Define: Threat (computer)?
In computer security, a threat is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application.
Top Threat Management Companies and Solutions
This article showcases Threat.Technology’s top picks for the best Threat Management solutions. We selected these companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
Sourcefire, Inc. provides enterprise threat management solutions for information technology (IT) infrastructures of healthcare, financial services, manufacturing, energy, education, retail, telecommunications, and federal and state government organizations in the United States and internationally.
It manufactures various open source and commercial security products. The company’s products include Snort, an open source intrusion prevention technology that is incorporated into the intrusion prevention system software component of the Sourcefire 3D System (Discover, Determine, Defend).
The Sourcefire 3D System comprises multiple Sourcefire hardware and software product offerings, which provide an intelligent network defense that unifies intrusion prevention system, network behavior analysis, network access control, and vulnerability assessment solutions under a common management framework. Sourcefire also offers ClamAV, an open source gateway anti-virus and anti-malware project.
In addition, the company offers technical support and professional services, including network security deployment, customer support, and education and certification services. Sourcefire markets and sells its appliances, software, and services through its direct sales organization and indirectly through the resellers, distributors, and original equipment manufacturers.
The company was founded in 2001 and is headquartered in Columbia, Maryland.. .
Attivo Networks provides required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Attivo Networks, the leader in deception technology, provides accurate in-network threat detection, analysis, and accelerated response to advanced, credential, insider, and ransomware attacks.
The Attivo Deception and Response Platform provide continuous visibility and efficient threat management for user networks, data centers, cloud, branch, IoT, ICS-SCADA, and POS environments. Camouflage dynamic deception sets high-interaction traps to misdirect and lure attackers into revealing themselves.
The solution’s advanced attack analysis and lateral movement tracking automate investigation, deliver evidence-based alerts, and in-depth forensic reports. Incident response is simplified with ThreatOps™ playbooks and 3rd party integrations for automated attack blocking, quarantine, and threat hunting..
Ontic is the first protective intelligence software company to digitally transform how Fortune 500 and emerging enterprises proactively address physical threat management to protect employees, customers and assets. Ontic’s SaaS-based platform collects and connects threat indicators to provide a comprehensive view of potential threats while surfacing critical knowledge so companies can assess and action more to maintain business continuity and reduce financial impact.
Ontic also provides strategic consulting, multidimensional services, education and thought leadership for safety and security professionals at major corporations via its Center for Protective Intelligence. For more information please visit ontic.ai.
WatchGuard Technologies, Inc. provides unified threat management solutions that combine firewall, virtual private networks (VPN), and security services to protect networks and businesses.
The companyâ€™s products include WatchGuard extensible threat management (XTM) 1050, a XTM appliance with Firebox X Peak, X Core, and X Edge e-Series that integrates stateful packet firewall, VPN, zero day attack prevention, anti-spyware, anti-spam, anti-virus, intrusion prevention, and URL filtering on a single appliance. WatchGuard also offers powerful, easy-to-use, easy-to-deploy multi-factor authentication.
WatchGuard Technologies, Inc. was formerly known as Seattle Software Labs, Inc.
and changed its name to WatchGuard Technologies, Inc. in 1997.
The company was founded in 1996 and is headquartered in Seattle, Washington with additional offices in North America, Europe, the Asia Pacific, and Latin America. WatchGuard Technologies, Inc.
operates as a subsidiary of Gladiator Corporation.. .
Kaspersky Lab is the world’s largest privately held vendor of endpoint protection solutions. The company is ranked among the world’s top four vendors of security solutions for endpoint users.
It is an innovator in IT security and provides effective digital security solutions and threat management systems for consumers, SMBs and enterprises. The Kaspersky anti-virus engine also powers products and solutions by other security vendors such as Check Point, Bluecoat, Juniper Networks, Sybari, Netintelligence, Clearswift, FrontBridge, Netasq, Wedge Networks, and others.
Kaspersky Lab is headquartered in Moscow, Russia, with 30 regional offices in Australia, Austria, Benelux, Brazil, Canada, Mainland China, France, Germany, Hong Kong, India, Italy, Taiwan, Japan, Kazakhstan, Korea, Latvia, Malaysia, Poland, Portugal, Romania, Russian Federation, South Africa, Spain, Sweden, Switzerland, Turkey, Ukraine, United Arab Emirates, United Kingdom, and the United States of America. It was co-founded by Eugene Kaspersky and Natalia Kaspersky in 1997.
Kaspersky Lab has over 2,500 employees, including more than 800 research and development specialists, providing protection for over 300 million users worldwide.. .
