We’re proud to have had such quality startups through the CyRise accelerator program. Here are their stories.

Cohort 1

Aiculus brings modern day security features to the API layer using machine learning. In the emerging world of open banking in Australia and Europe, Aiculus increases the visibility of API transactions, coupled with reputation assessment, to allow companies to manage their API transactions securely, in real-time.

The platform for computer network defence. Cydarm enables cybersecurity operations teams to perform at their best. Using a secure case management system, with SOAR and best practice in cybersecurity built in, CYDARM provides support for the workflows of distributed, cross-functional teams.

Protects sensitive company data from loss of ownership and control. NetCrypt offers secure file synchronisation and cloud file sharing. Company data is encrypted on the server, in transit and on the endpoint without compromising on security or changing the way users work.

More than cyber security recruiting. Good Cyber Security is hard. Great Cyber Security is about great people. But it's not easy finding the right mix of skills, experience and the right cultural fit, an observation based on experience in international cyber security best-practice, initiatives and operations.

Cohort 2

Cyber fitness for digital business. Cynch partners with business owners, continuously profiling their cyber risks and providing them with everything they need to build their Cyber Fitness.

Modern workflow without modern risk. Dekko is a flexible and secure workflow platform for critical and confidential documents, providing a secure cloud-based environment where people can communicate, collaborate, share and sign-off on confidential documents.

Detexian assures your SaaS data is safe. Detexian uplifts organizations' capabilities to continuously secure SaaS and comply with changing regulations, monitoring it all from the one dashboard.

Utilising an advanced quantum-safe cryptographic file system, combined with real-time anomaly detection based on machine learning, Scram goes beyond conventional encryption systems to provide a full gamut of safeguards with its turnkey design.

SecureStack lets your company build secure infrastructure in the multi-cloud or datacenter and manage the ongoing lifecycle maintenance, compliance and security of that disparate IT infrastructure from one place and one solution.

Protect your organisation from information theft by malicious WiFi networks. HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

Cohort 3

See Cohort 3 in the June 2020 Virtual Demo Day.

Protecting AI from bad data. Badook helps protect artificial intelligence and machine learning models from their greatest weakness: bad data. Badook allows data scientists to automate data validation tasks as tests, preventing models from being trained on corrupted, biased or tampered data.

Human-centric device management. Devicie ensures that each and every device that is used to login to your organisation is managed, secured and has everything staff need to produce their best work, regardless of where they are in the world, getting end-points running and compliant in 30 minutes.

Getting you ready for when an incident occurs. The Retrospect Labs platform allows organisations to continuously design, deliver, and evaluate exercises that test their incident response capabilities against a variety of different incident types and scenarios, allowing organisations to minimise the potential impact and costs of an incident when it occurs.

Bringing science to cyber storytelling. Avertro is an executive and board cyber platform that helps decision-makers scientifically right-size their cyber spend and scale their capabilities in line with their risk and threat exposure. Avertro takes a scientific approach, based on mathematical models to analyse and produce insights that were previously only determined using human intuition, subjectivity, and experience.

Security architecture simplified. Archimigo is the security architect's friend, providing a security architecture and compliance solution which simplifies and automates security architecture. With Archimigo onerous and time-consuming tasks can be completed more efficiently and effectively, allowing information security professionals to do more with less.

Simplifying vulnerability management. Strobes is a risk-based, vulnerability management platform that allows enterprises to dramatically improve their efficiency and effectiveness. Strobes uses the input from a huge range of open source and commercial scanners to automatically de-dupe and prioritize vulnerabilities based on threat intelligence and business context.

image description