CTOs on the Move

Awake Security

www.awakesecurity.com

 
Awake Security provides the only advanced security analytics solution that delivers deep visibility and answers to questions that cannot even be asked today, improving productivity tenfold. The company`s patent-pending Security Knowledge Graph™ data model uses machine learning and data science to automate painstaking analyses expert investigators perform. It identifies and tracks network entities as humans think of them and highlights entity attributes, relationships, behaviors and activities. This enables analysts to proactively detect, hunt, investigate and respond to threats. Awake is built on a foundation of more than two years of research with hundreds of security professionals and more than a ...
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Funding

Awake Security raised $31M on 07/17/2017
Awake Security raised $36M on 04/15/2020

Similar Companies

Avenda Systems

Avenda Systems is a Santa Clara, CA-based company in the Computers and Electronics sector.

Securitas Security Services USA

Securitas Security Services USA is a Bothell, WA-based company in the Computers and Electronics sector.

Safeguard Security and Surveillance Inc

Safeguard Security and Surveillance Inc is a Windsor Locks, CT-based company in the Computers and Electronics sector.

ZeroNorth

ZeroNorth is the only company to deliver risk-based vulnerability orchestration across applications and infrastructure. By orchestrating scanning tools across the entire software lifecycle, ZeroNorth provides a comprehensive and continuous view of risk, and reduces costs associated with managing disparate technologies. ZeroNorth empowers customers to rapidly scale application and infrastructure security, while integrating seamlessly into developer environments to simplify and verify remediation.

GreatHorn

Built on a foundation of machine learning and automation, GreatHorn delivers the industry`s most effective and comprehensive email security solution, and can be deployed and operational in less than 5 minutes. With its proprietary dataset built from hundreds of millions of uniquely analyzed threats, GreatHorn combines the intelligence, fidelity and precision necessary to prevent attacks from becoming breaches.