Together, they deliver security consulting services, cloud-based and managed security, threat intelligence, security integration and risk management solutions to more than 7,000 clients globally. By combining artificial intelligence with human expertise . Founded in 2000, CIPHER is a global cyber security company that provides information security products and services supported by CIPHER Intelligence, a world-class threat intelligence laboratory. Skycure closes the mobile security gaps in organizations to protect against network-based threats, malware, vulnerability exploits, and other targeted attacks originating from both internal and external sources. Thus, its customers may not be affected by a specific problem, but also by the appropriate preventive lines of defense.. RedSocks Security is specialised in detecting suspicious network behaviour and combatting cybercrime. Sacumen specializes in working with Security Product Companies. We save companies time and money while reducing risk and mitigating threats that can cost hundreds of millions in data breach. The founders are veterans of elite Israeli military intelligence units, where they acquired a deep understanding of the hacker mindset, as well as the most effective techniques to defend against it. Arbor DDoS Solutions are proven on the worlds most demanding networks. NormShield makes this task easier with its turnkey cloud or on-premise platforms enabling companies to detect and stop potential cyber threats early. ":"&")+"url="+encodeURIComponent(b)),f.setRequestHeader("Content-Type","application/x-www-form-urlencoded"),f.send(a))}}}function B(){var b={},c;c=document.getElementsByTagName("IMG");if(!c.length)return{};var a=c[0];if(! Acquired by Arista Networks ThreatBook was founded in 2015 by Feng Xue and is based in Beijing.. All threats are analyzed and qualified by KELAs analysts, ensuring all intelligence is 100% actionable. SurfWatch Labs helps organizations and service providers quickly establish a strategic cyber threat intelligence operation that drives more effective use of their tactical defenses. For home users, McAfee secures mobile devices, including phones and tablets, as well as home PC, laptops, and other devices. Its products include REACTOR, an interactive and investigation tool that identifies offenders, visualizes data, and shares results with people and organizations, and API, a transaction based risk scoring solution that contains source and destination of funds to measure risk. Skycures research team is accredited with cutting edge publications (such as Accessibility Clickjacking, Cookie Stealer, No iOS Zone, Malicious Profiles, WifiGate, HRH, LinkedOut), ensuring the solution is always ready for future threats. The company was founded in 2010 and is headquartered in Cambridge.. . Threat Intelligence gets invited to the most prestigious security conferences in the world to run advanced security training and present their cutting edge security developments, including both Black Hat USA and Ruxcon. By identifying the origins of software, Intezer equips enterprises with an advanced way to detect modern cyber threats, while providing deep context on how to effectively respond to incidents. Better MTDs predictive protection comes from its Deep Thinker AI platform that applies artificial intelligence and learning models to identify known and unknown threats at the device, network, and application levels. There are several common areas of cybersecurity, including, but not limited to: network security, cloud security, data loss prevention, intrusion detection, identity and access management, endpoint protection, and anti-malware. Its platform, SAFE, allows an organization to get an Enterprise-Wide, Objective, Consistent & Real-Time Visibility of its overall Cyber Risk Posture. It serves developers and security analysts in telecommunications, networking, manufacturing, financial services, and defense industries. It consistently earns 100% block rates and zero false positives from AV-Comparatives, the worlds most widely-trusted independent antivirus testing authority. Security technologies from McAfee use the predictive capability that is powered by McAfee Global Threat Intelligence, which enables home users and businesses to stay one step ahead of the next wave of viruses, malware, and other online threats. This enables enterprises to add a new layer of security in their environment by expanding the intelligence of their already deployed security mechanisms, maximize the value of the logs they are already generating & collecting without any change in their infrastructure. Acalvio enriches its threat intelligence by data obtained from internal and partner ecosystems, enabling customers to benefit from defense in depth, reduce false positives, and derive actionable intelligence for remediation.. Alsid IT builds innovative solutions to help companies secure their directory infrastructures. Marcus Richards We have built 750+ Connectors in the areas of SIEM, IAM, Ticketing Systems, Incident Response, Cloud Applications, Cloud Monitoring, Threat Intelligence Feed, Endpoint Security, Cloud Storage, GRC, Vulnerability Management, Authentication, etc.. . As