CTOs on the Move


 
Barkly is Runtime Malware Defense- a completely new approach to endpoint protection. Barkly`s protection operates at runtime to provide an entirely new line of of defense that is complementary to pre-execution protection such as traditional AV and next-generation AV. Our runtime approach, which utilizes advanced machine learning, enables us to address critical threats that other solutions don`t such as fileless malware and zero-days. Barkly is the first endpoint protection solution to use a multi-tenant SaaS service combined with local endpoint protection. Through this unique approach we are able to improve the strength and quality of protection in addition to the ...
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million
  • www.barkly.com
  • 115 Broad St Fl 5
    Boston, MA USA 02110
  • Phone: 202.780.9932

Executives

Name Title Contact Details

Similar Companies

Hatteras Networks Inc

Hatteras Networks Inc is a Durham, NC-based company in the Computers and Electronics sector.

3 C Network Consultants

3 C Network Consultants is a Wellington, FL-based company in the Computers and Electronics sector.

System Of Systems Analytics

System Of Systems Analytics is a Fairfax, VA-based company in the Computers and Electronics sector.

Securosis

Securosis is the world’s leading independent security research and advisory firm, offering unparalleled insight and unique value to meet the challenges of managing security and compliance in a Web 2.0 world, while defending against APTs, script kiddies and everything in between while showing maximum ROI.

Beyond Identity

Beyond Identity is revolutionizing secure digital access for workforces, contractors, customers and developers. Our Universal Passkey Architecture provides the industry`s most secure and frictionless multi-factor authentication that prevents credential-based breaches, ensures device trust, and delivers secure and frictionless digital access, eliminating passwords entirely. Industry leaders like Snowflake, Unqork and Roblox rely on Beyond Identity to solve their access security challenges for their customers, employees, contractors and developers and to advance their journey toward Zero Trust Security.