Strategic consulting and
advisory


Data intelligence services, led by a Team of Multilingual Partners and Consultants with INSEAD / WHARTON / MIT MBAs

Our Technology Partners

We work with a wide range of leading vendors and technology solution providers in their fields.


IBM

For more than 100 years, IBM has been embedded in the evolution of business, society, and the technologies that power it—enabling clients to transform themselves, era after era...


Security Scorecard

Understand and reduce risk with the world’s most expansive and scalable security rating platform...


Panaseer

Panaseer is the leading Continuous Controls Monitoring (CCM) platform for cybersecurity that empowers your organization to effectively tackle fundamental cybersecurity challenges...


3GRC

Simplify, automate and centralize your risk and compliance program with the 3GRC Cloud-based risk & Compliance Management Platform to gain an accurate representation of potential risks...


Cylance

Cylance uses artificial intelligence to deliver prevention-first, predictive security products and specialized security services that change how organizations approach endpoint security...


DRD Partnership

DRD Partnership is a strategic communications consultancy focused on building value for its clients and protecting their reputations at moments of challenge and of change...


Balbix

Balbix is a converged platform to harness the power of AI for cybersecurity program transformation to provide a real-time view on a cybersecurity posture with insights on how to reduce breach risks...


Koine

Koine provides custody and settlement services that allow institutions to store digital assets securely and to trade them safely and efficiently...


Copper

Copper’s security architecture combines client segregated cold storage with live trading accounts to give complete control over the custody and transmission of digital assets...


Cloudistics Lenovo

Cloudistics offers customers an agile on-premises hybrid cloud platform that allows them to reimagine datacenters and create and consume IT applications in a predictable manner...


SecureMe2

SAM stands for Scan, Analyse and Manage A security solution that monitors your network 24/7 Realtime analysis basis on worldwide up-to-date threat intelligence to detect and prevent malicious traffic


Okta

Okta provides cloud software that helps companies manage and secure user authentication into modern applications, and for developers to build identity controls into applications


SailPoint

SailPoint is a leader in cloud identity governance, making it possible to see and control user access to all your applications and data — in the cloud and on-premises...


Duo

Secure access to your applications and data, no matter where your users are - on any device - from anywhere, for organizations of all sizes, ensuring trusted access to sensitive data...


Beyond Trust

BeyondTrust's unified solutions offer a broad set of privileged access management capabilities with a flexible design that enhances user productivity and maximizes return on security investments...


Jask

JASK is automating the manual work for the security analyst, saving them time and enabling them to be more effective by focusing on higher-value security functions...


Bitglass

A Cloud Access Security Broker (CASB) is a policy enforcement point that delivers data and threat protection in the cloud, on any device, anywhere...


Illusive Networks

Illusive ensnares attackers in an inescapable maze of deceptions. Their first inevitable misstep leads to early and accurate detection...


Cato Networks

The Cato Cloud is a converged platform to connect, secure and manage your network. You can gradually deploy Cato across branches, cloud resources, and users to replace/augment legacy network services


Digital Guardian

Welcome to the convergence of data loss prevention and endpoint detection and response delivered in the cloud.


Veracode

Veracode gives you the ability to scan your code, right in your favorite IDE or CI system, while you are coding. You’ll receive instant insight into any security flaws that are discovered...


CheckMarx

Taking a holistic, platform-centric approach, the Software Exposure Platform builds security in from the start of the SDLC, continuously supporting all stages of the DevOps cycle.


FortySeven

FortySeven provides a high standard of software development services for its global clients spanning a wide range of industries...


8Allocate

8allocate is a global provider of full-cycle custom software development and staff augmentation services to companies all over the globe, from North America to Israel to Australia.


RiskIQ

RiskIQ empowers CISOs to continuously visualize and defend their ever-changing attack surface, proactively protecting your company, brand, people, and data.


CipherTrace

CipherTrace curates the world’s most comprehensive database of cryptocurrency exchanges and their operational status providing a unique lens into this high-risk blindspot.