Government cyber accelerator announces 20 new scale ups
Written by Hannah McGrath
The government’s cyber security accelerator programme LORCA (London Office for Rapid Cybersecurity Advancement) has announced the 20 scale ups selected for its largest cohort yet.
This year’s cohort of cyber firms specialise in technologies ranging from AI and quantum to automated detection methods as well as zero-trust defence, biometrics, cryptography and supply chain risk.
Although the majority of businesses selected for the fourth year of the programme are British, there were also a number of international applications reflected in the final cohort, which includes firms from Israel, Spain, Switzerland, Denmark, Singapore and the US.
Delivered by Plexal, the innovation centre at Here East in London’s Queen Elizabeth Olympic Park, the year-long programme will support the 20 new companies to scale, secure investment, access new markets and participate in overseas trade missions.
LORCA takes does not take equity or IP in the scaleups, which will also receive technical and commercial support from the programme’s delivery partner Deloitte and engineering expertise from the Centre for Secure Information Technologies (CSIT) at Queen’s University Belfast.
LORCA said its ultimate aim is to grow the British cybersecurity industry and make the UK the safest place to be online.
Paul Branley, Director of Strategy, Innovation & Testing at Lloyds Banking Group, said: “Lloyds Banking Group partnered with the London Office for Rapid Cyber Security Advancement (LORCA) in June 2018 and have most recently been involved in the cohort 4 selection of cyber companies.
“Lloyds Banking Group continues to collaborate and partner with LORCA as we recognise that incremental change isn’t enough and we need a transformative approach to keep ahead of the threat. The cohort selection event allows us early access to cutting edge technologies and innovators, ultimately supporting our ambition to solve cybersecurity challenges.”
The full list of companies in the latest cohort is:
Acreto delivers a Security-as-a-Utility capability that protects distributed and mobile platforms. It can help protect any technology, operating on any type of network, from anywhere.
Anzen Technologies Systems
The company’s patented technology allows organisations to securely move highly sensitive or classified data from on-premises storage to the public cloud, while retaining their data sovereignty.
This cloud-based security platform can expand perimeter defence beyond the enterprise network, providing cloud-delivered protection for devices.
Contingent is an AI-powered enterprise platform that quickly reduces the burden of collecting, verifying and monitoring supply chain risk data.
Continuum Security helps companies build secure software by embedding security in the design of their systems.
Darkbeam’s non-invasive threat reconnaissance platform gives you digital risk insights in seconds.
This cyber company builds products that anticipate threatscape trends. Its proactive security suite helps individuals and organisations protect their valuable data.
Keyless is a deeptech cybersecurity company that’s building the world's first privacy-preserving biometric authentication and personal identity management platform which eliminates the need for businesses to centrally store and manage biometric data, passwords, and any other sensitive information without compromising on convenience or privacy.
The data security company equips organisations with the tools they need to secure and protect highly confidential documents and data.
The company’s solution autonomously monitors, detects and blocks API attacks to a very high level of accuracy, freeing security teams from managing endless configurations and rules.
The company’s award-winning technologies collect huge volumes of cyber risk data, which they analyse using machine learning and a highly skilled team to stop cyber risks before they happen.
Specialising in privileged access security, the company’s software allows customers to securely and cost-effectively manage all privileged access and automate complex business and IT processes.
Risk Ledger’s vendor risk management solution combines a secure social network with a risk management platform. This enables organisations to run a gold standard risk assurance programme against their vendors while making it easy for vendors to respond.
ShieldIOT enables integrators and service providers to secure large-scale critical IoT networks in settings such as smart cities, smart grid and transportation.
SureCert’s digital identity platform makes background checking for recruitment and ID verification quicker and more efficient. Like a credit check, it turns personal information into a score, making sure that sensitive personal information is kept securely.
Helping companies monitor and manage their cyber protection in real time, ThreatAware is a single pane of glass on every aspect of an organisation’s cybersecurity – including all hardware, software, cloud services and IT compliance standards.
The company provides application shielding solutions to clients around the world, from fintech to government to medtech, military, aerospace and beyond.
Variti specialises in malicious bot detection and associated shielding technologies, especially for the verticals most at risk such as ecommerce, media, entertainment and financial sectors. It protects websites, apps and APIs from fraud and attacks without affecting the end user.
VIVIDA combines storytelling and interactive virtual reality to develop the most impactful cybersecurity awareness and education. Its VR experiences are designed to change attitudes and behaviour, make cybersecurity play a bigger role in a company’s culture and reduce the risk factor.
Westgate Cyber Security
The company helps organisations darken their networks and prevent cyber attacks with invisible network access gates which only materialise when certain trust standards are met. Its technology makes connectivity within enterprises (and their supply chains) easier to arrange and safer to operate by ensuring connecting systems are completely invisible to third parties.