Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication. Typically carried out by email spoofing, instant messaging, and text messaging, phishing often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site.
Top Phishing Companies and Solutions
This article showcases Threat.Technology’s top picks for the best Phishing solutions. We selected these companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
Tessian protects every business’s mission by securing the human layer. Using machine learning technology, Tessian automatically predicts and eliminates advanced threats on email caused by human error – like data exfiltration, accidental data loss, business email compromise and phishing attacks – with minimal disruption to employees’ workflow.
As a result, employees are empowered to do their best work, without security getting in their way. Founded in 2013, Tessian is backed by renowned investors like Sequoia, Accel and Balderton and has offices in San Francisco and London..
Valimail is the global leader in zero-trust email security. The company’s full line of cloud-native solutions authenticate sender identity to stop phishing, protect brands, and ensure compliance; they are used by organizations ranging from neighborhood shops to some of the world’s largest organizations, including Uber, Splunk, Yelp, Fannie Mae, Mercedes Benz USA, and the U.S.
Federal Aviation Administration. Valimail is the fastest growing DMARC solution, with the most domains at DMARC enforcement, and is the premier DMARC partner for Microsoft 365 environments..
Cofense, formerly PhishMe, provides phishing threat management for organizations concerned about human susceptibility. Cofense’s intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats.
Cofense’s customers include the defense industrial base, energy, financial services, healthcare, and manufacturing industries, as well as other Global 1000 entities that understand changing user security behavior, will improve security, aid incident response, and reduce the risk of compromise.. .
Agari is transforming the legacy Secure Email Gateway with its next-generation Secure Email Cloud. Agari Identity detects, defends, and deters costly advanced email attacks including business email compromise, spear phishing, and account takeover.
It was founded in 2009 and headquartered in Foster City, California.. .
Area 1 Security
Based in Redwood City, CA, Area 1 Security is developing a product focused on eliminating targeted, socially engineered cyber attacks. Founded by security experts from NSA and MIT, and data analytics specialists from NSA and Disney, the stealth mode startup has raised $25.5 million in total funding to date.
Investors include Icon Ventures, Kleiner Perkins Caufield & Byers, Allegis Capital, Cowboy Ventures; Data Collective (DCVC); First Round Capital; RedSeal Networks CEO and former Venrock partner Ray Rothrock; and Shape Security CEO Derek Smith.. .
Callsign has built a secure mobile multi-factor authentication and authorisation engine, through the introduction of patented machine-learning biometric, behavioural, geo-location and identity analysis, combined with traditional methods. Designed for the Financial Services and IOT markets, Callsign’s crypto-engine provides unparalleled security across the enterprise, retail and consumer sectors to enable secure access, and to combat real-time phishing, Man-in-the-Middle and malware threats.
Their pre-defined API connectors simplify integration into existing directory and fraud solutions, enabling highly configurable, seamless and secure access that replaces costly and unpopular device-based solutions.. .
Inky is a cyber-security company that secures email against phishing. It is a cloud-based email security platform that make Inky Phish Fence, an email protection gateway that uses sophisticated AI, machine learning, and computer vision algorithms to block deep sea phishing attacks that get through every other system.
Inky Phish Fence can either quarantine suspicious emails or deliver them with disabled links and user-friendly warnings. It is easy to deploy for Office 365, Exchange, or G Suite.
Inky was founded in 2008 and is headquartered in College Park, Maryland.
KnowBe4 is a platform for security awareness training and simulated phishing attacks. KnowBe4 enables you to effectively manage the problem of social engineering.
Their Automated Security Awareness Program to create your fully mature, customized program, and the powerful Active Directory Integration for easy and fast user management. With this new-school integrated platform, user can train and phish your users, see their Phish-prone percentage improve over time and get measurable results.
KnowBe4 was founded on the principle that the human side of the cyber security industry is severely neglected. There is no national security strategy in place to protect against cyber-attacks on private organizations; Small and Medium Enterprises are completely on their own.
Vade Secure is the global leader on anti-phishing, spear phishing, malware and ransomware with heuristic filtering. Language independent, the filter analyzes globally all incoming emails (links, attached files, content…) to detect all threats in zero-day, even the most targeted attacks.
After elimination all threats, we eliminate the nuisance of low priority emails with the Graymail Management. Ads, social networks notifications, and newsletters are automatically sent to the graymail folder while the Safe Unsubscribe button eliminate them forever.
Protecting more than 500 million of mailboxes in 76 countries, our solutions are used by major ISPs, OEMs, and Enterprises worldwide. Vade Secure is implanted in 5 countries (USA, Canada, France, Hong Kong, and Japan) to offer a 24/7 support.
Founded by some of the people behind Shazam and backed by the most experienced entrepreneurs and angels in London, Red Sift exists to democratise the technology essential for cybersecurity. With the best estimate suggesting it’s 400 times cheaper to launch a cyber attack than it is to defend against one.
Red Sift wants to change the economics of this model and enable all organisations to defend themselves against the daily onslaught. Our Red Sift Open Cloud is a data analysis platform that is purpose-built for the challenges of cybersecurity.
By harnessing the power of AI we can securely collate, compute & visualise data from thousands of individual signals to help organizations to optimise their cybersecurity. The first product on the Red Sift platform is OnDMARC, a SaaS product that helps organisations to implement and maintain DMARC.
SlashNext is the phishing authority and leading the fight to protect the world’s internet users from phishing anywhere. SlashNext end-to-end phishing protection services utilize our patented SEER technology to detect zero-hour phishing threats by performing dynamic run-time analysis on billions of URLs a day through virtual browsers and machine learning.
Take advantage of SlashNext’s services using mobile apps, browser extensions, and APIs that integrate with leading mobile endpoint management and IR tools. The company is headquartered in Pleasanton, California..
Keyless is a deeptech, cybersecurity company building the world’s first privacy-preserving biometric authentication and personal identity management platform. The Keyless Platform empowers businesses to embrace passwordless, protect their remote workforce and enable strong customer authentication with just a look.
Keyless Zero-Knowledge Biometric (ZKB™) solutions provide passwordless multi-factor authentication that eliminates fraud, phishing and credential reuse – all while enhancing customer and employee experiences and protecting their privacy. With Keyless, businesses are finally able to adopt zero-trust security, eliminate passwords, ensure privacy compliance and deliver unified authentication experiences across every touchpoint with just a look.
