SlideShare a Scribd company logo
Vertex Perspectives
Railway Cybersecurity
Cylus helps mainline and urban railway
companies avoid safety incidents and
service disruptions caused by cyber-attacks
Company Snapshot
TEAM INVESTORS HIGHLIGHTS
Founders • Founded in early 2017
• HQ: Tel-Aviv, Israel
• Series A
• Multiple recognitions
• Participated in Thales’ Cyber@StationF
cybersecurity program
• Strong ties in the rail ecosystem with
leading companies and associations
Amir Levintal, CEO
Former director of the cyber R&D
division of the Israel Defense
Force’s Elite Technological Unit. He
has over 20 years of experience in
managing cyber, hardware and
software R&D multi-disciplinary
projects and products.
Miki Shifman, VP R&D
With over 10 years of experience
in software engineering, research
and management, He is a veteran
leader in the development of
cybersecurity projects, receiving
high military honors for
extraordinary contributions to
national security.
Zohar Zisapel
Industry Challenges
The rail operational network is no longer isolated.
As railway systems grow more digital, and connected, they become
vulnerable to new cyber threats, which cannot be handled well by
existing security measures such as physical and electrical isolation.
In the past…
• Air gapped
• Isolated networks
• Electro-mechanical
In present day…
• Wireless connectivity
• Remote monitoring
• Computerized systems
Resulting in increasing cybersecurity threats due to…
• IT and IT convergence
• Digitized and wireless-based
• Combination of modern and legacy systems
• Design focused on safety, not security
Key Priorities of the Rail Industry:
• Safety
• Service Availability
• Passenger Safety
• Profitability
Solution Overview
CylusOneTM the first-to-market cybersecurity solution
that meets the specific needs of mainline and urban
rail systems –
CylusOne for Signaling - Protects trackside
signaling and control networks.
CylusOne for Rolling Stock - Secures onboard
operational and passenger comfort systems.
Providing optimal security and operational
safety with:
• Continuous threat detection
• Real-time visibility
• Effective response and forensics insights
Key advantages
• Rail specific
• No impact on safety
• Vendor agnostic
• Intuitive interface
• Straightforward deployment
CylusOne for Signaling
CylusOne for Rolling Stock
Solution Overview
Video link: http://www.youtube.com/watch?v=8feDjCX1rI0
Competitive Advantage
• First-to-market cybersecurity solution dedicated to rail’s
needs
• Patent-pending technology
• Deep expertise in both cyber and rail
• Strong partnerships with major rail integrators and operators
• Acknowledged by leading industry organizations
Railway Cybersecurity Market Worth USD 12.6B by 2027
Railway cybersecurity services market is estimated to grow at the
highest CAGR during the forecast period… As cyberattacks keep
evolving, the need for support and maintenance services keeps
increasing over the lifetime of the cybersecurity solutions. The
growing demand for safe and secure connected railway
infrastructure will propel the demand for cybersecurity services.
Exclusive Report by MarketsandMarkets™
“
”
Thanks for reading!
About Vertex Ventures
Vertex Ventures is a global network of operator-investors who manage portfolios
in the US, China, Israel, India and Southeast Asia. Vertex teams combine first-hand
experience in transformational technologies, on-the-ground knowledge in the
world’s major innovation centers and global context, connections and customers.
Contributors
Disclaimer
This presentation has been compiled for informational purposes only. It does not constitute a recommendation to any party. The presentation relies on data and insights from a wide range of sources including public and private companies, market research firms, government agencies and
industry professionals. We cite specific sources where information is public. The presentation is also informed by non-public information and insights. Information provided by third parties may not have been independently verified. Vertex Holdings believes such information to be reliable
and adequately comprehensive but does not represent that such information is in all respects accurate or complete. Vertex Holdings shall not be held liable for any information provided. Any information or opinions provided in this report are as of the date of the report and Vertex Holdings
is under no obligation to update the information or communicate that any updates have been made.
Please stay tuned and do let us know if you’d like to subscribe to future issues of Vertex Perspectives.
Vertex Perspectives: Cybersecurity Series
• Cybersecurity | Risk, Impact, Innovations
• Cybersecurity | Axonius: Asset Management Platform
• Cybersecurity | Cylus: Railway Cybersecurity
• Cybersecurity | Cymulate: Breach & Attack Simulation
• Cybersecurity | D-fend: Counter-Drone Solutions for Urban Environments
• Cybersecurity | Indegy: Industrial Cybersecurity
• Cybersecurity | Meta Networks: NaaS Software Defined Perimeter
• Cybersecurity | PerimeterX: Next Generation Bot Defense
• Cybersecurity | Very Good Security: SaaS Platform for Data Security

