| viisights |
Video Intelligence Platform for Security and Surveillance |
Yes |
No |
| Promise Bio |
Epiproteomic Analyses on standard Mass-Spectrometry Data |
Yes |
No |
| NanoPass Technologies |
Intradermal Vaccine Delivery Solutions |
Yes |
No |
| DeepKeep |
AI-Native Security for AI Applications |
Yes |
No |
| Magnus Metal |
Digital Casting Process for Industrial Volume Production of Metal Alloys |
Yes |
No |
| NanoLock Security |
Device-level, Zero-trust OT Cybersecurity Solutions |
Yes |
No |
| Citrusx |
AI Explainability Collaboration Platform |
Yes |
No |
| Conbo.ai |
Hardware-free Real-time Assets Tracking & Analysis for Logistic Facilities |
Yes |
No |
| 101 Therapeutics |
Developing Cures for Multiple Infectious Diseases |
Yes |
No |
| Corsound AI |
AI Voice-based Solutions |
Yes |
No |
| KTrust |
Continuous Threat Exposure Management for Kubernetes Environments |
Yes |
No |
| CyberRidge |
Cyber Blocking Ridge |
Yes |
No |
| Newphotonics |
Silicon Photonic Chip Technology for Data Centers |
Yes |
No |
| Tervizio |
3D Imaging Optimization for the Automotive Industry |
Yes |
No |
| Classiq Technologies |
Quantum Computing Software |
Yes |
No |
| Neural Guard |
AI-powered Automated Threat Detection |
Yes |
No |
| Pentera |
Automated Security Validation |
Yes |
No |
| DeepCube |
Deep Learning Accelerator for Improved Inference Performance |
Yes |
No |
| Ultra Information Solutions |
Digital Identity Solution for Governments and Corporations |
Yes |
No |
| Corsight |
Facial Recognition Technology |
Yes |
No |
| ICS Security |
Network Intrusion Detection System for Critical Infrastructure |
Yes |
No |
| EnsureDR |
Disaster Recovery Testing Solution |
Yes |
No |
| Cervello |
Railway Cybersecurity Solution |
Yes |
No |
| VALIRE SOFTWARE |
Cognitive Computing for Internal Fraud Detection |
Yes |
No |
| MinerEye |
Tracking and Protecting Sensitive Data |
Yes |
No |
| SIGA |
SCADA Cybersecurity and Anomaly Detection |
Yes |
No |
| Octopus Systems |
Fusion Command and Control Platform |
Yes |
No |
| Assac Networks |
Mobile Network Forensics and Security |
Yes |
No |