This article showcases our top picks for the best Massachusetts based Cyber Security companies. These startups and companies are taking a variety of approaches to innovating the Cyber Security industry, but are all exceptional companies well worth a follow.
We tried to pick companies across the size spectrum from cutting edge startups to established brands.
We selected these startups and companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
Top Massachusetts Cyber Security Companies
Cybereason is the leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, and managed monitoring services. Founded by elite intelligence professionals born and bred in offense-first hunting, Cybereason gives enterprises the upper hand over cyber adversaries.
The Cybereason platform is powered by a custom-built in-memory graph, the only truly automated hunting engine anywhere. It detects behavioral patterns across every endpoint and surfaces malicious operations in an exceptionally user-friendly interface.
Cybereason is privately held and headquartered in Boston with offices in London, Tel Aviv, and Tokyo.. .
Founded in 2011, BitSight transforms how organizations manage information security risk. The BitSight Security Ratings Platform applies sophisticated algorithms, producing daily security ratings that range from 250 to 900, to help manage third party risk, underwrite cyber insurance policies, benchmark performance, conduct M&A due diligence and assess aggregate risk.
Organizations worldwide, including seven of the top 10 cyber insurers, 20% of Fortune 500 companies, and 3 of the top 5 investment banks use BitSight’s proven Security Ratings technology on a daily basis to make integral risk and business decisions. With over 1,000 customers and the largest ecosystem of users and information, BitSight is the most widely used Security Ratings Service.
For more information, please visit www.bitsighttech.com or follow @BitSight on Twitter.. .
Veracode is the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased, or outsourced software applications and third-party components.
It was founded in 2006 and headquartered in Burlington, Massachusetts.. .
Devo, the cloud-native logging and security analytics company, empowers security and operations teams to maximize the value of all their data. Only the Devo platform delivers the powerful combination of real-time visibility, high-performance analytics, scalability, multitenancy, and low TCO crucial for monitoring and securing business operations as enterprises accelerate their shift to the cloud.
Headquartered in Cambridge, Mass., Devo is backed by Insight Partners, Georgian, and Bessemer Venture Partners. Devo Technology was founded in 2011 and is headquartered in Cambridge, Massachusetts..
CyberArk is a security company focused on striking targeted cyber threats. It helps companies protect their highest-value information assets, infrastructure, and applications.
The company is focused on delivering a new category of targeted security solutions that help clients stop reacting to cyber threats and get ahead of them, preventing attack escalation before irreparable business harm is done. CyberArk was launched by Udi Mokady in 1999 and is based in Newton, Massachusetts with offices in the U.S., Israel, U.K., France, Germany, the Netherlands, and Singapore and serves customers in more than 65 countries..
iboss has created the first and only web gateway as a service specifically designed to solve the challenge of securing distributed organizations. Built for the cloud, the iboss Distributed Gateway Platform leverages an elastic, cloud-based node architecture that provides advanced security for today’s decentralized organizations with more financial predictability.
Users are always connected to iboss cloud, regardless of device or location, to ensure all Internet traffic is secured for compliance, web filtering, malware defense, and data loss at all times. iboss was founded in 2003 and is based in Boston, MA, USA..
Onapsis provides cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications. Its solutions include the Onapsis Security Platform, a widely-used SAP-certified cyber-security solution in the market.
Unlike generic security products, Onapsis’ context-aware solutions deliver both preventative vulnerability and compliance controls, as well as real-time detection and incident response capabilities to reduce risks affecting critical business processes and data. The company was founded in 2019 and is headquartered in Boston, Massachusetts.
Onapsis has offices in Heidelberg, Germany, and Buenos Aires, Argentina.. .
Say No to Passwords. Passwords are the weakest link in securing access to your applications.
Biometric techniques, new devices, and new device sensors provide exciting possibilities. However, they can be expensive to deploy and manage.
Transmit Security allows you to drag and drop Authentication, Trust Models and Identity Management into any Application at Business Speed. You will be able to do trusted device binding, primary authentication, secondary authentication and respond to security risks immediately.
Deploy any policy instantly. No change to your application required..
Funded by Norwest Venture Partners, Qualcomm Ventures and other leading venture firms, CyberX delivers the only cybersecurity platform built by blue-team experts with a track record of defending critical national infrastructure. That difference is the foundation for the most widely deployed platform for continuously reducing IoT/OT risk and preventing costly outages, safety and environmental incidents, theft of intellectual property, and operational inefficiencies.
For more information, visit CyberX.io or follow @CyberX_Labs.. .
Digital Guardian provides the industry’s only data protection platform that is purpose-built to stop data theft from both insiders and external adversaries. The Digital Guardian Data Protection Platform performs across the corporate network, traditional endpoints, and cloud applications.
It’s buttressed by the DG Cloud, a big data security analytics backend that sees and blocks all threats to sensitive information. For more than 15 years, it has enabled data-rich organizations to protect their most valuable assets with a choice of on premises, SaaS or managed service deployment.
