CTOs on the Move

HAWK Network Defense

www.hawkdefense.com

 
HAWK Defense provides an innovative Big Data Security Analytics(BDSA) platformthat allows enterprisesto maketimely, well-informed security decisions from the ever-growing aggregations of logged data. Hawk’seyeConsoftware solution bridges the gap between legacy SIEM and Big Data Analytics with a massively scalable architecture that delivers high-speed data ingestion and a highly efficient patented analytics engine. HAWK Defense customers benefit from rapid installation and setup times, simple administration, out-of-the-box analytics, and dynamic threat intelligence feeds. TheeyeConsolution supports the securityanalyst a ‘single pane of glass’with insight to indicators of compromise that were previously undetectable, support to validate, prioritize, and respond to increasingly sophisticated cyber threats. ...
  • Number of Employees: 25-100
  • Annual Revenue: $0-1 Million
  • www.hawkdefense.com
  • 5057 Keller Springs Road Suite 300
    Dallas, TX USA 75001
  • Phone: 888.919.4295

Executives

Name Title Contact Details

Similar Companies

Strider Technologies

Strider is revolutionizing the way companies, governments, and research institutions protect their innovation and compete in a new era of strategic competition. Our trailblazing technology and intelligence solutions enable customers to proactively visualize, manage, and respond to state-sponsored IP theft and supply chain vulnerabilities.

Informatec

Informatec LLC is a Prairie Village, KS-based company in the Computers and Electronics sector.

CyberSurfers

CyberSurfers is a Vienna, VA-based company in the Computers and Electronics sector.

TXOne

TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.

Zentry Security

Founded in 2019, Zentry Security provides streamlined, secure, zero-trust application access for small-to-medium enterprises with dispersed and remote workforces. Zentry Trusted Access delivers zero trust secure access from any device to any application or resource -- on-premises or in the cloud -- using simple adaptive policies for complete visibility and control. Organizations realize faster access, reduced attack surface, better compliance, and greater visibility into users and applications.