Additional Info

CompanyDojo-Labs
Company size12 employees
Websitehttps://www.dojo-labs.com/

NOMINATION HIGHLIGHTS

Dojo is a security technology that connects to your network and acts as the essential layer between your smart devices and any threats to your security and privacy. Primarily, Dojo is a local intelligence unit that connects with a user’s network of smart home devices, managing threat detection and prevention. The device runs on Dojo’s proprietary cloud-based cyber security engine, constantly collecting and analyzing metadata generated by all the deployed Dojos. The cyber engine detects cyber threats and abnormal behavior through machine learning and proprietary algorithms, which Dojo-Labs cyber-researchers constantly monitor to update the security policy. The Dojo pebble glows orange or red when there is activity being monitored, and sends real-time push notifications only when action is required within the appt. Dojo’s pebble and app provide simple and intuitive UI/UX that empower customers to take control of their home network security and privacy without any technical knowledge.

How we are different

Dojo-Labs cyber platform is using the power of crowd-sourced data in order to increase its ability to cope with zero day attacks. No other technology exists that empowers consumers to protect their connected homes. There are enterprise and state technologies that thwart hacks and safeguard data, but there's no technology this powerful that helps the everyday consumer manage these types of vulnerabilities.


The unique design is meant to make securing the connected home simple and approachable. It’s designed for the human in mind. Designing Dojo’s interface we sought to define an experience that removed complexity. The app hides management to provide a conversational interface – simply respond to the infrequent plainspoken cues to keep your home secure.


The company does not collect any customer data. Instead, Dojo-Labs collects and analyzes metadata generated by specific device behavior and the related security/privacy logs. This data helps us improve the device intelligence and leverages to power of a crowd-sourced security engine.