<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>radar 2025 - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/radar-2025-2/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/radar-2025-2/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Tue, 09 Sep 2025 06:29:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>radar 2025 - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/radar-2025-2/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>2025 AI security solutions Radar</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/09/2025-ai-security-solutions-radar/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/09/2025-ai-security-solutions-radar/#respond</comments>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Tue, 09 Sep 2025 06:29:41 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[radar]]></category>
		<category><![CDATA[radar 2025]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=27118</guid>

					<description><![CDATA[<p>  The AI security market is entering a new phase   After several years of excitement and exploration, we are now witnessing a clear consolidation of the AI security solutions market. The AI security sector is entering a phase of...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/09/2025-ai-security-solutions-radar/">2025 AI security solutions Radar</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><strong><img fetchpriority="high" decoding="async" class="aligncenter wp-image-27109 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Illustration-1.png" alt="" width="951" height="512" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Illustration-1.png 951w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Illustration-1-355x191.png 355w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Illustration-1-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Illustration-1-768x413.png 768w" sizes="(max-width: 951px) 100vw, 951px" /></strong></p>
<h2> </h2>
<h2 style="text-align: justify;"><strong>The AI security market is entering a new phase</strong></h2>
<p> </p>
<p style="text-align: justify;">After several years of excitement and exploration, we are now witnessing a clear consolidation of the AI security solutions market. The AI security sector is entering a phase of maturity, as reflected in the evolution of our AI Security Solutions Radar. Since our previous publication (<a href="https://www.wavestone.com/fr/insight/radar-2024-des-solutions-de-securite-ia/">https://www.wavestone.com/fr/insight/radar-2024-des-solutions-de-securite-ia/</a>), five major acquisitions have taken place:</p>
<ul style="text-align: justify;">
<li><strong>Cisco</strong> acquired <strong>Robust Intelligence</strong> in September 2024</li>
<li><strong>SAS</strong> acquired <strong>Hazy</strong> in November 2024</li>
<li><strong>H Company</strong> acquired <strong>Mithril Security</strong> at the end of 2024</li>
<li><strong>Nvidia</strong> acquired <strong>Gretel</strong> in March 2025</li>
<li><strong>Palo Alto</strong> announced its intention to acquire <strong>ProtectAI</strong> in April 2025</li>
</ul>
<p style="text-align: justify;">These motions reflect a clear desire by major IT players to secure their positions by absorbing key technology startups.</p>
<p style="text-align: justify;">Simultaneously, our new mapping lists 94 solutions, compared to 88 in the October 2024 edition. Fifteen new solutions have entered the radar, while eight have been removed. These removals are mainly due to discontinued offerings or strategic repositioning: some startups failed to gain market traction, while others shifted focus to broader AI applications beyond cybersecurity.</p>
<p style="text-align: justify;">Finally, a paradigm shift is underway: solutions are moving beyond a mere stacking of technical blocks and evolving into integrated defense architectures, designed to meet the long-term needs of large organizations. Interoperability, scalability, and alignment with the needs of large enterprises are becoming the new standards. AI cybersecurity is now asserting itself as a <strong>global strategy</strong>, no longer just a collection of ad hoc responses.</p>
<p style="text-align: justify;">To reflect this evolution, we have updated our own mapping by creating a new category<strong>, AI Firewall &amp; Response</strong>, which results from the merger of our <strong>Machine Learning Detection &amp; Response</strong> and <strong>Secure Chat/LLM Firewall</strong> categories.</p>
<h1 style="text-align: justify;"> </h1>
<h2 style="text-align: justify;"><strong>Best of breed or good enough? The integration dilemma</strong></h2>
<p> </p>
<p style="text-align: justify;">With the growing integration of AI security components into the offerings of major <strong>Cloud Providers</strong> (Microsoft Azure, AWS, Google Cloud), a strategic question arises:<br /><strong>Should we favor expert solutions or rely on the native capabilities of hyperscalers?</strong></p>
<p style="text-align: justify;"> </p>
<ul style="text-align: justify;">
<li>Specialized solutions offer <strong>technical depth</strong> and targeted coverage, complementing existing security.</li>
<li>Integrated components are <strong>easier to deploy, interoperable </strong>with existing infrastructure, and often <strong>sufficient</strong> for standard use cases.</li>
</ul>
<p style="text-align: justify;">This is not about choosing one over the other but about shedding light on the possibilities. Here is an overview of some security levers available through hyperscaler offerings.</p>
