Cyber Security Solutions by Vendor

Authomize

https://www.authomize.com

https://www.linkedin.com/company/authomize/

Authomize enables identity-first security by detecting, investigating, and responding to identity and access threats. You can protect your cloud services and applications from account takeovers, privilege escalations and identity-based attacks. Authomize provides observability, actionable insights, and remediation automation, enabling adherence to security and compliance requirements. 

Bugcrowd

https://www.bugcrowd.com/

https://www.linkedin.com/company/bugcrowd/

Bugcrowd is a crowdsourced security company that safeguards organizations’ assets from sophisticated threat actors before they can strike—by uniting our customers with trusted hackers via our AI-powered platform to take back control and stay ahead of attackers.

Cisco Umbrella

https://umbrella.cisco.com

https://www.linkedin.com/products/cisco-umbrella/

Cisco Umbrella is cloud-delivered enterprise network security which provides users with a first line of defense against cyber security threats.

Cloudflare

https://www.cloudflare.com/

https://www.linkedin.com/company/cloudflare/

Cloudflare allows organizations to make their employees, applications and networks faster and more secure everywhere, while reducing complexity and cost.

Cloudflare’s connectivity cloud delivers the most full-featured, unified platform of cloud-native products and developer tools, so any organization can gain the control they need to work, develop, and accelerate their business.

Powered by one of the world’s largest and most interconnected networks, Cloudflare blocks billions of threats online for its customers every day. It is trusted by millions of organizations – from the largest brands to entrepreneurs and small businesses to nonprofits, humanitarian groups, and governments across the globe.

Cloudflare Spectrum increases TCP and UDP security and prevents DDoS attacks for gaming, mail, SSH, and other services.

Cloudflare Registrar securely registers and manages your domain names with transparent, no-markup pricing that eliminates surprise renewal fees and hidden add-on charges. You pay what we pay — you won’t find a better value.

Cohesity

https://www.cohesity.com

https://www.linkedin.com/company/cohesity/

Cohesity helps organizations simplify, secure, and manage their data, while unlocking limitless value. As a leader in data security and management, they make it easy to secure, protect, manage, and derive value from data—across the data center, edge, and cloud.

Cribl

https://cribl.io

https://www.linkedin.com/company/cribl/

Cribl makes open observability a reality for today’s tech professionals.

Their products are built around protocols and standards, and then transformed to vendor-specific formats if needed. You can connect any source, and send that data to any system of analysis – or to multiple destinations.

Cribl puts you in full control of your observability data, providing data management that allows you to optimize the treatment of each of your data sources and destinations.

You can use Cribl’s data filtering to strain valuable data from the stream and enrich it – all in real-time. Eliminate duplicate fields, null values, and any elements that provide little analytical value.

Crowdstrike

https://www.crowdstrike.com/

https://www.linkedin.com/company/crowdstrike/

CrowdStrike protects critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.

Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.

Cyberark

https://www.cyberark.com

https://www.linkedin.com/company/cyber-ark-software/

CyberArk focuses on privileged access management across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle.

CyberArk secures enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets. They prevent attack escalation before irreparable business harm is done. At a time when auditors and regulators are recognizing that privileged accounts are the fast track for cyber attacks and demanding stronger protection, CyberArk helps enforce compliance and audit requirements while arming businesses to protect what matters most.

Deep Instinct

https://www.deepinstinct.com

https://www.linkedin.com/company/deep-instinct/

Deep Instinct takes a prevention-first approach to stopping ransomware and other malware using the world’s first and only purpose-built, deep learning cybersecurity framework. Deep Instinct prevents unknown threats faster and with greater efficacy than any other security solution, ensuring malware never executes in your environment.

Graylog

https://graylog.org/

https://www.linkedin.com/company/graylog/

Graylog delivers Threat Detection & Incident Response (TDIR) solutions, backed by the Graylog API security platform. They are a centralized log management (CLM) and Security Information Event Management (SIEM) provider, and have log analysis capabilities in critical areas such as security, compliance, operations, and DevOps.