More Related Content

What's hot

DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factory
scoopnewsgroup
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
MarketingArrowECS_CZ
 
Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)
Kangaroot
 
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
TI Safe
 
Extending Security to EVERY Edge
Extending Security to EVERY EdgeExtending Security to EVERY Edge
Extending Security to EVERY Edge
itnewsafrica
 
Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT Operations
Splunk
 
Splunk-Presentation
Splunk-Presentation Splunk-Presentation
Splunk-Presentation
PrasadThorat23
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
Moti Sagey מוטי שגיא
 
DevOps or DevSecOps
DevOps or DevSecOpsDevOps or DevSecOps
DevOps or DevSecOps
Michelangelo van Dam
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
Kris Kimmerle
 
Splunk Enterprise Security
Splunk Enterprise SecuritySplunk Enterprise Security
Splunk Enterprise Security
Splunk
 
VMWARE CommsDay Melbourne Congress
VMWARE CommsDay Melbourne CongressVMWARE CommsDay Melbourne Congress
VMWARE CommsDay Melbourne Congress
GrahameLynch1
 
Secure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptxSecure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptx
Yitao Cen
 
DevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss BankingDevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss Banking
Aarno Aukia
 
Mavenir: Network Transformation for 5G Services
Mavenir: Network Transformation for 5G ServicesMavenir: Network Transformation for 5G Services
Mavenir: Network Transformation for 5G Services
Mavenir
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
Allen Baranov
 
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
kds850
 
Cloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdfCloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdf
Infosec Train
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
BATbern
 
Next Generation Network Automation
Next Generation Network AutomationNext Generation Network Automation
Next Generation Network Automation
Laurent Ciavaglia
 

What's hot (20)

DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factory
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 
Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)Elastic SIEM (Endpoint Security)
Elastic SIEM (Endpoint Security)
 
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
 
Extending Security to EVERY Edge
Extending Security to EVERY EdgeExtending Security to EVERY Edge
Extending Security to EVERY Edge
 
Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT Operations
 
Splunk-Presentation
Splunk-Presentation Splunk-Presentation
Splunk-Presentation
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
DevOps or DevSecOps
DevOps or DevSecOpsDevOps or DevSecOps
DevOps or DevSecOps
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Splunk Enterprise Security
Splunk Enterprise SecuritySplunk Enterprise Security
Splunk Enterprise Security
 
VMWARE CommsDay Melbourne Congress
VMWARE CommsDay Melbourne CongressVMWARE CommsDay Melbourne Congress
VMWARE CommsDay Melbourne Congress
 
Secure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptxSecure AWS with Fortinet Security Fabric.pptx
Secure AWS with Fortinet Security Fabric.pptx
 
DevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss BankingDevOps & DevSecOps in Swiss Banking
DevOps & DevSecOps in Swiss Banking
 
Mavenir: Network Transformation for 5G Services
Mavenir: Network Transformation for 5G ServicesMavenir: Network Transformation for 5G Services
Mavenir: Network Transformation for 5G Services
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
 
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
 
Cloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdfCloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdf
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 
Next Generation Network Automation
Next Generation Network AutomationNext Generation Network Automation
Next Generation Network Automation
 

Similar to Cybersecurity | Cylus: Railway Cybersecurity

Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
James Nesbitt
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platform
Vertex Holdings
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
ArianeSpano
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
ClubHack
 
Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015
Nagui Chalache
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdf
LolaHel
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain
 
ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WP
Greg Harms
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
James Nesbitt
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
CloudWALL Italia
 
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
BIS Research Inc.
 
Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview Presentation
Block Armour
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Cohesive Networks
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
Dale Butler
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE코리아
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
CompTIA UK
 
Public Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case StudiesPublic Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case Studies
Connected Futures
 
FASTRInfographic2017
FASTRInfographic2017FASTRInfographic2017
FASTRInfographic2017
Craig Hurst
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
Gerardo Pardo-Castellote
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
Gerardo Pardo-Castellote
 

Similar to Cybersecurity | Cylus: Railway Cybersecurity (20)

Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platform
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015Nile ICT Group Profile - Sept2015
Nile ICT Group Profile - Sept2015
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdf
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watch
 
ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WP
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
 
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
 
Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview Presentation
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Public Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case StudiesPublic Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case Studies
 
FASTRInfographic2017
FASTRInfographic2017FASTRInfographic2017
FASTRInfographic2017
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 

More from Vertex Holdings

Third-Generation Semiconductor: The Next Wave?
Third-Generation Semiconductor: The Next Wave?Third-Generation Semiconductor: The Next Wave?
Third-Generation Semiconductor: The Next Wave?
Vertex Holdings
 
E-mobility E-mobility | Part 5 - The future of EVs and AVs (English)
E-mobility  E-mobility | Part 5 - The future of EVs and AVs (English)E-mobility  E-mobility | Part 5 - The future of EVs and AVs (English)
E-mobility E-mobility | Part 5 - The future of EVs and AVs (English)
Vertex Holdings
 
E-mobility | Part 5 - The future of EVs and AVs (Japanese)
E-mobility | Part 5 - The future of EVs and AVs (Japanese)E-mobility | Part 5 - The future of EVs and AVs (Japanese)
E-mobility | Part 5 - The future of EVs and AVs (Japanese)
Vertex Holdings
 
E-mobility | Part 5 - The future of EVs and AVs (German)
E-mobility | Part 5 - The future of EVs and AVs (German)E-mobility | Part 5 - The future of EVs and AVs (German)
E-mobility | Part 5 - The future of EVs and AVs (German)
Vertex Holdings
 
E-mobility | Part 5 - The future of EVs and AVs (Chinese)
E-mobility | Part 5 - The future of EVs and AVs (Chinese)E-mobility | Part 5 - The future of EVs and AVs (Chinese)
E-mobility | Part 5 - The future of EVs and AVs (Chinese)
Vertex Holdings
 
E-mobility | Part 5 - The future of EVs and AVs (Korean)
E-mobility | Part 5 - The future of EVs and AVs (Korean)E-mobility | Part 5 - The future of EVs and AVs (Korean)
E-mobility | Part 5 - The future of EVs and AVs (Korean)
Vertex Holdings
 
E-mobility | Part 3 - Battery recycling & power electronics (German)
E-mobility | Part 3 - Battery recycling & power electronics (German)E-mobility | Part 3 - Battery recycling & power electronics (German)
E-mobility | Part 3 - Battery recycling & power electronics (German)
Vertex Holdings
 
E-mobility | Part 3 - Battery recycling & power electronics (Japanese)
E-mobility | Part 3 - Battery recycling & power electronics (Japanese)E-mobility | Part 3 - Battery recycling & power electronics (Japanese)
E-mobility | Part 3 - Battery recycling & power electronics (Japanese)
Vertex Holdings
 
E-mobility | Part 4 - EV charging and the next frontier (Korean)
E-mobility | Part 4 - EV charging and the next frontier (Korean)E-mobility | Part 4 - EV charging and the next frontier (Korean)
E-mobility | Part 4 - EV charging and the next frontier (Korean)
Vertex Holdings
 
E-mobility | Part 4 - EV charging and the next frontier (Japanese)
E-mobility | Part 4 - EV charging and the next frontier (Japanese)E-mobility | Part 4 - EV charging and the next frontier (Japanese)
E-mobility | Part 4 - EV charging and the next frontier (Japanese)
Vertex Holdings
 
E-mobility | Part 4 - EV charging and the next frontier (Chinese)
E-mobility | Part 4 - EV charging and the next frontier (Chinese)E-mobility | Part 4 - EV charging and the next frontier (Chinese)
E-mobility | Part 4 - EV charging and the next frontier (Chinese)
Vertex Holdings
 
E-mobility | Part 4 - EV charging and the next frontier (German)
E-mobility | Part 4 - EV charging and the next frontier (German)E-mobility | Part 4 - EV charging and the next frontier (German)
E-mobility | Part 4 - EV charging and the next frontier (German)
Vertex Holdings
 
E-mobility | Part 4 - EV charging and the next frontier (English)
E-mobility | Part 4 - EV charging and the next frontier (English)E-mobility | Part 4 - EV charging and the next frontier (English)
E-mobility | Part 4 - EV charging and the next frontier (English)
Vertex Holdings
 
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)
Vertex Holdings
 
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)
Vertex Holdings
 
E-mobility | Part 3 - Battery recycling & power electronics (English)
E-mobility | Part 3 - Battery recycling & power electronics (English)E-mobility | Part 3 - Battery recycling & power electronics (English)
E-mobility | Part 3 - Battery recycling & power electronics (English)
Vertex Holdings
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)
Vertex Holdings
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)
Vertex Holdings
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)
Vertex Holdings
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)
Vertex Holdings
 

More from Vertex Holdings (20)

Third-Generation Semiconductor: The Next Wave?
Third-Generation Semiconductor: The Next Wave?Third-Generation Semiconductor: The Next Wave?
Third-Generation Semiconductor: The Next Wave?
 