<p> </p>
<h4 style="text-align: justify;"><strong>Confidential Computing</strong></h4>
<p> </p>
<p style="text-align: justify;">This approach goes beyond securing data at rest or in transit: it aims to protect computations in progress, using <strong>secure enclaves</strong>. It ensures a high level of confidentiality throughout the lifecycle of AI models, sensitive data, or proprietary algorithms, by preventing any unauthorized access.</p>
<p style="text-align: justify;"> </p>
<h4 style="text-align: justify;"><strong>Filtering</strong></h4>
<p style="text-align: justify;">Cloud Providers now integrate <strong>security filters</strong> to interact with AI more safely. The goal: detect or block undesirable or dangerous content. But these mechanisms go far beyond simple moderation: they play a key role in <strong>defending against adversarial attacks</strong>, such as prompt injections or jailbreaks, which aim to hijack model behavior.</p>
<p> </p>
<h4 style="text-align: justify;"><strong>Robustness Evaluation</strong></h4>
<p> </p>
<p style="text-align: justify;">This involves assessing how well an AI model withstands <strong>disruptions</strong>, <strong>errors</strong>, or <strong>targeted attacks</strong>. It covers:</p>
<ul style="text-align: justify;">
<li>exposure to adversarial attacks,</li>
<li>sensitivity to noisy data,</li>
<li>stability over ambiguous prompts,</li>
<li>resilience to extraction or manipulation attempts.</li>
</ul>
<p style="text-align: justify;">These tools offer a first automated assessment, useful before production deployment.</p>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;"><strong>Agentic AI: a cross-cutting risk, a distributed security approach</strong></h2>
<p> </p>
<p style="text-align: justify;">Among the trends drawing increasing attention from cybersecurity experts, <strong>agentic AI</strong> is gaining ground. These systems, capable of making decisions, planning actions, and interacting with complex environments, actually combine two types of vulnerabilities:</p>
<ul style="text-align: justify;">
<li>those of <strong>traditional IT systems</strong>,</li>
<li>and those specific to <strong>AI models</strong>.</li>
</ul>
<p style="text-align: justify;">The result<strong>:</strong> an <strong>expanded attack area</strong> and <strong>potentially critical consequences</strong>. If misconfigured, an agent could access sensitive files, execute malicious code, or trigger unexpected side effects in a production environment.</p>
<p style="text-align: justify;">An aggravating factor adds to this: the emergence of the <strong>Model Context Protocol (MCP),</strong> a standard currently being adopted that allows LLMs to interact in a standardized way with third-party tools and services (email, calendar, drive…). While it facilitates the rise of agents, it also introduces new attack vectors:</p>
<ul style="text-align: justify;">
<li><strong>Exposure or theft of authentication tokens,</strong></li>
<li><strong>Lack of authentication mechanisms for tools,</strong></li>
<li><strong>Possibility of prompt injection attacks in seemingly harmless content,</strong></li>
<li>Or even <strong>compromise of an MCP server</strong> granting access to all connected services.</li>
</ul>
<p style="text-align: justify;">Beyond technical vulnerabilities, the <strong>unpredictable behavior</strong> of agentic AI introduces a new layer of complexity. Because actions directly stem from AI model outputs, a <strong>misinterpretation or planning error</strong> can lead to major deviations from the original intent.</p>
<p style="text-align: justify;">In this context, securing agentic AI <strong>does not fall under a single category</strong>. It requires <strong>cross-cutting</strong> coverage, mobilizing all components of our radar: robustness evaluation, monitoring, data protection, explainability, filtering, and risk management.</p>
<p style="text-align: justify;">And this is precisely what we’re seeing in the market: the first responses to agentic AI security do not come from new players, but from <strong>additional features integrated into existing solutions</strong>. An emerging issue, then, but one already being addressed.</p>
<p> </p>
<h2 style="text-align: justify;"><strong>Our recommendations: which AI security components should be prioritized?</strong></h2>
<p> </p>
<p style="text-align: justify;">Given the evolution of threats, the growing complexity of AI systems (especially agents), and the diversity of available solutions, we recommend focusing efforts on three major categories of security, which complement each other.</p>
<p> </p>
<h4 style="text-align: justify;"><strong>AI Firewall &amp; Response: continuous monitoring to prevent drifts</strong></h4>
<p> </p>
<p style="text-align: justify;"><strong>Monitoring</strong> AI systems has become essential. Indeed, an AI can evolve unpredictably, degrade over time, or begin generating problematic responses without immediate detection. This is especially critical in the case of agentic AI, whose behavior can have a direct operational impact if left unchecked.</p>
<p style="text-align: justify;">In the face of this volatility, it is crucial to detect weak signals in real time (prompt injection attempts, behavioral drift, emerging biases, etc.). That’s why it’s preferable to rely on <strong>expert solutions dedicated</strong> to detection and response, which offer specific analyses and alert mechanisms tailored to these threats.</p>
