party - All Articles - CISO Platform2024-03-29T11:37:03Zhttps://www.cisoplatform.com/profiles/blogs/feed/tag/partyTop Emerging Indian Cyber Security Vendors in 2018https://www.cisoplatform.com/profiles/blogs/top-emerging-indian-cyber-security-vendors-in-20182019-11-28T09:30:00.000Z2019-11-28T09:30:00.000ZCISO Platformhttps://www.cisoplatform.com/members/CISOPlatform<div><ul>
<li>We have completed our selection of the final list of <strong>Top Indian Cyber Security Vendors to look out for in 2018</strong> from all the vendors nationwide. Believe me this was not easy & we don’t claim this is exhaustive list as it probably will never be. But still we gave our best to give you the top guns who are uniquely innovative.</li>
<li><strong>Let’s have a look at the top Indian Cyber Security Vendors </strong></li>
</ul>
<p> </p>
<p><a href="https://www.firecompass.com/security/vendors/appknox"><img class="size-medium wp-image-8254 aligncenter align-center" src="https://www.firecompass.com/wp-content/uploads/2018/08/appknox-logo-300x70.png" alt="" width="300" height="70" /></a></p>
<ul>
<li>Appknox is an Indian cyber security company that aims at helping businesses and developers make their mobile applications more secure. Using our cloud-based security solution, businesses can conduct regular and quick security audits, know what security loopholes exist in their apps and also fix them with the suggestions we provide. Thei security experts are working continuously to out-think and outsmart unethical hackers that exploit different cyber channels to provide a safe operating environment for businesses. they have worked with companies around the globe in various spaces like banking, e-commerce, mobile wallets, healthcare, BYOD, and 3rd party apps in an effort to build a safe and secure mobile ecosystem. To know more:<a href="https://www.firecompass.com/security/vendors/appknox">https://www.firecompass.com/security/vendors/appknox</a></li>
</ul>
<p><strong> </strong></p>
<p> </p>
<p><a href="https://www.firecompass.com/security/vendors/halt-dos-pvt-ltd-"><img class="size-medium wp-image-8255 aligncenter align-center" src="https://www.firecompass.com/wp-content/uploads/2018/08/haltdos-300x109.png" alt="" width="300" height="109" /></a></p>
<p></p>
<ul>
<li>HaltDos is an award-winning network security company. It is an off-spring of AKS Information Technology Services Pvt. Ltd. AKS IT is CERT-IN empanelled Auditing organization providing Web and Mobile application security auditing, Network Security auditing and Industrial Control System Auditing. HaltDos cloud proxy is India’s first comprehensive DDoS mitigation solution that ‘Detects, Mitigates & Monitors’ web applications on a continuous basis to protect from hackers. They have over a decade long experience in providing security solutions to 4000+ customers across the world. They bring this expertise and our 24x7x365 support to provide the most comprehensive security solutions as a service (SaaS). HaltDos in partnership with Amazon Web Services (AWS) provides cloud based DDoS mitigation solution in all AWS regions across the world. To know more: <a href="https://www.firecompass.com/security/vendors/halt-dos-pvt-ltd-">https://www.firecompass.com/security/vendors/halt-dos-pvt-ltd-</a></li>
</ul>
<p> </p>
<p> </p>
<p><a href="https://www.firecompass.com/security/vendors/indusface"><img class="wp-image-8256 aligncenter align-center" src="https://www.firecompass.com/wp-content/uploads/2018/08/Indusface-300x207.jpg" alt="" width="198" height="137" /></a></p>
<ul>
<li>Indusface is an award-winning application security leader protecting 900+ global customers with our unique Total Application Security platform that detects, protects, and monitors applications. Our Total Application Security solution is available On-Premise, As A Service and through the AWS Marketplace. Mentioned in the Gartner Magic Quadrants for Application Security Testing and Web Application Firewall, Indusface has won major startup awards in the last 12 months including the NASSCOM-DSCI ‘Security Product Company’ Award, iSpirit’s ‘InTech50 Most Innovative Products from India’ and AWS ‘Regional Innovation Partner: Technology Award’. In the past few years, Indusface has also won several other awards like Deloitte Technology Fast 50 India and 500 Asia, NASSCOM Emerge 50, Red Herring Top 100 Asia and InTech50. To know more: <a href="https://www.firecompass.com/security/vendors/indusface">https://www.firecompass.com/security/vendors/indusface</a></li>
</ul>
<p> </p>
<p> </p>
<p><a href="https://www.firecompass.com/security/vendors/innefu"><img class="alignnone wp-image-8257 aligncenter align-center" src="https://www.firecompass.com/wp-content/uploads/2018/08/innefu-logo-300x140.png" alt="" width="255" height="119" /></a></p>
<ul>
<li>Innefu is an Information Security R&D startup, providing cutting edge Information Security & Data Analytics solutions. We count among our clients the biggest corporate entity in the country apart from some of the most sensitive and critical organizations in Government of India. With more than 100+ customers using our Information Security and Data Analytics solutions, the company has become a leading player in the space of Artificial Intelligence for Data Analytics and Multifactor Authentication. To know more: <a href="https://www.firecompass.com/security/vendors/innefu">https://www.firecompass.com/security/vendors/innefu</a></li>
</ul>
<p><strong> </strong></p>
<p> </p>
<p><a href="https://www.firecompass.com/security/vendors/instasafe"><img class="size-medium wp-image-8258 aligncenter align-center" src="https://www.firecompass.com/wp-content/uploads/2018/08/InstaSafe-Light-Bg-Horizontal-300x93.png" alt="" width="300" height="93" /></a></p>
<ul>
<li>Instasafe Technologies is a leading Cloud based Security-as-a-Service solution provider delivering comprehensive and uncompromising protection to mobile and remote workers enabling them to safely and securely access enterprise apps, email and web from anywhere on any network. Unlike appliance based solutions Instasafe offers a hardware free, zero configuration, self-service style, fully redundant Security-as-Service which could be deployed in minutes with comprehensive reporting. To know more:<a href="https://www.firecompass.com/security/vendors/instasafe"> https://www.firecompass.com/security/vendors/instasafe</a></li>
</ul>
<p> </p>
<p> </p>
<p><img class="wp-image-8259 aligncenter align-center" src="https://www.firecompass.com/wp-content/uploads/2018/08/3-300x87.png" alt="" width="372" height="108" /></p>
<ul>
<li>Khika is a next generation SIEM which combines the real time alerting and dashboarding of conventional SIEM with the power of big data to enable historical correlation and search to identify and contain such threats. Khika SIEM is an Indian cyber security vendor which consumes the logs generated by your active directory, firewall, antivirus, web application firewall, web proxy, applications etc. to give you intelligence on security threats, compliance gaps and policy violations, infrastructure troubleshooting, user behaviors and more. This enables you to have a single platform for your security analytics and improves the security posture.</li>
</ul>
<div><a href="https://www.firecompass.com/blog/free-supplier-security-assessment-questionnaire/" target="_blank">READ MORE >> Free Supplier Security Assessment Questionnaire</a></div>
<p> </p>
<p> </p>
<p><a href="https://www.firecompass.com/security/vendors/kratikal-tech-pvt-ltd"><img class="size-medium wp-image-8260 aligncenter align-center" src="https://www.firecompass.com/wp-content/uploads/2018/08/cropped-kratikal-logo-M-300x96.png" alt="" width="300" height="96" /></a></p>
<ul>
<li>Kratikal is an end to end Indian cyber security solutions provider. It is the trusted partner for enterprises and individuals, seeking to protect their brand, business and dignity from baffling cyber attacks. They have been involved in design, implementation of information security management system since the time, standards were adopted by industry. They approach IT security, cyber crime and penetration testing use cases from enterprise risk management perspective. Kratikal provide a complete suite of manual and automated security testing services as well as security auditings like PCI DSS, HIPAA and ISO 27000 series. To know more :<a href="https://www.firecompass.com/security/vendors/kratikal-tech-pvt-ltd">https://www.firecompass.com/security/vendors/kratikal-tech-pvt-ltd</a></li>
</ul>
<p> </p>
<p><strong> </strong><img class="size-medium wp-image-8297 aligncenter align-center" src="https://www.firecompass.com/wp-content/uploads/2018/09/logo-yello-1-300x120.png" alt="" width="300" height="120" /> </p>
<ul>
<li>DNIF, a product of NETMONASTERY offers solutions to the world’s most challenging cybersecurity problems. Recognized by Gartner and used by some of the well-known global companies like PwC, Vodafone and Tata, this next generation analytics platform combines Security and Big Data Analytics to provide real-time threat detection and analytics to the most critical data assets on the Internet. With over a decade of experience in threat detection systems, DNIF has one of the fastest query response times and bridges the gap between searching, processing, analyzing and visualizing data thereby enabling companies with better SOC (Security Operations Center) management. To know more:<a href="https://www.firecompass.com/security/vendors/dnif-product-of-netmonastery-"> https://www.firecompass.com/security/dnif-product-of-netmonastery/</a></li>
</ul>
<p> </p>
<p> </p>
<p><img class="size-medium wp-image-8265 aligncenter align-center" src="https://www.firecompass.com/wp-content/uploads/2018/08/Seqrite_logo-300x117.png" alt="" width="300" height="117" /></p>
<ul>
<li>Seqrite is a world-class Enterprise Security brand defined by innovation and simplicity. Their solutions are a combination of intelligence, analysis of applications and state-of-the-art technology, and are designed to provide better protection for our customers. Seqrite is backed by Quick Heal’s cutting-edge expertise of producing cyber security solutions for over two decades. Their products help secure the networks used by millions of customers in more than 80 countries.</li>
</ul>
<p> </p>
<p><strong> </strong></p>
<p><a href="https://www.firecompass.com/security/vendors/shieldsquare"><img class="size-medium wp-image-8266 aligncenter align-center" src="https://www.firecompass.com/wp-content/uploads/2018/08/shieldsquare-logo-high-300x66.png" alt="" width="300" height="66" /></a></p>
<p> </p>
<ul>
<li>ShieldSquare is one of the pioneers in bot mitigation and bot management space. They provide a real-time bot mitigation solution that protects enterprises by detecting and responding to automated attacks generated by scripts (bots). Their solution can be integrated into diverse technology infrastructures within minutes. We have been instrumental in raising the industry bar for highest accuracy, lowest latency, and zero false-positives. ShieldSquare processes billions of page requests every month. To know more: <a href="https://www.firecompass.com/security/vendors/shieldsquare">https://www.firecompass.com/security/vendors/shieldsquare</a></li>
</ul>
<p> </p>
<p> </p>
<p><a href="https://www.firecompass.com/security/vendors/smokescreen"><img class="wp-image-8267 aligncenter align-center" src="https://www.firecompass.com/wp-content/uploads/2018/08/logo8-300x60.png" alt="" width="375" height="75" /></a></p>
<ul>
<li>Smokescreen was founded in 2015 to create the next generation of Indian cyber security detection and response systems. Our proprietary ILLUSIONBLACK platform detects, deflects and defeats advanced hackers in a manner that is false-positive free, and easy to implement. It effectively handles multiple avenues of attack and the limited response capabilities that most companies have. This deception based ‘active defense’ philosophy is the result of decades of experience securing the most highly targeted organizations in the world against advanced threats , and has proved its effectiveness time and again in the real world. To know more : <a href="https://www.firecompass.com/security/vendors/smokescreen">https://www.firecompass.com/security/vendors/smokescreen</a></li>
</ul>
<div id="firec-2110483133" class="firec-generic-ad"><p></p>
</div></div>Top Emerging Cyber Security Vendors To Look Out For In 2018https://www.cisoplatform.com/profiles/blogs/top-emerging-cyber-security-vendors-to-look-out-for-in-20182019-11-28T11:30:00.000Z2019-11-28T11:30:00.000ZCISO Platformhttps://www.cisoplatform.com/members/CISOPlatform<div><ul>
<li><span>Looking for Top Emerging Companies in the Cyber Security Industry? FireCompass presents 50 Emerging Cyber Security Vendors to look out for in 2018. We don’t claim this is exhaustive list because there might be a possibility that we might have missed some of the products. But still we gave our best to give you the top guns who are uniquely innovative in their area of expertise.</span></li>
<li><span>Lets have a look at 50 Emerging Cyber Security Vendors for year 2018:</span></li>
</ul>
<p> </p>
<p><a href="https://www.firecompass.com/security/vendors/acalvio-technologies"><strong><span style="font-size:12pt;">Acalvio T</span><span style="font-size:12pt;">echnologies</span></strong></a></p>
<p><a href="https://www.firecompass.com/security/vendors/acalvio-technologies"><img class="acalvio-firecompass-emerging-vendors-2018 aligncenter wp-image-7455 size-medium align-center" title="acalvio-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/04/acalvio_1_-300x107.jpg" alt="acalvio-firecompass-emerging-vendors-2018" width="300" height="107" /></a></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/acalvio-technologies"><strong>Acalvio</strong></a> is an innovator in delivering Advanced Defense solutions using a combination of Distributed Deception and Data Science technologies. Led by a seasoned team of security, networking, data science professionals, Acalvio allows security practitioners in detecting, engaging and responding to malicious activity with high precision in a timely and cost-effective fashion. Acalvio was selected as one of the top cyber security company at RSA Innovation Sandbox 2018. To know more:<a href="https://www.firecompass.com/security/vendors/acalvio-technologies"> https://www.firecompass.com/security/vendors/acalvio-technologies</a></li>
