Define: Artificial intelligence?
Artificial intelligence (AI), is intelligence demonstrated by machines, unlike the natural intelligence displayed by humans and animals, which involves consciousness and emotionality. The distinction between the former and the latter categories is often revealed by the acronym chosen. ‘Strong’ AI is usually labelled as AGI while attempts to emulate ‘natural’ intelligence have been called ABI. Leading AI textbooks define the field as the study of “intelligent agents”: any device that perceives its environment and takes actions that maximize its chance of successfully achieving its goals. Colloquially, the term “artificial intelligence” is often used to describe machines that mimic “cognitive” functions that humans associate with the human mind, such as “learning” and “problem solving”.
Top Artificial Intelligence (Ai) Security Companies and Solutions
This article showcases Threat.Technology’s top picks for the best Artificial Intelligence (Ai) Security solutions. We selected these companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
Target Circle is the first-ever user acquisition (UA) automation platform powered by AI and focused on everything outside of social and search. The platform consists of the following: 1) Our flagship product, UA Command Center (for your mobile UA optimization), 2) MarketPlace (a fraud-scrubbed network of 450+ ad channels) 3) Private Label (a full service publisher management solution) Target Circle UA Command Center Features: It automates the following five UA areas: 1) Consolidates cost, revenue and performance data across all channels 2) Predicts LTV at the source by country level 3) Generates ROAS backed bid/budget optimizations at the source by country level 4) Auto-executes thousands of optimizations at the source by country level 5) Live monitors for performance accuracy and fraud Founded in 2014, Target Circle is the leading ad technology company for the performance industry.
Our mission is to integrate advanced automation and machine learning technology at the core of all our products. Headquartered in Oslo, Norway, the company has over 1,200 clients and has integrated over 520 of the world’s top ad networks.
We were awarded the prestigious BIA grant in Norway. Learn more at www.targetcircle.com..
Based in Irvine, California Amaryllo is the pioneer in AI as a Service. Standalone auto-tracking and fast facial recognition are Amaryllo’s patented technologies.
Amaryllo provides robotic camera solutions to transform CCTVs into cutting-edge biometric robotic cameras. Amaryllo Protect offers military 256-bit encrypted P2P networks, intelligent cloud analytics, flexible cloud storage, and 24/7 professional monitoring..
Fraud.net is the leading fraud prevention platform for digital enterprises in the e-commerce, travel and financial services sectors. Its unified algorithmic architecture combines: ● AI & deep learning, ● Collective intelligence, ● Rules-based decision engines, and ● Streaming analytics to detect fraud in real-time, at scale.
Fraud.net is the only cloud-based “glass-box” system, offering a full and transparent presentation of the data, statistics and contextual variables to help organizations simultaneously reduce risk and optimize business processes. Enterprises can simplify their fraud management, defending against different types of fraud through one unified solution.
The solution covers many use cases, including: ● Account Takeover ● Application Fraud ● Call Center Fraud ● Chargeback Protection ● Collusion ● Gift Cards & Rewards ● “Friendly” Fraud ● Insider Threats ● KYC & AML ● Loan & Credit Fraud ● Mobile Fraud ● Omnichannel Fraud ● Payment Fraud ● Return Fraud ● Synthetic Identity and much more. Please call or visit us at fraud.net to arrange for a free consultation..
WISeKey is a global cybersecurity company currently deploying large scale digital identity ecosystems with a patented process. WISeKey’s Swiss-based cryptographic Root of Trust (“RoT”) provides secure authentication and identification in both physical and virtual environments for the Internet of Things, Blockchain and Artificial Intelligence.
The WISeKey RoT serves as a common trust anchor to ensure the integrity of online transactions among objects and between objects and people. Their integrated vertical trusted platform combines a range of chips with software applications that cater to their customers’ security and business needs.
The software includes proprietary technology developed by the company such as, RoT and Public Key Infrastructure (“PKI”). These technologies are offered as part of standalone products, as well as on the fully integrated Vertical Trusted Platform that enables WISeKey clients to manage their digital identity, information, and communications in a seamless process housed by complementary technology and products.
They enable their clients to adapt to a changing device landscape without compromising their digital security. The rapid growth and proliferation of internet based devices, as well as people’s dependence on them for personal and business needs, precipitated the connectivity of digital devices.
However, such connectivity creates numerous opportunities to alter or manipulate digital footprints. They believe that their integrated products provide the most comprehensive solution to these gaps in cybersecurity and data protection.
The core of WISeKey’s Vertical Trusted Platform is based on their Cybersecurity SaaS business, also known as managed PKI services, and on their Semiconductor chips.. .
Our solutions allow users to achieve optimal value from their video surveillance networks by automating video analysis to detect and alert for events of interest, expedite search in recorded video and extract statistical data from the footage captured by surveillance cameras. Xvidia solutions allows users to improve security and safety in their facilities, enhance the efficiency of guards and surveillance systems operators, produce valuable business insights and better manage the traffic flow of people and vehicles.
Building on its patented software architecture, advanced computerized vision and machine learning algorithms, and years of experience in software development for large scale surveillance deployments, Xvidia offers high-quality video analytics solutions that seamlessly integrate with a large variety of 3rd party systems. This makes Xvidia solutions the ideal choice for users looking to incorporate best-of-breed products in their surveillance networks.
