Lookout Mobile Security scans any payment or banking app you download to be sure that it can be trusted with your sensitive personal and financial information. We analyze, categorize and prioritize cyberthreats in real time using proprietary data mining algorithms and unique machine learning capabilities.

Stiennon is an industry analyst and adviser to many security companies from startups to the very largest. works to protect all things digital across clouds, mobile devices and networks. What it does: Palo Alto Networks works to protect all things digital across clouds, mobile devices and networks. With Palo Alto's platform, organizations can safely enable the use of all applications, maintain complete visibility and control, confidently pursue new technology initiatives like cloud and mobility, and protect the organization from cyber attacks — known and unknown. What it does: Alphaserve employs a variety of cyberattack methods to test the security of clients’ digital defense systems. Comes with a large collection of out-of-the-box feeds, AlienVault Unified Security Management (USM), a product of AT&T CyberSecurity, receives threat intelligence from AlienVault Labs and its massive Open Threat Exchange (OTX), the world's largest crowd-sourced collaborative threat exchange.
Serving global organizations at enterprise scale, Zimperium's award-winning solution is based on a disruptive, on-device detection engine that uses patented, machine learning technology to protect against the broadest array of mobile attacks. Zscaler acts as a series of checkposts in between your organization and the public Internet, scanning all incoming and outgoing traffic between any device, anywhere in the world, and the Internet to identify and block potential threats and to protect your intellectual property. Seclytics is a one-stop cyber threat intelligence correlation and prediction platform.
In addition, it offers tools and services that model threats, advise on device design, perform penetration and system analysis testing and more. Fortunately, there’s plenty of help. context and forward-looking understanding) to anticipate threats, inform security investments, and define risk mitigation strategies. What it does: LogRhythm’s host of cybersecurity services include a security operations center that combines people and AI automation; security information and event management that supports end-to-end threat detection; security analytics to speed up threat qualification and remediation; machine analytics-based threat detection; cloud threat neutralization and much more. The intelligence is qualified, clustered and categorized, which allows customers to quickly apply their own priority and relevance. These businesses can be in the form of companies, governmental organizations etc. CounterCraft is a counterintelligence company, protects large organisations with a cybersecurity deception platform, fooling their adversaries with decoy computers, false data and fake identities. We also identify which hostile groups are targeting our clients. That’s a lot of stuff for crafty criminals to hack, corrupt and infiltrate — and it's multiplying all the time. ZeroFOX protects organizations from the dynamic risks introduced by social media and digital platforms. What it does: Check Point works with companies of all sizes in a variety of industries such as retail, finance, healthcare and education. While security analysts know the key to staying ahead of these threats is to analyze data on them, the problem that arises is how to efficiently collect high volumes of data and consequently derive actionable insights to proactively thwart future attacks. Imagine being able to analyze, search, and perform calculations on sensitive data without ever decrypting anything, eliminating the risks of theft or incidental exposure. TIPs aggregate security intelligence from vendors, analysts and other reputable sources about threats and suspicious activity detected all around the world through a tool called threat intelligence feeds. “Intelligence Essentials, our fully fused multi-source threat intelligence bundle, curated by our in-house team of CTI analysts, are giving analyst precious time to focus on investigations,” adds Raymon van der Velde, Co-founder & VP Product of EclecticIQ. All Rights Reserved. Industry: Technology, Finance and Defense. EclecticIQ Platform is complemented by the company’s Fusion Center, which delivers thematic intelligence bundles providing customers with a curated single source of relevant cyber threat intelligence from leading suppliers, open sources and industry partnerships. Ripjar are an innovative technology company building products to help businesses exploit big data. Industry: Software, Network Security, Mobile. LinkedIn Using our toolkits, it’s quick and easy to build game-changing data visualizations and deploy them anywhere, to anyone. What it does: Optiv provides a full suite of cybersecurity solutions that include strategy services, risk and compliance services, incident response and recovery services, cloud security and many others. includes threat intelligence sharing to locate hidden threats. CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. Contact Us Users receive a unified delivery of STIX-compatible intelligence that’s optimized for their organization. Utilizing advanced algorithms, Sixgill's cyber intelligence platform provides organizations with continuous monitoring, prioritized real-time alerts and actionable intelligence. Fujitsu Limited (TSE: 6702) reported consolidated revenues of 4.0 trillion yen (US $36 billion) for the fiscal year ended March 31, 2019. With the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident response, both on-premises or in the cloud. Using its patented Virtual Execution technology platform across its portfolio, FireEye is uniquely able to protect against next-generation threats. Leveraging security analytics and machine learning, Seclytics learns patterns in threats, then detects current attacks and predicts future attacks before they materialize into active events. Cognito Recall is a cloud-based application to store and investigate threats in enriched metadata.

