Browse Products & Solutions
- Artificial Intelligence Security Assessment - AI Security Assessment - GenAI Security Assessment
- Asset & Expense Management Assessment
- Breach Notification Plan Assessment
- Business Continuity Planning Assessment
- CMMC
- Compliance Assessment
- Compliance Data Center Technology Cyber Security Cloud
- Cyber Risk Assessment
- Cyber Security Insurance Readiness Assessment
- Cyber Security Program Development Assessment
- Dark Web Assessment
- Disaster Recovery Planning Assessment
- Email Threat Assessment
- Governance Program Development
- HIPAA
- HITECH
- HITRUST
- ISSO 27001
- Incident Response Plan Assessment
- Penetration Test - PenTest
- Policy Review Assessment
- Mobile Security Assessment
- Pre Audit Readiness Assessment
- Privacy Assessment
- Readiness Assessment - CMMC, SOC, HITRUST, HIPPA, HITECH, ISO 27001
- Regulatory Compliance Gap Assessment (GDPR, CCPA, CMMC)
- SEC Disclosure
- Security Impact Assessment
- Short Tenure Time Watch
- SOC 1
- SOC 2
- SOC 3
- SOC for Cybersecurity
- SOC for Vendor Supply Chain
- Third-Party Risk Assessment
- Vendor Risk Management Assessment
What You Need To Know
Our Cyber Risk Assessment helps your organization proactively make critical decisions. We expose cyber risk throughout your operations, which saves valuable time in your team. Our assessment gives you a clear understanding on critical conditions that are impacting your business.
Who Requires It?
Every company with employees should conduct a risk assessment on the methods in which the company produces goods and/or services. Cybersecurity risk assessment will educate and empower your employees on knowing how to identify risk and how those risks will affect their work.
Adaptive Shield
SaaS SecurityAdaptive Shield provides enterprises a continuous, automated solution and built-in knowledge base that makes native SaaS security possible and easy
BigID
Data Security Platform, Data Security Posture Management (DSPM), Data Privacy Management (DPM), Data Discovery and Classification (DDC), Data Loss Prevention (DLP)Data is the critical factor for all businesses - not just to persevere, but to continue to innovate.
Centripetal Networks
Threat Intelligence Gateway, Clean Internet Services, and Cloud SecurityCentripetal invented the Threat Intelligence Gateway and leverages its technologies to deliver CleanINTERNET, a comprehensive intelligence-led cyber service.
Coyote Brown
vCISO - Virtual CISO - Virtual Chief Information Officer ServicesWe are a Cyber Security Consulting & Advisory Firm composed of highly experienced strategic cybersecurity advisors and consultants helping clients maintain a healthy cyber security posture.
CrowdStrike
Endpoint Detection and Response - EDR, Extended Detection and Response - XDR, Managed Detection and Response - MDR, Next Generation Anti-Virus - NGAVCrowdStrike is a US-based company that provides cloud workload, endpoint security, threat intelligence, and cyberattack response serrvices.
CyberGRX
Cyber Security Ratings Platform & Third Party Risk Management - TPRMA supplier of a competitive third-party cyber risk management platform that identifies, evaluates, and monitors enterprise-level cyber security, CyberGRX sets the standard on automation and analytics to provide valuable solutions preventing security threats.
Rapid7
Managed Detection and Response (MDR)Rapid7 is trusted and depended on around the world to provide advanced technology, services, and in-depth research for complex vulnerabilities and cyberattacks affecting security teams.
RiskRecon
Cyber Security Ratings Platform & Third Party Risk Management - TPRMRiskRecon provides a SaaS platform that helps organizations more effectively manage the risk reality of increasingly interconnected IT ecosystems by delivering frequent, comprehensive and actionable security performance measurements.
SecurityScorecard
Cyber Security Ratings Platform & Third Party Risk Management - TPRMSecurityScorecard was founded in 2013 by Dr. Alex Yampolskiy and Sam Kassoumeh. Through their patented rating technology, SecurityScorecard creates an instant risk analysis and is used by over one thousand companies to self-monitor, evaluate third party risk, andn cyber insurance underwriting.
Silent Breach
We've breached the Department of Defense. Twice.Silent Breach provides network security and digital asset protection services, allowing companies to continue their business without experiencing consumer fallout and financial loss due to IT vulnerabilities.
TrustedSec
Penetration Test - PenTest Services, Breach and Attack Simulation - BASTrustedSec is an IT security consulting netowork with expertise in strategized risk-management that asissts companies in preventing and defending against cyber threats.
UpGuard
Cyber Security Ratings Platform & Third Party Risk Management - TPRMUpGuard delivers a well-rounded cyber risk solution by bringing together third-party security ratings, vendor questionaires, and cyber threat data.
