What is Threat intelligence?
Threat intelligence is the “cyclical practice” of planning, collecting, processing, analyzing and disseminating information that poses a threat to applications and systems. Threat intelligence collects information in real-time to showcase the threat landscape for identifying threats to a computer, application or network. This information is gathered from a number of resources and compiled into a single database enabling visibility into vulnerabilities and exploits actively being used on the internet by threat actors. Threat intelligence is not to be confused with vulnerability management.
Top Threat Intelligence Companies and Solutions
This article showcases Threat.Technology’s top picks for the best Threat Intelligence solutions. We selected these companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
FireEye is a cyber security company that combines the automation of technology with unparalleled frontline human expertise, including industry-recognized services and nation-state grade threat intelligence. On the front lines of cyber attacks every day, FireEye has unrivaled real-time knowledge of the global threat landscape spanning more than two decades, gathered by hundreds of highly experienced threat researchers, platform engineers, malware analysts, intelligence analysts, and investigators, as well as a global network of best-in-class business partners.
This unique understanding of how organizations combat cyber attacks guides the products FireEye builds. Working as a seamless, scalable extension of customer security operations, FireEye offers a unified platform called Helix that integrates and analyzes the data from security assets to offer real answers about the threats that matter.
With innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant consultants, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, respond to, and remediate cyber attacks…
CrowdStrike is a cybersecurity technology firm pioneering next-generation endpoint protection, delivered as a single integrated cloud-based solution. CrowdStrike’s Falcon platform stops breaches by detecting all attacks types, even malware-free intrusions, providing five-second visibility across all current and past endpoint activity while reducing cost and complexity for customers.
CrowdStrike’s Falcon platform is delivered via the security industry’s only 100% native cloud architecture, integrated with 24/7 managed hunting capabilities and in-house threat intelligence and incident response teams. CrowdStrike’s unique Threat Graph harnesses the cloud to instantly analyze data from billions of endpoint events across a global crowdsource community, allowing detection and prevention of attacks based on patented behavioral pattern recognition technology..
Chainalysis designs and develops anti-money laundering software for Bitcoin businesses. Its products include REACTOR, an interactive and investigation tool that identifies offenders, visualizes data, and shares results with people and organizations, and API, a transaction based risk scoring solution that contains source and destination of funds to measure risk.
Chainalysis also offers activity monitoring reports and diligence tools, which allow analysts to estimate criminal’s revenues and emerging threats. It offers activity monitoring reports, due diligence tools, and cyber threat from the deep web for financial institutions, real-time application programming interface (API), web-based investigation software for due diligence, and verification of customers for bitcoin business, and web-based investigation tools to identify cyber-criminals, identification of bitcoin extortion payments made by victims to criminals, and attribution for cyber threat intelligence industries..
Zscaler is revolutionizing internet security with the industry’s first Security as a Service platform. As the most innovative firm in the $35 billion security market, Zscaler is used by more than 5,000 leading organizations, including 50 of the Fortune 500.
Zscaler ensures that more than 13 million users worldwide are protected against cyber attacks and data breaches while staying fully compliant with corporate and regulatory policies. Zscaler is a Gartner Magic Quadrant leader for Secure Web Gateways and delivers a safe and productive internet experience for every user, from any device and from any location—100% in the cloud.
With its multi-tenant, distributed cloud security platform, Zscaler effectively moves security into the internet backbone, operating in more than 100 data centers around the world and enabling organizations to fully leverage the promise of cloud and mobile computing with unparalleled and uncompromising protection and performance. Zscaler delivers unified, carrier-grade internet security, next generation firewall, web security, sandboxing/advanced persistent threat (APT) protection, data loss prevention, SSL decryption, traffic shaping, policy management and threat intelligence—all without the need for on-premise hardware, appliances or software.
The proliferation of digital access has made the world more connected than ever before. Trust is the common thread that connects today’s elastic enterprise–trust that your identity solution will be there when you need it most and trust that your end-users know their information is safe.
The OneLogin Trusted Experience Platform is the identity foundation to build secure, scalable and smart trusted experiences that connect people with technology. With OneLogin, seamlessly manage digital identities for your workforce and customers, so you can focus on what matters most–growing your business.
With OneLogin’s complete solution, you can easily connect all of your applications, leverage our proprietary machine learning to identify and analyze potential threats and act quickly using contextual authentication requirements. Secure: Security is the cornerstone of trust.
The OneLogin platform protects your organization against threats by securing and centralizing your applications, devices, and end-users all in one, easy-to-access place.
Additionally, through our advanced machine learning capabilities, OneLogin can deliver real-time threat intelligence to help automate the process of keeping your business secure. Scalable: The OneLogin Trusted Experience Platform was built for performance and reliability at scale.
With a wide breadth of extensible functionality, we can expand and retract according to the changing needs of your business. Through our enterprise-grade change management solutions, like our Enterprise Sandbox and API Access, you can quickly test large-scale changes before going live in your production instance.
EclecticIQ is a global threat intelligence, hunting and response technology provider. Its clients are some of the most targeted organizations, globally.
To build tomorrow’s defenses today, they have to understand the threats against them – and align their efforts and investments to mitigate their risks. EclecticIQ helps governments, large enterprises and service providers manage threat intelligence, create situational awareness and adopt an intelligence-led cybersecurity approach.
EclecticIQ extended its focus towards hunting and response with the acquisition of Polylogyx’s endpoint technology in 2020. Founded in 2014, EclecticIQ operates globally with offices across Europe, North America, and via value-add partners.
Awake Security is the only advanced network traffic analysis company that delivers a privacy-aware solution capable of detecting and visualizing behavioral, mal-intent and compliance incidents with full forensics context. Powered by Ava, Awake’s security expert system, the Awake Security Platform combines federated machine learning, threat intelligence and human expertise.
The platform analyzes billions of communications to autonomously discover, profile and classify every device, user and application on any network. Through automated hunting and investigation, Awake uncovers malicious intent from insiders and external attackers alike.
The company is ranked #1 for time to value because of its frictionless approach that delivers answers rather than alerts.
Coalition is the provider of cyber insurance and security, combining comprehensive insurance and proactive cybersecurity tools to help businesses manage and mitigate cyber risk. Coalition provides companies with up to USD $15 million of cyber and technology insurance coverage in all 50 states and the District of Columbia, as well as CAD $20M of coverage across all 10 provinces in Canada.
Coalition’s cyber risk management platform provides automated security alerts, threat intelligence, expert guidance, and cybersecurity tools to help businesses remain resilient in the face of cyber attacks.