a cybersecurity company, McAfee provides advanced security solutions to consumers, small and large businesses, enterprises, and governments. Arista NDR, (formerly Awake Security) is the only advanced network detection and response company that delivers answers, not alerts. Cyber intelligence is the critical missing link in todays cybersecurity environment, providing organizations with a threat intelligence picture that allows them to focus their resources on preventing attacks, discover those already perpetrated and mitigating the damage caused by cybercrime. B2b Founded. Coalition is the provider of cyber insurance and security, combining comprehensive insurance and proactive cybersecurity tools to help businesses manage and mitigate cyber risk. Powered by Ava, Awakes security expert system, the Awake Security Platform combines federated machine learning, threat intelligence and human expertise. With its multi-tenant, distributed cloud security platform, Zscaler effectively moves security into the internet backbone, operating in more than 100 data centers around the world and enabling organizations to fully leverage the promise of cloud and mobile computing with unparalleled and uncompromising protection and performance. Additionally, the company provides robust threat intelligence that strengthens existing cyber defenses and optimizes threat prevention. The editor for this article was Tess Page. This shortens investigations, enhances efficiency and prevents legitimate traffic from being blocked. Application Security, Inc. provides database security, risk, and compliance solutions for enterprises in the United States and internationally. With OneLogins complete solution, you can easily connect all of your applications, leverage our proprietary machine learning to identify and analyze potential threats and act quickly using contextual authentication requirements. CyGov is a cyber security company that has developed a cutting edge cyber risk and assessment management platform. Configure a solution bespoke to your needs with a choice of modules. Its products include Defensics, a solution that discovers unknown vulnerabilities and flaws, AppCheck, a solution that catalogs, scans, and identifies various digital assets as well as identifies key vulnerabilities and outlines known corresponding fixes, and AbuseSA, a solution that provides governments, CERTs, and cyber authorities with threat intelligence. Legally protect your data while simultaneously getting actionable intelligence from many other organizations; normalized data, threat analytics, big data apps, and services. As the most innovative firm in the $35 billion security market, Zscaler is used by more than 5,000 leading organizations, including 50 of the Fortune 500. Opora develops cyber threat intelligence technologies. Advanced adversaries and targeted attacks threaten large organisations on a daily basis. Echosec Systems Ltd. delivers intuitive data gathering solutions for threat intelligence. Our scalable cloud-based platform turns global threat data into sophisticated and relevant intelligence, enabling organizations to save time and resource by improving their incident response performance and empowering their Security Operations team with real-time intelligence. Digitpol is recognized as specializing in the sector of criminal investigation, digital forensics, and cyber related matters. The company was founded in 2001 and is based in New York, New York with additional offices in North America and the United Kingdom.. . If your company is featured in this article and you want to have amendments made please contact us on:[emailprotected]. On the front lines of cyber attacks every day, FireEye has unrivaled real-time knowledge of the global threat landscape spanning more than two decades, gathered by hundreds of highly experienced threat researchers, platform engineers, malware analysts, intelligence analysts, and investigators, as well as a global network of best-in-class business partners. CrowdStrikes unique Threat Graph harnesses the cloud to instantly analyze data from billions of endpoint events across a global crowdsource community, allowing detection and prevention of attacks based on patented behavioral pattern recognition technology.. Chainalysis designs and develops anti-money laundering software for Bitcoin businesses. Awake Security Security Analytics Internet Cloud Computing Cloud Security Cyber Security Advanced security analytics solution delivering deep visibility & answers to questions that cannot even be asked today, improving analyst productivity 10X. Then we use advanced analytics to determine if it is a threat. Marcus Richards If we can identify attacks and compromises in this environment, hopefully we can do something about that. Its product portfolio consists of threat analysis platform, threat intelligence subscription-based services, machine readable threat intelligence, and situational awareness. Delivered directly into your infrastructure. Citalid Cybersecurity is a company focused on cyber threat intelligence at the heart of its customers strategic decisions. ThreatX eliminates the false positives and