CTOs on the Move

Endgame

www.endgame.com

 
Endgame`s converged endpoint security platform is transforming security programs - their people, processes and technology - with the most powerful endpoint protection and simplest user experience, ensuring analysts of any skill level can stop targeted attacks before information theft. Endgame unifies prevention, detection, and threat hunting to stop known and unknown attacker behaviors at scale with a single agent.
  • Number of Employees: 100-250
  • Annual Revenue: $10-50 Million
  • www.endgame.com
  • 3101 Wilson Boulevard Suite 500
    Arlington, VA USA 22201
  • Phone: 703.650.1250

Executives

Name Title Contact Details
James Butler
Chief Technology Officer Profile

Similar Companies

Terbium Labs

At Terbium Labs, we know that sensitive data will always be at risk. That’s why we developed Matchlight, the world’s first fully private, fully automated Dark Web Data Intelligence System. We monitor the dark web for your private data fingerprints and notify you immediately if even a trace of your information shows up where it shouldn’t. With fingerprint monitoring and automated tracking for key terms and patterns, such as email addresses or payment card numbers, we can protect your brand, customers, and employees without you having to reveal any information to us. Let us help protect your sensitive data and intellectual property.

Secude Global Consulting

Secude Global Consulting is a Dawsonville, GA-based company in the Computers and Electronics sector.

Visium Technologies

Visium Technologies, is making TruContext (enhanced CyGraph) available to commercial customers for the first time. CyGraph was developed by MITRE Corporation. CyGraph is a comprehensive, scalable, high performance system for analyzing network attack relationships to provide actionable information. CyGraph is currently widely used within the Federal government to secure our country`s networks.

Virsec

Virsec revolutionizes cyber security by detecting and remediating previously “indefensible” advanced memory-based attacks on critical applications and server endpoints. Using patented, non-signature based technology, Virsec is able to protect applications “full-stack” — from the memory to web layer — without generating false positives, a huge win for security teams drowning in bells and alarms or using needle in a haystack approaches. Our deterministic Trusted Execution™ approach provides runtime application visibility and protection at the CPU-level and in memory to ensure real-time detection and remediation in microseconds. Virsec is unique in its ability to detect file-less, memory corruption and even ROP chain attacks on server endpoints, as well as protecting web applications against web application attacks in one unified platform. This unprecedented level of cyber security breadth and depth enables enterprises to release applications faster and achieve advanced hacking protection, with full assurance of protection against zero-day or unidentified vulnerabilities.

KLC Consulting

KLC Consulting has over 20 years of Information Security and IT Audit services experience. We have also created the first network address changer for Windows with over 1.5 million users. Our mission is to enable federal and state government and fortune 1000 companies to secure the IT environment and reduce risks. Our experience covers different industries including government, defense, financial services, retail and aerospace.