| Name | Title | Contact Details |
|---|
CyberX is a member of the IBM Security App Exchange Community and has partnered with premier solution providers worldwide including Deutsche-Telekom/T-Systems.
Network Critical Solutions Limited is a Buffalo, NY-based company in the Computers and Electronics sector.
Barkly is Runtime Malware Defense- a completely new approach to endpoint protection. Barkly`s protection operates at runtime to provide an entirely new line of of defense that is complementary to pre-execution protection such as traditional AV and next-generation AV. Our runtime approach, which utilizes advanced machine learning, enables us to address critical threats that other solutions don`t such as fileless malware and zero-days. Barkly is the first endpoint protection solution to use a multi-tenant SaaS service combined with local endpoint protection. Through this unique approach we are able to improve the strength and quality of protection in addition to the customer experience.
Deep Instinct is the first company to apply deep learning to cybersecurity. Deep learning is inspired by the brain`s ability to learn. Once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct`s artificial brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. As a result, zero-day and APT attacks are detected and prevented in real-time with unmatched accuracy. Deep Instinct brings a completely new approach to cybersecurity that is proactive and predictive. Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization`s endpoints, servers, and mobile devices. Deep learning`s capabilities of identifying malware from any data source results in comprehensive protection on any device, any platform, and operating system.
PacketSled is an advanced breach detection, incident response, and network forensics platform that enables the enterprise to continuously monitor and respond to security threats in real-time. The platform operates either in the cloud or on premise. Customers can deploy sensors in 15 minutes or less, getting immediate packet level forensic visibility.