Strategic consulting and
advisory


Data intelligence services, led by a Team of Multilingual Partners and Consultants with INSEAD / WHARTON / MIT MBAs

Our Technology Partners

We work with a wide range of leading vendors and technology solution providers in their fields.


IBM

For more than 100 years, IBM has been embedded in the evolution of business, society, and the technologies that power it—enabling clients to transform themselves, era after era...


Security Scorecard

Understand and reduce risk with the world’s most expansive and scalable security rating platform...


Panaseer

Panaseer is the leading Continuous Controls Monitoring (CCM) platform for cybersecurity that empowers your organization to effectively tackle fundamental cybersecurity challenges...


Ignition Technology

Ignition Technology specializes in the discovery and adoption of innovative, market-leading, next-generation IT security, and networking solutions


CKM Analytix

CKM Analytix is a leading operations intelligence provider leveraging AI and data science extensively.


Cylance

Cylance uses artificial intelligence to deliver prevention-first, predictive security products and specialized security services that change how organizations approach endpoint security...


3GRC

Simplify, automate and centralize your risk and compliance program with the 3GRC Cloud-based risk & Compliance Management Platform to gain an accurate representation of potential risks...


DRD Partnership

DRD Partnership is a strategic communications consultancy focused on building value for its clients and protecting their reputations at moments of challenge and of change...


RiskIQ

RiskIQ empowers CISOs to continuously visualize and defend their ever-changing attack surface, proactively protecting your company, brand, people, and data.


Balbix

Balbix is a converged platform to harness the power of AI for cybersecurity program transformation to provide a real-time view on a cybersecurity posture with insights on how to reduce breach risks...


Cloudistics Lenovo

Cloudistics offers customers an agile on-premises hybrid cloud platform that allows them to reimagine datacenters and create and consume IT applications in a predictable manner...


Okta

Okta provides cloud software that helps companies manage and secure user authentication into modern applications, and for developers to build identity controls into applications


SailPoint

SailPoint is a leader in cloud identity governance, making it possible to see and control user access to all your applications and data — in the cloud and on-premises...


Duo

Secure access to your applications and data, no matter where your users are - on any device - from anywhere, for organizations of all sizes, ensuring trusted access to sensitive data...


Beyond Trust

BeyondTrust's unified solutions offer a broad set of privileged access management capabilities with a flexible design that enhances user productivity and maximizes return on security investments...


Deep Instinct

Deep Instinct applies Deep Learning to develop Cybersecurity Software for Zero Time Prevention, offering a multi-layered protection platform against cyber threats


Cympire

Cympire creates a safer world through education and Innovation.


Red Button

Red Button helps banks, financial organizations, gaming companies, and high-risk organizations prevent and mitigate DDoS attacks.


Kaspersky

Kasperksy is a global cybersecurity company with deep Threat intelligence and security expertise.


Cybereason

The Cybereason Defense Platform delivers a complete and integrated endpoint security solution. It combines prevention with endpoint detection and response (EDR), along with threat hunting.


DarkTrace

DarkTrace has pioneered the application of AI to address the challenge of cybersecurity, leveraging unsupervised machine learning to identify a diverse range of threats at their earliest stages


Bitglass

A Cloud Access Security Broker (CASB) is a policy enforcement point that delivers data and threat protection in the cloud, on any device, anywhere...


Jask

JASK is automating the manual work for the security analyst, saving them time and enabling them to be more effective by focusing on higher-value security functions...


Illusive Networks

Illusive ensnares attackers in an inescapable maze of deceptions. Their first inevitable misstep leads to early and accurate detection...


Cato Networks

The Cato Cloud is a converged platform to connect, secure and manage your network. You can gradually deploy Cato across branches, cloud resources, and users to replace/augment legacy network services


Digital Guardian

Welcome to the convergence of data loss prevention and endpoint detection and response delivered in the cloud.


Blockchain Intelligence Group

Blockchain Intelligence Group specializes in digital assets and cryptocurrencies forensic investigation and risk mitigation for regulators, law enforcement, and financial services


ConsenSys

As a leader of the blockchain space, ConsenSys helps developers build next-generation networks and enable enterprises to launch more powerful financial infrastructure.


CipherTrace

CipherTrace curates the world’s most comprehensive database of cryptocurrency exchanges and their operational status providing a unique lens into this high-risk blindspot.


Securosys

Securosys is the leading provider of HSM solutions and an expert in high-security technology, including institutional-grade Blockchain HSM for safeguarding digital assets and cryptocurrencies.


Veracode

Veracode gives you the ability to scan your code, right in your favorite IDE or CI system, while you are coding. You’ll receive instant insight into any security flaws that are discovered...


CheckMarx

Taking a holistic, platform-centric approach, the Software Exposure Platform builds security in from the start of the SDLC, continuously supporting all stages of the DevOps cycle.


FortySeven

FortySeven provides a high standard of software development services for its global clients spanning a wide range of industries...


8Allocate

8allocate is a global provider of full-cycle custom software development and staff augmentation services to companies all over the globe, from North America to Israel to Australia.


Bittium

Bittium sets a new Standard for Ultra Secure Mobile Communications with a full set of services for secure communications, data transfer, and device management


SHL

SHL brings powerful and transparent AI technology, data science, and objectivity to help companies attract, develop, and grow the workforce they need to succeed in the digital era.


Galaxkey

Galaxkey provides an integrated platform for secure emails, secure documents, and secure file sharing with identity verification all managed through one central administration console.


Spycloud

SpyCloud is the leading provider of Account Take Over prevention, offering the most advanced platform that gives enterprises actionable data to protect employees, customers and empower investigators.