CTOs on the Move

Awake Security

www.awakesecurity.com

 
Awake Security provides the only advanced security analytics solution that delivers deep visibility and answers to questions that cannot even be asked today, improving productivity tenfold. The company`s patent-pending Security Knowledge Graph™ data model uses machine learning and data science to automate painstaking analyses expert investigators perform. It identifies and tracks network entities as humans think of them and highlights entity attributes, relationships, behaviors and activities. This enables analysts to proactively detect, hunt, investigate and respond to threats. Awake is built on a foundation of more than two years of research with hundreds of security professionals and more than a ...
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Funding

Awake Security raised $31M on 07/17/2017
Awake Security raised $36M on 04/15/2020

Similar Companies

Hen's Teeth Network

Hen's Teeth Network is a Saint Charles, MO-based company in the Computers and Electronics sector.

Icelab Networks

Icelab Networks is a Denver, CO-based company in the Computers and Electronics sector.

Harco Technolgy

Harco Technolgy Ltd is a Saint Paul, MN-based company in the Computers and Electronics sector.

Tigera

Tigera delivers solutions for secure application connectivity for the cloud native world. Tigera technology is used by the world`s largest enterprises and public cloud providers to power connectivity for application development and deployment and to address the connectivity and security challenges that arise in at-scale production.

Virsec

Virsec revolutionizes cyber security by detecting and remediating previously “indefensible” advanced memory-based attacks on critical applications and server endpoints. Using patented, non-signature based technology, Virsec is able to protect applications “full-stack” — from the memory to web layer — without generating false positives, a huge win for security teams drowning in bells and alarms or using needle in a haystack approaches. Our deterministic Trusted Execution™ approach provides runtime application visibility and protection at the CPU-level and in memory to ensure real-time detection and remediation in microseconds. Virsec is unique in its ability to detect file-less, memory corruption and even ROP chain attacks on server endpoints, as well as protecting web applications against web application attacks in one unified platform. This unprecedented level of cyber security breadth and depth enables enterprises to release applications faster and achieve advanced hacking protection, with full assurance of protection against zero-day or unidentified vulnerabilities.