Founded in 2013, Xvidia has sales, distribution and R&D operations in India & US with proven deployments worldwide across multiple industries, including critical infrastructure, city surveillance, central monitoring stations, transportation hubs and highways, law enforcement, retail, education, enterprise and industry, hospitality and more. We also provide hardware IP licensing to device manufacturers..
MicroBilt Corporation, is the single source and preferred provider of decision critical information that responsibly assists businesses in reducing risk and managing their business. MicroBilt provides online access to consumer and commercial credit bureau data with automated decisioning and collection services.
With its Connect Consumer Report, MicroBilt is the leading provider of alternative credit data to businesses that want to offer credit and other financial services to the approximately 110 million underserved and underbanked consumers in the United States.. .
Bolster is a deep learning-powered fraud prevention platform protecting the world’s leading brands from fraud. Bolster provides a comprehensive platform to defend brands from online scams and account takeovers, allowing organizations across various industries and sectors to increase business revenues as well as customer loyalty and trust.
By utilizing artificial intelligence to automate tasks and increase productivity, RedMarlin has introduced an unprecedented, proactive approach to brand protection. Encouraging organizations to also check and detect potential fraudulent websites and phishing scams, the company created checkphish.ai, a free, open-source community tool.
RedMarlin’s team has more than 40 years of combined cybersecurity experience from industry-leading companies including Cisco, Symantec, and McAfee. Founded in 2017 and based in Los Altos, California,.
Emailage is a developer of fraud prevention and identity verification technology used to make transactions easier and secure. The company provides multi-faceted predictive solutions with email at the core through key partnerships, proprietary data, and advanced machine-learning technology.
It proprietary algorithms in order to provide real-time alerts of risky transactions and delivers a risk score and enable companies to realize significant savings from identifying and stopping fraudulent transactions and improve customer experience.. .
TrustPort is a supplier of software solutions for data protection and secure communications. TrustPort has developed a completely new product for critical infrastructures like finance, military and government, emergency and transportation, etc.
This product is called TrustPort Threat Intelligence and it is basically a monitoring engine that specializes on detection of anomalous and outlier behavior. It closes the vulnerability gap left by the current security solutions that focus on identification of known threats.
Its engine recognizes attacks by atomic behavioral characteristics typical for a broad range of advanced malware attacks. Its artificial intelligence is based on supervised and unsupervised methods for classification, clustering and outlier analysis.
It is highly sensitive protection against all kinds of unknown and customized attacks and self-modifying malware. The solution is based on three complementary and interconnected security technologies: – Network Behavior Analysis (NBA) – Intrusion Detection System (IDS) based on deep packet inspection (DPI) and signature-based detection – Network Flow Monitoring (NPM – Network Performance Monitoring, APM – Application Performance Monitoring).
ThreatWarrior is the premier cloud-native network threat intelligence platform that stops both known and unknown cyber threats in real time. The agentless, deep learning platform analyzes network traffic to eliminate blind spots, determine security vulnerabilities, and stop active threats across on-premises, cloud and hybrid environments.
ThreatWarrior is the first solution to combine unsupervised neural networks, continuous deep packet inspection, behavior monitoring, network intelligence and automated response in a single platform. Leading organizations use ThreatWarrior to see everything happening on their network, learn the behavior of everything communicating across their enterprise, and act efficiently to stop threats other solutions miss..
Unnax enables businesses to access financial-related data from customers in a simple and secure way. The company offers a range of products that help solve common business problems and provides improved customer experiences through modern payment solutions, rich financial data, and intelligent risk and identity tools.
Its clients range from large companies to small businesses and consumers. Unnax is headquartered in Barcelona, Spain..
Fraugster is a German-Israeli anti-fraud company that uses artificial intelligence to eliminate fraud and increase customers’ profits. Fraugster’s journey began in 2014 with the vision to design and build an anti-fraud technology that can help create a fraud free world – one where no one has to care about managing risk again.
After years of working in the payments industry, the founders experienced first-hand the challenges of fraud for e-commerce merchants. The founders discovered that all existing anti-fraud solutions were built on outdated technologies and therefore not good enough to deal with sophisticated cyber criminals.
Existing rule-based systems as well as classical machine learning solutions are expensive and can’t adapt to new fraud patterns in real-time, hence inaccurate.. .
We are helping to build the new normal and our purpose is to take your business further, faster, and more successfully. Keybe is an Internet of Actions (IoA) service.
We offer a suite of cloud services based on Artificial Intelligence and Machine Learning that you can start using today without the need to know programming.. .
SaaS company that provides developers with a multi-cloud Kubernetes tool to help manage, deploy, and optimize applications with an instant cross-cloud capability. With CAST, developers can focus on their applications, CAST manages and optimizes their infrastructures on any cloud providers, automatically, without the need of DevOps: Day 1 Ops: CAST creates the infrastructure for Kubernetes: one cluster.
many clouds. 30 minutes.
Day 2 Ops: CAST manages the cluster once an application has been deployed: only use required resources and arbitrage the most efficient compute resources. Self heal: cloud micro failures are no more disasters.
No DevOps: full automated management No more vendor lock-in: Unlike Kubernetes services from cloud vendors, such as EKS (AWS Kubernetes) or GKE (Google Cloud), organizations will avoid vendor lock in by deploying across any clouds. We adopted this philosophy for ourselves also: Customers can elect to stop using CAST, their applications will continue to work, forever.
Cloud financial arbitrage As the Kubernetes cluster spans across multiple public clouds, the platform will optimize for cost and performance using the opportunities of price differences across clouds. The platform finds the most cost-effective public clouds and geolocations for your containers in real time.
