The nine companies chosen to join the nine-month GCHQ Cyber Accelerator have outlined their ideas for security products and services that will enhance the UK’s cyber defences to representatives at the National Cyber Security Centre (NCSC) HQ.
Some of the innovations presented at the NCSC included a cloud service solution to connect Internet of Things devices with end-to-end authenticated, encrypted security, and a proposal to disrupt cyber crime by detecting and investigating illicit crypto-currency transactions.
Part of the UK Government’s £1.9bn National Cyber Security Strategy, the Accelerator drives innovation in the cyber security sector by giving selected start-ups and entrepreneurs access to the world-class personnel and technological expertise at the NCSC and GCHQ, as well as the Telefónica global business network.
The companies selected to join the programme include:
Cybershield detects phishing and spear phishing, and alerts employees before they mistakenly act on deceptive emails
Elliptic detects and investigates cybercrime involving crypto-currencies, enabling the company to identify illicit blockchain activity and provide intelligence to financial institutions and law enforcement agencies
ExactTrak supplies embedded technology that protects data and devices, giving the user visibility and control even when the devices are turned off
Intruder provides a proactive security monitoring platform for internet-facing systems and businesses, detecting system weaknesses before hackers do
Ioetec provides a plug-and-play cloud service solution to connect Internet of Things devices with end-to-end authenticated, encrypted security
RazorSecure provides advanced intrusion and anomaly detection for aviation, rail and automotive sectors
Secure Code Warrior has built a hands-on, gamified Software-as-a-Service (SaaS) learning platform to help developers write secure code
Trust Elevate solves the problem of age verification and parental consent for young adults and children in online transactions
Warden helps businesses protect their users from hacks in real time by monitoring for suspicious activity.
Recent Stories