Receive awards updates:

Promote this Nomination

penta security_logo

In 3 bullets, summarize why this company is different from the competition and deserves recognition:

• Penta Security utilized its existing unique technology with its logic-based detection engine to develop AutoCrypt, which is equipped with an Advanced Firewall (AFW) that intelligently analyzes packets externally or internally and then blocks any suspicious traffic with the logic-based detection engine.
• Frost & Sullivan awarded Penta Security as the 2016 Asian Cyber Security Vendor of the Year Award, pushing Penta Security to extend its WAF solution WAPPLES to other regions in the Middle East, Europe, and North America.
• Penta Security’s R&D center has over two decades of research experience and its IoT Convergence Lab is continuously looking for ways to develop and implement innovative technology into its products and solutions, including AutoCrypt.

In less than 300 words, summarize the achievements of the company in the nominated category

As an IT security firm with roots in data encryption solutions, Penta Security Systems has continued to expand and innovate by venturing into emerging markets like industry 4.0 and connected car security. Penta Security Systems is tackling one of the greatest challenges currently facing businesses in the era of connectivity where data integrity is of utmost importance and where security threats for the first time also pose a tangible threat to human life.

When it comes to IoT, Penta Security System’s philosophy is “secure first, then connect.” In 2015 the company rolled out a solution that covers all aspects of security within a connected car. The solution named AutoCrypt was a response to the dangers associated with connected cars. Penta Security Systems began researching possible gateways and points of access and thus developed methods for securing the channels of communication through an advanced web application firewall (WAF), V2X (Vehicle-to-Anything) secure communication system utilizing encryption, Public Key Infrastructure (PKI), and a key management system for encryption keys.

Sign Up for
Cybersecurity Excellence Awards Updates

Sign up for your award updates! Join thousands of cybersecurity marketers and professionals to receive the latest news about the upcoming Cybersecurity Excellence Awards.

Sign Up for
Cybersecurity Excellence Awards Updates

Sign up for your award updates! Join thousands of cybersecurity marketers and professionals to receive the latest news about the upcoming Cybersecurity Excellence Awards.