</ul>
<p></p>
<p> </p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>Aporeto</strong></span></p>
<p><img class="aporeto-firecompass-emerging-vendors-2018 aligncenter wp-image-7984 size-medium align-center" title="aporeto-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/Aporeto-300x70.png" alt="aporeto-firecompass-emerging-vendors-2018" width="300" height="70" /></p>
<ul>
<li><span><strong>Aporeto</strong> is a Zero Trust security solution for microservices, containers and the cloud. Fundamental to Aporeto’s approach is the principle that everything in an application is accessible to everyone and could be compromised at any time. Aporeto uses identity context, vulnerability data, threat monitoring and behavior analysis to build and enforce authentication, authorization and encryption policies for applications. With Aporeto, enterprises implement a uniform security policy decoupled from the underlying infrastructure, enabling workload isolation, API access control and application identity management across public, private or hybrid cloud.</span></li>
</ul>
<p></p>
<p> </p>
<p><span style="font-size:12pt;"><a href="https://www.firecompass.com/security/vendors/aqua-security-inc-"><strong>Aqua Security</strong></a></span></p>
<p><a href="https://www.firecompass.com/security/vendors/aqua-security-inc-"><img class="aqua-firecompass-emerging-vendors-2018 aligncenter wp-image-7985 size-medium align-center" title="aqua-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/aqua_security-300x108.png" alt="aqua-firecompass-emerging-vendors-2018" width="300" height="108" /></a></p>
<ul>
<li><span><strong><a href="https://www.firecompass.com/security/vendors/aqua-security-inc-">Aqua Security</a></strong> provides scalable security for the complete development-to-deployment lifecycle of containerized applications. It enable companies to use containers for their many benefits without compromising their application and data security.</span> <span>It helps enterprises to secure their virtual container environments from development to production, accelerating container adoption and bridging the gap between DevOps and IT security.</span><span>Aqua’s Container Security Platform provides full visibility into container activity, allowing organizations to detect and prevent suspicious activity and attacks, providing transparent, automated security while helping to enforce policy and simplify regulatory compliance. </span> </li>
</ul>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>Armis</strong></span></p>
<p><img class="armis-firecompass-emerging-vendors-2018 aligncenter wp-image-7988 size-medium align-center" title="armis-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/armis-1-300x86.png" alt="armis-firecompass-emerging-vendors-2018" width="300" height="86" /></p>
<ul>
<li><span><strong>Armis Security</strong> is an agentless IoT security solution that lets enterprises see and control any device or network. It eliminates the IoT security blind spot, letting enterprises instantly see and control unmanaged or rogue devices and networks. It specializes in IoT Security, network security, mobile security, DDoS, wireless security, Botnets, and Ransomware.</span></li>
</ul>
<p> </p>
<p><span style="font-size:12pt;"><strong><a href="https://www.firecompass.com/security/vendors/attivo-networks">Attivo Networks</a></strong></span><a href="https://www.firecompass.com/security/vendors/attivo-networks"><img class="attivo-firecompass-emerging-vendors-2018 aligncenter wp-image-7990 size-full align-center" title="attivo-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/Attivo_Corp_Logo-e1530009474879.png" alt="attivo-firecompass-emerging-vendors-2018" width="204" height="102" /></a></p>
<ul>
<li><span><strong><a href="https://www.firecompass.com/security/vendors/attivo-networks">Attivo Networks®</a></strong> is an award-winning leader in deception technology for real-time detection, analysis, and acceleration of incident response to cyber-attacks. The Attivo ThreatDefend™ Deception and Response Platform provides early detection of advanced, stolen credential, ransomware, and phishing attacks that are inside user networks, data centers, clouds, IoT and ICS-SCADA environments. By deceiving attackers into revealing themselves, comprehensive attack analysis is efficiently gathered, actionable alerts raised, and response actions automated with prevention system integrations. </span></li>
</ul>
<p></p>
<p> </p>
<p><span style="font-size:12pt;"><strong><a href="https://www.firecompass.com/security/vendors/avanan-inc-">Avanan</a></strong></span></p>
<p><a href="https://www.firecompass.com/security/vendors/avanan-inc-"><img class="avanan-firecompass-emerging-vendors-2018 aligncenter wp-image-7991 size-medium align-center" title="avanan-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/avanan--300x104.png" alt="avanan-firecompass-emerging-vendors-2018" width="300" height="104" /></a></p>
<ul>
<li><span><strong><a href="https://www.firecompass.com/security/vendors/avanan-inc-">Avanan</a></strong> operates a cloud-based platform to provide security solutions for public, SaaS-based applications. The product is designed for organizations that need to monitor and protect their employees’ use of the cloud.</span> <span>AVANAN protects your data in the cloud with the same industry-leading security you trust in your datacenter. The cloud-based platform is completely out-of-band, requires no proxy, and can be deployed in just 10 minutes. It provides seamless policy governance across users and data in the cloud. </span></li>
</ul>
<p> </p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>Awake Security</strong></span></p>
<p><img class="awake-firecompass-emerging-vendors-2018 aligncenter wp-image-7992 size-medium align-center" title="awake-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/awake-security-300x64.png" alt="awake-firecompass-emerging-vendors-2018" width="300" height="64" /></p>
<ul>
<li><span>The <strong>Awake Security</strong> Investigation Platform enables rapid, iterative and conclusive alert investigations as well as threat hunting by placing the context that security teams need at their fingertips. Gathering this context manually, if even possible, can take hours of combing through dozens of data sources. Awake reduces time-to-truth to mere minutes with a quick-to-deploy, no tuning required, platform that builds on more than two years of R&D with over 200 security teams.</span></li>
</ul>
<p></p>
<p> </p>
<p><span style="font-size:12pt;"><strong>Balbix</strong></span></p>
<p><img class="balbix-firecompass-emerging-vendors-2018 aligncenter wp-image-8078 size-medium align-center" title="balbix-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/07/balbix-300x114.png" alt="balbix-firecompass-emerging-vendors-2018" width="300" height="114" /></p>
<ul>
<li><strong>Balbix</strong>’s predictive breach risk platform is the industry’s first system to leverage predictive analytics and AI to provide enterprises with a comprehensive and continuous risk and resilience calculation visualized via a searchable and clickable heat map. We designed our platform for CIOs, CISOs and IT security teams who wish to proactively understand their breach risk and cyber-resilience. The Balbix system can predict critical breach scenarios, help users prioritize security operations and projects, and ultimately improve cyber-resilience.</li>
</ul>
<p></p>
<p> </p>
<p><span style="font-size:12pt;"><a href="https://www.firecompass.com/security/vendors/bastille"><strong>Bastille</strong></a></span></p>
<p><a href="https://www.firecompass.com/security/vendors/bastille"><img class="bastille-firecompass-emerging-vendors-2018 aligncenter wp-image-7993 size-medium align-center" title="bastille-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/bastille-300x105.png" alt="bastille-firecompass-emerging-vendors-2018" width="300" height="105" /></a></p>
<ul>
<li><span><strong><a href="https://www.firecompass.com/security/vendors/bastille">Bastille</a></strong> is revolutionizing the way Enterprises approach security. As new threats emerge from the Internet of Things, Bastille is the only solution offering full spectrum scanning of the entire corporate airspace, delivering an unprecedented view of wireless risks before they have a chance to impact networks, people or assets. This visibility, combined with machine learning and behavioral analytics, provides a holistic view of wireless environments, complimenting Wi-Fi and traditional security architectures. </span></li>
</ul>
<p></p>
<p></p>
<p><span style="font-size:12pt;"><strong><a href="https://www.firecompass.com/security/vendors/bigid-inc-">BigID</a></strong></span></p>
<p><a href="https://www.firecompass.com/security/vendors/bigid-inc-"><img class="bigid-firecompass-emerging-vendors-2018 aligncenter wp-image-2307 align-center" title="bigid-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2017/04/BigID-e1530620508451.jpg" alt="bigid-firecompass-emerging-vendors-2018" width="244" height="106" /></a></p>
<ul>
<li><strong><a href="https://www.firecompass.com/security/vendors/bigid-inc-">BigID</a> </strong>is transforming enterprise protection and privacy of personal data. Organizations are facing record breaches of personal information and proliferating global privacy regulations with fines reaching 4% of annual revenue. Today enterprises lack dedicated purpose-built technology to help them track and govern their customer data for regulations like GDPR. By bringing data science to data privacy, BigID aims to give enterprises the software to safeguard and steward the most important asset organizations manage: their customer data. To know more </li>
</ul>
<p></p>
<p> </p>
<p><span style="font-size:12pt;"><strong><a href="https://www.firecompass.com/security/vendors/bricata">Bricata</a></strong></span></p>
<p><a href="https://www.firecompass.com/security/vendors/bricata"><img class="bricata-firecompass-emerging-vendors-2018 aligncenter wp-image-7996 align-center" title="bricata-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/Bricata-Blog-Header-e1530010164181-300x55.png" alt="bricata-firecompass-emerging-vendors-2018" width="404" height="74" /></a></p>
<ul>
<li><span><strong><a href="https://www.firecompass.com/security/vendors/bricata">Bricata</a></strong> network security solutions deliver innovative next generation intrusion prevention, advanced threat detection and analysis, and threat hunting to enable large organizations to actively pursue and identify advanced, persistent, and coordinated attacks. A specialized component-based approach to today’s attacks has left organizations with a stack of tools to manage that provide a patchwork of uncorrelated data, leaving penetrable gaps and inconsistent security policies. The Bricata platform provides organizations with process automation, streamlining operations with the most effective, affordable solution for situational awareness and proactive threat defense, reducing complexity, dwell time and time to containment. To know more: </span></li>
</ul>
<p> </p>
<p></p>
<p><span style="font-size:12pt;"><strong>Capsule8</strong></span></p>
<p><img class="capsule8-firecompass-emerging-vendors-2018 aligncenter wp-image-7997 size-medium align-center" title="capsule8-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/capsule8-300x90.png" alt="capsule8-firecompass-emerging-vendors-2018" width="300" height="90" /></p>
<ul>
<li><span><strong>Capsule8</strong> is developing the industry’s first and only threat prevention and response platform purpose-built for cloud-native environments. Founded in 2016 by experienced hackers and seasoned security entrepreneurs, and funded by Bessemer Venture Partners, Capsule8 is making it possible for Linux-powered enterprises to modernize without compromise.</span></li>
</ul>
<p></p>
<p> </p>
<p><span style="font-size:12pt;"><strong><a href="https://www.firecompass.com/security/vendors/cato-networks">Cato Networks</a></strong></span></p>
<p><a href="https://www.firecompass.com/security/vendors/cato-networks"><img class="cato-firecompass-emerging-vendors-2018 aligncenter wp-image-8080 size-medium align-center" title="cato-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/07/download-300x125.png" alt="cato-firecompass-emerging-vendors-2018" width="300" height="125" /></a></p>
<ul>
<li><strong><a href="https://www.firecompass.com/security/vendors/cato-networks">Cato Networks</a></strong> provides organizations with a cloud-based and secure global SD-WAN. They deliver an integrated networking and security platform that securely connects all enterprise locations, people and data. The Cato Cloud reduces MPLS connectivity costs, eliminates branch appliances, provides direct, secure Internet access everywhere, and seamlessly integrates mobile users and cloud infrastructures into the enterprise network. Based in Tel Aviv, Israel, Cato Networks was founded in 2015 by cyber security luminary Shlomo Kramer, who previously cofounded Check Point Software Technologies and Imperva, and Gur Shatz, who previously cofounded Incapsula. </li>
</ul>
<p> </p>
<p></p>
<p><span style="font-size:12pt;"><strong><a href="https://www.firecompass.com/security/vendors/cryptomove-inc-">CryptoMove</a></strong></span></p>
<p><a href="https://www.firecompass.com/security/vendors/cryptomove-inc-"><img class="cryptomove-firecompass-emerging-vendors-2018 aligncenter wp-image-8081 size-medium align-center" title="cryptomove-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/07/cryptomove-300x115.png" alt="cryptomove-firecompass-emerging-vendors-2018" width="300" height="115" /></a></p>