Zscaler
Seize the Zero Trust MomentZscaler is a global leader in transforming organizational infrustructure into a cloud and mobile-first network. They provide enhanced, cloud-based solutions to users, networks and devices throughout more than 185 countries.
Aqua Security
Cloud Native Security and Container SecurityAqua protects applications from development to production, across VMs, containers, and serverless workloads,
up and down the stack.
Fortalice Solutions
We transform a reactive security model into a proactive, results-based model.Their highly-skilled practitioners are trained to meet clients where they are – whether that be in the midst of a crisis or proactively seeking cybersecurity services.
Quantum Armor
Attack Surface ManagementArmis
OT Cyber Security SoftwareArmis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices.
Expel
Managed Detection and Response (MDR) and SOC as a ServiceExpel - Transparent SaaS (SOC as a Service)
ZeroFOX
Threat Intelligence, Dark Web Monitoring, Open Source Intelligence (OSINT)ZeroFOX provides enterprises AI-powered protection, intelligence and disruption to identify and dismantle external threats across the public attack surface
Cloudflare
Cloud SecurityCloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable
Cybereason
Endpoint Detection and Response - EDR, Extended Detection and Response - XDR, Managed Detection and Response - MDR, Next Generation Anti-Virus - NGAV, Incident Response - IRCybereason provides cyber attack protection that unifies security from the endpoint, to the enterprise, to everywhere the battle moves. Cybereason's Defense Platform combines the industry’s top-rated detection and response (EDR and XDR), next-gen anti-virus (NGAV), and proactive threat hunting to deliver context-rich analysis of every element of a MalOp (malicious operation). Cybereason is a privately held, international company headquartered in Boston with customers in more than 40 countries.
Huntress
Managed Detection and Response (MDR) SolutionsBinary Defense
Managed Detection and Response - MDRShield Your Business From Cyber Attacks With Binary Defense Managed Detection and Response - MDR Solutions
Sevco Security
The Power of 4D Asset IntelligenceSevco Security is designed to deliver the most accurate & comprehensive asset information possible for better, smarter, and faster decision making to improve posture and reduce risk.
Signal Corporation
Threat Intelligence, Dark Web Monitoring, and Open Source Intelligence (OSINT)Assess Threats, Risks and Vulnerabilities using Signal Corporation's OSINT Threat, Dark Web Monitoring and Risk Intelligence Platform. Signal Corporation provides access to online data, including the dark web, to give physical security, supply chain, crisis management, fraud, cyber security, and human resource teams early stage indicators of possible threats allowing them to take mitigate steps quickly. Monitor multiple data sources, advanced dark web search capability and real-time email and mobile notifications.
Horizon3
Continuously Verify Your Security PostureWe are a mix of US Special Operations, US National Security, and cybersecurity industry veterans. Our mission is to “turn the map around” – using the attacker’s perspective to help enterprises prioritize defensive efforts. Continuous PenTesting, Breach and Attack Simulation - BAS
Bishop Fox
Leading the Pack in Offensive SecurityWe've been in the offensive security space for almost two decades and are proud to be home to the innovators, engineers, and exploit writers behind some of the most popular security tools and research out there.
Dragos
OT Cyber Security SoftwareDragos was founded by renowned ICS/OT practitioners who have defeated adversaries for the U.S. government, ally nations, and global firms. Today, Dragos is on a mission to protect the world’s most critical infrastructure and safeguard civilization. We know that’s a mission you can get behind
The Dragos Platform gives you visibility into your ICS/OT assets, vulnerabilities, threats, and response actions, and supports you with forensics and OT-specific playbooks.
DarkOwl
Threat Intelligence, Dark Web Monitoring and OSINTDarkOwl is the industry's leading provider of darknet data. We offer the world's largest commercially available database of information continuously collected from the darknet, allowing our customers the ability to turn this data into a powerful tool to identify risk at scale and drive better decision making. Our platform tools allow users to parse and analyze the data for specific use cases, and our database is updated from tens of thousands of sites across multiple darknets every day.
DarkOwl is unique not only in the depth and breadth of its darknet data, but also in the relevance and searchability of its data, its investigation tools, and its passionate customer service. As importantly, DarkOwl data is ethically and safely collected from the darknet, allowing users secure anonymous access to information and threats relevant to their mission. Our passion, our focus, and our expertise is the darknet.
NetSPI
NetSPI Penetration Testing Services, Breach and Attack Simulation - BASNetSPI is a penetration testing company that is transforming the cyber security testing industry with tech-enabled services and prevention-based cyber security techniques. Global enterprises choose NetSPI’s penetration testing service to test their applications, networks, and cloud infrastructure at scale and manage their attack surfaces.