#gokeyless at www.keyless.io.
Bolster is a deep learning-powered fraud prevention platform protecting the world’s leading brands from fraud. Bolster provides a comprehensive platform to defend brands from online scams and account takeovers, allowing organizations across various industries and sectors to increase business revenues as well as customer loyalty and trust.
By utilizing artificial intelligence to automate tasks and increase productivity, RedMarlin has introduced an unprecedented, proactive approach to brand protection. Encouraging organizations to also check and detect potential fraudulent websites and phishing scams, the company created checkphish.ai, a free, open-source community tool.
RedMarlin’s team has more than 40 years of combined cybersecurity experience from industry-leading companies including Cisco, Symantec, and McAfee. Founded in 2017 and based in Los Altos, California.
McAfee is an online security company that provides virus alerts and analysis on malware, network security threats, and web vulnerabilities. As a cybersecurity company, McAfee provides advanced security solutions to consumers, small and large businesses, enterprises, and governments.
Security technologies from McAfee use the predictive capability that is powered by McAfee Global Threat Intelligence, which enables home users and businesses to stay one step ahead of the next wave of viruses, malware, and other online threats. For business, enterprise, and government, McAfee provides comprehensive, integrated information security solutions that cover any environment.
Their endpoint and mobile security solutions protect end-user devices from threats, including viruses, phishing, malware, and other threats that target endpoints and users and include antivirus software and web security protection. Their network security solutions protect a network and its perimeter.
All their security solutions are managed through the centralized, single-console McAfee ePolicy Orchestrator that allows efficient and responsive management of the security infrastructure. Finally, McAfee Professional Services provide consulting, education, and technical support for all their security products and solutions.
For home users, McAfee secures mobile devices, including phones and tablets, as well as home PC, laptops, and other devices. McAfee products such as McAfee Total Protection and McAfee LiveSafe provide comprehensive antivirus and antimalware protection, as well as internet security that includes protection from adware, spyware, phishing scams, malicious websites, identity theft, and other threats to online security.
Perception Point is a Prevention-as-a-Service company, offering fast interception of any content-based attack across all collaboration channels including email, cloud storage, CRM apps, and messaging platforms. We prevent phishing, BEC, spam, malware, Zero-days, N-days well before it reaches the enterprise’s end-users.
Deployed in minutes with no change to the enterprise’s infrastructure, our solution confirms with any policy and requires zero fuss from IT teams. On top of that, we offer a significant added value service through our Incident Response team that serves as a force multiplier to the enterprise’s SOC team.
Our unique technology, which folds 7 different detection layers to provide a single verdict, has been recognized by Gartner and has proven time and time again to deliver the most effective ROI when compared to leading cyber solutions. As a result, the company now serves many global enterprises from all sizes and across all verticals, including Telecom, Food & Beverage, Tech, Healthcare, and more.
PiiQ Media & Risk
PiiQ RISK; Spear : Deliver the most advanced SPEAR PHISHING attack simulations with complete automation! Advanced Attack protocols, contextualised by end user with complete automation and intuitive management consoles – no experience required! Truly tailored by each end user’s exposed (ever changing) PII there is nothing on the market that compares to PiiQ- SPEAR. Comprehensive and precise penn testing through deep social media, open, and dark web risk scoring that measures, monitors, and mitigates Enterprise cyber risk.
A complete education for Social, Media, & Email security best practices, our cyber security training programs include ongoing progress report monitoring for our detailed remediation measures, based on the specific training simulation objective / lede. HIPAA compliance and Training and awareness for Cybersecurity, SOC & MSP / MSSP teams have never been so robust and user friendly! *Pricing & trial account access commensurate with ‘generic phishing simulations” on the market.
Level up your protection, since the attackers are leveling up their tactics. PiiQ INTEL: OSINT tools that defy the market & brand intelligence norm.
BrandShield® is an innovative Online Brand Protection solution. It’s robust, patented technology finds trademark infringements, counterfeit sales and online phishing and fraud.
The system analyzes content and metrics of each website, marketplace or social platform, and uses sophisticated algorithms to automatically prioritize the level of risk to the brand. BrandShield’s ground breaking pattern recognition technology finds major brand threats.
It also includes enforcement tools and service, to form a powerfull Threat Intelligence solution. BrandShield’s robust, patent pending technology helps fighting infringements and makes brand protection possible for all sizes of organizations.
BrandShield detects logo usage online, fraud clusters, cross-platform connections and prioritizes online threats customized uniqely for each brand. BrandShied’s technology dramatically improves the way organizations can manage and protect their digital brand.
Till now online brand protection solutions were limited, based on human analysis, highly expensive, and therefore available only to the biggest companies. BrandShield’s technology revolutionizes this market, and will allow every business to monitor and protect its brand online, at a reasonable cost.
AppGuard is a revolutionary new approach to prevent breaches from threats that traditional anti-virus software is not equipped to face, including fileless malware, botnets, polymorphic malware, weaponized documents, targeted attacks, in-memory attacks, ransomware, phishing, watering-holes, drive-by-downloads, and other undetectable advanced threats. It automatically and dynamically stops an attack at its initial stages and beyond without requiring detection of the attack, disrupting the user experience, or degrading system performance.
It generates valuable Indicators of Attack (IOA) alerts without a compromise occurring. AppGuard is compatible with all Windows versions from XP to 10, standard and custom applications, and typical system maintenance tools, and supports Windows Server 2008 R2 and above..
Fireglass allows users to click with confidence from any device by eliminating malware and phishing from web and email with no endpoint agent. Organizations protected by Fireglass maximize user productivity while solving the operational overhead and complexity of web gateways through true isolation, where all traffic is executed remotely and does not reach the corporate network.
Deployed at Fortune 500 companies, Fireglass was founded by network security leaders and military intelligence veterans and is backed by world-class investors including Lightspeed Venture Partners and Norwest Venture Partners.. .
BitDam cyber security blocks advanced content-borne attacks across all enterprise communication channels, empowering organizations to collaborate safely. Founded by elite intelligence professionals, BitDam proactively stops malware from running, pre-delivery, preventing hardware and logical exploits, ransomware, phishing, N-Day and Zero-Day attacks contained in any type of attachment or URL.