<ul>
<li><strong><a href="https://www.firecompass.com/security/vendors/cryptomove-inc-">CryptoMove</a></strong> provides decentralized moving target data protection as a service. The #1 risk to data is that it is a centralized and stationary target. Today’s data at rest protection methods have not changed in decades, are too difficult to implement, suffer from poor UX, don’t deliver value to end-users, and fail to address many threats to data including exfiltration, corruption, destruction, and ransomware. CryptoMove’s patented platform flips attack-defense asymmetry and provides crown jewel protection as a service.</li>
</ul>
<p> </p>
<p></p>
<p><span style="font-size:12pt;"><a href="https://www.firecompass.com/security/vendors/cryptomove-inc-"><strong>Cyber adapt</strong></a></span></p>
<p><img class="cyberadapt-firecompass-emerging-vendors-2018 aligncenter wp-image-7999 align-center" title="cyberadapt-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/Cyber-adAPT-300x51.png" alt="cyberadapt-firecompass-emerging-vendors-2018" width="412" height="70" /></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/cryptomove-inc-"><strong>Cyber adAPT®</strong></a>’s technology aims at protecting critical business assets by helping companies detect the presence of sophisticated adversaries hiding inside enterprise networks.Since the majority of available security tools have been deployed to safeguard against anticipated threats rather than alerting on suspicious “inside” activities, Cyber adAPT® is on a mission to not only educate about the growing scope of the threat ecosystem, but also to help ensure that the security postures and practices companies around the world adopt are sufficient and work holistically to protect their digital property as well as their reputation.<a href="https://www.firecompass.com/security/vendors/cryptomove-inc-"></a></li>
</ul>
<p> </p>
<p></p>
<p><span style="font-size:12pt;"><a href="https://www.firecompass.com/security/vendors/cybergrx"><b>CyberGRX</b></a></span></p>
<p><a href="https://www.firecompass.com/security/vendors/cybergrx"><img class="cyberGRX-firecompass-emerging-vendors-2018 aligncenter wp-image-7459 size-full align-center" title="cyberGRX-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/04/cybergrx_finallogo_stacked_fullcolor.jpg" alt="cyberGRX-firecompass-emerging-vendors-2018" width="268" height="137" /></a></p>
<ul>
<li><strong><a href="https://www.firecompass.com/security/vendors/cybergrx">CyberGRX</a> </strong>provides enterprises and their third parties with the most cost-effective and scalable approach to third-party cyber risk management today. Built on the market’s first third-party cyber risk Exchange, CyberGRX arms organizations with a dynamic stream of third party-data and advanced analytics so they can efficiently manage, monitor and mitigate risk in their partner ecosystems. Based in Denver, CO, CyberGRX was designed with partners including ADP, Aetna, Blackstone and Mass Mutual, and is backed by Allegis Capital, Bessemer Venture Partners, Blackstone, ClearSky, GV (formerly Google Ventures), MassMutual Ventures, Rally Ventures and TenEleven Ventures. CyberGRX is chosen among top cyber security company as finalists at RSA Innovation Sandbox 2018 for showcasing innovative excellence.<a href="https://www.firecompass.com/security/vendors/cybergrx"></a></li>
</ul>
<p> </p>
<p></p>
<p><span style="font-size:12pt;"><a href="https://www.firecompass.com/security/vendors/deep-instinct"><strong>Deep Instinct</strong></a></span></p>
<p><a href="https://www.firecompass.com/security/vendors/deep-instinct"><img class="deepinstinct-firecompass-emerging-vendors-2018 aligncenter wp-image-8002 size-medium align-center" title="deepinstinct-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/Deepinstict-300x60.png" alt="deepinstinct-firecompass-emerging-vendors-2018" width="300" height="60" /></a></p>
<ul>
<li><span><strong><a href="https://www.firecompass.com/security/vendors/deep-instinct">Deep Instinct</a></strong> is the first company to apply deep learning to cyber security. It’s artificial brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. As a result, zero-day and APT attacks are detected and prevented in real-time with unmatched accuracy. They bring a completely new approach to cyber security that is proactive and predictive. Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices. </span> </li>
</ul>
<p></p>
<p><span style="font-size:12pt;"><a href="https://www.firecompass.com/security/vendors/ensilo"><strong>ensilo</strong></a></span></p>
<p><a href="https://www.firecompass.com/security/vendors/ensilo"><img class="ensilo-firecompass-emerging-vendors-2018 aligncenter wp-image-8003 size-medium align-center" title="ensilo-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/enSilo-logo-300x145-300x145.jpg" alt="ensilo-firecompass-emerging-vendors-2018" width="300" height="145" /></a></p>
<ul>
<li><span><a href="https://www.firecompass.com/security/vendors/ensilo"><strong>enSilo</strong></a> delivers the first complete endpoint security platform providing pre- and post-infection protection in real-time, defending endpoint devices from data tampering and breaches caused by advanced malware. enSilo provides security operators with an intuitive way to manage, orchestrate and automate prevention, detection, response and remediation tasks. A single lightweight agent combines enSilo’s Next Generation AntiVirus (NGAV) and automated Endpoint Detection and Response (EDR) with real-time blocking to deliver a multi-layered defense strategy that can be managed from the cloud or on premise. enSilo strives to make self-defending endpoint security cost-effective so virtually any enterprise can ensure business continuity. </span></li>
</ul>
<p> </p>
<p><span style="font-size:12pt;"><a href="https://www.firecompass.com/security/vendors/exabeam"><strong>Exabeam</strong></a></span></p>
<p><a href="https://www.firecompass.com/security/vendors/exabeam"><img class="exabeam-firecompass-emerging-vendors-2018 aligncenter wp-image-8005 size-medium align-center" title="exabeam-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/exabeam-e1530011172294-300x71.png" alt="exabeam-firecompass-emerging-vendors-2018" width="300" height="71" /></a></p>
<ul>
<li><span><a href="https://www.firecompass.com/security/vendors/exabeam"><strong>Exabeam</strong></a> provides security intelligence and management solutions to help organizations of any size protect their most valuable information. The Exabeam Security Intelligence Platform uniquely combines unlimited data collection at a predictable price, machine learning for advanced analytics, and automated incident response into an integrated set of products. The result is the first modern security intelligence solution that delivers where legacy SIEM vendors have failed.</span> </li>
</ul>
<p></p>
<p></p>
<p><span style="font-size:12pt;"><strong>Fortanix</strong></span></p>
<p><img class="fortanix-firecompass-emerging-vendors-2018 aligncenter wp-image-8006 size-medium align-center" title="fortanix-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/fortanix-300x66.png" alt="fortanix-firecompass-emerging-vendors-2018" width="300" height="66" /></p>
<ul>
<li><span><strong>Fortanix</strong> is building a new category Runtime Encryption using Intel SGX. Just like encryption today protects data at rest and data during motion, Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats including malicious insiders, cloud providers, OS-level hacks and network intruders. Customer gets deterministic security, unlike existing leaky security, which means their applications and data remain completely protected regardless of how the attacks originate and how root credentials are compromised.</span></li>
</ul>
<p></p>
<p> </p>
<p><span style="font-size:12pt;"><a href="https://www.firecompass.com/security/vendors/greathorn"><strong>GreatHorn</strong></a></span></p>
<p><a href="https://www.firecompass.com/security/vendors/greathorn"><img class="greathorn-firecompass-emerging-vendors-2018 aligncenter wp-image-8082 size-medium align-center" title="greathorn-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/07/greathorn-300x56.png" alt="greathorn-firecompass-emerging-vendors-2018" width="300" height="56" /></a></p>
<ul>
<li><strong><a href="https://www.firecompass.com/security/vendors/greathorn">GreatHorn</a></strong> has cloud-native security platform for post-perimeter threat detection and response, natively integrated into G Suite, Office 365, Slack, and more. Provides enterprise security solutions for email, chat, and threat detection across multiple communication channels.Attacks on cloud email, chat, and collaboration tools are responsible for more than 90% of all data breaches. GreatHorn helps companies secure these platforms from advanced threats, simplify governance and compliance requirements, and communicate with confidence. </li>
</ul>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>Hysolate</strong></span></p>
<p><img class="hysolate-firecompass-emerging-vendors-2018 aligncenter wp-image-8008 align-center" title="hysolate-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/hysolate_1_-300x34.jpg" alt="hysolate-firecompass-emerging-vendors-2018" width="309" height="35" /></p>
<ul>
<li><span><strong>Hysolate</strong> is re-architecting enterprise endpoints, resolving the conflict between security and productivity.</span> <span>With roots in the elite technology units of Israeli defense and in world-class enterprise software companies, the Hysolate team knows all about cyber security offense/defense and the daily challenges of enterprise IT. They’ve been building enterprise software for decades and are passionate about disrupting the traditional thinking about endpoints, cyber security and IT.</span></li>
</ul>
<p> </p>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>iguazio</strong></span></p>
<p><img class="iguazio-firecompass-emerging-vendors-2018 aligncenter wp-image-8009 size-medium align-center" title="iguazio-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/iguazio-logo-1-e1530011601419-300x95.png" alt="iguazio-firecompass-emerging-vendors-2018" width="300" height="95" /></p>
<ul>
<li><span><strong>iguazio</strong> digitally transforms business value by streamlining data volumes to create actionable insights. Through its Continuous Data Platform for Real-time Applications, iguazio simplifies the development and deployment of data-driven applications to extend the cloud experience at the edge and on-premises. iguazio is a driving force in industries pertaining to manufacturing, smart mobility, the Internet of Things, media and cyber security.</span></li>
</ul>
<p></p>
<p> </p>
<p><span style="font-size:12pt;"><a href="https://www.firecompass.com/security/vendors/illumio"><strong>illumio</strong></a></span></p>
<p><a href="https://www.firecompass.com/security/vendors/illumio"><img class="illumio-firecompass-emerging-vendors-2018 aligncenter wp-image-8017 size-medium align-center" title="illumio-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/Illumio_logo-300x75.png" alt="illumio-firecompass-emerging-vendors-2018" width="300" height="75" /></a></p>
<ul>
<li><span><strong><a href="https://www.firecompass.com/security/vendors/illumio">Illumio</a></strong>, the leader in micro-segmentation, prevents the spread of breaches inside data center and cloud environments. Enterprises such as Morgan Stanley, BNP Paribas, Salesforce, and Oracle NetSuite use Illumio to reduce cyber risk and achieve regulatory compliance. The Illumio Adaptive Security Platform® uniquely protects critical information with real-time application dependency and vulnerability mapping coupled with micro-segmentation that works across any data center, public cloud, or hybrid cloud deployment on bare-metal, virtual machines, and containers. </span></li>
</ul>
<p></p>
<p></p>
<p><a href="https://www.firecompass.com/security/vendors/illusive-networks"><strong><span style="font-size:12pt;">Illusive Networks</span></strong></a></p>
<p><a href="https://www.firecompass.com/security/vendors/illusive-networks"><img class="illusive-firecompass-emerging-vendors-2018 aligncenter wp-image-8084 size-medium align-center" title="illusive-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/07/download-300x154.jpg" alt="illusive-firecompass-emerging-vendors-2018" width="300" height="154" /></a></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/illusive-networks"><strong>Illusive Networks</strong></a>, the leader in deception-based cyber security solutions, empowers security teams to preemptively harden their networks against advanced attackers, stop targeted attacks through early detection of lateral movement, and resolve incidents quickly. Agentless and intelligence-driven, Illusive technology significantly increases proactive defense capability with almost no operational overhead. Illusive’s Deceptions Everywhere® approach was pioneered by experts with decades of experience in cyber warfare and cyber intelligence. By proactively intervening in the attack process, technology-dependent organizations protect critical business assets and function with greater confidence in today’s complex, hyper-connected world.</li>
</ul>
<p></p>
<p><span style="font-size:14pt;"><strong><a href="https://www.cisoplatform.com/profiles/blogs/key-program-metrics-of-vulnerability-assessment" target="_blank">READ MORE >> Key Program Metrics of Vulnerability AssessmentIntsights</a></strong></span></p>
<p></p>
<p></p>
<div><span style="text-decoration:underline;font-size:12pt;"><strong>insights</strong></span></div>
<p><img class="wp-image-8143 size-medium aligncenter align-center" src="https://www.firecompass.com/wp-content/uploads/2018/07/intsights-e1532004359225-300x103.jpg" alt="" width="300" height="103" /></p>
<ul>
