Companies similar to OPSWAT
Sign up to Download

1-30 of 6,490 results

  • www.threatpatrols.com
  • 1
  • 2
Threat Patrols provides well known threat-discovery engines that can be run at hourly to monthly intervals to suit your threat-management requirement; have us manage your threat-landscape discovery for you, or manage it yourself using our API.....

Relevance: 13.714938
  • www.nothreat.com
  • 1
  • 1
Threat assessments and active threat management performed by Manny Tau, Psy.D., clinical and forensic psychologist specializing in threat assessments, active threat management, and workplace/school-place/domestic violence. Discreet and confidential..

Relevance: 13.393752
  • threattec.com
  • 1
  • 1
Threat Tec, LLC is the leader of Operational Environment (OE) replication and Threat Emulation/Wargaming solutions... Threat Tec provides a robust and valid team that can coach, guide or credibly challenge U.S. versus U.S. allied capabilities...

Relevance: 12.736465
  • www.websecurityworks.com
  • 1
  • 2
WebSecurityWorks.com is a division of BlueAlly, an authorized Intel Security reseller... McAfee Labs is the threat research division of Intel Security and one of the world's leading sources for threat research, threat intelligence, and cybersecurity..

Relevance: 12.681433
  • www.threatmodelingmanifesto.org
The Threat Modeling Manifesto documents the values, principles and key characteristics as an industry guidance for conducting threat modeling... We developed this Manifesto after years of experience thinking about, performing, teaching, and..

Relevance: 12.621083
  • www.threatmodelingmanifesto.org
We developed this Manifesto after years of experience thinking about, performing, teaching, and developing the practice of, Threat Modeling. We have diverse backgrounds as industry professionals, academics, authors, hands-on experts, and presenters...

Relevance: 12.599987
  • www.ciscoblogs.com
In future episodes we will explore the individual security components of Cisco Firepower Threat Defense even deeper; things like outbreak controls and behavioral Indications of Compromise, network, file and device trajectory, as well as threat..

Relevance: 12.597122
  • www.hawk-eye.io
  • 1
  • 1
HawkEye is built on cyber threat landscape and threat actor tradecraft. This means it is built with in-depth knowledge on threat actor activities and behavior. By leveraging our expertise and conducting in-house red, blue, and purple teaming we..

Relevance: 12.577334
  • www.secverse.org
What is Threat Detection? Threat detection is the practice of analyzing the entirety of a security …..

Relevance: 12.572305
  • www.threat-intelligence.eu
Cyber and Threat Intelligence Summit 2022 (CTIS) is a 2-day summit gathering all the experts, analysts, users and contributors to cyber and threat intelligence at large. The CTIS conference takes physically place in Luxembourg (October 19 - 20 2022)...

Relevance: 12.523297
  • npsecurity.org
We provide network threat intelligence feeds so you can prevent and detect threat actors from your cloud or on-premise networks...

Relevance: 12.463853
  • www.su-mac.org
  • 1
To develop and implement a sustainable national mine action programme, able to plan, coordinate, implement and monitor all aspects of Mine Action in the Sudan and mobilize the required resources to make Sudan free from the threat of landmines/ERW..

Relevance: 12.463016
  • threatintelligenceplatform.com
  • 1
Threat Intelligence Platform combines several threat intelligence sources to provide in-depth insights on threat hosts and attack infrastructure. Correlating threat information from various feeds with our exhaustive in-house databases, a result of..

Relevance: 12.451279
  • www.nationalcyber.org
  • 6
  • 2
  • 7
Using a sophisticated Trusted Automated Exchange of Indicator Info (TAXII) platform with direct data sharing linkages to the DHS CISCP and other 3rd party cyber threat sharing centers, the Threat!Share@NCX service includes a number of commercial and..

Relevance: 12.378596
  • www.insiderthreatdefense.us
  • 3
  • 2
  • 7
The Insider Threat Defense Group was founded in 2009 by Mr. Jim Henderson (ITDG Overview). Our office is located in West Palm Beach, Florida. We are a U.S. based company and provide our services worldwide... The Insider Threat Defense Group is very..