Echelon Risk + Cyber
We're built to address the needs of your full organization.Echelon was born from the idea that cybersecurity isn’t something that a professional services firm can just dabble in. Cybersecurity, privacy and technology risk present major threats that disrupt our way of life. That threat is constantly evolving, so we are too. We see it as our calling to stem the tide. We are all in. While other cybersecurity professional services firms tout what they do, few can articulate why they do it. We know exactly what drives us - protecting your basic right to security and privacy.
Our origin story begins with our name. The echelon formation creates a staggered but unified front, used to successfully provide excellent range of vision and protection to each participant. From our name, to how we conduct and manage ourselves on a day-to-day basis, we are built to be that trusted ally.
Team Cymru
Threat Intelligence, Dark Web Monitoring, and Open Source Intelligence (OSINT)Since 2005, Team Cymru’s mission has been to save and improve lives by working with security teams around the world, enabling them to track and disrupt the most advanced bad actors and malevolent infrastructures.
No-Cost Community Service
We deliver comprehensive visibility into global cyber threat activity and are a key source of intelligence for many cyber security and threat intelligence vendors. Our Community Services division provides no-cost threat detection and intelligence to network operators, hosting providers and more than 140 CSIRT teams across 86+ countries.
Commercial Solutions
We give enterprise clients comprehensive visibility into global cyber threats, and we’re the key source of intelligence for many cyber security and threat intelligence vendors. Security teams rely on our Pure Signal™ platform to close detection gaps, accelerate incident response, and detect threats and vulnerabilities across their entire enterprise and third-party ecosystems.
Team Cymru is comprised of former...
- Law Enforcement and Members of National and Industry CSIRT Teams
- Analysts from research, education, private and public sectors
- ISP backbone engineers
- Fortune 500 enterprise network engineers
- Penetration testers
- Military – US and allied nations
- Frontend, backend, gaming, web app, kernel, high-performance computing and big data developers and system engineers
We understand the entire stack, including layer 8 — the human layer.
Senhasegura
Privileged Access Management (PAM) SolutionsWe strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.
Authomize
Detect & Mitigate Identity-based Risks and ThreatsAuthomize was founded by a group of seasoned and visionary entrepreneurs who identified the challenges IT and Security teams face in managing and securing authorizations in today’s complex environment. Authomize goal is to allow organizations to manage and secure today’s complex environment without compromising on productivity or security.
Authomize empowers organizations to enact identity-first security by detecting, investigating, and responding to identity and access threats. Our customers protect their critical IAM solutions and cloud environments from account takeover, insider threats, and privilege escalations.
Black Kite
Cyber Security Ratings Platform & Third Party Risk Management - TPRMBlack Kite pushes the limits on predictive insights, delivering the highest quality intelligence to help organizations make better risk decisions and improve the health and safety of the entire planet’s cyber ecosystem.
Snyk
Snyk combines the power of developer-first tooling with best-in-class security intelligence.Snyk is a developer security platform that enables application and cloud developers to secure their whole application — finding and fixing vulnerabilities from their first lines of code to their running cloud.
SentinelOne
Endpoint Detection and Response - EDR, Extended Detection and Response - XDR, Managed Detection and Response - MDR, Next Generation Anti-Virus - NGAVAt SentinelOne, we innovate. Our mission is to defeat every attack, every second, of every day. Our Singularity Platform instantly defends against cyberattacks – performing at a faster speed, greater scale, and higher accuracy than possible from any single human or even a crowd.
Invicti
Application Security SaaS SolutionsInvisti is delivering the most accurate and efficient DAST solution for DevOps/DevSecOps teams to discover and secure all the applications that run their organizations.
Acunetix
Acunetix is the top vulnerability scanner for your web applicationsAcunetix by Invicti Security is an application security testing tool built to help small & mid-size organizations around the world take control of their web security.We believe in empowering security teams to reduce risk across all types of web applications with fast scanning, comprehensive results and intelligent automation.We know the proper tools can bridge the gap between security and development to reduce tension, finger pointing, and re-work to create a culture of security.
Headquartered in Austin Texas, Invicti was founded in 2018 by bringing together Netsparker and Acunetix, two brands that prevent costly data breaches and other security incidents by identifying web vulnerabilities from the early stages of application development through production.
HackNotice
Dark Web Monitoring, Threat Intelligence and Open Source Intelligence (OSINT)
HackNotice is a threat intelligence provider that helps consumers and businesses identify and protect against potential risks and respond to hacks through real-time alerts, around the clock monitoring, and actionable recovery recommendations. Indexing up to a quarter of a billion records each day, HackNotice provides users with the information and visibility they need to protect their digital identities. Founded in 2018, HackNotice is based in Austin, TX.
