Define: Threat intelligence?
Threat intelligence is the “cyclical practice” of planning, collecting, processing, analyzing and disseminating information that poses a threat to applications and systems. Threat intelligence collects information in real-time to showcase the threat landscape for identifying threats to a computer, application or network. This information is gathered from a number of resources and compiled into a single database enabling visibility into vulnerabilities and exploits actively being used on the internet by threat actors. Threat intelligence is not to be confused with vulnerability management.
Top Digital Threat Intelligence Companies and Solutions
This article showcases Threat.Technology’s top picks for the best Digital Threat Intelligence solutions. We selected these companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
CrowdStrike is a cybersecurity technology firm pioneering next-generation endpoint protection, delivered as a single integrated cloud-based solution. CrowdStrike’s Falcon platform stops breaches by detecting all attack types, even malware-free intrusions, providing five-second visibility across all current and past endpoint activity while reducing cost and complexity for customers.
CrowdStrike’s Falcon platform is delivered via the security industry’s only 100% native cloud architecture, integrated with 24/7 managed hunting capabilities and in-house threat intelligence and incident response teams. CrowdStrike’s unique Threat Graph harnesses the cloud to instantly analyze data from billions of endpoint events across a global crowdsourcing community, allowing detection and prevention of attacks based on patented behavioral pattern recognition technology..
Zscaler is revolutionizing internet security with the industry’s first Security as a Service platform. As the most innovative firm in the $35 billion security market, Zscaler is used by more than 5,000 leading organizations, including 50 of the Fortune 500.
Zscaler ensures that more than 13 million users worldwide are protected against cyber attacks and data breaches while staying fully compliant with corporate and regulatory policies. Zscaler is a Gartner Magic Quadrant leader for Secure Web Gateways and delivers a safe and productive internet experience for every user, from any device and from any location—100% in the cloud.
With its multi-tenant, distributed cloud security platform, Zscaler effectively moves security into the internet backbone, operating in more than 100 data centers around the world and enabling organizations to fully leverage the promise of cloud and mobile computing with unparalleled and uncompromising protection and performance. Zscaler delivers unified, carrier-grade internet security, next generation firewall, web security, sandboxing/advanced persistent threat (APT) protection, data loss prevention, SSL decryption, traffic shaping, policy management and threat intelligence—all without the need for on-premise hardware, appliances or software..
ThreatQuotient is a threat intelligence platform (TIP) that centrally manages and correlates unlimited external sources with all internal security and analytics solutions for contextual, operationalized intelligence in a single pane of glass. It provides Indicator Nurturing, which goes beyond enrichment to help customers tailor indicators of compromise (IOCs) more specifically to their infrastructure.
It improves the efficiency and effectiveness of security operations with a platform that accelerates and simplifies investigations and collaboration within and across teams and tools. Integrating an organization’s existing processes and technologies into a unified workspace, ThreatQuotient’s solutions reduce noise, highlight top priority threats, and automate processes to provide greater focus and decision support while maximizing limited resources.
Its threat-centric approach supports multiple use cases including incident response, threat hunting, spear phishing, alert triage, and vulnerability management, and also serves as a threat intelligence platform. ThreatQuotient has been recognized for product excellence and industry leadership by several award programs in 2021.
It has won four 2021 Globee Cybersecurity Excellence Awards, including Gold for Security Investigation, Silver for both Threat Intelligence Technology and Hot Security Company of the Year, and Bronze for Threat Hunting, Detection, Intelligence, and Response. ThreatQuotient also won three 2021 Cybersecurity Excellence Awards: Gold for Security Investigation, and Silver for both Threat Detection, Intelligence and Response, and Best Cybersecurity Company.
Additionally, ThreatQuotient was recognized as McAfee Partner of the Year for the second consecutive year and the company was listed in the 2021 CRN Partner Program Guide. Headquartered in Northern Virginia, ThreatQuotient was founded in 2013 by Ryan Trost and Wayne Chiang..
Coalition offers cyber insurance and security, combining comprehensive insurance and proactive cybersecurity tools to help businesses manage and mitigate cyber risks. Coalition provides companies with up to USD $15 million of cyber and technology insurance coverage, as well as CAD $20M of coverage in Canada.
Coalition’s cyber risk management platform provides automated security alerts, threat intelligence, expert guidance, and cybersecurity tools to help businesses remain resilient in the face of cyberattacks. Coalition was co-founded by John Hering and Joshua Motta in 2017 and is headquartered in San Francisco, California, United States..
FireEye is a cyber security company that combines the automation of technology with unparalleled frontline human expertise, including industry-recognized services and nation-state grade threat intelligence. On the front lines of cyber attacks every day, FireEye has unrivaled real-time knowledge of the global threat landscape spanning more than two decades, gathered by hundreds of highly experienced threat researchers, platform engineers, malware analysts, intelligence analysts, and investigators, as well as a global network of best-in-class business partners.
This unique understanding of how organizations combat cyber attacks guides the products FireEye builds. Working as a seamless, scalable extension of customer security operations, FireEye offers a unified platform called Helix that integrates and analyzes the data from security assets to offer real answers about the threats that matter.
With innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant consultants, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, respond to, and remediate cyber attacks.. .
The proliferation of digital access has made the world more connected than ever before. Trust is the common thread that connects today’s elastic enterprise–trust that your identity solution will be there when you need it most and trust that your end-users know their information is safe.
The OneLogin Trusted Experience Platform is the identity foundation to build secure, scalable and smart trusted experiences that connect people with technology. With OneLogin, seamlessly manage digital identities for your workforce and customers, so you can focus on what matters most–growing your business.
With OneLogin’s complete solution, you can easily connect all of your applications, leverage our proprietary machine learning to identify and analyze potential threats and act quickly using contextual authentication requirements. Secure: Security is the cornerstone of trust.
It’s the confidence that your identity solution is reliable and always-on, so you can focus on what matters–growing the business. The OneLogin platform protects your organization against threats by securing and centralizing your applications, devices, and end-users all in one, easy-to-access place.
Additionally, through our advanced machine learning capabilities, OneLogin can deliver real-time threat intelligence to help automate the process of keeping your business secure. Scalable: The OneLogin Trusted Experience Platform was built for performance and reliability at scale.
With a wide breadth of extensible functionality, we can expand and retract according to the changing needs of your business. Through our enterprise-grade change management solutions, like our Enterprise Sandbox and API Access, you can quickly test large-scale changes before going live in your production instance.
CybelAngel is a cybersecurity startup detecting data-leaks where others don’t. The company finds data that has been stolen, or data that has been leaked by accident – generally by third-party partners and suppliers.
Its solution scans the visible, deep and dark webs, but it is also the only one scanning the major source of negligent leaks: Connected Storage. Its approach to data-leak detection combines Artificial Intelligence and human expertise.
Smart algorithms ensure rapid and precise detection, while machine learning focuses alerts based on what is most important to their clients. And yet it’s not machines that put together your alerts – it’s people.
Its cyber analysts compile a report for every incident, with all the information needed for a swift remediation.. .
BlueVoyant is a cybersecurity company that enables cybersecurity defense and protection through technology and tailored services. The company provides advanced cyber threat intelligence managed security services and proactive professional services with forensic capabilities for incident response and remediation.
They help large enterprises with impactful intelligence and offer small and medium enterprises the same kind of software and level of services that large enterprises enjoy all from a world-class team of experts that would be challenging to amass directly. BlueVoyant offers increased visibility, professional insights, and targeted responsiveness.
The company was founded in 2017 and is headquartered in New York, NY, USA.. .
ThreatBook is a security company that provides its clients with threat intelligence solutions. ThreatBook’s range of solutions consist of threat data, machine learning, and security research.
Its product portfolio consists of threat analysis platform, threat intelligence subscription-based services, machine readable threat intelligence, and situational awareness. ThreatBook was founded in 2015 by Feng Xue and is based in Beijing..
IntSights is an external threat intelligence and protection platform, designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect and prevent threats at their source before they even reach the perimeter.
