| Name | Title | Contact Details |
|---|
Headquartered in Indianapolis, Indiana, Pondurance delivers world-class managed detection and response services to industries facing today`s most pressing and dynamic cybersecurity challenges including ransomware, complex compliance requirements and digital transformation accelerated by a distributed workforce. By combining our advanced platform with our experienced team of analysts, we continuously hunt, investigate, validate and contain threats so your own team can focus on what matters most. Pondurance experts include seasoned security operations analysts, digital forensics and incident response professionals and compliance and security strategists who provide always-on services to customers seeking broader visibility, faster response and containment, and more unified risk management for their organizations.
CyberX is a member of the IBM Security App Exchange Community and has partnered with premier solution providers worldwide including Deutsche-Telekom/T-Systems.
Awake Security provides the only advanced security analytics solution that delivers deep visibility and answers to questions that cannot even be asked today, improving productivity tenfold. The company`s patent-pending Security Knowledge Graph™ data model uses machine learning and data science to automate painstaking analyses expert investigators perform. It identifies and tracks network entities as humans think of them and highlights entity attributes, relationships, behaviors and activities. This enables analysts to proactively detect, hunt, investigate and respond to threats. Awake is built on a foundation of more than two years of research with hundreds of security professionals and more than a dozen security teams.
Mobile Ingenuity is a Norcross, GA-based company in the Computers and Electronics sector.
Zenedge is a leading, global provider of cloud-based, artificial intelligence-driven cybersecurity solutions. Zenedge solutions are powered by proprietary artificial intelligence (AI) technology, inspecting web traffic in real-time, identifying threats and behavior anomalies and dynamically updating security postures accordingly – enabling enterprises to take an adaptive and proactive approach to securing their networks.