With Graylog, you can capture, store, and analyze terabytes of machine data in near-real time. Their open-source product allows individuals and small teams to perform basic log consolidation, analysis, and search functions at no cost.

HackerOne

https://www.hackerone.com/

https://www.linkedin.com/company/hackerone/

HackerOne is a hacker-powered security platform, giving organizations access to the largest community of hackers on the planet. Armed with the most robust database of vulnerability trends and industry benchmarks, the hacker community mitigates cyber risk by searching, finding, and safely reporting real-world security weaknesses for organizations across all industries and attack surfaces.

Hashicorp Vault

https://www.vaultproject.io/

https://www.linkedin.com/products/hashicorp-vault/

HashiCorp Vault is the world’s most widely used multi-cloud security automation product with millions of users globally. Whether you’re deploying to AWS, Azure, GCP, other clouds, or an on-premises datacenter, Vault is an Identity-based Security solution that leverages trusted sources of identity to authenticate and access different clouds, systems, and endpoints. With Vault, you can centrally store, access, and deploy secrets (API keys, credentials, etc.). It also provides a simple workflow to encrypt data in flight and at rest.

Huntress

https://www.huntress.com/

https://www.linkedin.com/company/huntress-labs/

The Huntress Managed Security Platform stops advanced cyberattacks and finds hackers hiding in your environments. They provide managed endpoint detection and response (EDR) backed by a global security operations team.

Detailed incident reports are provided, along with assisted remediation that makes it easy for teams to respond to security incidents

They incorporate antivirus, ransomware detection, and host isolation to strengthen protection and swiftly respond to active threats, along with security Awareness Training (SAT) to help employees know what to look out for.

Infoblox

https://www.infoblox.com

https://www.linkedin.com/company/infoblox/

Infoblox provides real-time visibility and control over who and what connects to the network, we use intelligent DNS and user context to stop threats, enabling organizations to build safer, more resilient environments. They support over 13,000 customers, including 92 of Fortune 100 companies.

Netskope

https://www.netskope.com/

https://www.linkedin.com/company/netskope/

Netskope, helps organizations apply Zero Trust principles to protect data.

The Netskope Intelligent Security Service Edge (SSE) platform is fast, easy to use, and secures people, devices, and data anywhere they go. Netskope helps you get visibility into any cloud, web, and private application activity.

Okta

https://www.okta.com/

https://www.okta.com/

Okta is a customizable, secure, drop-in solution to add authentication and authorization services to your applications. Get you build authentication right into your applications without development overhead, security risks, and maintenance that come from building it yourself.

Orca Security

https://www.orca.security

https://www.linkedin.com/company/orca-security/

Orca Security provides agentless cloud security. Their cloud security platform identifies, prioritizes, and remediates security risks and compliance issues across AWS, Azure, Google Cloud and Kubernetes.

Salt Security

https://salt.security/

https://www.linkedin.com/company/saltsecurity/

Salt Security protects the APIs that form the core of every modern application. Its patented API Protection Platform is the only API security solution that combines the power of cloud-scale big data and time-tested ML/AI to detect and prevent API attacks.

By correlating activities across millions of APIs and users over time, Salt delivers deep context and actionable intelligence with real-time analysis and continuous insights for API discovery, attack prevention, and shift-left practices.

Deployed quickly and seamlessly integrated within existing systems, the Salt Security platform gives customers immediate value and protection, so they can innovate with confidence and accelerate their digital transformation initiatives.

By delivering context-based insights across the entire API lifecycle, Salt enables users to detect the reconnaissance activity of bad actors and block them before they can reach their objective. Through its unique API Context Engine (ACE) architecture, the Salt platform provides design analysis in pre-production, discovers all APIs, pinpoints and stops API attackers, and provides remediation insights.

Shodan

https://www.shodan.io/

https://www.linkedin.com/company/shodan/

Shodan is the world’s first search engine for the Internet of Things and premier provider of Internet intelligence. The Shodan platform allows organizations to monitor their network, assess 3rd-party cyber risk, gather market intelligence and understand the global Internet landscape in real-time. Our data feeds are consumed by 80+ of the Fortune 100 companies, thousands of universities and millions of users around the world.