Digital Guardian’s unique data awareness, combined with threat detection and response, enables organizations to protect data without slowing the pace of their business. It was founded in 2003 and is headquartered in Waltham, Massachusetts, United States..
Black Duck secures and manages open source software worldwide, eliminating open source security vulnerabilities and license compliance pain. With the rapid, widespread adoption of open-source software, Black Duck is a key component of Synopsys’ Software Integrity Platform, the most comprehensive solution for integrating security into the SDLC and software supply chain.
Black Duck was established in 2002 and is based in Burlington, Massachusetts, United States.. .
GreatHorn is a computer software company that provides protection for cloud email systems, via advanced threat detection, automated defense, and integrated incident response. The company specializes in the fields of machine learning, information security, predictive security, and cybersecurity.
GreatHorn was founded in 2015 and headquartered in Waltham, Massachusetts.. .
ObserveIT helps organizations identify and eliminate insider threats. With more than 1,600 global customers across all major verticals, ObserveIT is an insider threat monitoring and prevention solution that empowers security teams to detect insider threats, streamline the investigation process, and prevent data exfiltration.
The company is headquartered in Boston, Massachusetts, United States.. .
Randori is your trusted adversary. Our Attack Platform empowers organizations with a continuous and automated red team experience they can use to assess their real-world security.
By mirroring today’s adversaries, we help security teams identify gaps, demonstrate effectiveness, and get better over time. Headquartered in Waltham, MA, with offices in Denver, CO, the company is backed by .406 Ventures, Accomplice, Harmony Partners and Legion Capital..
InAuth is a digital device intelligence company for a mobile-first world. It delivers the most advanced device identification, risk detection, and analysis capabilities possible to help organizations limit risk, remove friction, and reduce fraud within their digital channels.
With safer digital transactions, banks, payment networks, merchants, healthcare providers, governments, and other organizations are better positioned to capture new revenue opportunities and compete more effectively in an “always-on” world.. .
Cambridge Blockchain develops blockchain-based identity management and compliance software solutions for financial institutions. The company provides an identity management platform for multinational banks financial institutions that puts control of personal identity data back in the hands of the end-user.
It returns control of personal data back to users while delivering the benefits of trusted, distributed identity to consumers and organizations. Alex Oberhauser, Alok Bhargava, and Matthew Commons founded it in 2015, with its headquarters in Cambridge in Massachusetts..
Voatz is a mobile election voting platform, secured via smart biometrics, real time ID verification, and the blockchain for irrefutability. Voatz enables citizens to vote in all kinds of elections or voting events via a smartphone.
Past attempts at internet based voting have failed or not gone mainstream due to fundamental concerns around security, auditability, and voter anonymity. With Voatz, using biometrics for security and the Blockchain for irrefutability, it is able to tackle all challenges and significantly streamline the process of voting and identity verification.
Voatz was a part of the Techstars Boston 2017 and Masschallenge Boston 2017 cohorts. The company was founded on 2015 and is headquartered in Boston, Massachusetts..
DUST — the Diamond Unclonable Security Tag — is a proprietary technology which utilizes nanodiamonds to create an unclonable identity layer on any object. An optical scanner and cloud-based infrastructure provides an interface to the object identity and provenance.
DUST ensures that trusted data and verifiable products are used and traced across their full lifecycle.. .
Kolide is an Endpoint Security agent and MDM that puts user productivity and privacy first. Powered by Honest Security, we believe in security through transparency, trust, education and empowerment.
We provides end-users with real-time alerting through Slack, enabling them to take ownership of the security of their device.. .
We’re building a next-generation global security fabric to connect and secure the digital ecosystem on which enterprise businesses depend. Join us in helping solve complex systems problems at the intersection of cloud, networking, security, and distributed computing.
If you’re interested in learning more, please email [email protected] or visit our website. Our team combines an unparalleled mix of talent, skill, and passion with years of experience at industry-leading networking, security, and infrastructure companies, including Cisco, Microsoft, AWS, and Cloudflare.
Our investors include Bain Capital Ventures, 645 Ventures, First Star Ventures and Dreamit Ventures.. .
Sqrrl is a Big Data Analytics company that lets organizations pinpoint and react to unusual activity by automatically uncovering hidden connections in their data. Sqrrl’s linked data analysis platform gives analysts a way to visually investigate these connections, allowing them to rapidly understand their surrounding contexts and take action.
With Sqrrl’s cybersecurity solution, users can detect and respond to advanced data breaches associated with cyber-espionage activity, insider threats, and other types of hard-to-detect attacks. At the core of Sqrrl’s architecture are a variety of Big Data technologies, including Hadoop, link analysis, machine learning, Data-Centric Security, and advanced visualization..
