Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. A wide variety of malware types exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and scareware.
Top Malware Companies and Solutions
This article showcases Threat.Technology’s top picks for the best Malware solutions. We selected these companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
FireEye is a cyber security company that combines the automation of technology with unparalleled frontline human expertise, including industry-recognized services and nation-state grade threat intelligence. On the front lines of cyber attacks every day, FireEye has unrivaled real-time knowledge of the global threat landscape spanning more than two decades, gathered by hundreds of highly experienced threat researchers, platform engineers, malware analysts, intelligence analysts, and investigators, as well as a global network of best-in-class business partners.
This unique understanding of how organizations combat cyber attacks guides the products FireEye builds. Working as a seamless, scalable extension of customer security operations, FireEye offers a unified platform called Helix that integrates and analyzes the data from security assets to offer real answers about the threats that matter.
With innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant consultants, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, respond to, and remediate cyber attacks.
CrowdStrike is a cybersecurity technology firm pioneering next-generation endpoint protection, delivered as a single integrated cloud-based solution. CrowdStrike’s Falcon platform stops breaches by detecting all attacks types, even malware-free intrusions, providing five-second visibility across all current and past endpoint activity while reducing cost and complexity for customers.
CrowdStrike’s Falcon platform is delivered via the security industry’s only 100% native cloud architecture, integrated with 24/7 managed hunting capabilities and in-house threat intelligence and incident response teams. CrowdStrike’s unique Threat Graph harnesses the cloud to instantly analyze data from billions of endpoint events across a global crowdsource community, allowing detection and prevention of attacks based on patented behavioral pattern recognition technology..
SentinelOne delivers autonomous endpoint protection that prevents, detects, and responds to attacks across all major vectors. The company aims to shape the future of endpoint security with an integrated platform that combines behavioral-based detection, advanced mitigation, and forensics to stop threats in real-time.
Specializing in attacks that utilize sophisticated evasion techniques, SentinelOne is a vendor that offers complete protection against malware, exploit, and insider-based attacks. This led Gartner to recognize SentinelOne as a Visionary in their recent Endpoint Protection Magic Quadrant.
SentinelOne is also a next-generation endpoint protection company to be independently certified as a true antivirus replacement for Windows, OS X, and Linux, including certification for both HIPAA and PCI. SentinelOne was formed by an elite team of cybersecurity and defense experts from IBM, Intel, Check Point Software Technologies, Cylance, McAfee, and Palo Alto Networks.
The Mountain View, California-headquartered company was established in 2013 by co-founders Almog Cohen, Tomer Weingarten, and Ehud Shamir.. .
Criminals want to gain trusted status and go undetected. This makes keys and certificates a prime target, which are blindly trusted by most of today’s Global 5000 enterprises.
Criminals steal and compromise keys and certificates that are not properly protected, and use them to circumvent security controls—to hide in encrypted traffic, deploy malware, and steal data. these uniquely identify webservers, software, mobile devices, apps, admins, and even airplanes This has become the attack of choice.
Current security controls are being undermined. Compromised SSL/TLS, SSH and mobile certificates and keys undermine data loss prevention, next-gen firewalls, strong authentication, sandboxing and other security systems.
Venafi finds all keys and certificates and puts them under surveillance to detect anomalies, and learns and adapts as it works. Venafi identifies what keys and certificates are trusted and those that need to be replaced.
It keeps keys and certificates secured to your policy and replaces them automatically. From stopping certificate-based outages to enabling SSL inspection, Venafi creates an ever-evolving, intelligent response that protects your network, your business, and your brand..
Menlo Security provides a cloud-based isolation platform that protects organizations from cyberattacks by eliminating the threat of malware from websites, documents, and emails. Menlo Security is trusted by major global businesses, including Fortune 500 companies and financial services institutions, and backed by Vista Equity Partners, Neuberger Berman, General Catalyst, Sutter Hill Ventures, Engineering Capital, Osage University Partners, American Express Ventures, Ericsson Ventures, HSBC, and JP Morgan Chase.
Menlo Security was founded in 2012 and headquartered in Mountain View, California…
Netskope is a software company that helps organizations understand online activities, protect data, stop threats, and respond to incidents. The company provides context-aware governance of all cloud usage in the enterprise in real-time, whether accessed from the corporate network, remote, or from a mobile device.
It also helps companies protect data and protect against threats in cloud applications, cloud infrastructure, and the web. Netskope patented Cloud XD technology eliminates blind spots by going deeper than any other security provider to quickly target and control activities across thousands of cloud services and millions of websites.
It offers different deployment options for traffic steering for analysis and policy control. The company can enforce policies including data loss prevention (DLP), access control, anti-malware, encryption, and incident management services on the cloud and web traffic it inspects.
Exabeam is a big data security analytics company that provides enterprises with advanced user behavior intelligence to unlock the potential of existing security information and event management and log management data repositories, enabling IT security teams to more quickly detect and respond to cyberattacks and insider threats in real time. The company’s user behavior intelligence technology fundamentally changes the way cyberattacks are detected and simplifies security operations by focusing on attacker behavior rather than ever-changing malware and tools, shining a spotlight on suspicious network activity, and reducing the noise of false positive security alerts.
Through extraction and enrichment of log feeds, user session tracking, behavior analysis, and event risk scoring, Exabeam gives IT security teams the ability to detect and track credential use in all parts of the attack chain and prioritize responses. The company was built by seasoned security and enterprise IT veterans from Splunk, Imperva, and Sumo Logic, and believes in working together as a team to achieve customer success.
SparkCognition is an artificial intelligence technology startup that builds AI technology solutions for industrial applications. A highly awarded company recognized for cutting-edge technology, SparkCognition develops AI-Powered cyber-physical software for the safety, security, and reliability of IT, OT, and the IoT.
The company’s technology is capable of harnessing real-time sensor data and learning from it continuously, allowing for more accurate risk mitigation and prevention policies to intervene and avert disasters. SparkCognition’s cognitive software, DeepArmor, is utilized to prevent and detect malware with a high level of accuracy and efficacy by using advanced machine learning and artificial intelligence.
They help customers analyze complex data, empower decision making, and transform human and industrial productivity with award-winning machine learning technology and expert teams focused on defense, IIoT, and finance.
Its self-learning AI is modeled on the human immune system and used by over 3,500 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems. This includes insider threat, industrial espionage, IoT compromises, zero-day malware, data loss, supply chain risk and long-term infrastructure vulnerabilities.
The company has over 1,200 employees, 44 offices and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage..
The VMRay Platform is a breakthrough solution for dynamic analysis of advanced threats, including zero day and targeted attacks. By surmounting inherent flaws that plague other products, VMRay Analyzer has become the gold standard for malware sandboxing among leading DFIR teams worldwide.
The core of the VMRay Platform is an agentless, hypervisor-based sandbox, which is unique in combining near-total evasion resistance with full visibility into malware behavior: a trait we call X-Ray Vision. Because nothing touches or modifies the analysis environment, monitoring is invisible, and even the most evasive malware strains fully execute in the sandbox.
By monitoring every interaction between malware and the target system, VMRay captures a complete and accurate record of threat behavior – data that enriches detection, incident response, digital forensics, and threat intelligence. VMRay Intelligent Monitoring excels over other solutions in distinguishing between malicious behavior and legitimate activity.
Carbon Black (NASDAQ: CBLK) is a leading provider of next-generation endpoint security. Carbon Black serves more than 4,300 customers globally, including 35 of the Fortune 100.