You can create simple policies that dictate the boundaries of the optimization. For example, you can set CAST AI to only create new VMs if CPU utilization is more than 90%, or destroy and consolidate VMs when the CPUs are less than 20%.
Feedzai is AI. We’re coding the future of commerce with today’s most advanced risk management platform powered by big data and artificial intelligence.
Founded and developed by data scientists and aerospace engineers, Feedzai has one mission: make banking and commerce safe. The world’s largest banks, payment providers and retailers use Feedzai’s machine learning technology to manage risks associated with banking and shopping, whether digitally or in person..
Basis Technology provides software solutions for extracting meaningful intelligence from unstructured text in Asian, European and Middle Eastern languages. They help technology companies and government organizations improve the accuracy of information retrieval, text mining and other applications through advanced linguistics.
Their Rosette Linguistics Platform uses state of the art Natural Language Processing techniques to improve information retrieval, text mining and other applications. Rosette provides capabilities like identifying the language of incoming text, providing a normalized representation in Unicode, and locating names, places and other key concepts from a body of unstructured text.
Rosette is the world’s most widely-used family of commercial software products for multilingual information retrieval. Its reliability, scalability, accuracy, and strict compliance with industry and international standards have been put to the test in high volume transaction environments, such as Google’s multilingual search engine, PeopleSoft’s human capital management software, and Amazon.com’s global e-commerce system..
CybeReady is the leader in Autonomous Cyber Security Awareness. We reduce organization cyber risk by using AI powered training platform that implements adaptive learning methodology and guarantees dramatic change in employee behavior.
Staring to use and operate the solution requires zero effort and resources making it the most affordable option.. .
Upstream is the first cloud-based centralized cybersecurity and analytics platform that protects the technologies and applications of connected and autonomous vehicles fleet. The platform leverages big data and machine learning to provide OEMs and vehicle fleets with unprecedented, comprehensive, and non-intrusive defense.
With application security, real-time data protection and anomaly detection, attacks are identified and blocked before they reach and harm the vehicle’s network. Upstream Security helps corporations mitigate connectivity risks and ensure the safety and security of smart mobility solutions protecting connected and autonomous vehicles.
It also secures drivers, vehicles, and mobility services from misuse and cyber-attacks. Upstream C4 is a data-driven cloud-based platform that integrates with automotive data streams of vehicles and promises to detect incidents as they happen in real-time and allocating a rating based on perceived impact and severity The company was received the 15th Annual 2019 Info Security PG’s Global Excellence Awards in Automotive Security (IoT) and Cybersecurity Excellence Awards 2019 – Gold Winner (Automotive Cybersecurity Category).
Upstream Security was founded in February 2017 and is based in Herzliya, Tel Aviv, Israel.. .
Cyabra protects from disinformation and deepfakes (a.k.a fake news). Our product filters out the fake from real, to make decisions based on unbiased & genuine opinions and content.
The team consists of information warfare veterans, from the IDF.. .
Onward Security is a leading brand in cybersecurity and provides security assessment solutions for connected devices. Founded in 2014, in addition to possessing an international laboratory, it develops automated security assessment products with AI and machine learning features.
Onward Security has received patents and awards in many countries and helped customers in government, IoT/IIoT equipment manufacturing, finance, telecom, and other industries with certificates obtaining. Its products and services discover potential cybersecurity threats and vulnerabilities and protect important information or product security, as well as be fulfill with security compliance and industrial standards..
Ordr develops an AI-based systems control engine for the hyper-connected enterprise. Ordr’s control engine is a purpose-built solution to fully map the device flow genome at massive scale, using machine learning to continuously inspect, classify, and baseline the behavior of every device.
Its software architecture is unique in its ability to process enormous quantities of data in real-time, using AI to provide closed loop security, generating policies for each class of device and implementing those policies through the organization’s existing multi-vendor network and security infrastructure. Ordr was founded on 2015 and is headquartered in Santa Clara, California..
Vectra is a cybersecurity platform that uses AI to detect attackers in real-time and perform conclusive incident investigations. It specializes in network detection and response – from cloud and data center workloads to user and IoT devices.
Their Cognito platform accelerates threat detection and investigation using artificial intelligence to collect, store, and enrich network metadata with the right context to detect, hunt, and investigate known and unknown threats in real-time. The company offers three applications on the Cognito platform to address high-priority use cases.
Cognito Stream sends security-enriched metadata to data lakes and SIEMs. Cognito Recall is a cloud-based application to store and investigate threats in enriched metadata.
And Cognito Detect uses AI to reveal and prioritize hidden and unknown attackers at speed. Vectra was founded in 2010 and is based in San Jose, California..
Brainwave Science is a company established in a post 9/11 world to address issued pertaining to terrorism, counter intelligence, national security, border security and immigration with the sole aim to support law enforcement agencies on a global level and help delivery of truth and justice with help of technology. The pressing issues of our time can be solves with Brain Fingerprinting technology by Brainwave Science.
Our technology is modern, advanced, automated, portable and can be applied in virtually all cases. Just give us a call to know more of how it works and what it can do to serve your needs..
Nethone specializes in cyber-security with focus on preventing fraud in remote channels, e.g. payments with credit and debit cards or when it is related to identity or account takeover.
One prevents transactions made by unauthorized individuals in the fastest growing remote channel, through artificial intelligence and deep profiling of online users. This translates not only into avoiding threats but also allows customers to develop their business and improve the quality of services.