PaymentWorks is a security platform that enables enterprises to mitigate B2B payment fraud risk and ensure regulatory compliance. It provides a secure, cloud-based enterprise application, which facilitates the exchange of payment and other relevant information between corporate payers and payees.
PaymentWorks was founded in 2013 and is headquartered in Waltham, Massachusetts.. .
Born and raised in the security community, we’re on a roll and just getting started. In late 2009, the original team of Pwnies – Dave Porcello, Gabe Koss, and Oliver Weis – placed the Pwn Plug on the original site (Dave’s blog) with little expectation of what was to come.
From those humble beginnings, we have focused on providing full threat detection of every wireless and wired device in and around your workplace. We are the only company that detects rogue, misconfigured, and unauthorized devices across wired and wireless spectrums.
By automating wireless and wired device detection, our solutions continuously detect the devices on or around your network that are open pathways for attackers. Pwnie Express is led by industry veterans with deep security testing and product development experience.
Security assessment is our lifeblood, and we believe in making it simple to do the easy things, and possible to do the hard stuff. With Pwn Pulse, a distributed security assessment service, and our award-winning sensors, security teams can get the answers they need in a timely and effective manner..
CyberSaint Security is a leading cybersecurity software firm that provides unparalleled visibility into risk, automates IT compliance, and creates resilience from assessment to Boardroom. Based in Boston, Massachusetts, the CyberSaint team’s intellectual DNA winds deeply through the academic, technology, and investment communities in Boston, the White House, RSA, IBM, EMC, KPMG, MIT, Harvard, and others.
The Company’s mission is to empower organizations to manage cybersecurity as a business function through the adoption of powerful technology that enables measurement, enhances communication, and improves cybersecurity resiliency. The CyberStrong Platform’s automated risk and compliance functionality eliminates manual intervention, increases resiliency, and illustrates business value. CyberStrong is the only solution that automates compliance and risk assessments as data in an organization’s security tech stack changes. CISOs, Cyber Risk teams, and Executives leverage real-time risk intelligence for faster insights, leading to smarter decisions and meaningful action.
Unitrends increases uptime and confidence in a world in which IT professionals must do more with less. Unitrends leverages high-availability hardware and software engineering, cloud economics, enterprise power with consumer-grade design, and customer-obsessed support to natively provide all-in-one enterprise backup and continuity.
The result is a “one throat to choke” set of offerings that allow our customers to focus on their business rather than backup.. .
Corero Network Security
Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative First Line of Defense® DDoS protection solutions. Corero SmartWall® Threat Defense System provides their customers with real-time protection against a continuously evolving spectrum of DDoS attacks that have the potential to impact any Internet connected business.
Corero provides the opportunity to enhance defense-in-depth security architectures with an important additional layer of security capable of inspecting traffic arriving from the Internet and alerting and or blocking attack traffic before it impacts your environment. The goal of the Corero First Line of Defense DDoS protection solution is to protect the customer’s network infrastructure, online services and confidential data against DDoS attacks.
Corero solutions are designed to be always on providing automatic attack mitigation with continuous threat visibility and network forensics. The Corero First Line of Defense solution provides comprehensive, real-time DDoS protection against the latest breed of attacks, including network and application layer DDoS attacks, volumetric, multi-vector attacks and access attempts from IP addresses with a bad reputation or from unwanted geo-locations.
These varied cyber-threats have the potential to challenge traditional network security defenses and compromise networks. With varied mitigation bandwidth licensing options, Corero provides the most comprehensive peer-point protection, at industry disrupting economic scale.
Corero real-time DDoS protection can be obtained at a fraction of traditional solutions.. .
PiiQ Media & Risk
PiiQ RISK; Spear : Deliver the most advanced SPEAR PHISHING attack simulations with complete automation! Advanced Attack protocols, contextualised by end user with complete automation and intuitive management consoles – no experience required! Truly tailored by each end user’s exposed (ever changing) PII there is nothing on the market that compares to PiiQ- SPEAR. Comprehensive and precise penn testing through deep social media, open, and dark web risk scoring that measures, monitors, and mitigates Enterprise cyber risk.
A complete education for Social, Media, & Email security best practices, our cyber security training programs include ongoing progress report monitoring for our detailed remediation measures, based on the specific training simulation objective / lede. HIPAA compliance and Training and awareness for Cybersecurity, SOC & MSP / MSSP teams have never been so robust and user friendly! *Pricing & trial account access commensurate with ‘generic phishing simulations” on the market.
Level up your protection, since the attackers are leveling up their tactics. PiiQ INTEL: OSINT tools that defy the market & brand intelligence norm.
Seamlessly glean insights to keywords, audience, authenticity, social profiles across multiple channels, sort by share of voice, and more! This tool goes beyond ‘bot or not’ to use trained AI that manages human behavior patterns and centrality data to deliver forensic open source data science insights, like nothing on the market today!. .