Halcyon
Ransomware Protection Without the Expensive Managed ServicesHalcyon is a cybersecurity company building products that stop ransomware from impacting enterprise customers. The Halcyon Anti-Ransomware and Cyber Resilience Platform offers layered ransomware protection that combines pre-execution detection, behavioral modeling, deception techniques and, if all else fails, resiliency, recovery and isolation of impacted nodes.
Cybersixgill
Threat Intelligence SolutionsCybersixgill was founded in 2014 with a single mission: To disrupt the threat intelligence sector by improving the availability of threat intelligence from the clear, deep and dark web. Fast forward a few years and our agile, automated threat intelligence solutions are helping security teams fight cyber crime and minimize their risk exposure by detecting phishing, data leaks, fraud and vulnerabilities, while amplifying incident response – all in real-time.
Cybersixgill captures, processes and alerts teams to emerging threats, TTPs, IOCs and their exposure to risk as it surfaces on the clear, deep and dark web.
ForeScout
Microsegmentation and Network Segmentation SoftwareForescout delivers automated cybersecurity across the digital terrain. We empower our customers to achieve continuous alignment of their security frameworks with their digital realities, across all asset types – IT, IoT, OT and IoMT. It is a non-stop journey, managing cyber risk through automation and data-powered insights.
The Forescout Platform provides complete asset visibility of connected devices, continuous compliance, network segmentation, network access control and a strong foundation for zero trust. For more than 20 years, Fortune 100 organizations and government agencies have trusted Forescout to provide automated cybersecurity at scale. Forescout customers gain data-powered intelligence to accurately detect risks and quickly remediate cyberthreats without disruption of critical business assets.
Trustwave
A global cybersecurity leader in managed detection and response (MDR) and managed security services (MSS).At the core of Trustwave’s MDR service is our cloud-native security operations platform. The Trustwave Fusion platform is purpose built for rapid threat detection and response with seamless integration to your security tools, your team, and our cyber experts.
A full range of service offerings, including flexible managed security, industry-leading technologies and tailored consulting engagements, to help you solve threat challenges and close data protection gaps.
Panorays
Third-Party Risk Management - TPRM SoftwarePanorays is dedicated to eliminating third-party security risk so that companies worldwide can quickly and securely do business together.
We automate, accelerate and scale customers’ vendor security evaluation and risk management process.
Safe Security
Cyber Risk Quantification - CRQ SoftwareSafe Security is a global leader in cybersecurity and digital business risk quantification. With SAFE, we are managing cyber risk posture of Fortune 500 companies. Explore our journey since our inception in 2012.
Our mission is to become the de-facto industry standard to measure, manage, and transfer cyber risk.
Cyber security has always been measured in subjective siloes. With the growing sophistication of cyber attacks, cybersecurity through generic red-amber-green heat maps is not enough. We are at the epicenter of solving this problem through our enterprise-wide, objective, unified and real-time cyber risk quantification platform called SAFE.
Searchlight Cyber
Threat Intelligence, Dark Web Monitoring, and Open Source Intelligence (OSINT)Built in collaboration with government agencies, Cerberus our dark web investigation platform has been used in some of the world’s largest dark web investigations to bring perpetrators to justice.
In 2021 we expanded our international presence with our US headquarters in Washington DC.
2022 saw the launch of our dark web monitoring solution, DarkIQ, and has seen us continue our mission and afford enterprise, MSSPs, government and law enforcement agencies an unmatched toolset in their fight against criminal activity on the dark web.
ThreatConnect
Cyber Risk Quantification - CRQ SoftwareThreatConnect enables threat intelligence operations, security operations, and cyber risk management teams to work together for more effective, efficient, and collaborative cyber defense and protection. With ThreatConnect, organizations infuse ML and AI-powered threat intel and cyber risk quantification into their work, allowing them to orchestrate and automate processes to get the necessary insights and respond faster and more confidently than ever before.
Axio
Cyber Risk Quantification - CRQ SoftwareAxio is the leader in SaaS-based cyber management software, which empowers security leaders to build and optimize security programs and quantify risk in financial terms. Axio360 is the only cyber risk management platform to align security leaders, business leaders, and Boards of Directors around a single source of truth about their most critical corporate risks. Since 2016, Axio has been a trusted partner to many of the world’s leading critical infrastructure, energy, manufacturing, and financial services companies, helping drive better visibility and decision-making about cybersecurity priorities and investments
Axio focuses on key areas of your enterprise that represent the highest risk so you can budget wisely, improve cyber resilience, and demonstrate duty of care. The Axio360 platform is a decision-making engine for holistic cyber risk management, including cybersecurity assessments, cyber risk quantification (CRQ), risk transfer, and cyber insurance analysis.
