What You Need To Know
SOC 2 is an auditing compliance procedure that confirms your data is securely protected and managed by your service providers. As SOC 1 reports on vendor systems that are secured correctly, SOC 2 reports on how effective those systems are compared to your operation strategies.
SOC 2 is built around five trust pillars: security, availability, processing integrity, confidentiality and privacy.
A-LIGN offers comprehensive expertise and consulting for every set of compliance objectives and makes your specific path our priority.
Adaptive Shield provides enterprises a continuous, automated solution and built-in knowledge base that makes native SaaS security possible and easy
Alert Logic's Managed Detection and Response platform focuses exceptional performance in around-the-clock security in cyber attack protection.
Arctic Wolf provides 24/7 customized cybersecurity through its cloud-native Arctic Wolf Platform for Managed Detection and Response (MDR), Managed Risk, and Managed Clound Monitoring. The Arctic Wolf team provides continuous monitoring, detection, and support to mitigate risk and vulnerabilities.
Assure Professional specializes in providing cybersecurity, assurance, and compliance solutions. With a unique service, they provide due diligence, private equity, accounting services, and compliance connection programs for SOC 1 (formerly SSAE 16) Audits, Soc 2 + HITRUST Audits, SOC SOC Readiness Assessments, SOC for Cybersecurity, SOC for Vendor Supply Chain, ISO 27001 Assessments and HIPAA/HITECH Assessments.
A unique data security solution specializing in data protection. Atakama provides file-level encryption and customizable security policies to compliment a variety of business requirements.
Axonius specializes in cybersecurity asset management supplying security policies and solutions to correct security gaps, threats, vulnerabilities, and emergency incident response through seamless integration of IT, security and operation management platforms.
Data is the critical factor for all businesses - not just to persevere, but to continue to innovate.
Through mimicking hacking techniques, our experts continuously examine Tactics, Techniques, and Procedures (TTPs) to strengthen security infrastructures. The Incident Response assessment process ensures accurate tactics on resolving incidents.
Cato Networks developed the world's first SASE platform by combining SD-WAN and network security. Customers utilizing Cato's services can securely access multiple applications throughout their network, provide a top-level secure branch internet, and sync cloud datacenters and mobile users into a zero-trust architecture.
We are a Cyber Security Consulting & Advisory Firm composed of highly experienced strategic cybersecurity advisors and consultants helping clients maintain a healthy cyber security posture.
CRITICALSTART is leading the way in Managed Detection and Response (MDR) services.
CrowdStrike is a US-based company that provides cloud workload, endpoint security, threat intelligence, and cyberattack response serrvices.
A supplier of a competitive third-party cyber risk management platform that identifies, evaluates, and monitors enterprise-level cyber security, CyberGRX sets the standard on automation and analytics to provide valuable solutions preventing security threats.
CyberProof is a security services company that intelligently manages your incident detection and response.
Cynet is a pioneer and leader in advanced threat detection and response
Dean Dorton assists clients through strategic business levels within audit, tax, business management, consulting and technology solutions utilizing innovative cloud solutions.
OneTrust is the #1 fastest growing and most widely used technology platform to help organizations be more trusted, and operationalize privacy, security, data governance, and compliance programs.
Get Agentless, Workload-Deep, Context-Aware Security and Compliance for AWS, Azure, and GCP.
and prioritize cloud security risk – in minutes, not months.
Rackspace manages applications, data, security networks, that assists companies transition to cloud technology and excel in its usage. With customer success as its priority, Rackspace extends its passion to experts to deliver the best customer service experience.
RiskRecon provides a SaaS platform that helps organizations more effectively manage the risk reality of increasingly interconnected IT ecosystems by delivering frequent, comprehensive and actionable security performance measurements.
SecurityScorecard was founded in 2013 by Dr. Alex Yampolskiy and Sam Kassoumeh. Through their patented rating technology, SecurityScorecard creates an instant risk analysis and is used by over one thousand companies to self-monitor, evaluate third party risk, andn cyber insurance underwriting.