Allure Security Technology
Allure’s anti-phishing solution defends enterprise customers from attacks. Allure detects phishing campaigns in near real-time from the first customer attack.
It identifies which customers are being phished and devalues anything the cybercriminal may have stolen from the customer and assists the enterprise in destroying the malicious site by taking it down. It was developed with $10M in DARPA funding by a team of Columbia University scientists.
It is headquartered in Waltham, Massachusetts.. .
Dover Microsystems brings real security, safety, and privacy enforcement to silicon. Its hardware-based technology empowers processors to protect themselves in real-time from the exploitation of software vulnerabilities that can stop all network-based attacks.
The company’s mission is to immunize the world’s processors against all network-based attacks. CoreGuard, their unique silicon IP with proprietary micro policies, acts as a bodyguard to the host processor, monitoring every instruction executed to ensure it meets a set of security, safety, and privacy rules.
With CoreGuard, a processor can actively stop entire classes of network-based attacks and prevent the exploitation of software vulnerabilities. Dover Microsystems was founded in 2017 and is headquartered in Waltham, Massachusetts..
Akamai is the provider of cloud services for helping enterprises provide secure, high-performing user experiences on any device, anywhere. If you’ve ever shopped online, downloaded music, watched a web video or connected to work remotely, you’ve probably used Akamai’s cloud platform.
Akamai helps enterprises accelerate innovation in the hyperconnected world by removing the complexities of technology so you can focus on driving your business faster forward. We enable enterprises to capitalize on market opportunities presented by trends like mobile and cloud while overcoming the challenges presented by security threats and the need to reach users globally.
The Akamai Intelligent Platform™ reaches globally and delivers locally, providing unmatched reliability, security and visibility into your online business.. .
Trillbit is a tech company that can convert any existing speaker into a data transmitter and any device with a microphone into a data receiver. Any device with a speaker becomes a transmitter and any device with a microphone becomes a receiver.
With that, it connects businesses and people to exchange proximity-based, real-time information just over the sound, without the need for any network, wifi, or Bluetooth. Proprietary technology for Data over Sound.
The company has won several awards for its disruptive technology and applications. It was founded in 2017 and is headquartered in Boston, Massachusetts..
Suspect Technologies is a Next Generation Law Enforcement Imaging Software. Suspect Technologies aims to continuously improve the security, safety of people and access to services by using computer vision technology.
Its solutions enhance the collective values of security, safety, efficiency and convenience. It is currently scaling as the face company of law enforcement..
Abusix is a company of Internet security, network abuse handling, antispam and fraud specialists. Their mission is to help ISPs & Internet companies solving the rapidly growing problem of outgoing spam and all kind of other network abuse or security issues in a solid, accurate and reliable way.
They are providing network abuse handling & reporting, customized spamfeeds, consulting and cloud-based software/services against network abuse for ISPs, ESPs, technology providers, businesses and many more. Get in touch!.
ZeroNorth is a provider of risk-based vulnerability orchestration across applications and infrastructure. It provides a comprehensive and continuous view of risk and reduces costs associated with managing disparate technologies.
The organizations that rely on software as a competitive advantage trust ZeroNorth to manage risks by orchestrating the continuous and comprehensive discovery and remediation of vulnerabilities.The company empowers customers to rapidly scale application and infrastructure security while integrating seamlessly into developer environments to simplify and verify remediation. ZeroNorth was founded in 2015 and is headquartered in Boston, Massachusetts, United States..
Komand is an early stage cyber security start-up. Its platform allows teams to automate and optimize security operations, without a need for code.
This makes day-to-day activities manageable for security teams. The company enables other organizations to connect tools, build dynamic work flows, utilize human decisions, respond to threats, save time and energy; and improve operational efficiency.
Komand was founded by Jen Andre in 2015 and is located in Boston, Massachusetts.. .
AppInside safeguards mobile applications by continuously analyzing internal components for malicious abuse, legal violations and security threats, offering an ongoing insight dashboard and a platform for security services. The multi-billion market of mobile applications attracts various threats that created a growing security need.
Using distributed development methods, mobile applications are built from various internal components, introducing new vulnerabilities which are not covered by traditional security methods. AppInside aims to be the world leader in mobile open source package classification for security, compliance and performance aspects..
krypt.co builds the next generation of mobile-based authentication, with a vision that authentication should be based on strong cryptography. Public key cryptography has existed for almost 40 years but it’s barely used for authentication.
The private key is not memorizable. Most people cannot compute digital signatures in their head.
Therefore we need to store the private key somewhere. It has to be accessible but also kept a secret.
At KryptCo, they tackles this very problem and believes that smartphone is core to the solution.. .
NetScout Systems, Inc. is the market leader in Unified Service Delivery Management solutions focused on assuring service delivery for the world’s most demanding and complex service delivery environments.
