More stories

  • Wickr: The Most Trusted and Secure Messenger in the World

    With this post we are initiating coverage of Wickr in our Disruptive IT Directory as a Security Company We have tracked Wickr for years and use them extensively to communicate and collaborate with a wide range of stakeholders. We have also examined their technology and approach and believe it to be the most secure and […] More

  • Centrify: Control, secure and audit access to cross-platform systems via zero trust architecture

    Centrify seeks to improve upon legacy approaches to Privileged Access Management by delivering multi-cloud-architected Identity-Centric PAM to enable digital transformation at scale. Centrify Identity-Centric PAM establishes a root of trust, and then grants least privilege access just-in-time based on verifying who is requesting access, the context of the request, and the risk of the access […] More

  • Imperva: Protecting the Data that Drives Business

    Imperva is a cybersecurity leader with a mission to protect data and all paths to it. They help protect the data of over 6,000 global customers from cyber attacks through all stages of their digital transformation. Their products are informed by the Imperva Research Lab, a global threat intelligence community, that feeds the latest security […] More

  • Koolspan: Encryption, Authentication, and Key Management in a Single Hardware-Based Solution

    KoolSpan, Inc. provides simple secure connectivity solutions that seamlessly unite mission-critical network devices. KoolSpan TrustCall provides robust, cross-platform, end-to-end communication security on mobile devices for Governments and Enterprises, SMBs and Consumers. KoolSpan’s TrustChip simply and intuitively transforms a standard smartphone, or any computing device, into a secure communication device. A purpose-built crypto processor designed into […] More

  • QuintessenceLabs: Advanced quantum cybersecurity products with high-speed true random numbers, encryption key management, and one time pad encryption.

    QuintessenceLabs delivers a trusted security foundation protecting sensitive data on your premises, in the cloud or in uncontrolled environments. QuintessenceLabs is the leader in quantum-enhanced cybersecurity. They provide enterprises with the strongest data protection today, preparing them for a quantum-safe tomorrow. Products from QuintessenceLabs combine world class security expertise with advanced science to create high-value […] More

  • Bastille Networks: Security for the Internet of Radios, Cellular Intrusion Detection Solutions and RF Vulnerability Research

    With this post we are initiating coverage of Bastille Networks. we are tracking Bastille in our Guide to Disruptive Companies in the security companies directory. Bastille Networks provides enterprises with real-time device location information, integrated into existing security and IT management solutions. The result: organizations can now better empower the workforce to get more things done […] More

  • Recorded Future: Web Intelligence Software Platform To Anticipate Threats and Capitalize On Opportunities

    We have reported on Recorded Future since their founding and have watched closely as they have evolved to become a full scope web intelligence software platform able to make unique and very positive contributions to enterprise missions (CTOvision Editor Bob Gourley is an advisor to the firm). Recorded Future provides a comprehensive source of past, […] More

  • Sumo Logic: Make Your Applications Run Longer & Stronger

    Sumo Logic provides the first cloud-based log management and analytics solution and removes the headaches associated with on-premise log management software, expensive hardware, complex management, and frequent software upgrades. Sumo Logic is the pioneer in continuous intelligence, a new category of software, which enables organizations of all sizes to address the data challenges and opportunities presented […] More

  • Trusona: Passwordless two-factor authentication

    Trusona is the pioneer and leader in passwordless two-factor authentication (2FA). Stolen or weak passwords are responsible for over 80% of breaches, and Trusona’s mission is to thwart cybercrime by eliminating them from the user experience. For a good overview and really fast demo of the power of Trusona see this video: Over 200 organizations, including some […] More

  • Fugue: Autonomous Cloud Security and Compliance

    Fugue automates enterprise cloud security and compliance enforcement to prevent data breaches, policy violations, and system downtime. Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies. Their solution identifies cloud infrastructure security risks and compliance violations and ensures that they are never repeated. Fugue provides baseline drift detection and automated remediation to […] More

Load More
Congratulations. You've reached the end of the internet.