BitDam ensures the highest attack detection rates and delivers the fastest protection from today’s email borne attacks making enterprise communications safe to click. BitDam is privately held and headquartered in Tel Aviv with offices in the East Coast, United States..
HoxHunt offeres enterprise grade AI that simulates real phishing attacks on organizations users. HoxHunt features a fully automated service simulates real attacks and shows the techniques attackers use to infiltrate organisations.
Employees are rewarded for reporting the attacks – both real and simulated.. .
Curricula is a cyber security awareness training platform that teaches employees how to not get hacked. The company’s platform trains employees using a series of heroes, villains, and short relatable stories that visualize an actual cyber attack.
These stories engage employees with a true understanding of the risks they face every day against hackers. The Curricula platform is a fully managed security awareness program.
Curricula comes bundled with an integrated Phishing Simulator. This allows organizations to build mock phishing campaigns towards their own employees, while defending against DeeDee (Curricula’s AI villain hacker).
Hacken provides a wide range of cybersecurity services that respond to the needs of clients. Our team employs the best specialists and technologies in the security industry to capitalize on the extensive experience and to provide custom-tailored cybersecurity solutions for all businesses.
Hacken delivers mature solutions that improve clients’ operational and business performance by following a convergent modern cybersecurity approach to IT infrastructure protection. Anti-phishing services: Includes identifying various attack vectors (domains, ads, social networks, messengers, wallets).
We provide: – Fast detection and takedown of phishing websites on 2500+ top-level domains; – Chat messages anti-phishing; – The takedown of fraudulent Google ads and fake social media accounts using your brand; – Manual link checks to ensure that no legal content is accidentally blocked Penetration testing Our approach at Hacken is to ensure that a practical, real-world threat scenario is the starting point of any testing. This allows us to tailor the testing to maximize the efficiency of the process.
We identify vulnerabilities that could be used to loot funds from a the wallets of customers & cryptocurrency investors as well as steal funds from the company’s account and thereby damage the reputation of the project. Bug Bounty and Vulnerability Coordination Platform We connect business with the global community of independent security researchers, which helps companies to reduce the load of product and information security teams significantly.
Further, comparing to penetration testing, this service has dramatically lower costs. Our service includes a SaaS-based platform for bug reporting, mediation services, a pre-existing talent pool (white hat experts), and support services to assist with the bug bounty management and communication process.
Uniken’s mission is to make connecting safe. Instead of trying to make a better authenticator or just adding another layer of application security, we redesigned the security architecture with the 21st century threat landscape in mind.
The result is a game changing security platform that elegantly combines strong, mutual continuous authentication with channel security and secure data-at-rest. Uniken’s REL-ID is a MITM-proof and phishing proof solution that protects against most modern threats, without having it intrude on your customer’s user experience.
Businesses never have to worry about credential compromise, SSL vulnerabilities or DNS attacks again. In fact, REL-IDverify extends the same security and user experience to all your channels, providing a safe, consistent omni-channel experience that cannot be matched, and allows every transaction to be verified by the customer without the need for PII – including a phone call to the advisor or the call center or chat interaction.
Allure Security Technology
Allure’s anti-phishing solution defends enterprise customers from attacks. Allure detects phishing campaigns in near real-time from the first customer attack.
It identifies which customers are being phished and devalues anything the cybercriminal may have stolen from the customer and assists the enterprise in destroying the malicious site by taking it down. It was developed with $10M in DARPA funding by a team of Columbia University scientists.
It is headquartered in Waltham, Massachusetts.
Invincea is the leader in advanced endpoint threat protection, protecting more than 25,000 customers and 3 million active users. The company provides the most comprehensive solution to contain, identify, and control the advanced attacks that evade legacy security controls.
Invincea protects enterprises against targeted threats, including spear-phishing and Web drive-by attacks that exploit Java, Flash, and other applications. Combining the visibility and control of an endpoint solution with the intelligence of cloud analysis, Invincea offers the only market-deployed solution that defends against 0-day exploits, file-less malware, and previously unknown malware.
The company has been in market with its award-winning technology since 2009. In 2011, Invincea was recognized as “Most Innovative Company of the Year” at RSA Conference, and since then the company has won numerous awards for its technology and business.
The company, which was founded by Dr. Anup Ghosh to address the rapidly increasing security threat from nation states, cyber criminals, and rogue actors, has commercialized technology originally built under DARPA funding.
The company is venture capital-backed and based in Fairfax, VA. For more information, visit https://www.invincea.com..
RevBits’ Cyber Intelligence Platform (C.I.P.), a full product suite, fundamentally transforms the cyber-security market. Single source, “best in class”, with patented methodologies eliminates multiple vendors and related integration and training issues.
Cutting-edge modules include RevBits Privileged Access Management, RevBits EndPoint Security, RevBits Email Security, RevBits Deception Technology and RevBits Security Awareness Training.
Better Mobile Security
Better Mobile Security is a Mobile Threat Defense (MTD) solution provider that uses predictive AI technology to identify and stop mobile security threats without compromising end-user productivity or privacy. Better MTD’s predictive protection comes from its Deep Thinker AI platform that applies artificial intelligence and learning models to identify known and unknown threats at the device, network, and application levels.
It also works seamlessly with leading Enterprise Mobility Management (EMM) solutions to protect corporate resources and can be easily deployed to vast mobile networks with just a few clicks. Better Mobile Security solution also integrates with Microsoft Intune and Azure AD(AAD) single sign-on.
The company’s security platform combines sophisticated machine learning / artificial intelligence with its real-time threat intelligence to automatically detect attacks from malware, network, OS vulnerabilities, out-of-date operating systems, and many other breaches. It protects mobile devices and invaluable enterprise data from malware, network, and OS-layer attacks.. The company’s security platform combines sophisticated machine learning / artificial intelligence with its real-time threat intelligence to automatically detect attacks from malware, network, OS vulnerabilities, out-of-date operating systems, and many other breaches. .
Graphus® is industry’s first social engineering defense platform. It provides immediate protection for Office 365 and G Suite users by automatically eliminating social engineering threats – spear phishing, phishing, and business email scams.
