Portfolio

Cyber Security


Asset Management

Authentication

Cyber Training

Cyber Storage

Digital Vault

Email Security

Endpoint Patching

File Sharding

Incident Response

Managed Microsoft Security

Phishing Prevention

Ransomware Protection

Full Content Inspection

Secure Access

Secure DNS

Kubernetes Security

Linux Agentless EDR

Threat Emulation

Integrated asset visibility & asset lifecycle automation for all your technology assets to improve IT efficiency, cost management & audit readiness.

Confidently phase out passwords and give workers, customers and citizens a convenient log in experience.

Cybrary's accessible, affordable training platform provides curated career paths, threat-informed training, & certification preparation for professionals at all levels.

Replace default settings with optimal security engineered for CIS standards compliance across workstations, servers, and browsers.

The only end-to-end cyberstorage solution to stop ransomware, insider threats and data extortion in under a second.

Simplify unstructured data security, enhance privacy and ensure resilience for hybrid- and multi-cloud environments.

Securely organize the most vital pieces of your life with the most important people in it with Prisidio's industry leading features.

The Behavioral Email Security Platform. Block phishing threats, prevent data leaks, business email compromise and coach users to make smart decisions.

Secure your endpoints, email and employees. Powered by custom-built technology for SMBs and the expert analysis of their 24/7 operations center.

Halcyon is the first Anti-Ransomware & Cyber Resilience Platform with automated encryption key capture & autonomous decryption capabilities.

Save time, eliminate risk, & automate the patching, configuration, & control of all your Windows, macOS, & Linux endpoints with AI-powered automation.

Log Analysis

Managed Detection Response

Threat Intelligence

Threat Prevention

Browser Security

Configuration Management

Delivers swift, strong response to cyber incidents such as ransomware, email compromise, malware and data theft with end-to-end response capabilities.

Know your security posture by testing your team’s & systems with Scythe’s adversary emulation platform that behaves just like hackers do in the real world.

Secure Code Gamification

Effortlessly connect apps, staff, developers, containers, cloud & devices anywhere without VPN servers, opening firewalls or changing infrastructure.

Sandfly is an agentless Linux security solution that detects and repels attackers without the need for endpoint agents.

A data platform with no limits. Boost observability. Search, visualize, & analyze all your raw data and ask any question you want. Fixed price log analysis.

Enables any small or medium-sized organization to securely conduct business in today’s digital world with Microsoft 365 and the full Microsoft product suite.

Fully managed threat prevention for sophisticated attacks via network & file inspection.

Makes critical threat intelligence information more accessible during a time when cyber attacks & ransomware have become increasingly common.

DNSFilter makes it simple to deploy an enterprise threat protection & content filtering solution at an affordable price. Be up and running in minutes.

ConcealBrowse is a browser plugin that identifies potentially harmful webpages autonomously, stopping cyber attacks that take advantage of weaponized links.

Stops phishing in the browser from vectors like LinkedIn, SMS and others with AI Computer Vision, when email security and training fail.

Aggregate cyber intelligence data – in real time, at scale – and automatically eliminate known threat actors from entering and exiting your network

Eliminates cloud native attacks with verifiable workload, identity and infrastructure baselines. (Formerly named KSOC)

Leverage AI-driven security gamification to upskill developers, reduce risk, protect your software products, & show compliance.

National Security


Artificial Intelligence

Data Solutions

Energy Production

Geospatial

Propulsion

Secure Hosting

Delivers a revolutionary source of global knowledge-based on RF geospatial intelligence to those working to make the world a safer place.

Jet propulsion for drones and airplanes with no moving parts for an affordable and sustainable future.

Enables continuous accreditation and deployment of commercial software for crucial U.S. national security missions.

Anno.ai supports a wide variety of US government projects which leverage artificial intelligence and multimedia analytics.

Premier data solutions for mission critical applications. An AI platform to store, secure and operationalize data at insane speed and efficiency

X-energy is a nuclear reactor & fuel design engineering company that develops Generation IV high-temp gas cooled nuclear reactors and fuel.

Historical Exits


2024

2022

2021

2020

2019

2018

2017

2000

Tenable IPOed in 2018. Ron & Cyndi Gula co-founded Tenable with Jack Huffard and Renaud Deraison in 2002

Ron and Cyndi Gula’s first exit was Network Security Wizards, a network intrusion detection startup that made the Dragon IDS, and was acquired by Cabletron Systems in 2000.