60 profiles available 60 profile available
Zero Trust Cybersecurity
Threat Hunting and Response | Security Consulting
Founded in 2008 and headquartered in Indianapolis, Indiana, the company takes a pragmatic, scalable approach, bringing sanity to the security process. From technical and governance advising to proactive threat hunting, log monitoring, and endpoint protection, Pondurance empowers companies to manage reputational, financial, and regulatory risk. By providing expert consulting and cost-effective managed services, we have helped over 200 companies in North America and Europe better protect critical assets, reduce risk and compliance exposure, and improve their security postures.
Acalvio provides Advanced Threat Defense solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and Data Science. This enables a DevOps approach to deploying enterprise-scale pervasive deception, with low IT administrative overhead. Acalvio delivers comprehensive threat intelligence by integrating with other ‘best in class’ solutions in the security industry, enabling customers to benefit from defense in depth; reduce false positives; and derive actionable intelligence for remediation. The Silicon Valley based company is led by an experienced team with a track record of innovation and market leadership and backed by marquee investors. For more information, please visit www.acalvio.com
The product provides security protection for endpoint systems and data center servers from zero-day attacks without relying on patches. The product can be deployed onto a.public cloud or in private cloud or on premises.
Predictive Threat Intelligence
Seclytics is the premier one-stop cyber threat intelligence correlation and prediction platform. Seclytics monitors changes in internet infrastructure, flags suspicious activities by cyber criminals, and predicts future attacks before they are launched.
Area 1 Security stops phishing attacks, the root cause in over 95% of cyberattacks.
Area 1 Security preempts phishing across email, web, network up to 363 days before they are launched with our globally distributed ActiveSensors and extensive pre-attack small pattern analytics.
AI x Cyber Security
JASK has created the first Security Operations Platform powered by AI to accelerate security teams in finding and mitigating cyber threats.
Everything is connected. Be prepared
We protect against IoT connected devices. Started in Berlin….
You deserve a better SIEM
SIEM Vendor was started by John with a deep SIEM background. It is the next generation of SIEM in order to see everything. We saw the need for smarter rules and more scalable architecture. More can be seen in the About Us section of our website.
To see my completed RFI, please invite me to your project to begin messaging through the platform. This is no obligation of selection.
There are no results that match your search!