Big50-2017 Startup Spotlight: Portworx

Portworx What they do: Provide software-defined storage for container environments. Problem they solve: Enterprise investment in container technologies and associated personnel is on the rise. However, in order for container technology to reach mainstream adoption in the enterprise, the container ecosystem of vendors, including the likes of Portworx, must provide DevOps teams with adequate tools…

Continue reading →

Big50-2017 Startup Spotlight: Aqua Security

Aqua Security What they do: Provide security for virtual container environments. Problem they solve: Virtual containers are catching on – big time – among application developers, but containers also introduce new security risks. These risks, if left unaddressed, can degrade or even negate the many business benefits containers offer. According to Docker, there are approximately…

Continue reading →

Big50-2017 Startup Spotlight: Virtru

Virtru What they do: Develop encryption software. Problem they solve: Virtru argues that while most organizations know that encryption is a critical data protection tool, existing encryption solutions are “are either too difficult to use or not flexible enough for the job.” How they solve it: Virtru’s encryption “travels with your data. . . wrapping…

Continue reading →

Big50-2017 Startup Spotlight: NormShield

NormShield What they do: Provide cloud-based cybersecurity software that gives users a “hacker’s view of your attack surface and prioritizes vulnerabilities based on risk.” Problem they solve: For hackers to exploit vulnerabilities, they must first find them (obviously). Hackers spend a ton of time conducting online reconnaissance, swapping discoveries on the dark web, participating in…

Continue reading →

Big50-2017 Startup Spotlight: CyberGRX

CyberGRX What they do: Provide a third-party cyber risk management exchange. Problem they solve: Security pros know that contractors represent a major security risk. (Just ask the NSA about the contractor Ed Snowden.) In fact, according to PwC’s 2016 Global State of Information Security report, third-party contractors are the second biggest source of security incidents,…

Continue reading →