<p> </p>
<p style="text-align: justify;"><strong> <img decoding="async" class="aligncenter wp-image-27111 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Illustration-2.png" alt="" width="312" height="427" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Illustration-2.png 312w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Illustration-2-140x191.png 140w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Illustration-2-28x39.png 28w" sizes="(max-width: 312px) 100vw, 312px" /></strong></p>
<p> </p>
<h4 style="text-align: justify;"><strong>Model Robustness &amp; Vulnerability Assessment: test to prevent</strong></h4>
<p> </p>
<p style="text-align: justify;">Before deploying a model to production, it is crucial to assess its <strong>robustness</strong> and <strong>resistance to attacks</strong>. This involves classic model testing, but also more offensive approaches such as<strong> AI Red Teaming</strong>, which consists of simulating real attacks to identify vulnerabilities that could be exploited by an attacker.</p>
<p style="text-align: justify;">Again, the stakes are higher in the case of agentic AI: the consequences of unanticipated behavior can be severe, both in terms of security and compliance.</p>
<p style="text-align: justify;">Specialized solutions offer significant value by enabling <strong>automated testing</strong>, maintaining awareness of emerging vulnerabilities, and <strong>supporting evidence collection</strong> for regulatory compliance (for example, in preparation for the AI Act). Given the high cost and time required to develop these capabilities in-house, outsourcing via specialized tools is often more efficient.</p>
<p> </p>
<p style="text-align: justify;"><strong> <img decoding="async" class="aligncenter wp-image-27113 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Illustration-3.png" alt="" width="592" height="463" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Illustration-3.png 592w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Illustration-3-244x191.png 244w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Illustration-3-50x39.png 50w" sizes="(max-width: 592px) 100vw, 592px" /></strong></p>
<p> </p>
<h4 style="text-align: justify;"><strong>Ethics, Explainability &amp; Fairness: preventing bias and algorithmic drift</strong></h4>
<p> </p>
<p style="text-align: justify;">Finally, the dimensions of <strong>ethics</strong>, transparency, and <strong>non-discrimination</strong> must be integrated from the design phase of AI systems. This involves regularly testing models to identify unintended biases or decisions that are difficult to explain.</p>
<p style="text-align: justify;">Once again, <strong>agentic AI</strong> presents additional challenges: agents make decisions autonomously, in changing environments, with reasoning that is sometimes opaque. Understanding why an agent acted in a certain way then becomes crucial to prevent errors or injustices.</p>
<p style="text-align: justify;">Specialized tools make it possible to audit models, measure their fairness and explainability, and align systems with recognized ethical frameworks. These solutions also offer <strong>updated testing frameworks</strong>, which are difficult to maintain internally, and thus help ensure AI that is both high-performing and responsible.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-27161 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/IMAGE-1.png" alt="" width="958" height="619" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/IMAGE-1.png 958w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/IMAGE-1-296x191.png 296w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/IMAGE-1-60x39.png 60w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/IMAGE-1-768x496.png 768w" sizes="auto, (max-width: 958px) 100vw, 958px" /></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Conclusion: Building a Security Strategy for Enterprise AI</strong></h2>
<p> </p>
<p style="text-align: justify;">As artificial intelligence becomes deeply embedded in enterprise operations, securing AI systems is no longer optional—it is a strategic imperative. The rapid evolution of threats, the rise of agentic AI, and the growing complexity of models demand a shift from reactive measures to proactive, integrated security strategies.</p>
<p style="text-align: justify;">Organizations must move beyond fragmented approaches and adopt a holistic framework that combines robustness testing, continuous monitoring, and ethical safeguards. The emergence of integrated defense architectures and the convergence of AI security categories signal a maturing market—one that is ready to support enterprise-grade deployments.</p>
<p style="text-align: justify;">The challenge is clear: identify the right mix of specialized tools and native cloud capabilities, prioritize transversal coverage, and ensure that AI systems remain trustworthy, resilient, and aligned with business objectives.</p>
<p> </p>
<p> </p>
<p> </p>
<p>We thank Anthony APRUZZESE for his valuable contribution to the writing of this article.</p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/09/2025-ai-security-solutions-radar/">2025 AI security solutions Radar</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/09/2025-ai-security-solutions-radar/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity/#respond</comments>
		
		<dc:creator><![CDATA[Ahmed Amine Ghariani]]></dc:creator>
