With a focus on the development of novel solutions in the field of digital identification baimos technologies offer highly usable and secure systems for the management of access- and user-authentication.
Code Intelligence enables companies to strengthen the security and reliability of their software. At the foundation of its technology stack the startup utilizes fuzzing, a modern application security testing technology. Through fuzzing a large scale of attack vectors can be tested automatically through pseudo-random mutations of the input parameters, uncovering vulnerabilities as well as reliability issues efficiently and timely.
As useful as fuzzing is in uncovering bugs in software, setting it up and using it properly is time-consuming and requires highly qualified IT security experts. The goal of Code Intelligence is twofold: on the one hand to make security testing experts work more efficiently, and on the other hand to make the security testing process more usable and automated so that even developers without security expertise can implement modern standards.
deviceTRUST provides the central contextual platform for enterprises, enabling users to work with their digital workspace from any location, with any device, over any network and at any time, giving IT departments all the information and control they need to meet all security, compliance and regulatory requirements.
DRACOON is the market leader in the field of enterprise file sharing in German-speaking countries and is one of the fastest growing SaaS companies in Germany.
The highly secure, platform-independent software is available in cloud, hybrid and on-premises versions and has been described as a 'Leader' by independent top analysts such as ISG. Various certificates and seals such as ISO 27001, EuroPriSe and ULD certify that DRACOON meets the highest security standards. The universal API offers a wide range of applications from data exchange and workflow integrations to secure e-mail communication and the complete modernisation of file services.
Graylog provides service and support for the open source Graylog solution which stores, searches, and analyzes machine data collected from IT infrastructures and applications. The company enables organizations, at a fraction of the cost, to improve IT operations efficiency, security, and reduce the cost of IT. Graylog has received funding from the Mercury Fund and is based in Houston, Texas. For more information visit: www.graylog.com
Hanko.io enables the switch to secure and completely passwordless multifactor authentication. The company is a member of the international FIDO Alliance and the first European provider of a certified FIDO solution. With the FIDO Developer API Hanko addresses especially software developers in companies. The customers include international software and cloud providers, the public sector and companies from the financial and healthcare sectors.
Hornetsecurity is premium provider of cloud-based security services. Hornetsecurity products protect companies’ IT infrastructure and data.
ondeso develops software specifically in the fields industry 4.0 and digitalisation. No matter whether the client is a production company or a machine manufacturer, a medium sized business or a corporate group – ondeso supports them specifically in the field of IT operating management and security in production. The successfully launched products are suited for all industries and applicable across the entire range of production systems and procedures. Whether management systems, HMIs or controls – ondeso manages the lifecycle of industry PCs and offers custom fitted products on the highest technological and conceptual level - 100% made in Germany
SciEngines offers massively parallel FPGA based Computers as a platform technology for Software vendors to accelerate their existing algorithms and software. Besides that SciEngines offers consulting services and services in porting third party software to their machines.
VMRay’s monitoring and analysis technology utilizes advanced hardware-virtualization for the analysis of malware, such as regular viruses, worms, trojans, spyware, but also complex and sophisticated kernel rootkits and bootkits.