Selected for their outstanding performance and ability to support Collective's investment methodology, the companies below are eligible for exchange into one of Collective's funds. Learn more about Collective's different funds
AppOmni is the developer of a data security platform designed to assist companies in scanning, securing, and monitoring their SaaS applications. By utilizing advanced scanning technology, AppOmni's platform identifies cloud API data leaks and other security vulnerabilities, providing continuous oversight of SaaS applications. This enables businesses to recognize and prevent data exposures, effectively manage data leaks, and receive prompt alerts and insights, thereby reducing the time required for remediation.
Aura, a developer of digital security software, is designed to streamline security for all users. The platform offered by Aura manages and safeguards against the threats linked to personal information using progressive technology, thus allowing users to handle their cybersecurity requirements effortlessly and with optimal efficiency.
Auradine has developed a web infrastructure platform designed to provide a wide array of infrastructure spanning hardware, software, and artificial intelligence. The platform by Auradine is focused on creating innovative software, hardware, and cloud services to facilitate a scalable, sustainable, and secure infrastructure. This allows clients to leverage groundbreaking technologies and take advantage of disruptive infrastructure.
Automox has developed a cloud-based patch management platform that facilitates the automation of operating system configuration and upkeep. The platform provided by Automox delivers immediate visibility of system inventory, vulnerability status, and policy compliance, offering comprehensive control and active enforcement of system and software configurations. This empowers companies to have a real-time vulnerability status overview across the entire infrastructure from a single dashboard, thus enabling immediate responsive action.
Aviatrix, a creator of multi-cloud native networking software, is designed to provide secure and scalable connectivity to the cloud with ease. Aviatrix offers a secure cloud network, backbone, and edge for vital applications by establishing a simplified and consistent networking structure within and across cloud service providers. This empowers businesses to speed up innovation, reduce downtime, and take control of their IT costs.
BitSight is the creator of a cyber risk management platform designed to control exposure, performance, and risk for businesses and their third parties. BitSight's platform utilizes algorithms to generate daily security ratings, assisting organizations globally in managing third-party risk. This enables clients to make informed security risk and business decisions.
Cadre has developed an investment platform focused on data that aims to highlight lucrative real estate investment opportunities. Cadre's platform employs data science to minimize the time required for individual asset analysis and to spot trends and opportunities at the market level. It also helps investors diversify their portfolios, reduce risk, and access attractive long-term returns. Cadre is thus enabling investors to acquire real estate assets in a cost-effective, transparent, and efficient way.
Censys offers a data-driven security platform designed to deliver in-depth visibility into an organization's external attack surface. The platform compiles a comprehensive, relevant dataset that enhances visibility into potential vulnerabilities and provides a detailed overview of internet-exposed infrastructure. This empowers organizations to proactively address security risks, ultimately reducing the chances of data breaches and other cyber incidents.
Cequence Security offers a cybersecurity platform designed for the real-time detection and mitigation of sophisticated bot attacks. Their platform safeguards against account takeovers, unauthorized data access, fraudulent transactions, and the creation of fake accounts, enabling organizations to effectively counter threats targeting customer application assets.
Coalition, a cyber risk platform developer, is designed to handle network threats. The platform provided by the company includes cyber insurance products and information security tools such as threat and intelligence warnings, ransomware, denial of service protection, and patch and vulnerability alerts. These offerings empower companies to avert cyber-attacks and potential losses before they transpire.
Contrast Security has developed a security software platform that is specifically designed to safeguard applications from cyber-attacks. The platform operates non-stop across various development methodologies and technologies, ensuring protection throughout the software's lifecycle. This allows businesses to have a precise evaluation and uninterrupted security for their entire application portfolio.
Corelight is a cybersecurity company that provides network traffic analysis solutions to help organizations detect, investigate, and respond to cyber threats. Their platform leverages open-source Zeek (formerly Bro) technology to deliver high-fidelity insights and actionable data about network activity. Corelight aims to enhance security operations by offering scalable, efficient, and comprehensive network visibility for improved threat detection and response.