The VMRay Platform is a breakthrough solution for dynamic analysis of advanced threats, including zero day and targeted attacks. By surmounting inherent flaws that plague other products, VMRay Analyzer has become the gold standard for malware sandboxing among leading DFIR teams worldwide.
The core of the VMRay Platform is an agentless, hypervisor-based sandbox, which is unique in combining near-total evasion resistance with full visibility into malware behavior: a trait we call X-Ray Vision. Because nothing touches or modifies the analysis environment, monitoring is invisible, and even the most evasive malware strains fully execute in the sandbox.
By monitoring every interaction between malware and the target system, VMRay captures a complete and accurate record of threat behavior – data that enriches detection, incident response, digital forensics, and threat intelligence. VMRay Intelligent Monitoring excels over other solutions in distinguishing between malicious behavior and legitimate activity.
This shortens investigations, enhances efficiency and prevents legitimate traffic from being blocked.
BlueVoyant is a cybersecurity company that enables cybersecurity defense and protection through technology and tailored services. The company provides advanced cyber threat intelligence managed security services and proactive professional services with forensic capabilities for incident response and remediation.
They help large enterprises with impactful intelligence and offer small and medium enterprises the same kind of software and level of services that large enterprises enjoy all from a world-class team of experts that would be challenging to amass directly. BlueVoyant offers increased visibility, professional insights, and targeted responsiveness.
The company was founded in 2017 and is headquartered in New York, NY, USA.
CybelAngel is a cybersecurity startup detecting data-leaks where others don’t. The company finds data that has been stolen, or data that has been leaked by accident – generally by third-party partners and suppliers.
Its solution scans the visible, deep and dark webs, but it is also the only one scanning the major source of negligent leaks: Connected Storage. Its approach to data-leak detection combines Artificial Intelligence and human expertise.
Smart algorithms ensure rapid and precise detection, while machine learning focuses alerts based on what is most important to their clients. And yet it’s not machines that put together your alerts – it’s people.
IntSights is an external threat intelligence and protection platform, designed to neutralize threats outside the wire. IntSights solution suite equips cybersecurity teams worldwide to more effectively detect and prevent threats at their source before they even reach the perimeter.
The founders are veterans of elite Israeli military intelligence units, where they acquired a deep understanding of the hacker mindset, as well as the most effective techniques to defend against it. IntSights is backed by Blackstone Group, Clearsky, Wipro Ventures, Tola Capital, Blumberg Capital, and others..
Incubated from IIT Bombay in 2012 and headquartered in Palo Alto, Lucideus has over 200 customers worldwide with an average NPS of 73. Backed by John Chambers and senior executives from SoftBank, Sequoia, PayPal, Adobe and McKinsey & Co., it was also one of the Top 5 Contributors to the NVD of the U.S.
Government in 2019. Its platform, SAFE, allows an organization to get an Enterprise-Wide, Objective, Consistent & Real-Time Visibility of it’s overall Cyber Risk Posture.
Built on supervised machine learning engine, SAFE gives an output both in the form of a breach likelihood score (between 0-5) and the $ value Risk the organization is sitting on, along with providing prioritized actionable insights based on technical cybersecurity signals, external threat intelligence, and business context of what and where are the “weakest links” across people, process and technology. The company, since 2018, has also been working with MIT for a joint research and development on the SAFE Scoring Algorithm and has received several awards including the Morgan Stanley CTO Innovation Award 2019.
ThreatQuotient is a threat intelligence platform (TIP) that centrally manages and correlates unlimited external sources with all internal security and analytics solutions for contextual, operationalized intelligence in a single pane of glass. ThreatQ is also the first TIP to provide Indicator Nurturing, which goes beyond enrichment to help customers tailor indicators of compromise (IOCs) more specifically to their infrastructure.
Headquartered in Northern Virginia, ThreatQuotient was founded in 2013 by two former security operations analysts to provide organizations the ability to correlate with confidence.. .
ThreatConnect® arms organizations with a powerful defense against cyber threats and the confidence to make strategic business decisions. Built on the industry’s only intelligence-driven, extensible security platform, ThreatConnect provides a suite of products designed to meet the threat intelligence aggregation, analysis and automation needs of security teams at any maturity level.
More than 1,600 companies and agencies worldwide deploy the ThreatConnect platform to fully integrate their security technologies, teams, & processes with relevant threat intelligence resulting in reduced detection to response time and enhanced asset protection.. .
Sixgill is a worldwide leading cyber intelligence vendor. Cyber intelligence is the critical missing link in today’s cybersecurity environment, providing organizations with a threat intelligence picture that allows them to focus their resources on preventing attacks, discover those already perpetrated and mitigating the damage caused by cybercrime.
Established in 2014, the Company already has a wide range of customers from leading Fortune 500 companies as well as Federal Agencies. Utilizing artificial intelligence and machine learning, Sixgill automates the production cycle of cyber intelligence from monitoring, to extraction to production, uniquely focusing on relevant threat actors by mapping the Dark Web as a Social network where significant amounts of cybercrime takes place.
Providing prioritized and automated real time alerts when threats are detected and then providing a comprehensive threat intelligence picture through advanced data mining and behavioral analytics of the threat actors, the time from alert to receipt of automated actionable intelligence is the fastest on the market.
AT&T CyberSecurity provides threat intelligence, collaborative defense, and security solutions for businesses. The company is uniquely positioned to deliver security without the seams through people, process, and technology, which will provide unrivaled visibility for the customers.
AT&T CyberSecurity was founded in 2007 and is headquartered in San Mateo, California.
Intezer introduces a Genetic Malware Analysis technology, revolutionizing cyber threat detection and response. By identifying the origins of software, Intezer equips enterprises with an advanced way to detect modern cyber threats, while providing deep context on how to effectively respond to incidents.
Intezer offers solutions for incident response automation, cloud workload protection, threat intelligence, and more. For more information, visit www.intezer.com..
Cyberint is a global threat intelligence provider focusing on helping its clients to proactively protect their businesses against cyber threats. As a partner to direct-to-consumer businesses worldwide, Cyberint provides organizations with a unique combination of a market-proven digital risk protection platform and expert cyber analysts.
This combination enables establishing an effective Cyber Threat Intelligence program while reducing organizations’ TCO. We serve more than 100 brands worldwide across industries as diverse as financial services, retail, gaming, entertainment, and media..
The company’s presence spans across the globe, including France, Italy, Vietnam, Malaysia, the Netherlands, Russia, South Africa, Spain, the United Kingdom, in addition to Singapore, where its global headquarters is located. Group-IB is ranked among the best threat intelligence vendors in the world by Gartner, IDC, Forrester, Cyber Defense Magazine, and SC Media.
