At times like these, scaling companies need more help and guidance than ever. So it is with much pride that we can announce the list of companies who are joining our Cyber 2.0 cohort.
After an impressive amount of applications, which were scrutinised by our esteemed panel of tech and cyber security expert judges (including Mivy James, Head of Consulting for National Security, BAE Systems Applied Intelligence and Robert Coles of Crossword Cybersecurity), a total of 22 UK cybersecurity companies are set to join the second cohort. The first cohort featured companies such as White Bullet and Red Sift.
Caroline Dinenage, Minister for Digital and the Creative Industries, said: “We’re working closely with tech companies to find innovative ways to stop the spread of coronavirus. It is great to see some of the successful startups developing solutions to speed up the vital exchange of health data and make it easier for SMEs to work from home securely.”
“This important initiative will not only allow promising cyber security startups access to expert advice but also help make Britain the safest place in the world to be online.”
Mivy James Head of Consulting for National Security, BAE Systems Applied Intelligence commented: “I was certainly impressed by the quality of submissions that I reviewed this time round, the standard was consistently higher than last year. With almost everyone now working remotely and often scrabbling around for better collaboration tools, we all need to be very vigilant to cyber threats as we may not always be operating within the protections provided by our organisations. I’ve noticed that digital transformation now has an enormous emphasis on collaboration (as opposed to machine learning) so there’s been an interesting change in priorities.
The programme, which boasts a prestigious roll-call of speakers and scale coaches, including Dave Palmer (Darktrace), James Chappell (Digital Shadows), James Hadley (Immersive Labs) and Lesley Eccles (FanDuel & HelloRelish), will focus on the following scaling challenges: scaling internationally, scaling company culture and navigating access to clients and stakeholders in the cyber ecosystem.
Mike Jackson, Entrepreneur Success Director, Tech Nation, commented: “The UK is already an acknowledged leader in cyber security, raising £7.8bn between 2015 and 2019, placing the UK third in the world for cyber after the US and China. In these unprecedented times that we face in light of COVID-19, there has never been a more important time to invest in and support innovative cyber solutions. At Tech Nation we are delighted to announce the second cohort of Cyber 2.0, to help unlock the growth potential for early-stage cyber scaleups.”
Of the 22 companies selected, 68% are based outside of London and 45% have female founders. When it comes to sub-sectors, the most strongly represented are Training and Awareness, Innovation in Data Usage, and Governance and Compliance. Other sub-sectors covered are IoT security, Brand and Intellectual Property Protection and Identity and Access Management. The majority of companies joining the cyber programme aim to expand to the US, followed by Germany and Australia.
Ampliphae Belfast | @Ampliphae Ampliphae is an easy-to-deploy, sophisticated and affordable cloud-discovery, security and compliance platform, allowing businesses to take back control of the cloud. Ampliphae quickly finds all the SaaS applications in use on your network, monitors adoption rates, sees who is using what service, and, where necessary, migrates users from non-compliant services to approved ones.
Angoka provides hardware-based and embedded software solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks. It provides a trusted information exchange for Connected and Autonomous Vehicles (V2X), IoT, Smart Cities and Critical Infrastructure, including Energy and Telecom national grids
Cyber attacks, customer trust, new data protection, privacy compliance requirements, and the rapid adoption of new technology are introducing unanticipated risks. AuditComply revolutionises the way organisations manage their risk, compliance and quality programs. It automates various workflows and aggregates risk data in support of cross-organization collaboration for risk management.
People, not technology, have become the most common target for cyber attackers. Bob’s Business provides cyber security awareness training courses to businesses, including phishing training and compliance courses. It empowers individuals to take ownership of their data and their cybersecurity behaviours by providing content that relates to them on an individual basis which will become increasingly important as the lines between home and work blur.
ByzGen’s enterprise-grade, blockchain-inspired, Trusted Data Exchange Platform enables businesses and organisations to exchange their most sensitive and commercially valuable data between disparate partners, supply chains and stakeholders. It ensures absolute originator control, verifiable data states, provable histories and the highest levels of security for all critical enterprise data.
Cyan Forensics helps law enforcement, social media and cloud companies find and block harmful content. Its new generation of tools provide dramatically accelerated on-site or lab based digital triage for policing, effective protection for social media, cloud and messaging apps, and empowering governments to achieve policy goals.
CyberSmart provides a unique approach to automating cyber security and compliance in line with (and exceeding) government standards, in order to protect against over 99% of cyber incidents. With its centralised dashboard, desktop and mobile apps, the service reduces the Cyber Essentials certification time from months to hours, making remote auditing the de facto approach for the industry, all whilst checking, fixing and monitoring compliance 24/7.
