With this post we are initiating coverage of Elevate Security in our Disruptive IT Directory as a Security Company in our Security Training category. Elevate is a firm we have cheered on from the beginning. Their co-founder Masha Sedova has been a past speaker at our previous FedCyber event series, and is a widely known practitioner who led successful security training … [Read more...] about Elevate Security: A data-driven and personalized approach to security changes behaviors and helps you measure and communicate efficacy of your programs
This section of CTOvision, designed and optimized for CTOvision Pro members, provides an overview of Cybersecurity companies we believe are poised to cause the most positive disruption in the enterprise.
Find our other company assessments via our Disruptive Technology Finder.
There are over 3,000 IT security companies in the marketplace today. Our goal is to help you find the right one for you. We track what we believe to be the top 100 out of these 3,000 firms. As an aid to finding the right firm you can dive into our directory by category. We currently divide the market into firms with the following functions:
CASB | Cyber Threat Intelligence | Deception | Encryption | Endpoint Detection and Response | Governance, Training, Education, Process | IAM | Managed Services, Outsourced Security | Microsegmentation and Container Security | Network Traffic and Analysis | SDP | Security Scanning And Testing
With this post we are initiating coverage of Scythe in our Disruptive IT Directory as a Security Company Scythe is an attack emulation platform. Think of it like a red team in a box that can help an enterprise continuously check to see if adversaries can get in. Its use cases include being used by internal teams to mount attacks, or in empowering external red team companies to … [Read more...] about Scythe: The most advanced attack emulation platform on the market
With this post we are initiating coverage of Wickr in our Disruptive IT Directory as a Security Company We have tracked Wickr for years and use them extensively to communicate and collaborate with a wide range of stakeholders. We have also examined their technology and approach and believe it to be the most secure and most functional messaging capability available to the … [Read more...] about Wickr: The Most Trusted and Secure Messenger in the World
With this post we are initiating coverage of Bastille Networks. we are tracking Bastille in our Guide to Disruptive Companies in the security companies directory. Bastille Networks provides enterprises with real-time device location information, integrated into existing security and IT management solutions. The result: organizations can now better empower the workforce to get … [Read more...] about Bastille Networks: Security for the Internet of Radios, Cellular Intrusion Detection Solutions and RF Vulnerability Research
Trusona is the pioneer and leader in passwordless two-factor authentication (2FA). Stolen or weak passwords are responsible for over 80% of breaches, and Trusona’s mission is to thwart cybercrime by eliminating them from the user experience. For a good overview and really fast demo of the power of Trusona see this video: https://www.youtube.com/watch?v=tEbTNizE5yU Over 200 … [Read more...] about Trusona: Passwordless two-factor authentication