With more than 25 years of technology innovation, NetScout continues to lead the performance management market and has dramatically changed how enterprises and service providers optimize and protect service delivery to end users and subscribers across modern IP networks. NetScout has remained focused on driving technology innovation within its product portfolio to meet the needs of these organizations, providing robust tools for the efficient and effective management of dynamic applications and service delivery environments..
Rejjee works directly with TSA to post 20-30K official Lost & Found reports from 700+ checkpoints nation-wide, including lost laptops, jewelry, passports, and other valuables. The company is also building the first fully-integrated airport Lost & Found network connecting agencies from airports around the country and the world to streamline the reporting process and facilitate intra- and inter-agency communications, item recovery, and data analytics.
The company’s mobile app (RejjeeApp) enables users to register their valuables, report loss in real-time anywhere/anytime, and demonstrate ownership; the app is proven to increase recovery rates by 10X. The company platform also delivers JIT product replacement advertising from in-airport and leading online retailers generating click thru and affiliate shopping fees.
Over the past three years the ad serving engine has generated 9-30% CTRs across all product categories. The company is currently seeking additional funding to a) expand the TSA / Airport L&F network creating a direct channel to 1B domestic travelers, and b) customer / user adoption through direct to consumer advertising and strategic partnerships such as online travel sites, credit cards, travel insurance firms, and travel agencies..
Strongarm is the simple and affordable way to automatically stop attacks from damaging your business. Our automated malware protection safeguards your organization while minimizing complexity.
Strongarm empowers SMBs to respond to and protect against cyber threats, in real time, including those that slip past firewalls and antivirus protections.. .
Virtual Software Systems
Virtual Software Systems (VS2) is a cybersecurity venture focused on transforming the reliability and security of enterprise applications and data. With a team responsible for numerous computer industry innovations, VS2 has developed technology that provides a new system-level approach to security that fundamentally changes the vulnerability of computers to attack.
It also provides essential technologies that bring new dimensions of resilience, reliability, availability, and safety to mission- and life-critical applications. The company’s software tools can generate meaningful ROI by enabling the creation of new solutions that differentiate products, improve productivity, and enhance security.
VS2’s technologies create additional barriers to failures and attacks by offering a logical upgrade path for existing systems. They adapt to a wide range of off-the-shelf hardware, software, and cybersecurity platforms – from embedded controllers to enterprise servers and the networks that support them.
Virtual Software Systems’ mission is to create tools that dramatically improve life- and mission-critical systems’ availability and applications resilience to failures and attacks, regardless of platform. It was founded in 2014 and is headquartered in Waltham, Massachusetts, United States..
Sentrix provides cloud-based Website security solutions protecting against threats of all types. Sentrix addresses the most demanding, high-end security needs of the enterprise, yet it simplifies maintenance, reduces efforts by up to 80% and TCO by up to 50%, and allows organizations to focus on business-critical tasks.
Sentrix has recognized that analyzing the defended website and understanding its structure and functionality results in numerous benefits to the business as compared to traditional cyber security. This approach, referred to as Context-Aware Security, is attracting a growing number of enterprises that use Sentrix to defend their websites against the entire range of Web Application attacks ranging from massive DDoS campaigns through OWASP top-10 and beyond..
Aite Group is an independent research and advisory firm focused on business, technology, and regulatory issues and their impact on the financial services industry. The company provides annual research subscription services offering access to an extensive library of research reports and their underlying data sets and access to a team of seasoned industry analysts.
Its practices include retail banking & payments, wholesale banking & payments, institutional securities and investments, wealth management health insurance, life insurance, property and casualty insurance, fraud & AML, and cybersecurity. Its consulting services include new market entry studies, market sizing studies, competitive analyses, vendor evaluations, on-site strategy sessions, advisory calls, presentations, webinars, and white papers.
Aite Group was founded by Gwenn Bézard and Gerald Clemente, and is based in Boston, Massachusetts.. .
Basis Technology provides software solutions for extracting meaningful intelligence from unstructured text in Asian, European and Middle Eastern languages. They help technology companies and government organizations improve the accuracy of information retrieval, text mining and other applications through advanced linguistics.
Their Rosette Linguistics Platform uses state of the art Natural Language Processing techniques to improve information retrieval, text mining and other applications. Rosette provides capabilities like identifying the language of incoming text, providing a normalized representation in Unicode, and locating names, places and other key concepts from a body of unstructured text.
Rosette is the world’s most widely-used family of commercial software products for multilingual information retrieval. Its reliability, scalability, accuracy, and strict compliance with industry and international standards have been put to the test in high volume transaction environments, such as Google’s multilingual search engine, PeopleSoft’s human capital management software, and Amazon.com’s global e-commerce system..
Silicon:SAFE Ltd is a Cyber Security company that develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack. It was founded in April 2013 and is based in Cambridge UK.
Silicon:SAFE’s Password Protect technology stops hackers stealing user names and passwords on mass while at rest from your systems. It’s Card Protect technology allows a company to store Credit Card details and share in a PCI compliant way knowing that the card details can never be hacked..
