Check Point
AI Company Name
Products
Computer & Network Security
Company Overview
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes
Business Genre
Country
US
Check Point Software Technologies
Products
Computer & Network Security
Company Overview
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes
Business Genre
Country
US
DEEP INSTINCT LTD
AI Company Name
Products
Computer & Network Security
Company Overview
Deep Instinct is the first company to apply deep learning to cybersecurity. Deep learning is inspired by the brain’s ability to learn. Once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct’s artificial brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. As a result, zero-day and APT attacks are detected and prevented in real-time with unmatched accuracy. Deep Instinct brings a completely new approach to cybersecurity that is proactive and predictive. Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices. Deep learning’s capabilities of identifying malware from any data source results in comprehensive protection on any device, any platform, and operating system.
Business Genre
Country
US
Forcepoint
AI Company Name
Products
Computer Software
Company Overview
Forcepoint is the human-centric cybersecurity company that understands behavior and adapts security response and enforcement to risk. The Forcepoint Human Point platform delivers Risk-Adaptive Protection to continuously ensure trusted use of critical data and systems. Based in Austin, Texas, Forcepoint protects data and identities for thousands of enterprise and government customers in more than 150 countries.
Business Genre
Country
US
Mi3 Security
AI Company Name
Products
Computer & Network Security
Company Overview
Mi3 Security is the leader in intelligence-driven, app security. With its global, intelligence gathering and deep app analysis, Mi3 Security gives enterprise IT the actionable data it needs to recognize and predict which apps pose the greatest privacy and security risks, and to take action to prevent a breach before it happens
Business Genre
Country
US
Sentegrity
AI Company Name
Products
Information Technology & Services
Company Overview
Sentegrity is a mobile software development company led by a team of accomplished security experts. The company's primary product is a non-intrusive security solution that enables any mobile application to operate securely regardless of the underlying platform, user, or device. Sentegrity offers a new perspective on security. By leveraging the latest sensory and machine learning technology control is replaced with trust, allowing companies and application developers to embrace the freedoms of mobile computing without sacrificing data security
Business Genre
Country
US