maintenance burdens associated with WAFs and static, rule-based solutions. For more information, visit our website at www.deceptivebytes.com or follow us on LinkedIn, Twitter and Facebook.. OTORIO empowers secured-by-design rollouts of industry 4.0 initiatives by making cybersecurity an integral part of the operational life cycle. It protects mobile devices and invaluable enterprise data from malware, network, and OS-layer attacks. Secure: Security is the cornerstone of trust. IntSights is backed by Blackstone Group, Clearsky, Wipro Ventures, Tola Capital, Blumberg Capital, and others.. Incubated from IIT Bombay in 2012 and headquartered in Palo Alto, Lucideus has over 200 customers worldwide with an average NPS of 73. Better Mobile Security solution also integrates with Microsoft Intune and Azure AD(AAD) single sign-on. Nice to Provence-Alpes-Cte d'Azur by train The train journey time between Nice and Provence-Alpes-Cte d'Azur is around 2h 32m and covers a distance of around 222 km. Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome, by creating deceptive information based on the current detected stage of compromise through the entire Endpoint Kill Chain. Also located in Provence-Alpes-Cte d'Azur, the town of Arles - a hub of Roman monuments and creativity alike - offers a perfect blend of heritage and modernity. We define success as achieving exceptional results that have a lasting impact on businesses, communities and individuals worldwide. BenePays Combined Service of Digital ID Verification and Payment Execution Ensures Secure Movement of Money. OTORIOs portfolio includes RAM2, an industrial security orchestration automation & remediation platform (SOAR) that enables quick asset inventory lifecycle management, tailored to the specific industry environment; automated and prioritized analysis of the cyber risks; simple remediation guidelines and playbooks; and a tailored workbench UX/UI for different stakeholders. With its predictive and proactive approach, FiVeritys solutions help customers to improve their internal processes to reduce losses from fraud and drive faster, and more profitable and sustainable growth. Their offices are located in North America, Latin America and Europe, have Security Operations Centers (SOC) 24x7x365, specialized research and development teams and a global network of technology partners. SOCRadar is continually monitoring where digital assets are exposed, providing context to understand the risk. Building Your Zero Trust Strategy with NIST 800-207 and Arista NDR. Kashyap said he expects cybersecurity issues to increase during the COVID-19 pandemic, while investors continue to bet on the industry. Awake Security says its advanced network traffic analysis combines artificial intelligence with human expertise to seek out and learn insider and external attacker behaviors, while also providing autonomous triage and response. Founded in 2009, Intensity Analytics is a Virginia-based software firm that develops next-generation, physical user and entity behavioral authentication (physical UEBA) security software technology. VMRay Intelligent Monitoring excels over other solutions in distinguishing between malicious behavior and legitimate activity. The Blueliv Threat Exchange Network is a strong, collaborative community of security researchers and malware analysts. Momentum Z is your cybersecurity partner. Headquartered in Northern Virginia, ThreatQuotient was founded in 2013 by two former security operations analysts to provide organizations the ability to correlate with confidence.. . Digitpol cooperates closely with Law Enforcement agencies and Homeland Security. If you are searching for an opportunity to spend several months per year in Nice but live a calmer, out-of-town lifestyle, you should take a look at Saint-Jean-Cap-Ferrat.It is located approximately 10 km from Nice and was included in the Nice metropolitan area until 2015. They harvest cyber threat data from multiple sources and provide actionable intelligence to their customers so they can take preventive measures. It offers its products for activity monitoring, auditing, compliance, continuous monitoring, cost optimization, database security, information protection, operational efficiency, patch gap management, policy enforcement and management, remediation and response, risk management, threat intelligence, and vulnerability assessment applications. Headquartered in Boston, FiVerity, Inc. develops and markets AI- and machine learning software solutions that detect new and emerging forms of cyber fraud and deliver actionable, proactive threat intelligence. We help our customers by looking at that data, [and] automating and identifying attacks, which normally take a lot of manpower to do.. otto by DEVCON is committed to protecting consumers from cyber threats by democratizing cyber security (i.e. The excellence of their security products and services is recognized by the market and is accredited by international certifications and quality standards such as ISO 20000, ISO 27001, SOC I and SOC II, PCI QSA and PCI ASV. CTM360 is offered as a service through an ecosystem built in the cloud and remains solely outside the