CTOs on the Move

InZero Systems

www.inzerosystems.com

 
InZero Systems is a privately held U.S. company based in Herndon, Virginia that began operations in 2004, with the goal of providing organizations a far more effective approach to IT security than traditional security products.
  • Number of Employees: 0-25
  • Annual Revenue: $0-1 Million

Executives

Name Title Contact Details

Similar Companies

Sage Data Services

Sage Data Services is a Traverse City, MI-based company in the Computers and Electronics sector.

Zimperium

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks. Zimperium is the first and only company to provide a complete mobile security system that continuously runs on the device to provide visibility, security and management for iOS and Android devices. With its non-intrusive approach, users can be confident that their data and their privacy are protected at all times, both on and off the corporate network. Finally, a mobile security system that solves the unique challenges of securing a mobile device without draining the battery or relying on an Internet connection.

SecureAuth

SecureAuth Corporation, creators of the groundbreaking SecureAuth Identity Provider solution for the borderless enterprise, was co-founded by CEO Craig Lund and CTO Garret Grajek in 2005. SecureAuth IdP turns any enterprise into an identity provider capable of enforcing 2-Factor Access Control in a single, cost-effective solution. Fueled by the cloud and mobile phenomenon and the security requirements these disruptive computing platforms require, SecureAuth has experienced an accelerated rate of growth. SecureAuth IdP is the only solution that combines SSO with native 2-Factor Authentication in a single product across all platforms. This is a radical departure from the “old school” approach to deploying and maintaining separate authentication and SSO products – an approach that simply doesn`t work for cloud or mobile. In the same solution, SecureAuth includes Versatile Authentication (VAS) that enables IT to deploy single, two, or three-factor authentication to meet current and future regulatory requirements for cloud and web applications whether accessed from desktop or mobile device. Bringing the same level of security and control to cloud applications that enterprises experience with on-premise applications, SecureAuth IdP makes multi-product deployments obsolete while minimizing risk, increasing productivity, and reducing management costs.

Arctic Wolf

Arctic Wolf® is the global leader in security operations, delivering the first cloud-native security operations platform to end cyber risk. Powered by threat telemetry spanning endpoint, network, and cloud sources, the Arctic Wolf® Security Operations Cloud ingests and analyzes more than 1.6 trillion security events a week across the globe, enabling critical outcomes for most security use cases and optimizing customers` disparate security solutions. Now deployed to more than 2,300 customers worldwide, the Arctic Wolf® Platform delivers automated threat detection and response at scale, and empowers organizations of any size to establish world-class security operations with the push of a button.

Virsec

Virsec revolutionizes cyber security by detecting and remediating previously “indefensible” advanced memory-based attacks on critical applications and server endpoints. Using patented, non-signature based technology, Virsec is able to protect applications “full-stack” — from the memory to web layer — without generating false positives, a huge win for security teams drowning in bells and alarms or using needle in a haystack approaches. Our deterministic Trusted Execution™ approach provides runtime application visibility and protection at the CPU-level and in memory to ensure real-time detection and remediation in microseconds. Virsec is unique in its ability to detect file-less, memory corruption and even ROP chain attacks on server endpoints, as well as protecting web applications against web application attacks in one unified platform. This unprecedented level of cyber security breadth and depth enables enterprises to release applications faster and achieve advanced hacking protection, with full assurance of protection against zero-day or unidentified vulnerabilities.