Flip the script. Impose your will on the adversary.
Traditional security tools watch live devices in your network, delivering alerts when analytical techniques
suggest a problem. Ridgeback sees the live and dark space, turning every unused port and IP into a sensor.
Ridgeback sensors actively engage and disrupt exploitation operations after an attacker has gained an
initial foothold in your network.
Ridgeback stops lateral movement like no other.
We have been an integrator of Palo Alto Networks™ firewall solutions since the company’s inception. Based on
the company’s patent-pending App-ID™ technology, its next-generation firewalls enable unprecedented
visibility and granular policy control of both applications and content at speeds up to 20Gbps with no
performance degradation.
Regardless of port, protocol, evasive tactic or SSL encryption, all of our implementation designs scan
content to stop threats and prevent data leakage. For the first time, organizations can embrace Web 2.0 with
complete visibility and control, while significantly reducing total cost of ownership through device
consolidation. Most recently, Palo Alto Networks™ has extended this same security model to remote users with
the release of GlobalProtect™. It has also launched its WildFire™ service to combat targeted malware.
We’re big fans of Palo Alto Networks™. Our implementations reflect a deep level of knowledge and experience
working with all of the company’s products.
CloudFlare’s Cloud Email Security offers the only technology that comprehensively stops Type 1, 2 and 3 BEC
phishing attacks before they damage your business. Phishing is the root cause of 95 percent of security
breaches.
CloudFlare works with some of the most sophisticated organizations in the world, including Fortune 500
banks, insurance companies, and healthcare providers to preempt and stop targeted phishing attacks at the
outset, improve their cybersecurity posture and change outcomes.
SilverSky has the most advanced AI-based threat detection available. The platform, SilverSky EDR, was developed out of an award-winning government research program designed to support the war on terrorism. A true force multiplier, SilverSky EDR provides security teams in the small, medium, and large enterprises with increased situational awareness and the ability to identify unknown threats existing security tools just do not catch. With numerous customer success examples and demonstrated ROI in both commercial and government sectors, SilverSky is the proven platform to address security challenges.
Blue Ridge Networks is a quiet little company that has been working in Intelligence community circles for
almost two decades. We are experienced implementers of two of the company’s solutions:
Borderguard: Blue Ridge Networks was essentially founded on the basis of its acquisition of intellectual
property developed by a company called Network Systems. The Borderguard IP was foundational to what remains
the world’s strongest VPN technology available (to the commercial sector). For clients where IPSec and/or
SSL simply aren’t good enough, Borderguard solution designs are peerless.
Appguard: As the name may suggest, Appguard is a lightweight Windows app that, when installed and properly
configured, reduces the threat vector to as close to zero as possible. Appguard has an impeccable track
record —a long history of preventing major infections wherever it is installed. A major benefit of Appguard
is that you can comfortably remove performance degrading (and largely ineffective) antivirus programs.
Appguard is available as an on-premise solution, via cloud access or, as a fully managed service.
The largest and most respected brands around the world have trusted Thales to protect their data, identities, and intellectual property for more than 30 years. Today, Thales secures the authenticity of your banking transactions, safeguards your health records, protects the purchase of your morning cup of coffee, and helps organizations to control risk, manage security, and maintain compliance. Thales is the world’s leading provider of Data Protection and Software Monetization solutions.
XM Cyber intends to change the way cyber security posture is measured, prioritized and improved as a result
of safe, continuous simulation.
By safely and continuously simulating attacks, XM Cyber exposes real-life security issues that arise from
vulnerabilities, human error and misconfigurations. Remediation recommendations are prioritized based on
criticality and relation to the customer’s most critical assets.
XM Cyber was founded by top executives from the Israeli cyber intelligence community and has offices in the
US, UK, and Israel.