<li>INTSIGHTS is an intelligence driven security provider, established to meet the growing need for rapid, accurate cyber intelligence and incident mitigation. Their founders are veterans of elite military cybersecurity and intelligence units, where they acquired a deep understanding of how hackers think, collaborate and act.They partner with organizations to boost their cybersecurity and remediate their cyberthreats. This is achieved through a subscription-based service which infiltrates the cyberthreat underworld to detect and analyze planned or potential attacks and threats that are specific to their partners.</li>
</ul>
<p></p>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>Jask</strong></span></p>
<p><a href="https://www.firecompass.com/security/vendors/jask"><img class="jask-firecompass-emerging-vendors-2018 aligncenter wp-image-8018 size-medium align-center" title="jask-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/JASK_logo-300x71.jpg" alt="jask-firecompass-emerging-vendors-2018" width="300" height="71" /></a></p>
<ul>
<li><span>Headed by industry leaders from ArcSight, Carbon Black, Cylance and the counter-intelligence community, JASK brings together decades of experience solving real-world SOC issues. Founded to address the technology gaps that restrict security modernization efforts, JASK is revolutionizing security operations to reduce organizational risk and improve efficiency through technology consolidation, enhanced AI and machine learning. JASK is backed by Dell Technologies Capital, TenEleven Ventures, Battery Ventures and Vertical Venture Partner. </span></li>
</ul>
<p></p>
<p> </p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>Karamba Security</strong></span></p>
<p><img class="size-medium wp-image-8222 aligncenter align-center" src="https://www.firecompass.com/wp-content/uploads/2018/07/KarambaLogo-300x107.png" alt="" width="300" height="107" /></p>
<ul>
<li><span><strong>Karamba Security</strong> is a software company that focuses on securing automotive controllers and IoT devices from hackers in a simple, yet hermetic manner. It is led by a team comprised of security experts, serial entrepreneurs and business savvy executives with a track record of multiple IPOs and M&As.</span></li>
</ul>
<p></p>
<p> </p>
<p><span style="font-size:12pt;"><strong><a href="https://www.firecompass.com/security/vendors/menlo-security">Menlo Security</a></strong></span></p>
<p><a href="https://www.firecompass.com/security/vendors/menlo-security"><img class="menlosecurity-firecompass-emerging-vendors-2018 aligncenter wp-image-8020 size-medium align-center" title="menlosecurity-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/menlo-security-300x134.png" alt="menlosecurity-firecompass-emerging-vendors-2018" width="300" height="134" /></a></p>
<ul>
<li><span><strong><a href="https://www.firecompass.com/security/vendors/menlo-security">Menlo Security</a></strong>‘s patented Isolation Platform protects organizations from cyber attack by eliminating the threat of malware. The Platform isolates and executes all Web content in the cloud, enabling users to safely interact with websites, links and documents online without compromising security. Menlo Security is trusted by some of the world’s largest enterprises, including Fortune 500 companies and financial services institutions. </span></li>
</ul>
<p> </p>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>Obsidian Security</strong></span></p>
<p><img class="obsidian-firecompass-emerging-vendors-2018 aligncenter wp-image-8022 size-medium align-center" title="obsidian-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/obsidian-security-300x83.png" alt="obsidian-firecompass-emerging-vendors-2018" width="300" height="83" /></p>
<ul>
<li><span>Led by former founding team members of Cylance and Carbon Black, Obsidian Security is a Southern California technology company living at the intersection of cybersecurity, artificial intelligence, and hybrid-cloud environments. Backed by Greylock Partners, Obsidian Security is based in Newport Beach, CA.</span></li>
</ul>
<p></p>
<p> </p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>PerimeterX</strong></span></p>
<p><img class="perimeterx-firecompass-emerging-vendors-2018 aligncenter wp-image-8086 size-medium align-center" title="perimeterx-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/07/logo-300x75.png" alt="perimeterx-firecompass-emerging-vendors-2018" width="300" height="75" /></p>
<ul>
<li><strong>PerimeterX</strong> is a cyber security company that prevents automated web and mobile application attacks by detecting & protecting against malicious web behavior. To separate the actions of bots from those of normal users, PerimeterX uses artificial intelligence & machine learning to identify behaviors that are unlikely to represent human actions. This behavior based technology allows PerimeterX to detect and block the most sophisticated new forms of bot attacks in real-time with unparalleled accuracy. PerimeterX was named a Gartner Cool Vendor, and an AI 100 company by CBInsights, and was selected by DarkReading as Top 20 Cyber security Companies to Watch.</li>
</ul>
<p></p>
<p> </p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>Preempt</strong></span></p>
<p><a href="https://www.firecompass.com/security/vendors/preempt-security"><img class="preempt-firecompass-emerging-vendors-2018 aligncenter wp-image-8085 size-medium align-center" title="preempt-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/07/preempt-security_owler_20160302_205803_original-300x81.png" alt="preempt-firecompass-emerging-vendors-2018" width="300" height="81" /></a></p>
<ul>
<li><strong><a href="https://www.firecompass.com/security/vendors/preempt-security">Preempt</a></strong> was founded in 2014 by global security and networking experts with a passion for making IT security teams more effective in protecting their organizations from breaches and malicious insiders. They protects organizations by eliminating security threats. Threats are not black or white and the Preempt Platform is the only solution that preempts threats with continuous threat prevention that automatically adapts based on identity, behavior and risk. This ensures that both security threats and risky employee activities are responded to with the right level of security at the right time. The platform easily scales to provide comprehensive identity based protection across organizations of any size. </li>
</ul>
<p></p>
<p></p>
<p><span style="font-size:12pt;"><a href="https://www.firecompass.com/security/vendors/prevoty"><strong>Prevoty</strong></a></span><a href="https://www.firecompass.com/security/vendors/prevoty"><img class="prevoty-firecompass-emerging-vendors-2018 aligncenter wp-image-8023 size-medium align-center" title="prevoty-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/prevoty-300x80.png" alt="prevoty-firecompass-emerging-vendors-2018" width="300" height="80" /></a></p>
<ul>
<li><span><strong><a href="https://www.firecompass.com/security/vendors/prevoty">Prevoty</a></strong> provides a new RASP (runtime application self-protection) capability, enabling applications to protect themselves. Unlike traditional security approaches that try to defend against hackers at the network layer, Prevoty works inside the application itself and the analysis engine is smart enough to actively prevent anything malicious from executing. Prevoty is one of the most exciting new companies in the hot security market since, in addition to providing active protection and real-time threat intelligence, the technology can dramatically reduce the time and costs associated with implementation of a secure SDLC. </span></li>
</ul>
<p> </p>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>Qingteng</strong></span></p>
<p><img class="qinteng-firecompass-emerging-vendors-2018 aligncenter wp-image-8087 align-center" title="qinteng-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/07/04Qingteng-e1530688174675-300x78.jpg" alt="qinteng-firecompass-emerging-vendors-2018" width="331" height="86" /></p>
<ul>
<li><strong>Qingteng Cloud Security</strong> is a SaaS-based cloud security company in China. It is a China-based company that delivers server and cloud security based on Adaptive Security Architecture. Qingteng Cloud Security’s adaptive security platform can protect data on various cloud systems. Its technology can forecast, defend, and adapt to fend off new threats.</li>
</ul>
<p> </p>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>ReFirm Labs </strong></span></p>
<p><img class="refirmlabs-firecompass-emerging-vendors-2018 aligncenter wp-image-7462 size-medium align-center" title="refirmlabs-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/04/rfl_1_-300x48.jpg" alt="refirmlabs-firecompass-emerging-vendors-2018" width="300" height="48" /></p>
<ul>
<li><strong>ReFirm Labs</strong> is an emerging leader in the IoT and connected device security space. With decades of experience securing devices for sensitive national security applications, our team has developed a new method for vetting and validating firmware that automates the process of detecting security flaws in connected devices and mitigating them. Our Centrifuge Platform is at the forefront of this approach and is the first to deliver this capability to the commercial market. Our technology is already helping global companies secure their products by testing their firmware during and after the development process, and monitor for new vulnerabilities.</li>
</ul>
<p> </p>
<p></p>
<p><span style="font-size:12pt;"><a href="https://www.firecompass.com/security/vendors/safebreach"><strong>SafeBreach</strong></a></span></p>
<p><a href="https://www.firecompass.com/security/vendors/safebreach"><img class="safebreach-firecompass-emerging-vendors-2018 aligncenter wp-image-8088 align-center" title="safebreach-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/07/download-1-e1530688727292-300x58.png" alt="safebreach-firecompass-emerging-vendors-2018" width="357" height="69" /></a></p>
<ul>
<li><strong><a href="https://www.firecompass.com/security/vendors/safebreach">SafeBreach</a></strong> helps answer the questions security leaders are being asked by their CEO/boards today – Are we secure?” and “Can a breach happen to us?” Their platform simulates hacker breach methods across the entire kill chain to identify breach scenarios in your environment before an attacker does. SafeBreach automatically executes breach methods with an extensive and growing Hacker’s Playbook of research and real-world investigative data. SafeBreach is funded by Sequoia Capital, Deutsche Telekom Capital, Hewlett Packard Pathfinder and investor Shlomo Kramer. </li>
</ul>
<p></p>
<p></p>
<p><a href="https://www.firecompass.com/security/vendors/securityscorecard"><strong><span style="font-size:12pt;">Security ScoreCard</span></strong></a></p>
<p><a href="https://www.firecompass.com/security/vendors/securityscorecard"><img class="securityscorecard-firecompass-emerging-vendors-2018 aligncenter wp-image-8025 align-center" title="securityscorecard-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/security-scorecard-300x55.png" alt="securityscorecard-firecompass-emerging-vendors-2018" width="393" height="72" /></a></p>
<ul>
<li><span><strong><a href="https://www.firecompass.com/security/vendors/securityscorecard">SecurityScorecard</a></strong> grading service helps organizations in an increasingly hyper-connected world better identify, understand and manage all key risks their cloud-based information systems and those of their partners face every second of every day. Its patented solution is the only automated method to monitor all key risk factors on a continuous, real-time basis. This means users will always know the security levels of every organization they work with or share data and be able to take action, quickly and easily. </span> </li>
</ul>
<p></p>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>Shieldx</strong></span></p>
<p><img class="shieldx-firecompass-emerging-vendors-2018 aligncenter wp-image-8028 align-center" title="shieldx-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/shieldx-300x61.jpg" alt="shieldx-firecompass-emerging-vendors-2018" width="369" height="75" /></p>
<ul>
<li><span><strong>ShieldX</strong> is redefining cloud security to better protect organizations against cyber threats—regardless of where sensitive data resides or how it moves across public, private or multi-cloud environments. Organizations are using APEIRO to scale security and micro-segmentation on demand, support business innovation, meet compliance requirements and protect against the latest cyberattacks.</span></li>
</ul>
<p> </p>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>Shiftleft</strong></span></p>
<p><img class="shiftleft-firecompass-emerging-vendors-2018 aligncenter wp-image-8029 size-medium align-center" title="shiftleft-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/shiftleft-300x63.png" alt="shiftleft-firecompass-emerging-vendors-2018" width="300" height="63" /></p>
<ul>
<li><strong>ShiftLeft.io</strong> is developing a new model for protecting software. We limit the attack surface proactively by understanding the Security DNA of each new version of any application or micro-service to strengthen it. This helps businesses increase the speed at which issues resulting from non-conformance with security DNA of their apps can be identified and automatically triaged.</li>
</ul>
<p> </p>
<p></p>
<p><span style="font-size:12pt;"><a href="https://www.firecompass.com/security/vendors/shocard-inc-"><b>Shocard</b></a></span></p>
<p><a href="https://www.firecompass.com/security/vendors/shocard-inc-"><img class="shocard-firecompass-emerging-vendors-2018 aligncenter wp-image-8030 align-center" title="shocard-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/shocard.png" alt="shocard-firecompass-emerging-vendors-2018" width="184" height="184" /></a></p>
<ul>
