| Aqua Security |
Cloud-native Security Platform |
Yes |
No |
| Identiq |
The Private Network for Identity Validation |
Yes |
No |
| Snyk |
Developer Security Platform |
Yes |
No |
| Pentera |
Automated Security Validation |
Yes |
No |
| Unbound Tech |
Software-defined Cryptography |
Yes |
No |
| Fortscale |
User Behavior Analytics for Detecting and Eliminating Cyberthreats |
Yes |
No |
| Talon Cyber Security |
Enterprise Browsing Platform |
Yes |
No |
| torq |
No-code Platform for Security Automation |
Yes |
No |
| Cytactic Cyber Management |
Cyber Crisis Readiness and Management |
Yes |
No |
| Sweet Security |
Cloud Runtime Security Suite for Defending Cloud-workloads |
Yes |
No |
| Ox Security |
Software Supply Chain Security |
Yes |
No |
| Solidus Labs |
Manipulation Detection for the Cryptocurrency Market |
Yes |
No |
| Bright Security |
Developer-centric Application & API Application Security Testing |
Yes |
No |
| Satori Cyber |
Secure Data Access Cloud Solution |
Yes |
No |
| ZecOps |
Mobile Cyber Attack Solutions |
Yes |
No |