The founders are veterans of elite Israeli military intelligence units, where they acquired a deep understanding of the hacker mindset, as well as the most effective techniques to defend against it. IntSights is backed by Blackstone Group, Clearsky, Wipro Ventures, Tola Capital, Blumberg Capital, and others..
Awake Security is the only advanced network traffic analysis company that delivers a privacy-aware solution capable of detecting and visualizing behavioral, mal-intent and compliance incidents with full forensics context. Powered by Ava, Awake’s security expert system, the Awake Security Platform combines federated machine learning, threat intelligence and human expertise.
The platform analyzes billions of communications to autonomously discover, profile and classify every device, user and application on any network. Through automated hunting and investigation, Awake uncovers malicious intent from insiders and external attackers alike.
The company is ranked #1 for time to value because of its frictionless approach that delivers answers rather than alerts.. .
EclecticIQ is a global threat intelligence, hunting and response technology provider. Its clients are some of the most targeted organizations, globally.
To build tomorrow’s defenses today, they have to understand the threats against them – and align their efforts and investments to mitigate their risks. EclecticIQ helps governments, large enterprises and service providers manage threat intelligence, create situational awareness and adopt an intelligence-led cybersecurity approach.
EclecticIQ extended its focus towards hunting and response with the acquisition of Polylogyx’s endpoint technology in 2020. Founded in 2014, EclecticIQ operates globally with offices across Europe, North America, and via value-add partners.
More info: www.eclecticiq.com. .
McAfee is an online security company that provides virus alerts and analysis on malware, network security threats, and web vulnerabilities. As a cybersecurity company, McAfee provides advanced security solutions to consumers, small and large businesses, enterprises, and governments.
Security technologies from McAfee use the predictive capability that is powered by McAfee Global Threat Intelligence, which enables home users and businesses to stay one step ahead of the next wave of viruses, malware, and other online threats. For business, enterprise, and government, McAfee provides comprehensive, integrated information security solutions that cover any environment.
Their endpoint and mobile security solutions protect end-user devices from threats, including viruses, phishing, malware, and other threats that target endpoints and users and include antivirus software and web security protection. Their network security solutions protect a network and its perimeter.
McAfee solutions protect servers, databases, and data centers from threats that target enterprise systems. Their cloud security solutions provide advanced protection from online threats, whether they are using public, private, or hybrid cloud computing technologies.
All their security solutions are managed through the centralized, single-console McAfee ePolicy Orchestrator that allows efficient and responsive management of the security infrastructure. Finally, McAfee Professional Services provide consulting, education, and technical support for all their security products and solutions.
For home users, McAfee secures mobile devices, including phones and tablets, as well as home PC, laptops, and other devices. McAfee products such as McAfee Total Protection and McAfee LiveSafe provide comprehensive antivirus and antimalware protection, as well as internet security that includes protection from adware, spyware, phishing scams, malicious websites, identity theft, and other threats to online security.
Headquartered in Boston, FiVerity, Inc. develops and markets AI- and machine learning software solutions that detect new and emerging forms of cyber fraud and deliver actionable, proactive threat intelligence.
The company’s products meet the unique requirements of financial institutions, including banks, credit unions, and credit card providers. The company’s solutions help financial institutions strengthen, streamline and scale their consumer-facing business processes, such as application processing, credit verification, and customer onboarding.
With its predictive and proactive approach, FiVerity’s solutions help customers to improve their internal processes to reduce losses from fraud and drive faster, and more profitable and sustainable growth.. .
Cybersixgill is the leader in cyber threat intelligence enablement and enrichment. Their fully automated threat intelligence solutions help organizations fight cyber crime, detect phishing, data leaks, fraud and vulnerabilities as well as amplify incident response – in real-time.
The Cybersixgill Investigative Portal empowers security teams with contextual and actionable insights as well as the ability to conduct real-time investigations. Rich data feeds such as Darkfeed™ and DVE Score™ harness Cybersixgill’s unmatched intelligence collection capabilities and deliver real-time intel into organizations’ existing security systems.
Most recently, Cybersixgill introduced agility to threat intel with their CI/CP methodology (Continuous Investigation/Continuous Protection). Current customers include enterprises, financial services, MSSPs, governments and law enforcement entities..
Intezer introduces a Genetic Malware Analysis technology, revolutionizing cyber threat detection and response. By identifying the origins of software, Intezer equips enterprises with an advanced way to detect modern cyber threats, while providing deep context on how to effectively respond to incidents.
Intezer offers solutions for incident response automation, cloud workload protection, threat intelligence, and more. For more information, visit www.intezer.com..
The VMRay Platform is a breakthrough solution for dynamic analysis of advanced threats, including zero day and targeted attacks. By surmounting inherent flaws that plague other products, VMRay Analyzer has become the gold standard for malware sandboxing among leading DFIR teams worldwide.
The core of the VMRay Platform is an agentless, hypervisor-based sandbox, which is unique in combining near-total evasion resistance with full visibility into malware behavior: a trait we call X-Ray Vision. Because nothing touches or modifies the analysis environment, monitoring is invisible, and even the most evasive malware strains fully execute in the sandbox.
By monitoring every interaction between malware and the target system, VMRay captures a complete and accurate record of threat behavior – data that enriches detection, incident response, digital forensics, and threat intelligence. VMRay Intelligent Monitoring excels over other solutions in distinguishing between malicious behavior and legitimate activity.
As a result, VMRay Analyzer delivers precise, noise-free output that reduces false positive rates to near zero. This shortens investigations, enhances efficiency and prevents legitimate traffic from being blocked.
Cyberint is a global threat intelligence provider focusing on helping its clients to proactively protect their businesses against cyber threats. As a partner to direct-to-consumer businesses worldwide, Cyberint provides organizations with a unique combination of a market-proven digital risk protection platform and expert cyber analysts.
This combination enables establishing an effective Cyber Threat Intelligence program while reducing organizations’ TCO. We serve more than 100 brands worldwide across industries as diverse as financial services, retail, gaming, entertainment, and media..
ThreatConnect® arms organizations with a powerful defense against cyber threats and the confidence to make strategic business decisions. Built on the industry’s only intelligence-driven, extensible security platform, ThreatConnect provides a suite of products designed to meet the threat intelligence aggregation, analysis and automation needs of security teams at any maturity level.
More than 1,600 companies and agencies worldwide deploy the ThreatConnect platform to fully integrate their security technologies, teams, & processes with relevant threat intelligence resulting in reduced detection to response time and enhanced asset protection.. .
AT&T CyberSecurity provides threat intelligence, collaborative defense, and security solutions for businesses. The company is uniquely positioned to deliver security without the seams through people, process, and technology, which will provide unrivaled visibility for the customers.
AT&T CyberSecurity was founded in 2007 and is headquartered in San Mateo, California.. .
Incubated from IIT Bombay in 2012 and headquartered in Palo Alto, Lucideus has over 200 customers worldwide with an average NPS of 73. Backed by John Chambers and senior executives from SoftBank, Sequoia, PayPal, Adobe and McKinsey & Co., it was also one of the Top 5 Contributors to the NVD of the U.S.
Government in 2019. Its platform, SAFE, allows an organization to get an Enterprise-Wide, Objective, Consistent & Real-Time Visibility of it’s overall Cyber Risk Posture.
Built on supervised machine learning engine, SAFE gives an output both in the form of a breach likelihood score (between 0-5) and the $ value Risk the organization is sitting on, along with providing prioritized actionable insights based on technical cybersecurity signals, external threat intelligence, and business context of what and where are the “weakest links” across people, process and technology. The company, since 2018, has also been working with MIT for a joint research and development on the SAFE Scoring Algorithm and has received several awards including the Morgan Stanley CTO Innovation Award 2019..
NormShield provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring. They harvest cyber threat data from multiple sources and provide actionable intelligence to their customers so they can take preventive measures.
Technology quickly changes and evolves, so does the security posture of a system. Keeping a system secure is a difficult task.
NormShield makes this task easier with its turnkey cloud or on-premise platforms enabling companies to detect and stop potential cyber threats early. NormShield Cyber Risk Scorecards provide the information necessary to protect business from cyber attacks.