Dataswift is a technology company that enables everyone to benefit from the ethical data economy, by providing the essential tools to give, take and use data responsibly. They offer a range of products that: give individuals ownership and control over their personal data; build richer relationships between individuals and enterprises through policy-driven processing and portability; built upon a rigorous ethical framework and scalable technology in the cloud.
eXate is the “Ink Bomb for Data” and protects production data in order to unlock its value. As a result, it allows data to be safely shared with third parties. By using eXate’s sharding technology, the majority of sensitive data attributes remain within a company’s firewall, allowing insights and analytics to be generated in a secure manner.
Rising Stars 2.0 winners Foundries.io address security and device management for IoT and Edge devices by developing software micro-platforms. They provide a self-service cloud solution with turnkey services to develop, secure, deploy and maintain embedded IoT and Edge compute products. They enable secure IoT devices and provide lifetime software maintenance at a fraction of current costs.
Glasswall offers unparalleled protection from file-based threats. Malware morphs and spreads at such a rate that malicious files are often missed and harmless files held, impacting both safety and productivity. Rather than attempting to identify and block dangerous content, Glasswall’s signature-less technology generates clean, safe and visually identical files with no need for patching or updates. With Glasswall, you can trust every file.
Hut Six’s information security awareness solution trains, tests and tracks your information security culture to increase awareness of potential cyber security issues that can occur in the workplace. They provide employees with knowledge to help them identify a potential risk before it happens, for example, clicking on a link in a phishing email. Their focus is to deliver relevant and non-arbitrary training that convinces users to change their behaviour.
NquiringMinds provides the tools to secure, share and analyse data at scale. Their Trusted Analytics platform securely combines data from different sources, solving the problem of establishing trust between data from different origins. Customers in SmartCities, Industry and Health have used NquiringMinds technology to provide deep AI powered insight and to deploy these insights operationally.
OutThink is the world’s first Predictive Human Risk Intelligence platform (SaaS) and is revolutionising security awareness. The enterprise solution gives security teams powerful insights and the visibility they need to make targeted interventions, to manage human risk effectively.
Rising Stars 1.0 alumni PPC Protect develop automation software for PPC advertisements, aiming to minimise the effects of click fraud and ad fraud for digital media advertisers, a criminal activity that is estimated to cost up from $19bn in 2019 – and it shows no sign of slowing down.
PreCog has developed a real-time crime intelligence solution for the government. By using IoT hardware sensors and artificial intelligence, it is able to detect and react to the location of criminals, terrorists, trafficked persons and people of interest to governments, security services, law enforcement agencies and commercial organisations, all with the help of their data analytics platform.
Shufti pro is an AI-powered SaaS solution that makes onboarding and verifications of users up to 40% more cost effective and can verify users in under 30 seconds. Shufti pro offers Identity Verification, KYC, AML & KYB solutions in over 230 countries.
SnapDragon protects brands and intellectual property by fighting fakes and counterfeits being sold online. By identifying and removing fakes from online marketplaces, they protect customers at risk of purchasing low quality goods, the reputation of the brand and divert the revenue back to the people producing the real, quality product. They do this through an easy-to-use platform, and their clients range from SMEs to larger international brands such as Love Island and Orchard Toys.
Symphonic’s software makes it possible for public and private sector organisations to exercise greater control over when they authorise access to data and services, by allowing policies to account for a much wider context and keep an audit trail of who has accessed which data. This is a key requirement of the modern security landscape and allows clients to adhere to strict regulatory compliance whilst still opening up access that is imperative to the needs of the company.
ThinkCyber engages staff across medium to large corporations to understand and protect themselves against cyber-threats by delivering ongoing, real-time and context sensitive security interventions and guidance. They provide a cross-sector solution and offer the unique capability to deliver secure behaviour change in employees, tailoring content to individual behaviours.
Software is developed faster than it can be tested for security, introducing unknown risks to the business. Uleska offers a simple to use DevSecOps platform to automate technical testing, while immediately providing visibility of associated business risks and metrics. Uleska automates many of the tasks that hold security and development teams back, reducing the time and cost of security programs, and helping reduce risks against industry regulations.
VU Security was created to help both citizens and organisations by providing a product that ensures secure, safe and frictionless transactions.Their cloud infrastructure provides a one-stop shop connection to all of its solutions, letting clients easily integrate their existing systems with VU, whilst protecting users from identity theft and fraud.
Tech Nation Cyber 2.0 is supported by our partners CBRE, RSM, Talent Works International and Wilson Sonsini.
Strictly Necessary Cookies
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.
3rd Party Cookies
Analytical/performance cookies: These help us to improve the way our website works, for example, by ensuring that users are finding what they are looking for easily.
Functionality cookies: These enable us to personalise our content for you, greet you by name and remember your preferences.
Targeting cookies: These cookies record your visit to our website, the pages you have visited and the links you have followed.
Please enable Strictly Necessary Cookies first so that we can save your preferences!