15 cybersecurity startups coming out of Plug and Play’s Fall 2019 batch

From blockchain and behavioural mapping to cloud and encryption solutions, a smattering of different cybersecurity startups is among the new Plug and Play Fall 2019 batch. We took a closer look.

Hot on the heels of Y Combinator announcing its latest group of startups, the Plug and Play accelerator has revealed the 123 startups going to take part of its new three-month long programme.

“I am incredibly excited to welcome the new batch of startups to our Plug and Play ecosystem,” said Saeed Amidi, founder and CEO of Plug and Play. “The connections made throughout our programmes will give startups the tools to transform these industries. I look forward to seeing how they will help increase efficiency and advance the markets forward.”

Among the startups selected to take part of the new programme, there were 15 cybersecurity ventures worth a closer look.

First out we’ve got, TWOSENSE.AI. This startup’s tagline is “The password is you”. What that actually means is that the software learns to recognize users’ behaviours through deep learning and mobile sensors. The core of this data is based on background motion and location as well as phone interaction characteristics. In other words, it will be able to tell whether or not it’s the right user trying to get access to the network.

The second one to keep your peepers peeled on for the future is Aporeto, a zero trust security solution provider. This company’s software is based on so-called rich identities that are automatically generated with workload metadata from any available system and user identity data from OpenID Connect-compliant providers. By using a rich identity instead of an IP address, the digital defences set up by Aporeto are more flexible and portable. The software works on public, private or hybrid clouds that makes distributed applications secure by default without impacting developer speed.

Being attacked by hackers is never fun. Just ask Capital One. After the bank revealed 106 million customers’ data was compromised by a hack attack, the company is now facing both lawsuits and scrutiny from politicians.

Which leads us to BreachRx. This rising enterprise promises to make it easier to know what you should do after a breach. The business’ SaaS-based software automatically generates tailored response plans in the aftermath of a data security incident in a way that is compliant with current regulations. It also automatically updates how a company should respond depending on changes to laws, controls, policies, contracts and the threat environment.

But it is not the only company on the list to talk about cybersecurity incident management. Cannon Cyber has developed a solution for speeding up security operations and readiness. The SOAR platform accomplishes this by focusing on intent-based remediation through an end-to-end security workflow orchestration which remediates incoming incidents automatically by deploying its playbooks.

Byos’ cybersecurity coup de grâce is to focus on the hardware as much as on the software. The company’s solution to businesses’ digital defence woes is two-fold. The first is the Byos BlackBox, a portable, low-power and technology-agnostic USB device. After plugging it into a computer, phone or tablet it will act as a plug-and-play gateway for the host device. The second part is the Byos enterprise management interface. The web-based console enables the people in charge of a company’s cybersecurity to track the security status of each device hooked into a BlackBox.

San Francisco-based i2Chain is focused on securing information and identity using blockchain and advanced cryptography. By leveraging these two elements, the Chain platform provides enterprises and users with secure and safe way to share information that is virtually tamperproof. Additionally, it states that it is compliant with the EU’s General Data Protection Regulation as it gives people more control of their information.

Encryption-solution provider Kapalya aims to protect businesses’ files when they are stationary and on the move across several different platforms. The Honolulu-based startup’s solution seamlessly encrypt files on end-points like computers and mobile devices as well as on corporate servers and public cloud providers. Kapalya’s solution is cloud, endpoint, tablet, smartphone and file server agnostic.

L7 Defense was founded in 2015. The Israel-based business’ latest product is named Ammune and is focused on protecting companies against AI-driven IoT botnet attacks as well as from previous generations of botnet technologies. Botnet attacks are a kind of hack that utilizes a series of computers to attack a network.

Based in Bethesda, Maryland, Neuralys is a startup focusing on simplifying the risk mitigation process by improving cybersecurity team collaborations with other business units. The enterprise, founded in 2016, does this by making the process more transparent whilst boosting the accountability and governance.

Founded by veterans from McAfee, PolyLogyx provides an endpoint security platform designed for businesses to outsource endpoint security. The platform is developed to seamlessly embed itself into any enterprise or security service without the need of setting up a new console. Instead, PolyLogyx utilizes an extensible server and agent-side API kit.

RedBerry is a microservice visibility, control and security provider. The platform creates a service mesh on top of microservice deployments to provide insightful mapping visibility into application data flow, real-time trouble-shooting capabilities and anomaly-based API security.

Secberus is the Miami-based developers behind a real-time cloud infrastructure security posture management and compliance platform. The platform is set up with a unified dashboard. By using it, companies can more easily asses how big their security risks are, report compliance in real-time and instantly create unlimited custom rules. Among other things, the software is also set up to empower enterprises’ DevSecOps teams with auto-generated remediation plans that improve risk posture. Risk posture refers to a company’s cybersecurity policies, controls and ability to mitigate risk.

SecurityAdvisor is set up to boost companies’ digital defences by providing them with invaluable insights. Describing itself as a security awareness and automation company, it aims to reduce the number of breaches, incidents and leaks by providing real time and personalized security awareness to end users.

ShieldX Networks was founded in 2015. The San Jose-based business is the creator behind a cloud-native solution that protects business through features like a firewall, IPSs and URL filtering.

Finally, Silicon Valley-based TriagingX offers a cybersecurity solution with an automated threat hunting playbook and the ability to proactively detect hidden and unknown threats. Moreover, its adaptive algorithms automatically start running fire-drill tests on other connected devices once a potential incident is first discovered.

Cybersecurity as a whole is attracting more and more investments. For instance, when RegTech Analyst looked into the money going into the sector, we found out that the proportion of cybersecurity investments has increased in the last five years. The percentage of cybersecurity investment jumped from 14.4 per cent in 2014 to 20.9 per cent in 2018.

Enjoyed the story? 

Subscribe to our weekly RegTech newsletter and get the latest industry news & research

Copyright © 2018 RegTech Analyst


The following investor(s) were tagged in this article.