This section of CTOvision, designed and optimized for CTOvision Pro members, provides a fast overview of Cybersecurity companies we believe are poised to cause the most positive disruption in enterprise. Remember CTOvision Pro members can always use our Ask The CTO feature to task us to refine and assess these firms further.

Find our other company assessments at: Cloud Computing Companies | Artificial Intelligence Companies | Mobility Companies | Big Data Companies | Robotics Companies | Internet of Things Companies  | Infrastructure and Comms Companies

We have tracked security technologies for over a decade and scour the community for indications of new, virtuous technologies and companies that can help enable enterprise missions through better security.

The most virtuous of these firms focus on doing a small number of things well, or sometimes just doing one and only one thing very well. That is the nature of cyber security technology today. Threats are so complex and enterprises consist of such unique, mission-focused infrastructure that this can make it better for enterprise decision-makers. You can find the one firm that scratches your biggest itch and then move on to the next itch.

But the bad news is with every solution introduced another challenge then becomes the priority. Clearly this is a never ending cycle.

To help you with your continuous searches we maintain this list with continuous updates. The firms we report on below are among the best available. And these are firms with staying power, making them lower risk options. Please contact us for more information on any of them. And please let us know if you think we are missing anyone we should be reporting on.

 

GreenTec: Persistent Data Protection With Storage Level Security

With this post we are initiating coverage of Virginia based GreenTec-USA. GreenTec-USA is a pioneer in data center modularization and optimization for servers, storage, video and secure document storage. The premise behind their cyber security solutions is one that leaders in the cyber business know well – breaches are not a question of if, but when. […]

PureVPN: Engineered for both speed and security

PureVPN is a very highly regarded VPN provider with capabilities affordable enough for individual use but easily scalable to support businesses. PureVPN now offers “Virtual Router” feature within its Windows application. With this feature, you can convert your Windows-based desktop or laptop into a virtual router and use it to connect up to 10 devices. […]

NordVPN Solutions: Enhancing privacy and security across all IT platforms

NordVPN won PCMagazine’s Editor’s Choice Award, which is important to know given the VPM Market is saturated with providers. Most all VPNs rely on the same basic information to express why you need a VPN: It makes WiFi safer wherever you are, can help give you access to more parts of the Internet by lifting […]

* QuintessenceLabs: Advanced quantum cybersecurity products with high-speed true random numbers, encryption key management, and one time pad encryption.

QuintessenceLabs delivers a trusted security foundation protecting sensitive data on your premises, in the cloud or in uncontrolled environments. Founded in 2006, QuintessenceLabs addresses the most difficult security challenges facing companies, helping implement robust security strategies to protect data today and in the future. QuintessenceLabs products include: – an enterprise scale true random number generator […]

Vidder: Securing business critical apps, transparently

The biggest challenge corporations have today is stopping the cyberattack in cost-effective ways. Vidder has created a single service that mitigates broad ranges of attacks in very smart, well designed ways. For context see the short introduction at this video: Vidder is changing how modern day enterprises approach security in an increasingly untrusted IT landscape. […]

CyberX

CyberX secures the OT Network by modeling it as a state machine, providing complete visibility and real-time detection of threats. Gartner Cool Vendor 2015. From their website: The Industrial Internet will not thrive without cyber-security as one of its pillars. Industrial networks still rely on many systems that were implemented decades ago, at a time when […]