FR
EN
Home
Programme
faq
Join us
Startups
News
Apply
DISCOVER THE STARTUPS OF THE PROGRAMME
filter
Tout
DATA PROTECTION & PRIVACY
IDENTITY & ACCESS MANAGEMENT
INFRASTRUCTURE SECURITY
CRYPTOGRAPHY
APPLICATION PROTECTION
RAIL CYBERSECURITY
OBFUSCATION
REVERSE ENGINEERING
IOT, ENDPOINT & DEVICE PROTECTION
MORPHOLOGIC ANALYSIS
ADVANCED THREAT & VULNERABILITY DETECTION
ANTI-COUNTERFEITING
QUANTUM CRYPTOGRAPHY
COMMUNICATIONS SECURITY
SECURE IOT DEVICE ONBOARDING
INDUSTRY 4.0
OT CYBERSECURITY
CYBERSECURITY BY DESIGN
SUPPLY CHAIN CYBERSECURITY
AUTOMATED SECURITY AUDITS OF SOFTWARE BINARIES
CONFIDENTIAL COMPUTING
PRIVACY BY DESIGN
CLOUD SECURITY
CYBERSECURITY GOVERNANCE
NO CODE
SECURITY, ORCHESTRATION, AUTOMATION AND RESPONSE
EXTERNAL ATTACK SURFACE MANAGEMENT (EASM)
INCIDENT RESPONSE
CYBER FOR AI
DATA CENTRIC SECURITY
SYNTHETIC DATA
GOVERNANCE, RISK MANAGEMENT, COMPLIANCE
WEB 3
CRYPTO WALLET
Secure IOT Device Onboarding
Season 7
Current season
Dynatrust
The turnkey solution for managing the compliance of your cybersecurity requirements at the scale of all your suppliers
SUPPLY CHAIN CYBERSECURITY
Defants
Turn Threat Investigation into opportunities
SECURITY, ORCHESTRATION, AUTOMATION AND RESPONSE
DFNS
Deploy safe web3 wallets with peace of mind
Octopize
We unleash data value with anonymous synthetic data.
DATA PROTECTION & PRIVACY
Skyld
Deploy on-device AI securely
Uncovery
Discover, Assess, and Monitor your Internet-facing assets
Season 6
Anozrway
Reduce your human attack surface and protect your key people
DATA PROTECTION & PRIVACY
IDENTITY & ACCESS MANAGEMENT
Board Of Cyber
Assess and improve your organization's cyber performance and that of your ecosystem with our SaaS Security Rating® solution.
DATA PROTECTION & PRIVACY
Chimere
The new remote access solution Zero-Trust by design
INFRASTRUCTURE SECURITY
APPLICATION PROTECTION
CLOUD SECURITY
Codenotary
Full understanding, pervasive tracking, and policy enforcement to build and deploy trusted applications.
CRYPTOGRAPHY
APPLICATION PROTECTION
SUPPLY CHAIN CYBERSECURITY
Mindflow
Making automation simple
ADVANCED THREAT & VULNERABILITY DETECTION
NO CODE
SECURITY, ORCHESTRATION, AUTOMATION AND RESPONSE
OverSOC
the cockpit CIOs, CISOs, and operational security teams need to work together and make the most of their information system security.
ADVANCED THREAT & VULNERABILITY DETECTION
CYBERSECURITY GOVERNANCE
rBlox
Overcome the limitations of legacy internet infrastructure to reach new levels of security, scalability, and low latency to help enterprises...
INFRASTRUCTURE SECURITY
Season 5
Secretarium
Bringing confidential computing to the mainstream
DATA PROTECTION & PRIVACY
CONFIDENTIAL COMPUTING
PRIVACY BY DESIGN
Trout Software
Connect and query all your logs with lightspeed wherever they are and create compelling investigations from them
APPLICATION PROTECTION
OT CYBERSECURITY
Tarides
Tarides, the secure, safe and efficient software company - controlling and managing software complexity
IOT, ENDPOINT & DEVICE PROTECTION
Secure IOT Device Onboarding
TrustHQ
Automate Risk, Audit & Compliance in a single Dashboard
INFRASTRUCTURE SECURITY
ADVANCED THREAT & VULNERABILITY DETECTION
Leanear
Work in the Cloud without losing control of your data
DATA PROTECTION & PRIVACY
CRYPTOGRAPHY
CLOUD SECURITY
Malizen
Data science to accelerate cyber teams & simplify investigations
INFRASTRUCTURE SECURITY
ADVANCED THREAT & VULNERABILITY DETECTION
Season 4
swIDch
We are committed to bring secure authentication to every digital identity even in the off-the-network environment.