Cado Security
The provider of the first cloud forensics and incident response platformCado Security is the provider of the first cloud forensics and incident response platform. By leveraging the scale and speed of the cloud, the Cado platform automates forensic-level data capture and processing across cloud, container, and serverless environments. Only Cado empowers security teams to respond at cloud speed.
DeleteMe
DeleteMe makes it quick, easy and safe to remove your personal data online.Our founders, Rob Shavell and Eugene Kuznetsov created DeleteMe in 2010 when they realized the difficulty of navigating privacy issues in today’s interconnected and digital world. Rob Shavell and Eugene Kuznetsov created DeleteMe in 2010 when they realized the difficulty of navigating privacy issues in today’s interconnected and digital world.
DeleteMe is a hands-free subscription service that will remove your personal information that’s being sold online.
District 4 Labs
Threat Intelligence, Dark Web Monitoring and Open-Source Intelligence (OSINT)DISTRICT 4 LABS is a cutting-edge data business dedicated to building the open-source intelligence (OSINT) tools and technologies of tomorrow. We are proud to announce our flagship product: DARKSIDE. One of the world’s largest repositories of compromised records, DARKSIDE is used by corporate investigators, intelligence analysts, and cyber consultants to mitigate risk and uncover critical intelligence.
CyberClan
Digital Forensics and Incident Response Retainer Services - DFIR Service - Incident Response - IR ServicesCyberClan provides Digital Forensics and Incident Response Retainer Services, DFIR Services, and Incident Response - IR Services.
Red Canary
Managed Detection and Response (MDR)Red Canary provides Managed Detection and Response - MDR Services
Cisco
Cisco Security Platform - Amp, Duo, Umbrella, Network Security, User and Endpoint Security, Cloud Edge, Firewalls and moreCisco Secure provides seamless interoperability with third-party technologies through a broad portfolio of technologies that work together. As a result, visibility is unified, automation is automated, and defenses are strengthened. Using the Cisco SecureX platform, the products listed below enable a secure network, endpoints, cloud edge, and applications.
Oasis Security
Identity Access Management Security - IAM SecurityIdentity Access Management Security - IAM Security
End-to-End Identity Security Platform
Continuous Identity Discovery of privileged identities known as nonhuman identities (NHIs)
Onspring
Governance, Risk and Compliance Software Platform - GRC SoftwareOnspring is a Governance, Risk and Compliance Software Platform (GRC) that helps your business manage risk.
RiskLens
Cyber Risk Quantification - CRQ SoftwareRiskLens is a Cyber Security Risk Quantification - CRQ Software Vendor.
RiskLens offers quantitative cyber risk management solutions built on the FAIR™ standard.
Kroll
Incident Response - IR ServicesKroll is a leader in Cyber Security Incident Response (IR) Services. Kroll provides clients with risk and financial advisory solutions based on unique insights, data and technology. Their team of more than 6,500 professionals worldwide continues the firm's nearly 100-year history of trusted expertise.
AttackIQ
Breach and Attack Simulation - BAS SoftwareAttackIQ is a Breach and Attack Simulation - BAS Software Vendor.
Cyberint
Threat Intelligence - Dark Web Monitoring - Attack Surface Management - ASMQualys
Vulnerability Management Detection and Response - VMDRQualys is best known for their Vulnerability Management Detection and Response - VMDR software.
BreachAware
Dark Web MonitoringIn order to prevent cyber crime and manage risks, BreachAware® software provides organizations across the world with advanced analysis of compromised assets within data breaches through their dark web monitoring software.
Veeam
Backup - Backup as a Service - Microsoft 365 Backups - Backup & Recovery - Data ProtectionVeeam is best known as an enterprise backup software vendor.
BlackCloak
Digital Executive Protection Platform - Protect Corporate Executive and High-Profile Individuals from cybersecurity, privacy, financial, and other reputational risks.BlackCloak is the cyber security industry's first Digital Executive Protection platform for Executives and High-Profile Individuals.
TechSlayers
Digital Executive Protection Services, Penetration Testing, PenTest Services, Automated PenTestingTechSlayers provides Digital Executive Protection Services, Penetration Testing, PenTest Services, and Automated PenTesting services.
GROUP-IB
Digital Forensics and Incident Response Retainer Services - DFIR Service - Incident Response - IR ServicesGROUP-IB provides Digital Forensics and Incident Response Retainer Services, DFIR Services, and Incident Response - IR Services.
X-Analytics
Cyber Risk Quantification - CRQ, Risk Management Solution, SEC Cyber Disclosure Tool, Cyber Security Insurance ToolBy integrating enterprise cybersecurity strategy with risk management strategy, X-Analytics informs strategic decision-making through cyber risk analytics. By using X-Analytics®, organizations can better understand and manage cyber risks.
