ONEKEY wins ECSO Startup Award and is Europe’s most promising Cybersecurity Startup
ONEKEY wins ECSO Startup Award and is Europe’s most promising Cybersecurity Startup
Startups like ONEKEY are a key factor for the EU’s growth and competitiveness
Brussels / Bochum / Duesseldorf, March 26th, 2024 – ONEKEY is Europe’s most promising startup in the field of cybersecurity: the jury of the ECSO Startup Award is convinced of this and has chosen the Düsseldorf-based company as the winner of the prestigious ECSO Award. The winners of the previous national competitions in Europe were able to take part in the final competition in Bochum and were presented in front of a broad audience and the European Cyber Security Organisation (ECSO) and its partners Bochum Economic Development, the Women4Cyber Foundation and eurobits e.V. on 21 March in Bochum. „Winning this award makes me and the whole team very happy and validates our strategy to help manufacturers improve the cybersecurity and compliance of technical products by automation. ONEKEY enables companies to use a holistic management platform for product cybersecurity and compliance that helps and reduces the cost of meeting cybersecurity requirements, such as the EU Cyber Resilience Act and many others, and to fully automate compliance monitoring. In this way, we turn product cybersecurity and compliance into a competitive advantage along the entire supply chain of internet and network enabled devices,“ said Jan Wendenburg, CEO of ONEKEY.
European flagship competition ECSOSTARtup Award
The European Cybersecurity Organisation (ECSO) is a cross-industry organisation that plays a key role in building the European cybersecurity ecosystem. Its members include large companies, SMEs and start-ups, research centres and universities. From 2020, the ECSO STARtup Award is presented once a year to the most promising European startups in the field of cybersecurity to give these companies a European stage. This year’s finalists were selected by expert juries at various European cybersecurity events over the course of 2023. “ ECSO is not just talk, it is action. The ECSO Award Finals exemplify this commitment to action. We bring together different European cybersecurity ecosystems and cybersecurity market players to build valuable partnerships. Collaboration is our core, and together, we are shaping the future of cybersecurity in Europe”, said ECSO Chairman Axel Deininger. Startups like ONEKEY play a key role in this and are pillars of European innovation.
ONEKEY finds zero-day vulnerabilities
“In the dynamic cybersecurity environment, start-ups are the key factor for the EU’s growth andcompetitiveness in this market. That is why we at eurobits actively support start-ups and see themas an important part of the ecosystem in NRW as well as nationally”, said Dr. Heiko Koepke, Member of Executive Board of eurobits e.V. and co-organiser of the award ceremony in Bochum. ONEKEY is a key driver of these innovations, even enabling what until recently seemed almost impossible: automatic detection of zero-day vulnerabilities in executable binary files. The ONEKEY Product Cybersecurity & Compliance Platform can also automatically analyse complex file types for unknown vulnerabilities and provide appropriate remediation recommendations. In addition, ONEKEY’s technology is able to generate a complete Software Bill of Materials (SBOM). This comprehensive list of all software components contained in a device will be mandatory for all manufacturers and importers in the European Union under the EU Cyber Resilience Act recently passed by the EU Parliament.
About ONEKEY
ONEKEY is the leading European specialist in Product Cybersecurity & Compliance Management and part of the investment portfolio of PricewaterhouseCoopers Germany (PwC). The unique combination of an automated Product Cybersecurity & Compliance Platform (PCCP) with expert knowledge and consulting services provides fast and comprehensive analysis, support, and management to improve product cybersecurity and compliance from product purchasing, design, development, production to end-of-life.
Critical vulnerabilities and compliance violations in device firmware are automatically identified in binary code by AI-based technology in minutes – without source code, device, or network access. Proactively audit software supply chains with integrated software bill of materials (SBOM) generation. „Digital Cyber Twins“ enable automated 24/7 post-release cybersecurity monitoring throughout the product lifecycle.
The patent-pending, integrated Compliance Wizard™ already covers the upcoming EU Cyber Resilience Act (CRA) and existing requirements according to IEC 62443-4-2, ETSI EN 303 645, UNECE R 155 and many others.
The Product Security Incident Response Team (PSIRT) is effectively supported by the integrated automatic prioritisation of vulnerabilities, significantly reducing the time to remediation.
Leading international companies in Asia, Europe and the Americas already benefit from the ONEKEY Product Cybersecurity & Compliance Platform and ONEKEY Cybersecurity Experts.
Further information: ONEKEY GmbH, Sara Fortmann, E-Mail: sara.fortmann@onekey.com, Kaiserswerther Straße 45, 40477 Duesseldorf, Germany, Web: www.onekey.com
Um dir ein optimales Erlebnis zu bieten, verwenden wir Technologien wie Cookies, um Geräteinformationen zu speichern und/oder darauf zuzugreifen. Wenn du diesen Technologien zustimmst, können wir Daten wie das Surfverhalten oder eindeutige IDs auf dieser Website verarbeiten. Wenn du deine Zustimmung nicht erteilst oder zurückziehst, können bestimmte Merkmale und Funktionen beeinträchtigt werden.
Funktional
Immer aktiv
Die technische Speicherung oder der Zugang ist unbedingt erforderlich für den rechtmäßigen Zweck, die Nutzung eines bestimmten Dienstes zu ermöglichen, der vom Teilnehmer oder Nutzer ausdrücklich gewünscht wird, oder für den alleinigen Zweck, die Übertragung einer Nachricht über ein elektronisches Kommunikationsnetz durchzuführen.
Vorlieben
Die technische Speicherung oder der Zugriff ist für den rechtmäßigen Zweck der Speicherung von Präferenzen erforderlich, die nicht vom Abonnenten oder Benutzer angefordert wurden.
Statistiken
Die technische Speicherung oder der Zugriff, der ausschließlich zu statistischen Zwecken erfolgt.Die technische Speicherung oder der Zugriff, der ausschließlich zu anonymen statistischen Zwecken verwendet wird. Ohne eine Vorladung, die freiwillige Zustimmung deines Internetdienstanbieters oder zusätzliche Aufzeichnungen von Dritten können die zu diesem Zweck gespeicherten oder abgerufenen Informationen allein in der Regel nicht dazu verwendet werden, dich zu identifizieren.
Marketing
Die technische Speicherung oder der Zugriff ist erforderlich, um Nutzerprofile zu erstellen, um Werbung zu versenden oder um den Nutzer auf einer Website oder über mehrere Websites hinweg zu ähnlichen Marketingzwecken zu verfolgen.
Comments are closed