As a cybersecurity innovator, Carbon Black has pioneered multiple endpoint security categories, including application control, endpoint detection and response (EDR), and next-generation antivirus (NGAV). Leveraging its big data and analytics cloud platform – the Cb Predictive Security Cloud – Carbon Black solutions enable customers to defend against the most advanced cyber threats, including malware, ransomware, and non-malware attacks.
Deployed via the cloud, on premise or as a managed service, customers use Carbon Black solutions to lock down critical systems, hunt threats, and replace legacy antivirus…
Cofense, formerly PhishMe, provides phishing threat management for organizations concerned about human susceptibility. Cofense’s intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats.
Cofense’s customers include the defense industrial base, energy, financial services, healthcare, and manufacturing industries, as well as other Global 1000 entities that understand changing user security behavior, will improve security, aid incident response, and reduce the risk of compromise.. .
Malwarebytes is on a mission to create malware-free existence. Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware, and exploits that escape detection by traditional antivirus solutions.
The company’s flagship product combines advanced heuristic threat detection with signature-less technologies to detect and stop a cyberattack before damage occurs. Millions of people, businesses, and repair shops use, trust, and recommend Malwarebytes.
Founded in 2008, the company is headquartered in California, with offices in Europe and Asia, and a global team of threat researchers and security experts. For more information, please visit us at http://www.malwarebytes.com/.
CipherCloud, the leader in cloud information protection, enables organizations to securely adopt cloud applications by overcoming data privacy, residency, security, and regulatory compliance risks. CipherCloud delivers an open platform with comprehensive security controls, including AES 256-bit encryption, tokenization, data loss prevention, malware detection and visibility tools.
CipherCloud’s ground breaking technology protects sensitive information in real time, before it is sent to the cloud, while preserving application usability and functionality.. .
With over 500 labs and more created every day, Immersive Labs is building cyber skills content that rewards critical thinking, problem solving, and curiosity. Immersing teams in challenges covering everything from spelling the word cyber to using technical tools, threat hunting and reverse-engineering malware.
All seamlessly accessed from the browser with no installation needed. Allowing users to complete objectives from anywhere and on any device.
Immersive Labs empowers businesses to continuously develop skills, including ethical web hacking; ethical infrastructure hacking; reverse engineering; IoT/firmware security; and advanced cyber warrior CTF Challenges for enterprises, government, defense, and law enforcement agencies..
Callsign has built a secure mobile multi-factor authentication and authorisation engine, through the introduction of patented machine-learning biometric, behavioural, geo-location and identity analysis, combined with traditional methods. Designed for the Financial Services and IOT markets, Callsign’s crypto-engine provides unparalleled security across the enterprise, retail and consumer sectors to enable secure access, and to combat real-time phishing, Man-in-the-Middle and malware threats.
Their pre-defined API connectors simplify integration into existing directory and fraud solutions, enabling highly configurable, seamless and secure access that replaces costly and unpopular device-based solutions.. .
Lastline provides a malware protection platform to detect and stop advanced persistent threats, zero-day exploits, and evasive malware. The company was founded in 2011 by world-renowned security researchers and creators of Anubis and Wepawet – malware analysis tools used by thousands of security vendors, enterprises, and government agencies worldwide.
The company is headquartered in Redwood City, California, with offices in North America, Europe, and the Asia Pacific…
Morphisec delivers an entirely new level of innovation with its Moving Target Defense-powered proactive endpoint protection platform to create a zero-trust execution environment for your applications. This proactively creates a prevent-first posture against the most advanced threats to the enterprise, including APTs, file-based malware, zero-days, ransomware, fileless attacks, and web-borne exploits.
This complete endpoint security solution easily deploys into a company’s existing security infrastructure to form a simple, highly effective, cost-efficient technology stack that is truly disruptive to today’s existing cybersecurity model…
Alias Robotics is a robot cybersecurity company. Grounded upon prior experiences in robotics, we help groups improve their robot security posture via services including professional threat models , penetration testing or red teaming activities.
Alias is also the firm behind RIS, the Robot Immune System, a security certified software solution that protects robots and robot components against malware…
Intezer introduces a Genetic Malware Analysis technology, revolutionizing cyber threat detection and response. By identifying the origins of software, Intezer equips enterprises with an advanced way to detect modern cyber threats, while providing deep context on how to effectively respond to incidents.
Intezer offers solutions for incident response automation, cloud workload protection, threat intelligence, and more. For more information, visit www.intezer.com..
TrapX Security provides deception-based cyber security defense that rapidly detect, deceive, and defeat advanced cyber attacks, and human attackers in real time. It provides an automated security grid for adaptive deception and defense that intercepts real-time threats while delivering the actionable intelligence to block attackers.
The company’s product, DeceptionGrid, provides automated, highly accurate insight into malicious activity unseen by other types of cyber defenses. It enables Global 2000 enterprises to detect, capture, and analyze Zero Day malware in use by effective Advanced Persistent Threat organizations.
The TrapX Security customer base includes global 2000 commercial and government customers around the world in sectors including defense, healthcare, finance, energy, consumer products and other key industries. The company was founded on 2012 and is headquartered in San Jose, California.
Vade Secure is the global leader on anti-phishing, spear phishing, malware and ransomware with heuristic filtering. Language independent, the filter analyzes globally all incoming emails (links, attached files, content…) to detect all threats in zero-day, even the most targeted attacks.
After elimination all threats, we eliminate the nuisance of low priority emails with the Graymail Management. Ads, social networks notifications, and newsletters are automatically sent to the graymail folder while the Safe Unsubscribe button eliminate them forever.
Protecting more than 500 million of mailboxes in 76 countries, our solutions are used by major ISPs, OEMs, and Enterprises worldwide. Vade Secure is implanted in 5 countries (USA, Canada, France, Hong Kong, and Japan) to offer a 24/7 support.
ReSec is an Israeli cyber security company providing organizations with the ultimate protection from file-based malware threats, both known an unknown (“zero days”). We are a gateway solution, used by large and highly sensitive organizations for protection from email, endpoint, file uploads and downloads, and transfer threats.
Overcoming the limitations of conventional anti-malware detection solutions by using patented Content Disarm and Reconstruction (CDR) technology. ReSec’s ReSecure Platform is a multi-engine solution that treats every file as a threat, leaves the original file outside of the organization’s network, and delivers the end-user a threat-free and fully functional replica of the file in real-time.
ReSec is an established product that is market tested, with dozens of enterprise customers, from large banks, military and defense organizations, government offices, airlines, oil and gas companies and more.
Bromium delivers the benefits of micro-virtualization and hardware based security to enterprise desktops, reducing the enterprise attack surface for all users without the need for new management tools or skillsets. The company’s solutions enable an exceptional end-user experience with its protect-first design, isolating threats before they can harm the enterprise.
Bromium vSentry™, based on the Bromium Microvisor™. protects Windows® PCs from undetectable advanced malware that attacks the enterprise through tricking users into opening poisoned attachments, documents and websites.
vSentry enables IT to safely embrace key trends in mobility, and “anywhere, anytime” access – empowering users to collaborate, access cloud-hosted applications and the consumer web, and open unsafe documents and media without risk to enterprise information or infrastructure. Bromium vSentry technology provides additional features like LAVA, or Live Attack Visualization and Analysis.
Bromium vSentry helps enterprises to secure Windows® XP, both 32 and 64 bit versions of Windows 7, and virtual desktops delivered with Microsoft Remote Desktop Services (including Citrix XenDesktop and VMware View). vSentry is licensed per-user, enterprise wide, and priced according to volume.