VisiTrend makes powerful analytics easier to use through interactive visualization. Several analytics are included with an initial focus on cyber security.
We have both a SaaS offering and a virtual appliance that can be setup on-site. VisiTrend connects to several different data stores including relational databases and big data solutions such as Hadoop.
Users can interact with a visualization to run machine learning algorithms on their data without writing a line of code. Social features enable users to share analytics, data, and visualizations..
Company Description Arbor Networks secures the world’s most demanding and complex networks from DDoS attacks and advanced threats. Solutions Overview Arbor Networks customers gain a micro view of their own network, through their suite of products, combined with a macro view of global Internet traffic and emerging threats, through their ATLAS threat intelligence infrastructure.
See, understand and solve more security threats with Arbor Networks. ATLAS provides a comprehensive, aggregated view of global traffic and threats.
330+ service provider customers contribute 120 Tbps of global traffic intelligence, enabling Arbor’s Security Engineering & Response Team (ASERT) to develop threat protections that are delivered directly into customer products to stop DDoS attacks and malware campaigns. Arbor DDoS Solutions are proven on the world’s most demanding networks.
their portfolio offers complete deployment flexibility to meet the needs of any organization, from virtual solutions, network-embedded solutions within Cisco’s ASR 9000 routers, to appliances for enterprises and carrier-class scrubbing centers. In Arbor Cloud, they offer a best-practice DDoS defense service that tightly integrates on-premises and cloud-based mitigation in a single solution.
Ensure the availability of your critical infrastructure with the world’s most broadly deployed DDoS mitigation technology. Arbor Advanced Threat Solutions leverage integrated Netflow and Packet Capture technology for network-wide situational awareness, broad and deep traffic visibility and security intelligence that transforms threat detection and incident response through real-time and historical insights, stunning visualization and forensics.
Protect your most critical assets from advanced threats that are within your network right now.. .
Headquartered in Boston, FiVerity, Inc. develops and markets AI- and machine learning software solutions that detect new and emerging forms of cyber fraud and deliver actionable, proactive threat intelligence.
The company’s products meet the unique requirements of financial institutions, including banks, credit unions, and credit card providers. The company’s solutions help financial institutions strengthen, streamline and scale their consumer-facing business processes, such as application processing, credit verification, and customer onboarding.
With its predictive and proactive approach, FiVerity’s solutions help customers to improve their internal processes to reduce losses from fraud and drive faster, and more profitable and sustainable growth.. .
Telco Systems delivers an industry-leading portfolio of Carrier Ethernet and MPLS-based demarcation, aggregation and edge solutions, enabling service providers to create intelligent, service-assured, CE 2.0-compliant networks for mobile backhaul, business services and cloud networking. Telco Systems’ end-to-end Ethernet, SDN/NFV-ready product portfolio delivers significant advantages to service providers, utilities and city carriers competing in a rapidly evolving telecommunications market.
Telco Systems is a wholly owned subsidiary of BATM Advanced Communications (LSE: BVC).. .
Kinnami is a cloud software company that tackles the problem of a lack of trust in the digital world. It’s blockchain-based platform safeguards data provenance by enhancing data verification and audibility.
AmiStamp provides an easy way to create fingerprints of digital assets that cannot be falsified. It can be used to establish ownership (IP, copyrights, trade secrets) as well as to authenticate that data has not to be altered in subsequent stages of collaboration (e.g.
contracts, research). Kinnami’s EcoSystem API also enables 3rd party developers to very easily & seamlessly integrate the digital stamping technology into their own applications.”.
Since 1993, Towerwall has been providing IT security technology services required to run successful business-class networks for such organizations as Brown University, Middlesex Savings Bank, PerkinElmer and Smith & Wesson. Its founder and CEO Michelle Drolet is a 25-year IT security expert who has received citations from MA state senators Karen Spilka and David Magnani for her community service.
Twice she has received a Cyber Citizenship award for community support and participation.. .
Authentica provides content security software for protecting and controlling business information in companies. It offers enterprise rights management solutions to control, secure, and track information.
The company’s products provide secure delivery, and after-delivery protection for email, electronic documents, and Web content. Authentica, Inc.
was founded in 1998 and is headquartered in Lexington, Massachusetts.. .
Brainwave Science is a company established in a post 9/11 world to address issued pertaining to terrorism, counter intelligence, national security, border security and immigration with the sole aim to support law enforcement agencies on a global level and help delivery of truth and justice with help of technology. The pressing issues of our time can be solves with Brain Fingerprinting technology by Brainwave Science.
Our technology is modern, advanced, automated, portable and can be applied in virtually all cases. Just give us a call to know more of how it works and what it can do to serve your needs..