CyberFOX
Privileged Access Management - PAM, Password Manager, Identity Access Management - IAMCyberFOX provides global cybersecurity SaaS solutions, including privileged access management (PAM) and password management. Password Boss for Password Management and AutoElevate for PAM (Privileged Access Management) are the company's flagship products.
Elisity
Microsegmentation and Network Segmentation Security SoftwareElisity is a Microsegmentation and Network Segmentation Security Cloud, SaaS and Software security vendor.
Cymulate
Breach and Attack Simulation - BAS Software, Attack Surface Management - ASM and Continuous PenTestingCymulate was founded by an elite team of former IDF intelligence officers and leading cyber researchers who have dedicated their careers to empowering organizations worldwide against threats and making advanced cybersecurity as simple and familiar as sending an e-mail. Today, Cymulate is trusted by hundreds of companies worldwide, including leading healthcare and financial services.
IBM Security
Enterprise Cyber Security Solutions: SIEM, SOAR, EDR, Insider Threat, Identity Access Management - IAM, Attack Surface Management - ASMWith IBM Security®, you will benefit from advanced and integrated enterprise cybersecurity solutions and services infused with artificial intelligence. CYBER BUYER is an authorized IBM Security Reseller.
HackerOne
Penetration Test, PenTest and Bug BountyHackerOne makes the internet a safer place. Organizations can access the world's largest community of hackers through HackerOne, the trusted hacker-powered security platform. Using the most comprehensive database of vulnerability trends and industry benchmarks, the hacker community mitigates cyber risk by searching, finding, and safely reporting real-world security weaknesses across industries and attack surfaces. Among our customers are the U.S. Department of Defense, Dropbox, General Motors, GitHub, Goldman Sachs, Google, Hyatt, Lufthansa, Microsoft, MINDEF Singapore, Nintendo, PayPal, Qualcomm, Slack, Starbucks, Twitter, and Verizon Media.
Vicarius
Autonomous Vulnerability Remediation Platform, Vulnerability Management, Patch Management and Network ScanningVicarius develops an autonomous vulnerability remediation platform to help security teams protect their assets against software exploitation. Consolidating vulnerability assessment, prioritization, and remediation, Vicarius strengthens cyber hygiene and proactively reduces risk.
Valence Security
SaaS Security - SaaS Security Posture Management - SSPMValence is the first SaaS security company to combine SSPM and advanced remediation with business user collaboration to find and fix SaaS security risks. SaaS applications are becoming decentrally managed and more complex, which is introducing misconfiguration, identity, data, and SaaS-to-SaaS integration risks. The Valence SaaS Security Platform provides visibility and remediation capabilities for business-critical SaaS applications such as Microsoft 365, Google Workspace, Salesforce, GitHub and Slack. With Valence, security teams can empower their business to securely adopt SaaS. Valence is backed by leading cybersecurity investors like Microsoft’s M12 and YL Ventures, and is trusted by leading organizations.
DocuSign
E-Signature SaaS SoftwareDocusign brings agreements to life. Over 1.5 million customers and more than a billion people in over 180 countries use Docusign solutions to accelerate the process of doing business and simplify people’s lives. With intelligent agreement management, Docusign unleashes business critical data that is trapped inside of documents. Until now, these were disconnected from business systems of record, costing businesses time, money, and opportunity. Using Docusign IAM, companies can create, commit, and manage agreements with solutions created by the #1 company in e-signature and contract lifecycle management (CLM).
Todyl
MXDR - Managed eXtended Detection and Response, SASE - Secure Access Service Edge, SIEM - Security Information and Event Management, SOAR - Security Orchestration, Automation & Response, EDR - Endpoint Detection and Response, GRC - Governance Risk and ComTodyl is a Managed eXtended Detection and Response (MXDR) security platform who provides a full suite of managed security products and services.
Miggo
Application Detection and Response, App Detection and Response, AppSec, App Security, Application SecurityMiggo is a platform for Application Detection and Response (ADR). The application layer accounts for 80% of all cyber incidents, yet existing tools are blind to the actual behavior of applications. With Miggo, you can map how applications actually operate in runtime, identify high-risk application flows, find weak spots, and provide real-time detection and response capabilities.
HiddenLayer
A.I. Detection and Response, A.I. Application Security, A.I. Security, AI Security, Artificial Intelligence Security, AISEC Platform, A.I. Model ScannerHiddenLayer is a Gartner-recognized AI Application Security company that provides security solutions for artificial intelligence algorithms, models and data. HiddenLayer helps protect the world's most valuable technologies by developing first-of-its-kind, non-invasive software to observe and secure AI. HiddenLayer was founded in Austin, Texas, in March of 2022 by experienced professionals in security and artificial intelligence.