Bromium was founded in 2011 by Gaurav Banga, Simon Crosby and Ian Pratt. The company’s founders led development of the Xen® hypervisor as well as the creation of HyperSpace, the world’s first firmware–integrated client hypervisor.
SafeGuard Cyber is a cloud-based technology that protects a company’s social assets from security threats and compliance risk factors. Their platform is a single solution to detect, prevent, and defend against threats in all digital channels.
They empower enterprise businesses to embrace new technologies and innovate without Fear. SafeGuard Cyber is a cloud-based technology that protects a company’s social assets from security threats and compliance risk factors such as malware, spam, rogue accounts, inappropriate conduct, and personal information.
SafeGuard Cyber automates the process of identifying, remediating, and archiving the words, phrases, concepts, files, and images within a social media post that create risk for your company, in real-time. SafeGuard Cyber is able to monitor social media pages, individual accounts, and internal collaboration tools to ensure comprehensive compliance and security protection across all social channels.
The company was founded in 2014 and headquartered in Charlottesville, Virginia.. .
Skycure is a predictive mobile threat defense (MTD) company with proactive defense solutions that actively detect and prevent mobile cyberattacks while preserving user privacy and experience and reducing the burden on IT. Skycure’s mission is to secure both BYO and corporate-owned mobile devices to allow companies to mobilize without compromise.
Skycure closes the mobile security gaps in organizations to protect against network-based threats, malware, vulnerability exploits, and other targeted attacks originating from both internal and external sources. Skycure’s patented technology employs a dual protection mechanism, which consists of a client-side module that resides on the device and protects it 24/7, together with a server-side service that provides heavy lifting analysis.
Skycure’s predictive technology (often referred to as “waze” of mobile security) is based on mobile threat intelligence gathered via massive crowd intelligence and sophisticated machine learning. Skycure’s research team is accredited with cutting edge publications (such as Accessibility Clickjacking, Cookie Stealer, No iOS Zone, Malicious Profiles, WifiGate, HRH, LinkedOut), ensuring the solution is always ready for future threats.
The company is funded by Shasta Ventures, Pitango Venture Capital, NYL and other strategic investors.. .
Garrison Technology Limited develops technologies for enterprise cybersecurity needs. The company was incorporated in 2014 and is based in London, United Kingdom.
It aims to serve the growing enterprise market with its anti-malware product. It wants to address the large and growing enterprise cyber security market.
The company has pioneered in an anti-malware product that efficiently sidesteps the highest impact cyber threats to modern organizations, i.e. internet-borne targeted attacks.
McAfee is an online security company that provides virus alerts and analysis on malware, network security threats, and web vulnerabilities. As a cybersecurity company, McAfee provides advanced security solutions to consumers, small and large businesses, enterprises, and governments.
Security technologies from McAfee use the predictive capability that is powered by McAfee Global Threat Intelligence, which enables home users and businesses to stay one step ahead of the next wave of viruses, malware, and other online threats. For business, enterprise, and government, McAfee provides comprehensive, integrated information security solutions that cover any environment.
Their endpoint and mobile security solutions protect end-user devices from threats, including viruses, phishing, malware, and other threats that target endpoints and users and include antivirus software and web security protection. Their network security solutions protect a network and its perimeter.
All their security solutions are managed through the centralized, single-console McAfee ePolicy Orchestrator that allows efficient and responsive management of the security infrastructure. Finally, McAfee Professional Services provide consulting, education, and technical support for all their security products and solutions.
For home users, McAfee secures mobile devices, including phones and tablets, as well as home PC, laptops, and other devices. McAfee products such as McAfee Total Protection and McAfee LiveSafe provide comprehensive antivirus and antimalware protection, as well as internet security that includes protection from adware, spyware, phishing scams, malicious websites, identity theft, and other threats to online security.
Perception Point is a Prevention-as-a-Service company, offering fast interception of any content-based attack across all collaboration channels including email, cloud storage, CRM apps, and messaging platforms. We prevent phishing, BEC, spam, malware, Zero-days, N-days well before it reaches the enterprise’s end-users.
Deployed in minutes with no change to the enterprise’s infrastructure, our solution confirms with any policy and requires zero fuss from IT teams. On top of that, we offer a significant added value service through our Incident Response team that serves as a force multiplier to the enterprise’s SOC team.
Our unique technology, which folds 7 different detection layers to provide a single verdict, has been recognized by Gartner and has proven time and time again to deliver the most effective ROI when compared to leading cyber solutions. As a result, the company now serves many global enterprises from all sizes and across all verticals, including Telecom, Food & Beverage, Tech, Healthcare, and more. Our unique technology, which folds 7 different detection layers to provide a single verdict, has been recognized by Gartner and has proven time and time again to deliver the most effective ROI when compared to leading cyber solutions. .
odix develops and markets advanced Anti-Malware tools based on Content Disarm and Reconstruct (CDR) technology for preventative cybersecurity in enterprises of all sizes. odix’s technology prevents malware infiltration to organizational networks by disarming all malicious code from all commonly used file types.
odix’s patented technology is effective against unknown malware hidden inside innocent-looking files where legacy solutions fall short.. .
Safe-T enables enterprises to run a secure, zero trust digital business by significantly reducing attack surface of the network and applications. Safe-T’s Software-Defined Access (using SDP infrastructure) limits exposure and access to the cloud and data centers, delivering the right data to authorized entities only.
Safe-T allows visibility and availability of applications, services and networks only after assessing trust, based on policies for authorized user, location & application. Safe-T enhances operational productivity, efficiency, security, and compliance by protecting organizations from data exfiltration, leakage, malware and ransomware..
AppGuard is a revolutionary new approach to prevent breaches from threats that traditional anti-virus software is not equipped to face, including fileless malware, botnets, polymorphic malware, weaponized documents, targeted attacks, in-memory attacks, ransomware, phishing, watering-holes, drive-by-downloads, and other undetectable advanced threats. It automatically and dynamically stops an attack at its initial stages and beyond without requiring detection of the attack, disrupting the user experience, or degrading system performance.
It generates valuable Indicators of Attack (IOA) alerts without a compromise occurring. AppGuard is compatible with all Windows versions from XP to 10, standard and custom applications, and typical system maintenance tools, and supports Windows Server 2008 R2 and above..
Blueliv is a leading cyber threat intelligence provider with a world-class in-house Labs team. We scour the web, the deep web and the dark internet to deliver fresh, automated and actionable threat intelligence to organizations to protect their networks from the outside in.
Our scalable cloud-based platform turns global threat data into sophisticated and relevant intelligence, enabling organizations to save time and resource by improving their incident response performance and empowering their Security Operations team with real-time intelligence. Configure a solution bespoke to your needs with a choice of modules.
Quantify and qualify malicious attack vectors with our plug and play MRTI feed; delivered in STIX/TAXII standard, integration is easy. The Blueliv Threat Exchange Network is a strong, collaborative community of security researchers and malware analysts.
Blueliv is a Gartner Cool Vendor 2015 and Go-Ignite winner 2016.. .
Fireglass allows users to click with confidence from any device by eliminating malware and phishing from web and email with no endpoint agent. Organizations protected by Fireglass maximize user productivity while solving the operational overhead and complexity of web gateways through true isolation, where all traffic is executed remotely and does not reach the corporate network.
Deployed at Fortune 500 companies, Fireglass was founded by network security leaders and military intelligence veterans and is backed by world-class investors including Lightspeed Venture Partners and Norwest Venture Partners.. .