Endian is the leading provider of open source network security and remote connectivity solutions. Their Unified Threat Management (UTM) hardware, software and virtual appliances provide comprehensive gateway security including firewall, VPN, web and email security services for small to large business networks.
The new Endian Switchboard paired with their industrial gateway appliances provide a secure remote access VPN solution for all companies especially those in the industrial market (energy, manufacturing, transportation and communication). The Endian Hotspot solution offers a powerful captive portal solution that can be utilized to securely manage BYOD across your wireless or wired networks.
Their company has over 500 partners and distributors selling their solutions in more than 50 countries. Endian is headquartered in Appiano, Italy with offices in North America, Germany, Turkey, and Japan..
Cofense, formerly PhishMe, provides phishing threat management for organizations concerned about human susceptibility. Cofense’s intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats.
Cofense’s customers include the defense industrial base, energy, financial services, healthcare, and manufacturing industries, as well as other Global 1000 entities that understand changing user security behavior, will improve security, aid incident response, and reduce the risk of compromise.. .
SonicWALL is a private company that provides Internet security solutions and appliances. SonicWALL has three business units: Network Security, Content Security, and Business Continuity.
Their product lines within these business units include devices that provide a firewall, UTM (Universal Threat Management), VPN (Virtual Private Network), backup and recovery, and anti-spam / email and content filtering, as well as software and value-added subscription services.. .
Securepoint Security Solutions
Securepoint GmbH, from the Hanseatic city of Lüneburg, is the market leader in the development of professional “Unified Threat Management” solutions in Germany. As the largest German manufacturer of these solutions, Securepoint also offers high-quality protection in the cloud area through “Security as a Service”.
The portfolio is completed by email archiving, access protection for networks, simple management of secure WLAN connections (BYOD) and a management system for all of our solutions. The latest product is a comprehensive anti-virus suite including cloud management.
Constant technical advancement of hardware and software and expert assistance provided by the manufacturer support from head office mean that high levels of customer satisfaction can be achieved. This has seen many long-term customer relationships develop and prosper over the years.
Securepoint, as an owner-managed company in the German mid-tier sector, leads the way in its market segment. Since its inception in 1997, company growth has increased steadily and this has been based on profits earned; free from outside capital.
Management at Securepoint GmbH has great experience in the systems house business and knows the requirements and duties that their retail partners have to face on a daily basis very well. Securepoint strives to create solutions that are useful, functional and free of any backdoors.
All employees are committed to these corporate principles and show a professional attitude in their willingness to assist. Securepoint meets its entrepreneurial and social responsibilities by treating its employees as partners and by fostering young talent in their technical and business careers..
RiskIQ provides organizations the visibility and intelligence they need to secure their Enterprise Digital Footprint and map their Adversaries’ infrastructure. RiskIQ products, powered by a proprietary virtual-user technology, threat analysis engine, and global proxy network, enable an organization to defend against threats targeting its websites, mobile applications, brands, customers, and employees.
RiskIQ is used by eight of the 10 largest financial institutions in the U.S. and five of the nine leading Internet companies in the world.
The company is headquartered in San Francisco and backed by Battery Ventures and Summit Partners. For more, visit www.riskiq.com..
MegaPath helps businesses easily and securely communicate between their headquarters, employees, and business partners to lower costs, increase security, and enhance employee productivity. MegaPath’s Hosted Voice and Unified Communications Services help businesses save money and collaborate more efficiently, with advanced features like Find Me/Follow Me, Visual Voicemail (with Transcription), SMS Texting, IM/Presence, Video Conferencing, Screen Sharing and more.
MegaPath Data connectivity services include Ethernet, T1, DSL, Cable, and Wireless. They also offer Managed WiFi services which enable businesses to provide employees and customers with secure, reliable WiFi access without the burden of having to manage the wireless network.
MegaPath also provides Private Networking and Compliance solutions including MPLS and IPsec networks, PCI Compliance, and Unified Threat Management including Advanced Firewall, Intrusion Detection, Anti-virus, Web Filtering, and Anti-spam services. MegaPath Hosted IT Services include Cloud Hosting, Hosted Exchange, Data Backup, and Hosted SharePoint®..
Netsweeper delivers uniquely flexible and powerful web filtering and web threat management software solutions to the telecom, enterprise and education markets. Our solutions offer high-performance web content controls with zero latency for approved traffic.
We have flexible deployment options, distributed administration support, extensive APIs for integration and customer-friendly licensing models that don’t get in the way of doing the filtering you need to do.. .
Haystax Technology, Inc. is a leading provider of advanced threat analytics and cybersecurity solutions.