Vercara
DDoS Mitigation and Protection Services, DNS Service Provider, Cloud/IT Security, DNS Services, DDoS Attack Protection, Network and Application Security, Authoritative DNS, UltraPlatform and Recursive DNSWith Vercara's purpose-built, global cloud security platform, businesses can safeguard their online presence from any attack, regardless of where it comes from. In order to protect revenue and reputation, organizations must employ security solutions that are flexible enough to adapt to their unique needs, easily scalable, and able to evolve as their businesses do. By protecting networks and applications against threats and downtime, Vercara ensures that businesses and their customers have exceptional interactions all the time. Best known for their DDoS Attack Protection, DNS Security and WAF security platform and their company started as a security division of Neustar, Inc.
Senteon
CIS Controls Compliance, CIS Compliance Automation, Continuous Compliance Platform, Gap Assessment Tool for Compliance that comes with Remediation via CIS, Automated Remediation of CIS Controls and Compliance, Compliance & Frameworks, CIS Controls CompliaSenteon automates the deployment of 400+ security configurations, resulting in unmatched operational efficiency, accuracy, and cost savings. With cybersecurity insurance, it is essential to prove adherence to policy guidelines. With Senteon, you get more than just hardening - you get validation as well. We provide insurers with the empirical evidence they require, streamlining your approval process. Beyond compliance, Senteon aims for mastery with its Cross-Compliance Mapping. In addition to NIST 800-53, NIST 800-171, NIST CSF, FFIEC-CAT, PCI-DSS, SOC2, and CMMC, we adhere to global standards.
Reco ai
SaaS Security, SaaS Security Posture Management - SSPM, Shadow SaaS DiscoveryReco AI offers comprehensive SaaS security solutions. In addition to helping organizations discover SaaS applications, identities, and data, it also allows them to control access and prevent risks associated with exposure. Reco uses advanced analytics around personas, actions, interactions, and relationships, and alerts on exposures caused by misconfigurations, over-permission users, compromised accounts, and risky user behavior. A security team's insight allows them to mitigate risk quickly. In addition to the company's leadership team, the company's cybersecurity and counterintelligence teams bring expertise and innovation. Top-tier investors such as Insight Partners, Zeev Ventures, BoldStart Ventures, and Angular Ventures have backed Reco, which has established partnerships with Wiz, Palo Alto Networks, and Torq.
AccuKnox
Zero Trust CNAPP, Cloud Native Application Protection Platform - CNAPP, Cloud Security Posture Management - CSPM, Kubernetes Security, Container Security, Runtime SecurityWith AccuKnox's CNAPP platform, you can protect your cloud native applications without sharing your sensitive data. Founded in partnership with Stanford Research Institute (www.sri.com), AccuKnox is a pioneer in container security, anomaly detection, and data provenance. AccuKnox can be deployed in both public and private cloud environments. Seed funding for AccuKnox has been provided by SRI, National Grid Ventures, z5Capital, and Outliers.vc.
SeeMetrics
Cyber Security Performance Dashboard, Cyber Security Stack Management and CISO DashboardA simple interface integrates security data and business objectives with SeeMetrics automated cybersecurity performance management platform. The metrics provide precise and comprehensive insights based on data from the stack, enabling security leaders to make data-driven decisions, explain them quickly, and drill down to the details. They are fed directly from the stack. Cybersecurity Performance Dashboard, Cybersecurity Stack Management and CISO Dashboard.
CyberMaxx
Managed Detection and Response - MDR, MDR, Managed Devo SIEM ServicesCyberMaxx offers managed detection and response (MDR) managed security services that can prevent, detect, and respond to cyber attacks. They are equipped with a 24/7/365 security operations center and a cybersecurity team so you can spend your time focusing on what matters most by increasing compliance, eliminating talent shortages, and staying out of the headlines with our managed security services. They offer around-the-clock monitoring and early threat warnings are backed by years of experience protecting customers from advanced cybersecurity threats as they change.
OX Security
AppSec Posture Management - ASPM, Application Security, AppSec, Continuous CI/CD Security, Code Security, SBOM SecurityBy providing visibility and traceability, contextualized prioritization, and automated response throughout the software development lifecycle, OX Security's Active ASPM platform unifies AppSec practices and prevents risks. By eliminating manual practices and embracing scalable, secure development, the platform goes beyond traditional AppSec solutions.
Nametag Inc.
