Cog Systems

Cog Systems

Cog has been preparing for the revolution in connected device architecture since 2014.  The traditional architecture of IoT and other connected devices has created innumerable opportunities for bad actors to compromise the device, thereby forcing security policy to accept higher risk and restricted access, which in turn poses a burden on users. We have adopted an embedded solution built on modularity, proactive security, trustworthiness, and adaptability to enable highly secure connected devices.

This approach pro-actively secures these devices by reducing the attack surface and increases reliability by eliminating single points of failure.  Cog focuses on securing the kernel, data, and network as the baseline to our security.  Additionally, we can isolate specific applications, operating systems, or services to further achieve a full defense in depth based solution.

Contact Information

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ANS Group

ANS Group

ANS specialise in providing Hybrid and Managed Cloud Services, including Managed Workspace, Infrastructure and Protection Services.

Cyber Security & Information Systems Information Analysis Center (CSIAC)

Cyber Security & Information Systems Information Analysis Center (CSIAC)

CSIAC is chartered to leverage best practices and expertise from government, industry, and academia on cyber security and information technology.

Center for Identity - University of Texas at Austin

Center for Identity - University of Texas at Austin

The mission of the Center is to deliver the highest-quality discoveries, applications, education, and outreach for excellence in identity management, privacy, and security.

Cydome Security

Cydome Security

Cydome offer solutions to protect your sensitive data even when it leaves the organization perimeter.

Sepio Systems

Sepio Systems

Sepio is a leader in the Rogue Device Mitigation (RDM) market, and the developer of Sepio Prime - a SaaS solution for protecting organizations from hardware based attacks and threats.

NetMonastery DNIF

NetMonastery DNIF

NetMonastery is a network security company which assists enterprises in securing their network and applications by detecting threats in real time.

Point3 Security

Point3 Security

Point3 have developed Escalate, a gamified, proven, challenge-based ecosystem for cybersecurity mentoring and training.

Secudrive

Secudrive

Secudrive provide solutions to protect your confidential corporate data from both internal and external threats throughout the data life cycle, from creation to deletion.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

Xage Security

Xage Security

Xage is the world’s first blockchain-protected security platform for Industrial IoT.

Cyber Observer

Cyber Observer

Cyber Observer’s team specializes in providing corporate officers with comprehensive, visual, real-time performance overview, critical security control (CSC) analysis.

OwnZap Infosec

OwnZap Infosec

OwnZap Infosec aims to digitally shield the cyberspace by offering services like Penetration Testing and Red Teaming, Infrastructure Security Testing, and Vulnerability Assessments.

TurgenSec

TurgenSec

TurgenSec offers top information security products uniting the human and technical elements of a complete cyber security package to provide products across the board.

Moss Adams

Moss Adams

Moss Adams is a fully integrated professional services firm dedicated to assisting clients with growing, managing, and protecting prosperity.

Tutanota

Tutanota

Tutanota is the world’s first end-to-end encrypted mail service that encrypts the entire mailbox.