| Name | Title | Contact Details |
|---|
Computer Security Consulting is a Warrensburg, MO-based company in the Computers and Electronics sector.
lllusive continuously discovers and automatically remediates privileged identity risks that are exploited in all ransomware and other cyberattacks. Despite best-practice investments to protect identities, including deployment of PAM and MFA, 1 in 6 enterprise endpoints holds exploitable identity risks. Illusive makes it easy for security teams to get visibility into the vulnerable identities sprawled across an organization`s endpoints and servers, then eliminate them or deploy deception-based detection techniques as a compensating control to stop attackers. Illusive has participated in over 140 red team exercises and has never lost one! Founded by nation state attackers, Illusive`s technology is trusted by large global financial companies, retailers, services organizations, and pharmaceutical companies.
Awake Security provides the only advanced security analytics solution that delivers deep visibility and answers to questions that cannot even be asked today, improving productivity tenfold. The company`s patent-pending Security Knowledge Graph™ data model uses machine learning and data science to automate painstaking analyses expert investigators perform. It identifies and tracks network entities as humans think of them and highlights entity attributes, relationships, behaviors and activities. This enables analysts to proactively detect, hunt, investigate and respond to threats. Awake is built on a foundation of more than two years of research with hundreds of security professionals and more than a dozen security teams.
Noname Security is the creator of the most powerful, complete, and easy-to-use API security platform, used by Fortune 500 companies to discover, analyze, remediate, and test their legacy and modern APIs. Noname is privately held, with headquarters in Palo Alto, California, and an office in Tel Aviv.
Deep Instinct is the first company to apply deep learning to cybersecurity. Deep learning is inspired by the brain`s ability to learn. Once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct`s artificial brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. As a result, zero-day and APT attacks are detected and prevented in real-time with unmatched accuracy. Deep Instinct brings a completely new approach to cybersecurity that is proactive and predictive. Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization`s endpoints, servers, and mobile devices. Deep learning`s capabilities of identifying malware from any data source results in comprehensive protection on any device, any platform, and operating system.