Cowbell offers cyber insurance products designed to deliver standalone, admitted, tailored, and easy-to-understand coverage. The company's platform has been at the forefront of cyber insurance, providing small and medium-sized enterprises with adaptive coverage that aligns with evolving risk exposures. By utilizing continuous underwriting, Cowbell assesses insurable threats and maps them to potential risks, employing both internal and external data sources. This approach enables risk managers to safeguard their organizations against cyber threats, addressing security vulnerabilities and minimizing potential losses.
Cybereason has developed a cybersecurity platform and endpoint detection system designed to safeguard businesses from sophisticated cyber threats. The platform is driven by an automated hunting engine that identifies behavioral patterns across all endpoints, highlighting malicious activities in a user-friendly interface. This allows enterprises to pinpoint the source and extent of cyberattacks with minimal manual intervention.
Cyberhaven operates a data detection and response platform designed to transform data protection and guard against IP theft and insider threats. The company's platform evaluates internal activities across the enterprise to identify risky behaviors and practices before they result in a breach. It offers comprehensive data tracing to prevent false negatives and false positives, while expediting incident response investigations, allowing clients to effectively safeguard their data.
Dragos is a developer of a cybersecurity platform aimed at safeguarding civilization by securing the world's essential infrastructure. Their platform offers crucial visibility into industrial control systems (ICS) and operational technology (OT) networks, allowing for the identification and mitigation of threats before they escalate into major incidents. This empowers industries to develop a resilient and adaptable security strategy.
Eagle Eye Networks is a developer of cloud-based video surveillance products intended to provide business intelligence. Their products facilitate secure recording, transmission storage, camera management, alerts, and mobile viewing through a cloud-managed platform. Eagle Eye Networks equips businesses with time-based data structures that are used for indexing, searching, retrieving, and analyzing live and archived video.
Enya, a developer of a decentralized infrastructure system, is working towards creating a world where everyone in the community can participate and reap the benefits from the growth of decentralized blockchain networks. The company's system is specialized in maintaining a sustainably incentivized ecosystem that is flat, accessible, understandable, and open. This unique system enables developers to enhance smart contracts with advanced algorithms.
Fortanix develops enterprise security software designed for handling encrypted data efficiently. Its software safeguards data both at rest and in transit, ensuring that keys and applications remain secure against external and internal threats. This protection is effective whether the software is deployed on-premise or across any cloud provider, thus enabling businesses to maintain their information's security and combat cybercrime effectively.
HackerOne has developed a bug bounty and vulnerability coordination platform, aimed at safeguarding consumer data, trust, and loyalty. The platform consolidates an organization's security vulnerability reports, encourages interaction between all stakeholders, and offers the capacity to reward any hacker with bounties. This enables clients to manage the vulnerability coordination process while benefiting from the support of the hacker community.
Halcyon operates a cybersecurity platform designed to protect enterprises from ransomware attacks. The platform integrates layered protection featuring pre-execution detection, behavioral modeling, and deception techniques. This approach allows Halcyon to provide resiliency, recovery, and isolation for compromised nodes, catering to both mid-market and enterprise clients.
Horizon3.ai develops a security automation platform that identifies and mitigates attack vectors before they can be exploited by attackers. The platform combines expertise from military cyber operators, AI specialists, and product engineers to offer continuous automated red teaming as a service. This service simulates breaches, extracts critical data, and provides both automated and supervised solutions, allowing organizations to protect their data, prioritize vulnerabilities, and effectively test security controls.
ID.me has developed an identity platform with the aim of enhancing the security of group affiliation verification. The platform designed by ID.me simplifies the processes of authentication, identity proofing, and federation of external identity and attributes providers via a single API. This allows individuals such as military personnel, students, first responders, teachers, and government employees to confirm their identity online using a single login, giving them the opportunity to access discounts across various networks.
Illumio, a developer of a cloud-based cybersecurity platform, offers protection for data and information against server breaches and threats. Utilizing adaptive segmentation technology, Illumio's platform is designed to thwart cyber threats by managing the lateral movement of unauthorized communications. This allows clients to safely and securely navigate the internet.