<li><span><strong><a href="https://www.firecompass.com/security/vendors/shocard-inc-">ShoCard</a></strong> is a digital identity and authentication platform built on a public blockchain data layer, using public/private key encryption and data hashing to safely store and exchange identity data, which includes biometrics such as fingerprint, facial, iris and voice. ShoCard’s approach to identity is different than existing solutions in that the user owns and carries her own data within her mobile app and is the sole person who decides with whom to share it with and which pieces of identification to share. The blockchain in then used to validate that information and confirm other third parties who have definitively certified the identity of the user. There is no privately held central location that holds user’s private information and pieces of a user’s identification does not need to be spread in other services in order to authenticate or prove ownership of an account. </span></li>
</ul>
<p></p>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>Signal Sciences</strong></span></p>
<p><a href="https://www.firecompass.com/security/vendors/signal-sciences"><img class="signalsciences-firecompass-emerging-vendors-2018 aligncenter wp-image-8031 align-center" title="signalsciences-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/SignalSciences-e1530689787996-300x62.jpg" alt="signalsciences-firecompass-emerging-vendors-2018" width="358" height="74" /></a></p>
<ul>
<li><span><strong><a href="https://www.firecompass.com/security/vendors/signal-sciences">Signal Sciences</a></strong> Web Protection Platform (WPP) provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform. Built by practitioners, for practitioners, it is the only solution that works seamlessly across any cloud and infrastructure. Signal Sciences customers include Under Armour, Etsy, Yelp/Eat 24, Datadog, WeWork and more.</span></li>
</ul>
<p></p>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>Signifyd</strong></span></p>
<p><a href="https://www.firecompass.com/security/vendors/signifyd"><img class="alignnone wp-image-8032 aligncenter align-center" src="https://www.firecompass.com/wp-content/uploads/2018/06/signifyd-logo-normal-300x43.png" alt="" width="328" height="47" /></a></p>
<ul>
<li><span><strong><a href="https://www.firecompass.com/security/vendors/signifyd">Signifyd</a></strong> is the world’s largest provider of Guaranteed Fraud Protection and was founded on the belief that e-commerce businesses should be able to grow without fear of fraud. They solve the challenges that growing e-commerce businesses persistently face: billions of dollars lost in chargebacks, customer dissatisfaction from mistaken declines, and operational costs due to tedious, manual transaction investigation. They Guaranteed Payments protect online retailers in the case of chargebacks, supported by a full-service machine-learning engine that automates fraud prevention allowing businesses to increase sales and open new markets while reducing risk. </span></li>
</ul>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>Stackpath</strong></span></p>
<p><a href="https://www.firecompass.com/security/vendors/stackpath"><img class="stackpath-firecompass-emerging-vendors-2018 aligncenter wp-image-8034 size-medium align-center" title="stackpath-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/stackpath-300x54.png" alt="stackpath-firecompass-emerging-vendors-2018" width="300" height="54" /></a></p>
<ul>
<li><span><strong><a href="https://www.firecompass.com/security/vendors/stackpath">StackPath</a></strong> is the intelligent web services platform for security, speed and scale. It is the first platform to unify enterprise security solutions by leveraging collaborative intelligence that makes each service smarter and more secure with every threat detected, in addition to vastly improving the customer experience. More than 30,000 customers, ranging from Fortune 100 companies to early stage startups already use StackPath technology. </span> </li>
</ul>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>StackRox</strong></span></p>
<p><a href="https://www.firecompass.com/security/vendors/stackrox"><img class="stackrox-firecompass-emerging-vendors-2018 aligncenter wp-image-7464 size-medium align-center" title="stackrox-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/04/stackrox-300x95.jpg" alt="stackrox-firecompass-emerging-vendors-2018" width="300" height="95" /></a></p>
<ul>
<li><strong><a href="https://www.firecompass.com/security/vendors/stackrox">StackRox</a> </strong>helps enterprises secure their cloud-native applications at scale. It is the industry’s first detection and response platform that defends containers and microservices from new threats. StackRox enables security teams to visualize the container attack surface, expose malicious activity, and stop attacker activity. It combines a new security architecture, machine learning, and protective actions to disrupt attacks in real time and limit their impact. StackRox is the choice of Global 2000 enterprises and backed by Sequoia Capital, it is chosen among top cyber security companies as finalist at RSA Innovation Sandbox 2018. </li>
</ul>
<p></p>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>Streamsets</strong></span></p>
<p><img class="streamsets-firecompass-emerging-vendors-2018 aligncenter wp-image-8035 size-medium align-center" title="streamsets-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/StreamSets-300x120.png" alt="streamsets-firecompass-emerging-vendors-2018" width="300" height="120" /></p>
<ul>
<li><span><strong>StreamSets</strong> is a big data startup that reinvents how enterprises deliver timely and trustworthy data to their critical applications. We’ve built the industry’s first data operations platform which makes it easy to both build and manage data movement architectures in the face of constant change. Our open source StreamSets Data Collector has been downloaded over 250,000 times and is in use at many of the world’s largest companies. We’re backed by top-tier Silicon Valley venture capital firms, including Accel Partners, Battery Ventures, Ignition Partners and New Enterprise Associates (NEA).</span></li>
</ul>
<p> </p>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>ThreatQuotient</strong></span></p>
<p><a href="https://www.firecompass.com/security/vendors/threatquotient"><img class="threatquotient-firecompass-emerging-vendors-2018 aligncenter wp-image-8016 align-center" title="threatquotient-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/Threatquotient-300x101.jpg" alt="threatquotient-firecompass-emerging-vendors-2018" width="330" height="111" /></a></p>
<ul>
<li><span><strong><a href="https://www.firecompass.com/security/vendors/threatquotient">ThreatQuotient™</a></strong> understands that the foundation of intelligence-driven security is people. The company’s open and extensible threat intelligence platform, ThreatQ™, and cyber security situation room solution. ThreatQ Investigations, empower security teams with the context, customization and prioritization needed to make better decisions, accelerate detection and response, and advance team collaboration. Leading global companies use ThreatQuotient solutions as the cornerstone of their security operations and threat management system. </span> </li>
</ul>
<p></p>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>Trusona</strong></span></p>
<p><img class="trusona-firecompass-emerging-vendors-2018 aligncenter wp-image-8091 size-medium align-center" title="trusona-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/07/download-2-300x80.png" alt="trusona-firecompass-emerging-vendors-2018" width="300" height="80" /></p>
<ul>
<li><strong>Trusona</strong> is the leader in simply secure identity authentication. We developed the world’s first and only insured digital identity authentication solution and are leading a movement where there are no passwords to be created, remembered, stolen, or compromised. Where people are who they say they are – every time. Our solution takes a completely different approach. It is radically simple, and relies on patented technology that uses the unique nature of every interaction to assure the True Persona behind every digital interaction. Trusona. Simply Secured.</li>
</ul>
<p> </p>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>Twistlock</strong></span></p>
<p><a href="https://www.firecompass.com/security/vendors/twistlock"><img class="twistlock-firecompass-emerging-vendors-2018 aligncenter wp-image-8011 align-center" title="twistlock-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/twistlock-300x72.png" alt="twistlock-firecompass-emerging-vendors-2018" width="317" height="76" /></a></p>
<ul>
<li><span><strong><a href="https://www.firecompass.com/security/vendors/twistlock">Twistlock</a></strong> is the leading provider of container and cloud native cyber security solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies – Twistlock gives developers the speed they want, and CISOs the control they need. </span></li>
</ul>
<p> </p>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>UnifyID</strong></span></p>
<p><a href="https://www.firecompass.com/security/vendors/unifyid"><img class="aligncenter wp-image-8092 size-medium align-center" title="unifyid-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/07/download-3-300x64.png" alt="unifyid-firecompass-emerging-vendors-2018" width="300" height="64" /></a></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/unifyid"><strong>UnifyID</strong> </a> is building a revolutionary identity platform based on implicit authentication. Their solution allows people to identify themselves in a unique way that is extremely difficult to forge or crack. Best of all, they are doing it in a way that respects user privacy.They are developing a revolutionary new technique for authentication that relies on implicit authentication. These are factors that are unique to you but don’t require any user action, such as your location, your habits, and various signals from the devices you carry and the sensors around you. They use proprietary machine learning algorithms to discover what makes you unique and calculate a confidence level of how likely it is you based on these signals. </li>
</ul>
<p> </p>
<p></p>
<p><span style="text-decoration:underline;font-size:12pt;"><strong>Zerofox</strong></span></p>
<p><a href="https://www.firecompass.com/security/vendors/zerofox"><img class="aligncenter wp-image-8010 align-center" title="Zerofox-firecompass-emerging-vendors-2018" src="https://www.firecompass.com/wp-content/uploads/2018/06/zerofox-e1530011746904-300x74.png" alt="Zerofox-firecompass-emerging-vendors-2018" width="308" height="76" /></a></p>
<ul>
<li><span><strong><a href="https://www.firecompass.com/security/vendors/zerofox">ZeroFOX</a></strong> protects organizations from the risks introduced by social networking and digital communication platforms. In an age of constant connectivity and social sharing, users have become the primary target for the adversary. By continuously monitoring social platforms for cyber attacks, ZeroFOX protects organizations from the next generation of digital threats. Leveraging cutting edge technology and proven security practices, ZeroFOX provides both targeted protection and global insights. </span></li>
</ul></div>20 Emerging IT Security Vendors to Look Out for in RSA Conference 2018, USAhttps://www.cisoplatform.com/profiles/blogs/20-emerging-it-security-vendors-to-look-out-for-in-rsa-conference2019-11-29T07:00:00.000Z2019-11-29T07:00:00.000ZCISO Platformhttps://www.cisoplatform.com/members/CISOPlatform<div><ul>
<li>We are here, once again, with our list of Top 20 Emerging IT Security Vendors from 500+ vendors attending <strong>RSAC 2018, <span class="aBn"><span class="aQJ">April 16 to 20</span></span> in San Francisco.</strong></li>
<li>BTW, We have also created a <strong>RSAC 1-Minute Itinerary tool</strong> for the ease of attendees, through which you can now navigate the maze of 500+ Vendors at RSAC Expo like a pro. </li>
</ul>
<h2><span style="font-size:18pt;"><strong>Emerging IT Security Vendors:</strong></span></h2>
<p>H<span style="font-size:12pt;">ere is the list of Top 20 Emerging IT Security vendors to watch out for:</span></p>
<p><strong><br /> <img class="aligncenter wp-image-7341 size-medium align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/barkly-e1522831069923-300x102.png" alt="FireCompass Emerging IT Security Vendors 2018" width="300" height="102" /></strong></p>
<ul>
<li><span><a href="https://www.firecompass.com/security/vendors/barkly">Barkly</a> provides organizations with the best defense against today’s evolving threat landscape. Barkly protects against exploits, file-based, and fileless attacks through its patented, multi-layered protection which combines behavioral analysis, CPU-level monitoring and Responsive Machine Learning™. Barkly is simple to deploy and manage through it’s cloud-based SaaS platform and has a unique approach to organization models which result in low false positives for customers.</span></li>
</ul>
<p></p>
<p> </p>
<p><img class="aligncenter wp-image-7366 size-medium align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/BlueTalom-300x86.jpg" alt="FireCompass Emerging IT Security Vendors 2018" width="300" height="86" /></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/bluetalon">BlueTalon</a> is a leading provider of Unified Data Access Control for big data and new data initiatives. The BlueTalon Policy Engine delivers precise, consistent, and dynamic user access controls to data across Hadoop, Spark, Cassandra, and traditional RDBMS. The BlueTalon Audit Engine provides a complete audit trail at the level of detail required for regulatory compliance and effective data security. Leading Fortune 100 companies rely on BlueTalon to eliminate security blind spots and gain visibility and control at the data layer, and BlueTalon has built strong partnerships with Dell EMC and Teradata to serve its customer base. BlueTalon is featured by Gartner in its Market Guide to Data-Centric Audit and Protection.</li>
</ul>
<p></p>
<p> </p>