The scorecards provide a letter grade and a drill down into the data for each risk category so that remediation of vulnerabilities can be prioritized.. .
RiskSense®, Inc. provides vulnerability prioritization and management to measure and control cybersecurity risk.
The cloud-based RiskSense platform uses a foundation of risk-based scoring, analytics, and technology-accelerated pen testing to identify critical security weaknesses with corresponding remediation action plans, dramatically improving security and IT team efficiency and effectiveness. The company delivers a fully-informed picture of group, department, and organizational cybersecurity risk with our credit-like RiskSense Security Score (RS3).
The RiskSense platform continuously correlates customer infrastructure with comprehensive internal and external vulnerability data, threat intelligence, human pen test findings, and business asset criticality to measure risk, provide early warning of weaponization, predict attacks, and prioritize remediation activities to achieve security risk goals. It primarily serves defense organizations, financial services companies, national law enforcement and intelligence agencies, and banks.
NetWitness Corporation has a strategic partnership with Phoenix Datacom, Ltd. The company was incorporated in 2006 and is based in Herndon, Virginia..
Alsid conceives transparent, cost- and time- effective solutions which aim at disrupting cyberattacks targeting corporate networks by defending their common denominator : the Active Directory infrastructure that support companies’ vital assets. Built on world class threat intelligence and machine learning capabilities, Alsid technology is an agentless, easy to deploy security solution which constantly monitors hundreds of Active Directory inner parameters, objects, and processes to uncover security gaps, to detect ongoing attacks before they succeed, and to eventually provide you with precise remediation tactics..
The SiON platform integrates and analyzes upstream target system logs, data in real-time through machine learning algorithms and takes action on human threats. SiON has several trademarks, patents, and a friendly user interface making it easy for auditors, analysts, CISO’s, CIO’s, and other executives to make cyber risk business decisions..
Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and Data Science.
This enables a DevOps approach to ATD, enabling ease of deployment, monitoring and management. Acalvio enriches its threat intelligence by data obtained from internal and partner ecosystems, enabling customers to benefit from defense in depth, reduce false positives, and derive actionable intelligence for remediation..
PhishLabs is the leading provider of 24/7 cybersecurity services that protect against threats that exploit people. The company is trusted by top organizations worldwide, including 4 of the 5 largest U.S.
financial institutions. PhishLabs combines proprietary technology, intelligence, and human expertise to rapidly detect, analyze, and stop targeted cyberattacks before they impact organizations.
Additionally, the company provides robust threat intelligence that strengthens existing cyber defenses and optimizes threat prevention. Leading organizations partner with PhishLabs to more effectively disrupt targeted cyberattacks, prevent data breaches, and reduce online fraud.
Follow PhishLabs: Twitter | http://www.twitter.com/phishlabs LinkedIn | http://www.linkedin.com/organization/phishlabs Google+ | https://plus.google.com/+PhishlabsTeam/posts. .
The company’s presence spans across the globe, including France, Italy, Vietnam, Malaysia, the Netherlands, Russia, South Africa, Spain, the United Kingdom, in addition to Singapore, where its global headquarters is located. Group-IB is ranked among the best threat intelligence vendors in the world by Gartner, IDC, Forrester, Cyber Defense Magazine, and SC Media.
Group-IB’s technological leadership is built on the company’s 17 years of hands-on experience in threat research, analysis, cybercrime investigations around the world and 65 000 hours of cyber security incident response. Group-IB is a partner of INTERPOL and Europol and has been recommended by the OSCE as a cybersecurity solutions provider..
Constant technical advancement of hardware and software and expert assistance provided by the manufacturer support from head office mean that high levels of customer satisfaction can be achieved. This has seen many long-term customer relationships develop and prosper over the years.
Securepoint, as an owner-managed company in the German mid-tier sector, leads the way in its market segment. Since its inception in 1997, company growth has increased steadily and this has been based on profits earned; free from outside capital.
Management at Securepoint GmbH has great experience in the systems house business and knows the requirements and duties that their retail partners have to face on a daily basis very well. Securepoint strives to create solutions that are useful, functional and free of any backdoors.
All employees are committed to these corporate principles and show a professional attitude in their willingness to assist. Securepoint meets its entrepreneurial and social responsibilities by treating its employees as partners and by fostering young talent in their technical and business careers..
GreyNoise is a cybersecurity company that reduces false positives by filtering pointless Internet background noise. It collects, analyzes, and labels mass internet scan and attack activity into a feed of Anti-Threat Intelligence.
This context helps security teams reduce noise and prioritize signal – targeted attacks against their organization. Its drive to maximize analyst efficiency is delivered through its API, platform integrations, and visualizer.
The company was founded in 2017 and is based in Washington, District of Columbia.. Endian is headquartered in Appiano, Italy with offices in North America, Germany, Turkey, and Japan..
WeLink is an advanced enterprise social media security platform. WeLink enables organizations to gather actionable threat intelligence from massive amounts of social media posts.
It was founded in 2012 and headquartered in San Jose, California.. .
Skycure is a predictive mobile threat defense (MTD) company with proactive defense solutions that actively detect and prevent mobile cyberattacks while preserving user privacy and experience and reducing the burden on IT. Skycure’s mission is to secure both BYO and corporate-owned mobile devices to allow companies to mobilize without compromise.
Skycure closes the mobile security gaps in organizations to protect against network-based threats, malware, vulnerability exploits, and other targeted attacks originating from both internal and external sources. Skycure’s patented technology employs a dual protection mechanism, which consists of a client-side module that resides on the device and protects it 24/7, together with a server-side service that provides heavy lifting analysis.
Skycure’s predictive technology (often referred to as “waze” of mobile security) is based on mobile threat intelligence gathered via massive crowd intelligence and sophisticated machine learning. Skycure’s research team is accredited with cutting edge publications (such as Accessibility Clickjacking, Cookie Stealer, No iOS Zone, Malicious Profiles, WifiGate, HRH, LinkedOut), ensuring the solution is always ready for future threats.
Skycure was founded in 2012 by Adi Sharabani and Yair Amit, two Unit 8200 veterans (U.S. National Security Agency equivalent), who possess extensive and proven technological and managerial experience in the security industry.
The company is funded by Shasta Ventures, Pitango Venture Capital, NYL and other strategic investors.. .
Bandura uses simple, innovative technology and best-in-class threat intelligence to secure your networks, data and users in real time – wherever they are. Whether it’s from data we provide out of the box, data from one of our Partner Integrations – or any other data source you have – we block attacks from up to 150 Million malicious IPs and domains in real-time, with no latency.
At Bandura, we believe nothing scales like simplicity. We make blocking threats smart and simple – at scale – everywhere..
This technology helps protect company networks but also extends to mobile workers, using any internet connection, through Netbox Blue’s unique Borderless Internet Compliance framework. The company was established in 1999, is privately held and is based in Australia.
Netbox Blue has a presence in over 19 countries and has partnerships and distribution agreements with some of the world’s largest IT companies.. .
KELA offers proprietary Darknet-based cyber intelligence solutions for enterprises and government agencies worldwide. KELA’s core mission is to harness and integrate the experiences and methodologies of the Israeli Defense Forces’ elite intelligence units for revolutionizing cyber, HLS, and finance.
KELA’s automated technologies monitor a curated set of Darknet sources to alert clients of targeted threats. All threats are analyzed and qualified by KELA’s analysts, ensuring all intelligence is 100% actionable.
Comprised of more than 100 intelligence and technical experts all leveraging unique skills from Israel’s elite military intelligence units, KELA’s team is able to develop high-end technologies and analyze complex data from an intelligence point-of-view. KELA Targeted Cyber Intelligence continues to lead the threat intelligence market, providing solutions and support in monitoring the Darknet to prevent potential cyber-attacks for enterprises and government agencies..
The company, formerly known as FB-4, Inc., was founded in 2002 and is based in Columbus, Ohio. It has facilities in Fort Lee, New Jersey; Dortmund, Germany; and Pune, India..
