Page 12 - Cyber Defense eMagazine - November 2017
P. 12

“PerimeterX prevents automated attacks by
                   PerimeterX
                                                                       detecting and protecting against malicious web
                                                                       behavior. By analyzing the behavior of humans,
                                                                       applications and networks, PerimeterX catches in
                                                                       real-time automated attacks with unparalleled
                                                                       accuracy”








                                                                       “Power Fingerprinting (PFP) is a unique approach to
                   PFPCyber
                                                                       cybersecurity that utilizes analog signals (AC, DC,
                                                                       EMI) to detect whenever unauthorized
                                                                       modifications have compromised the integrity of an
                                                                       electronic system.  It’s brilliant”



                                                                       “PlainID offers a simple and intuitive way for fast-
                   PlainID
                                                                       paced organizations to create and manage their
                                                                       authorization policies with best practices in policy-
                                                                       based access control”


                                                                       “Qualys delivers one of the most robust and cost-
                   Qualys
                                                                       effective vulnerability management and
                                                                       compliance solutions available on the marketplace
                                                                       today”



                                                                       “Remediant’s SecureONE provides agentless
                   Remediant
                                                                       continuous monitoring & protection at scale
                                                                       for privileged/service accounts. Reduce the time
                                                                       required to implement and operate a “zero trust”
                                                                       access model.  Couple two-factor authentication
                                                                       with “Just In Time Administration” for protection
                                                                       against stolen administrator credentials used to
                                                                       exfiltrate sensitive data.”




                                                                       “ReversingLabs delivers in-depth file analysis with
                   ReversingLabs
                                                                       distributed YARA rules processing for identifying
                                                                       threats and data spillage, policy violations and



                   12    Cyber Defense eMagazine – November 2017 Edition
                         Copyright © 2017, Cyber Defense Magazine,  All rights reserved worldwide.
   7   8   9   10   11   12   13   14   15   16   17