AI Company Name
Products
Computer & Network Security
Company Overview
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes
Keywords
Advanced Threat Prevention, and Security Compliance, Cloud Security, Cyber Security, Cyber Security Research, Cyber Threat Detection, Cyber Threat Prevention, Data Loss Prevention DLP, Endpoint Protection, Endpoint Security, Information Security, Intrusion Prevention (IPS), Malware Prevention, Mobile Security, Mobile Threat Prevention, Network Security, Next Generation Firewall (NGFW), Private IaaS Security, Public IaaS Security, Remote Access VPN, SaaS Cloud Security, Security Management, SSL VPN, Unified Threat Management (UTM)
Country
US
AI Company Name
Products
Computer & Network Security
Company Overview
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Check Point’s solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats. Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes
Keywords
Advanced Threat Prevention, and Security Compliance, Cloud Security, Cyber Security, Cyber Security Research, Cyber Threat Detection, Cyber Threat Prevention, Data Loss Prevention DLP, Endpoint Protection, Endpoint Security, Information Security, Intrusion Prevention (IPS), Malware Prevention, Mobile Security, Mobile Threat Prevention, Network Security, Next Generation Firewall (NGFW), Private IaaS Security, Public IaaS Security, Remote Access VPN, SaaS Cloud Security, Security Management, SSL VPN, Unified Threat Management (UTM)
Business Genre
Country
US
AI Company Name
Products
Information Technology & Services
Company Overview
Users want to access applications with security, privacy and usability. That is why CoffeeBean Identity and Access Platform delivers a complete solution to manage users identity and their authentication process on all your platforms. This solution centralize the identity of your users (customers, partners and employees) and their data, guaranteeing the best on privacy to comply with new regulations. In addition we offer the most innovative solutions to securely authenticate users on your applications, such as biometrics using the FIDO protocols and our Authentication Intelligence module.
Keywords
Business Genre
Country
US
AI Company Name
Products
Information Technology & Services
Company Overview
Cyberstrat IT Consulting is an advisory firm providing professional information security and business continuity consulting, auditing, training and solutions that reduce cyber security risk across UAE and provide resilience to UAE’s critical information infrastructure.
Keywords
and GRC, BCMS Audit, BCMS Maturity Assessment, Business Continuity, Cyber Security, Cyber Security Strategy, data protection, Information Security, Information Security Awareness, ISMS Audit, ISMS Maturity Assessment, ISO Standards, Professional Certification Exam Prep, Skills Development, UAE Information Standards
Business Genre
Country
United Arab Emirates
AI Company Name
Products
Defense & Space
Company Overview
We are now part of the Huntington Ingalls Industries, Inc., family! Learn more about our EXPANDED PIVOTAL PERFORMANCE at www.HuntingtonIngalls.com.
Keywords
AI, and C5ISR, Application Development, Artificial Intelligence, C5ISR, Cloud Services, computer software, cyber, Cyber Security, Defense and Space, Embedded Development, encryption, enterprise architecture, Government Contracting, Healthcare, homeland security, Human Capital, Information Operations, Information Technology, Intelligence, Intelligence Analysis & Operations, Internet of Things, IT Services, Linux, logistics and supply chain, Mission Systems, Network Security, Operations, PaaS, Program Management, SaaS, Satellite and Control Systems, Software Engineering, Technology, wireless
Business Genre
Country
US
AI Company Name
Products
Computer & Network Security
Company Overview
Illusive Networks, the leader in deception-based cybersecurity solutions, empowers security teams to preemptively harden their networks against advanced attackers, stop targeted attacks through early detection of lateral movement, and resolve incidents quickly.
Keywords
Business Genre
Country
US
AI Company Name
Products
Research
Company Overview
Intelligent Automation, Incorporated (IAI), is a technology innovation company specializing in providing advanced technology solutions and R&D services to federal agencies, and corporations. IAI leverages agile R&D processes, a multi-disciplinary collaborative environment, and its substantial intellectual property portfolio to excel in developing concepts into market-focused products and customer-driven solutions. IAI’s core R&D areas include: AI & Advanced Computing; Autonomy & Robotics; Healthcare Research Technologies; Modeling, Simulation & Visualization; and Networks & Cyber Security; and Radar, Communications & Sensors.
Keywords
Business Genre
AI Company Name
Products
Computer & Network Security
Company Overview
JASK is modernizing security operations by delivering an advanced SIEM platform that provides better visibility, better automation and a better architecture. Built on cloud-native technologies, the JASK ASOC platform streamlines security analyst workflows by automating many of the repetitive tasks that restrict productivity, freeing them for higher-value roles like threat hunting and vulnerability management, while addressing the escalating talent shortage.
Keywords
Business Genre
Country
US
AI Company Name
Products
Computer & Network Security
Company Overview
Security Operations Centre SOC, Investigation, Cyber Security, start up, Advanced Threat, Threat Detection, Threat Hunting, Network Traffic Analysis, AI, Artificial Intelligence, Machine Learning, Automated incident response, MSSP detection solution, and XDR
Keywords
Business Genre
Country
Israel
AI Company Name
Products
Computer & Network Security
Company Overview
SecBI has evolved the traditional siloed approach in cybersecurity to an XDR Platform for a cross-product integration of network, endpoints, and cloud security tools to deliver automated smart threat detection and response. Without the need for agents, SecBI’s XDR maximizes organizations’ investment in their existing security tools and provides end-to-end protection, including against stealthy, low and slow attacks that cost organizations dearly. SecBI is currently used by financial institutions, telecoms, retailers, and manufacturing enterprises worldwide. For more information, visit: www.secbi.com or write: info@secbi.com
Keywords
Business Genre
Country
Israel