Cavirin

- Website: https://www.cavirin.com/
Company Description:
Cavirin delivers an Enterprise-Class Cyber Security framework that presents up-to-the-minute knowledge of system-wide security strengths and weaknesses. Whether in the cloud or the corporate data center, our agentless CyberPosture Intelligence solution enables cross-platform security monitoring, reporting, remediation, and compliance. We provide concise views into the security framework of Enterprise systems and empower CSIOs, and their teams to respond to threats rapidly and decisively. Our top priority is helping our customers achieve and maintain the highest standards of security and compliance in the constantly changing technological landscape.
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.
Certes Networks

- Location: Pittsburgh, PA
- Email: info@certesnetworks.com
- Main: 412-262-2571
- Website: www.certesnetworks.com
Company Description:
Certes Networks Provable Security™ introduces a new way to think about data security and the effectiveness of your security strategy based on the Certes Five Pillars, key performance indicators (KPIs) that are quantifiable, measurable and outcomes driven: Policy Enforcement; Crypto-segmentation; Scalability; Visibility; and Observability. Certes Layer 4 Solution delivers on these KPIs and is able to quantify security’s role to build, modify and measure a security strategy that aligns and protects the needs of the organization while mitigating risk.
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.
Carbon Black

- Location: Waltham, MA
- Email: contact@carbonblack.com
- Main: (617)-393-7400
- Website: www.carbonblack.com
Company Description:
Carbon Black has been a leader in endpoint security for years. With the VMware Carbon Black Cloud™, they are providing an endpoint protection platform to consolidate security and provide you information needed to secure your endpoints, using a single lightweight agent. Their technology approach differs from other security vendors. The VMware Carbon Black Cloud focuses on understanding attackers’ behavior patterns, enabling us to detect and stop never-seen-before attacks. Leveraging the power of the cloud, we analyze more than 500B events per day across millions of global endpoints, helping you stay ahead of emerging attacks.
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.
CyberX

- Location: Waltham, MA
- Main: 1.617.209.6565
- Email: info@cyberx-labs.com
- Website: www.cyberx-labs.com
Company Description:
CyberX is the only industrial cybersecurity platform built by blue-team cyber-experts with a proven track record defending critical national infrastructure. They were the ones who developed the technology solutions – sometimes overnight – in real environments to address real and immediate threats … and were the ones who deployed them in the field and made sure they worked, day in and day out, even when managed by people who had to worry about countless other things – like survival. This continues to be what they do at CyberX — practical enterprise-grade cybersecurity for defending critical infrastructure in any environment.
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.
CyberProof

- Location: Viejo, CA
- Main: 1.949.716.8757
- Email: info@cyberproof.com
- Website: www.cyberproof.com
Company Description:
CyberProof is a security services company that intelligently manages your organization’s incident detection and response. From intelligence feeds to risk reduction plans, your entire experience with CyberProof is completely customized to your specific company profile. CyberProof manages the monitoring, detection, response, and resolution of any cyber threat you may face, so your company can recover fast and stay safe. CyberProof aims to give complete transparency and dramatically reduces the cost and time needed to respond to security threats and minimize business impact.
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.
Check Point

- Location: San Carlos, CA
- Main: 1.800.429.4391
- Website: www.checkpoint.com
Company Description:
Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with their new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry’s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.
CENTRI

- Location: Seattle, WA 98133
- Main: 206.395.2793
- Website: www.centritechnology.com
Company Description:
CENTRI provides a complete, advanced security solution for the Internet of Things. Our flexible, software-only platform enables thing makers and developers to quickly get to market with purpose-built IoT security to protect their data from chip to Cloud. CENTRI eliminates your risk of data theft and delivers device integrity with modern, standards-based technologies for the connected world. Using heavyweight industry standard encryption, CENTRI Protected Sessions is optimized for lightweight devices with data compression and a tiny footprint, providing both security and efficiency between the endpoint device and the back of the cloud.
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.
Cylance

- Location: Irvine, CA
- Main: 1.888.893.4743
- Website: www.cylance.com
Company Description:
The Predictive Advantage. Achieved via Perpetual Prevention. Cylance provides a solution that is proven able to block emerging threats on average 25 months before they are first detected in the wild (source: SE Labs Report). They have stopped tens of millions of potential attacks with a system that is continually learning and continually getting better. Our unique artificial intelligence (AI) approach – predicting and protecting against known and unknown malware, fileless attacks and zero-day payload execution – has been deployed for more than 3,400 forward-thinking customers securing 14.5 million endpoints.
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.
Core Security

- Location: Alpharetta, GA,
- Main: (678)-304-4500
- Website: www.coresecurity.com
Company Description:
Core Security’s analytics-driven approach to security and remediation enables customers to manage access and identify vulnerabilities to minimize risks and maintain continuous compliance. By sharing intelligence across various security disciplines, customers can automate manual processes using consistent data, prioritization methods, and reporting, to cut remediation time, reduce risk, and ultimately secure critical assets from both the user access and infrastructure vulnerability perspective. Core Security enables enterprises to take a more comprehensive and predictive approach to safeguarding critical data and assets.
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.
Cisco

- Location: San Jose, CA
- Website: www.cisco.com
Company Description:
With their integrated portfolio and industry-leading threat intelligence, Cisco gives you the scope, scale, and capabilities to keep up with the complexity and volume of threats. Putting security above everything helps you innovate while keeping your assets safe. Cisco prioritizes security in all that we do. Only with Cisco can you attain effective network security to face tomorrow’s evolving threats.
Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.