At a time when companies operating in online channels care about the best possible user experience, Nethone provides them with a risk management tool that can have a positive impact on the shopping experience. As a result, merchants experience higher conversion rates and a greater chance of better retention of end customers by eliminating unnecessary friction experienced by the users.
Founded in 2016 by experienced data scientists, security experts, and business executives and is based in Warsaw, Poland.. .
Retruster is an email protection platform for the cloud era. Retruster stops phishing and fraud, and gives organizations full control over their email function.
Some of the world’s best-know companies have turned to Retruster. See more at retruster.com.
GRYPHON is a cloud managed network protection software platform for homes and small businesses that’s powered by machine learning. The Gryphon Guardian is the most affordable advanced security and parental control system on the market.
Use as a standalone unit, combine 2 or more for seamless mesh WiFi coverage, or use as a low-cost option to expand the coverage of your original Gryphon router.. .
LearnPlatform is the edtech effectiveness system used by school districts, states, higher ed institutions, and their partners to organize, streamline, and rapidly analyze the impact of their technology and teaching practices. Over 150,000 educators across thousands of schools use LearnPlatform’s free and paid services to save time, save money, and improve outcomes.
The company delivering ground-breaking tools that save money, improve learning, and build the capacity of hundreds of thousands of educators and their organizations.. .
Trustlook (www.trustlook.com) is a global leader in next-generation cybersecurity products based on artificial intelligence. Their innovative SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.
Trustlook’s solutions protect users from both known and zero-day threats by analyzing millions of code-level and behavior combinations to find malicious patterns. Founded in 2013, the company is headquartered in San Jose and managed by leading security experts from Palo Alto Networks, FireEye, Google and Yahoo..
One & Only Pro
One & Only is a bespoke company who deal exclusively with the acquisition of UK investment property. The majority of their clients reside in the far and middle east however they have worked with clients from 22 different countries.
One&Only’s artificial intelligence system analyses all the property on sale in the UK and finds the property which will rise most in price. They highlight the best property investments, putting proven professional analysis in the hands of every buyer.
They are talking to the UK’s largest estate agency, and have recently featured in the FT Advisor. They are developing a property trading platform, where transactions take a few clicks..
Resistant AI protects the machine learning system from adversarial manipulation and advanced fraud. We believe that responsible and systematic adoption of machine learning techniques can profoundly improve our lives.
Our mission is to accompany our customers on this way and to ensure that the risks related to machine learning and AI adoption are responsibly detected, managed and resolved.. .
Agari is transforming the legacy Secure Email Gateway with its next-generation Secure Email Cloud. Agari Identity detects, defends, and deters costly advanced email attacks including business email compromise, spear phishing, and account takeover.
It was founded in 2009 and headquartered in Foster City, California.. .
DriveLock SE, is headquartered in Munich, Germany with offices in Pleasanton, USA and Sydney, Australia and has become one of the leading Endpoint Protection Platform software vendors over the past 15 years. The Endpoint Protection Platform from DriveLock is particularly strong when used in the extremely granular environment of Device Control for USB protection, as well as for the encryption of hard disks, SSD’s or USB memory devices.
Applications and their associated devices can be comprehensively protected with the Smart AppGuard based on integrated Artificial Intelligence with Predictive Whitelisting and Machine Learning functionality. DriveLock supports various operating systems, devices, and is available as a hybrid solution either on-premise or from the cloud..
DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance. The platform provides data scientists and developers with a “data fleet” that allows them to create analytics, ML models, and applications on highly sensitive data sets without ever having explicit access to the data.
Each data fleet has easy-to-use APIs, and under-the-hood they ensure data protection using advances in federated computation, transfer learning, encryption, and differential privacy. DataFleets helps organizations to overcome the struggle between data privacy and innovation by helping them maintain data protection standards for compliance while accelerating data science initiatives..
DNSFilter is the simplest yet most powerful content filtering solution available. Backed by artificial intelligence and the industry’s largest anycast network, every single click a user makes is protected. Their AI blocks brand new, never-before-seen threats up to 59 hours before other content filtering providers.
DNSFilter prides themselves on being easy to work with, whether you’re a Fortune 500 organization or an MSP partner. Their goal is to make web filtering as easy as possible so users don’t have to think about cybersecurity.
DNSFilter has repeatedly been recognized by G2 and awarded badges such as:
- Best relationship
- Best usability
- Easiest admin
- Most implementable
Xator is a provider of integrated security, intelligence and information technology solutions to the U.S. Government and its support contractors.
Our work directly impacts the security of personnel, facilities, critical infrastructure, and information throughout the world.. .
Anonos patented “Data Liquidity” technology simultaneously achieves Universal Data Protection and Unrivaled Data Utility by embedding controls that flow with the data to enforce protection at the time of use. Anonos enables the maximum lawful liquidity value of data for sharing between parties to support AI, ML, and BI applications and many others.
With Anonos, companies can leverage their internal and external data while guaranteeing individual privacy rights as required under evolving data protection laws. Anonos has achieved what many thought was impossible: technology enabling data to be used and shared with the accuracy of clear text in a non-identifying and lawful manner.
Learn more at https://www.anonos.com. .
IT Svit is a company with more than 14 years of experience in providing IT outsourcing services. From a small group of friends centered at remote server administration, we grew to a team of 50+ DevOps engineers, Big Data architects, and a full-stack web development team.