Relevance: 12.356893
  • www.netwitness.com
  • 1
  • 11
  • 7
NetWitness is a comprehensive XDR solution that accelerates threat detection and response. It collects and analyzes data across all capture points (logs, packets, netflow, endpoint and IoT) and computing platforms (physical, virtual and cloud),..

Relevance: 12.349753
  • www.trellix.com
  • 3
  • 1
Our experts monitor and research threats and campaign activities, producing insightful and actionable threat intelligence on threat actors and their behavior... Trellix brings you a living XDR architecture that adapts at the speed of threat actors..

Relevance: 12.318355
  • www.provencyber.com
Current cyber threat intelligence is insufficient because it lacks the attributional information needed to empower legal and reputational responses to threat networks...

Relevance: 12.29747
  • www.collierjam.com
I work as a Senior Threat Intelligence Advisor at Mandiant where I help security leaders to better understand their threat landscape and utilise threat intelligence in their decision-making. I am passionate about building a dialogue between technical..

Relevance: 12.282948
  • www.diverse-team.fr
  • 1
  • 1
  • 216
Threat modeling is recognized as one of the most important activities in software security. It helps to address security issues in software development. Several threat modeling processes are widely used in the industry such as the one of Microsoft..

Relevance: 12.271361
  • www.chinetworks.com
  • 3
SOC + NOC integrated to maximize your system's security. Hardened systems designed with minimal threat surfaces and 24x7 threat analysis, monitoring and regular assessments...

Relevance: 12.252827
  • www.quantsecurity.com
  • 1
  • 1
Quantum Security is a consulting and advisory company that deals specifically with machine learning in cyber security. We help companies of all sizes from family owned businesses to Fortune 500 corporations take a proactive approach to their security..

Relevance: 12.229094
  • www.globalthreatsafetysolutions.com
Global Threat Safety Solutions tackles exploding crisis of trust in healthcare. The threats, risk, and harm to the Professional Identity of caregivers and researchers and the damage to the Medical Identity of consumers can be dramatically impacted...

Relevance: 12.163497
  • www.cystig.com
  • 1
The Cyber Security Threat Intelligence Group (CYSTIG) is a cybersecurity consortium specializing in the provision of high-tech security solutions, training, and regulatory compliance services for various financial, governmental, and industrial..

Relevance: 12.151095
  • www.arachne.digital
  • 2
The paid version of Arachne gives you access to all this information, and will alert you when a threat actor is targeting your industry, in your part of the world. Timely reports cover the TTPs threat actors are using right now, and maps them to..

Relevance: 12.151095
  • www.cyfirma.com
  • 4
  • 9
At CYFIRMA, we have redefined cyber-intelligence with the world's first external threat landscape management platform built to give organizations a view from the attacker's perspective. To stay ahead of threat actors, organizations need real-time..

Relevance: 12.122504
  • www.teqstream.com
  • 2
  • 1
We deliver unique solutions around force protection, insider threat, cyber intelligence, identity intelligence, continuous evaluation, and social media monitoring delivering global threat intelligence on a wide variety of risk...

Relevance: 12.109737
  • www.threatblockr.com
  • 4
  • 5
  • 6
ThreatBlockr® (formerly Bandura Cyber) is led by experts with decades of experience across threat intelligence, blockchain, geospatial technology and engineering domains. We are dedicated practitioners, passionate about making open source threat..

Relevance: 12.054393
  • greyint.com
GreyInt is a Singapore-based cyber threat intelligence startup company founded in 2016 that aims to provide clients with a comprehensive view of the cyber threat activities in Asia-Pacific...

Relevance: 12.0452175
  • crits.github.io
CRITs is an open source malware and threat repository that leverages other open source software to create a unified tool for analysts and security experts engaged in threat defense. It has been in development since 2010 with one goal in mind: give..

Relevance: 12.0254965