Sky’s the Limit 2020
Connect with our companies
Australia is rapidly building an innovative, globally competitive cyber security sector, capable of contributing to national economic growth and exporting scaled solutions internationally. Sky’s the Limit 2020 features ten innovative Australian cyber security companies with cutting edge, deep-tech solutions.
Airlock Digital is a software vendor that specialises in application whitelisting and endpoint hardening. The effectiveness of application whitelisting as a security control is well established. The ability to stop unknown binaries, libraries and scripts from executing in an environment is a very effective mechanism in preventing a wide range of attacks such as ransomware, right through to sophisticated nation state attacks and severely inhibits an attacker’s ability to move laterally, undetected across a network. Airlock Digital’s mandate from the outset has been to develop a solution dedicated to addressing the challenges of application whitelisting, utilising a well-defined, simple and repeatable process that can be managed by non-security personnel.
Chief Executive Officer
1300 996 905
Launched in Canberra in 2019, Castlepoint answers the question – what could you achieve if you knew what every document, email, database, and message in your environment was about? Castlepoint tells you this using AI, and it also tells you who is doing what to your data, what risk or value it has, what rules apply to it, and whether they are being met. Importantly, it does this invisibly to users, and with no complex system integration. Some of their clients have used Castlepoint to halve the cost of their data migrations, improve the accuracy of records sentencing by 75%, replace compliance systems that are not user-friendly, reduce the effort cost of FOIs by 98%, and identify hundreds of data spills in insecure systems (and help to remediate them).
CyAmast is an Australian cyber security technology company that specialises in network security solutions for IoT/OT and connected devices. CyAmast’s proprietary and patented turn-key software solution sits at the intersection of Software Defined Network and Machine Learning and helps organisations obtain unprecedented visibility and anomaly detection over their unmanaged devices.
Managing Director and Co-Founder
0447 695 420
Daltrey is a new force in identity defined security. Daltrey’s vision is to eliminate usernames, passwords, access cards and PIN numbers from the authentication conversation altogether. Their technology allows organisations to create and maintain a single biometric credential that can be used across all access points, both physical and logical. This gives business leaders the ability to manage who accesses what, when and where – securely and conveniently.
Kasada is an online traffic integrity solution that protects companies against the damaging, often underestimated effects of malicious automation across web, mobile and API channels. Using proprietary techniques, Kasada presents a myriad of obstacles to frustrate and disrupt the operating model of bot attacks, preventing hackers from using automation and challenging critical aspects of the attack process. This forces the attack to permanently cease, as its ROI inevitably collapses. Not only does Kasada neutralise the attack long-term, but also prevents the bot operator from quickly retooling or attacking other targets.
Laava is a cyber-security company revolutionising anticounterfeiting, mobile consumer engagement, document integrity and supply chain traceability. Laava has developed patented IP around Laava Smart Fingerprints®, addressing security flaws of QR codes with patented optical security. The randomly generated Laava fingerprint must be matched server side before any content is transmitted. It creates a trusted link between a physical item product or document and an immutable record. The Laava ecosystem is managed fully by Laava and is secure. Only Laava can generate Laava Smart Fingerprints, and only the Laava scanner can read them. Every scan is logged and checked against business rules.
Co-founder and Chief Executive Officer
0405 538 552
Retrospect Labs is a specialist information security company focused on helping companies improve their security posture and resilience through realistic exercises. Their team consists of former Australian Government incident responders and cyber security specialists who have been in the field responding to major incidents impacting some of Australia's most critical assets.
Managing Director and Chief Executive Officer
0417 065 888
Founded in 2004, RightCrowd (ASX:RCW) is a global provider of safety, security and compliance solutions that manages the access and presence of people. RightCrowd has offices in Seattle, New Jersey, Ghent, Hasselt, Santiago, Manila and the Gold Coast, Australia, with over 160 employees across a range of specialisations. RightCrowd has spent over 16 years working with the best of the best in the physical security industry. They have successfully optimised business functions in major global organisations – including Fortune 50 and ASX 10 companies and across many industry verticals.
DIRECTOR AND CO-FOUNDER
0412 179 893
Tikabu is a Sydney-based cyber security and cyber hygiene software company serving local and international businesses. Tikabu provides cyber hygiene solutions to safeguard and futureproof your business. The company’s Glue platform gives you high level and detailed visibility into the coverage and effectiveness of your technical security controls.
Founded in 2014, WorldStack is a specialist information security provider with a focus on open source intelligence solutions. Their team of analysts and engineers have extensive experience planning and conducting intelligence operations for private and public-sector clients in Australia and abroad. National security organisations rely on them to train their analysts in intelligence tradecraft. WorldStack’s open source intelligence solutions automate the collection and analysis of data from the surface deep and dark web to generate actionable intelligence at scale. Applications include background screening, data breach detection, security monitoring and fraud detection.