Silent Breach provides network security and digital asset protection services, allowing companies to continue their business without experiencing consumer fallout and financial loss due to IT vulnerabilities.
Strike Graph customers earn audited SOC2 security certifications with confidence.
TrustedSec is an IT security consulting netowork with expertise in strategized risk-management that asissts companies in preventing and defending against cyber threats.
UpGuard delivers a well-rounded cyber risk solution by bringing together third-party security ratings, vendor questionaires, and cyber threat data.
Wiz is a new approach to cloud security that finds the most critical risks and infiltration vectors with complete coverage across the full stack of multi-cloud environments.
Their highly-skilled practitioners are trained to meet clients where they are – whether that be in the midst of a crisis or proactively seeking cybersecurity services.
OneLogin by One Identity provides Identity and Access Management (IAM) solutions. OneLogin provides you with everything you need to secure your workforce, customers, and partners at a price that works with your budget. OneLogin secures over 5,500 customers worldwide, including Airbus, Stitch Fix, and AAA.
Automated security monitoring for compliance certifications: SOC 2, HIPAA, and ISO 27001
Like the immortal tugboat, we're passionate about guiding you through the rough seas of information security and privacy into the calm waters of proven policies, practices and compliance.
Abnormal provides total protection against the widest range of attacks including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.
Empower productivity. Protect data. Stop Insider Risk.
Cybereason provides cyber attack protection that unifies security from the endpoint, to the enterprise, to everywhere the battle moves. Cybereason's Defense Platform combines the industry’s top-rated detection and response (EDR and XDR), next-gen anti-virus (NGAV), and proactive threat hunting to deliver context-rich analysis of every element of a MalOp (malicious operation). Cybereason is a privately held, international company headquartered in Boston with customers in more than 40 countries.
Gartner has named SaaS Security Posture Management (SSPM) as a MUST HAVE solution to continuously assess security risks and manage the SaaS applications' security posture. Another category Grip supports it the new SaaS Security Control Plane (SSCP) category.
Living Security is trusted by security-minded organizations like CVS Health, MasterCard, Verizon, MassMutual, Biogen, AmerisourceBergen, Hewlett Packard, JP Morgan, and Target.
Check Point is a well known leader of software and hardware products for cyber security including next-generation cloud security solutions for network security, endpoint security, mobile security, data security, secure web gateway (SWG), remote access ZTNA, email security and Microsoft Office 365 email and extended Microsoft application security. When looking for a single-platform for to bundle in many cyber security products, consider Check Point as a valuable cybersecurity platform option.
Noname Security is taking a complete, proactive approach to API Security.
Noname works with 20% of the Fortune 500 and covers the entire API security scope across three pillars — Posture Management, Runtime Security, and API Security Testing.
Noname Security is backed by leading venture capital firms, including Lightspeed, Georgian, The Syndicate Group (TSG), Forgepoint, Next47, Insight Partners, and Cyberstarts, and has raised $220M, achieving "unicorn" status only one year out of stealth.
Noname Security is privately held, remote-first with headquarters in Silicon Valley, and offices in Tel Aviv and Amsterdam.
Salt Security is an API Security SaaS provider. They offer an API Threat Protection solution focused on securing the ubiquitous APIs connecting everything from web and mobile applications to microservices and IoT devices. These are the APIs that you develop and own and are at the core of connecting your applications and data.
Powered by Salt Security's AI-based Big Data engine and Holistic Detection architecture, only Salt Security:
--Discovers all your APIs and the sensitive data they expose
--Pinpoints and stops attackers during reconnaissance
--Eliminates API vulnerabilities to strengthen your security posture
Salt Security was founded in 2016 by alumni of the Israeli Defense Forces (IDF) to deliver the first, patented API Protection platform to secure APIs. Salt Security deploys in minutes, automatically learns your unique APIs, and requires no configuration or customization to help you protect and improve your API security.
In our Series D round, we raised $140M at a valuation of $1.4 billion. Led by CapitalG, Alphabet's independent growth fund, the round included participation from all existing investors, including Sequoia Capital, Y Combinator, Tenaya Capital, S Capital VC, Advent International, Alkeon Capital, and DFJ Growth.