ThreatX is the only SaaS-based web application and API protection solution that enables enterprises to confidently secure all their applications against a rapidly evolving threat landscape. Its purpose is built for the hybrid-cloud and delivers complete visibility and the most precise threat detection and neutralization capabilities available by combining progressive behavior profiling, collective threat intelligence, and deep analytics with a managed service. ThreatX eliminates the false positives and maintenance burdens associated with WAFs and static, rule-based solutions.
The company was founded in 2014 and is based in Louisville, Colorado.. .
Finite State is the pioneer of IoT device intelligence. They accelerate innovation with connected devices by keeping their dynamic risks in check.
They leverage the world’s largest database of IoT vulnerabilities and threat intelligence to ensure our customers are never surprised.. As advisory leaders for former employers some of our leadership team have also acted as CISOs for key clients both public and private, Tn this role, we served in an interim capacity, to maintain run the business status and drive needed improvements, while working with said clients to hire permanent CSO or CISO.
In combination, this leadership team bring over 128 years of combined experience within, Incident, Breach Response and Counter Hacking. They have been first responders and/or created response, risk mitigation and management processes for Global Corporations during and post a hacking/breach event, some of which were highly publicized over the last 10 years.
Using these experiences and expertise the company’s advisory and professional services arm, work with customers to ensure that they are prepared for Security and Risk Management Audits from regulators and auditors, given this team’s experience in security and audit from a Big 4 perspective in their past. Leaders work to drive commonsense cost optimization and practical technology alignment for all our customers based on tenured understanding of technology environments from their time as former corporate leaders, faced with some of the problems most companies still face today.
With hands on experience saving past clients from potential 7 to 8 figure fines from regulators, the advisory team have pre-audit and remediation design expertise to create solutions that ensure customers have an unbiased view on Risk Impacts, Data Privacy Security gaps and Technology overlap or best use, that are critical to ensuring risk and other threats to business operations is not a score based on an assessment solely, but compounded to ensure the environmental difference, business functional need and then compliance, audit and regulatory need, and not a standard score based on common for all metrics for flagging. At ForenSec Global, the industry experience we bring to the table combined with proactive analytics to augment preventative threat management, give us a unique perspective to help clients navigate cyber threat investigations and manage messaging and remediation post breach Our Founders experience and challenges while serving in corporate security has led to the development our intelligent identity business analytics risk optimization platform, which integrates big data business analytics, identity interactions with mapped personas and reporting focused on the business environment and asks from senior business leaders..
Advanced adversaries and targeted attacks threaten large organisations on a daily basis. CounterCraft is a pioneering provider of full-spectrum cyber deception, ground-breaking threat hunting and cyber counterintelligence to detect, investigate and control targeted attacks.
The award-winning solution combines powerful campaign automation with controlled synthetic environments to allow attackers to penetrate organizations without doing real damage. CounterCraft’s Threat Deception platform builds and deploys buffer zones that fool threat actors into engaging with false information and fake digital assets instead of real operational systems and data.
The solution uses groundbreaking security engineering for Threat Detection, Threat Intelligence and Threat Response. Key stakeholders get more time to respond to advanced and rapidly evolving threats.
The platform continuously generates highly relevant threat intelligence elicited from threat actors. Defenders benefit as CounterCraft integrates with incident response workflows and proactively reconfigures defensive systems in real time to mitigate risks from ongoing attacks.
CounterCraft operates in Fortune500 companies globally, including major financial institutions, critical infrastructures, governments and Law Enforcement Agencies. Founded in 2015, the company is present in London, Madrid and Washington DC, with R&D in San Sebastian..
Opora develops cyber threat intelligence technologies. It combines cloud computing, big data, machine learning, and other cutting-edge fields into an intelligent, dynamic, and robust cyber threat intelligence platform running on the global cloud.
The Gartner Research Group named the company a cool vendor in “Cool Vendors in Security and Risk Management Software for Technology and Service Providers, 2018”.. For more information about NetCitadel and its solutions visit [http://www.netcitadel.com](http://www.netcitadel.com)..
Blueliv is a leading cyber threat intelligence provider with a world-class in-house Labs team. We scour the web, the deep web and the dark internet to deliver fresh, automated and actionable threat intelligence to organizations to protect their networks from the outside in.
Our scalable cloud-based platform turns global threat data into sophisticated and relevant intelligence, enabling organizations to save time and resource by improving their incident response performance and empowering their Security Operations team with real-time intelligence. Configure a solution bespoke to your needs with a choice of modules.
Quantify and qualify malicious attack vectors with our plug and play MRTI feed; delivered in STIX/TAXII standard, integration is easy. The Blueliv Threat Exchange Network is a strong, collaborative community of security researchers and malware analysts.
We want you to be a part of it – join community.blueliv.com. Start detecting external threats and join the fight against cybercrime today.
Blueliv is a Gartner Cool Vendor 2015 and Go-Ignite winner 2016.. .
otto by DEVCON
otto by DEVCON is making the internet safer and security easier through our next generation runtime application security software. We save companies time and money while reducing risk and mitigating threats that can cost hundreds of millions in data breach.
otto = security in seconds. Integrations with some of the largest CDNs, Cloud marketplaces and CMSs allows teams to start securing your company in seconds with no-code and low-code setup.
Protecting brand integrity starts with caring about your customers. O++O tools, monitoring and protection give DevSecOps the real-time, runtime intelligence about the ever-changing dynamic security and vulnerability of your site and Third-party Scripts interacting with your company and customers.
otto by DEVCON is committed to protecting consumers from cyber threats by democratizing cyber security (i.e. making it free for consumers).
Our chrome extension protects and alerts users of threats and vulnerabilities as they surf the web, while generating a network effect, crowdsource of continuous threat intelligence. This network intelligence provides perpetual fuel for our threat intelligence engine and self-healing technology..
BrandShield® is an innovative Online Brand Protection solution. It’s robust, patented technology finds trademark infringements, counterfeit sales and online phishing and fraud.
The system analyzes content and metrics of each website, marketplace or social platform, and uses sophisticated algorithms to automatically prioritize the level of risk to the brand. BrandShield’s ground breaking pattern recognition technology finds major brand threats.
It also includes enforcement tools and service, to form a powerfull Threat Intelligence solution. BrandShield’s robust, patent pending technology helps fighting infringements and makes brand protection possible for all sizes of organizations.
BrandShield’s A-Z solution protects the brand from detection of threats to their takedown. Brandshield’s proactive aproach extends any organization’s assets protection outside the organization’s perimeter.
BrandShield detects logo usage online, fraud clusters, cross-platform connections and prioritizes online threats customized uniqely for each brand. BrandShied’s technology dramatically improves the way organizations can manage and protect their digital brand.
Till now online brand protection solutions were limited, based on human analysis, highly expensive, and therefore available only to the biggest companies. BrandShield’s technology revolutionizes this market, and will allow every business to monitor and protect its brand online, at a reasonable cost.
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information. Their innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints.
Optimized for leading environments, including Amazon Web Services, Microsoft®, VMware®, and more, their solutions enable organizations to automate the protection of valuable information from today’s threats. All their products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and control, enabling better, faster protection.
Trend Micro customers include 45 of the top 50 Fortune® Global 500 companies, and 100% of the top 10 global automotive, banking, telecommunications, and petroleum companies. With over 5,000 employees in over 50 countries and the world’s most advanced global threat intelligence, Trend Micro enables organizations to secure their journey to the cloud..
CTM360® is a Cyber Security subscription service offering 24 x 7 x 365 Cyber Threat Management for detecting and responding to threats originating in cyberspace. A growth-stage startup headquartered in the Kingdom of Bahrain, CTM360 currently serves more than 30 of the Top 50 GCC Banks, as well as entities in Oil & Gas, Healthcare, Sovereign Wealth Funds, Aviation across 28 countries.
CTM360 specializes in Offensive Defense and strives to strengthen a subscribed member’s security posture by making them a harder target in cyberspace. With 370,000+ unique incidents managed, 11 billion hacked accounts indexed, 350,000+ digital assets inventoried and 1000+ executives protected, CTM360 currently remains a leader in Cyberspace for Managed Threat Detection & Response, Digital Risk Management, Threat Intelligence, Corporate & VIP Brand Protection, Anti-Phishing, etc.