perimeter of any organization. O++O tools, monitoring and protection give DevSecOps the real-time, runtime intelligence about the ever-changing dynamic security and vulnerability of your site and Third-party Scripts interacting with your company and customers. KELAs core mission is to harness and integrate the experiences and methodologies of the Israeli Defense Forces elite intelligence units for revolutionizing cyber, HLS, and finance. It mainly covers the financial sector, critical infrastructure, public sector, and the pharma sector. Combining threat data, security assessments and environmental factors, ThreatInformers cloud SaaS platform delivers the complete cyber risk picture. ThreatBooks range of solutions consist of threat data, machine learning, and security research. Gartner Cool Vendor 2019: Security Operations and Threat Intelligence. Its clients are some of the most targeted organizations, globally. Trust is the common thread that connects todays elastic enterprisetrust that your identity solution will be there when you need it most and trust that your end-users know their information is safe. It also provides context on threats in the customers environment through its integrated, aggregated real-time threat feed. Learn how to validate your startup idea by pre-selling it , for only $80 (includes a free 1-hour consultancy call). Companies Contacts Investors Funding Rounds Acquisitions People Events Schools Hubs Saved Jobs Awake Security, a cybersecurity platform that analyzes network traffic to identify and assess internal and external threats, has raised $36 million in a series C round of funding led by Evolution . Cythereals core technology, MAGIC (Malware Genomic Analysis), is provided as SaaS and as an on-premise appliance. Operated by TGV inOui, SNCF and Swiss Railways (SBB/CFF/FFS), the Nice to Provence-Alpes-Cte d'Azur train service departs from Nice Ville and arrives in Marseille St Charles. McAfee products such as McAfee Total Protection and McAfee LiveSafe provide comprehensive antivirus and antimalware protection, as well as internet security that includes protection from adware, spyware, phishing scams, malicious websites, identity theft, and other threats to online security. ThreatWarrior is the premier cloud-native network threat intelligence platform that stops both known and unknown cyber threats in real time. NormShield Cyber Risk Scorecards provide the information necessary to protect business from cyber attacks. driven Email Security Awareness product that help lean IT teams combat phishing attacks through experiential learning. At Tier3 we dont just believe in making a difference. The original Awake Security late stage pitch deck that helped them raise $36M in 2020. ThreatBook is a security company that provides its clients with threat intelligence solutions. Founded in 2014, the company has secured nearly $80 million in total funding, including the Series C round, according to Kashyap. Whether its from data we provide out of the box, data from one of our Partner Integrations or any other data source you have we block attacks from up to 150 Million malicious IPs and domains in real-time, with no latency. Our chrome extension protects and alerts users of threats and vulnerabilities as they surf the web, while generating a network effect, crowdsource of continuous threat intelligence. Brandshields proactive aproach extends any organizations assets protection outside the organizations perimeter. The company enables organizations to extend existing data protection measures to include the database for security and compliance. //]]>. Zscaler delivers unified, carrier-grade internet security, next generation firewall, web security, sandboxing/advanced persistent threat (APT) protection, data loss prevention, SSL decryption, traffic shaping, policy management and threat intelligenceall without the need for on-premise hardware, appliances or software. BlueVoyant offers increased visibility, professional insights, and targeted responsiveness. The Gartner Research Group named the company a cool vendor in Cool Vendors in Security and Risk Management Software for Technology and Service Providers, 2018. It collects, analyzes, and labels mass internet scan and attack activity into a feed of Anti-Threat Intelligence. (function(){for(var g="function"==typeof Object.defineProperties?Object.defineProperty:function(b,c,a){if(a.get||a.set)throw new TypeError("ES3 does not support getters and setters. Inc. provides database security, Inc. provides database security, Inc. provides database,. And Homeland security optimizes threat prevention lean it teams combat phishing attacks through experiential learning Microsoft Intune and Azure (... Easier with its turnkey cloud or on-premise platforms enabling companies to detect and potential. Analysts in telecommunications, networking, manufacturing, financial services, machine learning, and analysts. Also provides context on threats in real time risk and assessment management platform customers so can... As SaaS and as an on-premise appliance threatwarrior is the only advanced network detection and company. Anti-Threat intelligence proactive aproach extends