enterprisesecuritymag

deepwatch: How Cybersecurity Will Look in 2025

Top 10 Enterprise Security Startups - 2020

Enterprise security solutions protect businesses from both hardware and software wide security threats. Developing security strategies for enterprises is a challenging task and it involves safeguarding entire ecosystems of computers, networks, applications, and even right down to the end users. Even minor security risks in the systems if left unchecked can quickly evolve into security threats; no business is exempt from this.

Security solutions should support multiple platforms, operating systems, and applications and also help in securing external parts of a network including all end point devices like laptops, mobiles, and tablets. Moreover, security solutions should provide a unified view of all the aspects of a particular enterprise ecosystem to monitor, prevent, and detect anomalies in security. They should offer a myriad of solution packages ranging from identity and access management, risk and compliance management, data encryption, data loss prevention, firewall, antivirus solutions, disaster recovery and web filtering. These are just some of the solutions offered as services. Usually businesses opt for a unified threat management solution that comprises most of all the above-mentioned services. Businesses also invest in services that offer some form of intrusion detection system and software services that can mitigate distributed denial of service (DDoS) attacks.

In this issue of Enterprise Security Mag, we take a closer look at the startups working on refreshing cyber security from a novel perspective, chosen by a distinguished panel of CEOs, CIOs, VCs, and analysts, along with Enterprise Security Mag’s Editorial Board.

We present to you “Top 10 Enterprise Security Startups - 2020.”

Top Enterprise Security Startups

deepwatch, a next-gen managed security service provider (MSSP), has changed the game for security operations center (SOC) management. deepwatch combines industry leading technologies, unique analytics driven IP and a world class team of named experts to deliver capital efficiency and highly tailored outcomes specific to each CISO’s needs. deepwatch’s analytics-first managed security services remove the burden of building, operating and maintaining a SIEM platform and large team to provide 24/7/365 SOC management, allowing them to focus on their core business with peace of mind knowing their network and brand is protected. The company is rolling out its second generation Maturity Model, highly automated data-centric deployment, portability and access, named delivery squads, real-time collaboration, advanced ML-driven analytics, threat intelligence and more. This approach is innovative in ways that are new and distinctly different in the MSSP market.

www.deepwatch.com

Trusted Internet helps its clients with cyber intelligence expertise to provide hands-on security to businesses that would otherwise not be able to afford this level of expertise. Trusted Internet was founded in 2018 by Jeff Stutzman to offer managed security services to organizations of all sizes. With the experience of having worked as a former Navy Intelligence Officer, a Global Risk program for CISCO, the CISO for Northrop Grumman Electronics Sector, and the DCISE Director at DoD Cyber Crime Center, Stutzman wanted to establish an company that could put together a good common sense cyber security architecture that was suitable for both small and large-sized companies. Trusted Internet today offers the expertise of a Virtual CISO® to organizations that do not have it in place, at an affordable price.

trustedinternet.io

Astute Security

Astute Security

The company is turning heads in the industry for its state-of-the-art security data analytics platform, ASTUTE, which not only helps organizations tackle security data challenges, but also empowers security teams. By providing context, translating complex jargon into business-friendly terminology, and presenting data in a simple manner, Astute is able to seamlessly extend the security team and allow much more efficient action on alerts. The ASTUTE platform tackles some of the most underserved areas in enterprise security. ASTUTE helps organizations to ingest and process large amounts of data, from across systems, both on-prem and cloud-based, and then assembles seemingly benign events into a comprehensive risk picture.

Claroty

Claroty

Claroty bridges the industrial cybersecurity gap between information technology (IT) and operational technology (OT) environments. Organizations with highly automated production sites and factories that face significant security and financial risk especially need to bridge this gap. Armed with Claroty’s converged IT/OT solutions, these enterprises and critical infrastructure operators can leverage their existing IT security processes and technologies to improve the availability, safety, and reliability of their OT assets and networks seamlessly and without requiring downtime or dedicated teams. The result is more uptime and greater efficiency across business and production operations.

CyberSwarm

CyberSwarm

CyberSwarm is a deep tech company and develops a cybersecurity-dedicated System on a Chip which helps organizations secure communication between connected devices and protect critical business assets.CyberSwarm is developing a CPU specialized for cybersecurity which empowers every device to defend itself in case of a cyberattack. It is a full cybersecurity solution, with increased complexity, efficiency and scalability. Furthermore, machine learning algorithms will ensure devices communicate and cooperate with each other to learn how to counter various threats.

Idaho Scientific

Idaho Scientific

Idaho Scientific specializes in high performance solutions to Anti-Tamper and Cyber Security problems. Idaho Scientific is a specialized embedded security firm with a proven track record of solving the hardest anti-tamper and cyber security problems with novel and scalable solutions. The company has completed projects for National Labs, federal research centers, the Pentagon and all of the top five defense contractors. They also collaborate with leading universities in the cybersecurity field. The company licenses its technology to serve other critical infrastructure sectors, specifically energy, transportation, healthcare, communications, manufacturing.

Layer 8 Security

Layer 8 Security

Layer 8 Security is a comprehensive cybersecurity services company. The company’s staff received extensive experience and training from operations serving in the National Security Agency, U.S. Cyber Command, DoD, Special Operations, Defense and Private Industries. The team has served at home and abroad, and many still serve our country today in the military Reserve. Now they are bringing the best of breed practices to the commercial marketplace. The team has decades of experience servicing complex, multifaceted IT Security needs in warfare, private industry and government.

Leet Cyber Security

Leet Cyber Security

Leet was founded in 2014 after seeing many organizations struggle with the same basic problems related to vulnerability identification and vulnerability management. Leet identifies security weaknesses by utilizing their unique skills as hackers. The company is a provider of information security services. The company provides various services such as penetration testing, application security assessments, social engineering, wireless assessments, physical security and phone security assessments. Leet Cyber Security is a super high tech business that helps companies discover their IT vulnerabilities.

Red Lion

Red Lion

Red Lion’s award-winning industrial automation and networking solutions provide critical information and controls to improve productivity, working with numerous devices and diverse protocols to access data.Red Lion first established itself as a provider of superior Industrial automation products, earning national recognition for being the #1 panel meter company in the United States. Looking to broaden its product portfolio, Red Lion acquired Paradigm Controls, a UK-based leader in the operator panel market, in 1996.The combination of Ethernet with automation enables customers to not only communicate and display data, but also move data from the manufacturing plant through the enterprise.

Xela

Xela

Xela stands out from its competitors by offering customizable, platform independent software solutions to both public and private sectors. Their products cover a broad spectrum of usage, ranging from saving lives to increasing business productivity. In addition to their software products, they offer cyber security services. Xela’s staff consists of award-winning, certified experts who have been protecting classified and unclassified products for years. The company is one of the few, if not the only, company offering these services under a single roof.