We specialize in providing full-cycle services for startups and lending our technical expertise to ensure the success of our customers. Our services include the following: 1.
Startup consulting and idea refinement 2. MVP development, release and scaling 3.
Blockchain development and implementation 4. Transition to the cloud from the legacy systems 5.
Migration between cloud service providers 6. IT infrastructure design, implementation and optimization 7.
CI/CD workflows design and implementation 8. Production environment monitoring, logging and alerting 9.
Cylance is the first company to apply artificial intelligence, algorithmic science, and machine learning to cybersecurity and improve the way companies, governments, and end-users proactively solve the world’s most difficult security problems. Using a breakthrough mathematical process, Cylance quickly and accurately identifies what is safe and what is a threat, not just what is in a blacklist or whitelist.
By coupling sophisticated math and machine learning with a unique understanding of a hacker’s mentality, Cylance provides the technology and services to be truly predictive and preventive against advanced threats.. .
Rang Technologies Inc.
Headquartered in New Jersey, Rang Technologies has dedicated over a decade delivering innovative solutions and best talent to help businesses get the most out of the latest technologies in their digital transformation journey. Rang Technologies has grown to become a global leader in Analytics, Data Science, Artificial Intelligence, Machine Learning, Salesforce CRM, Cloud, DevOps, Internet of Things – IoT, Cybersecurity, IT Consulting and Staffing, and Corporate Training.
Our clients, which include Fortune 500 to Start-up companies, come from a wide array of industries, including pharmaceuticals, healthcare, retail, technology, BFSI, media, automobile, manufacturing and several others. Our clients know they can rely on Rang Technologies to deliver customized and comprehensive digital solutions and talent to complement their business and technical objectives.
Combining the depth of our multidisciplinary team of professionals and boundless innovation with our “client-centric” approach to service, Rang Technologies has the right resources to help companies of all sizes cultivate real business value at the right price. This approach has led Rang Technologies to being recognized as one of the fastest growing companies in the United States by Inc magazine for three consecutive years and NJ’s fastest 50 growing companies for the recent year.
With our global presence, we have been providing a generous repository of technology manpower and consistent availability of external subject matter experts with the best speed and quality. Our goal is to meet expectations of excellence – those of our clients, our employees, our candidates and those of our community.
Our corporate culture is one of integrity and loyalty. These core values are evident in all that we do.
We are committed to ensuring that your experience with our technology experts and recruitment specialists will be a positive one.. .
Opora develops cyber threat intelligence technologies. It combines cloud computing, big data, machine learning, and other cutting-edge fields into an intelligent, dynamic, and robust cyber threat intelligence platform running on the global cloud.
The Gartner Research Group named the company a cool vendor in “Cool Vendors in Security and Risk Management Software for Technology and Service Providers, 2018”.. .
G-Research is a research and technology company that specializes in quantitative research, IT infrastructure, and machine learning. It offers a software platform that utilizes machine learning and big data analytics to predict movements in financial markets.
The company was founded in 2001 and headquartered in London, England.. .
Microblink is an R&D company that develops AI-powered solutions that automate personal data entry in mobile and web apps by using camera input. Their SDKs & Web APIs extract data from various types of IDs, passports, travel visas or credit cards to automate data input and minimize manual work.
Microblink’s off-the-shelf products solve real-life problems and are optimized for easy integration into any app. They bring great UX to all major verification or biometric solutions.
Microblink’s solutions improve existing KYC processes and contribute to lower fraud rates in numerous industries.. .
SecureWorks is a security service provider offering network, IT and managed security solutions. The company focuses exclusively on information security services and was recently positioned in the Leader’s Quadrant in Gartner’s Magic Quadrant for Managed Security Services Providers (MSSPs).
The security information and event management (SIEM) platform augmented with the applied security research and 100% GIAC-certified experts, protects clients with Managed Security Services and SIM On-Demand solution. Secureworks combines visibility from thousands of clients, artificial intelligence and automation, and actionable insights from their team of elite researchers and analysts to create a powerful network effect that provides increasingly strong protection for their clients.
The company enabling to prevent, detect, rapidly respond to and predict cyberattacks.. .
Dathena Science has been founded with a vision of bringing a new paradigm to privacy and data security protection. In an ever-growing information flow.
Enterprises around the world face the daunting challenge of harnessing, managing and controlling data in a more regulated environment with growing societal expectation with regards to privacy protection. Leveraging the power of latest AI technologies, Dathena is delivering breakthrough solutions with unprecedented efficiency, speed and accuracy to secure the “privacy and data security protection journey” of its clients..
Protegrity protects the world’s most sensitive data wherever it resides. Our industry-leading solutions allow businesses to finally tap into the value of their data and accelerate digital transformation timelines – without jeopardizing individuals’ fundamental right to privacy.
For more than 20 years, Protegrity has delivered innovative, data-centric protection for the most sensitive data of the largest brands on the planet. We free businesses from the constraints associated with accessing and leveraging data to create better customer experiences, make intelligence-supported decisions, and fuel innovation.
Data knows no boundaries and Protegrity’s technology is built for data ubiquity. Our Heritage For the past 15 years, Protegrity has delivered first-class protection for sensitive enterprise data at the largest brands on the planet.
Throughout our journey, we’ve adapted with a changing technology industry, transforming to meet the needs of our customers and partners. That is why we are able to provide data-security and privacy solutions for the world’s leading platforms and data stores, including Oracle, Microsoft, Teradata, and Cloudera.
