Home Powered by ECSO

Main navigation

  • Solutions
  • Vendors
  • Investors
  • Community
    • Announcements
    • ECSO Market Pulse Reports 2025
    • Events
    • Invest4Cyber Networking Nights
    • Articles
  • About
    • Vision & mission
    • Powered by ECSO
    • Friends of the hive
  • Matrix™
  • Register

User account menu

  • Log in
Home Powered by ECSO

Main navigation

  • Solutions
  • Vendors
  • Investors
  • Community
    • Announcements
    • ECSO Market Pulse Reports 2025
    • Events
    • Invest4Cyber Networking Nights
    • Articles
  • About
    • Vision & mission
    • Powered by ECSO
    • Friends of the hive
  • Matrix™
  • Register

User account menu

  • Log in
Home

Main navigation

  • Solutions
  • Vendors
  • Investors
  • Community
    • Announcements
    • ECSO Market Pulse Reports 2025
    • Events
    • Invest4Cyber Networking Nights
    • Articles
  • About
    • Vision & mission
    • Powered by ECSO
    • Friends of the hive
  • Matrix™
  • Register

User account menu

  • Log in

Breadcrumb

  1. Home
  2. Solutions

Streamed Access Management: The Dawn of Intent-Aware Access

by Zuzana Kovacicova from Excalibur
(0 reviews)
Visit our website
Taxonomy:
  • Protect
    • Identity Management, Authentication, & Access Control
      • Access Management

Description

Streamed Access Management - SAM
Excalibur is a unified platform that replaces the failed direct access model.

It's built on three pillars that deliver provable security by design:

  • Identity-Native Core - Unphishable MFA
  • Universal Architectural Isolation - The Stream
  • Provable Oversight - AI + Human-in-the-Loop

 

  1. IDENTITY-NATIVE CORE - Unphishable MFA

    Security begins with a verified identity. Every session starts with our built-in, passwordless Multi-Factor Authentication, eliminating the primary vector for breaches—compromised credentials—before any access is granted.

  2. UNIVERSAL ARCHITECTURAL ISOLATION - The Stream

    We stream and isolate all access to your infrastructure—legacy protocols (RDP, SSH, VNC) and all web targets. The user's endpoint device never touches your systems, creating a virtual "air gap." Our secure, outbound-only tunnel makes us topology-independent and deployable as a SaaS solution in minutes.

  3. PROVABLE OVERSIGHT - AI + Human-in-the-Loop

    Our universal stream creates the ultimate oversight point. Our AI provides real-time, preemptive governance by analyzing user intent before any actions are executed. When an anomaly is detected, the session is paused and escalated for human review through our peer verification feature. This combination of AI oversight and human-in-the-loop verification creates an immutable, provable audit trail of every action and approval.

Our EU-sovereign architecture provides the provable, legally admissible audit trail required to operate with confidence and meet national security mandates without exposing critical systems to the public internet or extra-territorial data access (e.g., US CLOUD Act).

Navigate complex regulatory landscapes, from the EU's NIS2 and DORA to regional mandates elsewhere. The platform supplies preemptive control and "court-grade" evidence of due care that regulators now demand.

Secure your OT/IT convergence. By isolating every interaction, you prevent threats from moving from an employee's laptop to the factory floor, ensuring business continuity and protecting intellectual property.

Your security stack is a complex, expensive patchwork of single-purpose tools. Excalibur unifies these controls into a single, identity-native platform with measurable savings.

Solution properties

  • Cloud, SaaS, web-based
    On-premise Windows
    On-premise Linux
  • Market independent/agnostic (Means the solution overlaps all markets, and is linked to all)
  • Direct sales

Summary on Pricing plans

  • Subscription (monthly/yearly)
    Custom pricing

Vendor overview

Excalibur

Excalibur, established in 2016, specializes in developing robust and user-friendly authentication and access solutions for organizations of all sizes. Our commitment to simplifying, yet elevating cybersecurity standards is evident in our innovative solutions, including Streamed Access Management (SAM) and phone-centric, passwordless Multi-Factor Authentication (MFA). Based in Europe, working under the guidelines of European Cybersecurity authorities, trusted by financial institutions, governments, and enterprises, we are confident to help organizations comply with NIS2 and other regulations while safeguarding critical systems. Learn more at https://getexcalibur.com.

  • Funding/Investment
  • Partner(s)

Contact details

  • Founded in 2016
  • Hranicna 12, Poprad
  • Slovakia
Visit the website Contact us
cybersecurity made in europe

Solution details

  • Mid-size business
    Large enterprise
    Public administration
  • Czech
  • English
  • Slovak
  • The vendor did not specify this data field

Support services offered by the vendor ensuring the right implementation and functioning of the solution

Email/Help Desk
FAQs/Forum
Knowledge Base
Phone Support

Training services offered by the vendor enabling the end-user to use the solution

Documentation
In Person
Live Online
Videos
Webinars

Ratings & reviews

This solution has not been reviewed yet.

Do you want to leave a rating?

Login or register to proceed

Login Register

Follow us

Subscribe to our newsletter


Footer menu

  • Contact
  • Data Privacy Policy
  • FAQ

Manage your cookie preferences 


 

European Cyber Security Organisation, asbl

Avenue des Arts 46, Brussels, 1000, Belgium | VAT: BE0656734936 - REG 656734936  
Copyright © 2024 Cyberhive ®: Discover solutions from Europe™ | Powered by ECSO, developed by Trust-IT Services srl