<p><img class="aligncenter wp-image-7358 size-medium align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/Bricata-e1522830711307-300x49.jpg" alt="FireCompass Emerging IT Security Vendors 2018" width="300" height="49" /></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/bricata">Bricata</a> network security solutions deliver innovative next generation intrusion prevention, advanced threat detection and analysis, and threat hunting to enable large organizations to actively pursue and identify advanced, persistent, and coordinated attacks. A specialized component-based approach to today’s attacks has left organizations with a stack of tools to manage that provide a patchwork of uncorrelated data, leaving penetrable gaps and inconsistent security policies. The Bricata platform provides organizations with process automation, streamlining operations with the most effective, affordable solution for situational awareness and proactive threat defense, reducing complexity, dwell time and time to containment.</li>
</ul>
<p></p>
<p> </p>
<p><img class="aligncenter wp-image-7359 size-full align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/CounterCraft-e1522830693531.jpg" alt="FireCompass Emerging IT Security Vendors 2018" width="196" height="62" /></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/counter-craft">CounterCraft</a> provides a Distributed Deception Platform that allows customers to plan, deploy and manage automated counterintelligence campaigns. It runs across the breadth of their digital assets to discover targeted attacks with a real-time active response and zero false positives, due to its digital breadcrumbs. The solution plants decoys through a wide variety of technical and non-technical assets, such as false servers and fake data, to lure adversaries into thinking they are penetrating companies’ networks. With this innovative cybersecurity approach, CounterCraft can get information on attackers’ and their objectives while misdirecting them. It is a GCHQ Cyber Accelerator alumnus and is supported by the Spanish Ministry of Economy, Industry and Competitiveness, National Cybersecurity Institute (INCIBE), and the European Commission through its H2020 SME Instrument.</li>
</ul>
<p></p>
<p> </p>
<p><img class="aligncenter align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/Deepinstict-300x60.png" alt="FireCompass Emerging IT Security Vendors 2018" width="300" height="60" /></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/deep-instinct">Deep Instinct</a> is the first company to apply deep learning to cybersecurity. Deep learning is inspired by the brain’s ability to learn. Once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct’s artificial brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. As a result, zero-day and APT attacks are detected and prevented in real-time with unmatched accuracy. Deep Instinct brings a completely new approach to cybersecurity that is proactive and predictive. Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices. </li>
</ul>
<p></p>
<p></p>
<p><img class="aligncenter wp-image-7360 size-medium align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/jask-logo-e1522830668512-300x73.jpg" alt="FireCompass Emerging IT Security Vendors 2018" width="300" height="73" /> </p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/jask">JASK</a> is headed by industry leaders from ArcSight, Carbon Black, Cylance and the counter-intelligence community, bringing together decades of experience solving real-world SOC issues. Founded to address the technology gaps that restrict security modernization efforts, JASK is revolutionizing security operations to reduce organizational risk and improve efficiency through technology consolidation, enhanced AI and machine learning. JASK is backed by Dell Technologies Capital, TenEleven Ventures, Battery Ventures and Vertical Venture Partners and is headquartered in San Francisco, California and Austin, Texas. </li>
</ul>
<p></p>
<p></p>
<p><img class="aligncenter wp-image-7344 size-medium align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/lacework_logo-620x400-e1522831214346-300x78.png" alt="FireCompass Emerging IT Security Vendors 2018" width="300" height="78" /></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/lacework">Lacework</a> brings automation, speed and scale to cloud security so that your security and DevOps teams can keep data and applications safe in today’s highly dynamic cloud environments. From the initial assessment of your cloud configuration for compliance, to the on-going monitoring of cloud activities for anomalies and breaches, Lacework has you covered. Our technology, Polygraph®, automatically monitors activities and behaviors of all entities deployed: applications, VMs/workloads, containers, processes, machines, users, and accounts. </li>
</ul>
<p></p>
<p></p>
<p><img class="aligncenter align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/menlo-security-300x134.png" alt="FireCompass Emerging IT Security Vendors 2018" width="271" height="121" /></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/menlo-security">Menlo Security</a>‘s patented Isolation Platform protects organizations from cyber attack by eliminating the threat of malware. The Platform isolates and executes all Web content in the cloud, enabling users to safely interact with websites, links and documents online without compromising security. Menlo Security is trusted by some of the world’s largest enterprises, including Fortune 500 companies and financial services institutions. The company is headquartered in Menlo Park, California.</li>
</ul>
<p></p>
<p></p>
<p><img class="aligncenter size-medium wp-image-7361 align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/NeuVector-logo-300x98.png" alt="" width="300" height="98" /></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/neuvector">NeuVector</a> is the leader in Kubernetes security and delivers the first and only multi-vector container firewall. NeuVector enables the confident deployment of enterprise-wide container strategies, across multi-cloud and on-prem environments. NeuVector delivers east-west container traffic visibility, container protection, and host security in a highly integrated, automated security solution. NeuVector customers include global leaders in financial services, healthcare and publishing, and NeuVector partners with AWS, Docker, IBM, Rancher, Red Hat, others. Founded by industry veterans from Fortinet, VMware, and Trend Micro, NeuVector has developed patent-pending behavioral learning for container security.</li>
</ul>
<p></p>
<p></p>
<p><span><img class="aligncenter size-full wp-image-7356 align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/prevoty1-e1522820797230.png" alt="" width="200" height="91" /></span></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/prevoty">Prevoty</a> provides a new RASP (runtime application self-protection) capability, enabling applications to protect themselves. Unlike traditional security approaches that try to defend against hackers at the network layer, Prevoty works inside the application itself and the analysis engine is smart enough to actively prevent anything malicious from executing. Prevoty is one of the most exciting new companies in the hot security market since, in addition to providing active protection and real-time threat intelligence, the technology can dramatically reduce the time and costs associated with implementation of a secure SDLC.</li>
</ul>
<p></p>
<p> </p>
<p><img class="aligncenter align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/red-canary.png" alt="red-canary.png" /></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/red-canary">Red Canary</a> was founded to make customers’ security better. Our Managed Detection and Response solution detects threats that bypass other security tools. We inspect every piece of activity from an organization’s systems and never burden customers with false positives. Instead, customers receive human-vetted detections that give them the intelligence and tooling they need. Red Canary empowers organizations to stop attacks before they result in breaches. For the first time, every organization now has access to the security capabilities that can defend against today’s advanced threats.</li>
</ul>
<p></p>
<div><span style="font-size:14pt;"><strong><a href="https://www.cisoplatform.com/profiles/blogs/top-7-vendors-in-cyber-threat-intelligence-market-at-rsac-2017" target="_blank">READ MORE >> Top 7 Vendors in Cyber Threat Intelligence market at RSAC 2017</a></strong></span></div>
<p> </p>
<p><img class="aligncenter size-medium wp-image-7348 align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/riskrecon-logo-e1522821128164-300x60.png" alt="" width="300" height="60" /></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/riskrecon">RiskRecon</a> provides a SaaS platform that helps organizations more effectively manage the risk reality of increasingly interconnected IT ecosystems by delivering frequent, comprehensive and actionable security performance measurements. Using proprietary data gathering techniques, RiskRecon creates a 360-degree risk profile of an enterprise’s public IT footprint. Based on that footprint and a detailed analysis, a RiskRecon rating and report is generated providing detailed, actionable information with context. No additional analysis is required. Clients rely on RiskRecon to bring greater transparency, accountability and productivity to their vulnerability and third-party risk management processes.</li>
</ul>
<p></p>
<p> </p>
<p><img class="aligncenter size-medium wp-image-7349 align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/SentinalOne-3-e1522821105175-300x63.png" alt="" width="300" height="63" /></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/sentinelone">SentinelOne</a> is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organizations secure their assets with speed and simplicity. SentinelOne unifies prevention, detection, response, remediation and forensics in a single platform powered by artificial intelligence. With SentinelOne, organizations can detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated integrated response and to adapt their defenses against the most advanced cyberattack. The company is recognized by Gartner as a Visionary for Endpoint Protection and has enterprise customers in North America, Europe, and Japan.</li>
</ul>
<p></p>
<p> </p>
<p><img class="aligncenter size-medium wp-image-7362 align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/SignalSciences-e1522830645532-300x64.jpg" alt="" width="300" height="64" /></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/signal-sciences">Signal Sciences</a> Web Protection Platform (WPP) provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform. Built by practitioners, for practitioners, it is the only solution that works seamlessly across any cloud and infrastructure. Signal Sciences customers include Under Armour, Etsy, Yelp/Eat 24, Datadog, WeWork and more.</li>
</ul>
<p></p>
<p> </p>
<p><img class="aligncenter size-full wp-image-7363 align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/sixgill.jpg" alt="" width="200" height="200" /></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/sixgill">Sixgill</a> is a cyber threat intelligence company that covertly and automatically analyzes Dark Web activity detecting and preventing cyber-attacks and sensitive data leaks before they occur. Utilizing advanced algorithms, Sixgill’s cyber intelligence platform provides organizations with continuous monitoring, prioritized real time alerts and actionable intelligence. Through advanced data mining and social profiling, Sixgill examines threat actors and their patterns of behavior, identifying and predicting cyber crime and terrorist activity. Automatic monitoring of closed, open and hybrid dark-nets allows for accurate real-time targeted Dark Web intelligence.</li>
</ul>
<p></p>
<p> </p>
<p><img class="aligncenter size-full wp-image-7350 align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/Stackrox-e1522821086537.png" alt="" width="112" height="100" /></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/stackrox">StackRox</a> helps enterprises secure their cloud-native applications at scale. StackRox is the industry’s first detection and response platform that defends containers and microservices from new threats. StackRox enables security teams to visualize the container attack surface, expose malicious activity, and stop attacker activity. It combines a new security architecture, machine learning, and protective actions to disrupt attacks in real time and limit their impact. StackRox is the choice of Global 2000 enterprises and backed by Sequoia Capital.</li>
</ul>
<p></p>
<p></p>
<p><strong><img class="aligncenter size-medium wp-image-7351 align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/ThreatBook-cybersecurity-e1522821019648-300x69.png" alt="" width="300" height="69" /></strong></p>
<ul>
<li><span><a href="https://www.firecompass.com/security/vendors/threatbook">ThreatBook</a> is China’s first security threat intelligence company, dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks. The ThreatBook team has in-depth understanding of China’s distinct cyber security landscape as well as an international perspective of the global cyber security space. ThreatBook offers a variety of SaaS-based threat intelligence products and services world widely, helps partners and customers to improve their existing detection and defense capabilities at different stage of threat attack, and enables industry customers to deal with complex, continually changing threats in a fast, accurate and cost-effective manner.</span></li>
</ul>
<p></p>
<p></p>
<p> </p>