E-mobility E-mobility | Part 5 - The future of EVs and AVs (English)
E-mobility  E-mobility | Part 5 - The future of EVs and AVs (English)E-mobility  E-mobility | Part 5 - The future of EVs and AVs (English)
E-mobility E-mobility | Part 5 - The future of EVs and AVs (English)
 
E-mobility | Part 5 - The future of EVs and AVs (Japanese)
E-mobility | Part 5 - The future of EVs and AVs (Japanese)E-mobility | Part 5 - The future of EVs and AVs (Japanese)
E-mobility | Part 5 - The future of EVs and AVs (Japanese)
 
E-mobility | Part 5 - The future of EVs and AVs (German)
E-mobility | Part 5 - The future of EVs and AVs (German)E-mobility | Part 5 - The future of EVs and AVs (German)
E-mobility | Part 5 - The future of EVs and AVs (German)
 
E-mobility | Part 5 - The future of EVs and AVs (Chinese)
E-mobility | Part 5 - The future of EVs and AVs (Chinese)E-mobility | Part 5 - The future of EVs and AVs (Chinese)
E-mobility | Part 5 - The future of EVs and AVs (Chinese)
 
E-mobility | Part 5 - The future of EVs and AVs (Korean)
E-mobility | Part 5 - The future of EVs and AVs (Korean)E-mobility | Part 5 - The future of EVs and AVs (Korean)
E-mobility | Part 5 - The future of EVs and AVs (Korean)
 
E-mobility | Part 3 - Battery recycling & power electronics (German)
E-mobility | Part 3 - Battery recycling & power electronics (German)E-mobility | Part 3 - Battery recycling & power electronics (German)
E-mobility | Part 3 - Battery recycling & power electronics (German)
 
E-mobility | Part 3 - Battery recycling & power electronics (Japanese)
E-mobility | Part 3 - Battery recycling & power electronics (Japanese)E-mobility | Part 3 - Battery recycling & power electronics (Japanese)
E-mobility | Part 3 - Battery recycling & power electronics (Japanese)
 
E-mobility | Part 4 - EV charging and the next frontier (Korean)
E-mobility | Part 4 - EV charging and the next frontier (Korean)E-mobility | Part 4 - EV charging and the next frontier (Korean)
E-mobility | Part 4 - EV charging and the next frontier (Korean)
 
E-mobility | Part 4 - EV charging and the next frontier (Japanese)
E-mobility | Part 4 - EV charging and the next frontier (Japanese)E-mobility | Part 4 - EV charging and the next frontier (Japanese)
E-mobility | Part 4 - EV charging and the next frontier (Japanese)
 
E-mobility | Part 4 - EV charging and the next frontier (Chinese)
E-mobility | Part 4 - EV charging and the next frontier (Chinese)E-mobility | Part 4 - EV charging and the next frontier (Chinese)
E-mobility | Part 4 - EV charging and the next frontier (Chinese)
 
E-mobility | Part 4 - EV charging and the next frontier (German)
E-mobility | Part 4 - EV charging and the next frontier (German)E-mobility | Part 4 - EV charging and the next frontier (German)
E-mobility | Part 4 - EV charging and the next frontier (German)
 
E-mobility | Part 4 - EV charging and the next frontier (English)
E-mobility | Part 4 - EV charging and the next frontier (English)E-mobility | Part 4 - EV charging and the next frontier (English)
E-mobility | Part 4 - EV charging and the next frontier (English)
 
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)
 
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)
 
E-mobility | Part 3 - Battery recycling & power electronics (English)
E-mobility | Part 3 - Battery recycling & power electronics (English)E-mobility | Part 3 - Battery recycling & power electronics (English)
E-mobility | Part 3 - Battery recycling & power electronics (English)
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)
 
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)
 