IDENTITY & ACCESS MANAGEMENT
Secure IOT Device Onboarding
SIGA OT Solutions
Innovative Out-of-Band Level 0 Cyber Security for OT Environments
INDUSTRY 4.0
OT CYBERSECURITY
OGO Security
Protecting websites and web applications through AI and behavioural analysis - Next Gen WAF
APPLICATION PROTECTION
Moabi
CYBERSECURITY BY DESIGNS
IOT, ENDPOINT & DEVICE PROTECTION
CYBERSECURITY BY DESIGN
SUPPLY CHAIN CYBERSECURITY
AUTOMATED SECURITY AUDITS OF SOFTWARE BINARIES
Pocket Result
Facilitate Cyber data governance, with AI to make it understandable to everybody.
CYBERSECURITY GOVERNANCE
Season 3
ITsMine
Cybersecurity Data Loss Beyond DLP
DATA PROTECTION & PRIVACY
Crayonic
Secure Digital Identity for Things and People
IDENTITY & ACCESS MANAGEMENT
IOT, ENDPOINT & DEVICE PROTECTION
SEKOIA.IO
Bringing security operations to a new pace
ADVANCED THREAT & VULNERABILITY DETECTION
Cypheme
Next-generation anti-counterfeit solutions
IOT, ENDPOINT & DEVICE PROTECTION
ANTI-COUNTERFEITING
Weakspot
Identification of risks related to the exposure of a company on the Internet
ADVANCED THREAT & VULNERABILITY DETECTION
KETS Quantum Security
Communications protection using future-proof, scalable, and easily-deployed hardware.
QUANTUM CRYPTOGRAPHY
COMMUNICATIONS SECURITY
Acklio
Software solutions for IoT infrastructure networks
IOT, ENDPOINT & DEVICE PROTECTION
COMMUNICATIONS SECURITY
CryptoNext Security
We protect your data against the quantum computer
CRYPTOGRAPHY
QUANTUM CRYPTOGRAPHY
Season 2
Crypto Quantique
Seamless and easy-to-implement end-to-end security for the IoT
IOT, ENDPOINT & DEVICE PROTECTION
SECURE IOT DEVICE ONBOARDING
Cylus
Railway cybersecurity
RAIL CYBERSECURITY
Dathena
Making Data Breaches Optional
DATA PROTECTION & PRIVACY
Nanolock
Cloud-to-Flash Solution
IOT, ENDPOINT & DEVICE PROTECTION
NuCypher
Data Privacy Infrastructure for distributed applications
DATA PROTECTION & PRIVACY
Perception Point
Threat Detection for the Digital-First Enterprise
ADVANCED THREAT & VULNERABILITY DETECTION
Algodone
Silicon Activation Licensing Technology™
DATA PROTECTION & PRIVACY
IOT, ENDPOINT & DEVICE PROTECTION
Cyber-Detect
Say no to sophisticated threat
MORPHOLOGIC ANALYSIS
ADVANCED THREAT & VULNERABILITY DETECTION
Quarkslab
Every security issue is different, every solution must be
DATA PROTECTION & PRIVACY
OBFUSCATION
REVERSE ENGINEERING
Trillium Secure
Trusted Mobility Platform and Services powered by blockchain and AI
IOT, ENDPOINT & DEVICE PROTECTION
Akheros
Data Determinacy & Behavioral Intelligence
ADVANCED THREAT & VULNERABILITY DETECTION
Season 1
Alsid
Real-time Protection for Directory Infrastructures
INFRASTRUCTURE SECURITY
Biowatch
Wrist vein pattern recognition embedded into watches and bracelets
DATA PROTECTION & PRIVACY
Inpher
Make predictions without revealing the past
CRYPTOGRAPHY
KeeeX
Invents the Augmented Data
DATA PROTECTION & PRIVACY
Multisense
Upgrade your security to protect you and your customer
IDENTITY & ACCESS MANAGEMENT
Nethone
Data-driven predictive intelligence and machine learning
INFRASTRUCTURE SECURITY
QED-it
Bringing privacy to Blockchain using Zero-Knowledge Proof cryptography
IDENTITY & ACCESS MANAGEMENT
Skeyecode
Patent-pending cryptographically individualized applications
IDENTITY & ACCESS MANAGEMENT
Yogosha
A perfectly framed Bounty Bug
ADVANCED THREAT & VULNERABILITY DETECTION