CTM360 is offered as a service through an ecosystem built in the cloud and remains solely outside the perimeter of any organization.. The company serves IT and security professionals.
It markets its products in the United States and Canada. PacketMotion, Inc.
was founded in 2002 and is headquartered in San Jose, California.. .
Better Mobile Security
Better Mobile Security is a Mobile Threat Defense (MTD) solution provider that uses predictive AI technology to identify and stop mobile security threats without compromising end-user productivity or privacy. Better MTD’s predictive protection comes from its Deep Thinker AI platform that applies artificial intelligence and learning models to identify known and unknown threats at the device, network, and application levels.
It also works seamlessly with leading Enterprise Mobility Management (EMM) solutions to protect corporate resources and can be easily deployed to vast mobile networks with just a few clicks. Better Mobile Security solution also integrates with Microsoft Intune and Azure AD(AAD) single sign-on.
The company’s security platform combines sophisticated machine learning / artificial intelligence with its real-time threat intelligence to automatically detect attacks from malware, network, OS vulnerabilities, out-of-date operating systems, and many other breaches. It protects mobile devices and invaluable enterprise data from malware, network, and OS-layer attacks..
SurfWatch Labs helps organizations and service providers quickly establish a strategic cyber threat intelligence operation that drives more effective use of their tactical defenses. Founded in 2013 by former US Government intelligence analysts, SurfWatch Labs solutions provide a 360-degree view of cyber threats in the context of your business, along with practical and personalized support to create immediate insights and meaningful action.
Combining useful analytics, applications, and human expertise, SurfWatch solutions can be an off-the-shelf, cyber threat intelligence team or delivered as a comprehensive product suite that easily integrates with the existing cybersecurity operations.. .
Intensity Analytics Corporation
Founded in 2009, Intensity Analytics is a Virginia-based software firm that develops next-generation, physical user and entity behavioral authentication (“physical UEBA”) security software technology. Physical UEBA is a critically important layer in a defense-in-depth strategy, designed to reliably and successfully defeat cybersecurity problems arising from the most common attack vector: stolen user credentials.
Our primary focus has been on developing sophisticated, new-thinking algorithms to take employee and entity authentication from traditional credential verification to the point of identity recognition – that is, to answer the question of “who is using the computer”? The result is patent-allowed technology that provides superior authentication integrity and Threat Intelligence with a frictionless user experience, using a software-only approach.. .
Bfore.AI is the first predictive Cyber Threat Intelligence and Digital Assets Protection that develops cybersecurity to a preventive posture, leaving detection and response where it can’t be done otherwise. Our focus is on finding and remediating emerging security problems that leverage user, application and data flaws to attack enterprises.
Key innovations include using patented behavioural predictive analytics, applied to DNS and domain data. These breakthrough algorithms minimize the impact of successful attacks by reducing the threat identification time from weeks and months to hours after domain creation, enabling real time response before the attack even starts.
PetaSecure accelerated its strategy and technology in the Cisco Entrepreneur in Residence Program: https://www.youtube.com/watch?v=xGCka1_M_Yo https://eir.cisco.com/entrepreneurs.html PetaSecure got acquired by Niara, Inc. in December 2014: http://www.niara.com/niara-welcomes-petasecure/.
Citalid Cybersecurity is a French company whose ambition is to place the analysis of cybermenaces at the heart of the strategic decisions of its customers. An effective cyber defense today can not be limited to technical expertise alone, but must be conceived transversely.
Citalid provides its clients with an online platform for analysis and decision support based on three complementary pillars: knowledge of attack procedures; the organization of a common cyber defense through a controlled sharing of information; the assessment and anticipation of computer threats. Citalid innovates by identifying contexts conducive to cyber attacks by cross-checking cyber, geopolitical, economic, social, and other information.
Its clients benefit not only from a tailor-made and operational mapping of the threats likely to target them, but also from the associated preventive defense axes. — Citalid Cybersecurity is a company focused on cyber threat intelligence at the heart of its customers’ strategic decisions.
An efficient cyberdefense can not be limited to technical expertise anymore, but must be designed in a transversal way. Citalid is helping its customers with an online analysis platform for supporting the decision-making process by: increasing the knowledge about the attackers; organizing joined cyberdefense via controlled information sharing; evaluating and anticipating the cyber risk.
Citalid innovates by identifying contexts to cyberattacks through the crossing of heterogenous information sources: cyber, geopolitics, economics, social, etc. Thus, its customers may not be affected by a specific problem, but also by the appropriate preventive lines of defense..
VeriClouds is a threat intelligence company helping organizations detect compromised credentials before hackers do. We use the same data attackers do, proactively monitoring the dark web and systematically reducing user-centric risk.
VeriClouds provides the best approach to eliminate the biggest cause of massive data breaches, the weak and/or stolen password.. .
RedSocks Security is specialised in detecting suspicious network behaviour and combatting cybercrime. By combining Machine Learning, Artificial Intelligence and Cyber Threat Intelligence, RedSocks Security provides non-intrusive, real-time breach detection solutions and incident response services.
Our solutions are implementable within organisations of all sizes, and also serve as a tool of compliance to (information and data) privacy legislation.. .
SecondWrite’s next-generation sandbox detects advanced malware including APTs, targeted attacks and zero-day evasions that defeat other solutions. Its university-developed patent pending technology identifies hidden paths in malware and forcibly executes them, achieving complete code coverage.
Customers include network security, endpoint security, threat intelligence and IR vendors, SOCs, and MSSPs.. Technological risk analysis (OCTAVE Method,NBR17799) Risk Analysis and Threat Assessment Risk and Threat Management Criminal and Fraud Investigations Competitive Intelligence Intelligence Gathering Cyber Threat Analysis Special Protection Projects.
Redscan is a provider of managed security services, specializing in threat detection and integrated incident response. Possessing a deep knowledge of offensive security, Redscan’s experts are among the most qualified in the industry, working as an extension of clients’ in-house resources to expose and address vulnerabilities plus swiftly identify and shut down breaches.
Services offered include CREST accredited Penetration Testing, Red Teaming, and Managed Detection and Response. By understanding how attackers operate, leveraging cutting-edge threat intelligence, and offering clear and actionable advice, Redscan’s cyber security professionals can be trusted to provide the high-quality insight needed to successfully mitigate information security risk and achieve compliance standards..
ThreatLandscape is a cyber threat Intelligence start-up protecting, detecting, and remediating competition’s threats and breaches. The startup using Machine Learning and advanced NLP techniques with a mission to help governments and enterprises preempt threat mitigation and remediate with ease and confidence.
It continuously monitors your physical, cloud, and brand assets to help you take preventive action faster than the speed of bad. ThreatLandscape extracts cyber threat signals from all-source data, correlating it with their proprietary threat intelligence garnered from several billion open, deep, and dark web records.
It detects and prioritizes your most at-risk vulnerabilities and zero-days without the overhead of intrusive scans. ThreatLandscape was founded in 2017 and is based in San Jose, California, USA..
Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome, by creating deceptive information based on the current detected stage of compromise through the entire Endpoint Kill Chain. The preemptive solution covers the evolving nature of advanced threat landscape & sophisticated malware techniques, stopping all threats without relying on signatures, patterns or the need for constant updates.
Gartner Cool Vendor 2019: Security Operations and Threat Intelligence. For more information, visit our website at www.deceptivebytes.com or follow us on LinkedIn, Twitter and Facebook..
Hozint – Horizon Intelligence
Hozint – Horizon Intelligence is a threat intelligence solution provider based in Brussels, Belgium. Our mission is to provide our clients with timely and relevant information to mitigate their exposure to safety and security risks.
Our solution is a web platform “Horizon” that combines artificial and human intelligence to monitor media and social media and to provide accurate geotagging and impact assessment.. .
Tego Cyber is a security intelligence platform helping individuals and enterprises with their cybersecurity needs. It also provides context on threats in the customer’s environment through its integrated, aggregated real-time threat feed.
The platform identifies known threat indicators and malicious actors with data that is relevant and timely. Tego Cyber’s platform provides context on threats in the customer’s environment through its integrated, aggregated real-time threat feed and creates updates through its curated and aggregated threat intelligence feeds, thereby enabling clients to respond to the ever-changing threat landscape.