<p><img class="aligncenter size-medium wp-image-7364 align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/Threatquotient-e1522830599576-300x86.jpg" alt="" width="300" height="86" /></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/threatquotient">ThreatQuotient™</a> understands that the foundation of intelligence-driven security is people. The company’s open and extensible threat intelligence platform, ThreatQ, empowers security teams with the context, customization and prioritization needed to make better decisions, accelerate detection and response and advance team collaboration. Leading global companies use ThreatQ as the cornerstone of their threat operations and management system, increasing security effectiveness and efficiency.</li>
</ul>
<p></p>
<p> </p>
<p><img class="aligncenter size-medium wp-image-7352 align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/zerofox-e1522820912986-300x68.png" alt="" width="300" height="68" /></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/zerofox">ZeroFOX</a>, the innovator of social media & digital security, protects modern organizations from dynamic security, brand and physical risks across social, mobile, web and collaboration platforms. Using targeted data collection and artificial intelligence-based analysis, ZeroFOX protects modern organizations from targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. Recognized as a Leader in Digital Risk Monitoring by Forrester, the patented ZeroFOX SaaS platform processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, HipChat, Instagram, Reddit, Pastebin, Tumblr, YouTube, VK, mobile app stores, the deep & dark web, domains and more.</li>
</ul>
<p></p>
<p></p>
<p><img class="aligncenter wp-image-7365 align-center" src="https://www.firecompass.com/wp-content/uploads/2018/04/Zimperium-300x220.jpg" alt="" width="240" height="176" /></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/zimperium">Zimperium</a> is the industry leader in Mobile Threat Defense with the world’s largest deployment of mobile device sensors. Only Zimperium offers real-time, on-device protection against both known and unknown threats, enabling detection and remediation of attacks on all three levels – the device, the network and the application. Zimperium’s patented z9™ machine-learning detection engine uses artificial intelligence to power zIPS™, the world’s first mobile on-device Intrusion Prevention System app, and zIAP™, an embedded, In-App Protection SDK that delivers self-protecting iOS and Android apps as well as comprehensive app risk analysis with z3A™. Headquartered in San Francisco, Zimperium is backed by major investors including Samsung, Telstra, Sierra Ventures and Warburg Pincus.</li>
</ul>
<p></p>
<p> </p>
<p><img class="size-medium wp-image-8297 aligncenter align-center" src="https://www.firecompass.com/wp-content/uploads/2018/09/logo-yello-1-300x120.png" alt="" width="300" height="120" /></p>
<ul>
<li><a href="https://www.firecompass.com/security/vendors/dnif-product-of-netmonastery-">DNIF</a>, a product of NETMONASTERY offers solutions to the world’s most challenging cybersecurity problems. Recognized by Gartner and used by some of the well-known global companies like PwC, Vodafone and Tata, this next generation analytics platform combines Security and Big Data Analytics to provide real-time threat detection and analytics to the most critical data assets on the Internet.</li>
</ul>
<p>With over a decade of experience in threat detection systems, DNIF has one of the fastest query response times and bridges the gap between searching, processing, analyzing and visualizing data thereby enabling companies with better SOC (Security Operations Center) management.</p></div>Key Program Metrics Of Next Generation Firewall (NGFW)https://www.cisoplatform.com/profiles/blogs/key-program-metrics-of-next-generation-firewall-ngfw2019-11-29T11:00:00.000Z2019-11-29T11:00:00.000ZDenisehttps://www.cisoplatform.com/members/Denise<div><p><span>A Next-Generation Firewall (NGFW) is an integrated network platform that combines a traditional firewall with application specific granular controls to help them detect application specific attacks. They help detect attacks through application specific protocols such as HTTP, HTTPS, SMTP and so on. It also incorporates various network device filtering functionalities such as an intrusion prevention system (IPS), Web filtering and Email security. They also features functionalities such as centralized management, SSL interception, VPN’s, Virtualized deployment, QoS/bandwidth management, Gateway antivirus and Third-party integration (i.e. Active Directory).</span></p><p><span>To understand the difference between NGFW & UTMs Please go through the blog titled “<a href="http://www.slideshare.net/andrewplato/utm-vs-ngfw-a-single-shade-of-gray"><strong>UTM vs NGFW – A Single Shade of Gray</strong></a><strong>” </strong>in the <strong>Blog</strong> section.</span></p><h3><span><strong>Key Program Metrics : </strong></span></h3><div><strong>% of application attacks blocked in a predefined period :</strong></div><div class="margin-left-15"><p><span>Percentage of server application attacks blocked by the firewall. This can be helpful in tweaking the rule-sets to prevent future attacks</span></p></div><div class="margin-left-15"><p><span><strong># redundant rules :</strong></span><br /> <span>These are the rules that are masked, completely or partially, by other rules that are either placed higher up in the rule base. they add to the inefficiency and must be detected and removed subsequently</span></p></div><div class="margin-left-15"><p><span><strong># of exception in rules :</strong></span><br /> <span>These are the exceptional cases where a rule is created temporarily to cater to the particular business need. care should be taken that all such rules are removed as soon as they are expired.</span></p></div><div class="margin-left-15"><p><span><strong># rules with permissive services :</strong></span><br /> <span>Permissive services give more access then is needed to the destination by allowing additional services. The most common examples of this are rules with “ANY ” in the service field. These kind of rules should be minimized</span></p></div><div class="margin-left-15"><p><span><strong># rules with risky services :</strong></span><br /> <span>Services such as telnet, ftp, snmp, pop etc. are risky because they usually credentials to be passed in plain text. Any service that exposes sensitive data or allows for shell access should be tightly monitored and controlled.</span></p></div><div class="margin-left-15"><p><span><strong># rules with no documentation :</strong></span><br /> <span>Firewall rules should be documented. Rules should be explained in detail, business case is described. Any rule change shall be according to proper change ticket.</span></p></div><div class="margin-left-15"><p><span><strong># rules with no logging :</strong></span><br /> <span>Firewall logs are useful for troubleshooting and forensics. It is very imperative that firewall logging hould be enabled and logs are leveraged for proper firewall management</span></p></div><p><span>Do let me know if you want us to add or modify above information.</span></p><p><span>Check out the</span> <a href="https://www.firecompass.com/security/market/next-generation-firewall-ngfw">Next Generation Firewall</a> <span>market within </span><span>Product comparison platform to get more information on these markets</span></p><p></p><div><span style="font-size:14pt;"><strong><a href="https://www.cisoplatform.com/profiles/blogs/risks-of-shadow-it-in-financial-services-firms" target="_blank">READ MORE >> Risks of Shadow IT in Financial Services Firms</a></strong></span></div><p></p></div>Understanding Shadow IT Risk for OT Departmentshttps://www.cisoplatform.com/profiles/blogs/understanding-shadow-it-risk-for-ot-departments2019-12-18T04:00:00.000Z2019-12-18T04:00:00.000Zprithahttps://www.cisoplatform.com/members/pritha<div><p></p>
<p><span>Here we will explore the Shadow IT Risks for OT Departments. Operations Technology groups can be an integral part of important business functions like production, maintenance and more. This means there are a lot of IT related functions which can be handled by the OT department members in terms of functionality. However, not involving the IT department could mean these IT functions could cause potential security concerns. The OT department member might not be aware of the exact way of handling the IT function like a professional IT member can. Easy attack vectors like servers, insecure IoT devices can pose as common security threats.</span></p>
<p><span>Shadow IT has been an increasing trend in the LoB departments. According to a C-space report, LoB managers spent more than 30% of their time making IT decisions. A likely reason is, it’s faster to get things done sometimes without going through an IT department who already are bandwidth constrained. With the rise of high-tech industrial equipments, the dependence on IT related operations increase. According to an IDC report, it predicts IoT spending will reach $1.1 trillion in 2021. This is really placing a higher demand on IT functions, thus needing IT guys in the OT departments.</span></p>
<p><span><b>What’s The Problem?</b></span></p>
<p><span>In short, OT Department is responsible for major functions in the organization and doesn’t necessarily coordinate with the IT department for all IT needs. The enormous small activities get work done faster but this ends in orphaned assets and various other vulnerabilities that the OT department person didn’t have the skills to handle.</span></p>
<p><span><b>Possible Mitigation Strategies</b></span></p>
<ul>
<li><strong><span>Stricter IT Policy</span></strong></li>
</ul>
<p><span>Stricter IT policy for connected OT systems could be a solution. However, there are implementation challenges. The OT department may not deem it necessary to contact the IT. OT Department has the responsibilities of production, maintenance and thus like might to retain the authorities here. The IT may have to enforce more severe actions.</span></p>
<p><span>The IT concerns may be well founded based on the trending reports. According to a Gartner report, it predicts by 2020, IoT will be involved in more than 25 percent of known enterprise security attacks.</span></p>
<p><span>The OT-IT convergence and departmental cooperation seems like a healthy balance to lower costs, increase efficiencies and minimize Shadow IT.</span></p>
<ul>
<li><strong><span>Using Third Party Vendors With Integrated Solutions And Converged Skills (OT-IT)</span></strong></li>
</ul>
<p><span>These parties can have a set of understanding on both departmental skills (major ones), thus bringing in great flexibility. Advanced OT technologies can be complicated in terms of implementation. This third party adds in a pool of skill resources which are transferable between the OT and the IT departments.</span></p>
<ul>
<li><strong><span>Continuous IT – OT Asset & Risk Identification</span></strong></li>
</ul>
<p><span>Various tools like Shodan can help in achieving this. The continuous tracking /risk identification of all IT – OT (inter-department) assets can help. The IT department can then formulate their policy to meet the needs of the OT department and even formulate training programs for the simple requirements empowering OT department.</span></p>
<p><strong><span>Reference :</span></strong></p>
<p><span><a href="https://www.hpe.com/us/en/insights/articles/why-shadow-it-is-a-risky-bet-for-ot-departments-1803.html#">https://www.hpe.com/us/en/insights/articles/why-shadow-it-is-a-risky-bet-for-ot-departments-1803.html#</a></span></p>
<div class="firec-it-grc-ad" id="firec-1762349284"><p> </p>
<div><span style="font-size:14pt;"><strong><a href="https://www.cisoplatform.com/profiles/blogs/key-program-metrics-of-vulnerability-assessment" target="_blank">READ MORE >> Key Program Metrics of Vulnerability Assessment</a></strong></span></div>
</div></div>Third-Parties: Risks & Threats Associated With Themhttps://www.cisoplatform.com/profiles/blogs/third-parties-risks-threats-associated-with-them2019-12-18T04:30:00.000Z2019-12-18T04:30:00.000Zprithahttps://www.cisoplatform.com/members/pritha<div><p class="entry-title"></p>
<p class="entry-title"><span>Third-Party risks are more as the Third-Party breaches continue to dominate and these breaches are expensive to organizations. Third-parties are those companies that you directly work with such as data management companies, law firms, e-mail providers, web hosting companies, subsidiaries, vendors, sub-contractors. Third-Parties are basically any organization, whose employees or systems have access to your systems/ data. However, third-party cyber risk is not limited to these companies. Any external software/ hardware that you use for your business also poses a cyber risk. Sometimes the JavaScript that is added to your website, for analytics, may cause a breach by exposing the information of people who visits your website. Recent hacks like CCleaner in 2017 exposed backdoors to well-known software have confirmed that the definition of third-party should not be limited to only the companies that you directly work with. IoT devices can even be considered as a third-party and can be source of a breach.</span></p>
<p></p>
<div class="entry-content"><p><span>According to survey conducted by Deloitte in 2016, 87%of organizations have experienced disruptive incidents with the Third-Parties they have worked with. Another research done by Soha Systems found out that around 63% of breaches are because of Third-Parties.</span></p>
<p></p>
<p><span><strong>Sources:</strong></span></p>
<p><span style="font-size:10pt;"><strong><a href="https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html">https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-</a><a href="https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html">century.html</a></strong></span></p>
<p><span style="font-size:10pt;"><strong><a href="https://www.normshield.com/2018-guide-to-select-3rd-party-cyber-risk-assessment-tool/">https://www.normshield.com/2018-guide-to-select-3rd-party-cyber-risk-assessment-tool/</a></strong></span></p>
<p><span><strong>How to Assess Third-party Risks:</strong></span></p>