MFA Resets, Multi-Factor Authentication - MFA, Identity Access Management - IAM, Passwordless MFA and Help Desk Identity VerificationNametag is the only identity verification platform designed for self-service account recovery and helpdesk verification. Nametag works with your existing IAM and MFA infrastructure to quickly and securely verify your users during critical moments like password and MFA resets, employee onboarding, and high-risk transactions. Nametag's unique identity verification technology combines mobile cryptography, facial biometrics, and other advanced security technologies to shut down critical threat vectors, such as digital injections and deepfakes.
Optimize Cyber Security
Cyber Security Audit, Penetration Testing and Vulnerability AssessmentsThe Optimize Cyber team possesses deep knowledge of information security, technology, and risk management. Optimize Cyber uses this expertise to craft concise and practical solutions that help protect your business: The Rapid Security Audit™: Fortify your security program with a revolutionary approach that rapidly identifies your most critical cybersecurity risks. Make real progress in reducing cyber risk by focusing on the most impactful security priorities. - HIPAA Module: Supplemental to the Rapid Security Audit™, companies gain an understanding of how the organization measures against the privacy and governance requirements of HIPAA and a roadmap to improvement. - Financial Institution Module: Enhance your Financial Institution’s security and privacy program while better aligning with regulatory compliance. Proactive Security: Uncover weak points and see the impact of a cyber-attack, and how to best protect against them through vulnerability assessment and penetration testing.
SonicWall
Next-Generation Firewall - NGFW, Network Security, Secure SD-WAN, Zero Trust Network Access - ZTNA, Managed XDR, Managed Detection and Response - MDR, Endpoint Detection and Response - EDR, Email Security, Virtual Private Network - VPNElite Technical Concierge
Executive Coaching, Training, & Leadership Keynote Workshops and PresentationsElevate your Teams and Dreams with Executive Coaching, Training, & Leadership Keynote Workshops/Presentations.
Elite Technical Concierge led by Mel Rico Reyes trains and coach aspiring and stressed CEOs, CISOs, CIOs, CFOs, leaders, entrepreneurs, and their teams. We help them transition to 10x their lives and careers.
SafeBreach
Breach and Attack Simulation - BAS, BAS, Continuous Threat Exposure Management - CTEM, CTEM, Ransomware AssessmentA leader in breach-and-attack simulation (BAS) and the most widely used platform for continuous security validation, SafeBreach combines the mindset of a CISO with the toolset of a hacker. SafeBreach continuously executes attacks, correlates results to highlight security gaps, and utilizes contextual insights to highlight remediation efforts. With their Hacker’s Playbook™, and arguably the industry’s most extensive collection of attack data enabled by state-of-the-art threat intelligence research, SafeBreach empowers organizations to get proactive about security with a simple approach that replaces hope with data.
Cyera
Data Security, Data Security Posture Management - DSPM, Data Detection and Response - DDR, Data Discovery and Classification, Data PrivacyCyera enables businesses to gain control over their most valuable asset: data. In addition to providing instant visibility into sensitive data, Cyera provides context on how it represents risks and their security exposure, as well as automated remediation, reducing the attack surface and ensuring operational resilience as a pioneer in Data Security Posture Management (DSPM). Cyear is redefining how data is protected.
SOCRadar
Dark Web Monitoring, Threat Intelligence, Attack Surface Management (ASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI)The SOCRadar SaaS platform combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI). Using SOCRadar, organizations can maximize the effectiveness of their SOC teams by providing free, actionable, and contextualized threat intelligence.
Chronosphere
SIEM Log Cost Reduction, SIEM, SIEM Efficiency, SIEM Log Management, Observability PlatformLooking to lower your SIEM Log Spend. Do you have SPLUNK and are tired of the increased costs?
Chronosphere is an observability platform designed for modern, containerized environments. Data complexity is reduced, costs are optimized, and issues can be remedied more quickly so our customers can focus on what matters - data and insights. By reducing data volumes and associated costs by 60%, Chronosphere's Observability Platform saves developers thousands of hours each year. With Fluent Bit-based Telemetry Pipeline, you can optimize and simplify data logging and observability. By transforming logs at the source, the product routes them to any destination without locking them in. Chronosphere is trusted by the world's most innovative brands, including Snap, Robinhood, DoorDash, and Zillow, which have been rated as leaders by major analyst firms.
Dazz
Application Security Posture Management - ASPM, Application Security - AppSec, Continuous Threat and Exposure Management - CTEM, DevSecOps, Vulnerability ManagementThe Dazz platform delivers unified security remediation for fast-moving security and development teams. Using developer-friendly workflows, we identify code flaws and infrastructure vulnerabilities, cut through the noise, prioritize issues, and deliver fixes to owners. Thus, Dazz customers can reduce exposure in hours instead of weeks by streamlining their remediation processes. This is why Dazz has become the industry standard for APM, CTEM, and DevSecOps practices.