Published Security invisible barcoding magnetic barcodes that can be embedded or hidden in products, and read through opaque materials By Adam Przybylski
Published Security IRI DarkShield IRI DarkShield is software for the classification, discovery, extraction, restructuring, audit, and de-identification of data in unstructured sources like documents, logs, images. By IRI Voracity
Published Security DataTracker Leveraging computer vision and machine learning technologies, MinerEye illuminates masses of "dark data" that exist in organizational data repositories and in the cloud. By Yaniv Avidan
Published Security Scylla Scylla is a real-time threat detection system. Scylla monitors real-time video streams to predict violent behavior and identify acts of violence. By Albert Stepanyan
Published Security Hardware "Fingerprints" A new technology from Georgia Tech is addressing one of the most significant threats to the security of cyberinfrastructure—that is, insider attacks by users with valid username/ ... By Georgia Institute of Technology
Published Security PixelPin PixelPin provides businesses a secure and personal authentication solution that works on every device. It uses pictures to replace passwords and PINS for a simple and easy login. By PixelPin
Published Security Data Security Solution Secure, easily-deployable, and holistic program that allows users to control personal data exposed to online service providers By Georgia Institute of Technology
Published Security Penetration Testing Platform We have created a platform that reduces overheads for managing & delivering penetration testing projects - by up to 40%; and provides cost-savings of up to 30% for every project. By Cyber Security Hub
Published Security Portable WiFi Security Service Gives business travellers confidence that they are protected from the latest cyber threats including loss of personal or corporate data, when using in-flight Internet services By Stephen Meredith
Published Security Mobile Device Security FireDroid enables organisations and end-users to retain control of corporate data across mobile devices byFireDroid enables organisations and end-users to retain control. By University of Auckland
Published Security Certificate Revocation Guard Certificate Revocation Guard ensures your connections are protected through certificate validation without changes in legacy infrastructure. By University of Auckland