-
Scythe: The most advanced attack emulation platform on the market
With this post we are initiating coverage of Scythe in our Disruptive IT Directory as a Security Company Scythe is an attack emulation platform. Think of it like a red team in a box that can help an enterprise continuously check to see if adversaries can get in. Its use cases include being used by internal…
-
Fugue: Autonomous Cloud Security and Compliance
Fugue automates enterprise cloud security and compliance enforcement to prevent data breaches, policy violations, and system downtime. Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies. Their solution identifies cloud infrastructure security risks and compliance violations and ensures that they are never repeated. Fugue provides baseline drift detection and automated remediation to…
-
CyberX: Secure the OT Network by modeling it
CyberX secures the OT Network by modeling it as a state machine, providing complete visibility and real-time detection of threats. Gartner Cool Vendor 2015. CyberX was acquired by Microsoft From their website: The Industrial Internet will not thrive without cyber-security as one of its pillars. Industrial networks still rely on many systems that were implemented decades…
-
Balbix: Breach avoidance gets you ahead of the game
Balbix’s predictive breach risk platform is the industry’s first system to leverage predictive analytics and AI to provide enterprises with a comprehensive and continuous risk and resilience calculation visualized via a searchable and clickable heat map. The platform was designed for CIOs, CISOs and IT security teams who wish to proactively understand their breach risk…
-
Senrio: Know your environment
Senrio provides a new kind of security for IoT, industrial control, medical technology and all embedded devices.From their website: It is 2018 and chances are you still don’t actually know what is on your network. The reality for most enterprises is their networks are suffering from major install-gaps and software licensing volume mismatches. They are…
-
PFP Cybersecurity: Providing iron-clad identity for any device and detecting any anomalous behavior
PFP Cyber does something so new and so positive it almost defies categorization. There is no Gartner magic quadrant or Forrester wave for what they do. The closest category of security solutions might be those of identity management, authentication and authorization but they are doing these things for hardware, not people. PFP can tell, by…
-
Bricata: Prevent, Detect, Respond Using Combined Signature and Anomaly Detection
Bricata network security solutions deliver innovative next generation intrusion prevention, advanced threat detection and analysis, and threat hunting. Bricata supplies network security solutions that deliver innovative next generation intrusion prevention, advanced threat detection and analysis, and threat hunting to enable large organizations to actively pursue and identify advanced, persistent, and coordinated attacks. A specialized component-based approach…
-
Proofpoint: Email gateway focused on protecting against advanced threats
Proofpoint is a next-generation cybersecurity company that protects your people, data and brand against advanced threats and compliance risks. Emerging Threats – now part of Proofpoint – is a world-leading provider of open source and commercial threat and malware intelligence. From their website: For seven years running, Proofpoint has been a leader in Gartner’s “Magic…