Haystax provides a full range of services and analytic products to protect and certify mission-critical information and real-time actionable intelligence to enable total enterprise threat management. Haystax solutions are relied upon everyday to protect against threats to some of the high profile networks and institutions in the world.
Haystax Technology’s mission is to give decision-makers the advanced risk-management tools they need to prevent, protect against and respond to a wide array of threats to their most critical systems, facilities and people. Every day, some 50 million people and 100,000 mission-critical assets are protected by organizations using our technology, ranging from local and state agencies and major urban areas, to large commercial enterprises and top federal government agencies.
Haystax Technology’s mission is to give decision-makers the advanced risk-management tools they need to prevent, protect against and respond to a wide array of threats to their most critical systems, facilities and people. From physical assets and infrastructure to large-enterprise technology systems, we help our customers achieve peace of mind by protecting what they value most from physical, cyber and insider threats..
Lacoon Mobile Security
Lacoon Mobile Security provides a mobile threat management platform that allows enterprises to manage and mitigate the risks of BYOD and protect their corporate assets from mobile cyber threats including malicious applications, targeted network attacks and Advanced Persistent Threats. Lacoon protects the world’s leading organizations with the most comprehensive mobile security available to both iOS and Android, delivered via a centralized platform that easily augments to existing infrastructure providing real-time security and intelligence.
Its patented Behavioral Risk Engine detects device, application and in-network threats that others will miss and quantifies the risks and vulnerabilities that BYOD exposes to the enterprise. Company History: Lacoon Security Ltd.
was founded in 2011 by experts from mobile cyber security and defense industries who observed mobile devices being used to access and store unprecedented quantities of personal & corporate information and discovered a consequent uptick in attacker activity targeting those devices that posed significant risks to security. Their extensive expertise, developed in the field during their service in elite units of the Israeli Defense Forces, gave them a unique perspective on both the dangers of BYOD and corporate mobility trends and the shortcomings of current technologies.
They recognized that organizations did not have the tools they needed to effectively protect themselves from the cyber-criminal and espionage activity they were facing.. .
The rapid growth of internet-connected wireless devices (i.e. IoT devices) is leading to increased exposure of corporate networks to cyber-attack through device vulnerabilities.
In addition, scanning IoT devices for threats is very manual, costly and complex with incumbent options. As a result, nearly half of businesses are unaware of what devices are connected to their networks or when they suffer costly breaches.
Founded in 2016 by cybersecurity veterans, Suavei has deployed the only self-configuring threat management solution available for wirelessly connected devices. Suavei’s SaaS solution uses machine learning algorithms to dynamically automate both device identification and ongoing scan calibrations.
Suavei protects IoT devices over 500 times faster than incumbent methods! The Suavei leadership team brings decades of experience in cybersecurity, wireless, and software development to the company. Suavei is an EvoNexus portfolio company, nominee for the Most Disruptive Technology SPIFFY Award, a finalist in Pepperdine’s Most Fundable Company & finalist for the John G.Watson Quick Pitch..
CTM360® is a Cyber Security subscription service offering 24 x 7 x 365 Cyber Threat Management for detecting and responding to threats originating in cyberspace. A growth-stage startup headquartered in the Kingdom of Bahrain, CTM360 currently serves more than 30 of the Top 50 GCC Banks, as well as entities in Oil & Gas, Healthcare, Sovereign Wealth Funds, Aviation across 28 countries.
CTM360 specializes in Offensive Defense and strives to strengthen a subscribed member’s security posture by making them a harder target in cyberspace. With 370,000+ unique incidents managed, 11 billion hacked accounts indexed, 350,000+ digital assets inventoried and 1000+ executives protected, CTM360 currently remains a leader in Cyberspace for Managed Threat Detection & Response, Digital Risk Management, Threat Intelligence, Corporate & VIP Brand Protection, Anti-Phishing, etc.
CTM360 is offered as a service through an ecosystem built in the cloud and remains solely outside the perimeter of any organization.. .
My Digital Shield (MDS) is focused on helping the underserved small business easily secure their businesses which are are highly vulnerable to cyber attacks. Founded in 2013, MDS provides affordable, easy-to-install Security-as-a-Service (SECaaS) based on industry-leading unified threat management (UTM).
The company’s customizable cloud-based security solution offers continual protection against cyber threats and intrusion at an affordable price. With no bandwidth pollution, the SECaaS delivery model ensures that the latest virus definitions and threat updates are in use for continual threat assessment.
MDS serves numerous managed service providers (MSPs) and small businesses in various industries including retail, restaurants, hospitality and professional services.. .
