Alliances

If we’re not experts at it, we know someone who is. This gives our clients access to our wide professional ecosystem - through Ampyx Cyber - to minimize the need for multiple contracts. We’re very proud to have agreements with the following top-notch companies:

 
 

Convergence Controls & Engineering

Convergence designs, programs, and supports industrial automation systems across all major industries including energy, food and beverage, water treatment, manufacturing and more. Convergence further helps companies get real-time data from their production equipment for dashboarding and enterprise wide reporting. Services include system engineering, specification, project management, procurement, control panel design and fabrication, commissioning services and 24x7 support. From Allen-Bradley to Zedi, IO to SCADA, Power and Control, we design, fabricate, commission, support and manage all of your electrons within your facility.

 
 

Cutaway Security

Cutaway Security, a veteran owned company, is a team of seasoned information security professionals who stand ready to assist you with your daily or emergency security efforts. We feel that security starts with a solid foundation of understanding an organization’s assets, people, and business requirements. We will leverage this philosophy and our unique experiences in the manufacturing, energy, media, and service industries to help accurately scope and complete your next security effort.

 
 

Egede industrial cybersecurity

Egede is a distinguished leader in industrial and critical infrastructure cybersecurity, offering an extensive range of expert services to safeguard complex systems and environments. With years of specialized experience, Egede stands as a trusted advisor in cybersecurity, providing comprehensive solutions from security design and architecture to in-depth technical tasks such as malware analysis and cybersecurity assessments. Recognized for its "offensive thinking" approach, Egede delivers tailored industrial cybersecurity analyses, penetration testing, and application testing, ensuring reliable protection tailored to the unique needs of each client. Committed to excellence and innovation, Egede's team of seasoned professionals is dedicated to advancing the standards of cybersecurity, making them a preferred partner for both large and small companies looking to fortify their defenses against evolving threats.

 
 

Full circle strategic communications

A woman-owned business founded in 2006, FullCircle Communications LLC is a boutique consultancy specialized in cybersecurity, cybersecurity education, and strategic support services in engineering and related disciplines. Our customers and partners include the Department of Defense, the State of California’s Manufacturing Exchange Partnership with the National Institute of Standards and Technology, South Carolina, Michigan, and Universities. We maintain a strong network of companies, Universities, FFRDCs, and consultants to ensure the strongest and best support to our customers and partners.

 
 

GRIMM

GRIMM is a forward-thinking cybersecurity organization led by industry experts. The company's practice demonstrates the impact of security risks and provides technical solutions to address top risks. GRIMM's expertise is built on operational experience in solving advanced cybersecurity problems.

 
 

IICS Alliance

The International Industrial Control Security Alliance (IICS Alliance) is a global ecosystem of best-in-class firms focused on ICS/OT cybersecurity. We empower OT/ICS and infrastructure businesses globally by integrating superior, tailored cybersecurity services, ensuring comprehensive protection and resilience against evolving digital threats. Ampyx Cyber is a founding member of the IICS Alliance.

 
 

INPOWERD

INPOWERD LLC is a verified Veteran Owned Small Business (VOSB) specializing in power grid operations, North American Electric Reliability regulatory compliance, risk management, physical and cyber security for the electric utility industry. INPOWERD provides strategic consulting services to clients across the United States and Canada. INPOWERD services also include executive leadership programs and coaching, strategic plans, business start-up and continuity plans, technical writing (policies and procedures), and certified training development and facilitation.

 
 

insane cyber

Founded in 2020 by Dan Gunter, Insane Cyber has quickly established itself as an upcoming leader in the cybersecurity space, focusing on using automation to protect critical infrastructure and operations in the energy, data center, government, oil and gas, and other sectors. The proprietary Valkyrie Automated Security platform provides proactive and reactive protection for operational technology, leveraging powerful automation to monitor host and network data. Valkyrie is currently trusted by multiple Fortune 200 companies.

 
 

Karta

Karta is an Integrated Risk Management software consulting firm that supports North American electric utilities with risk management, NERC and business compliance management solutions. Karta's own NERC compliance management solution is used by many electric utilities in North America, and Karta consultants spend 80% of their time working with BES organizations.

 
 

Manifest

Manifest is a venture-backed cybersecurity company focused on operationalizing software bills of materials (SBOMs) to help organizations reduce their supply chain risk. In the wake of several prominent software supply chain vulnerabilities (Log4j, Apache Struts, etc.), enterprises are turning to SBOMs to understand what open source and third party libraries are in their environments, especially in their OT/ICS where software lasts for years. While SBOM generation tools are proliferating, enterprises lacked a solution to consume and derive insights from those SBOMs - until Manifest. We provide SOC teams with a comprehensive software inventory, enabling them to answer the question, "Where do I have Log4j?" in seconds instead of weeks; enable Product Security to respond quickly and securely to SBOM regulations and requests; and enable GRC and third-party risk teams to easily and simply quantify the risk in vendor applications.