<p><span>Many Companies don’t conduct any assessment of the risk of Third-Parties, or sometimes they use age old questionnaire methodology like sending a lot of questions for Third-Parties to answer. Firstly, the questionnaire-based approach is very time consuming. Though there are so many online tools that simplify the process, but the answers got from questionnaire approach were not that reliable. Even if you continue with the assumption that all the questions answered by Third-Parties are correct to gather results quickly, there might be some cyber risks which are invisible to Third-Parties. These types of invisible risks can be detected by gathering cyber threat intelligence and by risk evaluation which companies like FireShadows can help.</span></p>
<p><span>Fortunately, there are platforms like FireShadows that gather third-party cyber risk data and provide a risk score or security rating for companies. The information gathering is done by a method called “passive scan” where non-intrusive methods are used, and company assets remain untouched. It is basically a hacker’s view of the Third-Parties external cyber risk. The OSINT (Open-Source Intelligence) data is collected from many feeds such as reputation services, hacker sites/forums, vulnerability databases, Internet-wide scanners, social media, paste sites, black markets, underground forums, etc. Information gathering should be done for the company of interest and any related third-party company.</span></p>
<p></p>
</div>
<div><span style="font-size:14pt;"><strong><a href="https://www.cisoplatform.com/profiles/blogs/20-emerging-it-security-vendors-to-look-out-for-in-rsa-conference" target="_blank">READ MORE >> 20 Emerging IT Security Vendors to Look Out for in RSA Conference 2018, USA</a></strong></span></div></div>How Missing Continuous Monitoring Makes Third-Party Risk Management Programs Ineffectivehttps://www.cisoplatform.com/profiles/blogs/how-missing-continuous-monitoring-makes-third-party-risk-manageme2019-12-18T05:00:00.000Z2019-12-18T05:00:00.000Zprithahttps://www.cisoplatform.com/members/pritha<div><p></p>
<p><span>Many organizations have hundreds of vendors and Third-Party risk exposure is one of the biggest threats. Most organizations depend upon partners, vendors, suppliers, contractors and other third parties for day-to-day operations. Each of them presents some potential risk to the organization.</span></p>
<p><span>Third-Party Risk Management programs help in assessing the cybersecurity of vendors/3<sup>rd</sup> parties that handle an organization’s sensitive data or have access to internal IT systems. The main tools used for Third-Party/Vendor Risk Management are</span></p>
<ul>
<li><span>Questionnaires method</span></li>
<li><span>Vulnerability Assessments</span></li>
</ul>
<p><span>But these programs miss the key component of effective Third-Party risk management, which is continuous monitoring. Without continuous monitoring, the organization’s sensitive data is still at risk and the internal IT systems might be more at risk which you may not realize.</span></p>
<p><span>Here are the reasons why you should consider continuous monitoring for Third-Party risk management:</span></p>
<h2><span><strong>1. </strong><strong>Why Continuous Monitoring is required?</strong></span></h2>
<p><span>Cyber attacks through third parties have become more common, IT teams started concentrated on cybersecurity of their vendors. Continuous third-party monitoring helps in the improvement of event identification time, event remediation time, response time to events, in comparing security postures among vendors/3<sup>rd</sup> parties, industry-specific technology trends.</span></p>
<h2><span><strong>2. </strong><strong>Questionnaire Methods/ Point-In-Time Assessments Are Ineffective:</strong></span></h2>
<p><span>There are many third-Party risk management tools like questionnaire methods, Vulnerability assessments, penetration tests. But these assessments are done at a single point of time and reflects the cybersecurity posture at that time. Cyber attacks can happen any day and without continuous monitoring, threats and vulnerabilities could not be found out immediately. Continuous monitoring will help the organizations to identify the possible threats and recover based on the technologies implemented. Questionnaire driven approach is flawed since vendors’ answers may not represent the reality and conducting a comprehensive audit is time-intensive and costly and is infeasible to conduct regularly.</span></p>
<p><span>FireCompass continuously monitors, analyses and provides alerts on any changes or risks associated. Also, its dashboard gives the opportunity to organization to choose their best vendors based on security score to continue their partnership.</span></p>
<h2><span><strong>3. </strong><strong>Continuous Monitoring Is Necessary:</strong></span></h2>
<p><span>Continuous Monitoring of vendor risk is necessary for competitive organizations as Data Breaches are becoming common and all it takes is one weakness (risk) from a vendor that would give away sensitive information/data. Public and consumers expect that the organizations will make efforts to protect the data. If your organization experienced a breach caused by a third party then the fact is that consumers probably were not caring whether their information was accessed via your systems or some vendors.</span></p>
<h2><span><strong><a href="https://www.firecompass.com/" target="_blank">>>See For Yourself (Free Trial): Continuous Recon & Monitoring</a></strong></span></h2>
<p></p>
<h2><span><strong>Summary:</strong></span></h2>
<p><span>Continuous Monitoring reduces data breaches, increases accountability. </span></p>
<p></p>
<p></p>
<p><span><strong>Reference:</strong></span></p>
<p><span><strong><a href="https://www.firecompass.com/recon-and-attack-platform-firecompass/">https://www.firecompass.com/recon-and-attack-platform-firecompass/</a></strong></span></p>
<p><span><a href="https://www.pericertum.com/solutions/third-party-risk-scoring/">https://www.pericertum.com/solutions/third-party-risk-scoring/</a></span></p>
<div class="sharify-container"></div>
<div><span style="font-size:14pt;"><strong><a href="https://www.cisoplatform.com/profiles/blogs/learn-more-about-the-key-use-cases-of-network-atp-technology-1" target="_blank">READ MORE >> Learn More About the Key Use Cases Of Network ATP Technology</a></strong></span></div></div>Top 4 Best Practices To Manage Shadow IThttps://www.cisoplatform.com/profiles/blogs/top-4-best-practices-to-manage-shadow-it2019-12-18T07:00:00.000Z2019-12-18T07:00:00.000Zprithahttps://www.cisoplatform.com/members/pritha<div><p></p>
<p><span>Here is a small list of the major policies and best practices to manage Shadow IT</span></p>
<p><span><strong>Policies To Have</strong></span></p>
<p><span><strong>1.Have A Shadow IT Policy</strong></span></p>
<p><span>Create a policy document that takes care of the major areas of Shadow IT Management. This will make sure all company assets and services get registered on a single repository from and all major data sharing gets accounted for including an organization’s subdomain, third-party services etc.</span></p>
<p><span><strong>2. Use IT Department As A Service-Delivery Organization</strong></span></p>
<p><span>Associating every major activity through the IT increases the chances of proper use of the IT infrastructure, mostly making sure major activities are logged. This has certain dependencies on the IT policy of course</span></p>
<p><span><strong>3.Guideline For IT Budgeting & Procurement</strong></span></p>
<p><span>This is one of the major areas that the policies must take care of. This will allow for all major services being logged and thus the data shared gets logged and gets stopped from becoming Shadow IT</span></p>
<p><span><strong>4.Guideline For IT System Consolidation</strong></span></p>
<p><span>The IT infrastructure should be very well documented as this allows for the data capture and lose points. The policies must be coherent with the same.</span></p>
<p><span><strong>What Not To Do</strong></span></p>
<p><span><strong>Practice #1: Use Of Substandard Development Techniques</strong></span></p>
<p><span>Shadow application development needs one to have a decent understanding of software architecture, secure programming guidelines etc. Often managers of non-technical background do not have this in place causing sensitive data to be mishandled</span></p>
<p><span><strong>Practice #2: Over-Reliance on Shadow Cloud Provider Security</strong></span></p>
<p><span>Often times it may be assumed the cloud provider will handle the security needs. The extent of this expectation needs verification. Proper implementation of the security features could make a huge difference.</span></p>
<p><span><b>Practice #3: Unsecured Shadow File Storage / Mobility</b></span></p>
<p><span>How and where files or sensitive data may be stored must be well understood and implemented in the organization. This will mean the organization can track and maintain the logs of the registered data sources. In case of absence of this, on an occurrence of the breach, it is very hard to understand what all got compromised, since there may exist untracked data sources. BYOD could also be such a use case where it increases the efficiency of the worker but adds security issues.</span></p>
<p><span><b>Practice #4: Use of Pre-Hacked Shadow IT Drives</b></span></p>
<p><span>An example of this could be an attack like ‘Bad USB’. In this, the USB firmware (the part that controls the action of the USB when connected) could get administrator rights and pass on data from the endpoint it is connected to. This is hard to identify as the malware-scanning software do not detect it. Thus a compromised hardware could make things very dangerous.</span></p>
<p><span><strong>Reference :</strong></span></p>
<p><span><a href="http://www.isaca.org/About-ISACA/Press-room/News-Releases/2017/Pages/ISACA-Shares-Eight-Controls-to-Help-Manage-Shadow-IT-and-Optimize-Its-Benefits.aspx">http://www.isaca.org/About-ISACA/Press-room/News-Releases/2017/Pages/ISACA-Shares-Eight-Controls-to-Help-Manage-Shadow-IT-and-Optimize-Its-Benefits.aspx</a></span></p>
<p><span><a href="https://www.travelers.com/business-insights/industries/technology/5-shadow-IT-practices-that-put-tech-companies-at-risk">https://www.travelers.com/business-insights/industries/technology/5-shadow-IT-practices-that-put-tech-companies-at-risk</a></span></p>
<p><span><a href="https://www.servercentral.com/managing-shadow-it-risks/">https://www.servercentral.com/managing-shadow-it-risks/</a></span></p>
<p><span><a href="https://www.cio.com/article/2380960/byod/6-tips-to-help-cios-manage-shadow-it.html">https://www.cio.com/article/2380960/byod/6-tips-to-help-cios-manage-shadow-it.html</a></span></p>
<div><div><span style="font-size:14pt;"><strong><a href="https://www.cisoplatform.com/profiles/blogs/key-metrics-of-enterprise-mobility-management-emm" target="_blank">READ MORE >> Key Metrics Of Enterprise Mobility Management (EMM)</a></strong></span></div>
</div></div>[Panel Discussion]Third Party Risk Management: Checklists, Frameworks & Toolshttps://www.cisoplatform.com/profiles/blogs/panel-discussion-third-party-risk-management-checklists2020-04-01T06:30:00.000Z2020-04-01T06:30:00.000ZCISO Platformhttps://www.cisoplatform.com/members/CISOPlatform323<div><p>At CISO Platform Annual Summit 2020, we had a panel discussion on the topic of <strong>Third Party Risk Management: Checklists, Frameworks & Tools</strong>, including industry stalwart like Sunil Varkey [HSBC] (Moderator), N D Kundu [<span>Bank of Baroda</span>], Jitendra Chauhan [FireCompass], SURYANARAYANAN.K [<span>CENTRAL BANK OF INDIA</span>], Parag Kulkarni [<span>Bajaj Finance Ltd</span>]</p>
<br />
<br />
<br />
<p></p>
<p><span>Here is the video of what was discussed during the Panel Discussion </span></p>
<p><iframe src="https://www.facebook.com/plugins/video.php?href=https%3A%2F%2Fwww.facebook.com%2FCisoplatform%2Fvideos%2F299762797666265%2F&show_text=0&width=560" width="560" height="315" frameborder="0" allowfullscreen=""></iframe>
</p></div>CISO Webinar : Learn how to create and manage your enterprise third party risk management programhttps://www.cisoplatform.com/profiles/blogs/ciso-webinar-learn-how-to-create-and-manage-your-enterprise-third2020-06-23T07:39:25.000Z2020-06-23T07:39:25.000Zprithahttps://www.cisoplatform.com/members/pritha<div><p><span>Third party vendors and suppliers often have access to your network and your organisation's confidential information. The best way to prevent a data breach is to have robust program to assess how your third parties are managing their risk and protecting your data. Organisations must have a clear understanding of the risks inherent in their business relationships with third parties. How should you approach managing third party risk?</span></p>
<p><span>Wayne Tufek (Frequent speaker at RSA Conference) will be joining us to discuss the topic</span></p>
<p><span style="font-size:12pt;"><a href="https://bit.ly/2CpRveq" target="_blank">>> Register here to join us here</a></span></p>
<p></p>
<p></p>
<p><span style="font-size:18pt;"><strong>What Will You Learn ?</strong></span></p>
<p><span>-Discuss the major failings of traditional third party risk management programs<br />-Creating a supply chain awareness program<br />-Creating a comprehensive catalogue of vendors and suppliers<br />-Risk based segmentation of identified vendors and suppliers<br />-Risk assessment and rules based due diligence activities<br />-The key contractual clauses all contracts with third parties should contain and why<br />-Methods for continuous monitoring<br />-How to develop and present a supplier risk dashboard for management<br />-A model for a comprehensive process to effectively and efficiently manage third party risk</span></p>
<p><span style="font-size:12pt;"><a href="https://bit.ly/2CpRveq" target="_blank">>> Register here to join us here</a></span></p>
<p></p></div>