Global Velocity offers information-centric security solutions to protect the information in enterprise clouds. Its groundbreaking solutions keep your network secure and provide a future pathway to unified threat management.
The company was founded in 2000 and headquartered in Clarkton, Missouri.. .
DefendEdge began as a Managed Security Service Provider for SMB and Enterprise clients located in the United States. With our experienced cyber security team we have created a platform called SiON which helps enable our clients to become proactive against cyber threats.
The SiON platform integrates and analyzes upstream target system logs, data in real-time through machine learning algorithms and takes action on human threats. SiON has several trademarks, patents, and a friendly user interface making it easy for auditors, analysts, CISO’s, CIO’s, and other executives to make cyber risk business decisions..
ForenSec Global Inc.
ForenSec Global was founded by a former Fortune 190 senior security executive in partnership with former Big 4 Security, Audit and Advisory Leaders.It is the owner of the MyVayda SaaS Product Suite of services. The leadership team are former CISO, Former VPs Technology and Security Services , U.S.
Airforce Veterans, West Point Graduate, Former Federal Special Agent, Former Chief Architect of a Fortune 200, Former Global Head of SI, Cloud and Security. As advisory leaders for former employers some of our leadership team have also acted as CISOs for key clients both public and private, Tn this role, we served in an interim capacity, to maintain run the business status and drive needed improvements, while working with said clients to hire permanent CSO or CISO.
In combination, this leadership team bring over 128 years of combined experience within, Incident, Breach Response and Counter Hacking. They have been first responders and/or created response, risk mitigation and management processes for Global Corporations during and post a hacking/breach event, some of which were highly publicized over the last 10 years.
Using these experiences and expertise the company’s advisory and professional services arm, work with customers to ensure that they are prepared for Security and Risk Management Audits from regulators and auditors, given this team’s experience in security and audit from a Big 4 perspective in their past. Leaders work to drive commonsense cost optimization and practical technology alignment for all our customers based on tenured understanding of technology environments from their time as former corporate leaders, faced with some of the problems most companies still face today.
With hands on experience saving past clients from potential 7 to 8 figure fines from regulators, the advisory team have pre-audit and remediation design expertise to create solutions that ensure customers have an unbiased view on Risk Impacts, Data Privacy Security gaps and Technology overlap or best use, that are critical to ensuring risk and other threats to business operations is not a score based on an assessment solely, but compounded to ensure the environmental difference, business functional need and then compliance, audit and regulatory need, and not a standard score based on common for all metrics for flagging. At ForenSec Global, the industry experience we bring to the table combined with proactive analytics to augment preventative threat management, give us a unique perspective to help clients navigate cyber threat investigations and manage messaging and remediation post breach Our Founders experience and challenges while serving in corporate security has led to the development our intelligent identity business analytics risk optimization platform, which integrates big data business analytics, identity interactions with mapped personas and reporting focused on the business environment and asks from senior business leaders..
FIREFX is a team of T.E.C.H.s (Tinkerers, Engineers, Creators, & Hackers). They approach uncertainty with forethought and determination; they work independently and cooperatively to explore new ideas and innovative strategies.
They are resourceful and resilient in the face of challenges and change. Overview: FIREFX is a Next Generation Firewall/IoT security appliance and professional grade high-performance media system developer.
Their award-winning products consistently deliver superior performance at a reasonable price point. FIREFX has now combined industry experience, proven software, military grade hardware components and years of military experience to create a unified threat management platform for home and business automation networks.
read more detail at http://www.fire-fx.tv/our-story/. .
NETMONASTERY (NM) is a industry leader in the cyber threat defense space. NM has been providing real-time threat detection and analytics to the most critical data assets on the Internet.
CNAM, a SaaS delivered SIEM, is built ground up for threat management and is used extensively by Managed Security Providers (MSP) as an integrated service delivery platform. Gartner has named NETMONASTERY a COOL VENDOR in Security for Technology and Service Providers, 2014.
CNAM is an application aware threat defense program, which integrates into applications to identify threats that would otherwise go undetected. NM currently services the largest telecom providers, banks, financial institutions, brokers, exchanges, e-commerce, media and datacenters.
NM partners with datacenters, system integrators, service providers and telecom providers.. .
Deep Nines. provides integrated security solutions designed to control Internet threats.
