Round 2 of the Big 50-2016 startup competition wraps up with Group 5: Securing and storing our digital future.
The security startups listed below do everything from using machine learning to detect advanced threats to offering portable VPN devices. The storage startups, meanwhile, are innovating around Flash, container-defined storage, NAS, and more.
Group 5 voting is open through Tuesday, April 5 at 5 PM PT.
#Big-50-2016 startup voting wraps up w/ Group 5: Security & Storage. Vote for your favorite startups: http://wp.me/p330ZZ-9p Share on XOf the 30 startups listed below:
- The top 15 will move on to Round 3
- The bottom 15 will be eliminated
Notes for voters:
- You can vote for up to 3 startups
- Your votes will be weighted from #1 (which will get 3 points) to #3 (which will get 1 point)
- Only humans are eligible to vote!!! Any startups deploying voting bots or otherwise subverting the one-vote/device structure of this competition will be penalized. All fraudulent votes will be tossed out, and this startup will face additional penalties, depending on the severity of the cheating.
The Group 5 Lineup
(If the survey isn’t displaying properly, you may also click here to vote.)
(Scroll down for descriptions of each startup.)
Anonabox
Develops TOR and VPN routers
AttackIQ
A live, remote testing platform that continuously checks for cyber-security gaps
BrightPoint Security
Software that automates threat detection and risk analysis, and turns volumes of threat information into actionable cyber-security intelligence
Coho Data
Developing flash-tuned scale-out storage architecture designed for private clouds
Comilion
Provides a decentralized, on-premises cyber-security collaboration platform that allows cyber-threat information to be shared with multiple communities in real-time
Cybereason
A real-time cyber-attack detection and response platform that uses endpoint data to detect and remediate simple and complex threats
Cyphort
A cyber-security detection engine that uses machine-learning as it finds new threats and adapts itself as the threats change
Deep Instinct
Real-time Advance Persistent Threat (APT) protection, using data fragmentation, deep learning, and predictive capabilities in order to prevent future attacks
digital shadows
A scalable data analysis platform that creates a continual view of an organization’s digital footprint, to protect against cyber-attacks and loss of intellectual property
Elastifile
Enterprise storage with an all flash solution that bridges current and emerging data center architectures
Exabeam
Behavioral analytics for detecting advanced threats and providing rapid incident response
HackerOne
A Software-as-a-Service coordination platform that streamlines communication between security researchers and internal response teams
Illumio
Adaptive cyber-security that works across legacy data centers and cloud computing environments
illusive networks
A cyber-security company focused on targeted attacks
Indegy
Provides a platform that enables operational engineers and cyber security personnel to gain control over industrial-networks, and detect malicious activities
InterModal Data
Distributed system software and disaggregated hardware architecture that maximizes storage efficiency, performance, and resource utilization
Keezel
Portable VPN device
Menlo Security
Provides a platform that isolates and executes all Web content in the public or private cloud, enabling users to interact safely with content, without the threat of malware
Morphisec
Endpoint protection designed to block zero-days and advanced attacks
Niara
Provides a machine-learning-based security analytics platform that automates the detection of attacks
NSFOCUS IB
Advanced network and application layer security solutions for enterprises, service providers, universities, gaming and social media companies and other organizations
PernixData
Optimizes storage for virtualized environments
Portworx
Container-Defined Storage (CDS) for enterprise deployments
Qumulo
Uses data-aware scale-out Network Attached Storage (NAS) software to help enterprises store and manage large numbers of digital assets
Re-Sec Technologies Ltd.
Provides a platform for a comprehensive, multi-layer prevention and detection solution against cyber threats
Skyport Systems
Delivers a remotely-managed platform that establishes security for applications
TarDisk
Flash storage device that plugs into the MacBook SDXC port and increases hard drive space
Tempered Networks
A centrally-managed, security appliance solution that leverages existing network infrastructure to efficiently enable industrial and enterprise connectivity that is secure by default
TruSTAR
An anonymous cyber incident sharing platform for enterprises
Vectra Networks
Monitors internal traffic to ID attacks as they’re happening