We also can secure every major cloud provider, from AWS, Google, and Azure, to the leading SaaS solutions, such as Snowflake, Workday, and Salesforce.com. Our Mission At Protegrity, we have a storied history of innovation in data privacy and security.
This heritage grounds us as we work with the world’s leading brands and technology partners to transform our software platform to provide the capability and freedom to innovate with data.. .
Cybint is a global cyber education company with a commitment to reskilling the workforce and upskilling the industry in cybersecurity. It tackles the industry’s two greatest threats: the talent shortage and the skills gap.
Their approach to combatting cybercrime fuses timely threat-based content, role-specific learning paths, and accelerated training methods to maximize retention and minimize risk. The company was founded in 2014 and now has offices in New York City, Tel Aviv, and Singapore; and partners in more than 15 countries..
Powered by proprietary Artificial Intelligence models and uniquely built on billions of real-world data points, CUJO AI portfolio of products is designed to gain a clear insight on how data moves across networks and digitally protect people and devices, creating a safer smart-living experience in homes, businesses, and connected communities. Network, mobile and public Wi-Fi operators around the world utilize the CUJO AI portfolio of products to provide their customers with a seamlessly integrated suite of value-added services, covering: advanced connected device identification, real-time network security, privacy protection, and content access control.
HIGHLIGHTS – Highly Commended award in the Security Solution of the Year category, Global Telecoms Awards 2019. – Winner: the Most Innovative Security Strategy, Leading Lights 2019 Awards.
– Winner: 2019 Lithuanian-American Innovation Award for cutting-edge technology. – Selected among the world’s most promising growth-stage companies for GSMA 100 program.
– The company won the Security Solution of the Year award at the 2018 Glotel Awards. – Recognized as a Technology Pioneer 2018 by the World Economic Forum – Listed as a “Vendor to Watch” and a “Cool Vendor in IoT Security” by an acclaimed research company Gartner.
– Official Member of Forbes Los Angeles Business Council.. .
SECURITI.ai is an innovator of AI-Powered cybersecurity and data protection infrastructure. Our product suite is the world’s first PrivacyOps platform that helps automate all major functions needed for privacy compliance in one place.
It enables enterprises to give rights to people on their data, be responsible custodians of people’s data, comply with global privacy regulations and bolster their brands. The AI-Powered PrivacyOps platform is a full-stack solution that operationalizes and simplifies privacy compliance using robotic automation and a natural language interface.
These include: – DSR (Data Subject Requests) Robotic Automation – People Data Grapher – Data Mapping Automation – Consent Management – Assessment Automation – Vendor Risk Management – AUTI, Expert Bot Assistance. .
Incubated from IIT Bombay in 2012 and headquartered in Palo Alto, Lucideus has over 200 customers worldwide with an average NPS of 73. Backed by John Chambers and senior executives from SoftBank, Sequoia, PayPal, Adobe and McKinsey & Co., it was also one of the Top 5 Contributors to the NVD of the U.S.
Government in 2019. Its platform, SAFE, allows an organization to get an Enterprise-Wide, Objective, Consistent & Real-Time Visibility of it’s overall Cyber Risk Posture.
Built on supervised machine learning engine, SAFE gives an output both in the form of a breach likelihood score (between 0-5) and the $ value Risk the organization is sitting on, along with providing prioritized actionable insights based on technical cybersecurity signals, external threat intelligence, and business context of what and where are the “weakest links” across people, process and technology. The company, since 2018, has also been working with MIT for a joint research and development on the SAFE Scoring Algorithm and has received several awards including the Morgan Stanley CTO Innovation Award 2019..
Chronicle Security is a new company under the Alphabet umbrella. Chronicle Security applies the usual Google tenets of machine learning and cloud computing to cybersecurity.
The company is building a “cybersecurity intelligence platform” that can help organizations better manage and understand their own data. Born from X, the moonshot factory, Chronicle is an independent company within Alphabet.
Chronicle is dedicated to helping companies find and stop cyber attacks before they cause harm. Chronicle works with the entire security industry to give good the advantage in the fight against cybercrime..
Silobreaker helps business, security and intelligence professionals make sense of the overwhelming amount of data on the web. By providing powerful tools and visualisations that cut through the noise and analyse data from hundreds of thousands of open sources, Silobreaker makes it easy for users to monitor and research companies and industries, threats, compromises, actors, instabilities, geopolitical developments or any other topic, incident or event.
Customers save time by working more efficiently through large data-sets and improve their expertise, knowledge and decision-making by examining and interpreting contextually relevant data more easily.. .
Cyber Intelligence House
Cyber Intelligence House is an independent company specializing in cyber exposure. They discover breached credentials and stolen information fast to minimize damage from a breach.
They help individuals and organizations to manage their risks and help companies to communicate their exposure to their stakeholders, meet compliance requirements such as GDPR and manage their operational security. Cyber Intelligence House launched the technology in 2012 and was incorporated in 2015 in Singapore..
Youverify helps businesses and individuals confirm identity and physical addresses. Using AI, Youverify confirms a user’s identity document and compares it with their facial biometrics.
This information can be cross-checked against more than 300 databases locally and globally. Youverify in partnership with over 20,000 field verification officers verifies physical addresses all over Sub-Sahara Africa in less than 48 hours.
Youverify fills the gap in Africa’s digital industry by providing one API for identity and physical address verification.. .