Founded in 2016, Smart Hive’s mission is to make the cyber security intelligence that organizations use in their information sharing programs real-time, relevant, and actionable. Smart Hive was developed to give organizations the power of real information at their fingertips and finally an ability to build a pro-active Cyber Security Program.
Led by former Security Executives who understand the power of making informed decisions, Smart Hive was built understanding the challenges that have existed for over a decade in making real Information Sharing possible.. .
Steel Root is a managed security services provider (MSSP) that specializes in cybersecurity for the U.S. Defense Industrial Base (CMMC, DFARS, ITAR).
Founded in 2016, Steel Root provides managed IT and cybersecurity services and advisory to help companies navigate risk and compliance.. .
ORSYP is an independent IT operations management solutions company that helps its customers automate and optimize the performance of their business systems. It also offers IT service management services such as enterprise job scheduling, IT workload automation, and performance and capacity management.
With many headquarters in Paris, France, Boston, Hong Kong, and China, ORSYP serves over 1,400 blue chip customers. It was founded in 1986..
YAXA is a cyber security company that specializes in protecting digital assets on premise or in the cloud. The solution leverages ensemble machine learning algorithms to detect suspicious behaviors in real-time without raising false alarms, and triggers autonomous challenge response to thwart internal attacks, thereby preventing an extended breach such as data/IP theft and fraudulent transactions.
YAXA was founded by Kalpesh Sheth and Ramesh Gupta in 2015; and is headquartered in Concord, Massachusetts.. .
Founded in 2007, Catelas is the leading next generation e-Surveillance & Risk Analytics software on the market today. Catelas’ patented Relationship ForensicsTM & Behavioral Analytics algorithms, combined with traditional Content based Lexicon & Clustering technologies, within a Machine Learning framework to automatically uncover risk within every message passing through a financial services firm.
“Catelas represents the next generation of risk-based eCommunications surveillance and investigation solutions for the financial services industry,” said Rob Lang, Vice President and Global Head of SMARTS, NASDAQ OMX. Catelas software helps both broker dealer supervision and control room surveillance meet the raised regulatory expectations.
Our clients need to proactively identify compliance issues much more quickly and effectively than ever before – and get ahead of them fast. Without increasing resources, our clients operate a far more comprehensive and defensible compliance program, positioning them well with regulators.
Insider dealing, market manipulation, and the movement and sharing of Material Non-Public Information (MNPI) are activities conducted between individuals with strong trusted relationships. Patented algorithms, based on Relationship ForensicsTM & Behavioral Science, present the compliance analyst with an unprecedented view into how business is conducted.
Catelas uncovers who matters and how they connect within these large collaborative networks. Analysts visualize Information Barriers, Control Rooms, Watch List networks, and Bloomberg Chat rooms, and are automatically guided to where the risks are greatest.
Mission – ThoughtData helps enterprise businesses to deliver best end user experience of their business services to their customers with high performing IT infrastructure. Vision – ThoughtData’s Enterprise360 provides unified and actionable observability solution to detect and resolve network, application, infrastructure performance issues.
Unified solution approach helps enterprise businesses to significantly reduce cost, tool clutter and mean time to respond to respond to critical IT issues.. .
Kanguru is a technology leader providing Enterprise organizations and customers alike with highly-secure, hardware encrypted USB storage, remote management and duplication solutions to protect data. Kanguru’s FIPS 140-2 / Common Criteria Certified and TAA Compliant products assure organizations that their critical data is safe and protected with Kanguru USB drives.
Kanguru is also recognized as a leader in device duplication for Hard Drive, SSD, DVD, and USB storage. Kanguru continues to develop cutting edge technology, helping organizations around the globe meet their data protection, storage, remote access, and duplication needs..
Netragard is listed as one of the top 10 Penetration Testing companies in the world. Netragard provides Penetration Testing, Red Teaming, Application Security Testing, Mobile Security Testing, 0-day Vulnerability Research, and custom security services for special clients.
Netragard takes pride in delivering top quality services with absolute transparency to its customers. Netragard’s slogan is “We protect you from people like us.”.
Gigavation develops cybersecurity technologies for consumers, corporations, and public-sector. Its solutions secure computers, mobile devices, networks, and industrial control systems against attacks and data loss.
Gigavation was founded by MIT and Harvard graduates.. .
Atlas Devices is a global provider of innovative solutions for security, defense, and rescue applications. Since Their founding in 2005 by MIT researchers, They have proudly and ambitiously set new standards for the speed, ease, and safety with which Their customers are able to accomplish difficult tasks in all environments: maritime, urban, airborne, and beyond.
Their technologies are field-proven and meticulously honed with user feedback earned from years of close relationships. They pride ourselves on Their developmental approach, which has yielded some of the world’s foremost access equipment, relied upon by some of the world’s most elite users.
Furthermore, They are proud to be an innovation-driven company whose steady growth is creating local high tech jobs, developing and manufacturing game-changing solutions for customers around the world — all of which are 100% made in the U.S.A. in Boston, MA..