Patented Graphus technology employs artificial intelligence to establish a TrustGraph® between people, devices, and networks to detect threats. Companies can activate Graphus in less than a minute.
Graphus was founded in 2015 and is headquartered in Reston, Virginia.
Cyota was a leading player in the anti-fraud space, specializing in financial institutions. It specialized in fraud related to the Internet, such as online banking fraud, eCommerce fraud and phishing.
Cyota was acquired by RSA Security (NASDAQ:RSAS) i Cyota is the leading player in the anti-fraud space, specializing in financial institutions. It specializes in fraud related to the Internet, such as online banking fraud, eCommerce fraud and phishing.
41st Parameter provides solutions for detecting and preventing fraud across multiple channels for the world’s most valued and recognizable brands. Leading financial institutions, e-commerce companies, and travel services businesses rely on 41st Parameter’s technology to protect them from cybercrime threats including card not present fraud, new account origination fraud, phishing and account compromise, credit bust outs, and fraud ring attacks.
Founded in 2004, 41st Parameter makes the process of detecting and preventing fraud easier and more effective, reducing both expenses and potential losses. As a leading web fraud detection innovator the company supplies industry-proven solutions which integrate advanced device identification with comprehensive risk management capabilities..
Holm Security is global a challenger and fast growing company within automated and continuous vulnerability assessment. Today we operate in 7 markets in Europe and Asia, reaching about 15 countries.
Our platform Holm Security VMP allows everyone to effectively take control of the security of their networks, systems and web applications. We also provide a solution to analyze how resilient your users are against social engineering, like phishing and ransomware attacks.
Our platform is easy to use and you get extensive support from our support staff and security experts. .
CTM360® is a Cyber Security subscription service offering 24 x 7 x 365 Cyber Threat Management for detecting and responding to threats originating in cyberspace. A growth-stage startup headquartered in the Kingdom of Bahrain, CTM360 currently serves more than 30 of the Top 50 GCC Banks, as well as entities in Oil & Gas, Healthcare, Sovereign Wealth Funds, Aviation across 28 countries.
CTM360 specializes in Offensive Defense and strives to strengthen a subscribed member’s security posture by making them a harder target in cyberspace. With 370,000+ unique incidents managed, 11 billion hacked accounts indexed, 350,000+ digital assets inventoried and 1000+ executives protected, CTM360 currently remains a leader in Cyberspace for Managed Threat Detection & Response, Digital Risk Management, Threat Intelligence, Corporate & VIP Brand Protection, Anti-Phishing, etc.
NETSHIELD is a breach prevention company that offers intranet breach prevention appliances and advanced mobile and IoT security. Its mission is to be a trusted provider of cost-effective, proactive security solutions to enhance the organization’s cyber-risk mitigation strategies.
NETSHIELD delivers critical network access control to ensure only trusted assets access corporate networks. Additionally, zero-day malware and phishing attack real-time quarantine, mac-spoof detection, TLD blocking, comprehensive auditing, vulnerability assessments, and compliance reporting and enforcement make this a comprehensive and compelling offering.
NetSHIELD is available as a hardware appliance that scales from 25 to 10,000 protected assets per appliance. In addition, an embedded command center allows administrators to manage up to 1000 remote sites.
Keezel is the secure extension of your office network. This allows businesses to be online securely around the world and also protect their industrial IoT connected equipment.
Keezel combines the power of a firewall, VPN, phishing filters and adblocking based malware protection. At the same time it remains easy to deploy, manage from the cloud and use anywhere outside your office.
Keezel is based in Amsterdam, the Netherlands. US office in Newport Beach, California.
ESET is an information technology security company that develops security software solutions which deliver protection against computer security threats for home users and corporate customers worldwide. The company provides ESET Smart Security, an integrated anti-virus, anti-spyware, anti-spam, and personal firewall solution; ESET NOD32 Antivirus, an integrated security solution that detects and disables viruses, Trojans, worms, adware, spyware, phishing, rootkits, and other internet threats; ESET Cybersecurity for MAC; and ESET Endpoint Security, a security solution for company endpoints combining a two-way firewall, web control, and remote administration tool.
ESET also offers ESET Endpoint Antivirus, an anti-virus and anti-spyware protection utilizing cloud-powered scanning, device control, and remote management of clients; ESET Mobile Security for Android that provides Android smartphone and tablet users with safer mobile technology adventures; and ESET Rootkit Detector, a security tool for Mac OSX that scans for malicious kernel extensions attempting to change operating system behavior by hooking inside the operating system. ESET was founded in 1992 and is based in Bratislava, Slovakia with regional distribution centers in San Diego, California; Buenos Aires, Argentina; and Singapore.
It has additional offices in Sao Paulo, Brazil; and Prague, Czech Republic as well as malware research centers in Bratislava and Košice, Slovakia; San Diego, California; Buenos Aires, Argentina; Singapore; Prague, Czech Republic; Krakow, Poland; Montreal, Canada; and Moscow, Russian Federation.
Pixm is a computer and network company that specializes in cybersecurity and endpoint security. Its services also offer anti-phishing, email security, computer vision, and deep learning it helps companies, businesses, and organizations on website, network, and computer security.
The company was founded in 2015 and headquartered in New York, United States.
OverWatchID delivers Privilege Anywhere™ for companies with cloud first initiatives, applications and cloud infrastructure running in Amazon AWS, Azure and Google Cloud. Easily protect and secure privilege users from any cloud application to on-premise infrastructure.
Privileged user credentials continue to be the top target by attackers. Whether through phishing or malware, a privileged user constantly needs to protect their credentials and identity.
OverWatchID is committed developing and delivering technology that protects privileged users. The OverWatchID solution delivers full privilege security for cloud applications, cloud computing and hybrid IT environments, and on-premise infrastructure.
DevOps automation technology keeps OverWatchID synchronized with any auto-scaling activities as well as new cloud applications and targets that appear in an organization. Privilege Anywhere™ secures all IT resources wherever they are deployed, completely implements in days, strengthens IT security, and costs less to own.
As a result, information security teams work less and pay less for better IT protection from insider threats and external attacks.. .
Founded in 2015, BlackFog was born to combat the growing number of online threats targeting your personal and corporate data. Hackers will get into your network; BlackFog stops them getting out.