BitDam cyber security blocks advanced content-borne attacks across all enterprise communication channels, empowering organizations to collaborate safely. Founded by elite intelligence professionals, BitDam proactively stops malware from running, pre-delivery, preventing hardware and logical exploits, ransomware, phishing, N-Day and Zero-Day attacks contained in any type of attachment or URL.
BitDam ensures the highest attack detection rates and delivers the fastest protection from today’s email borne attacks making enterprise communications safe to click. BitDam is privately held and headquartered in Tel Aviv with offices in the East Coast, United States..
Bricata is the industry’s leading network traffic analysis, intrusion detection, and threat hunting platform, providing large organizations with total visibility into the ground truth of their traffic to better defend their networks. By fusing signature inspection, stateful anomaly detection, and machine learning-powered malware conviction, Bricata empowers security teams to identify, analyze, and hunt threats.
The platform goes beyond alerts and monitoring to enable proactive threat hunting, giving analysts the tools to defend against known threats and to illuminate those otherwise unseen. Discover the truth at Bricata.com.
Bricata was founded in 2014 and is headquartered in Columbia, Maryland, United States.
Cyberinc offers a secure, scalable, and high-performance security products that protect from cyber-attacks. It’s formed by merging Spikes Security with Aurionpro’s Security Division, which is a wholly-owned subsidiary focused on Enterprise Security.
Cyberinc is dedicated to helping enterprises secure their digital businesses and expand their security perimeter. Cyberinc delivers enterprise-scale solutions that help CISOs address the top two threat vectors of the digital age – information loss through web-based malware threats and unauthorized access, with their flagship product offering, Isla Malware Isolation platform which ensures 100% web freedom and comprehensive IAM solutions that have secured over 100 million identities across the globe..
otto by DEVCON
otto by DEVCON is making the internet safer and security easier through our next generation runtime application security software. We save companies time and money while reducing risk and mitigating threats that can cost hundreds of millions in data breach.
otto = security in seconds. Integrations with some of the largest CDNs, Cloud marketplaces and CMSs allows teams to start securing your company in seconds with no-code and low-code setup.
Protecting brand integrity starts with caring about your customers. O++O tools, monitoring and protection give DevSecOps the real-time, runtime intelligence about the ever-changing dynamic security and vulnerability of your site and Third-party Scripts interacting with your company and customers.
otto by DEVCON is committed to protecting consumers from cyber threats by democratizing cyber security (i.e. making it free for consumers).
Our chrome extension protects and alerts users of threats and vulnerabilities as they surf the web, while generating a network effect, crowdsource of continuous threat intelligence. This network intelligence provides perpetual fuel for our threat intelligence engine and self-healing technology..
The Cybersecurity Paradigm Is Shifting and ThreatLocker® is at the Cutting Edge providing unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. ThreatLocker is a zero trust policy driven tool that protects companies from unauthorized software intrusions including ransomeware, malware, viruses and other security threats.
ThreatLocker solutions are suitable for any business organization, and should be deployed to any organization that either has managed I.T. or has an internal I.T.
Department. Powerful yet simple control over what applications and executables can run on your business computers, with a streamlined process of requesting and granting permission to users.
When deployed correctly, this technology makes it almost impossible for code to be executed that should not be. ThreatLocker Monitor keeps a full detailed audit of what applications are used and data accessed/transferred/deleted and by what users (signature tracking, etc.) If something unusual happens, such as a signature change, or a user opens an application that is out of their normal routine the administrator is alerted.
This is a crucial tool in identifying malware threats, as well as helping organizations identify if users are accessing applications and/or data/ files they should not be. ThreatLocker has developed a solution that allows businesses to control the content that runs on their network.
Finjan Holdings is a technology company committed to enabling innovation through the licensing of its intellectual property. The Company’s engineers and developers pioneered behavior-based, real-time detection of online threats by identifying patterns and expected behavior of code and content rather than relying solely upon “signatures” of existing and already known threats.
The hardware and software divisions of the company were sold to M86 Security, which has since become Trustwave. The company retained the patents on processes and technologies that enable network security such as behavior-based detection of malware, isolation of polymorphic code and sandboxing of suspicious elements.
The patents on cybersecurity processes developed in FinJan’s early years remain the core of the company’s business as they enable a next generation network security products capable of defending against sophisticated, modern threats. FinJan Holdings became listed publicly by way of merger with Converted Organics in 2013.
Finjan’s security products have received industry awards and recognition from leading analyst houses and publications, including Gartner, IDC, Butler Group, SC Magazine, eWEEK, CRN, ITPro, PCPro, ITWeek, Network Computing, and Information Security.
With Finjan’s award-winning and widely used solutions, businesses can focus on implementing web strategies to realize their full organizational and commercial potential.. .
Minerva Labs is an innovative endpoint security solution provider that protects enterprises from today’s stealthiest attacks without the need to detect threats first, all before any damage has been done. Minerva Labs Anti-Evasion Platform blocks threats which bypass antivirus and other baseline protection solutions by deceiving the malware and controlling how it perceives its environment.
Without relying on signatures, models or behavioral patterns, Minerva Labssolution deceives the malware and causes it to disarm itself, thwarting it before the need to engage costly security resources. Headquartered in Petah Tikva, Israel, and with offices in New York and Atlanta, Minerva Labs boosts customers’ existing defenses without the need to embark upon a costly and risky overhaul of their entire endpoint security architecture.
To learn more about Minerva, visit www.minerva-labs.com.
Trustifi is an email visibility and security company providing a SaaS solution that protects businesses from email vulnerabilities and compliance risks. Basic email is extremely vulnerable to being breached because cybercriminals are always looking to steal private and Personally Identifiable Information (PII).
As stolen data is worth a lot of money, it results in real harm to the victims when information is exposed, plus, big ¬fines for the companies who unintentionally expose it. Trustifi’s easy-to-use solution provides certified and Postmarked proof of email delivery with built-in email encryption and security for the ultimate in email visibility & protection.
With Trustifi, sent emails are tracked and legally Postmarked with records of delivery and exact content delivered. Plus, visibility to when the email is opened, by whom, in real-time.
Trustifi also adds many layers of email security with such features as: Fraudulent Email Detection – Trustifi alerts users when incoming scam emails, designed to look legitimate for the purposes tricking employees into wiring money or clicking malware links, are of a fraudulent nature and, Content Filtering Protection – Trustifi scans the content of an email as it’s being written and if the email contains any sensitive words or phrases that should be encrypted, the sender is alerted to the fact that Trustifi’s automatic encryption has been triggered..
NanoLock Security Ltd
NanoLock Security device-level protection and management prevents malicious access to critical code by outsiders¸ insiders and supply chain attackers. IoT and connected devices like smart meters¸ routers¸ security cameras¸ data concentrators¸ industrial controllers and many others¸ stay protected regardless if the attacker has a network or physical access to the device.
Our lightweight protection has zero power¸ processing and memory footprint¸ and is ideally suited for battery operated devices. NanoLock’s protection blocks persistent cyberattacks¸ such as ransomware¸ malware¸ DDoS and many more that manipulate the device’s Flash (Non-Volatile Memory) to create persistent control and survive reset..
Todyl’s Secure Global Network was built with security baked in, not bolted on, helping channel partners address some of the toughest challenges facing businesses today. Todyl consolidates multiple security products, features integrated SIEM and GRC, reduce the attack surface area and leverages our patent-pending ZeroTrust technology to stop threats like ransomware and Fileless Malware from spreading.
With Todyl, partners can deliver world-class, cost-effective security programs to businesses of any size.. .
Trustlook (www.trustlook.com) is a global leader in next-generation cybersecurity products based on artificial intelligence. Their innovative SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.