		<pubDate>Fri, 20 Jun 2025 14:17:53 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cybersecurity startups radar]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[radar 2025]]></category>
		<category><![CDATA[Swiss radar]]></category>
		<category><![CDATA[Switzerland]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=26402</guid>

					<description><![CDATA[<p>AI at the service of cybersecurity: a concrete step forward   Every year since 2020, Wavestone has identified Swiss cybersecurity startups in its eponymous radar. While AI has established itself as a cross-disciplinary subject in all fields, the 2025 Radar...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity/">Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 style="text-align: justify;">AI at the service of cybersecurity: a concrete step forward</h2>
<p> </p>
<p style="text-align: justify;">Every year since 2020, Wavestone has identified Swiss cybersecurity startups in its eponymous radar. While AI has established itself as a cross-disciplinary subject in all fields, the 2025 Radar focuses on the <strong>use of artificial intelligence as a tool</strong>, not just as a subject to be secured, but as a <strong>technology at the very heart of the cyber response.</strong></p>
<p style="text-align: justify;">Several startups are using AI to automate, enhance or personalize their solutions:</p>
<p style="text-align: justify;"><strong>Egonym</strong> uses generative AI to anonymize faces in images and videos while preserving useful traits like age and emotion — striking a rare balance between privacy and utility.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-26393" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image16.jpg" alt="egonym logo" width="155" height="53" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image16.jpg 155w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image16-71x24.jpg 71w" sizes="auto, (max-width: 155px) 100vw, 155px" /></p>
<p style="text-align: justify;"><strong>Hafnova</strong> applies real-time AI to detect, block, and report threats across critical infrastructures with high responsiveness and minimal delay.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-26369" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image2.png" alt="Hafnova logo" width="67" height="71" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image2.png 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image2-37x39.png 37w" sizes="auto, (max-width: 67px) 100vw, 67px" /></p>
<p style="text-align: justify;"><strong>Aurigin</strong> combats deepfake-based fraud in real time using multimodal AI that simultaneously analyzes voice, image, and text to validate identities. </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-26395" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image17.jpg" alt="aurigin.ai logo" width="176" height="51" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image17.jpg 176w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image17-71x21.jpg 71w" sizes="auto, (max-width: 176px) 100vw, 176px" /></p>
<p style="text-align: justify;"><strong>RedCarbon</strong> delivers autonomous AI agents capable of handling complex cybersecurity tasks such as threat detection, hunting, and compliance monitoring — significantly reducing analyst workload.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-26375" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image6-e1750428148421.png" alt="REDCARBON logo" width="183" height="24" /></p>
<p style="text-align: justify;"><strong>Baited</strong> leverages AI and OSINT to generate hyper-realistic phishing simulations, enabling organizations to test and train employees under real-world conditions.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-26373" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image5-e1750428603602.png" alt="baited logo" width="142" height="45" /></p>
<p style="text-align: justify;">It&#8217;s good to see AI becoming an essential defensive weapon contributing to the defense of our information systems.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Strong momentum around threat detection, response and monitoring</h2>
<p> </p>
<p style="text-align: justify;">The second strong trend this year is the emergence or reinforcement of startups specializing in <strong>intrusion detection, suspicious behavior detection, incident response</strong> and <strong>continuous supervision.</strong></p>
<p style="text-align: justify;">This segment, already well established historically, is undoubtedly gaining strength with several new entries:</p>
<p style="text-align: justify;"><strong>RedCarbon</strong>: AI agents for threat detection &amp; automated hunting.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-26375" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image6-e1750428148421.png" alt="REDCARBON logo" width="175" height="23" /></p>
<p style="text-align: justify;"><strong>Swiss Security Hub</strong>: continuous monitoring of SAP systems with XDR integration.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-26377" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image7-e1750428038244.png" alt="Security Hub logo" width="115" height="115" /></p>
<p style="text-align: justify;"><strong>Cyberservices</strong> : XDR platform based on the Google ecosystem.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter  wp-image-26379" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image8-e1750428222485.png" alt="Cyberservices logo" width="64" height="35" /></p>