Through a layered approach to security, BlackFog spots, in real-time, when an attacker is trying to remove unauthorized data from your device / network and stops them in their tracks. Consisting of multiple layers of defense against ransomware, spyware, malware, phishing, unauthorized data collection and profiling, BlackFog blocks over 24 million threats across mobile and desktop endpoints around the world, protecting organizations’ data and privacy, and strengthening their regulatory compliance..
Hook Security Inc
Hook Security, a cybersecurity SaaS training company, is introducing a new and better way to train all organizations to recognize security threats. We are motivated by the simple vision that everyone, everywhere, will recognize and respond to manipulation by technology.
Our core productized services include phishing simulations, detailed reporting, API interfaces into cybersecurity stacks, and email client plugins that train users on counterfeit emails at the point of use. We are pioneering Psychological Security (psysec) as the next evolution of Information Security (infosec)..
Proofpoint Inc. is a leading next-generation security and compliance company that provides cloud-based solutions to protect the way people work today.
Proofpoint solutions enable organizations to protect their users from advanced attacks delivered via email, social media and mobile apps, protect the information their users create from advanced attacks and compliance risks, and respond quickly when incidents occur. SAAS SECURITY & COMPLIANCE SUITE Enterprise Email Archiving: The email archiving solution supports eDiscovery, regulatory compliance and email storage management.
Enterprise Email Protection: Provides inbound and outbound email security and management to protect from outside threats including spam, phishing, unpredictable email volumes, malware and other forms of objectionable or dangerous content before they hit the enterprise perimeter. Enterprise Privacy: Protects private information in email, defends against leaks of confidential information and ensures compliance with common international, industry and US data protection regulationsâ€”including HIPAA, GLBA and PCI-DSS.
Proofpoint, Inc. was founded in 2002 and is based in Sunnyvale, California..
Fraud Hurts. ThreatMark “Online Fraud Prevention as-a-Service” provider with the most complex all-in-one solution providing real-time recognition of legitimate customers and cyber-criminals Reduction of the usage of passwords and sms-verifications cost savings Saving operational, analysis and implementation costs in fraud prevention domain Able to be fully operated in days for a fraction of costs! We prevent online fraudulent transactions and negative effects associated with fraud, both on client and business.
Attackers are able to adapt in hours and change their attack vector to bypass any isolated solution or weak combination. Present fraud detection/prevention solutions are having a hard time catching up with attackers as the solutions cover just one or few attackers vectors, cannot be integrated into complex security solutions to cover all possible vectors.
That’s why ThreatMark AFS is the first “one box solutions that covers all possible attackers’ vectors”. We also help our customers to resolve issues with customer authentication, payment fraud, bot/script attacks, social engineering/phishing, and promo-code and bonus abuse based on a unique combination of evidence evaluation.
Hitachi Systems Security
Hitachi Systems Security is an information technology company that protects data and strengthen privacy and cybersecurity defenses. The company builds and delivers customized services for monitoring and protecting the critical and sensitive IT assets in infrastructures 24/7.
They complement our managed security service offering with a variety of professional security services to assess the overall cybersecurity posture, align with a security strategy. Hitachi Systems Security offers a wide range of business system design and integration services, as well as outsourcing services that take advantage of its robust data center infrastructure.
It also pushes beyond the boundaries of IT to create new value for customers, with the aim of becoming a global service company to which customers can entrust any operation. The company also offers add-on services, including vulnerability management, cybersecurity analytics dashboard, office 365 cloud security monitoring, ATM and POS monitoring, file integrity monitoring, security device management, phishing protection, and intrusion detection monitoring.
MazeBolt strives to innovate and address the most pressing security issues by continuously evolving and updating its existing product. They do this by using an offensive approach in evaluating your security status.
MazeBolt believes you can only have a serious defensive security posture when you understand in-depth your current security position and its vulnerabilities. The realization that the security field is diverse, complex and fast changing brought the MazeBolt team to create a system that allows us to adapt quickly enough to ever evolving security threats without impacting the service level provided to their customers.
Some of the most important things we strive to create in our product are: scalability, easy of adaptability within the product range, inclusion and detection of new threats in almost real-time. All of these aspects are critical for effective security.
They have created a combination of open source tools and proprietary software that probes your website and hosts for the latest vulnerabilities. When found they notify you through their security dashboard, advising you how to resolve the security issue found..
Authomate’s platform makes strong security easy to use by shifting the burden of authentication from a human’s memory to their smartphone, creating a unique identity which becomes how you access your digital world. Good passwords are hard to remember so users take short cuts to work around.
With Authomate, credentials are stored on the smartphone – eliminating the human element from the authentication flow. Authomate simplifies the user experience by allowing the user’s smartphone in proximity to an application, website, system, or device to seamlessly authenticate the user, while eliminating the need to enter user names, passwords and one-time codes or answering challenge questions – enabling companies to implement stronger, always on security and enforce policies, in each case, without complicating or frustrating their end users and customers.
Key features include: enablement of multifactor authentication using contextually aware, dynamic factors; the ability to share access without sharing credentials; the ability to interface with VPNs and other non-web based applications that require credential input (including login for Macs and PCs); geofencing and geotagging; date and time restrictions; biometrics; defense against phishing sites; mitigating attack surfaces used to steal credentials; and robust logging of access. Authomate allows enterprises to implement strong security policies that can be easily adopted by their users and customers, while eliminating the vulnerabilities of weak and reused passwords, forgotten passwords that lead to costly recovery processes, and password spreadsheets that may be shared between team members, and eliminates attack surfaces used to harvest credentials (e.g., malware, keyloggers, Man-in-the-Middle, Man-in-the-Browser, phishing and social engineering).
The solution architecture reverses the credential flow, thereby eliminating the ability to compromise static devices like point of sale terminals, kiosks, ATMs, or websites for card not present, disabling the ability to use these avenues as an attack vector to steal credentials.. .
Anyone can send emails that look like they’re from you. Your employees can get hit by CEO scams, spear phishing, and business email compromise, while your customers may be phished.
Not implementing proper security measure leaves your people vulnerable and your business on the line.
El Pescador is the first Brazilian platform to carry out simulations of phishing attacks and security awareness training. Leader in the national Security Awareness market, El Pescador has developed an exclusive educational cycle methodology with content focused on educational phishing – available in Portuguese, English, Spanish and French.