Recently uploaded

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

Cybersecurity | Cylus: Railway Cybersecurity

  • 1. Vertex Perspectives Railway Cybersecurity Cylus helps mainline and urban railway companies avoid safety incidents and service disruptions caused by cyber-attacks
  • 2. Company Snapshot TEAM INVESTORS HIGHLIGHTS Founders • Founded in early 2017 • HQ: Tel-Aviv, Israel • Series A • Multiple recognitions • Participated in Thales’ Cyber@StationF cybersecurity program • Strong ties in the rail ecosystem with leading companies and associations Amir Levintal, CEO Former director of the cyber R&D division of the Israel Defense Force’s Elite Technological Unit. He has over 20 years of experience in managing cyber, hardware and software R&D multi-disciplinary projects and products. Miki Shifman, VP R&D With over 10 years of experience in software engineering, research and management, He is a veteran leader in the development of cybersecurity projects, receiving high military honors for extraordinary contributions to national security. Zohar Zisapel
  • 3. Industry Challenges The rail operational network is no longer isolated. As railway systems grow more digital, and connected, they become vulnerable to new cyber threats, which cannot be handled well by existing security measures such as physical and electrical isolation. In the past… • Air gapped • Isolated networks • Electro-mechanical In present day… • Wireless connectivity • Remote monitoring • Computerized systems Resulting in increasing cybersecurity threats due to… • IT and IT convergence • Digitized and wireless-based • Combination of modern and legacy systems • Design focused on safety, not security Key Priorities of the Rail Industry: • Safety • Service Availability • Passenger Safety • Profitability
  • 4. Solution Overview CylusOneTM the first-to-market cybersecurity solution that meets the specific needs of mainline and urban rail systems – CylusOne for Signaling - Protects trackside signaling and control networks. CylusOne for Rolling Stock - Secures onboard operational and passenger comfort systems. Providing optimal security and operational safety with: • Continuous threat detection • Real-time visibility • Effective response and forensics insights Key advantages • Rail specific • No impact on safety • Vendor agnostic • Intuitive interface • Straightforward deployment CylusOne for Signaling CylusOne for Rolling Stock
  • 5. Solution Overview Video link: http://www.youtube.com/watch?v=8feDjCX1rI0
  • 6. Competitive Advantage • First-to-market cybersecurity solution dedicated to rail’s needs • Patent-pending technology • Deep expertise in both cyber and rail • Strong partnerships with major rail integrators and operators • Acknowledged by leading industry organizations Railway Cybersecurity Market Worth USD 12.6B by 2027 Railway cybersecurity services market is estimated to grow at the highest CAGR during the forecast period… As cyberattacks keep evolving, the need for support and maintenance services keeps increasing over the lifetime of the cybersecurity solutions. The growing demand for safe and secure connected railway infrastructure will propel the demand for cybersecurity services. Exclusive Report by MarketsandMarkets™ “ ”
  • 7. Thanks for reading! About Vertex Ventures Vertex Ventures is a global network of operator-investors who manage portfolios in the US, China, Israel, India and Southeast Asia. Vertex teams combine first-hand experience in transformational technologies, on-the-ground knowledge in the world’s major innovation centers and global context, connections and customers. Contributors Disclaimer This presentation has been compiled for informational purposes only. It does not constitute a recommendation to any party. The presentation relies on data and insights from a wide range of sources including public and private companies, market research firms, government agencies and industry professionals. We cite specific sources where information is public. The presentation is also informed by non-public information and insights. Information provided by third parties may not have been independently verified. Vertex Holdings believes such information to be reliable and adequately comprehensive but does not represent that such information is in all respects accurate or complete. Vertex Holdings shall not be held liable for any information provided. Any information or opinions provided in this report are as of the date of the report and Vertex Holdings is under no obligation to update the information or communicate that any updates have been made. Please stay tuned and do let us know if you’d like to subscribe to future issues of Vertex Perspectives. Vertex Perspectives: Cybersecurity Series • Cybersecurity | Risk, Impact, Innovations • Cybersecurity | Axonius: Asset Management Platform • Cybersecurity | Cylus: Railway Cybersecurity • Cybersecurity | Cymulate: Breach & Attack Simulation • Cybersecurity | D-fend: Counter-Drone Solutions for Urban Environments • Cybersecurity | Indegy: Industrial Cybersecurity • Cybersecurity | Meta Networks: NaaS Software Defined Perimeter • Cybersecurity | PerimeterX: Next Generation Bot Defense • Cybersecurity | Very Good Security: SaaS Platform for Data Security