Group-IB’s technological leadership is built on the company’s 17 years of hands-on experience in threat research, analysis, cybercrime investigations around the world and 65 000 hours of cyber security incident response. Group-IB is a partner of INTERPOL and Europol and has been recommended by the OSCE as a cybersecurity solutions provider..
Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter. The solutions are anchored on patented innovations in Deception and Data Science.
This enables a DevOps approach to ATD, enabling ease of deployment, monitoring and management. Acalvio enriches its threat intelligence by data obtained from internal and partner ecosystems, enabling customers to benefit from defense in depth, reduce false positives, and derive actionable intelligence for remediation..
NormShield provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring. They harvest cyber threat data from multiple sources and provide actionable intelligence to their customers so they can take preventive measures.
Technology quickly changes and evolves, so does the security posture of a system. Keeping a system secure is a difficult task.
NormShield makes this task easier with its turnkey cloud or on-premise platforms enabling companies to detect and stop potential cyber threats early. NormShield Cyber Risk Scorecards provide the information necessary to protect business from cyber attacks.
Skycure is a predictive mobile threat defense (MTD) company with proactive defense solutions that actively detect and prevent mobile cyberattacks while preserving user privacy and experience and reducing the burden on IT. Skycure’s mission is to secure both BYO and corporate-owned mobile devices to allow companies to mobilize without compromise.
Skycure closes the mobile security gaps in organizations to protect against network-based threats, malware, vulnerability exploits, and other targeted attacks originating from both internal and external sources. Skycure’s patented technology employs a dual protection mechanism, which consists of a client-side module that resides on the device and protects it 24/7, together with a server-side service that provides heavy lifting analysis.
Skycure’s predictive technology (often referred to as “waze” of mobile security) is based on mobile threat intelligence gathered via massive crowd intelligence and sophisticated machine learning. Skycure’s research team is accredited with cutting edge publications (such as Accessibility Clickjacking, Cookie Stealer, No iOS Zone, Malicious Profiles, WifiGate, HRH, LinkedOut), ensuring the solution is always ready for future threats.
National Security Agency equivalent), who possess extensive and proven technological and managerial experience in the security industry.
The company is funded by Shasta Ventures, Pitango Venture Capital, NYL and other strategic investors.
RiskSense®, Inc. provides vulnerability prioritization and management to measure and control cybersecurity risk.
The cloud-based RiskSense platform uses a foundation of risk-based scoring, analytics, and technology-accelerated pen testing to identify critical security weaknesses with corresponding remediation action plans, dramatically improving security and IT team efficiency and effectiveness. The company delivers a fully-informed picture of group, department, and organizational cybersecurity risk with our credit-like RiskSense Security Score (RS3).
The RiskSense platform continuously correlates customer infrastructure with comprehensive internal and external vulnerability data, threat intelligence, human pen test findings, and business asset criticality to measure risk, provide early warning of weaponization, predict attacks, and prioritize remediation activities to achieve security risk goals…
McAfee is an online security company that provides virus alerts and analysis on malware, network security threats, and web vulnerabilities. As a cybersecurity company, McAfee provides advanced security solutions to consumers, small and large businesses, enterprises, and governments.
Security technologies from McAfee use the predictive capability that is powered by McAfee Global Threat Intelligence, which enables home users and businesses to stay one step ahead of the next wave of viruses, malware, and other online threats. For business, enterprise, and government, McAfee provides comprehensive, integrated information security solutions that cover any environment.
Their endpoint and mobile security solutions protect end-user devices from threats, including viruses, phishing, malware, and other threats that target endpoints and users and include antivirus software and web security protection. Their network security solutions protect a network and its perimeter.
Their cloud security solutions provide advanced protection from online threats, whether they are using public, private, or hybrid cloud computing technologies.
All their security solutions are managed through the centralized, single-console McAfee ePolicy Orchestrator that allows efficient and responsive management of the security infrastructure. Finally, McAfee Professional Services provide consulting, education, and technical support for all their security products and solutions.
For home users, McAfee secures mobile devices, including phones and tablets, as well as home PC, laptops, and other devices. McAfee products such as McAfee Total Protection and McAfee LiveSafe provide comprehensive antivirus and antimalware protection, as well as internet security that includes protection from adware, spyware, phishing scams, malicious websites, identity theft, and other threats to online security.
BrandShield® is an innovative Online Brand Protection solution. It’s robust, patented technology finds trademark infringements, counterfeit sales and online phishing and fraud.
The system analyzes content and metrics of each website, marketplace or social platform, and uses sophisticated algorithms to automatically prioritize the level of risk to the brand. BrandShield’s ground breaking pattern recognition technology finds major brand threats.
It also includes enforcement tools and service, to form a powerfull Threat Intelligence solution. BrandShield’s robust, patent pending technology helps fighting infringements and makes brand protection possible for all sizes of organizations.
Brandshield’s proactive aproach extends any organization’s assets protection outside the organization’s perimeter.
BrandShield detects logo usage online, fraud clusters, cross-platform connections and prioritizes online threats customized uniqely for each brand. BrandShied’s technology dramatically improves the way organizations can manage and protect their digital brand.
Till now online brand protection solutions were limited, based on human analysis, highly expensive, and therefore available only to the biggest companies. BrandShield’s technology revolutionizes this market, and will allow every business to monitor and protect its brand online, at a reasonable cost.
Advanced adversaries and targeted attacks threaten large organisations on a daily basis. CounterCraft is a pioneering provider of full-spectrum cyber deception, ground-breaking threat hunting and cyber counterintelligence to detect, investigate and control targeted attacks.
The award-winning solution combines powerful campaign automation with controlled synthetic environments to allow attackers to penetrate organizations without doing real damage. CounterCraft’s Threat Deception platform builds and deploys buffer zones that fool threat actors into engaging with false information and fake digital assets instead of real operational systems and data.
The solution uses groundbreaking security engineering for Threat Detection, Threat Intelligence and Threat Response. Key stakeholders get more time to respond to advanced and rapidly evolving threats.
Defenders benefit as CounterCraft integrates with incident response workflows and proactively reconfigures defensive systems in real time to mitigate risks from ongoing attacks.
CounterCraft operates in Fortune500 companies globally, including major financial institutions, critical infrastructures, governments and Law Enforcement Agencies. Founded in 2015, the company is present in London, Madrid and Washington DC, with R&D in San Sebastian..
PhishLabs is the leading provider of 24/7 cybersecurity services that protect against threats that exploit people. The company is trusted by top organizations worldwide, including 4 of the 5 largest U.S.
financial institutions. PhishLabs combines proprietary technology, intelligence, and human expertise to rapidly detect, analyze, and stop targeted cyberattacks before they impact organizations.