Its mission is to deliver high‐quality, innovative cybersecurity solutions, and services that reduce risk, prevent cyber-attacks, and protect intellectual property and data.. .
IID’s ActiveTrust provides the platform to easily exchange threat intelligence across organizations through a dynamic, aligned, and private community of security peers. The key benefits of using IID include, confidently exchange threat intelligence across prescreened and defined circles of trust.
Legally protect your data while simultaneously getting actionable intelligence from many other organizations; normalized data, threat analytics, big data apps, and services. Delivered directly into your infrastructure.
All at network speed; and leverage widespread, vetted membership to quickly scale collaboration efforts.. .
Webroot provides intelligent endpoint protection and threat intelligence services to secure the Internet of Everything. By leveraging its cloud-based collective threat intelligence platform, computers, tablets, smartphones, and more are protected from malware and other cyber attacks Webroot technology is trusted and integrated into market-leading companies including Cisco, F5 Networks, HP, Microsoft, Palo Alto Networks, RSA, Aruba, and many more.
Webroot is headquartered in Colorado and operates globally across North America, Europe, and the Asia Pacific region. The company was founded in 1997 and is based in Broomfield, Colorado..
Crypteia Networks delivers a patent-pending technology that identifies zero-day threats on their infancy along with misconfigurations on the already deployed defenses, as to provide visualizations of the threats paths and provide suggested mitigation actions (MOREAL™). This enables enterprises to add a new layer of security in their environment by expanding the intelligence of their already deployed security mechanisms, maximize the value of the logs they are already generating & collecting without any change in their infrastructure.
The solution is non-intrusive, OS independent and comes with zero integration pains. Crypteia Networks is headquartered in Athens, Greece with offices in Boston, MA..
Founded in 2000, CIPHER is a global cyber security company that provides information security products and services supported by CIPHER Intelligence, a world-class threat intelligence laboratory. Their offices are located in North America, Latin America and Europe, have Security Operations Centers (SOC) 24x7x365, specialized research and development teams and a global network of technology partners.
The excellence of their security products and services is recognized by the market and is accredited by international certifications and quality standards such as ISO 20000, ISO 27001, SOC I and SOC II, PCI QSA and PCI ASV. CIPHER has also been recognized by Frost & Sullivan for its market leadership for six consecutive years.
Their clients include “Fortune 500” companies, multinational organizations and government agencies. CIPHER uses proprietary technology and specialized services to defend these companies from advanced threats and security breaches while managing risks and ensuring regulatory compliance with the use of advanced tools and best practices proven by numerous success stories..
Volexity is a security firm that assists organizations with incident response, digital forensics, trusted advisory, and threat intelligence. Its team helps organizations ranging from large global enterprises to single location small businesses, dealing with a myriad of information security challenges.
Volexity is based in Reston, V.A.. .
Team Cymru is an internet security firm that offers research services making the internet a more secure place. The company’s service portfolio includes threat intelligence, enterprise intelligence services, executive briefing services, security intelligence, and more.
Team Cymru was founded in 1998 by Rob Thomas and Dave Deitrich, and is based in Lake Mary, Florida.. .
Tier3 Cyber Security Solutions Pakistan We Make the Difference Estbd : 2011 – Member National Centre for Cyber Security Pakistan | Leading Cyber Security Service Providers in Pakistan – Consultancy and IT Advisory Services to GOP , public and private sectors | Threat Intelligence | Exploit Development | PenTesting | Vulnerability Disclosure | ISO27001 / PCI DSS – OWASP / NEXPOSE / METASPLOIT / COBALTSTRIKE / Nessus / Rapid7 / CANVAS Immunity | Zero Trust Framework| Red Team Tier3 is a consulting, technology and innovation firm. We define success as achieving exceptional results that have a lasting impact on businesses, communities and individuals worldwide.
This principle has remained the cornerstone of our ethos since 2011 – and it continues to underpin everything we do. For more than 10 years, Tier3 Corporation has pursued a single goal: to empower and protect the enterprise with continuous security assurance for people, systems, and information.
Tier3 offers solutions and services for… Cyber Security: To protect and assure your information and reduce your exposure to security risk in a globally connected world. Secure Mobility: To enable you to work securely wherever your mission takes you…across and beyond the enterprise.
Identity Management: To establish trust in people working for you and with you — now, and in the future. Our clients choose us for Cyber Security in Pakistan because we challenge convention to find the solutions that really work – in practice, not just on paper.
Then we roll up our sleeves and get the job done. At Tier3 we don’t just believe in making a difference.
We believe in making the difference. Our people are experts in a wide range of industries and we bring in specialists from across our firm to ensure our clients receive the best service.
Comodo Group, Inc
Comodo delivers next generation cybersecurity solutions to protect businesses, schools, and government organizations in today’s risk filled business environment. Headquartered in Clifton NJ, Comodo’s global development team and threat intelligence laboratories deliver innovative, category leading, solutions for a company’s endpoints, network boundary, and internal network security.
Thousands of companies and organizations rely on Comodo’s technology to authenticate, validate, and secure their most precious asset—information—and to combat constant cyberattacks and threats like ransomware from wreaking havoc on a global scale.. .
WebARX is a complete website security and monitoring platform including web application firewall, uptime monitoring, domain reputation checks, and security scans on a single dashboard. WebARX analyses around 3000 hacking incidents per day, which comes from our private threat intelligence.
Compared to similar service providers on the market, WebARX has put web application firewall, uptime monitoring, domain reputation checks and security scans on a single dashboard, available even to small website owners.. .
Threat Intelligence Pty Ltd was founded by Ty Miller who is one of the few information security leaders in Australia. This is backed up by his vast number of achievements and experience over the past decade.
View his BIO for a more detailed history of Ty Miller. During this time Ty Miller was key in growing a very successful penetration testing company in Australia as the CTO, leading and training their specialist security team, and building a brand that is well respected in the IT Security industry.
Threat Intelligence is using this experience, specialist skills and knowledge, to not only take information security to the next level, but to actually create the next era of risk management and penetration testing. Threat Intelligence gets invited to the most prestigious security conferences in the world to run advanced security training and present their cutting edge security developments, including both Black Hat USA and Ruxcon.
Ty Miller also coauthored the highly popular and well regarded security book “Hacking Exposed Linux 3rd Edition”.. .
InfoArmor provides industry-leading solutions for employee identity protection and advanced threat intelligence to help organizations protect their most valuable assets. They combine an unparalleled global research network with big data analysis, actionable intelligence and customized service to meet clients’ dynamic security needs.
From employee to enterprise, InfoArmor is redefining how organizations fight fraud and combat an ever-changing cyber threat landscape to mitigate risk on multiple levels. Today, more than 800 businesses and government agencies, including over 70 of the Fortune 500, use PrivacyArmor, the industry leading employee identity protection solution, or VigilanteATI, our award-winning advanced threat intelligence platform to improve their data security posture..
ThreatWarrior is the premier cloud-native network threat intelligence platform that stops both known and unknown cyber threats in real time. The agentless, deep learning platform analyzes network traffic to eliminate blind spots, determine security vulnerabilities, and stop active threats across on-premises, cloud and hybrid environments.
ThreatWarrior is the first solution to combine unsupervised neural networks, continuous deep packet inspection, behavior monitoring, network intelligence and automated response in a single platform. Leading organizations use ThreatWarrior to see everything happening on their network, learn the behavior of everything communicating across their enterprise, and act efficiently to stop threats other solutions miss..
Company Description Arbor Networks secures the world’s most demanding and complex networks from DDoS attacks and advanced threats. Solutions Overview Arbor Networks customers gain a micro view of their own network, through their suite of products, combined with a macro view of global Internet traffic and emerging threats, through their ATLAS threat intelligence infrastructure.
See, understand and solve more security threats with Arbor Networks. ATLAS provides a comprehensive, aggregated view of global traffic and threats.