42Crunch provides continuous API security. Their unique developer-first API security platform enables developers build and automate security into their API development pipeline and gives security teams full visibility and control of security policy enforcement throughout the API lifecycle. 42Crunch enables a seamless DevSecOps' experience that reduces governance costs and accelerates the rollout of secure APIs.
AppOmni is a SaaS Security Management provider. AppOmni provides unprecedented data access visibility, management, and security of SaaS solutions, enabling organizations to secure mission-critical and sensitive data. AppOmni's solution offers patented technology that deeply scans APIs, security controls, and configuration settings to evaluate the current state of SaaS deployments and compare against best practices and business intent. With AppOmni, organizations can establish rules for data access, data sharing, and third-party applications that will be continuously and automatically validated.
AppOmni was named a 2021 SINET16 Innovator and one of Dark Reading’s “11 Cybersecurity Vendors to Watch in 2021.”
Keeper Security is a Password Management SaaS Platform that helps you manage, protect and monitor all your organization's passwords, secrets and remote connections with zero-trust security.
1Password is trusted by more than 100,000 businesses to protect their data, 1Password gives you complete control over passwords and other sensitive business information.
1Passworkd is a key asset of the Identity and Access Management (IAM) stack, 1Password protects all employee accounts – even those you aren’t aware of. Give employees secure access to any app or service and safely share everything you need to work together – including logins, documents, credit cards, and more – while keeping everything else private.
1Password is easy to deploy and integrates with Azure AD, Okta, OneLogin, and Slack, so you can automatically provision employees using the systems you already trust. It’s simple to manage and fits seamlessly into your team’s workflow, so you can secure your business without compromising productivity.
LastPass is a Password Management SaaS solution that provides password and identity management solutions that are convenient, easy to manage and effortless to use, helping more than 30 million users organize and protect their online lives. From enterprise password management and single sign-on to adaptive multi-factor authentication, LastPass Business gives superior control to IT and frictionless access to 85,000 businesses.
Tessian is a cloud email security service that intelligently protects businesses around the world against advanced threats and data loss on email, while coaching your staff about security threats in-the-moment. Tessian uses machine learning and behavioral data science to automatically stops threats that evade legacy Secure Email Gateways, including advanced phishing attacks, business email compromise, accidental data loss and insider threats. Tessian’s intelligent approach not only strengthens email security but also builds smarter security cultures in the modern enterprise.
Founded in 2013, Tessian is backed by legendary investors such as March Capital, Sequoia, Accel and Balderton, and has been recognized as one of Fast Company’s Most Innovative Companies for 2022.
Neosec is an API Security Solution helping your business protect your APIs from business abuse and data theft.
runZero brings together the best of IT, security and networking technology to deliver amazing network discovery and asset inventory capabilities for modern enterprises. If your looking to cyber security asset discovery and management tools, look no further than runZero for your network discovery and asset inventory platform.
Imperva - Application, Data and Network Security Solutions
Imperva is a cyber security leader that helps organizations protect their data and all paths to it. Imperva protects all digital experiences, from business logic to APIs, microservices, and the data layer, and from vulnerable, legacy environments to cloud-first organizations. Imperva protects customers around the world trust Imperva to protect their applications, data, and websites from cyber attacks.
PerimeterX is the leading provider of solutions that detect and stop the abuse of identity and account information on the web. Its cloud-native solutions detect risks to your web applications and proactively manage them, freeing you to focus on growth and innovation. The world’s largest and most reputable websites and mobile applications count on PerimeterX to safeguard their consumers’ digital experience while disrupting the lifecycle of web attacks.
HUMAN is a Bot Security SaaS platform that protects enterprises from bot attacks to keep digital experiences human. HUMAN has one of the most advanced Human Verification Engine that protects applications, APIs and digital media from bot attacks, preventing losses and improving the digital experience for real humans. Today HUMAN verifies the humanity of more than 10 trillion interactions per week for some of the largest companies and internet platforms.