Additionally, the company provides robust threat intelligence that strengthens existing cyber defenses and optimizes threat prevention. Leading organizations partner with PhishLabs to more effectively disrupt targeted cyberattacks, prevent data breaches, and reduce online fraud.
GreyNoise is a cybersecurity company that reduces false positives by filtering pointless Internet background noise. It collects, analyzes, and labels mass internet scan and attack activity into a feed of Anti-Threat Intelligence.
This context helps security teams reduce noise and prioritize signal – targeted attacks against their organization. Its drive to maximize analyst efficiency is delivered through its API, platform integrations, and visualizer.
The company was founded in 2017 and is based in Washington, District of Columbia…
Opora develops cyber threat intelligence technologies. It combines cloud computing, big data, machine learning, and other cutting-edge fields into an intelligent, dynamic, and robust cyber threat intelligence platform running on the global cloud.
The Gartner Research Group named the company a cool vendor in “Cool Vendors in Security and Risk Management Software for Technology and Service Providers, 2018″…
Finite State is the pioneer of IoT device intelligence. They accelerate innovation with connected devices by keeping their dynamic risks in check.
They leverage the world’s largest database of IoT vulnerabilities and threat intelligence to ensure our customers are never surprised…
Blueliv is a leading cyber threat intelligence provider with a world-class in-house Labs team. We scour the web, the deep web and the dark internet to deliver fresh, automated and actionable threat intelligence to organizations to protect their networks from the outside in.
Our scalable cloud-based platform turns global threat data into sophisticated and relevant intelligence, enabling organizations to save time and resource by improving their incident response performance and empowering their Security Operations team with real-time intelligence. Configure a solution bespoke to your needs with a choice of modules.
Quantify and qualify malicious attack vectors with our plug and play MRTI feed; delivered in STIX/TAXII standard, integration is easy. The Blueliv Threat Exchange Network is a strong, collaborative community of security researchers and malware analysts.
Start detecting external threats and join the fight against cybercrime today.
Blueliv is a Gartner Cool Vendor 2015 and Go-Ignite winner 2016.. .
Bandura uses simple, innovative technology and best-in-class threat intelligence to secure your networks, data and users in real time – wherever they are. Whether it’s from data we provide out of the box, data from one of our Partner Integrations – or any other data source you have – we block attacks from up to 150 Million malicious IPs and domains in real-time, with no latency.
At Bandura, we believe nothing scales like simplicity. We make blocking threats smart and simple – at scale – everywhere…
KELA offers proprietary Darknet-based cyber intelligence solutions for enterprises and government agencies worldwide. KELA’s core mission is to harness and integrate the experiences and methodologies of the Israeli Defense Forces’ elite intelligence units for revolutionizing cyber, HLS, and finance.
KELA’s automated technologies monitor a curated set of Darknet sources to alert clients of targeted threats. All threats are analyzed and qualified by KELA’s analysts, ensuring all intelligence is 100% actionable.
Comprised of more than 100 intelligence and technical experts all leveraging unique skills from Israel’s elite military intelligence units, KELA’s team is able to develop high-end technologies and analyze complex data from an intelligence point-of-view. KELA Targeted Cyber Intelligence continues to lead the threat intelligence market, providing solutions and support in monitoring the Darknet to prevent potential cyber-attacks for enterprises and government agencies…
ThreatX is the only SaaS-based web application and API protection solution that enables enterprises to confidently secure all their applications against a rapidly evolving threat landscape. Its purpose is built for the hybrid-cloud and delivers complete visibility and the most precise threat detection and neutralization capabilities available by combining progressive behavior profiling, collective threat intelligence, and deep analytics with a managed service. ThreatX eliminates the false positives and maintenance burdens associated with WAFs and static, rule-based solutions.
The company was founded in 2014 and is based in Louisville, Colorado…
NXTsoft is a Fintech-focused data & risk management software company that provides a wide range of solutions in the areas of cybersecurity, compliance, and data management/analytics. Many enterprise and government entities struggle to manage data loads, networks and data security.
NXTsoft provides solutions to address those needs in the key areas of: Data Management: Data Migration, Data Conversion, Data Connectivity, Data Security Data Analytics: Risk Analytics, Fixed Income Analytics, Deposit Study, CECL Data Security: Cybersecurity Education, Threat Intelligence & Prevention, vCISO, Incident and Breach Response.
Echosec Systems Ltd.
Echosec Systems Ltd. delivers intuitive data gathering solutions for threat intelligence.
Security and intelligence teams trust Echosec Systems to provide critical layers of information from difficult-to-access data sources, providing real-time context to keep people and organizations safe. The Echosec Systems Platform aggregates and filters public content from hundreds of sources, including social media and the deep and dark web, giving users instant visibility into digital and real-world threats affecting their organization…
otto by DEVCON
otto by DEVCON is making the internet safer and security easier through our next generation runtime application security software. We save companies time and money while reducing risk and mitigating threats that can cost hundreds of millions in data breach.
otto = security in seconds. Integrations with some of the largest CDNs, Cloud marketplaces and CMSs allows teams to start securing your company in seconds with no-code and low-code setup.
Protecting brand integrity starts with caring about your customers. O++O tools, monitoring and protection give DevSecOps the real-time, runtime intelligence about the ever-changing dynamic security and vulnerability of your site and Third-party Scripts interacting with your company and customers.
otto by DEVCON is committed to protecting consumers from cyber threats by democratizing cyber security (i.e. making it free for consumers).
Our chrome extension protects and alerts users of threats and vulnerabilities as they surf the web, while generating a network effect, crowdsource of continuous threat intelligence. This network intelligence provides perpetual fuel for our threat intelligence engine and self-healing technology..
ThreatBook is a security company that provides its clients with threat intelligence solutions. ThreatBook’s range of solutions consist of threat data, machine learning, and security research.
Its product portfolio consists of threat analysis platform, threat intelligence subscription-based services, machine readable threat intelligence, and situational awareness. ThreatBook was founded in 2015 by Feng Xue and is based in Beijing..
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information. Their innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints.
Optimized for leading environments, including Amazon Web Services, Microsoft®, VMware®, and more, their solutions enable organizations to automate the protection of valuable information from today’s threats. All their products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and control, enabling better, faster protection.
Trend Micro customers include 45 of the top 50 Fortune® Global 500 companies, and 100% of the top 10 global automotive, banking, telecommunications, and petroleum companies. With over 5,000 employees in over 50 countries and the world’s most advanced global threat intelligence, Trend Micro enables organizations to secure their journey to the cloud…
Better Mobile Security
Better Mobile Security is a Mobile Threat Defense (MTD) solution provider that uses predictive AI technology to identify and stop mobile security threats without compromising end-user productivity or privacy. Better MTD’s predictive protection comes from its Deep Thinker AI platform that applies artificial intelligence and learning models to identify known and unknown threats at the device, network, and application levels.
