Energy LogServer
Next-generation SIEM/SOAR — by the power of your data
Energy LogServer is a modern SIEM/SOAR platform built on Elasticsearch with no limitation on analyzed data. It centralizes event collection, detects t…
Energy SOAR
Security Orchestration, Automation & Response — by the Energy family
Energy SOAR is a business-driven Security Orchestration, Automation and Response platform that transforms SOC operations. It integrates with Energy Lo…
Energy Monitor
Infrastructure monitoring — continuous visibility across your entire IT estate
Energy Monitor is a comprehensive IT infrastructure monitoring platform built on the proven Nagios Core engine, enriched with EMCA's enterprise experi…
Fudo Security
Next-Gen AI-powered PAM — Zero Trust, Zero Agents
Fudo Security delivers a next-generation Privileged Access Management platform built on FreeBSD with AI behavioral analytics analyzing 1,400+ features…
Rublon
Enterprise MFA — protect every login, every system
Rublon is an enterprise Multi-Factor Authentication platform protecting access to networks, servers, endpoints, VPNs, and applications across the enti…
NACVIEW
Zero Trust Network Access Control — Polish-built since 2012
NACVIEW is a Polish Network Access Control platform operating on Zero Trust principles via 802.1X and RADIUS authentication. It provides full visibili…
Sycope
Network Detection & Response — see everything, miss nothing
Sycope is a comprehensive NDR platform for network traffic monitoring, threat detection, and incident response. Based on advanced NetFlow, sFlow, and …
Xopero Software
SphereCyberX — enterprise backup built for the ransomware era
Xopero Software delivers enterprise backup and disaster recovery through its SphereCyberX architecture — combining immutable storage, Zero Trust data …
Labyrinth Security Solutions
Deception technology — catch attackers, generate zero false positives
Labyrinth deploys next-generation deception technology across enterprise networks — creating decoy servers, workstations, credentials, files, and netw…
PASK
Behavioral biometrics — continuous authentication, zero hardware
PASK uses AI-powered behavioral biometrics — keystroke dynamics, mouse movement patterns, and typing rhythm — to continuously authenticate users throu…