Fraudsters have no place in today’s digital economy. To protect against fraud and financial crime, businesses online needs to know that their customers are who they claim to be.
But Jumio believes good customers shouldn’t be bothered with identity verification solutions that slow them down. Jumio uses the power of informed AI, biometrics, machine learning, and certified liveness detection to help you rapidly convert more customers, stop fraudsters from infiltrating your online ecosystem.
Jumio also helps organizations meet regulatory compliance including KYC, AML and GDPR and has verified more than 225 million identities issued by over 200 countries and territories from real-time web and mobile transactions. Jumio’s solutions are used by leading companies in the financial services, sharing economy, digital currency, retail, travel and online gaming sectors..
Shoghi communications, a defense technology company supply strategic electronic security systems, Surveillance, Communication intelligence, cryptography and network security systems for aerospace and defense industry. Focused on Defense Technology, Shoghi delivers and supports a wide range of systems and solutions.
Shoghi being an OEM Solutions provider, can provide customized solutions as per the customer requirement. Shoghi Communications focusing on usage of Strategic Communications solutions, to the defense and government entities worldwide.
Our pristine capabilities in the fields of Intelligence Surveillance and Reconnaissance Systems, Electronic Warfare, Cyber Intelligence, COMSEC, Satellite Imaging, Avionics and Trainings, Supports Countries Defense, Space, and Homeland Security agencies.. .
Awaait Artificial Intelligence S.L.
Awaait Artificial Intelligence develops and provides real-time video analytics systems controllable through mobile applications and powered with Artificial Intelligence. It was founded in 2014 in Barcelona with the objective of providing innovative real-time solutions for in principle complex problems using artificial intelligence and mobile technology.
AWAAIT’s first product is DETECTOR, an automatic real-time video analytics system that aims to tackle fare evasion on public transport.. .
Penten is creating new globally unique capabilities and opportunities for growth, disrupting old defense industry models. By forming deep relationships Penten has been able to align its purpose with the common and special needs of our government global customers.
We focus on the user mission, making them safer, more connected and more effective. Penten is creating and delivering new secure mobility technologies to help government build a connected and integrated security workforce for the next 20 years of national security needs.
Penten is delivering capabilities using Artificial Intelligence to identify, disrupt and trap digital adversaries. Applying these technologies to both strategic cyber and electronic warfare missions.
Penten has grown from 4 to 65 people in the last 3 years, has been internationally recognised for its technology, exports to 3 nations and was named Australian Business of the Year.. .
IntSights is an external threat intelligence and protection platform, designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect and prevent threats at their source before they even reach the perimeter.
The founders are veterans of elite Israeli military intelligence units, where they acquired a deep understanding of the hacker mindset, as well as the most effective techniques to defend against it. IntSights is backed by Blackstone Group, Clearsky, Wipro Ventures, Tola Capital, Blumberg Capital, and others..
SIA Ipro is leading IT company in Baltic region with clear own vision on IT development trends. Company iPro works in the IT market for the second decade already, and over this period of time they have successfully implemented more than two hundred projects.
Intrusion Detection Systems and Intrusion Prevention systems, artificial intelligence based (NBAD) modern computer safety tools and Network-Attached Storage have become a standard in the last years and they are proud to be the ones who initially helped to implement these in Latvia.. .
Pindrop uses AI-based IVR Authentication and Anti-Fraud Solutions to increase efficiency in call centers and stop fraudulent transactions. Pindrop solutions are leading the way to the future of voice by providing identity, security, and authentication for every voice interaction.
Pindrop solutions protect some of the biggest banks, insurers, and retailers in the world using patented technology that extracts an unrivaled amount of intelligence from every call encountered. Pindrop solutions help detect fraudsters and authenticate callers, reducing fraud and operational costs, while improving customer experience and protecting brand reputation.
Pindrop, a privately held company, headquartered in Atlanta, Georgia, was founded in 2011 and is venture-backed by Andreessen Horowitz, Citi Ventures, Felicis Ventures, CapitalG, GV, and IVP.. .
Cawamo is a security company that provides an infrastructure for advanced video applications. The company also provides AI-based, easy-to-use, and cost-effective solutions for turning security cameras into intelligent and accurate alert systems.
It offers an end-to-end surveillance solution with its pre-trained neural networks for multiple security-oriented scenarios. Cawamo’s service connects to any camera and transforms it into a smart camera with superior capabilities including video handling involving artificial intelligence.
The company solution enhances the IP camera’s capabilities by adding human intelligence to track security events using cloud and onsite combined architecture, allowing us to offer superior services at surprisingly low prices. Cawamo was founded in 2016 and is based in York, United Kingdom..
Spin Technology is a SaaS data protection company based in Palo Alto, California. We protect SaaS data against ransomware, human error and insider threats.
Our solutions extend security for Google G Suite and Microsoft Office 365 environments and protect organizations against Data Leak & Data Loss in the cloud by monitoring, securing, and backing up sensitive SaaS data. Our Artificial Intelligence provides 24×7 monitoring and detection against harmful threats, identifies business risks, while our automated run books and deploys powerful countermeasures to ensure continuous operation, improve compliance, and reduce IT costs.
Our platform “SpinOne” provides end-to-end fully automated protection against ransomware, insider threats and human error. It’s designed to provide an unique security expertise and help to save a tremendous amount of time for security teams and administrators.
