Page 77 - index
P. 77







Bluebox

Bluebox transforms your everyday commercially available mobile app into a secure mobile app
in minutes with no coding or SDK required. Bluebox protected apps can detect and defend itself
against mobile threats and respond immediately to attacks to prevent mobile breaches. IT
Managers can gain actionable insights from app behavior, threat behavior and adapt security
policies to reduce risk and protect corporate data. Visit them online at https://bluebox.com/

Cybertinel

We found CYBERTINEL’s endpoint security platform to be a signature-less security solution,
which combines multi-layer data collection, through lightweight agents, with central analysis
using five powerful analysis engines. Through its deep analysis and wide perspective,
Cybertinel is able to discover the attacks’ source, behavior, strategy, history and creators, while
providing immediate remedies and countermeasures. Visit them online at https://cybertinel.com/

Malwarebytes

Malwarebytes Anti-Malware for Business reduces your vulnerability to zero-hour malware,
including ransomware, by delivering industry-leading detection and remediation. Their
proprietary blend of heuristic and definitions-based technologies protects against these threats
at zero hour, including ransomware and if your endpoint security fails to detect malware,
Malwarebytes award-winning remediation technology will remove it completely. The platform
has a small system footprint and enables IT Managers to create policies based on user groups
and aggregates threat data. Visit them online at https://www.malwarebytes.org/

Agari

Agari Email Trust Cloud secures your email channel against cyberattacks. It makes it possible
for enterprises to secure their employee and partner community from the threat of business
disruption and data breach in turn safeguard sensitive customer data that can be used to hijack
legitimate, personalized consumer email marketing campaigns that in turn hijack customers’
systems and disrupt real lives. Agari Email Trust Cloud empowers enterprises to have authentic
online relationships and create a trusted ecosystem. Agari Enterprise Protect uses trust as a
medium to authorize and verify authentic inbound emails, Enterprise Protect can block targeted
spear phishing emails & can prevent cybercriminals from establishing a beachhead for a
broader data breach and ensure that the only emails your employees get, are the ones they can
trust. Visit them online at http://agari.com/

Interset

Interset utilizes behavioral analytics, machine learning, big data and risk forensics to provide a
highly intelligent and accurate insider threat and targeted outsider threat detection solution.
Weighted risk scores are assigned to people, devices and data assets. These risk scores
change as events occur and literally connect the dots of events that are threats to your sensitive
data. Interset detects these anomalous and high risk events and prioritizes them. Visit them
online at https://www.interset.com/
77 Cyber Warnings E-Magazine – May 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   72   73   74   75   76   77   78   79   80   81   82