From phishing attack simulations, El Pescador indicates the level of risk of employees and teaches them to recognize threats in the face of a real attack in the corporate environment.
Webroot provides intelligent endpoint protection and threat intelligence services to secure the Internet of Everything. By leveraging its cloud-based collective threat intelligence platform, computers, tablets, smartphones, and more are protected from malware and other cyber attacks Webroot technology is trusted and integrated into market-leading companies including Cisco, F5 Networks, HP, Microsoft, Palo Alto Networks, RSA, Aruba, and many more.
Webroot is headquartered in Colorado and operates globally across North America, Europe, and the Asia Pacific region. The company was founded in 1997 and is based in Broomfield, Colorado.
The browser has become one of the most important tools on the desktop, but the browser’s ubiquity makes it the leading target of exploit. Users connect from untrusted devices over insecure networks; corrupted websites plant malicious code; spoofed URLs are clicked; and credentials are entered into phishing forms.
All of this leads to management challenges and risk to sensitive data and resources. Authentic8 Silo is a secure, virtual browser in the cloud designed to insulate and isolate web data.
Silo is built fresh on launch and executes all web code in a secure sandbox. Users connect via a secure RDP connection, giving full interactivity of web sites while creating a perfect insulation layer between the device and the web.
is headquartered in Mountain View, California. Learn more at www.authentic8.com..
BankGuard is involved in the research and development of countermeasures against attacks on online banking. The company’s product, Super Random Number Table, defends against man-in-the-middle attacks (MITB), hijacking, and phishing by replacing the receiving bank account number with a random number.
The table can be printed on the back of ATM cards and used for both PC banking and smartphone banking.
OnDMARC is an email security product created by Red Sift. OnDMARC guides individuals and organisation of all sizes to full DMARC protection in order to block phishing attacks and increase the deliverability of their authorised emails.
Users are presented with simple actions to setup SPF, DKIM and DMARC based on their unique email configuration. With OnDMARC you can be sure to reach full DMARC protection with confidence no matter what your level of expertise.
They created OnDMARC to allow individuals of all abilities and companies of all sizes to deploy a secure DMARC policy quickly and economically. OnDMARC also help users deploy and maintain their SPF and DKIM records.
DMARC is an email authentication protocol defined in 2012 that gives domain owners the ability to receive reports about how receiving servers are processing their emails and inform them about how their authorized and unauthorized emails should be treated.
DMARC builds on and uses two existing technologies, SPF and DKIM.
Cyberfish is developing next-generation anti-phishing protection that combines machine learning, computer vision, and AI technology. The company protects companies from the most sophisticated phishing attacks, such as spear phishing, by combining Computer Vision, AI, and contextual training.
It offers simple, out-of-band, non-proxy deployment with low-touch support, sitting in a cloud environment while integrating with mail server via API. Cyberfish’s disruptive protection approach is to “look” at incoming emails, the links included therein and the resulting landing pages, and analyze their actual visual representation to detect impersonation, before they are opened by their intended recipient (employee).
The company visual analysis technology is a game-changer, allowing to detect new phishing attacks in real-time, without relying on outdated blacklist technology, thereby adding a layer of protection which until today was mainly addressed by generic employee training solutions.
Nodal Industries is a security solutions company. it provides network security solutions to protect home networks and small businesses from online threats.
The company offers Numa, a physical device that makes users safer by examining the traffic that moves in or out of their network devices, including laptops, tablets, smartphones, desktops, and home devices; and protects against various attacks, including malware, phishing, and intrusion. It offers its products for high-net-worth individuals, women working from home, remote workers, man signing contracts, legal professionals, women using a smartphone, smart-home owners, and other.
The company offers its products to their customers online. Nodal Industries was founded in 2014 and is headquartered in Mountain View, California.
Emsisoft’s ambition is to produce and market the best antivirus / anti-malware software for personal and commercial users. The rapidly growing company is a leading supplier in efficient real-time protection technology with a focus on anti-ransomware and behavior blocking technology to detect new and unknown threats.
The company’s specialty is its high-performance dual-engine scanner, combining Bitdefender technology with an in-house developed engine that is specialized in detecting potentially unwanted program (PUPs). The company was founded in 2003 by Christian Mairoll, realizing his vision of a virtual company: The 40+ employees are distributed all over the world but work together as if they are sitting next to each other in a real office.
In 2014, the company relocated from Austria to New Zealand. The Emsisoft product range includes the security programs Emsisoft Anti-Malware Home, Emsisoft Business Security, Emsisoft Enterprise Security, Emsisoft Mobile Security and the world’s first fully portable, free dual-engine scanner Emsisoft Emergency Kit.
BUFFERZONE Security Ltd
BUFFERZONE is a pioneer in advanced endpoint security. BUFFERZONE’s patented containment solution defends endpoints from the most evasive threats – including zero-days, ransomware, drive-by downloads and phishing – while maximizing user and IT productivity.
By isolating browsers, email and removable media in a virtual container, BUFFERZONE traps exploits and prevents them from harming the organization. BUFFERZONE includes a unique bridge for transferring content and data safely between the container and secure network zones, along with critical intelligence for enterprise-wide security analytics.
Easy to deploy and configure, BUFFERZONE is a lightweight solution that provides cost-effective containment for thousands of endpoints.
Terranova Security provides phishing, GDPR, and security awareness programs to change behaviors and reduce data breaches. Terranova Security’s products are the foundation for creating programs in information security, sustainable development, privacy, and other compliances, which are driven by internal policies and regulatory and compliance requirements.
Terranova Security’s mission is to reduce the human risk factor to effectively counter all cyber attacks. Terranova Security was founded in 2001 and is headquartered in Laval, Canada..
The Defence Works
The Defence Works provide security awareness training and simulated phishing that finally delivers a positive security culture by focusing on what matters most – your employees. No more tedious security awareness training videos, pointless interactions or tick-box questions.
Instead, The Defence Works delivers brand-new content each and every month – providing employees with interactive, immersive, real-life scenarios (based on recent, real world events) to finally help them understand cyber and data security in an engaging, entertaining and relevant way.
