We are CTA Cybersecurity
New York City and Silicon Valley are two of the largest technology hubs in the United States (U.S.) As cyber threats create a strong demand for more service providers, technology experts in major private sector companies are now investing to fill the demand. This presents opportunities for Canadian companies looking to enter this thriving market. The Canadian Technology Accelerator (CTA) global business development program can give you the knowledge and connections you need to enter and succeed in this market.
TrojAI is developing solutions to protect artificial intelligence platforms from adversarial attacks on training data and AI models, such as data poisoning and model evasion attacks. Focused on computer vision platforms, the data transformation and model monitoring techniques developed by TrojAI not only aid in the defence against such attacks, but can provide incremental improvements in model accuracy and performance.
PrivateAI provides innovative solutions that enable identification, redaction, and pseudonymization of PII/PHI from unstructured data (text, image, audio) using AI models. These may be implemented anywhere within your software pipeline, without ever sharing your data with a third party (not even us). PrivateAI achieves 99% accuracy across more than 50 entity types.
Founded in 2017 by serial entrepreneur Martin Berthiaume, MONDATA’s mission is to make cybersecurity accessible to organizations of all sizes as well as educate and raise user awareness on the proper security behaviors to adopt. MONDATA offers cybersecurity and cloud computing products and services that employ automation and artificial intelligence. Our SaaS platform, MD.ECO, provides organizations with a secured IT ecosystem that simplifies and accelerates their digital transformation and minimizes their cybersecurity risks.
The Distributed Compute Protocol (DCP) is a web-based edge computing framework that is seeing rapid adoption across a number of academic and commercial sectors. Since DCP is built on web standards, it seamlessly interoperates with existing containerization and VM frameworks, but can also function entirely within web browsers without requiring any software installation or even administrator privileges, providing a near-zero footprint and instant setup time. DCP allows institutions to create and administer their own secure on-premises edge computing networks, a computing solution that is 75-95% less expensive than commercial cloud.
Global Intelligence Inc. is a cyber intelligence SaaS company. We currently offer two solutions, CyberCheck and Checkmate, that perform open-source intelligence gathering throughout the surface, deep and dark web. Using proprietary machine learning and AI, we are able to surface relevant intelligence. CyberCheck is used by law enforcement agencies to help uncover actionable intelligence for hard to solve cases. Checkmate is used for risk mitigation, whether that is a security operation centers utilizing it to detected leaked data within minutes or a financial institution using it during their due diligence process. Our search capability allows you to enter as little as a single keyword without compromising the amount of relevant data returned.
More than ever before, developers need certainty in deploying apps. Yet, the traditional approach – to design, develop and maintain secure environments – is prohibitively complex to execute and even more challenging to scale globally.
To unlock efficiency in advanced environments, Crypto4A has developed novel hardware-based security product called QxEDGE™. This quantum-ready HSM as a Platform is the product of founders who were instrumental in securing the foundations of the internet, and accelerates secure digital transformation in the next normal: protecting the digital keys and applications that keep our digital economy safe.
The Byos Secure Endpoint Edge solution extends zero trust to every remote network connection, while isolating devices from unknown networks and foreign devices. It provides: Protection to exposed endpoints micro-segmentation; Secure remote management for more efficient monitoring, updating, patching and troubleshooting; Plug-and-play implementation, working with any TCP/IP device, regardless of age; Zero touch deployment, not requiring changes to local network configurations and automatic security policy enrollment; and Cloud managed through a centralized control plane for quick (de)provisioning, policy enforcement and threat management.