Advoqt Cybersecurity is an IT company for data science and open-source tools to automate the cybersecurity program. It combines Cybersecurity expertise with Data Science to optimize and automate your Risk Management program.
They deliver consulting, systems integration, and proprietary tools. They are focused on advancing your security program from initial project scoping through to successful completion.
The company offers solutions in Threat Analytics, Cloud Security. Penetration Testing, Asset Management, Soar (Security Orchestration Automation & Response), and Data Science.
It also helps businesses assess their resilience and then design, implement, and manage Cybersecurity programs that can really withstand modern-day threats. Their technology, expert consultants, and a vetted ecosystem of niche partners allow you to deliver integrated solutions that give you a competitive edge.
Advoqt Cybersecurity was founded in 2012 and is headquartered in Boston, MA, USA.. .
TUV Rhienland OpenSky Inc.
TUV Rheinland OpenSky offers one of the most advanced and integrated portfolio of security solutions and services for connected devices, platforms and Internet of Things (IoT) with the mission to enable a secure and safe digital future. With headquarters in Littleton, MA, TUV Rheinland OpenSky is a wholly-owned subsidiary of TÜV Rheinland Group, operating some of the world’s broadest smart device and IoT testing labs, defining industry standards for functional safety and security and is a leading provider of inspection and assurance services that combine safety, quality and security certifications.
TUV Rheinland OpenSky provides expertise to help clients protect information assets, minimize risk and accelerate the adoption of enabling technologies with its holistic approach and framework that addresses Cyber Security, Privacy, Cloud Infrastructure and Functional Safety requirements to build trusted, connected platforms. The portfolio of services supported by industry participation in defining such standards and research, enables clients to effectively stay at the forefront of adopting new technologies for managing safety and cyber risks.
It provides advisory, consulting, systems integration, testing, certification and managed security services organized across three core disciplines for connected platforms: (1) Advanced Cyber Defenses; (2) Mastering Risk and Compliance and (3) Secure Cloud Enablement. TÜV Rheinland Group, a global leader in technical, inspection and certification services, headquartered in Cologne, Germany, founded in 1872, with 20,000+ employees and an annual turnover of over $2 billion..
TBG Security was founded in 2003 with the single goal of providing world-class information security services. Our founders recognized that too many consulting shops were overly focused on selling pre-packaged, cookie-cutter services or solving security problems by pushing the products of security device vendors with whom partnerships had been formed.
TBG Security does not partner with any security hardware or software vendors leaving us with a unique ability in the industry to present truly objective solutions. At TBG Security weâ€™re agnostic when it comes to products, which affords us the opportunity to provide you with the best solution to meet your business objectives.
TBG Security is dedicated to the advancement of information security and the implementation of flexible security frameworks for our clients. The purposes of which is to strengthen the resilience of our clients by limiting the effect of security related exposures through creating and maintaining policies and procedures to ensure business continuity.
Developing and nourishing plans and methods for becoming both proactive and effectively reactive to threats that endanger the strategic plans of our clients is ultimately the purpose for such endeavors. Simply put, our mission is to Secure Your Business for the Future so you can go about the business of running your business today..
CriminalWatchDog, Inc. is the foremost authority for accurate, comprehensive and innovative criminal background check and pre-employment screening solutions utilized by the Fortune 500 and small businesses throughout the United States.
CriminalWatchDog.com:registered:’s criminal background check services are tailored to accommodate for a variety of applicant screening solution requirements. Trusted on all levels, by parents investigating prospective nannies to Fortune 500 companies responsible for screening tens of thousands of potential employees, CriminalWatchDog is known for delivering accurate, comprehensive criminal check reporting to your computer instantly.
Our instant criminal record investigations query hundreds of millions of criminal files from a variety of official sources to analyze a candidate’s possible criminal history. This is an essential tool for hiring honest, qualified personnel while also ensuring the safety and protection of your team and investments.
Using the most advanced technology, CriminalWatchDog.com grants you the control to increase profitability and reduce the risks associated with tenant or employee-related transgressions.. .
Lifespan Technology Solutions has stayed at the forefront of efficient and responsible IT Asset Disposition services. Over the years, we have constantly evolved with innovative ideas to deliver advanced, eco-friendly expertise to deal responsibly with enterprise-wide ITAD.
Lifespan Technology Solutions provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale for the best value.
Lifespan offers the flexibility of handling large quantities of equipment with a customized program. We work exclusively with EPA-registered and regulation-compliant partners to maintain the highest standards of environmental protection, as well as full compliance with local, state, and national regulations..
BlindHash Cyber’s patented technology offers a new way to think about securing passwords. Until now, the more secure the password the slower the login process along with an expensive pricetag for securing them.
BlindHash Cyber makes securing passwords scalable and makes it virtually impossible for hackers to steal your passwords via an offline attack.. .
You may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.