DoD-Validated Data Security Startup Emerges From Stealth

  /     /     /  
Publicated : 23/11/2024   Category : security


DoD-Validated Data Security Startup Emerges From Stealth


The Code-X platform has been tested by the US Department of Defense and members of the intelligence community.



Data security startup Code-X today emerged from stealth with $5 million in Series A funding and a lattice-based data protection platform validated by the US Department of Defense.
The Code-X data protection platform is vendor-agnostic and creates five dimensions of security to protect sensitive data and critical systems across local, cloud, and hybrid environments. Its structuring, networking, authentication, management, and monitoring of data and systems aims to prevent data corruption or loss. The platform also provides audit logging, alert and alarm systems, and user management.
Code-Xs technology has recently been tested by the Department of Defense and members of the intelligence community for its ability to protect sensitive data and critical systems. The DoD testing also validated the platform increases packet management, network throughput, storage redundancy, and continuity while lowering processing requirements, the company reports.
The $5 million in Series A funding, led by By Light Professional IT Services LLC, will be used for sales and marketing efforts. Code-X has also welcomed Lieutenant General (ret.) Vincent Stewart, former deputy commander of the US Cyber Command, and other military, intelligence, and security experts, to its team.
Read the 
full release
 for more information.

Last News

▸ Security Problem Growing for Dairy Queen, UPS & Retailers, Back off ◂
Discovered: 23/12/2024
Category: security

▸ Veritabile Defecte de Proiectare a Securitatii in Software -> Top 10 Software Security Design Flaws ◂
Discovered: 23/12/2024
Category: security

▸ Sony, XBox Targeted by DDoS Attacks, Hacktivist Threats ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
DoD-Validated Data Security Startup Emerges From Stealth