It also works seamlessly with leading Enterprise Mobility Management (EMM) solutions to protect corporate resources and can be easily deployed to vast mobile networks with just a few clicks. Better Mobile Security solution also integrates with Microsoft Intune and Azure AD(AAD) single sign-on.
The company’s security platform combines sophisticated machine learning / artificial intelligence with its real-time threat intelligence to automatically detect attacks from malware, network, OS vulnerabilities, out-of-date operating systems, and many other breaches. It protects mobile devices and invaluable enterprise data from malware, network, and OS-layer attacks…
CTM360® is a Cyber Security subscription service offering 24 x 7 x 365 Cyber Threat Management for detecting and responding to threats originating in cyberspace. A growth-stage startup headquartered in the Kingdom of Bahrain, CTM360 currently serves more than 30 of the Top 50 GCC Banks, as well as entities in Oil & Gas, Healthcare, Sovereign Wealth Funds, Aviation across 28 countries.
CTM360 specializes in Offensive Defense and strives to strengthen a subscribed member’s security posture by making them a harder target in cyberspace. With 370,000+ unique incidents managed, 11 billion hacked accounts indexed, 350,000+ digital assets inventoried and 1000+ executives protected, CTM360 currently remains a leader in Cyberspace for Managed Threat Detection & Response, Digital Risk Management, Threat Intelligence, Corporate & VIP Brand Protection, Anti-Phishing, etc.
CTM360 is offered as a service through an ecosystem built in the cloud and remains solely outside the perimeter of any organization…
SurfWatch Labs helps organizations and service providers quickly establish a strategic cyber threat intelligence operation that drives more effective use of their tactical defenses. Founded in 2013 by former US Government intelligence analysts, SurfWatch Labs solutions provide a 360-degree view of cyber threats in the context of your business, along with practical and personalized support to create immediate insights and meaningful action.
Combining useful analytics, applications, and human expertise, SurfWatch solutions can be an off-the-shelf, cyber threat intelligence team or delivered as a comprehensive product suite that easily integrates with the existing cybersecurity operations.. .
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network, including domains and IPs, and connect them with nearly every active domain on the Internet.
Those connections inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work.
Learn more about how to connect the dots on malicious activity at http://www.domaintools.com or follow us on Twitter: @domaintools.
Intensity Analytics Corporation
Founded in 2009, Intensity Analytics is a Virginia-based software firm that develops next-generation, physical user and entity behavioral authentication (“physical UEBA”) security software technology. Physical UEBA is a critically important layer in a defense-in-depth strategy, designed to reliably and successfully defeat cybersecurity problems arising from the most common attack vector: stolen user credentials.
Our primary focus has been on developing sophisticated, new-thinking algorithms to take employee and entity authentication from traditional credential verification to the point of identity recognition – that is, to answer the question of “who is using the computer”? The result is patent-allowed technology that provides superior authentication integrity and Threat Intelligence with a frictionless user experience, using a software-only approach.. .
Citalid Cybersecurity is a French company whose ambition is to place the analysis of cybermenaces at the heart of the strategic decisions of its customers. An effective cyber defense today can not be limited to technical expertise alone, but must be conceived transversely.
Citalid provides its clients with an online platform for analysis and decision support based on three complementary pillars: knowledge of attack procedures; the organization of a common cyber defense through a controlled sharing of information; the assessment and anticipation of computer threats. Citalid innovates by identifying contexts conducive to cyber attacks by cross-checking cyber, geopolitical, economic, social, and other information.
Its clients benefit not only from a tailor-made and operational mapping of the threats likely to target them, but also from the associated preventive defense axes. — Citalid Cybersecurity is a company focused on cyber threat intelligence at the heart of its customers’ strategic decisions.
Citalid is helping its customers with an online analysis platform for supporting the decision-making process by: increasing the knowledge about the attackers; organizing joined cyberdefense via controlled information sharing; evaluating and anticipating the cyber risk.
Citalid innovates by identifying contexts to cyberattacks through the crossing of heterogenous information sources: cyber, geopolitics, economics, social, etc. Thus, its customers may not be affected by a specific problem, but also by the appropriate preventive lines of defense..
RedSocks Security is specialised in detecting suspicious network behaviour and combatting cybercrime. By combining Machine Learning, Artificial Intelligence and Cyber Threat Intelligence, RedSocks Security provides non-intrusive, real-time breach detection solutions and incident response services.
Our solutions are implementable within organisations of all sizes, and also serve as a tool of compliance to (information and data) privacy legislation…
Tego Cyber is a security intelligence platform helping individuals and enterprises with their cybersecurity needs. It also provides context on threats in the customer’s environment through its integrated, aggregated real-time threat feed.
The platform identifies known threat indicators and malicious actors with data that is relevant and timely. Tego Cyber’s platform provides context on threats in the customer’s environment through its integrated, aggregated real-time threat feed and creates updates through its curated and aggregated threat intelligence feeds, thereby enabling clients to respond to the ever-changing threat landscape.
Its mission is to deliver high‐quality, innovative cybersecurity solutions, and services that reduce risk, prevent cyber-attacks, and protect intellectual property and data…
Cythereal’s mission is to predict, prevent, and investigate zero-day malware attacks using recent breakthroughs in malware analysis and machine learning. Cythereal’s core technology, MAGIC (Malware Genomic Analysis), is provided as SaaS and as an on-premise appliance.
MAGIC seamlessly integrates with Anti-Virus systems (AV), Threat Intelligence Platforms (TIP), End-Point Detection and Remediation (EDR) systems, and SIEMs…
VeriClouds is a threat intelligence company helping organizations detect compromised credentials before hackers do. We use the same data attackers do, proactively monitoring the dark web and systematically reducing user-centric risk.
VeriClouds provides the best approach to eliminate the biggest cause of massive data breaches, the weak and/or stolen password…
SecondWrite’s next-generation sandbox detects advanced malware including APTs, targeted attacks and zero-day evasions that defeat other solutions. Its university-developed patent pending technology identifies hidden paths in malware and forcibly executes them, achieving complete code coverage.
Customers include network security, endpoint security, threat intelligence and IR vendors, SOCs, and MSSPs…
Hozint – Horizon Intelligence
Hozint – Horizon Intelligence is a threat intelligence solution provider based in Brussels, Belgium. Our mission is to provide our clients with timely and relevant information to mitigate their exposure to safety and security risks.
