CTOs on the Move

Endgame

www.endgame.com

 
Endgame`s converged endpoint security platform is transforming security programs - their people, processes and technology - with the most powerful endpoint protection and simplest user experience, ensuring analysts of any skill level can stop targeted attacks before information theft. Endgame unifies prevention, detection, and threat hunting to stop known and unknown attacker behaviors at scale with a single agent.
  • Number of Employees: 100-250
  • Annual Revenue: $10-50 Million
  • www.endgame.com
  • 3101 Wilson Boulevard Suite 500
    Arlington, VA USA 22201
  • Phone: 703.650.1250

Executives

Name Title Contact Details
James Butler
Chief Technology Officer Profile

Similar Companies

BJSS

BJSS is an award winning delivery-focused IT Consultancy. With over 20 years`​ software delivery and IT advisory experience we`re renowned for technical excellence, cost-effective delivery and our proven BJSS Enterprise Agile approach. Our clients include some of the world’s largest organisations including government departments, investment banks, retail banks, energy companies and financial institutions. Founded in 1993 and with offices in London, New York, Leeds, Manchester and Bristol, the company employs over 500 technologists and has established a reputation for the successful design and delivery of reliable, scalable, high-availability enterprise applications.

AttackIQ

AttackIQ, a leader in the emerging market of continuous security validation, built the industry`s first platform that enables red and blue teams to test and measure the effectiveness of their security controls and staff. An open platform, FireDrill™ supports the MITRE ATT&CK Matrix, a curated knowledge base and model for cyber adversary behavior used for planning security improvements and verifying defenses work as expected. AttackIQ`s platform is trusted by leading companies around the world. Kennedy joins AttackIQ from Bridgewater Associates where he was head of security for infrastructure technology and controls engineering and brings more than 20 years of cybersecurity risk and operations practitioner experience. Previously, Kennedy led the development of the U.S. Department of Treasury’s and the U.S. Marine Corps’ cybersecurity operations programs, defense and federal contracting for Northrop Grumman, and is a former Marine Corps Officer and Operation Iraqi Freedom veteran.

Tenable Network Security

Tenable Network Security, Inc. is a Columbia, MD-based company in the Computers and Electronics sector.

Blackpoint Cyber

Blackpoint Cyber offers the only world-class, nation state-grade cybersecurity ecosystem serving the MSP community. Using its own proprietary technology and SOC, Blackpoint`s true 24/7 Managed Detection and Response (MDR) service not only detects breaches earlier than any other solution on the market, but also provides an actual response rather than just an alert to keep your and your clients` networks safe from widespread damage.

Virsec

Virsec revolutionizes cyber security by detecting and remediating previously “indefensible” advanced memory-based attacks on critical applications and server endpoints. Using patented, non-signature based technology, Virsec is able to protect applications “full-stack” — from the memory to web layer — without generating false positives, a huge win for security teams drowning in bells and alarms or using needle in a haystack approaches. Our deterministic Trusted Execution™ approach provides runtime application visibility and protection at the CPU-level and in memory to ensure real-time detection and remediation in microseconds. Virsec is unique in its ability to detect file-less, memory corruption and even ROP chain attacks on server endpoints, as well as protecting web applications against web application attacks in one unified platform. This unprecedented level of cyber security breadth and depth enables enterprises to release applications faster and achieve advanced hacking protection, with full assurance of protection against zero-day or unidentified vulnerabilities.