Flip the script. Impose your will on the adversary.

Traditional security tools watch live devices in your network, delivering alerts when analytical techniques suggest a problem. Ridgeback sees the live and dark space, turning every unused port and IP into a sensor.

Ridgeback sensors actively engage and disrupt exploitation operations after an attacker has gained an initial foothold in your network.

Ridgeback stops lateral movement like no other.

We have been an integrator of Palo Alto Networks™ firewall solutions since the company’s inception. Based on the company’s patent-pending App-ID™ technology, its next-generation firewalls enable unprecedented visibility and granular policy control of both applications and content at speeds up to 20Gbps with no performance degradation.

Regardless of port, protocol, evasive tactic or SSL encryption, all of our implementation designs scan content to stop threats and prevent data leakage. For the first time, organizations can embrace Web 2.0 with complete visibility and control, while significantly reducing total cost of ownership through device consolidation. Most recently, Palo Alto Networks™ has extended this same security model to remote users with the release of GlobalProtect™. It has also launched its WildFire™ service to combat targeted malware.

We’re big fans of Palo Alto Networks™. Our implementations reflect a deep level of knowledge and experience working with all of the company’s products.

Area 1 Security offers the only pay-for-performance solution in the cybersecurity industry; and the only technology that comprehensively stops Type 1, 2 and 3 BEC phishing attacks before they damage your business. Given the widespread growth of these kinds of campaigns; within the last 6 months of 2019 alone Area 1 has intercepted more than $230 Million of Type 3 BEC campaigns. Phishing is the root cause of 95 percent of security breaches.

Area 1 Security works with some of the most sophisticated organizations in the world, including Fortune 500 banks, insurance companies, and healthcare providers to preempt and stop targeted phishing attacks at the outset, improve their cybersecurity posture and change outcomes.

Cybraics has the most advanced AI-based threat detection available. The platform, nLighten, was developed out of an award-winning government research program designed to support the war on terrorism. A true force multiplier, nLighten provides security teams in the small, medium, and large enterprises with increased situational awareness and the ability to identify unknown threats existing security tools just do not catch. With numerous customer success examples and demonstrated ROI in both commercial and government sectors, Cybraics is the proven platform to address security challenges.

Medigate has developed a smarter way to identify, manage and secure connected medical devices. The company solves a white hot problem in healthcare, as bad actors recognize that connected medical devices not only provide a path to highly valuable patient data (that if seen, can be modifed) but an opportunity to assume control of devices connected to patients (a nightmare scenario). Medigate was founded in Israel and has now moved to the U.S. In less than a year, it has landed several significant U.S.-based health systems, including some of our nation’s largest IDNs. Unlike more generalized companies that specialize in securing IoT, Medigate is 100% focused on what it calls “the Internet of Medical things” (IoMT). Its platform not only supports the discovery of networked medical devices, but provides threat detection, prevention and real time analytics/reporting. And it does it the right way —via passive analysis of network traffic. Based on having developed the world’s largest database of medical device protocols, it is able to catalog, provide highly detailed device attribution and real time visibility to all connnected devices. The company’s solution is integrated with market leading trouble ticketing systems, asset management platforms, CMMS, leading Network Access Control (NAC) solutions (Cisco ISE) and firewalls (Palo Alto’s CheckPoint). Medigate is passionate about integration as a way to maximize the unique benefits of its solution and we’re passionate about being a part of its remarkable success.

Blue Ridge Networks is a quiet little company that has been working in Intelligence community circles for almost two decades. We are experienced implementers of two of the company’s solutions:

Borderguard: Blue Ridge Networks was essentially founded on the basis of its acquisition of intellectual property developed by a company called Network Systems. The Borderguard IP was foundational to what remains the world’s strongest VPN technology available (to the commercial sector). For clients where IPSec and/or SSL simply aren’t good enough, Borderguard solution designs are peerless.

Appguard: As the name may suggest, Appguard is a lightweight Windows app that, when installed and properly configured, reduces the threat vector to as close to zero as possible. Appguard has an impeccable track record —a long history of preventing major infections wherever it is installed. A major benefit of Appguard is that you can comfortably remove performance degrading (and largely ineffective) antivirus programs.  Appguard is available as an on-premise solution, via cloud access or, as a fully managed service.

Arista Networks is the global leader in wireless security and compliance solutions. The company’s solutions deliver customers a best-of-breed approach to automatically detect, classify, block and locate any/all wireless threats. Arista Networks solutions include the industry’s leading wireless intrusion prevention system (WIPS) and the world’s first wireless vulnerability management (WVM) security-as-a-service (SaaS).

The largest and most respected brands around the world have trusted Thales to protect their data, identities, and intellectual property for more than 30 years. Today, Thales secures the authenticity of your banking transactions, safeguards your health records, protects the purchase of your morning cup of coffee, and helps organizations to control risk, manage security, and maintain compliance. Thales is the world’s leading provider of Data Protection and Software Monetization solutions.

Gigamon sees itself driving the convergence of networking and security. The company is focused on delivering intelligent network traffic visibility across on-premises, virtual and cloud environments.  Its platform is broad and includes hardware and software applications that often satisfy solution gaps in highly tailored environments. We also like Gigamon because we have found it to further enable and improve the performance of several non-native applications that we like to work with, including Medigate.

XM Cyber intends to change the way cyber security posture is measured, prioritized and improved as a result of safe, continuous simulation.

By safely and continuously simulating attacks, XM Cyber exposes real-life security issues that arise from vulnerabilities, human error and misconfigurations. Remediation recommendations are prioritized based on criticality and relation to the customer’s most critical assets.

XM Cyber was founded by top executives from the Israeli cyber intelligence community and has offices in the US, UK, and Israel.