Our solution is a web platform “Horizon” that combines artificial and human intelligence to monitor media and social media and to provide accurate geotagging and impact assessment…
Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome, by creating deceptive information based on the current detected stage of compromise through the entire Endpoint Kill Chain. The preemptive solution covers the evolving nature of advanced threat landscape & sophisticated malware techniques, stopping all threats without relying on signatures, patterns or the need for constant updates.
Gartner Cool Vendor 2019: Security Operations and Threat Intelligence. For more information, visit our website at www.deceptivebytes.com or follow us on LinkedIn, Twitter and Facebook..
OTORIO empowers secured-by-design rollouts of industry 4.0 initiatives by making cybersecurity an integral part of the operational life cycle. Simplifying complex OT cybersecurity processes, OTORIO enables continuous management, qualification & remediation of production cyber risks based on their business impact, safety, reliability and productivity.
OTORIO’s portfolio includes RAM2, an industrial security orchestration automation & remediation platform (SOAR) that enables quick asset inventory lifecycle management, tailored to the specific industry environment; automated and prioritized analysis of the cyber risks; simple remediation guidelines and playbooks; and a tailored workbench UX/UI for different stakeholders. In addition, OTORIO offers a broad portfolio of Cyber-expert services including converged environments Cyber Risk Assessment, Threat Intelligence, Incident Response, Penetration Testing and Training..
ThreatLandscape is a cyber threat Intelligence start-up protecting, detecting, and remediating competition’s threats and breaches. The startup using Machine Learning and advanced NLP techniques with a mission to help governments and enterprises preempt threat mitigation and remediate with ease and confidence.
It continuously monitors your physical, cloud, and brand assets to help you take preventive action faster than the speed of bad. ThreatLandscape extracts cyber threat signals from all-source data, correlating it with their proprietary threat intelligence garnered from several billion open, deep, and dark web records.
It detects and prioritizes your most at-risk vulnerabilities and zero-days without the overhead of intrusive scans. ThreatLandscape was founded in 2017 and is based in San Jose, California, USA…
Webroot provides intelligent endpoint protection and threat intelligence services to secure the Internet of Everything. By leveraging its cloud-based collective threat intelligence platform, computers, tablets, smartphones, and more are protected from malware and other cyber attacks Webroot technology is trusted and integrated into market-leading companies including Cisco, F5 Networks, HP, Microsoft, Palo Alto Networks, RSA, Aruba, and many more.
Webroot is headquartered in Colorado and operates globally across North America, Europe, and the Asia Pacific region. The company was founded in 1997 and is based in Broomfield, Colorado..
Crypteia Networks delivers a patent-pending technology that identifies zero-day threats on their infancy along with misconfigurations on the already deployed defenses, as to provide visualizations of the threats paths and provide suggested mitigation actions (MOREAL™). This enables enterprises to add a new layer of security in their environment by expanding the intelligence of their already deployed security mechanisms, maximize the value of the logs they are already generating & collecting without any change in their infrastructure.
The solution is non-intrusive, OS independent and comes with zero integration pains. Crypteia Networks is headquartered in Athens, Greece with offices in Boston, MA..
IID’s ActiveTrust provides the platform to easily exchange threat intelligence across organizations through a dynamic, aligned, and private community of security peers. The key benefits of using IID include, confidently exchange threat intelligence across prescreened and defined circles of trust.
Legally protect your data while simultaneously getting actionable intelligence from many other organizations; normalized data, threat analytics, big data apps, and services. Delivered directly into your infrastructure.
All at network speed; and leverage widespread, vetted membership to quickly scale collaboration efforts..
Team Cymru is an internet security firm that offers research services making the internet a more secure place. The company’s service portfolio includes threat intelligence, enterprise intelligence services, executive briefing services, security intelligence, and more.
Team Cymru was founded in 1998 by Rob Thomas and Dave Deitrich, and is based in Lake Mary, Florida…
Comodo Group, Inc
Comodo delivers next generation cybersecurity solutions to protect businesses, schools, and government organizations in today’s risk filled business environment. Headquartered in Clifton NJ, Comodo’s global development team and threat intelligence laboratories deliver innovative, category leading, solutions for a company’s endpoints, network boundary, and internal network security.
Thousands of companies and organizations rely on Comodo’s technology to authenticate, validate, and secure their most precious asset—information—and to combat constant cyberattacks and threats like ransomware from wreaking havoc on a global scale.. .
Volexity is a security firm that assists organizations with incident response, digital forensics, trusted advisory, and threat intelligence. Its team helps organizations ranging from large global enterprises to single location small businesses, dealing with a myriad of information security challenges.
Volexity is based in Reston, V.A…
Company Description Arbor Networks secures the world’s most demanding and complex networks from DDoS attacks and advanced threats. Solutions Overview Arbor Networks customers gain a micro view of their own network, through their suite of products, combined with a macro view of global Internet traffic and emerging threats, through their ATLAS threat intelligence infrastructure.
See, understand and solve more security threats with Arbor Networks. ATLAS provides a comprehensive, aggregated view of global traffic and threats.
330+ service provider customers contribute 120 Tbps of global traffic intelligence, enabling Arbor’s Security Engineering & Response Team (ASERT) to develop threat protections that are delivered directly into customer products to stop DDoS attacks and malware campaigns. Arbor DDoS Solutions are proven on the world’s most demanding networks.
In Arbor Cloud, they offer a best-practice DDoS defense service that tightly integrates on-premises and cloud-based mitigation in a single solution.
Ensure the availability of your critical infrastructure with the world’s most broadly deployed DDoS mitigation technology. Arbor Advanced Threat Solutions leverage integrated Netflow and Packet Capture technology for network-wide situational awareness, broad and deep traffic visibility and security intelligence that transforms threat detection and incident response through real-time and historical insights, stunning visualization and forensics.
Protect your most critical assets from advanced threats that are within your network right now…
InfoArmor provides industry-leading solutions for employee identity protection and advanced threat intelligence to help organizations protect their most valuable assets. They combine an unparalleled global research network with big data analysis, actionable intelligence and customized service to meet clients’ dynamic security needs.
From employee to enterprise, InfoArmor is redefining how organizations fight fraud and combat an ever-changing cyber threat landscape to mitigate risk on multiple levels. Today, more than 800 businesses and government agencies, including over 70 of the Fortune 500, use PrivacyArmor, the industry leading employee identity protection solution, or VigilanteATI, our award-winning advanced threat intelligence platform to improve their data security posture..
WebARX is a complete website security and monitoring platform including web application firewall, uptime monitoring, domain reputation checks, and security scans on a single dashboard. WebARX analyses around 3000 hacking incidents per day, which comes from our private threat intelligence.