Incode, a developer of a comprehensive omnichannel identity platform, is designed to deliver a seamless customer experience with a consistent security level across various channels. The platform utilizes AI to provide secure biometric solutions for the banking, payment, and retail sectors. Customers can verify their identity using their face and state-issued ID via a web-based version or native apps. This allows organizations to authenticate and effortlessly onboard new customers.
Island is the developer of a corporate browser designed to provide a secure workflow environment. The platform provided by Island offers businesses total control, oversight, and governance over the final stages of their operations, enhancing enterprise performance. The company's services enable businesses to reduce their cyber exposure and establish a secure environment where work can progress smoothly.
JumpCloud has developed a directory-as-a-service platform designed to centralize and streamline identity management. The platform addresses key aspects of server management security, such as user management, administration activity monitoring, and configuration assessment. This enables IT teams and businesses to securely manage user identities and connect them to necessary resources, regardless of the provider, protocol, vendor, or location.
JupiterOne is a developer of security and compliance software that is designed to make security accessible and straightforward for all individuals and organizations. The platform provided by the company equips security operations teams with the tools necessary to expedite compliance and enhance overall posture, all through continuous data aggregation and relationship modeling across all assets. This allows businesses to visualize relationships in their digital environment, providing a clear understanding of their operations.
Kandji has developed a mobile device management platform designed to address security concerns and offer comprehensive control over a specific mobile device fleet. Kandji's platform includes alternatives for security, compliance, and reporting software for computers and a pre-built library of device controls that can be implemented with just a click. This allows users to design custom compliance policies using a collection of pre-existing templates.
Lacework is a developer of a comprehensive cloud security platform, designed to automate cloud security on a large scale, thereby enabling companies to innovate rapidly and securely. Lacework's platform simplifies various security aspects, including configuration assessment, behavior monitoring, anomaly and threat detection, and incident investigation. It offers continuous monitoring of all cloud components such as workloads, applications, processes, containers, machines, users, and accounts. This empowers security teams to safeguard data and workloads in the cloud while maintaining constant compliance.
Lookout, a developer of cloud-based security software, is designed to safeguard and tackle different phases of contemporary cyberattacks. The company's platform provides real-time threat visibility, user behavior monitoring, and data leak prevention features. This enables organizations to shield their critical data throughout its lifecycle within the cloud.
Material Security has developed a data-centric security software designed to safeguard an organization's users and data. The software employs common tools in innovative ways to identify and reduce risks in cloud office applications. It can be connected within minutes to evaluate risks, identify threats, automatically scrutinize incidents, and collectively mitigate with end-users through new integrations with identity providers. This enables Material Security's clients, which include international media entities, financial conglomerates, large tech firms, and specific public sector organizations, to ensure the safety of their confidential information.
Menlo Security is the creator of a cybersecurity software that aims to eradicate the hazard of malware from web and email. The company's unique software safeguards against threats and attacks that can evade numerous advanced security products. It accomplishes this by replicating content from a remote browser situated in the cloud onto the desktop, providing clients the ability to browse the internet safely and securely.
Merit operates an online platform designed to issue digital merits to individuals, verifying their achievements. The platform creates a trusted identity ecosystem where organizations can document truthful statements about people in digital formats. These digital objects are standardized to meet specific requirements, allowing verifiers to confirm that a recipient's credentials are accurate and current. Merit empowers clients by offering transparency, enabling them to make informed decisions and engage effectively with individuals.
Mosyle has developed a device management software that aims to simplify Apple device management. Their cloud-based software offers extensive monitoring, efficient license management, system reports, and alert notifications for the management of iPad, iPhone, Mac, and Apple TV devices. This allows tech teams to easily manage devices, facilitate technology adoption, and restructure workflows without any inconvenience.
Nozomi Networks, a developer of an online cybersecurity platform, is committed to offering real-time insights into network communications and configurations. The company's platform ensures enhanced operational visibility, sophisticated operational technology, and detection of threats to the Internet of Things across various deployments. This allows businesses to achieve cybersecurity, operational dependability, and seamless integration of information technology and operational technology.