What it does: Trail of Bits is a cybersecurity firm specializing in wide range of services, including reverse engineering, cryptography, malware protection, blockchain security and virtualization. Arceo is privately funded and headquartered in San Francisco, California with offices in Chicago, Baltimore, and New York. The separate categories had these numbers: Threat Intelligence Platforms: Employed 1,108 +2%, with a total of $296 million invested overtime. ForeScout Technologies is a leading provider of automated security control solutions for Fortune 1000 enterprises and government organizations. Our platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand attack surfaces, assess risk, and take action against digital threats. Siemplify uniquely combines security orchestration and automation with patented contextual investigation and case management to deliver intuitive, consistent and measurable security operations processes.

“Additionally, intelligence feeds from leading intelligence suppliers free up time for their analysts, receiving focused reports from a variety of intel data feeds focused on threats specific to their industry.”. AutoFocus also includes access to a repository of actionable intelligence from Unit 42, Palo Alto Networks's internal threat research team. Additionally, its solutions are deployable on-premises and in the cloud. It also provides unparalleled threat visibility at a minimum system impact. There are winners and losers if you look at the details. The company regularly protects over three million databases and reportedly blocks thousands of app attacks every second. Analysts can also easily view the risk level assigned for potential threats, as well as how the risk level has changed over time using the Timeline view. It is supported by the CrowdStrike Falcon Intelligence team. BlueVoyant is an analytics-driven cybersecurity company whose mission is to protect businesses of all sizes against agile and well-financed cyber attackers by providing unparalleled visibility, insight and responsiveness. Those are threats, threats that call for immediate action. The Ripjar application suite allows your organisation to bring together targeted external data (social media, news feeds, blogs and internet pages) and internal information to expose unique insights allowing you to make timely business critical decisions. The Ripjar product set allows you to monitor, analyse and explore blended datasets in a coherent manner. Powered by the CrowdStrike Threat Graph?, Falcon instantly correlates 40 billion security events from across the globe to immediately prevent and detect threats. The company’s technology can also be used to prevent data breaches, credential theft and other types of malicious attacks. Losers were primarily smaller firms with less than 100 employees and low amounts of investment. Organizations use the platform to continuously authenticate users during their online sessions, protecting against cyber threats and fraudulent activity, such as account takeover and RAT-in-the-Browser (RitB). TIPs then convert these advanced analytics into actionable intelligence for detecting malicious activity inside your network. Our leading-edge solution gives organizations the ability to detect emerging cyber-threats, allowing them the opportunity to proactively defend against in-progress cyber-attacks. Utilizing advanced algorithms, Sixgill's cyber intelligence platform provides organizations with continuous monitoring, prioritized real-time alerts and actionable intelligence. BlueVoyant has offices in the United States, Israel, the United Kingdom, Spain and the Philippines. If he were thinking in terms of risk management against potential intruders he would take precautions like leaving lights on and locking the doors. LookingGlass aggregates structured and unstructured data from over 87 out-of-the-box feeds, as well as other commercial feeds purchased separately. This allows security teams to focus on responding to alerts rather than identifying them. Show Similar Companies. My second most controversial claim over the years has been that organizations should not take a Risk Management approach to cybersecurity. Available as a cloud-based solution, BioCatch proactively collects and analyzes more than 500 cognitive parameters to generate a unique user profile. Vectra offers three applications on the Cognito platform to address high-priority use cases. Its Cognito' platform accelerates threat detection and investigation using AI to enrich network metadata it collects and stores with the right context to detect, hunt and investigate known and unknown threats in real time.