Compared to similar service providers on the market, WebARX has put web application firewall, uptime monitoring, domain reputation checks and security scans on a single dashboard, available even to small website owners…
Tier3 Cyber Security Solutions Pakistan We Make the Difference Estbd : 2011 – Member National Centre for Cyber Security Pakistan | Leading Cyber Security Service Providers in Pakistan – Consultancy and IT Advisory Services to GOP , public and private sectors | Threat Intelligence | Exploit Development | PenTesting | Vulnerability Disclosure | ISO27001 / PCI DSS – OWASP / NEXPOSE / METASPLOIT / COBALTSTRIKE / Nessus / Rapid7 / CANVAS Immunity | Zero Trust Framework| Red Team Tier3 is a consulting, technology and innovation firm. We define success as achieving exceptional results that have a lasting impact on businesses, communities and individuals worldwide.
This principle has remained the cornerstone of our ethos since 2011 – and it continues to underpin everything we do. For more than 10 years, Tier3 Corporation has pursued a single goal: to empower and protect the enterprise with continuous security assurance for people, systems, and information.
Tier3 offers solutions and services for… Cyber Security: To protect and assure your information and reduce your exposure to security risk in a globally connected world. Secure Mobility: To enable you to work securely wherever your mission takes you…across and beyond the enterprise.
Our clients choose us for Cyber Security in Pakistan because we challenge convention to find the solutions that really work – in practice, not just on paper.
Then we roll up our sleeves and get the job done. At Tier3 we don’t just believe in making a difference.
We believe in making the difference. Our people are experts in a wide range of industries and we bring in specialists from across our firm to ensure our clients receive the best service.
Founded in 2000, CIPHER is a global cyber security company that provides information security products and services supported by CIPHER Intelligence, a world-class threat intelligence laboratory. Their offices are located in North America, Latin America and Europe, have Security Operations Centers (SOC) 24x7x365, specialized research and development teams and a global network of technology partners.
The excellence of their security products and services is recognized by the market and is accredited by international certifications and quality standards such as ISO 20000, ISO 27001, SOC I and SOC II, PCI QSA and PCI ASV. CIPHER has also been recognized by Frost & Sullivan for its market leadership for six consecutive years.
Their clients include “Fortune 500” companies, multinational organizations and government agencies. CIPHER uses proprietary technology and specialized services to defend these companies from advanced threats and security breaches while managing risks and ensuring regulatory compliance with the use of advanced tools and best practices proven by numerous success stories…
Farsight Security provides the world’s largest real-time actionable threat intelligence information on how the Internet is changing, seeing more than 200,000 DNS-related observations per second. Leveraging proprietary technology that was purpose-built to manage the volume of data and real-time analyses, Farsight provides security teams with the Internet’s view of an organization’s web presence and how it is changing, whether those changes were made purposely, inadvertently, or maliciously.
The world’s most security conscious organizations use Farsight for their real-time threat intelligence information…
ThreatWarrior is the premier cloud-native network threat intelligence platform that stops both known and unknown cyber threats in real time. The agentless, deep learning platform analyzes network traffic to eliminate blind spots, determine security vulnerabilities, and stop active threats across on-premises, cloud and hybrid environments.
ThreatWarrior is the first solution to combine unsupervised neural networks, continuous deep packet inspection, behavior monitoring, network intelligence and automated response in a single platform. Leading organizations use ThreatWarrior to see everything happening on their network, learn the behavior of everything communicating across their enterprise, and act efficiently to stop threats other solutions miss..
Sacumen specializes in working with Security Product Companies. We are working with 50+ Security Product Companies such as Symantec, Palo Alto Networks, Varonis, AlienVault, IBM, CA Technologies, ThreatConnect, SecurityScorecard, ForgeRock, Code42, BigID, Flashpoint etc in the areas of Connector Development, Connector Support, and Product Engineering.
We have built 750+ Connectors in the areas of SIEM, IAM, Ticketing Systems, Incident Response, Cloud Applications, Cloud Monitoring, Threat Intelligence Feed, Endpoint Security, Cloud Storage, GRC, Vulnerability Management, Authentication, etc.. .
VIPRE is the highest-rated, award-winning antivirus and internet security products for businesses and home users. It consistently earns 100% block rates and zero false positives from AV-Comparatives, the world’s most widely-trusted independent antivirus testing authority.
VIPRE is powered by the world’s most sophisticated security technologies that protect millions of users from today’s top online threats, including ransomware, zero-days and other malware that easily evades traditional antivirus. Backed by cutting-edge artificial intelligence, one of the world’s largest threat intelligence clouds and real-time behavior monitoring, VIPRE deploys in minutes to deliver unmatched protection without slowing down PCs.
All VIPRE customers receive free U.S.-based technical support…
WorldAware provides intelligence-driven, integrated risk management solutions that enable multinational organizations to operate globally with confidence. WorldAware’s end-to-end, tailored solutions integrate world-class threat intelligence, innovative technology, and response services to help organizations avoid threats, mitigate risk and protect their people, assets, and reputation.
Founded in 1999, WorldAware is a privately held company headquartered in Annapolis, US with offices in London, Cape Town, and Singapore…
Cyveillance, a world leader in cyber intelligence, provides an intelligence-led approach to security. Through continuous, comprehensive Internet monitoring and sophisticated intelligence analysis, Cyveillance proactively identifies and eliminates threats to information, infrastructure, individuals and their interactions, enabling its customers to preserve their reputation, revenues and customer trust.
Cyveillance serves the Global 2000 and OEM Data Partners protecting the majority of the Fortune 50, regional financial institutions nationwide, and more than 100 million global consumers through its partnerships with security and service providers that include Blue Coat, AOL and Microsoft. Cyveillance is a QinetiQ Company..
The NTT Group has a leading global security capability which is delivered by three operating companies: Dimension Data, NTT Com Security, and Solutionary along with the NTT Innovation Institute, Inc. (NTTi³).
Together, they deliver security consulting services, cloud-based and managed security, threat intelligence, security integration and risk management solutions to more than 7,000 clients globally…
Headquartered in Boston, FiVerity, Inc. develops and markets AI- and machine learning software solutions that detect new and emerging forms of cyber fraud and deliver actionable, proactive threat intelligence.
The company’s products meet the unique requirements of financial institutions, including banks, credit unions, and credit card providers. The company’s solutions help financial institutions strengthen, streamline and scale their consumer-facing business processes, such as application processing, credit verification, and customer onboarding.