SpinOne helps organizations gain full visibility over data security by providing an extra protection layer of new generation AI-based security and backup beyond the capabilities of what a typical cloud service provider can offer. Find out more at spin.ai.
GigaIO is a computer networking company that specializes in providing AI/ML/DL, Edge Computing, High-Performance Computing, and Rack-Scale computing. The company provides memory fabric solutions for computing clusters.
GigaIO was founded in 2012 and headquartered in Carlsbad, California.. .
Ripjar is a data intelligence platform company whose mission is to provide corporates and institutions with the most advanced data and analytics solutions to protect themselves in real-time from evolving risks that threaten their growth, prosperity, and value. Founded by former members of the UK’s Government Communications Headquarters (GCHQ), Ripjar develops software products that combine automation, artificial intelligence, and data visualization to help companies solve the most complex risk and security management problems at scale.
Ripjar was incorporated in 2012 and is headquartered in Cheltenham, Gloucestershire.. .
UpGuard’s proprietary technology tests an organization’s IT infrastructure both internally and externally and calculates the potential risk for future intrusions and outages. Upon evaluating the ongoing configuration state of every server and network device, companies are given an easy-to-understand score called CSTAR — a single number which indicates to IT staff as well as their executives their risk level for data breaches.
An organization’s CSTAR score can even be used by corporate insurers in creating a cybersecurity insurance policy. Thousands of companies, including ADP, E*TRADE, and Cisco Systems, use UpGuard to validate infrastructure, continuously detect risks, and procure cybersecurity insurance.
UpGuard is headquartered in Mountain View, California with offices in Portland, Oregon.. .
RIWI is a global survey technology, global messaging, and global predictive analytics firm. We help customers who need adaptive insights and large sets of privacy-compliant opinion data, behavioral data, and population trends data.
We offer predictive and applied analytics, message testing, and risk monitoring anywhere around the world through long-term agreements and monthly subscriptions.. .
CyberSaint Security is a leading cybersecurity software firm that helps organizations address business risk through an automated, intelligent cybersecurity compliance and risk management program. Based in Boston, Massachusetts, the CyberSaint team’s intellectual DNA winds deeply through the academic, tech and investment communities in Boston, the White House, RSA, IBM, EMC, KPMG, MIT, Harvard, and others.
The Company’s mission is to empower organizations to adopt cybersecurity frameworks that enable holistic measurement, enhance communication and improve cybersecurity resiliency. The CyberStrong Platform is an integrated risk management solution powering automated, intelligent cybersecurity compliance and risk management.
Built on the gold-standard foundation of the NIST Cybersecurity Framework, CyberStrong’s patented capabilities streamline and automate GRC activities and provide a single pane of glass through which CISOs and their security teams can measure, report, and mitigate risk. CyberStrong’s unparalleled time-to-value, breakthrough Artificial Intelligence and Machine Learning automation eliminate manual effort and help organizations make informed decisions that reduce risk while driving overall business value..
Sigmabit of Elbit Systems specializes in artificial intelligence, cyber security, and big data for solutions in defense. It develops innovative solutions based on cutting-edge technologies (and sometimes create them).
We offer a dynamic environment backed by a global leader.. .
Inky is a cyber-security company that secures email against phishing. It is a cloud-based email security platform that make Inky Phish Fence, an email protection gateway that uses sophisticated AI, machine learning, and computer vision algorithms to block deep sea phishing attacks that get through every other system.
Inky Phish Fence can either quarantine suspicious emails or deliver them with disabled links and user-friendly warnings. It is easy to deploy for Office 365, Exchange, or G Suite.
Inky was founded in 2008 and is headquartered in College Park, Maryland.. .
Ontic is the first protective intelligence software company to digitally transform how Fortune 500 and emerging enterprises proactively address physical threat management to protect employees, customers and assets. Ontic’s SaaS-based platform collects and connects threat indicators to provide a comprehensive view of potential threats while surfacing critical knowledge so companies can assess and action more to maintain business continuity and reduce financial impact.
Ontic also provides strategic consulting, multidimensional services, education and thought leadership for safety and security professionals at major corporations via its Center for Protective Intelligence. For more information please visit ontic.ai.
PerimeterX is a provider of scalable, behavior-based threat protection technology for the web, cloud, and mobile. By analyzing the behavior of humans, applications, and networks, PerimeterX catches in real-time automated attacks with unparalleled accuracy.
Its security service PerimeterX Bot Defender accurately protects commerce, media, and enterprise websites from all types of automated or non-human attacks, at any scale. The company was listed in the Top 5 Cybersecurity Startups Of 2019 by Business Computing World and was ranked in the 100 most promising private artificial intelligence companies in the world by CBInsights.
PerimeterX was founded in 2014 and is based in San Mateo, California.. .
Onfido digitally proves a user’s real identity using AI technology, by verifying their photo ID and comparing it to their facial biometrics. It means users and businesses can verify their online identities anywhere and anytime, without compromising on experience, inclusion, privacy or security.
Onfido powers over 1,500 fintech, banking, and marketplace clients globally—helping them onboard more users while reducing risk. Identity underpins all transactions, and over the coming years, access to everything will be based on every user’s ability to easily and securely prove their legal identity.
This will change how we think of access—everything from opening a bank account to self-checking-in to a hotel, and ultimately voting.. .
This article was written by Benjamin Skute from Threat.Technology. The editor for this article was Tess Page. If your company is featured in this article and you want to have amendments made please contact us on: [email protected].
Alternatively you may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.