the cloud, data centers, connected devices and products. CENTRI eliminates the risk of data exfiltration and loss of equipment command by establishing trusted devices and advanced Encryption technology while retaining complete visibility to your data. IoT developers and innovators rely on CENTRI to protect the full lifecycle of their data – in transit, at rest and on the Endpoint. | MedCrypt provides data security as a service to medical device OEMs. From medical imaging device, to implantable devices like pacemakers, MedCrypt ensures that devices act only on instructions from trusted sources. | Tenable transforms security technology for the business needs of tomorrow through comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organization. Tenable eliminates blind spots, prioritizes threats and reduces exposure and loss. With more than one million users and more than 21,000 customers worldwide, organizations trust Tenable for proven security innovation. Tenable customers range from Fortune Global 500 companies, to the global public sector, to mid-sized enterprises in all sectors, including finance, government, healthcare, higher education, retail and energy. |
IoT Solutions | Rivetz reealises there needs to be a high level of Assurance that the device will always function correctly, and if they get compromised, the devices should be locked automatically. The TEE can be used as a device identifier, therefore Rivetz uses that to encrypt a message or file and only allow it to be decrypted by a particular TEE. This gives IoT devices end-to-end Encryption using the TEE as the Authentication and Access Point. Strong device identity and registration prevents cloning or rogue devices. Verifiable conditions to detect and prevent tampering of distributed devices stops machines from unwarranted spending. Application developers will be able to use the Rivetz Toolkit to include this security measure also. | Industrial Immune System Fundamental AI technology for OT cyber defense. It works by passively learning what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber-threats in real time. This self-learning technology is protocol agnostic and can be deployed across a range of OT environments, providing full coverage of the organization without disrupting daily operations. Darktrace Antigena The world’s first Autonomous Response solution. Powered by award-winning Cyber AI, it responds to cyber-attacks in a matter of seconds - when security teams are overwhelmed or simply aren’t around. The technology works like a digital antibody, intelligently generating a targeted and proportionate response whenever a threatening incident arises in network, email or cloud environments. | CRYPTOGRAPHY API
Call MedCrypt’s APIs within your device’s software for common Security Functions, like encrypting Data at Rest and in transit, and cryptographically signing all instructions sent to your device with unique key pairs.
BEHAVIOR MONITORING
MedCrypt devices can send event data (not PHI) to our monitoring service, allowing us to detect when a device is under attack. This helps you satisfy the FDA's requirement that devices incorporate "intrusion detection".
VULNERABILITY MONITORING
MedCrypt knows which software libraries have been included in your device, and can monitor these libraries for known cybersecurity vulnerabilites long after it has been released. | Tenable.io, the world’s first Cyber Exposure platform, arms Security with the visibility to see their entire cyber attack surface at all times (from IT to Cloud to IoT to OT) and arms the CISO, C-suite and Board of Directors with the insight to focus on the issues which matter most and make better strategic decisions. | ||
Key Customers | Telefonica, ARM-Trustsonic | Siemens, Motorola, Rohde & Schwarz, Kodak, ZTE, Toyota, Bosch, Fujitsu, Kontron, ABB, B&R | Network18, KPMG, BT, T-Mobile, Ocado, Peugeot, ebay | |||
Subsidiary | ||||||
Parent Company | ||||||
IoT Snapshot | ||||||
Technologies | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & PrivacyApplication Infrastructure & MiddlewareInfrastructure as a Service (IaaS) | Cybersecurity & Privacy | Cybersecurity & Privacy | Cybersecurity & Privacy |
Industries | AutomotiveFinance & InsuranceHealthcare & HospitalsLife Sciences | EducationEquipment & MachineryFinance & InsuranceHealthcare & HospitalsRenewable EnergyRetailSecurity & Public SafetyTelecommunicationsTransportation | ||||
Use Cases | CybersecurityProcess Control & Optimization | Intrusion Detection Systems | ||||
Functions | ||||||
Services | Cybersecurity Services | |||||
Technology Stack | ||||||
Infrastructure as a Service (IaaS) | None | None | Moderate | None | None | None |
Platform as a Service (PaaS) | None | None | None | None | None | None |
Application Infrastructure & Middleware | None | None | Minor | None | None | None |
Analytics & Modeling | None | None | None | None | None | None |
Functional Applications | None | None | None | None | None | None |
Cybersecurity & Privacy | Moderate | Moderate | Moderate | Moderate | Moderate | Moderate |
Networks & Connectivity | None | None | None | None | None | None |
Processors & Edge Intelligence | None | None | None | None | None | None |
Sensors | None | None | None | None | None | None |
Automation & Control | None | None | None | None | None | None |
Robots | None | None | None | None | None | None |
Drones | None | None | None | None | None | None |
Wearables | None | None | None | None | None | None |
Actuators | None | None | None | None | None | None |
Other | None | None | None | None | None | None |
Similar Suppliers | ||||||
Similar Suppliers | ||||||
Partners | ||||||
Partners | Telefonica | IBMInfineonIntelOracleMicrosoftRockwell AutomationWind RiverCodesysDeutsche TelekomQNX Software SystemsTrumpfDell TechnologiesFraunhofer IOSB |