On June 11, the ten Security Finalist Innovations of the Blue Tulip Awards 2020 will give their final pitch to convince the jury why they should be crowned winner. From a deep fake detection technology to a supply chain security assurance platform, these Security Finalists will shape our futures.
Human history is based on narratives. Pandora Intelligence has invented a way to translate disparate data into narrative scenarios. Moreover, the company applies the latest data science techniques to combine historic datasets, with real-time information, into operational future scenarios. These future scenarios help (non)governmental organizations and commercial companies to mitigate threats and enhance opportunities.
ITsMine’s Beyond DLP™ - Data Loss Prevention solution enables organizations to proactively protect against internal and external threats, automatically. The product alerts and gives critical forensic information even after data exfiltration beyond companies' boundaries. ITsMine is easy to implement, meets regulatory requirements, is transparent to employees and IT teams and requires no endpoint agents.
BrainMatter facilitates digital intelligence at scale. The platform accelerates data enrichment and enables data governance for all your AI projects. BrainMatter has received funding from the Horizon 2020 Framework Programme of the European Union.
With the presence of deep fakes on social media, the question of what is real and what is fake arises. The lines will be blurred as to what the public can perceive as fake and real, which can incite the propagation of fake news by those with malicious intentions or malign someone's video\image. Our explainable AI powered solution help governments, organizations and individuals to automatically spot deep fake videos\images.
Dot by Awen Collective is for critical national infrastructure providers, advanced manufacturers and owners of building automation & control systems who want to reduce their risk of cyber-attacks. Their innovative solution uses safety-critical and security-by-design techniques to safely & securely perform asset and vulnerability discovery on Operational Technology (OT).
EgHash address the need to create an identity for every human being in order to achieve universal, financial, and societal inclusion. They do so by utilizing one or multiple (fused) biometric modalities and generate a unique hashed-tokenized identity that can only identify the subject using our probabilistic AI. Their technology works on and offline and can be overlaid on any existing identity authentication methodology.
Oddity has developed a machine and deep learning algorithm that is capable to detect violence real-time on live video feeds. They are integrated in widely used Video Management Systems (VMS) and send alerts to the operator when an anomaly is detected.
The Sovrin Network is an open source project operated by independent Stewards and uses the power of a distributed ledger to give every person, organization, and thing the ability to own and control their own permanent digital identity. The network was built to exchange verifiable credentials and restore the control, privacy, and safety of digital identity. Since the launch of the network, there are dozens of entities with SSI solutions and cases based on the Sovrin Network.
Research shows that over 60% of security breaches happen because of a third-party. Organizations must ensure that suppliers who work with their data, networks and systems are complying with their security policies. Our platform is an easy to use, secure social network that enables organizations of all sizes to conduct security assurance across their entire supply chain in a highly efficient way, allowing clients to monitor and encourage security compliance beyond 3rd parties to 4th and 5th parties.
Cyber Threat centric software platform for cyber security service providers to pro-actively prevent cyber incidents at their SMB clients. Combined with a centralized remote management platform managing 1-to-many SMB clients.
Each of these Security Finalist innovations are undeniably shaping new boundaries, but only one can be crowned winner. Join us, digitally, on June 11 to find out which to find out who will become the Blue Tulip Awards 2020 winner.