Obsidian offers a cybersecurity platform aimed at tackling cyber threats in hybrid-cloud settings. The platform integrates data engineering, data science, and threat research to safeguard interconnected SaaS environments from breaches, identify threats, and manage incident responses without hindering productivity. This allows enterprises to achieve smart identity protection and seamless security.
Panther Labs has developed a platform for infrastructure security and compliance, which is designed to aid businesses in maintaining security and adherence to regulations. The platform leverages artificial intelligence and cloud-first cybersecurity monitoring, enabling security teams to detect and respond to breaches on a cloud scale. It assists organizations in identifying threats, misconfigurations, and suspicious activity across their corporate and security environments, thereby promoting enhanced security.
Persona, a developer of an identity verification system, is designed to provide protection and security against identity theft and fraud. The company's system features a full suite of automatic identity verification components with global coverage, which can be customized, themed, and branded to create uniquely tailored flows for any use case. This allows businesses to easily verify customer identities using a drop-in widget, thus reducing the verification time.
Pindrop designs and offers phone fraud detection and call center authentication technology aimed at imparting security, identity, and trust in each voice interaction. The technology designed by Pindrop is capable of identifying, localizing, and authenticating phone devices from the call audio. It can detect fraudulent calls and validate genuine callers using an extensive risk database. This empowers enterprise call centers and businesses to cut down on call time, enhance their customers' experience, and mitigate fraud losses.
PlexTrac operates a workflow management platform designed to enhance and centralize cybersecurity processes throughout their lifecycle. The platform consolidates data from various security tools, offering a single location to triage information, prioritize critical issues, and track remediation efforts. This enables organizations to streamline and automate workflows, allowing teams to operate more efficiently and concentrate on essential security tasks.
Prove offers an identity-verification software designed to guard against identity theft and social engineering threats from skilled attackers. Their software minimizes friction, boosts engagement, and combats fraud through immediate mobile authentication. This enables clients to improve customer experiences while reducing the risk of both friction and fraud.
Red Canary, a developer of cloud-based threat detection systems, is designed to enhance security and threat management. The company's systems provide telemetry data collection across both local machines and cloud instances, coupled with extensive behavioral analytics. This allows security teams to manage threats effectively, reducing response times, and significantly decreasing the risk per endpoint over time.
Resilience is a cyber risk firm dedicated to assisting medium-to-large scale enterprises in achieving cyber resilience. The company provides comprehensive cyber insurance, designed through advanced risk quantification models and assured with contract certainty. Resilience offers a proactive and vigilant threat and vulnerability analysis in real-time, prioritizing business-critical threats and diminishing false positives. The company also provides customized action plans based on the specific risk profile of the company, encompassing governance, compliance, user education, and security posture review. This enables companies to efficiently administer cyber policies and comprehend risk exposure across all markets.
Salt Security is the developer of a cybersecurity platform designed to secure APIs, which are integral to all modern applications. The company's unique tool, which is patented, utilizes AI and machine learning to automatically and continually identify and safeguard against threats. It comprehensively learns the intricate behavior and doesn't necessitate any configuration or customization to accurately identify and thwart attackers. This enables customers to avert the impending generation of API attacks.
SandboxAQ develops cutting-edge quantum and AI technologies aimed at improving data security and operational efficiency across diverse sectors. Their platform combines quantum sensors with artificial intelligence to deliver insights in navigation, medical devices, and imaging. This enables companies in life sciences, energy, and financial services to enhance operations and boost decision-making capabilities.
Second Front Systems develops a security and cloud hosting platform designed to enhance third-party application delivery and boost cloud adoption in public sector markets. Their software configures, secures, and deploys compliant applications, enabling companies to deliver software to global government clients. It facilitates government access to innovative, commercially proven SaaS applications for national security missions. Second Front Systems offers governments, companies, and individuals a fully managed, compliant production environment.
Securiti offers privacy management software designed to enhance data security, privacy, governance, and compliance within a unified platform. The company's software includes features such as a data subject request portal and workspace, automated data mapping, universal consent management, breach notifications, and integrated controls for data security, privacy, governance, and compliance. This enables businesses to utilize a centralized DataCommand Center for comprehensive visibility, control, and orchestration of data across public clouds, data clouds, private clouds, and SaaS environments.