330+ service provider customers contribute 120 Tbps of global traffic intelligence, enabling Arbor’s Security Engineering & Response Team (ASERT) to develop threat protections that are delivered directly into customer products to stop DDoS attacks and malware campaigns. Arbor DDoS Solutions are proven on the world’s most demanding networks.
their portfolio offers complete deployment flexibility to meet the needs of any organization, from virtual solutions, network-embedded solutions within Cisco’s ASR 9000 routers, to appliances for enterprises and carrier-class scrubbing centers. In Arbor Cloud, they offer a best-practice DDoS defense service that tightly integrates on-premises and cloud-based mitigation in a single solution.
Ensure the availability of your critical infrastructure with the world’s most broadly deployed DDoS mitigation technology. Arbor Advanced Threat Solutions leverage integrated Netflow and Packet Capture technology for network-wide situational awareness, broad and deep traffic visibility and security intelligence that transforms threat detection and incident response through real-time and historical insights, stunning visualization and forensics.
Protect your most critical assets from advanced threats that are within your network right now.. .
Farsight Security provides the world’s largest real-time actionable threat intelligence information on how the Internet is changing, seeing more than 200,000 DNS-related observations per second. Leveraging proprietary technology that was purpose-built to manage the volume of data and real-time analyses, Farsight provides security teams with the Internet’s view of an organization’s web presence and how it is changing, whether those changes were made purposely, inadvertently, or maliciously.
The world’s most security conscious organizations use Farsight for their real-time threat intelligence information.. .
Application Security, Inc. provides database security, risk, and compliance solutions for enterprises in the United States and internationally.
The company offers DBProtect, a managed enterprise solution for database security that provides database scanning, vulnerability assessment, and activity monitoring in an enterprise suite; and AppDetectivePro, a network-based database vulnerability assessment scanner that discovers database applications within infrastructure and assesses their security strength, as well as locates, examines, reports, and fixes security holes and mis-configurations. It offers its products for activity monitoring, auditing, compliance, continuous monitoring, cost optimization, database security, information protection, operational efficiency, patch gap management, policy enforcement and management, remediation and response, risk management, threat intelligence, and vulnerability assessment applications.
The company enables organizations to extend existing data protection measures to include the database for security and compliance. It serves government organizations and companies in banking and financial services, health care and life services, manufacturing, transportation, energy, and communications industries.
Application Security, Inc. has strategic relationships with Archer, ArcSight, HP, IBM, McAfee, Microsoft, Oracle, and Sybase.
The company was founded in 2001 and is based in New York, New York with additional offices in North America and the United Kingdom.. .
NetWitness Corporation provides network security monitoring software products for commercial and government organizations in the United Kingdom and internationally. It offers network content analysis methods, risk verification and determination methods, incident response, data leakage and content monitoring, and compliance services.
The company’s products include NetWitness NextGen, a network security monitoring solution to solve various network and security problems, including insider threat management, data leakage protections, compliance verifications, malware activity detections, zero-day detections, network performance management, and network-based e-discovery, as well as data governance, risk, and compliance management verifications; and a NextGen enterprise network forensics and advanced threat intelligence platform for security experts in various enterprises. It also provides infrastructure products, such as Investigator, an interactive software application that provides contextual analysis of captured network data; Informer, an automated reporting engine of the NetWitness NextGen product suite; Decoder, a component of an enterprise-wide network data recording solution; Concentrator, which is used to aggregate clusters of decoders in real-time for enterprise-wide analysis of network; and API/SDK, an open programming interface that leverages the NetWitness NextGen record once/re-use many times network capture infrastructure.
In addition, the company offers SIEMLink, a solution for translating security event data between Web-based consoles, such as security event and information management systems, and network and system management programs. It primarily serves defense organizations, financial services companies, national law enforcement and intelligence agencies, and banks.
NetWitness Corporation has a strategic partnership with Phoenix Datacom, Ltd. The company was incorporated in 2006 and is based in Herndon, Virginia..
Sacumen specializes in working with Security Product Companies. We are working with 50+ Security Product Companies such as Symantec, Palo Alto Networks, Varonis, AlienVault, IBM, CA Technologies, ThreatConnect, SecurityScorecard, ForgeRock, Code42, BigID, Flashpoint etc in the areas of Connector Development, Connector Support, and Product Engineering.
We have built 700+ Connectors in the areas of SIEM, IAM, Ticketing Systems, Incident Response, Cloud Applications, Cloud Monitoring, Threat Intelligence Feed, Endpoint Security, Cloud Storage, GRC, Vulnerability Management, Authentication, etc.. .
Cyveillance, a world leader in cyber intelligence, provides an intelligence-led approach to security. Through continuous, comprehensive Internet monitoring and sophisticated intelligence analysis, Cyveillance proactively identifies and eliminates threats to information, infrastructure, individuals and their interactions, enabling its customers to preserve their reputation, revenues and customer trust.
Cyveillance serves the Global 2000 and OEM Data Partners â€“ protecting the majority of the Fortune 50, regional financial institutions nationwide, and more than 100 million global consumers through its partnerships with security and service providers that include Blue Coat, AOL and Microsoft. Cyveillance is a QinetiQ Company..
BAE Systems Applied Intelligence
BAE Systems Applied Intelligence (formerly Detica) is an international business and technology consulting firm owned by BAE Systems. It specializes in ‘security and resilience’, and in collecting, managing and exploiting information to reveal so-called “actionable intelligence”, “threat intelligence”, “fraud containment” and customer insight.
It also sells clients software for large-scale data exploitation, and analytics for intelligence-grade security and financial crime work. The company has a team of over 100 consultants, with offices in Sydney, Canberra, Melbourne, Brisbane, Perth, and Kuala Lumpur..
SOCRadar is a cloud-based, AI-powered Digital Risk Protection Platform enhanced by cyber threat intelligence capabilities. Security Operation Center teams of major organizations including banks and e-commerce giants benefit from SOCRadar to understand their attack surface and strengthen their security posture continuously.
SOCRadar is continually monitoring where digital assets are exposed, providing context to understand the risk. At the core, the true value of adopting SOCRadar is that it empowers organizations to understand and to take action on cyber threats that are applicable to their cyber infrastructure in a proactive manner.
SOCRadar creates real-time alerts whenever your sensitive digital assets are exposed or imitated across a broad range of online sources in the surface web, paste sites, code repositories, deep and dark web, and other technical sources.. .
Codenomicon develops threat awareness and proactive security testing solutions. Its products include Defensics, a solution that discovers unknown vulnerabilities and flaws, AppCheck, a solution that catalogs, scans, and identifies various digital assets as well as identifies key vulnerabilities and outlines known corresponding fixes, and AbuseSA, a solution that provides governments, CERTs, and cyber authorities with threat intelligence.
Codenomicon also offers testing and auditing services such as outsourced robustness testing, custom test development, security audit, vulnerability reporting, and advanced testing and auditing, training, and security and robustness verification services. It serves developers and security analysts in telecommunications, networking, manufacturing, financial services, and defense industries.
Ari Takanen, Rauli Kaksonen, and Mikko Varpiola founded Codenomicon in 2001, with its headquarters in Oulu in Finland, with a branch in Saratoga in California in the United States. Codenomicon operates as a subsidiary of Synopsys as of June 29, 2015..
ThreatInformer provide cyber risk intelligence to the insurance industry. Combining threat data, security assessments and environmental factors, ThreatInformer’s cloud SaaS platform delivers the complete cyber risk picture.
ThreatInformer brings together a team with cyber insurance, incident response, threat intelligence and platform development experience. With a relentless focus on the cyber insurance industry they are providing insights to transform the way risks are placed and written..
Raytheon Foreground Security is a dedicated cyber security company providing security engineering, assessment, customized security training, and advanced incident response and forensics services. Our Virtual SOC (V-SOC) service allows clients to outsource the monitoring and management of their current security products while keeping all data inside their boundaries.
Our patent-pending Automated Threat Intelligence Platform (ATIP) automates threat identification in real time so we can focus our efforts on diagnosis and remediation. At one client, our innovations resulted in a 300% increase in incident detection rates.
