Solution providers

Salvador Technologies

Security
Salvador Technologies provides breakthrough technological solutions for operational continuity and cyber-attack recovery for ICS & OT, ensuring an easy validation of the backup integrity with an instant restoration test. The patented air-gap technology enables a full 30-second recovery from any scenario.  The company’s expertise is based on more than ten years of experience in the National Cyber Unit and elite intelligence corps of the IDF and on the passion for contributing to the global cyber security agenda.

Cyera

Security
Cyera is the data security company that gives businesses deep context on their data, applying proper, continuous controls to assure cyber-resilience and compliance. Cyera takes a data-centric approach to security across your data landscape, empowering security teams to know where their data is, what exposes it to risk, and take immediate action to remediate exposures. Backed by leading investors, including Sequoia, Accel, Cyberstarts and Redpoint Ventures, Cyera is redefining how companies secure data in the cloud. To learn more, visit www.cyera.io.

Pryon

AI
Pryon is the leading AI-as-a-Service platform for enterprise knowledge management, leveraging purpose built computer vision (CV), generative, and large language models (LLMs). We close intelligence gaps to boost employee productivity and enhance customer experiences, while meeting the exacting privacy and security expectations.

CyberMaxx

Security
CyberMaxx, Inc., founded in 2002, is a tech-enabled cybersecurity service provider headquartered in NYC. Through a comprehensive set of services CyberMaxx empowers customers to Assess, Monitor, and Manage cyber risk and stay ahead of emerging threats. CyberMaxx expanded its capabilities through the 2022 acquisition of CipherTechs, an international cybersecurity company providing a complete cybersecurity portfolio across MDR Services, Offensive Security, Governance, Risk & Compliance, DFIR, and 3rd party security product sourcing. 

Precisely

Data
Precisely is the global leader in data integrity, providing accuracy, consistency, and context in data for 12,000 customers in more than 100 countries, including 99 of the Fortune 100. Precisely’s data integration, data quality, data governance, location intelligence, and data enrichment products power better business decisions to create better outcomes. Learn more at www.precisely.com.

HollandParker

Data
HollandParker is a Corporate Performance Management (CPM) consulting firm that specializes in OneStream Software implementation solutions for Fortune 500 corporations and global companies of all sizes. With over 200 OneStream solutions implemented, our experiences and proven methodologies enable us to tackle the most challenging OneStream projects globally. HollandParker believes in providing end-to-end services to our clients, starting with strategic services to post go live support. Our service doesn’t end when our projects do, we believe in lasting partnerships with our clients.

Prophecy

Data
Prophecy.io is the only low-code data engineering platform. Prophecy democratizes the development and deployment of high-quality data pipelines, uniquely combining visual development with agile software engineering best practices. The developed code is open source and is targeted at Apache Spark & Apache Airflow. Prophecy is headquartered in Silicon Valley.

BlackFog

Security
BlackFog is a global cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect companies from global security threats such as ransomware, spyware, malware, phishing, unauthorized data collection and profiling. Its software monitors enterprise compliance with global privacy regulations and prevents cyberattacks across all endpoints. BlackFog uses behavioral analysis to pre-emptively prevent hackers from exploiting vulnerabilities in enterprise security systems and network infrastructure.  BlackFog’s preventative approach to security recognizes the limitations of existing perimeter defense techniques and neutralizes attacks before they happen at multiple points in their lifecycle. Trusted by corporations all over the world BlackFog is redefining modern cybersecurity practices.

CRUX

Data
Crux is an external data automation platform focused on the integration, transformation, and observability of third-party data. Companies use Crux for the delivery and operations bridging the data engineering gap between data suppliers and data consumers. Crux's state-of-the-art platform automates the development of data pipelines, ongoing validation of data quality, and management of operations between suppliers, consumers, and cloud platforms at scale. Backed by state of the art tech and a team of seasoned data engineers, the sky Is the limit when It comes to accelerating your external data Integration workflows.

Dremio

Data
Dremio is The Easy and Open Data Lakehouse, providing self-service analytics with data warehouse functionality and data lake flexibility across all of your data. Hundreds of organizations, including 3 of the Fortune 5, use Dremio to deliver mission-critical BI on the data lake. As the original creator of Apache Arrow, Dremio is on a mission to reinvent SQL for data lakes and meet customers where they are in their cloud journey. Dremio was founded in 2015 and is headquartered in Santa Clara, CA. Investors include Lightspeed Venture Partners, Redpoint, Norwest Venture Partners, Insight Partners and Sapphire Ventures. Connect with Dremio on GitHub, LinkedIn, Twitter, and Facebook.

Cresta

AI
Cresta centralizes and amplifies the knowledge, insights, and coaching the contact center needs to reach peak performance. Cresta turns real-time insights into real-time actions that make the contact center smarter and drive business results. Customers choose Cresta for a uniquely comprehensive generative AI solution, industry-leading real-time coaching and insights, custom-tailored AI solutions, and an extensible and flexible omni-channel platform.  Customers using Cresta have seen sales increase by 10%, ramp time reduce by 2x, CSAT improve by 20%, and agents save 5 hours in repetitive tasks every week. CarMax, Blue Nile, Earthlink, Holiday Inn Club Vacations, Porsche, and Intuit are among the leading companies using Cresta to improve the productivity of their contact center operations and drive strong business results.

Hadrian

Security
Hadrian is a leading provider of External Attack Surface Management (EASM), Continuous Automated Red Teaming (CART), and Continuous Threat Exposure Management (CTEM) solutions. Our platform catalogs known and unknown assets wherever they are, investigates vulnerabilities by identifying exploits like a threat actor, and prioritizes risks for fast remediation based on your unique environment. 

Zoho Analytics

Emerging Technologies
With 55+ apps in nearly every major business category, Zoho Corporation is one of the world's most prolific technology companies. Zoho Analytics is a modern BI and analytics app, and forms part of the Zoho suite of products. It helps business users analyze their data through visualizations, and discover hidden insights.

MessageBird

Infrastructure Management
MessageBird’s mission is to create a world where communicating with a business is as easy as talking with a friend. We power communication between businesses and their customers — across any channel, always with the right context, and on every corner of the planet.

TrustArc

Security
TrustArc offers a comprehensive privacy platform with contextual privacy insights and automated phases of privacy program management. Built on a foundation of embedded privacy expertise and integrated frameworks, the platform includes knowledge modules for identifying and prioritizing evolving regulatory requirements, including privacy research and alerts, law comparisons, legal summaries, and operational templates. Operations modules include building data inventories, mapping data flows, and managing individual consent, preferences and privacy rights. TrustArc also offers intelligence modules for managing third-party risk, company privacy risk, applicability of privacy requirements, data transfers, assessments, compliance reporting and compliance verification.