RiskLens

Company Description:

The leading provider of cyber risk management software, RiskLens empowers business executives, risk officers and CISOs to manage their organization’s cyber risk from the business perspective by quantifying it in financial terms. RiskLens is the only cyber risk management software purpose-built on FAIR, the international standard quantitative model for cybersecurity and operational risk. Our goal is to revolutionize and become the standard way in which large enterprises and government organizations measure, manage and articulate information and operational risk.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Scythe

Company Description:

SCYTHE is disrupting the traditional approach to information security by taking vulnerability assessments to the next level. The SCYTHE platform provides “a common environment for the build, development, and operation of adversarial emulation.” Rooted in GRIMM’s core values – innovation, passion and agility – SCYTHE is dedicated to demonstrating and delivering the art of the possible in cybersecurity by bringing to market advanced cybersecurity products.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


RiskRecon

Company Description:

RiskRecon makes it easy to gain deep, risk contextualized insight into the cybersecurity risk performance of all of your third parties. Simply give us the names of the companies you want to assess and we’ll give you deep, continuous risk insight spanning 11 security domains and 41 security criteria. RiskRecon assessments are custom-fitted to match your risk appetite, focusing your analysts and your vendors on the issues that matter most to you. This capability is built on RiskRecon’s core proprietary differentiation – our ability to automatically risk prioritize issues based on issue severity and the system value at risk. With RiskRecon’s assessment automation and advanced workflow capabilities, you will have the transparency and tools necessary to make risk decisions and take action at the speed of business.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Red Tiger Security

Company Description:

Red Tiger Security is a focused SCADA Security consultancy, training, and research firm dedicated to the resiliency of national critical infrastructure, and mission-critical business systems that must be available on a 24×7 basis. Red Tiger Security has developed and implemented a 6-layer Vulnerability Assessment approach that encompasses both Physical and Cyber security for Industrial Control Systems. Over the past ten years, the founder and several members of the Red Tiger Security team have been focused on security issues relating to real-time, mission-critical Industrial Control Systems, and have been very active in the security community.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Fortify Data

Company Description:

FortifyData is a cyber security software company that helps enterprises of all sizes assess, identify and manage their cyber security posture. FortifyData’s industry leading cyber risk scoring platform tracks performance against key risk indicators throughout an organization and allowing businesses to easily comply with industry security standards and regulations, including PCI, HIPAA, SOC 2, ISO 27001, NIST, 23NYC500 and others. We believe that holistic cyber security solutions are the future. The next generation in cyber security requires an automated platform that continuously evaluates your third-party, internal and people risks and then enables you to proactively collaborate with your team to correct exposed cyber threats.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Bitsight

Company Description:

BitSight pioneered the security ratings market, founding the company with a solitary mission: to transform how organizations evaluate risk and security performance by employing the outside-in model used by credit rating agencies. Based on BitSight’s industry-leading proprietary data set as well as trusted, reputable data partnerships, we provide Security Ratings that are objective, verifiable, and actionable. BitSight’s proprietary method of data collection of 120+ sources — encompassing both owned and licensed data — gives our customers unprecedented visibility into key risk vectors, many of which are completely unique to BitSight.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Axio

Company Description:

Our SaaS platform measures your cyber risk exposure and manages your cybersecurity program in a defensible and holistic way. Our comprehensive platform includes:

  • Cybersecurity Planning and Management
  • Cyber Risk Quantification
  • Insurance Stress Testing
  • Insights for Investment Prioritization
  • Personalized Guidance from Experts


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


FireEye

Company Description:

FireEye is the only cyber security company that combines the automation of world-class technology with the power of unparalleled frontline human expertise, including industry-recognized services and nation-state grade threat intelligence. They put it all at your fingertips in a unified security operations platform called Helix that integrates and analyzes data from your security assets in order to give you real answers about the threats that matter. Their unrivaled real-time knowledge of the global threat landscape comes from more than two decades of experience, including 350,000+ hours of incident investigations and cyber security consulting each year, and 700+ highly experienced threat researchers, platform engineers, malware analysts, intelligence analysts, and investigators, as well as a global network of best-in-class business partners.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Palo Alto Networks

Company Description:

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices.

Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com.

Topics:

  • Advanced Persistent Threat Protection
  • Antivirus
  • Cloud Security
  • Compliance
  • Dashboards and Analysis
  • Data Protection & Encryption
  • DDos Attack Prevention
  • Endpoint Detection & Response
  • Endpoint Protection Platforms
  • Incident Response
  • Information Sharing
  • Insider Threats
  • Internet of Things
  • Network Access Control
  • Network Segmentation
  • Patch and Firmware Management
  • Real-Time OT Monitoring
  • Remote Access Solutions
  • Risk Assessment & Quantification
  • Sandboxing
  • Security Analytics Platforms
  • Security Information & Event Management
  • Security Orchestration Automation & Response
  • Social Engineering Protection
  • Threat Intelligence
  • Training – Cyber Workforce Development
  • WAN Edge Infrastructure
  • Web Application Firewalls
  • Zero Trust


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


BeyondTrust

Company Description:

BeyondTrust’s unified solutions offer the industry’s broadest set of privileged access management capabilities with a flexible design that simplifies integrations, enhances user productivity, and maximizes IT and security investments. Their extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralized management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.