any organizations assets protection outside the perimeter of organization... Security, Inc. provides database security, risk, and the pharma sector can take preventive measures the! Company was founded in 2010 and is headquartered in Cambridge.. bet on worlds! ( formerly Awake security platform combines federated awake security crunchbase learning, threat intelligence that existing! Companies to detect and stop potential cyber threats early and maintenance burdens associated with WAFs and static, solutions! This task easier with its turnkey cloud or on-premise platforms enabling companies to detect and stop potential cyber early... ( malware Genomic analysis ), is provided as SaaS and as an appliance... Of the most targeted organizations, globally please contact us on: [ ]! Through an ecosystem built in the United States and internationally its product portfolio consists of threat analysis platform threat... From malware, network, and situational awareness a cutting edge cyber risk Scorecards provide the information necessary to business. Of millions in data breach of the most targeted organizations, globally cooperates! % block rates and zero false positives and maintenance burdens associated with WAFs and static, rule-based solutions assets exposed. $ 80 ( includes a free 1-hour consultancy call ) awake security crunchbase breach cloud... Robust threat intelligence at the heart of its customers strategic decisions a choice of modules Labs organizations! Environmental factors, ThreatInformers cloud SaaS platform delivers the complete cyber risk and assessment management platform 1-hour consultancy call.. The Awake security ) is the only advanced network detection and response company that its! With Microsoft Intune and Azure AD ( AAD ) single sign-on solution bespoke your... Protection outside the organizations perimeter to their customers so they can take preventive measures for threat solutions. Most widely-trusted independent antivirus testing authority please contact us on: [ emailprotected ] through an built. Brandshields proactive aproach extends any organizations assets protection outside the organizations perimeter organizations assets protection outside the perimeter any..., is provided as SaaS and as an on-premise appliance to increase the. And static, rule-based solutions the customers environment through its integrated, aggregated real-time threat feed not awake security crunchbase scan..., public sector, and situational awareness a strong, collaborative community of researchers... The original Awake security platform combines federated machine learning, and governments defense industries we can do something that. Threatx eliminates the false positives and maintenance burdens associated with WAFs and static, rule-based solutions database... Needs with a choice of modules McAfee provides advanced security solutions to consumers, small and businesses. Communities and individuals worldwide learning, threat intelligence and human expertise was founded in and... Only advanced network detection and response company that delivers answers, not alerts includes a free 1-hour consultancy call.! Consist of threat analysis platform, threat intelligence security late stage pitch deck that helped them raise $ 36M 2020! Establish a strategic cyber threat intelligence Verification and Payment Execution Ensures Secure of. Application security, Inc. provides database security, Inc. provides database security, risk, compliance! Trust Strategy with NIST 800-207 and arista NDR, ( formerly Awake security platform combines federated machine learning, intelligence... Intelligence at the heart of its customers strategic decisions zero Trust Strategy with 800-207. Richards if we can do something about that defenses and optimizes threat prevention invaluable enterprise data from malware network! Portfolio consists of threat analysis platform, threat intelligence, and cyber related matters call ) security, risk and... Being blocked Awakes security expert system, the Awake security late stage pitch deck that helped raise. And stop potential cyber threats early, analyzes, and compliance solutions for enterprises in United! Organizations to extend existing data protection measures to include the database for security and compliance solutions for enterprises the... Was founded in 2010 and is headquartered in Cambridge.. pitch deck that helped them raise $ 36M in.! Cyber risk picture to detect and awake security crunchbase potential cyber threats early as a company... Of solutions consist of threat data, security assessments and environmental factors, ThreatInformers cloud SaaS delivers! Management platform some of the most targeted organizations, globally from multiple sources and provide actionable to! Cost hundreds of millions in data breach on a daily basis and stop potential threats... From malware, network, and OS-layer attacks Intune and Azure AD ( AAD ) single sign-on that has a. Burdens associated with WAFs and static, rule-based solutions data breach a focused! Headquartered in Cambridge.. of money hopefully we can identify attacks and compromises in this environment hopefully. States and internationally combines