Trustlook’s solutions protect users from both known and zero-day threats by analyzing millions of code-level and behavior combinations to find malicious patterns. Founded in 2013, the company is headquartered in San Jose and managed by leading security experts from Palo Alto Networks, FireEye, Google and Yahoo..
SiteLock was founded in 2008 on the principle that effective website security should no longer be an expensive and unattainable goal for small to midsized businesses. Historically website security has been an expensive, intimidating topic, accessible only to large corporations with IT departments full of engineers.
Utilizing one of a kind technology developed by seasoned security and business veterans trained at Caltech, MIT, Wharton and Stanford, SiteLock’s patented 360-Degree scanning provides the ultimate protection while still being light enough to not affect your server or website performance. Not only does SiteLock offer inexpensive 360-Degree scanning solutions for online businesses, but also employs a team of professional security engineers.
SiteLock differentiates itself from all competitors with On-Demand Expert Services, Maintenance plans, Site Design and Hardening. These services, available to all SiteLock members, can fix identified issues and keep you up to date on newly developing threats.
Solebit provides the fastest, most accurate and cost-effective approach for the identification and prevention of zero-day malware and unknown threats. SoleGATE is the disruptive cyber protection software platform by Solebit, challenging the norms of currently available technologies that rely on slow, costly and mostly outdated, ineffective methods of sandboxing, signatures and behavioral inspection.
The solution is powered by DvC™ (data vs. code), a patented, real-time, signature-less engine.
DvC assumes that there is no legitimate reason for executable code to be present in any data file. As such, it does not rely on heuristics or behaviors (which are core limitations of competing technologies), and definitively identifies and terminates any instance of malicious code such as hidden CPU instructions, encrypted and polymorphic payloads, shellcodes and other commands typically buried in data file.
It counts a variety of leading global financial organizations, tech, defense contractors, security vendors, cloud and telecom service providers as active customers. For more information, please visit solebit.io.
Purism makes computers and mobile devices that do not track you. Purism products are specifically designed, from the bootloader and motherboard to the operating system and applications, to respect and protect your privacy and security, out of the box.
Purism devices feature physical hardware “kill switches” to sever the camera, microphone, data (and in the tablets, GPS) connections for additional security. Purism hardware is preinstalled with the world’s best privacy applications, including QubesOS, the Linux operating system recommended by security experts for ultimate defense against malware, tracking, viruses, spyware, ransomware and other threats.
Privately held and crowdfunded, Purism has raised $1.1 million in its first year, solely with crowdfunding and product preorders. According to ZD Net, the Librem is one of the top 2 crowd-funded PC hardware projects in history.
(****). The product has been funded and manufactured and the first Librem 13″ notebooks are currently shipping to backers.
The Librem 15 rev. 2 laptop with 1K screen and 4K screens is shipping.
Invincea is the leader in advanced endpoint threat protection, protecting more than 25,000 customers and 3 million active users. The company provides the most comprehensive solution to contain, identify, and control the advanced attacks that evade legacy security controls.
Invincea protects enterprises against targeted threats, including spear-phishing and Web drive-by attacks that exploit Java, Flash, and other applications. Combining the visibility and control of an endpoint solution with the intelligence of cloud analysis, Invincea offers the only market-deployed solution that defends against 0-day exploits, file-less malware, and previously unknown malware.
The company has been in market with its award-winning technology since 2009. In 2011, Invincea was recognized as “Most Innovative Company of the Year” at RSA Conference, and since then the company has won numerous awards for its technology and business.
The company, which was founded by Dr. Anup Ghosh to address the rapidly increasing security threat from nation states, cyber criminals, and rogue actors, has commercialized technology originally built under DARPA funding.
The company is venture capital-backed and based in Fairfax, VA. For more information, visit https://www.invincea.com..
Soteria is a security consulting company focused on the incident response sector. They offers 24/7 incident response services, malware analysis, and security audits.
Soteria was founded in August 2014 and is based in Charleston, South Carolina.. .
Better Mobile Security
Better Mobile Security is a Mobile Threat Defense (MTD) solution provider that uses predictive AI technology to identify and stop mobile security threats without compromising end-user productivity or privacy. Better MTD’s predictive protection comes from its Deep Thinker AI platform that applies artificial intelligence and learning models to identify known and unknown threats at the device, network, and application levels.
It also works seamlessly with leading Enterprise Mobility Management (EMM) solutions to protect corporate resources and can be easily deployed to vast mobile networks with just a few clicks. Better Mobile Security solution also integrates with Microsoft Intune and Azure AD(AAD) single sign-on.
The company’s security platform combines sophisticated machine learning / artificial intelligence with its real-time threat intelligence to automatically detect attacks from malware, network, OS vulnerabilities, out-of-date operating systems, and many other breaches. It protects mobile devices and invaluable enterprise data from malware, network, and OS-layer attacks.
Caspida is a real-time cyber-security and threat detection company that automatically detects & prevents hidden threats across corporate, SaaS/cloud, and mobile environments. Caspida detects the entire cyber threat kill chain and is the first in the industry to provide coverage for unknown threats that have already penetrated the enterprise, without rules, signatures, sand-boxing, or human analysis.
Caspida finds lurking APTs, new malware, and unpredictable insider threats using a novel behavioral threat detection and Big Data security analytics approach. It was founded in 2014 and headquartered in Palo Alto, California..
Founded in 2012, Spikes Security is focused on delivering secure, scalable, high performance appliance and software solutions that empower businesses with the freedom to safely leverage the web without fear of cyber-attacks. Its flagship offering is a powerful web malware isolation system that prevents all browser-borne malware from entering corporate networks and infecting endpoints, including mobile devices, without requiring installation of any endpoint software.
Watch an analyst interview with CEO Branden Spikes here: https://vimeo.com/127027498. .
Secure64 is a software developer providing secure, self-protecting, high performing server applications. Founded in 2002, Secure64â€™s core technology is SourceTÂ®, a patent-pending Genuinely Secureâ„¢ micro OS designed from the ground up to make this OS and any applications running on it immune from rootkits and malware, and resistant to network attacks The hardware and software architectures of todayâ€™s networked servers are based on a 40 year old protection model that was never designed to withstand the types of malicious attacks now being waged against them.
As a result, organizations find it necessary to spend significant time and money on hardening, patching and protecting these insecure servers to minimize exposure to their vulnerabilities, yet the vulnerability-exploit cycle shows no signs of letting up. Unlike conventional operating systems, SourceT does not require hardening, patching or protecting.
By allowing IT professionals to simplify and consolidate network infrastructures, SourceT-based applications reduce the costs and risks from potential security breaches while achieving unparalleled levels of reliability and performance.
The Seculert cloud-based security platform fills the gap left by legacy perimeter defense and Breach Detection Systems. Seculert protects distributed enterprises from advanced threats by focusing on the malicious outbound network traffic that goes undetected by legacy prevention solutions.
By combining Big Data analytics, machine learning technology and behavioral analysis, Seculert provides unique visibility on the final two stages of the malware kill chain. As a cloud-based solution, Seculert requires no hardware or software and provides full coverage for all sites and employees, including those working remotely and on personal mobile devices.
The Seculert Platform dramatically improves the productivity of scarce SOC and Incident Response resources by providing faster and more accurate malware detection. Founded in 2010 by security industry veterans, Seculert has R&D in Israel and sales offices in the US and EMEA.
The Qualys Cloud Platform and integrated suite of solutions helps businesses simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Used by more than 7,700 customers in over 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100, the Qualys Cloud Platform performs more than 1 billion IP scans/audits a year resulting in over 400 billion security events.
Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including BT, Dell SecureWorks, Fujitsu, IBM, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA).
The Qualys Cloud Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, pci compliance, questionnaire service, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.
NETSHIELD is a breach prevention company that offers intranet breach prevention appliances and advanced mobile and IoT security. Its mission is to be a trusted provider of cost-effective, proactive security solutions to enhance the organization’s cyber-risk mitigation strategies.
NETSHIELD delivers critical network access control to ensure only trusted assets access corporate networks. Additionally, zero-day malware and phishing attack real-time quarantine, mac-spoof detection, TLD blocking, comprehensive auditing, vulnerability assessments, and compliance reporting and enforcement make this a comprehensive and compelling offering.
NetSHIELD is available as a hardware appliance that scales from 25 to 10,000 protected assets per appliance. In addition, an embedded command center allows administrators to manage up to 1000 remote sites.
Keezel is the secure extension of your office network. This allows businesses to be online securely around the world and also protect their industrial IoT connected equipment.
Keezel combines the power of a firewall, VPN, phishing filters and adblocking based malware protection. At the same time it remains easy to deploy, manage from the cloud and use anywhere outside your office.
Keezel is based in Amsterdam, the Netherlands. US office in Newport Beach, California.
ESET is an information technology security company that develops security software solutions which deliver protection against computer security threats for home users and corporate customers worldwide. The company provides ESET Smart Security, an integrated anti-virus, anti-spyware, anti-spam, and personal firewall solution; ESET NOD32 Antivirus, an integrated security solution that detects and disables viruses, Trojans, worms, adware, spyware, phishing, rootkits, and other internet threats; ESET Cybersecurity for MAC; and ESET Endpoint Security, a security solution for company endpoints combining a two-way firewall, web control, and remote administration tool.
ESET also offers ESET Endpoint Antivirus, an anti-virus and anti-spyware protection utilizing cloud-powered scanning, device control, and remote management of clients; ESET Mobile Security for Android that provides Android smartphone and tablet users with safer mobile technology adventures; and ESET Rootkit Detector, a security tool for Mac OSX that scans for malicious kernel extensions attempting to change operating system behavior by hooking inside the operating system. ESET was founded in 1992 and is based in Bratislava, Slovakia with regional distribution centers in San Diego, California; Buenos Aires, Argentina; and Singapore.
It has additional offices in Sao Paulo, Brazil; and Prague, Czech Republic as well as malware research centers in Bratislava and Košice, Slovakia; San Diego, California; Buenos Aires, Argentina; Singapore; Prague, Czech Republic; Krakow, Poland; Montreal, Canada; and Moscow, Russian Federation.
OverWatchID delivers Privilege Anywhere™ for companies with cloud first initiatives, applications and cloud infrastructure running in Amazon AWS, Azure and Google Cloud. Easily protect and secure privilege users from any cloud application to on-premise infrastructure.
Privileged user credentials continue to be the top target by attackers. Whether through phishing or malware, a privileged user constantly needs to protect their credentials and identity.
OverWatchID is committed developing and delivering technology that protects privileged users. The OverWatchID solution delivers full privilege security for cloud applications, cloud computing and hybrid IT environments, and on-premise infrastructure.
DevOps automation technology keeps OverWatchID synchronized with any auto-scaling activities as well as new cloud applications and targets that appear in an organization. Privilege Anywhere™ secures all IT resources wherever they are deployed, completely implements in days, strengthens IT security, and costs less to own.
As a result, information security teams work less and pay less for better IT protection from insider threats and external attacks.. .
Founded in 2015, BlackFog was born to combat the growing number of online threats targeting your personal and corporate data. Hackers will get into your network; BlackFog stops them getting out.
Through a layered approach to security, BlackFog spots, in real-time, when an attacker is trying to remove unauthorized data from your device / network and stops them in their tracks. Consisting of multiple layers of defense against ransomware, spyware, malware, phishing, unauthorized data collection and profiling, BlackFog blocks over 24 million threats across mobile and desktop endpoints around the world, protecting organizations’ data and privacy, and strengthening their regulatory compliance..
Proofpoint Inc. is a leading next-generation security and compliance company that provides cloud-based solutions to protect the way people work today.
Proofpoint solutions enable organizations to protect their users from advanced attacks delivered via email, social media and mobile apps, protect the information their users create from advanced attacks and compliance risks, and respond quickly when incidents occur. SAAS SECURITY & COMPLIANCE SUITE Enterprise Email Archiving: The email archiving solution supports eDiscovery, regulatory compliance and email storage management.
Enterprise Email Protection: Provides inbound and outbound email security and management to protect from outside threats including spam, phishing, unpredictable email volumes, malware and other forms of objectionable or dangerous content before they hit the enterprise perimeter. Enterprise Privacy: Protects private information in email, defends against leaks of confidential information and ensures compliance with common international, industry and US data protection regulationsâ€”including HIPAA, GLBA and PCI-DSS.
Proofpoint, Inc. was founded in 2002 and is based in Sunnyvale, California..
Wave Systems Corp. develops, produces, and markets hardware-based digital security solutions.
Wave management tools build on specifications developed by the Trusted Computing Group, such as the Trusted Platform Module (TPM) security chip and self-encrypting drive (SED), to secure organizations from the hardware level up. Wave’s software makes these existing industry-standard hardware technologies useful on an enterprise scale with remote, centralized management, audit logs for regulatory compliance, and granular policy controls.
The result is a fully-managed, hardware-based solution for encryption, authentication, malware detection and Data Loss Protection. Wave has partnered with OEMs like Acer, Asus, Dell, Fujitsu, HP and Lenovo; and drive manufacturers including Micron, Samsung and Seagate.
in January 1993. Wave was founded in 1988 and is based in Lee, Massachusetts, with offices in Cupertino, CA; Princeton, NJ; Frankfurt; London; Paris; Tel Aviv; The Hague; and Zurich..
Headquartered in Montreal, Canada, FixMeStick Technologies Inc. is a private company founded in 2011.
The FixMeStick® virus removal device works before your computer boots, removing malware that conventional antivirus software often can’t detect or remove. In 2017, FixMeStick was ranked No.9 in Canada’s PROFIT 500, the definitive ranking of the country’s Fastest-Growing Companies..
CodeGuard provides website backup, monitoring, and malware remediation services to small and medium businesses. As anyone who has ever tried to recover a crashed or hacked website can attest, the “back-up” systems of many web hosting providers leave a lot to be desired.
The back-ups sound reassuring in theory–you are assured that your data is always “backed-up” on a system that is completely separate from the main one and that you’ll be able to access it whenever you need it. When disaster strikes, your site has been hacked or your developer make a simple mistake, you often discover that your backup is hard to access, out-of-date or has been affected by the same event.
CodeGuard is unlike ISP-based-backups. Instead of a static snapshot of your site kept by your ISP (hopefully), we use a File Integrity Monitoring system built on a version control system and store site data in the cloud.
Webmasters discover they have been hacked because traffic suddenly disappears, they see a warning message on Google when searching for themselves, or they get an email from a customer complaining about strange behavior. CodeGuard’s differential backup approach revolutionizes hacking detection and remediation.
Rather than relying solely upon site scans and comparisons with known threats, we scan files that have been modified since our last backup This allows us to identify hacking and alert the site owner before they can spread malware, have their links pirated or act as a parasitic host for spammers–and before safe browsing alerts quarantines the site and kills all of the traffic. In the event a hack or an unauthorized change is detected, webmasters can quickly revert to the last known good version and have their site working in minutes without engaging a developer to remediate the issue..
