top of page

Wed, Mar 24

|

Online Event

PITCH NIGHT - CyberTech|X Accelerator

Join us for Wave's next exciting PITCH NIGHT showcasing 15 startups in our CyberTech|X Accelerator. This inaugural cohort of Tampa Bay Wave's 2021 CyberTech|X Accelerator is made up of fifteen promising cybersecurity technology companies from across the US & the UK.

Registration is Closed
See other events
PITCH NIGHT - CyberTech|X Accelerator
PITCH NIGHT - CyberTech|X Accelerator

Time & Location

Mar 24, 2021, 6:00 PM EDT

Online Event

About the Event

This inaugural cohort of Tampa Bay Wave's 2021 CyberTech|X Accelerator is made up of fifteen promising cybersecurity technology companies from across the US and the UK.

Companies Pitching: Arcanum Technology

What they do: Arcanum Technology uses patented, knowledge-based authentication technology that allows users to create a four-character password that never has to be changed, regardless of a data breach.

Location: Athens, Georgia

Arch Access

What they do: Arch Access delivers cybersecurity and supply chain risk management within a marketplace of resources needed to achieve compliance.

Location: Pittsburgh

Castle One

What they do: Castle One offers a cybersecurity suite for startups that protects devices, emails and passwords for a monthly fee.

Location: Madison, Wisconsin

Cervais Inc.

What they do: Cervais Inc. develops products designed to provide endpoint protection to internet of things devices.

Location: Ashburn, Virginia

Elroi

What they do: Elroi provides consumers with data visualization and a centralized location to exercise their privacy rights and helps companies meet compliance requirements through a data ecosystem.

Location: Detroit

Everykey

What they do: Everykey is a universal smart key that wirelessly unlocks your phone, computer, tablet, door, car and more, and automatically logs you into your online accounts when you're nearby, then locks everything down when you walk away.

Location: Cleveland

Foretrace

What they do: Foretrace assesses the exposure of your infrastructure, third-party vendors and clients with the Foretrace platform, using the same tools and techniques as cyber adversaries.

Location: Woodbine, Maryland

Gridlock

What they do: Gridlock uses multiparty computations to secure cryptocurrencies and other high-value digital assets. It's professional asset management that keeps owners in full control.

Location: London

Hook Security Inc.

What they do: Hook Security trains people to recognize technology-based manipulation through the latest in psychological security training techniques.

Location: Greenville, South Carolina

Outpost Security

What they do: Outpost Security modernizes security alerting for Fortune 500 companies, reducing alert fatigue, freeing up time and resources, and enabling security defenses to mature rapidly to meet the dynamic challenges of the constantly evolving internal and external threat landscape.

Location: Madison, Wisconsin

Phylum Inc.

What they do: Phylum Inc is creating the next generation of software supply chain security products, providing fully automated risk analysis of software dependencies.

Location: Evergreen, Colorado

Refactr

What they do: Refactr is a low-code DevSecOps automation platform for everyone. Refactr's mission is to empower developers, security and operations to collaboratively operate at the speed of DevOps.

Location: Seattle

SmarterD

What they do: SmarterD automates building and managing a cybersecurity program through its next-gen cybersecurity program management and analytics platform.

Location: Santa Clara, California

Tauruseer

What they do: Tauruseer is the software cybersecurity assurance platform protecting software vendors, their reputation and market leadership from cyber attacks, operational disruptions, and delivery failures by preventing product compromises, insider threats, and unknown risks from infecting their customers—like seen in the SolarWinds supply chain breach.

Location: Jacksonville

Tenacious

What they do: Tenacious' CySkor technology gives employers a private, third-party solution they can provide as a benefit to their employees, thereby reducing corporate cyber risk and securing personal devices and other employee-owned endpoints in an ethical and legal manner.

Location: Tampa

Share This Event

I cannot attend but please add me to the newsletter

Thank you for joining our mailing list!

bottom of page