It offers Edge Security Profiler, a network monitoring and analysis tool; Security Edge System, an intrusion prevention system; and Security Edge Platform, an integrated and unified threat management system that integrates security functionality into a single solution. The company also provides iTrust, a content filtering system that allows administrators to permit and prioritize good Internet traffic, block bad online content, and eliminate content filter circumventions; Infection Free Networking, a network access control solution; and Internet Content Audit, an assessment that determines the extent of unwanted traffic on network.
It serves financial services, healthcare, energy, and government sectors, as well as service providers, higher education and K-12 education institutions, small to medium businesses, and enterprises. The company was founded in 1999 and is headquartered in Dallas, Texas..
Netbox Blue is a leading provider of innovative internet compliance, management and security solutions. Netbox Blue provides organizations with unique, real-time social media analysis and controls with predictive outcomes and benefits.
Netbox Blue owns granted patents around this unique technology and has other patents in the process of being granted. Netbox Blue also supplies award winning Unified Threat Management solutions that are globally recognized as offering the most advanced and fully featured capabilities from a single solution.
This technology helps protect company networks but also extends to mobile workers, using any internet connection, through Netbox Blue’s unique Borderless Internet Compliance framework. The company was established in 1999, is privately held and is based in Australia.
Netbox Blue has a presence in over 19 countries and has partnerships and distribution agreements with some of the world’s largest IT companies.. .
BlackChar Consulting & Research
BlackChar is a privately held consulting and research firm which specializes in providing complete holistic security solutions for business-critical needs. BlackChar also offers a broad range of solutions and services, including risk assessments, penetration tests, Cyber Threat Management and Intelligence.
We deliver a comprehensive suite of solutions and services for governments, quasi-governments, public sector institutes and enterprise-class organizations around the world.. .
Tarsus SecureData is a value-added distributor of information risk management and network solutions for the African sub-continent and Indian Ocean islands. A cross-section of the available solutions from Tarsus SecureData illustrates wide coverage of the following information security and risk management domains: business continuity, security appliances and devices, hardware authentication, identity and access management, security and vulnerability management, secure content management, threat management and security services.
Tarsus SecureData’s information security and risk management solutions include best-of-breed network, endpoints, messaging and Web. In addition, as a value-add to vendor, channel and customer, Tarsus SecureData also provides a full complement of support, pre-sales and professional services around the solutions positioned in each discrete security vertical..
MInd the Gap. Microservices + API Traffic Security.
APIDefender is an API security gateway designed to block unauthorized access to APIs and prevent system attacks through proactive threat management in real-time. MInd the Gap.
Microservices + API Traffic Security. APIDefender is an API security gateway designed to block unauthorized access to APIs and prevent system attacks through proactive threat management in real-time.
If you have a developer community, APIDefender is the perfect enterprise-grade security gateway for your developer platform. On-premise.
In-the-cloud. API Security, Mobile Application Security, APIs, Threat Intelligence, Admission Control, Application Security, OWASP Top-10.
Product Founded by executives from ArcSight with deep domain expertise in enterprise security, PetaSecure leveraged the power and scale of Hadoop to deliver next-generation threat detection, investigation and response. Our focus was on finding and remediating emerging security problems that leverage user, application and data flaws to attack enterprises.
Key innovations include adapting the machine learning and predictive analytics that have been successfully utilized in research, customer care, marketing, etc., to solve security problems. These breakthrough algorithms minimize the impact of successful attacks by reducing the threat detection time from weeks and months to seconds, enabling real time response.
PetaSecure accelerated its strategy and technology in the Cisco Entrepreneur in Residence Program: https://www.youtube.com/watch?v=xGCka1_M_Yo https://eir.cisco.com/entrepreneurs.html PetaSecure got acquired by Niara, Inc. in December 2014: http://www.niara.com/niara-welcomes-petasecure/.
NORTH-RICA RISK COUNTERMEASURE ASSOCIATED
NORTH-RICA RISK & Countermeasures Associated International protects enterprises and executives in Brazil, Latin America, Europe and U.S.A since 1984. NORTH-RICA RISK & Countermeasures Associated offers thorough, complete, and discrete investigative and protective services for a wide range of intelligence acquisition purposes.
Whether the cause of risk is political, social, criminal or professional, NORTH-RICA RISK & Countermeasures Associated has the experience and the expertise to deliver a positive approach. Technological risk analysis (OCTAVE Method,NBR17799) Risk Analysis and Threat Assessment Risk and Threat Management Criminal and Fraud Investigations Competitive Intelligence Intelligence Gathering Cyber Threat Analysis Special Protection Projects.
This article was written by Benjamin Skute from Threat.Technology. The editor for this article was Tess Page. If your company is featured in this article and you want to have amendments made please contact us on: [email protected].
Alternatively you may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.