With its predictive and proactive approach, FiVerity’s solutions help customers to improve their internal processes to reduce losses from fraud and drive faster, and more profitable and sustainable growth…
Cyber Crime Investigation, Cyber Security, Intelligence & Digital Forensics Digitpol is a licensed and accredited criminal investigation agency specialising in operational support and investigative services to fight against transnational crimes. Digitpol is one of the world’s leading providers of Intelligence, Cyber Crime Investigation, Cybersecurity and Investigation services.
Digitpol cooperates closely with Law Enforcement agencies and Homeland Security. Digitpol is headquartered in The Netherlands.
Digitpol is licensed by the Dutch Ministry of Security and Justice as a criminal investigation agency with the permit number of POB1557. Digitpol is recognized as specializing in the sector of criminal investigation, digital forensics, and cyber related matters.
At Digitpol, we know that security is an ongoing process that should cover cyber and digital crime investigation, physical tracing, intelligence and digital forensic investigation.
When Digitpol is engaged, we monitor the most serious threats and rogue actors, we collect threat intelligence 24/7. We are proactive at all levels.
We provide operational services such as Computer Forensics, Mobile Phone Forensics, eDiscovery, Internet Monitoring, Telecoms, Interception, Penetration Testing, Anti-Surveillance, Insurance Fraud, Criminal Investigation, Asset Tracing and Recovery. ICT and Cyber Security, Digitpol is an award-winning provider of cyber security solutions, integration and support to cyber security, Digitpol provides cyber security for all devices, desktops, laptops, workstations, networks, and cloud environments.
Application Security, Inc. provides database security, risk, and compliance solutions for enterprises in the United States and internationally.
The company offers DBProtect, a managed enterprise solution for database security that provides database scanning, vulnerability assessment, and activity monitoring in an enterprise suite; and AppDetectivePro, a network-based database vulnerability assessment scanner that discovers database applications within infrastructure and assesses their security strength, as well as locates, examines, reports, and fixes security holes and mis-configurations. It offers its products for activity monitoring, auditing, compliance, continuous monitoring, cost optimization, database security, information protection, operational efficiency, patch gap management, policy enforcement and management, remediation and response, risk management, threat intelligence, and vulnerability assessment applications.
The company enables organizations to extend existing data protection measures to include the database for security and compliance. It serves government organizations and companies in banking and financial services, health care and life services, manufacturing, transportation, energy, and communications industries.
Has strategic relationships with Archer, ArcSight, HP, IBM, McAfee, Microsoft, Oracle, and Sybase.
The company was founded in 2001 and is based in New York, New York with additional offices in North America and the United Kingdom.. .
ThreatInformer provide cyber risk intelligence to the insurance industry. Combining threat data, security assessments and environmental factors, ThreatInformer’s cloud SaaS platform delivers the complete cyber risk picture.
ThreatInformer brings together a team with cyber insurance, incident response, threat intelligence and platform development experience. With a relentless focus on the cyber insurance industry they are providing insights to transform the way risks are placed and written..
Threat Intelligence Pty Ltd was founded by Ty Miller who is one of the few information security leaders in Australia. This is backed up by his vast number of achievements and experience over the past decade.
View his BIO for a more detailed history of Ty Miller. During this time Ty Miller was key in growing a very successful penetration testing company in Australia as the CTO, leading and training their specialist security team, and building a brand that is well respected in the IT Security industry.
Threat Intelligence is using this experience, specialist skills and knowledge, to not only take information security to the next level, but to actually create the next era of risk management and penetration testing. Threat Intelligence gets invited to the most prestigious security conferences in the world to run advanced security training and present their cutting edge security developments, including both Black Hat USA and Ruxcon.
Redscan is a multi-award-winning provider of managed security services, specialising in threat detection and integrated incident response. Possessing a deep knowledge of offensive security, Redscan’s experts are among the most qualified in the industry, working as an extension of clients’ in-house resources to expose and address vulnerabilities plus swiftly identify and shut down breaches.
Services offered include CREST accredited Penetration Testing, Red Teaming and Managed Detection and Response. By understanding how attackers operate, leveraging cutting-edge threat intelligence, and offering clear and actionable advice, Redscan’s cyber security professionals can be trusted to provide the high-quality insight needed to successfully mitigate information security risk and achieve compliance standards..
BAE Systems Applied Intelligence
BAE Systems Applied Intelligence (formerly Detica) is an international business and technology consulting firm owned by BAE Systems. It specializes in ‘security and resilience’, and in collecting, managing and exploiting information to reveal so-called “actionable intelligence”, “threat intelligence”, “fraud containment” and customer insight.
It also sells clients software for large-scale data exploitation, and analytics for intelligence-grade security and financial crime work. The company has a team of over 100 consultants, with offices in Sydney, Canberra, Melbourne, Brisbane, Perth, and Kuala Lumpur..
Codenomicon develops threat awareness and proactive security testing solutions. Its products include Defensics, a solution that discovers unknown vulnerabilities and flaws, AppCheck, a solution that catalogs, scans, and identifies various digital assets as well as identifies key vulnerabilities and outlines known corresponding fixes, and AbuseSA, a solution that provides governments, CERTs, and cyber authorities with threat intelligence.
Codenomicon also offers testing and auditing services such as outsourced robustness testing, custom test development, security audit, vulnerability reporting, and advanced testing and auditing, training, and security and robustness verification services. It serves developers and security analysts in telecommunications, networking, manufacturing, financial services, and defense industries.
Ari Takanen, Rauli Kaksonen, and Mikko Varpiola founded Codenomicon in 2001, with its headquarters in Oulu in Finland, with a branch in Saratoga in California in the United States. Codenomicon operates as a subsidiary of Synopsys as of June 29, 2015…
SOCRadar is a cloud-based, AI-powered Digital Risk Protection Platform enhanced by cyber threat intelligence capabilities. Security Operation Center teams of major organizations including banks and e-commerce giants benefit from SOCRadar to understand their attack surface and strengthen their security posture continuously.
SOCRadar is continually monitoring where digital assets are exposed, providing context to understand the risk. At the core, the true value of adopting SOCRadar is that it empowers organizations to understand and to take action on cyber threats that are applicable to their cyber infrastructure in a proactive manner.
SOCRadar creates real-time alerts whenever your sensitive digital assets are exposed or imitated across a broad range of online sources in the surface web, paste sites, code repositories, deep and dark web, and other technical sources…
ClearSky Cyber Security
ClearSky Cyber Security offers cyber solutions specializing in threat intelligence services. It mainly covers the financial sector, critical infrastructure, public sector, and the pharma sector.
The company was founded in 2010 and is headquartered in Cambridge.. .
This article was written by Benjamin Skute from Threat.Technology. The editor for this article was Tess Page. If your company is featured in this article and you want to have amendments made please contact us on: [email protected].
Alternatively you may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.