ZEROSPAM is a pure-play cloud Anti-Spam solution that offers superior protection against all email-borne threats such as ransomware and other malware, spear phishing, phishing and good old spam. All harmful and undesirable email is blocked in the cloud before it enters your network perimeter.
The ZEROSPAM solution has been designed to require minimal management. As a result, our customers enjoy a more secure environment while their IT team is able to concentrate on more strategic initiatives.
ZEROSPAM Security was founded in 2003 by CISSP David Poellhuber, long before the cloud solutions trend hit tidal wave proportions. While other appliance-based or software-based Anti-Spam providers only recently developed a cloud offering, ZEROSPAM was cloud from day one.
In 2006, while running a mobile content marketing company, our founders saw a problem with the way their competitors were doing business−automatically registering customers to underhanded content subscription packages that were nearly impossible to cancel. An idea formed…What if customers could be assured that their mobile purchases were protected rather than exploited? What if carriers never received complaints? And the first iteration of WMC Global was born.
We quickly began working with major US carriers to deliver PSMS Industry Monitor, an industry-changing market compliance system that identified the need for clear oversight and risk reduction in mobile purchasing. We realized very quickly that if the US was having problems with mobile messaging, so too were other mature markets and over the next 5 years, opened offices in London, Sydney, Singapore, and Kuala Lumpur.
In 2015, we launched Market Monitor, our newest iteration of the PSMS industry monitoring tool, and a year later, on the hunt for a richer data set, we launched SpamResponse. Thanks to our work in compliance as well as advances in technology, we began to see new kinds of messaging coming through old channels.
Our Automatic Takedown services, Threat Detect, RISQ Score, and PhishFeed soon followed. WMC Global now operates well beyond the mobile sphere, deploying customer and brand protection solutions that encompass all market verticals and digital service sectors that fall prey to scams.
Our cybersecurity products are now the most sought after in our suite, and we are excited to grow our customer protection services in this direction.. .
BioSSL offers 2nd generation of biometric security system BioSSL replaces the password with unique features of the users’ identity. Only the user controls his password.
His password are his unique biometric features. His password can never be revealed of re-engineered.
No hacker, phishing or web criminal behavior can use the data. BioSSL is a unique 2nd generation of fingerprint authentification security system for financial transactions in a global financial environment that deals with trillions of $$ transactions on an annual basis.
Verification ensures that the user’s identity is unique.
ThreatSim provides testing services to protect against spear phishing attacks. Its advanced attack simulation solution improves the security of organizations by changing user behavior and delivering security metrics.
In addition, it offers spear phishing awareness training, interactive training simulations, video training, custom video training, up to date template library, interactive reporting, identifying vulnerable endpoints, track user reports, managed services, and two-factor authentication solutions. ThreatSim is based in Herndon, Virginia..
Rublon is an authentication technology which increases website usability and security by replacing password-based authentication with decentralized mobile cryptography. Scan Rublon Codes with your mobile phone to register or log in without having to remember anything.
Integrating Rublon into a website increases the security of its users’ accounts. Phishing, password cracking becomes impossible.
Its users will be safer. They will only have to scan a Rublon Code to log in.
Rublon is based on several patent applications and has been officially launched on 20 January 2012.
KeySupreme is a cybersecurity company headquartered in New York which provides an authentication-as-a-service solution to enterprises for their employees and their customers. Our disruptive technology combines biometrics-based devices and a cloud platform to enable users to authenticate online and offline with privacy, security and convenience.
Our authentication process is based on a patented technology called Shared Intelligence. It is a cryptographic process which enables secure and encrypted communication between 2 entities without a static key.
This revolutionary technology is poised to become the world’s first quantum-resistant cryptography. Our technology is currently being used with 2 flagship products.
ZeroKey Authentication: Plug-and-play solution to replace passwords and keys in people-to-people, people-to-machine and machine-to-machine authentication..
LUCY Security AG
LUCY is a SOFTWARE that allows companies to take on the role of an attacker and uncover and close weaknesses in both the technical infrastructure and the staff. In short: LUCY Software enables companies to improve their it-security awareness and test their IT-defenses.
We make people testing, awareness training and technology assessments available and affordable to everybody!.
As of August 31, 2006, CipherTrust, Inc. was acquired by Secure Computing Corp.
CipherTrust, Inc. provides messaging security solutions to stop inbound and outbound messaging threats.
It offers layered security solutions for corporate messaging systems to stop inbound threats, such as spam, viruses, intrusions, spyware, zombies, and phishing, as well as for protecting against outbound policy and compliance violations. The company also provides solutions to protect various messaging protocols, including email, instant messaging, Web mail, file transfers, and other HTTP- and FTP- based activities.
CipherTrust, Inc. was founded in 2000 and is headquartered in Alpharetta, Georgia.
The company also has offices in the United States, Hong Kong, Oxon, France, Tokyo, Singapore, the Netherlands, Germany, Mexico, Brazil, Colombia, Australia, and the Peopleâ€:tm:s Republic of China.. .
Retruster is an email protection platform for the cloud era. Retruster stops phishing and fraud, and gives organizations full control over their email function.
Some of the world’s best-know companies have turned to Retruster. See more at retruster.com.
ConTrust (“Content you can trust”) offers a technologically advanced and cohesive SaaS (Software as a Service) solution that enables you to moderate your content in real-time according to your platform values. As a media platform you need to moderate the level of noise according to the values of your community.
This is not an easy challenge and each media platform is charged with the responsibility of finding the right balance between consumer freedom and brand protection. The ConTrust solution is able to identify content threats including profanity, pornography, racism and brand abuse and block these threats according to a set of levels defined by the platform owner.
In addition, the solution protects against traditional security threats such as spam, phishing (scam sites), malware, etc. ConTrust offers hybrid solution that combines proprietary technology with a user friendly, transparent management application.
MX Logic, Inc. provides managed email and Web security services in the United States and internationally.
It offers Email Defense Solutions that protect against email-borne threats and help businesses to meet compliance regulations via email storage, retrieval, and surveillance. The company also provides Message Archiving for businesses to monitor, store, and retrieve company email messages to comply with electronic security regulations; and Web Defense Service that blocks Web threats, including spyware, viruses, and phishing attacks.
It serves public companies, as well as companies in healthcare, financial services, and law and insurance markets. The company was founded in 2002 and is headquartered in Englewood, Colorado.
