Available Profiles

61 profiles available 61 profile available

  • Cylance CS

    Prevent Cyberattacks
 with Artificial Intelligence. Cybersecurity that predicts, prevents, and protects

    Founded in: 2014 0 projects worked $1.00 avg prod price

    Cylance® is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over ten million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.

    • Endpoint Detection
  • NeuVector CS

    CONTINUOUS NETWORK SECURITY FOR CONTAINERS

    Founded in: 2017 0 projects worked $1.00 avg prod price

    NeuVector was founded by security, virtualization and enterprise software veterans with the vision of simple, scalable security for container based applications. We believe that in a containerized world where DevOps teams are challenged to deliver new updates ever-faster, security needs to be designed to keep up with the rapid pace. NeuVector’s ‘container firewall’ was launched at the beginning of 2017 and has since become the leading container network security solution, with customers worldwide. Our team has over 20 years of security, virtualization, and enterprise software experience from companies such as VMware, Fortinet, Cisco, and Trend Micro.

    • Cloud Security
  • RiskIQ CS

    The Pioneer, Innovator, and Leader in Digital Threat Management

    Founded in: 2011 0 projects worked $1.00 avg prod price

    With 75 percent of attacks originating outside the firewall, RiskIQ helps organizations protect businesses, customers, and brands across digital channels.

    Today’s diverse cyber threats, from ransomware, phishing, and malware to rogue mobile apps, malvertising, and social impersonation, circumvent traditional security tools and place an enormous burden on information security organizations. RiskIQ addresses the questions: (1) how compliant and susceptible are my internet-facing assets and digital brand, (2) how do external exploits, attackers, and adversary infrastructure relate to internally discovered suspicious activity, security events, and incidents, (3) what and how are cyber threats attacking my business, (4) can I manage the risk and take down the threat, and (5) are entities abusing my brand and customers?

    RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence. RiskIQ allows enterprises to gain unified insight and control over web, social, and mobile exposures. Our platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand attack surfaces, assess risk, and take action against digital threats. With RiskIQ Community Edition, all security analysts gain FREE access to our solutions within a collaborate online environment to enable organized cyber defense.

    • Threat Intelligence
  • Attivo Networks CS

    Attivo Networks In the News

    Founded in: 2013 0 projects worked $1.00 avg prod price

    Attivo Networks® is the leader in deception for cyber security defense. Founded in 2011, Attivo Networks provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments. Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Unlike prevention systems, Attivo assumes the attacker is inside the network and uses high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves. With no dependencies on signatures or attack pattern matching, the BOTsink deception server is designed to accurately and efficiently detect the reconnaissance and lateral movement of advanced threats, stolen credential, ransomware, man-in-the-middle, and phishing attacks.  The Attivo Multi-Correlation Detection Engine (MCDE) captures and analyzes attacker IPs, methods, and actions that can then be viewed in the Attivo Threat Intelligence Dashboard,  exported for forensic reporting in IOC, PCAP, STIX, CSV formats or can be used to automatically update SIEM and prevention systems for blocking, isolation, and threat hunting. The ThreatOps offering simplifies incident response through information sharing, incident response automation, and the creation of repeatable playbooks.

    • Deception
  • Cymmetria CS

    Gain the upper hand with cyber deception

    Founded in: 2016 0 projects worked $1.00 avg prod price

    Cymmetria’s deception technology offers visibility into your environment 
    and reduces the detection time and cost of advanced persistent threats.

    • Deception
  • Red Seal CS

    RedSeal. The foundation for digital resilience.

    Founded in: 2006 0 projects worked $1.00 avg prod price

    We are the measure of resilience.

    At RedSeal, our vision is to become the essential analytics and decision-making platform for building digitally resilient organizations people can trust. We do this by becoming the measure by which every organization can quantify its digital resilience. As thought leaders on resilience, we envision every organization starting the security discussion with the question “What’s our Digital Resilience Score?”

    Founded in 2004, RedSeal is headquartered in Sunnyvale, California.

    Our customers are those who depend on the most sophisticated security.

    More than 220 Global 2000 corporations and government agencies that depend on the most sophisticated security depend on RedSeal. Our commercial customers span the finance, utilities, service provider, technology and retail sectors. Our government customers include large U.S. federal agencies, including the DoD, civilian, and intelligence communities. We serve global customers in North America, Europe, and Asia.

    Our partners are world-class suppliers.

    RedSeal partners with all of the top suppliers of network infrastructure. Its software integrates with all industry-leading security, as well as with major workflow vendors, providing our customers with a comprehensive network security solution.

    • Analytics
  • Demisto CS

    Real Life Security Operations

    Founded in: 2017 0 projects worked $1.00 avg prod price

    Demisto is a well funded start-up with offices in San Francisco Bay Area & Tel Aviv, Israel. We are on a mission to make security analyst’s life easier by providing a “Collaborative and Automated Security Operations platform”. We are looking for talented developers, sales folks & IR specialist. You will get an opportunity to work with a fun loving and experienced team and to design and develop a brand new product from scratch, using cutting edge technologies such as Golang, ReactJS etc.

    • Orchestration
  • Phantom CS

    Work Smarter. Respond Faster. Strengthen Your Defenses.

    Founded in: 2016 0 projects worked $1.00 avg prod price

     

    We’re leading a revolution in the Security Operations Center (SOC) with our best-in-class security automation & orchestration platform. Our mission is to close SOC security gaps by enabling teams to work smarter, respond faster, and strengthen their defenses.

    • Orchestration
  • ZScaler CS

    Cloud from the beginning.  Built for the future.

    Founded in: 2010 0 projects worked $1.00 avg prod price

    Back in the day when your users were all on the network and your applications resided in your physical data center, it made sense to establish a secure perimeter around your network. But those days are over, the perimeter is gone, and network security is all but irrelevant.

    Instead, you need to put your defenses and controls where the connections occur— the internet — so that every connection is fast and secure, no matter how or where users connect or where their applications reside.

    By moving applications and infrastructure to the cloud and untethering employees from their desks, you can realize tremendous advantages in productivity, agility, and cost containment. With our 100% cloud built secure platform, Zscaler can help you make the move to the cloud, securely.

    • Cloud Security
  • PhishLabs CS

    Stop phishing attacks. Fight back.

    Founded in: 2010 0 projects worked $1.00 avg prod price

    We fight back against the exploitation of people.
    PhishLabs provides 24/7 services that help organizations protect against the cyberattacks targeting their employees and their customers.
    Top organizations worldwide, including 4 of the 5 largest U.S. financial institutions, trust PhishLabs to fight back against cyberattacks targeting their employees and their customers. Using a powerful combination of proprietary technology, specialized security operations, and deep threat intelligence, we detect threats early in the attack process and take rapid action to mitigate attacks before damage is done. In doing so, we reduce the risk of compromised systems, data breaches, and online fraud.
    The vast majority of cyberattacks start by targeting and exploiting people. Why? Because every organization has people, and those people are vulnerable. Unlike technology, people cannot be patched to remove their vulnerability.
    PhishLabs was founded in 2008 to fight back against attacks that exploit people. We believe that to stop these attacks, aggressive action must be taken to disrupt the infrastructure and operations that support them. We provide a full range of services to detect these attacks 24/7, extract intelligence on the attack operations, and quickly mitigate the underlying infrastructure to stop the threat.

    • Phishing
1 2 3 4 5 7