Recovery Point Systems (RPS)
Disaster Recovery as a Service (DRaaS)
Backup as a Service (BaaS)
Recognized as a leader by Gartner for their DRaaS services.
Shield Your Business From Cyber Attacks With Binary Defense Managed Detection and Response - MDR Solutions
We are a mix of US Special Operations, US National Security, and cybersecurity industry veterans. Our mission is to “turn the map around” – using the attacker’s perspective to help enterprises prioritize defensive efforts.
Founded in 2019, Horizon3.ai is headquartered in San Francisco, CA, and 100% made in the USA.
We've been in the offensive security space for almost two decades and are proud to be home to the innovators, engineers, and exploit writers behind some of the most popular security tools and research out there.
NetSPI is a penetration testing company that is transforming the cyber security testing industry with tech-enabled services and prevention-based cyber security techniques. Global enterprises choose NetSPI’s penetration testing service to test their applications, networks, and cloud infrastructure at scale and manage their attack surfaces.
Zimperium, Inc. is a global leader in mobile device and app security, offering real-time, on-device protection against both known and unknown threats on Android, iOS and Chromebook endpoints. The company was founded under the premise that the then current state of mobile security was insufficient to solve the growing mobile security problem. At the time, most mobile security was a port from traditional endpoint security technologies.
4055 Valley View
Dallas, TX 75244
Echelon was born from the idea that cybersecurity isn’t something that a professional services firm can just dabble in. Cybersecurity, privacy and technology risk present major threats that disrupt our way of life. That threat is constantly evolving, so we are too. We see it as our calling to stem the tide. We are all in. While other cybersecurity professional services firms tout what they do, few can articulate why they do it. We know exactly what drives us - protecting your basic right to security and privacy.
Our origin story begins with our name. The echelon formation creates a staggered but unified front, used to successfully provide excellent range of vision and protection to each participant. From our name, to how we conduct and manage ourselves on a day-to-day basis, we are built to be that trusted ally.
Perception Point is a Prevention-as-a-Service company, built to enable digital transformation. Trusted by global enterprises, our Gartner-recognized, revolutionary platform offers a 360-degree protection against any type of content-based attacks, across all collaboration channels, in one simple solution. Built by and for IT and security experts, our service is incredibly easy to deploy, maintain and update according to the newest attack techniques.
We are a team of cyber-intelligence professionals and business leaders with offices in the US and Israel. We are passionate about cybersecurity, business operations, and the connection between the two.
We enjoy ruining the attackers’ day, every day.
Black Kite pushes the limits on predictive insights, delivering the highest quality intelligence to help organizations make better risk decisions and improve the health and safety of the entire planet’s cyber ecosystem.
SlashNext was founded in 2015 during a significant rise in phishing, morphing payloads, and a very strong belief that phishing would grow from email into a multi-channel problem and become the number one cyber threat to organizations. There was a recognition that something needed to change.
Atif Mushtaq, the visionary founder behind SlashNext and one of the main architects of FireEye’s core malware sandbox technology, recognized phishing detection, like malware, needed to move from signature-based reputation techniques to behavioral analysis. What was needed was a faster, more automated, and accurate approach to phishing detection. With that knowledge, SlashNext built an Artificial Intelligence (AI) phishing detection engine with virtual browsers and behavioral analysis using computer vision, natural language processing, and several machine-learning classifiers to detect and stop well-crafted multi-payload phishing attacks delivered multiple communication channels, including legitimate infrastructure.
Today, as humans have moved completely to the cloud, using apps, browsers and mobile devices to communicate with work, family, and friends, SlashNext is uniquely positioned to stop multi-channel phishing and human hacking
As cyber-threats and regulatory mandates continue to expand, organizations are challenged by the difficulties of implementing effective cybersecurity and compliance programs. With Apptega, organizations of all sizes, including Fortune 500 enterprises and Managed Security Service Providers (MSSPs), are simplifying cybersecurity and compliance management.
Apptega is at the intersection of simple user experiences and patent-pending technology, providing an innovative platform paired with industry frameworks to build, manage and report great cybersecurity.
