CipherCloud

Company Description:

CipherCloud, the leader in cloud data security, enables companies to adopt the cloud while ensuring data protection, compliance and control. CipherCloud delivers a comprehensive multi-cloud security platform that integrates advanced data protection, adaptive policy controls, monitoring, cloud risk analysis. CipherCloud was named by KuppingerCole as the Overall Leader in the CASB market and was named Cloud Computing Security Product of the Year by SC Magazine.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Censornet

Company Description:

Censornet delivers security outcomes that take your organization beyond events and alerts, and into 24×7 automated attack prevention with our advanced cloud security solution. Our cloud security platform integrates email and web security, CASB (Cloud Access Security Broker) and adaptive MFA (Multi-Factor Authentication) activating the Autonomous Security Engine (ASE) to take you beyond alert driven security and into real-time automated attack prevention.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


CyberArk

Company Description:

CyberArk has teamed with the world’s leading technology providers to create the industry’s only Privileged Access Security Marketplace with hundreds of certified hardened joint solutions and plug-ins. With CyberArk’s Privileged Access Security Solution, you can meet your compliance requirements and reduce your security risk without introducing additional operational complexity.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Centrify

Company Description:

Centrify is at the forefront of redefining the legacy approach to Privileged Access Management (PAM) with cloud-ready Zero Trust Privilege to secure access to infrastructure, DevOps, cloud, containers, Big Data and other modern enterprise use cases and stop the leading cause of breaches – privileged access abuse.

Related Topics:


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


CyGlass

Company Description:

CyGlass is an affordable, advanced threat detection solution built for Small and Medium Businesses and the service providers that support them. CyGlass is a Software as a Service application that identifies, detects and responds to network-based cyber attacks in real-time by leveraging our advanced layered Artificial Intelligence approach. Using an ensemble of algorithms, CyGlass learns the customer’s network and can detect threats of unknown origin. CyGlass also provides policy assurance for audit and compliance purpose.

Related Topics:

Real-Time Operational Technology Network Analysis and Security


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Centripetal Networks

Company Description:

Internet-connected devices contain a variety of vulnerabilities and security risks – especially since they are a targeted entry point into critical infrastructure (OT/ICS) that contains SCADA and IoT systems and other internal networks. IoT devices have physical limitations due to a small footprint which results in a lack of security.

As the number of connected devices increases, so do the security threats by way of entry points that can include partner/supply chain communication into the network which broadens the attack surface and increases attack vectors. This enables hackers to exploit the vulnerabilities in the system, and in many cases quite easily. There have been several high-profile breaches that have been the result of network infiltration through SCADA and IoT devices.

Nation-state hackers and hacktivism actors regard critical infrastructure in government agencies, municipalities, industrial facilities and businesses as high-value targets. Applying shielding against known threats is a highly effective part of the kill chain and prevents network infiltration and data exfiltration.

Centripetal CleanINTERNET is used by several customers to protect their valuable IT, OT/ICS and SCADA assets. Centripetal’s elite cyberthreat analyst team has identified the following vulnerabilities within critical infrastructure:

  • Verified and delivered contextual threat data and nation-state attribution.
  • Delivered attribution information to LEAs relating to nation-state activity that resulted in network infiltration within government agencies and critical infrastructure facilities. Identified hosts that have established C&C communications in targeted networks that resulted in sensitive data exfiltration.
  • Provided timelines and data of malicious activities.

Related Topics:

Real-Time Operational Technology Network Analysis and Security


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Claroty

Company Description:

Claroty was conceived to secure the safety and reliability of industrial control networks that run the world from cyber-attacks.

The Claroty Platform is an integrated set of cyber security products that provides extreme visibility, unmatched cyber threat detection, secure remote access, and risk assessments for industrial control networks (ICS/OT).

Related Topics:

Cloud Security; Blockchain; Secure Machine Learning; Organizational and Behavioral; Privacy; Malware; Digital Forensics: Software Security; IoT Security


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.