How to protect trillions of dollars worth digital assets from cyber criminals? In Horizen we believe that cyber protection consists of three dimensions but so far only two dimensions are covered by the existing security solutions. Our visitor identity control system (VICS) is the first to provide the digital industry with the required control over second party intentions and identity.
Specialties Cyber security, Web security, Cyber investigation, Cyber attacks prevention, Cloud security, CRM security, IOT security, DDOS prevention, Credential-based attack, Bot detection, Scraping prevention, Carding prevention, Web hacking detection, Digital fraud detection, AI, Phishing remediation, Enterprise protection, API security, and VICS. .
With PhishLine, you Phish like an Attacker, Train like a Defender, and Report like a Pro. Headquartered in Milwaukee, WI, with offices throughout the United States, PhishLine specializes in helping Information Security Professionals meet and overcome the increasing challenges associated with social engineering and phishing threats.
PhishLine provides a powerful blend of risk-based objectivity, robust metrics, and compelling reporting that will be valuable to both security experts and business executives. PhishLine will help you move away from one-time tests and redundant analysis to actionable, forensic fingerprints of your organization’s culture at the user level.
Our training solutions will help you deliver educational content from a wide-ranging library of courses directly to the users who need the education the most.
sāf.ai enables data to become self-aware, self-healing, and self-defending. Our data-centric SaaS is an innovative solution that uses artificial intelligence and blockchain technology to interweave every file and data-record with its own security operations.
Data breaches primarily result from a combination of human error and the exploitation of gaps in perimeter security. By fusing data with artificial intelligence, sāf.ai eliminates those gaps and provides a solution that is:
Comprehensive: It’s compatible with any type of data, any operating system, and for any organization seeking to protect its data – no technical expertise required.
All other users pay only for what they use – starting at $1/GB per month. sāf.ai also works with all existing hardware/software so there’s no need to rip and replace technology.
sāf.ai presents itself as network storage (e.g. a network shared drive), a hard drive or a database; it can be deployed as a POSIX filesystem, as a software-defined storage system, or as an object-store..
Dcoya believe that employee’s cyber-security knowledge and awareness must be a foundational aspect of any organization’s security strategy. Their innovative platform empowers employees to take a proactive participation in organization-wide cyber-security effort.
As active participants in Dcoya’s awareness program, employees will be able to spot phishing attacks and report them to the organization cyber incident response team in order to halt attacker’s hack-chain and nullify it.. .
Versafe Ltd. develops security applications for identity theft and online fraud prevention applications.
The company offers Versafe security suite that provides anti-phishing, anti-trojans, anti-pharming, and brand protection solutions for banks, financial institutions, E-commerce sites, and credit card operators. Its Versafe enables businesses to avoid phishing attacks, prevent Trojan impact on Website users, maintain online awareness and prevent pharming attacks, reduce bad publicity and enhance brand protection, provide a solution to overcome social engineering attacks, and comply with IT regulations; and online anti-fraud solution and technology enable organizations to mitigate the risks of identity theft and take control over the protection of their clients’ sensitive credentials and online information.
The company also provides fraud prevention, operation center, forensics, governance, risk, and compliance services. It also serves companies in insurance, retail, and telecommunications industries, as well as the governmental sector.
OnlyMyEmail provides email privacy and security services for consumers, corporations, and internet service providers. Its filtering technology eliminates spam, phishing e-mails, frauds, viruses, and other junk e-mail.
In addition to SPAM filtering, OnlyMyEmail provides permanent e-mail addresses, POP and SMTP email accounts, and e-mail unification services, which allows users to collect e-mail from multiple addresses all through just one account.. .
Founded in London in 2004, Spamhaus Technology provides commercial data distribution and synchronization services for the real-time datastreams, raw datasets and security technologies developed by the Spamhaus Project. These services and datafeeds include IP-based and domain-based reputational data, response policy zones (RPZ managed services and RPZ transfer) and Border Gateway Protocol Feeds and block lists, which are used to protect more than 3 billion mailboxes worldwide from spam, phishing emails and malware.
These distribution services provide real-time security data to the world’s largest organizations and service providers, security and anti-spam vendors, universities, security researchers, cyber incident response analysts and law enforcement agencies. This global distribution involves resource intensive internet services which the Spamhaus Project, as a non-profit security research and spam-fighting organization, has no commercial interest in running itself.
As an independent distribution company, Spamhaus Technology allows the Spamhaus Project to meet the global demand for its real-time security and anti-spam data, while freeing the Spamhaus Project team to focus its resources solely on maintaining and developing technologies that help to thwart cybercrime by assisting organizations in combatting spam, malicious email traffic and DNS abuse. Spamhaus Technology is a distribution company only and does not sell to the public.
NetWatcher is a Security-as-a-Service solution that enables customers to understand and deal with the weak link in their security — their employee’s behavior on the Internet – employees send PII over the internet in the clear, they install & run risky / vulnerable software, they click on phishing message and they visit nefarious websites… These unintentional insider threats impact every business and are the cause of most corporate cyber security breaches. Most cyber security companies deal with the result… NetWatcher deals with the root cause of the problem.
NetWatcher provides customers with a cost-eﬀective 24 x 7 cyber security service monitoring their networks for vulnerabilities and exploits. NetWatcher is also great for Compliance and hard core security.
We’ve cloud-enabled continuous monitoring, intrusion detection, active scanning, log monitoring (SIEM), net-ﬂow analysis, event management and end point integration. Customers get both a security health score and a cyber promiscuity score™ per asset so they can see where their hot spots exist and deal with the issues long before a breach.
WholeSecurity was a software company that provides behavior-based security and anti-phishing technology. It delivers security solutions that protect PCs from crimeware such as worms, Trojan horses, malicious spyware, and phishing attacks.
The company also provides on-demand endpoint security for companies to protect access via SSL VPN, Citrix, or web mail technologies as well as always-on endpoint security for companies for threat protection on LANs or IPSEC VPNs. It was founded in 2000 and is based in Austin, Texas..
This article was written by Benjamin Skute from Threat.Technology. The editor for this article was Tess Page. If your company is featured in this article and you want to have amendments made please contact us on: [email protected].
Alternatively you may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.