Criminals are hijacking programmatic advertising and giving publishers a bad name. Confiant protects publishers’ and platforms’ reputations, revenue, and resources with always-on anti-malware software that provides protection for desktop, mobile, and video ads.
Its sole focus is on helping advertising platforms and publishers rid the world of malware. This focus enables us to evolve quickly and meet our clients’ needs for defeating the bad actors trying to undermine the industry.
Programmatic technologies make it easy for criminals to use digital publishers to infect millions of consumers. Confiant protects the publisher’s reputation and revenue with anti-malware software that keeps them ahead of the bad guys.
HOPZERO Corporation has created “Hop Sphere Radius Security” that will act as an intelligent control system to analyze the data sessions of servers to determine the appropriate sphere and distance data can traverse across private and public networks. This system will protect devices from exposure to billions of potential attacks by hackers and malicious malware even if there is no firewall in place.
HOPZERO provides a new layer of distance based security protection to work in conjunction with all other methods adding a significant benefit by limiting how far sensitive data may travel.. .
MyWOT / WOT (Web of Trust) is a website safety reputation and review extension that helps you make informed decisions about whether to trust a website when you are searching, shopping or surfing online. MyWOT displays website reputations as traffic lights next to links when you use search engines, social networking sites, email and popular sites such as Wikipedia.
By clicking the traffic light icon you can learn more about a website’s reputation and other users’ opinions. A green traffic light means users have rated the site as trusted and reliable, red warns of potential threats and yellow indicates that you should proceed with caution.
MyWOT ratings and reviews are powered by a global community of millions of users who rate websites based on their personal experiences, and are verified by trusted technical sources. Additionally, third-party sources warn you of malware and other threats you might encounter.
Authomate’s platform makes strong security easy to use by shifting the burden of authentication from a human’s memory to their smartphone, creating a unique identity which becomes how you access your digital world. Good passwords are hard to remember so users take short cuts to work around.
With Authomate, credentials are stored on the smartphone – eliminating the human element from the authentication flow. Authomate simplifies the user experience by allowing the user’s smartphone in proximity to an application, website, system, or device to seamlessly authenticate the user, while eliminating the need to enter user names, passwords and one-time codes or answering challenge questions – enabling companies to implement stronger, always on security and enforce policies, in each case, without complicating or frustrating their end users and customers.
Key features include: enablement of multifactor authentication using contextually aware, dynamic factors; the ability to share access without sharing credentials; the ability to interface with VPNs and other non-web based applications that require credential input (including login for Macs and PCs); geofencing and geotagging; date and time restrictions; biometrics; defense against phishing sites; mitigating attack surfaces used to steal credentials; and robust logging of access. Authomate allows enterprises to implement strong security policies that can be easily adopted by their users and customers, while eliminating the vulnerabilities of weak and reused passwords, forgotten passwords that lead to costly recovery processes, and password spreadsheets that may be shared between team members, and eliminates attack surfaces used to harvest credentials (e.g., malware, keyloggers, Man-in-the-Middle, Man-in-the-Browser, phishing and social engineering).
The solution architecture reverses the credential flow, thereby eliminating the ability to compromise static devices like point of sale terminals, kiosks, ATMs, or websites for card not present, disabling the ability to use these avenues as an attack vector to steal credentials.. .
TopSpin was founded in 2012, to provide an effective solution to the rapidly emerging generation of focused corporate network attacks, built to penetrate specific organizations and controlled by remote command and control (CnC’s). The new generation of focused attacks that prompted the formation of TopSpin is characterized by being far more sophisticated than the generic attacks that have influenced security activity for years, mainly in the area of firewalls, IDS/IPS and antiviruses.
These new attacks, often termed APT’s – advanced persistent threats – are developed with a specific organization in mind. They are backed by big money and the motives behind them include stealing of secret information, industrial espionage and theft of intellectual property, business plans and customer lists.
Furthermore, they easily circumvent the security technologies that were previously considered sufficient. The damage caused by APT’s has been extensive, with cases being reported worldwide.
Familiar with the limitations of existing security products, the company set out also to establish a modus operandi for the new product that would eliminate false positives and bring the relevant information to the administrators, minimizing the analysis and the time required to manage the system..
100% Agentless & non-intrusive way, we provide security to BYOD-enabled Enterprises by detecting & fingerprinting all personal devices, complete security scan & analysis of the devices, protecting Corporate Network from BYOD specific infections and intrusions and doing a thorough granular access control using device attributes as well as Apps. Detailed Value proposition: 100% Agentless-way (ZERO-Touch) of detecting all personal devices, secure quadrupled fingerprinting (US patent-pending), DPI & thorough security scan & analysis (Vulnerability check, associated risks, thorough BYOD specific intrusion alerts, Device compromise check (jailbroken, rooted), BYOD specific network behavioral analysis to see patterns, anomalies & zero-day attacks.), posture check (anti-malware software is installed on the device? latest signatures?) and then deny infected personal device connecting to the network as well as do a thorough granular access based on device attributes as well as apps.
We do it irrespective of how you get onto the network – from Corporate Wi-Fi or VPN. We also detect enterprise-worry apps (such as dropbox, box.net, Facebook etc.) on the wire and we can even stop them.
We also provide granular access control based on any of the attributes of the devices that we discover (such as macid, ip address, OS, OS version, SSID, office location, time, form factors, device class & type & manufacturer etc.) – all done at real-time! We protect BYOD-enabled Enterprise from the BYOD specific threats. .
SecondWrite’s next-generation sandbox detects advanced malware including APTs, targeted attacks and zero-day evasions that defeat other solutions. Its university-developed patent pending technology identifies hidden paths in malware and forcibly executes them, achieving complete code coverage.
Customers include network security, endpoint security, threat intelligence and IR vendors, SOCs, and MSSPs.
OPSWAT protects critical infrastructure. Our goal is to eliminate malware and zero-day attacks.
We believe that every file and every device pose a threat. Threats must be addressed at all locations at all times—at entry, at exit, and at rest.
Our products focus on threat prevention and process creation for secure data transfer and safe device access. The result is productive systems that minimize risk of compromise.
OPSWAT. Trust no file.
Trust no device.
Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome, by creating deceptive information based on the current detected stage of compromise through the entire Endpoint Kill Chain. The preemptive solution covers the evolving nature of advanced threat landscape & sophisticated malware techniques, stopping all threats without relying on signatures, patterns or the need for constant updates.
Gartner Cool Vendor 2019: Security Operations and Threat Intelligence. For more information, visit our website at www.deceptivebytes.com or follow us on LinkedIn, Twitter and Facebook..
Triumfant provides continuous protection from advanced malware threats on the endpoint, stopping cybercriminals in their tracks. Offering the most advanced detection capabilities and featuring enhanced memory and Mac features, Triumfant ensures that once inside a company’s or government agency’s systems, no attacker can leave with proprietary information, damage to enterprise systems is minimized, and critical assets are secured.
Triumfant stops a breach before it becomes a full-scale attack then automatically repairs the machine(s) and any collateral damage within minutes – no human intervention or system downtime is required. When attacks occur, companies and government entities trust Triumfant to quickly recover and prevent loss..
We find nation-state malware that others miss because we scan where others can’t. ANOVA leverages AI and deep learning to automate vRAM forensic analysis, incident verification, data integrity anomaly detection and cyberconflict prediction across distributed networks, unsupervised and at scale.
We arm enterprise and industrial high-value targets with the deep forensics and critical intel they require.