<p style="text-align: justify;"><strong>Hafnova</strong>: real-time cyber supervision in critical sectors.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-26369" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image2.png" alt="Hafnova logo" width="67" height="71" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image2.png 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image2-37x39.png 37w" sizes="auto, (max-width: 67px) 100vw, 67px" /></p>
<p style="text-align: justify;"><strong>Tirreno</strong>: on-prem platform for online fraud detection with user trust scoring.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter  wp-image-26383" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image10-e1750428239189.png" alt="tirreno logo" width="131" height="29" /></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">At a time when cyber-attacks continue to increase in number and complexity, <strong>preventive, contextualized and autonomous detection</strong> is and will remain key to strengthening operational resilience.</p>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;">New ground explored: digital sovereignty and secure hardware</h2>
<p> </p>
<p style="text-align: justify;">Among the notable additions, <strong>The Cosmic Dolphins</strong> stands out with its sovereign hardware approach:</p>
<p style="text-align: justify;"><strong>The Cosmic Dolphins</strong>: Swiss smartphones with dual-zone OS (Shark Zone / Dolphin Zone), kill switch, and hardware-first approach to privacy.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-26385" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image11-e1750428264682.jpg" alt="The Cosmic Dolphins logo" width="99" height="99" /></p>
<p style="text-align: justify;">Swiss innovation isn&#8217;t limited to software: <strong>mastery of the physical infrastructure</strong> is becoming an issue of trust, sovereignty and differentiation.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-26387" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image12.jpg" alt="Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity" width="602" height="338" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image12.jpg 602w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image12-340x191.jpg 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image12-69x39.jpg 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image12-600x338.jpg 600w" sizes="auto, (max-width: 602px) 100vw, 602px" /></p>
<h2 style="text-align: justify;">Key Figures</h2>
<h2 style="text-align: justify;" data-wp-editing="1"><img loading="lazy" decoding="async" class="aligncenter wp-image-26406 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image18-e1750429011414.png" alt="" width="200" height="39" /><br /><img loading="lazy" decoding="async" class="aligncenter wp-image-26408 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/Image19-e1750428988444.png" alt="" width="200" height="67" /></h2>
<p> </p>
<h2 style="text-align: justify;">Geographical focus: undisputed predominance of Lausanne and Zurich, but other regions are gaining ground</h2>
<p> </p>
<p style="text-align: justify;">Unsurprisingly, most startups are located around two main technological clusters: Zürich and Lausanne. This confirms an already existing trend since these two cities are hosting Swiss Federal institutes of technology (ETHZ in Zürich, EPFL in Lausanne).</p>
<p style="text-align: justify;">These universities are providing a fertile ground for startups as they offer support in terms of infrastructure but also in terms of collaboration with students and labs. In return, intellectual property is shared between startups and universities. This model is a success for Switzerland as it allows to continuously improve the economy of these regions with a good balance between investment and research.</p>
<p style="text-align: justify;">Nevertheless, other regions such as Geneva and Ticino are showing increasing dynamism, with several new startups emerging in this year’s edition. This points to a gradually diversifying ecosystem, supported by regional initiatives like innovation hubs and dedicated startup incubators.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Methodology</h2>
<p> </p>
<p style="text-align: justify;">Wavestone’s Swiss Cybersecurity Startups Radar identifies new players in the Swiss cyber innovation ecosystem. Its objective: to provide a global and critical view of an ever-renewing environment.</p>
<ul>
<li style="text-align: justify;">Startups were selected according to our eligibility criteria:</li>
<li style="text-align: justify;">Head office in Switzerland</li>
<li style="text-align: justify;">Less than 50 employees</li>
<li style="text-align: justify;">Less than 8 years of activity (established as of 2017)</li>
<li style="text-align: justify;">Business model around a specific product (software or hardware)</li>
<li style="text-align: justify;">Startups were identified and evaluated according to the following procedure:</li>
<li style="text-align: justify;">Open Source Intelligence (OSINT) data consolidation</li>
<li style="text-align: justify;">Evaluation in regard to above criteria</li>
<li style="text-align: justify;">Qualitative interviews with the startups</li>
</ul>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity/">Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/06/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