HackNotice is a threat intelligence provider that helps consumers and businesses identify and protect against potential risks and respond to hacks through real-time alerts, around the clock monitoring, and actionable recovery recommendations. Indexing up to a quarter of a billion records each day, HackNotice provides users with the information and visibility they need to protect their digital identities. Founded in 2018, HackNotice is based in Austin, TX.
Halcyon is a cybersecurity company building products that stop ransomware from impacting enterprise customers. The Halcyon Anti-Ransomware and Cyber Resilience Platform offers layered ransomware protection that combines pre-execution detection, behavioral modeling, deception techniques and, if all else fails, resiliency, recovery and isolation of impacted nodes.
Next is disrupting the legacy data loss prevention market with a user-centric, flexible, cloud-native, AI/ML-powered solution built for today’s threat landscape. The Reveal Platform by Next uncovers risk, educates employees and fulfills security, compliance and regulatory needs.
Seedata.io is a cybersecurity deception-technology SaaS that identifies previously undetected data theft/leakage incidents. We are building a solution to fundamental cybersecurity issues of monitoring and detecting incidents outside your perimeter. We have been on your side of the table, experienced the same problems and asked ourselves why things weren’t better? Now, we’ve decided to make it better.
We’ve built a no-code platform that can be deployed in minutes, runs unsupervised, and integrates directly with your existing SaaS platforms and other security tools
Thinkst Canary is a Deception Technology software vendor. Most companies discover they've been breached way too late. Thinkst Canary fixes this: just 3 minutes of setup; no ongoing overhead; nearly 0 false positives, and you can detect attackers long before they dig in. Check out why our Hardware, VM and Cloud-based Canaries are deployed and loved on all 7 continents..
Tons of security products would be useful, if only you changed everything you did and made them the centre of your universe. This never happens, so they sit half deployed forever. Thinkst Canary doesn’t try to monopolise your time or dominate your thinking. Deploy your birds and forget about them. We will remain silent until you need us most…
Dashlane puts all your passwords, payments, and personal info in one place that only you control. So you can use them instantly. Securely. Exactly when you need them.
As the leading provider of Data-Centric Cloud Security, we set a new standard for helping businesses protect the sensitive data and information they care about most.
dData security is not just about locking down sensitive information. It’s about setting it free. From device and app to network and cloud, we’re unifying data security - providing protection from anywhere, on any device, without sacrificing privacy. It’s the future of secure data and peace of mind for all.
Protect your online data using a password manager you can trust. Bitwarden conducts regular third-party security audits and is compliant with GDPR, SOC 2, HIPAA, Privacy Shield, and CCPA standards.
Drive collaboration, boost productivity, and experience the power of open source with Bitwarden, the easiest way to secure all your passwords and sensitive information
Millions of users around the world, including many of the world’s largest organizations, trust Bitwarden to protect their online information using a transparent, open source approach to password management.
CYGNVS - Incident Response Platform
The CYGNVS platform is mobile friendly, out-of-band, secure and pre-configured with built-in playbooks, industry templates and workstream assignments. Using the CYGNVS platform will guide you through your tailored response plan assigning role-specific tasks to team members. When disaster strikes and your corporate network and/or email is compromised, CYGNVS is your place to securely, swiftly respond and recover.
Panorays is dedicated to eliminating third-party security risk so that companies worldwide can quickly and securely do business together.
We automate, accelerate and scale customers’ vendor security evaluation and risk management process.
Developed by the security experts behind NordVPN, NordPass is a secure, easy-to-use password manager purpose-built for a smoother and safer online experience. Besides your login credentials, you can also use NordPass to securely store and access your credit card details, secure notes, and personal information. Everything you keep in NordPass is protected by advanced encryption algorithms.
Our mission is to develop affordable digital security products with a passion for detail: simpler, nicer, faster and safer.
Nordpass Personal -
All of your passwords, credit cards, and personal info in a single secure place.
Nordpass Business -
Drive growth and productivity with the NordPass password manager for business.
No-limit, end-to-end encrypted storage of credentials, credit cards, notes, and personal information means access to everything you need from one safe place.