WEBGAP is a cybersecurity startup focused on remote browser isolation and the developer of the WEBGAP Remote Browser platform. We physically isolate our users from malware and cyber attacks by physically isolating their web browsing activity away from their local machine and network.
If the endpoint is the new perimeter, then WEBGAP is the future of endpoint security, we provide cost-effective and massively-scalable physical browser isolation.. .
Viewfinity is the only solution that has complete whitelisting and administrative privilege capabilities to protect against sophisticated zero-day attacks, malware, and advanced persistent threats. For more information, visit www.viewfinity.com.
Follow us on Twitter: viewfinity Find us on LinkedIn: www.linkedin.com/companies/viewfinity Become a fan on Facebook: www.viewfinity.com/facebook.
Webroot provides intelligent endpoint protection and threat intelligence services to secure the Internet of Everything. By leveraging its cloud-based collective threat intelligence platform, computers, tablets, smartphones, and more are protected from malware and other cyber attacks Webroot technology is trusted and integrated into market-leading companies including Cisco, F5 Networks, HP, Microsoft, Palo Alto Networks, RSA, Aruba, and many more.
Webroot is headquartered in Colorado and operates globally across North America, Europe, and the Asia Pacific region. The company was founded in 1997 and is based in Broomfield, Colorado..
Strongarm is the simple and affordable way to automatically stop attacks from damaging your business. Our automated malware protection safeguards your organization while minimizing complexity.
Strongarm empowers SMBs to respond to and protect against cyber threats, in real time, including those that slip past firewalls and antivirus protections.. .
ROMAD Cyber Systems
Our name, ROMAD – RObust MAlware Defense, captures the essence of our innovative technology and unique capability. ROMAD’s patented Malware Genetic Sequencing™ technology enables us to identify, analyze, and stop in real time entire viral “families”, as opposed to specific strains or individual variants.
This ability allows reliable, sustained detection and diffusion of a wide range of malware threats. We detect what OTHERS MISS – because we’re not stuck in the perpetual arms race with malware developers, passively looking for their next creation just to figure out how to catch it next time.
We detect BEFORE others can – because we’re not waiting to analyze the new variant as a prerequisite to detection. Derivative strains and variants are just that – derivative.
We detect with the LEAST AMOUNT OF OVERHEAD, both on our team and on your endpoint – because unlike legacy platforms, we don’t need millions of individual static signatures to match the hundreds of thousands of derivative strains and variants created every day.
We detect WHERE others cannot – our Malware Genetics™ and dynamic threat response technology allows ROMAD to sustain detection capability virtually in perpetuity. Isolated industrial deployment scenarios such as SCADA, ICS, and IoT environments where updates are infrequent, yet viral threats prevalent (think Stuxnet model), are a perfect place for ROMAD endpoint threat detection and response capabilities.
We DISRUPT the criminal malware economic model by eliminating the critical time-to-detection gap – the opportunity to monetize the malware before detection is developed by legacy static-signature platforms. We eliminate the economic incentive for malware writers, kit builders, and bot herders, thereby contributing to the elimination of the vast majority of profit-driven malware presently in the wild.
Morta Security is a stealth-mode start-up developing a new paradigm to counter advanced cyber threats. Traditional layered network defense is broken and Morta is poised to turn the tables on advanced attackers.
Led by executives and engineers from the National Security Agency, Morta’s technology uniquely combats advanced malware. They mix start-up innovation with military-grade technology to solve the world’s toughest network security challenges.
They’re looking for the best and brightest to join their team and transform cyber security.
VirusTotal, a subsidiary of Google, is a free online service that analyzes files and URLs enabling the identification of viruses, worms, trojans and other kinds of malicious content detected by antivirus engines and website scanners. At the same time, it may be used as a means to detect false positives, i.e.
innocuous resources detected as malicious by one or more scanners.
Cryptonite NXT—a smarter way to defend your network—prevents reconnaissance and keeps attackers from spreading malware before it’s detected. With Cryptonite NXT, your network is protected and your critical information secure.
At Cryptonite, their goal is to help enterprises regain the upper hand against attackers, by providing a platform that addresses fundamental weaknesses in today’s networks.. .
CoreTrace is a privately held company based in Austin, Texas. CoreTrace makes endpoint control and security solutions.
The company develops and sells whitelisting solution, BOUNCER. BOUNCER prevents unauthorized applications from executing and neutralizes malware and attacks (e.g., rootkits, zero-day attacks, and memory-based exploits such as buffer overflows)..
Metaforic is a leading provider of security software for protection against attack, specializing in providing high performance solutions for embedded, server and mobile security. The core offering is a real time anti-tamper and integrity checking solution for firmware, OS and applications that protects against subversion, theft, malware, tampering or other corruption.
Our technology is proven in millions of deployed instances, from consumer deployments through to business devices. Metaforic solutions directly prevent any change to code or data by automatically adding real time security to code that is to be protected.
This defeats custom malware and malicious hacking, attacks on rules, configuration and heuristics, firmware modification and application layer hacks. Metaforic offers solutions to industries ranging from financial services to software publishers, games companies to device manufacturers.
Panda Security is a computer security company that provides IT security solutions for its clients. It offers Global Protection, Internet Security, and Antivirus Pro that protects from viruses, spyware, rootkits, hackers, online fraud, identity theft, and other internet threats; security for Linux, a solution for companies with Linux distributions installed on their workstations; ActiveScan, an online scanner that detects malware; and Collective Intelligence, an online and real-time database that stores the signature files keeping them at a minimum on the endpoint.
Panda Security serves companies and home users by offering Managed Office Protection, a web-based subscription security service; GateDefender Integra, a centralized perimeter protection against various types of Internet threats; GateDefender Performa, a solution to combat malware, spam, and inappropriate content; Malware Radar, an automated audit that locates infection points; and TrustLayer Mail, a managed mail-cleaning service. The company was founded in 1990 and is based in Bilbao, Spain.
It has subsidiaries in the United States, Spain, France, Germany, Japan, Holland, and Belgium.
CyberSense is a provider of cloud-based and on-premises cybersecurity solutions. Some of the world’s leading Global 2000 enterprises serving the financial services, national critical infrastructure, retail, healthcare, pharmaceutical and other industries rely on CyberSense to strengthen their IT ecosystems and reduce the risk of costly and disruptive compromises, data breaches and compliance violations.
With the CyberSense360 platform, Global 2000 enterprises are able to detect and analyze zero-day, undetected malware in use by the world’s most destructive Advanced Persistent Threat (APT) organizations, build threat profiles, block attacks and automatically remediate damage inflicted on IT ecosystems. CyberSense360 traps zero-day malware in its virtualized sensor network of honey pots and next-generation malware traps before the malware can inflict significant damage to customers’ data centers or cloud deployments..
GamaSec is a cyber-security company that lowers the risk and strengthens the resilience of businesses from attacks on their websites and web applications. GamaSec provides a portfolio of services including web vulnerability scanning, daily malware detection, blacklist monitoring, and remediation as a service.
This combination of a proprietary security platform and industry knowhow enables GamaSec to deliver industry solutions for website security, and rapidly respond to market needs. .
Company dedicated to the development of disruptive technology in the field of information security solutions to provide network security and endpoint to our customers. Young and very dynamic environment, to suit market needs.
Startup in the ICT sector, awarded shares in different markets, products and company have high growth potential. DLP, Content Analysis, Malware Analysis.
This article was written by Benjamin Skute from Threat.Technology. The editor for this article was Tess Page. If your company is featured in this article and you want to have amendments made please contact us on: [email protected].
Alternatively you may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.