"In 2012, we started with just seven employees and a mission to create the most intelligent authentication solution on the market." - Zia Hayat, Co-Founder & CEO @ Callsign

Founder: Zia Hayat

Year founded: 2012

Sector: cybersecurity

Capital raised: c.$40M

www.callsign.com

Callsign is a cybersecurity solution on a mission to seamlessly power the identification of every web, mobile and physical interaction. To do this they hire the brightest, most inquisitive minds who want to change the rules of identity and make this mission a reality. Callsign products use deep learning techniques to combine event, threat, and behavioural analytics with multi-factor authentication, securing access to services whilst uniquely ensuring the most frictionless and transparent user experience. They provide risk intelligence in real time, enabling organisations to intelligently adjust authentication journeys, also in real time. By pinpointing suspicious access attempts, they can step up and step down the authentication requirement, catching fraudulent activity more effectively while simultaneously removing friction for legitimate users.

Founders: Zia Hayat

Year founded: 2012

Sector: cybersecurity

Capital raised: c.$40M

www.callsign.com

"In 2012, we started out with just seven employees and a mission to create the most intelligent authentication solution on the market." - Zia Hayat, Co-Founder & CEO @ Callsign

Callsign is a cybersecurity solution on a mission to seamlessly power the identification of every web, mobile and physical interaction. To do this they hire the brightest, most inquisitive minds who want to change the rules of identity and make this mission a reality. Callsign products use deep learning techniques to combine event, threat, and behavioural analytics with multi-factor authentication, securing access to services whilst uniquely ensuring the most frictionless and transparent user experience. They provide risk intelligence in real time, enabling organisations to intelligently adjust authentication journeys, also in real time. By pinpointing suspicious access attempts, they can step up and step down the authentication requirement, catching fraudulent activity more effectively while simultaneously removing friction for legitimate users.