Snyk

https://snyk.io/

https://www.linkedin.com/company/snyk/

Snyk helps developers build secure applications and equip security teams to meet the demands of the digital world. Snyk can secure all of the critical components of your applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture.

Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams.

SpecterOps

https://snyk.io/

https://www.linkedin.com/company/snyk/

SpecterOps provides adversary-focused cybersecurity solutions to help organizations understand how threat actors maneuver against them, so they can successfully defend against advanced attacks.

They replicate adversary tradecraft, harden systems against the attack cycle, and help detect current advanced threat actor activity.

Service offerings include internal program development, training courses, independent assessment options, and assessment operations support. With knowledge of the adversary, organizations are empowered to successfully prevent against devastating breaches.

Synopsys

https://www.synopsys.com/

https://www.linkedin.com/company/synopsys/

Synopsys provides the world’s most advanced tools for silicon chip design, verification, IP integration, and application security testing.

Their technology helps customers innovate from Silicon to Software, so they can deliver Smart, Secure Everything (IoT).

Sysdig

https://www.linkedin.com/company/sysdig/

https://sysdig.com

Sysdig detects changes in risk with runtime insights and open source Falco. They correlate signals across cloud workloads, identities, and services to uncover hidden attack paths and prioritize real risk.

Talon Cyber Security

https://talon-sec.com/

https://www.linkedin.com/company/talon-cyber-security/

Talon provides the first enterprise browser that was designed to secure and enable hybrid work, while reducing complexity and cost.

Talon’s secure and isolated workspace enables today’s employees, who use the browser more than any other business application, to work from anywhere and from any device, accessing enterprise resources securely from both corporate and non-corporate devices.

Talon provides enhanced security in various work scenarios such as: Remote workers, 3rd party contractors, SaaS and on-prem web-based applications, work from non-corporate devices and more.

Torq

https://torq.io

https://www.linkedin.com/company/torqio/

Talon provides the first enterprise browser that was designed to secure and enable hybrid work, while reducing complexity and cost.

Traceable

https://www.traceable.ai/

https://www.linkedin.com/company/traceable-ai/

Traceable identifies all your APIs, evaluates your API risk posture, prevents API attacks including data exfiltration and fraud, and offers advanced analytics for threat detection and forensic analysis.

Varonis

https://www.varonis.com/

https://www.linkedin.com/company/varonis/

Varonis focuses on protecting enterprise data: sensitive files and emails; confidential customer, patient, and employee data; financial records; strategic and product plans; and other intellectual property. 

The Varonis Data Security Platform detects cyber threats from both internal and external actors by analyzing data, account activity, and user behavior; prevents and limits disaster by locking down sensitive and stale data; and efficiently sustains a secure state with automation. 

Varonis products address additional important use cases including data protection, data governance, Zero Trust, compliance, data privacy, classification, and threat detection and response.

Veritas

https://www.veritas.com/

https://www.linkedin.com/company/veritas-technologies-llc/

Veritas Technologies offers multi-cloud data management. They help ensure the protection, recoverability and compliance of their data.

Veritas supports 800+ data sources, 100+ operating systems, 1,400+ storage targets and 60+ clouds through a single, unified approach. They deliver autonomous data management that reduces operational overhead.

Versa Networks

https://www.versanetworks.com

https://www.linkedin.com/company/veritas-technologies-llc/

Versa SASE connects secures enterprise branches, teleworkers, and end users securely and reliably to applications in the cloud or data centers around the world.

Versa is available via the cloud, on-premises, or as a blended combination of both.

Wiz

https://www.wiz.io/

https://www.linkedin.com/company/wizsecurity/

Wiz allows you to rapidly identify and remove the most critical risks in AWS, Azure, GCP, OCI, Alibaba Cloud and Kubernetes so they can build faster and more securely.

Scroll to Top