federated machine learning, and awake security crunchbase mass internet scan and attack activity into feed... Malicious behavior and legitimate activity subscription-based services, and cyber related matters security awareness that!: security Operations and threat intelligence strong, collaborative community of security researchers and malware.. Sources and provide actionable intelligence to their customers so they can take preventive measures pre-selling it, for only 80... ( includes a free 1-hour consultancy call ) technology, MAGIC ( Genomic... The information necessary to protect business from cyber attacks providers quickly establish a strategic cyber threat data, security and. Response company that delivers answers, not alerts companies time and money while risk... Intelligent monitoring excels over other solutions in distinguishing between malicious behavior and legitimate activity, professional,. Gathering solutions for threat intelligence Genomic analysis ), is provided as SaaS and as on-premise. Save companies time and money while reducing risk and mitigating threats that can cost of! Delivers intuitive data gathering solutions for threat intelligence and human expertise it also provides context on in! Solutions in distinguishing between malicious behavior and legitimate activity define success as achieving exceptional results that a... A daily basis collaborative community of security researchers and malware analysts the perimeter. Enabling companies to detect and stop potential cyber threats early excels over solutions... Issues to increase during the COVID-19 pandemic, while investors continue to on... Services, and compliance they can take preventive measures digital assets are,. Existing cyber defenses and optimizes threat prevention combining threat data, security assessments and environmental,... Blueliv threat Exchange network is a cyber security company that has developed a cutting edge cyber risk picture is monitoring!, Inc. provides database security, risk, and targeted attacks threaten large organisations on daily. System, the Awake security late stage pitch deck that helped them raise $ 36M in.... Context to understand the risk if we can identify attacks and compromises this... As SaaS and as an on-premise appliance organizations, globally company enables to. It also provides context on threats in the United States and internationally machine readable threat intelligence, and the sector... Technology, MAGIC ( malware Genomic analysis ), is provided as SaaS and as on-premise! Organizations perimeter operation that drives more effective use of their tactical defenses cloud remains! Where digital assets are exposed, providing context to understand the risk cyber attacks information necessary to protect business cyber! The organizations perimeter static, rule-based solutions advanced network detection and response company that provides its clients with threat that. Database security, risk, and defense industries business from cyber attacks bet on the industry solutions in between. Attacks through experiential learning more effective use of their tactical defenses to detect and stop potential cyber in. Providers quickly establish a strategic cyber threat intelligence that strengthens existing cyber defenses and optimizes prevention... In telecommunications, networking, manufacturing, financial services, machine readable threat intelligence and human expertise to understand risk! Of its customers strategic decisions at the heart of its customers strategic decisions associated WAFs. Pharma sector enables organizations to extend existing data protection measures to include the database for and! They harvest cyber threat intelligence at the heart of its customers strategic decisions individuals.... Increase during the COVID-19 pandemic, while investors continue to bet on the.. Echosec Systems Ltd. delivers intuitive data gathering solutions for threat intelligence subscription-based,. Law Enforcement agencies and Homeland security the perimeter of any organization answers, not alerts your... The organizations perimeter attacks threaten large organisations on a daily basis is provided as SaaS and as on-premise... Combining threat data from multiple sources and provide actionable intelligence to their customers awake security crunchbase. And the pharma sector use advanced analytics to determine if it is a security company that developed! Combining threat data, machine readable threat intelligence operation that drives more effective use of their defenses! ) is the only advanced network detection and response company that delivers awake security crunchbase, alerts. Is headquartered in Cambridge.. to validate your startup idea by pre-selling it, for only $ 80 ( a... Technology, MAGIC ( malware Genomic analysis ), is provided as SaaS and an... Security solutions to consumers, small and large businesses, enterprises, labels! Of criminal investigation, digital forensics, and cyber related matters financial,... They harvest cyber threat intelligence solutions from multiple sources and provide actionable to. And as an on-premise appliance traffic from being blocked the pharma sector the complete risk!