Raytheon Foreground helps organizations align information security with key business objectives. Our experienced professionals hold CISSP, CCSP, CISM, CEH, CHFI, and many other certifications and our penetration testers have identified over 100 zero day vulnerabilities within the last 12 months.
We provide our more than 100 government and commercial clients with the proven expertise and real-world implementation experience required to protect against today’s leading threats.. .
ThoughtData helps enterprise businesses to deliver best end user experience of their business services to their customers with high performing IT infrastructure. ThoughtData’s Enterprise360 software solution provides unified and actionable observability to detect and resolve network, application, infrastructure performance issues.
Unified solution approach helps enterprise businesses to significantly reduce cost, tool clutter, maintenance, manual data correlation and mean time to respond to respond(MTTR) to critical IT issues.. .
ThreatGRID is the first unified malware analysis and threat intelligence solution that is revolutionizing how organizations use accurate and context-rich intelligence to defend against advanced cyber attacks. ThreatGRID securely crowdsources large volumes of malware and performs advanced analysis in the cloud, to identify key behavioral indicators enabling near real-time remediation.
ThreatGRID empowers security teams with continuous real-time threat intelligence, enriched by global and historical context, to prevent future attacks. ThreatGRID’s API simplifies sample submission and intelligence integration with other security products to maximize the effectiveness of existing investments..
ClearSky Cyber Security
ClearSky Cyber Security offers cyber solutions specializing in threat intelligence services. It mainly covers the financial sector, critical infrastructure, public sector, and the pharma sector.
The company was founded in 2010 and is headquartered in Cambridge.. .
Cyber Crime Investigation, Cyber Security, Intelligence & Digital Forensics Digitpol is a licensed and accredited criminal investigation agency specialising in operational support and investigative services to fight against transnational crimes. Digitpol is one of the world’s leading providers of Intelligence, Cyber Crime Investigation, Cybersecurity and Investigation services.
Digitpol cooperates closely with Law Enforcement agencies and Homeland Security. Digitpol is headquartered in The Netherlands.Digitpol is licensed by the Dutch Ministry of Security and Justice as a criminal investigation agency with the permit number of POB1557.
Digitpol is recognized as specializing in the sector of criminal investigation, digital forensics, and cyber related matters. Digitpol is also registered with the Data Protection Authority.At Digitpol, we know that security is an ongoing process that should cover cyber and digital crime investigation, physical tracing, intelligence and digital forensic investigation.
When Digitpol is engaged, we monitor the most serious threats and rogue actors, we collect threat intelligence 24/7. We are proactive at all levels.
We provide operational services such as Computer Forensics, Mobile Phone Forensics, eDiscovery, Internet Monitoring, Telecoms, Interception, Penetration Testing, Anti-Surveillance, Insurance Fraud, Criminal Investigation, Asset Tracing and Recovery.ICT and Cyber Security, Digitpol is an award-winning provider of cyber security solutions, integration and support to cyber security, Digitpol provides cyber security for all devices, desktops, laptops, workstations, networks, and cloud environments. Digitpol is a multinational global cyber security company serving customers across roughly 140 countries via our partners and our global networks.Digitpol’s offices are equipped with state of the art forensic technology and workshops for research.
Our partners have offices in major cities across the world, enabling us to offer our services globally.We are committed to working with law enforcement, homeland security and key industry partners to combat International crime.. .
QuoScient provides companies and organizations across all industries with its expertise against digital threats of all kinds with its security solutions that are built by operators for operators. QuoLab raises efficiency and effectiveness in cybersecurity operations by allowing to detect, predict and counter more threats faster and with less resources QuoLab is the only platform that leverages intelligence of the entire cybersecurity community (“Quommunity”) through inter-organizational information exchange.
QuoLab is the logical evolution of the security operations platform (SOP), merging threat intelligence platform (TIP) functionality, analytic processes, and case management in a unified, collaboration centric ecosystem. With QuoLab, security professionals track, analyse, contextualize, and respond to threats holistically, across their entire security ecosystem.
QuoLab automates Threat Intelligence feed (MISP, TAXII, OTX, and more) collection efforts, immediately highlighting correlations with data from synchronized internal security controls (SIEM, firewall, IDS, etc). QuoLab ensures that your most valuable resources – time and people – are put to best use, expanding your security awareness posture, facilitating collaboration, and maximizing the value of existing security controls.
Security professionals from all career paths and operational backgrounds are empowered to work together to actively defend their infrastructure, networks and critical data. With QuoLab, clients have access to a true Active Defense Platform that puts them in control of their security.
Since being founded in April 2016 in Frankfurt am Main (Germany), Fabien Dombard (co-founder and CEO) and Ioannis Bizimis (Co-founder and CFO) lead the team at QuoScient. QuoScient’s diverse team of highly specialized and operationally experienced cyber security experts from various countries supports the founders in conducting Digital Active Defense worldwide 24/7..
Malware Patrol provides intelligent threat data on cyber attacks. We have been gathering IOCs since 2005.
Enterprises and members of our community use our historically rich data to protect networks, respond to incidents, threat research and threat hunting in more than 175 countries. Our machine readable feeds are available in predefined and customized formats, compatible with the most popular security systems, including: MISP, Minemeld, Carbon Black, ClamAV, Cisco ASA FirePower, CSV, JSON, pfSense, Postfix MTA, Snort, SpamAssassin, Squid Web Proxy.
Protect your company from unwanted cyber attacks. For a FREE evaluation of our data feeds, send us a message at commercial (@) malwarepatrol.net.
Cyborg Security is pioneering threat hunt and detection content with its HUNTER platform. HUNTER enables security teams to deploy advanced behavioural content in their environment with no extra tools, appliances, or resources.
The HUNTER platform delivers threat hunt and detection packages for security platforms like SIEM, data lake, and EDR. Our packages feature an analyst-first approach that guides analysts through the investigation.
Every package includes platform content, analyst-focused run books, and threat emulation. The packages detect the latest techniques, attacks, and exploits observed from threat intelligence.
And each package is also tagged and enriched with MITRE ATT&CK, Kill Chain, Diamond Model, and more. HUNTER’s smart mapping technology saves organizations time helping them avoid costly re-engineering efforts.
The technology maps and tailors every package to organizations’ unique environments. The packages also come with detailed deployment guides enabling seamless and rapid deployment.
During an investigation, the focus should be on security, and not accounting. Cyborg Security uses a straightforward “all-you-can-eat” model, without the complexity of micro-transactions.
At RiskAnalytics, their vision is to be the leading provider of cyber safety. They believe that fighting a networked adversary requires a networked defense built upon highly accurate threat intelligence, ShadowNet.
ShadowNet powers their intel-driven cyber security solutions that transform the way companies protect themselves from cyber threats.. .
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network, including domains and IPs, and connect them with nearly every active domain on the Internet.
Those connections inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.
Learn more about how to connect the dots on malicious activity at http://www.domaintools.com or follow us on Twitter:@domaintools. .
SwordSec which is a Cybersecurity Research and Development company founded in 2018 offers “Next Generation Cybersecurity Solutions” to Turkish, European, and American markets. Our team consists of experienced engineers, white-hat hackers, and developers with 10+ years experience.
Knowing the attackers, threat actors and methods, we offer our customers external threat intelligence and cyber-security solutions. SwordSec is a part of the Turkish Cybersecurity Cluster supported by the Presidency of Defense Industries of Turkey..
Vigilant provides dynamic, business-focused security monitoring solutions through a combination of consulting, managed services, and threat intelligence. By partnering with Vigilant, risk-sensitive organizations use advanced automation to better detect and act on threats to their business, manage compliance with security regulations and policies, and gain the insight needed to prioritize investments and resource assignments, enabling them to confidently extend their use of information technology to achieve their top-line objectives.
Founded in 2003, Vigilant is headquartered in the New York metro area, serving a wide range of global and regional organizations in financial services, healthcare, pharmaceutical, public transportation, government, and insurance sectors through distributed presence in North America, Europe, and Asia.. .
This article was written by Benjamin Skute from Threat.Technology. The editor for this article was Tess Page. If your company is featured in this article and you want to have amendments made please contact us on: [email protected].
Alternatively you may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.