enterprisesecuritymag

Talisai: Accountable AI for Comprehensive Insider Threat Risk Management

Top 10 Security Automation Solution Companies - 2020

With cyberattacks happening at a frequency of every 39 seconds and organizations receiving thousands of alerts each month, security staff today are tasked with monitoring a larger attack surface than in previous years. Meanwhile, with the COVID-19 pandemic, the security landscape has further been challenged and subsequently invited more opportunities for security threats and data breaches, adding to the complexity of the current enterprise environment. This has indeed driven automation in security operations and incident response to rapidly identify and respond to a cyberattack or security breach. The automation of mundane and repetitive tasks releases the workforce from work overload and alert fatigue, which will translate to mitigate vulnerabilities, streamlining security operations, and maximizing existing security budgets while ensuring a better ROI.

Using automation, organizations can make their SecOps, and IT teams more efficient. However, on the rear side, businesses should also understand that automation may bring a lot of complexity. While the SecOps team can assess the impact of the risk, they cannot impact on production. Other challenges include the doubt about the accuracy of detecting threats and the limitation that not all security operations can be completely automated. At such a juncture, Security Automation solution providers play a critical role in providing a level of support and comprehensively understanding business needs to ensure its success.

To help CIOs navigate through the list of security Automation Solution providers, our distinguished selection panel, comprising CEOs, CIOs, and VCs, industry analysts, and the editorial board of Enterprise Security Magazine, have narrowed the 10 latest Security Automation Solution Providers that exhibit competence in offering innovative security solutions. We present to you Enterprise Security Magazine’s “Top 10 Security Automation Solution Providers - 2020.”

Top Security Automation Solution Companies

Founded by a team of cybersecurity experts and machine learning researchers, ReaQta is on a mission to help businesses seamlessly detect and respond to cyber threats, including ransomware and sophisticated in-memory attacks. ReaQta’s full-fledged endpoint detection and response (EDR) and endpoint protection platform (EPP), ReaQta-Hive, promises a feasible way forward – all on a single agent. It provides visibility at the endpoints as well as the infrastructural level to identify new patterns of attack and suspicious activities. Powered by AI, ReaQta-Hive is effective against both malware (ransomware, RAT, trojans, etc.) and non-malware (in-memory, file-less) attacks

reaqta.com

Talisai has introduced a game-changing real-time AI and data analytics oversight platform that bridges the gap between the promises of AI and accountable execution. By offering a vital ADA/AI oversight framework, systemic replay capability with explanations, Talisai allows its clients to dynamically view, understand and audit ADA/AI models, relationship to data, and business performance. Talisai has teamed up with Polaris Corporate Risk Management to address threats posed by rogue insiders with their new, state-of-the-art AI tool: "People at Potential Risk," or PAPR. As a cutting-edge AI tool, PAPR marries Polaris' industry-leading security and investigative strategies with Talisai's revolutionary machine-learning capabilities to successfully identify and mitigate potential threats with automated evidence chains

talisai.com

5thColumn

5thColumn

Founded in 2011 by Ray Hicks, one of the world's foremost security minds, 5thColumn quickly became a world-class protection consultancy. Realizing the unique value of the AI-based tools he invented to help his clients, Ray recruited like-minded experts to build & deliver the tools as a powerful software platform. 5thColumn provides an advanced analytics software suite supported by the most highly skilled security experts in the industry, combining to deliver a constantly evolving business protection platform

Allied Universal

Allied Universal

Allied Universal®, a leading security and facility services company in North America with more than 250,000 employees and revenues over $8.5 billion, provides unparalleled security services and technology solutions. With offices located throughout the nation as well as internationally (Canada, Mexico, United Kingdom), Allied Universal is responsible for protecting client sites covering multiple specialty sectors such as higher education, healthcare, retail, commercial real estate, government and corporate campuses

Analogic

Analogic

For over 50 years Analogic has created markets by anticipating and solving some of the world’s most complex medical and engineering challenges. Analogic provides leading-edge healthcare and security technology solutions to advance the practice of medicine and save lives. They are recognized around the world for advanced imaging and real-time guidance technologies used for disease diagnosis and treatment as well as for automated threat detection. Analogic is headquartered just north of Boston, Massachusetts

Infused Innovations

Infused Innovations

Infused Innovations are consultants that operate at the intersection of technology, business, data, and human interaction. They are passionate and committed to delivering the right solutions to their clients. With staff with all manner of experiences - private business, startups, non-profit, healthcare, legal, education, data analytics, financial services, and more, they can speak client’s language. When client’s partner with Infused Innovations they get to work with people who want to be a part of the solution with them, and are genuinely excited about the opportunity to bring something new to the table

NVIDIA

NVIDIA

NVIDIA’s invention of the GPU in 1999 sparked the growth of the PC gaming market, redefined modern computer graphics, and revolutionized parallel computing. More recently, GPU deep learning ignited modern AI — the next era of computing — with the GPU acting as the brain of computers, robots, and self-driving cars that can perceive and understand the world. Today, NVIDIA is increasingly known as “the AI computing company."

Red Hat

Red Hat

Red Hat is the world’s leading provider of enterprise open source solutions, using a community-powered approach to deliver high-performing Linux, cloud, container, and Kubernetes technologies. They help client’s standardize across environments, develop cloud-native applications, and integrate, automate, secure, and manage complex environments with award-winning support, training, and consulting services. Red Hat has revolutionized the operating system with Red Hat® Enterprise Linux® and has a broad portfolio, including hybrid cloud infrastructure, middleware, agile integration, cloud-native application development, and management and automation solutions

Refactr

Refactr

Refactr is empowering cybersecurity to collaboratively operate at the speed of DevOps. They are CI/CD for cybersecurity that covers all their unique use cases and enables secure and collaborative DevSecOps automation. Refactr empowers organizations modernizing to IT-as-Code™. Refactr is a Seattle-based DevSecOps startup founded in 2017 by military veterans and industry experts in cloud and cybersecurity. The firm’s mission is to accelerate adoption of DevSecOps by empowering cybersecurity to collaboratively operate at the speed of DevOps

Vehere

Vehere

Vehere builds intelligent and active solutions for real time Cyber Situational Awareness which forms the core component of Enterprise Cyber Defense and Homeland Security. Founded in 2006, their solutions empower Enterprise and Homeland Security with threat discovery, risk mitigation and defense. Harnessing the power of advanced Big data Analytics, Artificial Intelligence (AI) and Machine Learning (ML), Vehere’s Cyber Situational Awareness solutions have acquired a high level of efficiency, to effectively reduce the risk of a breach and to proactively defend against threats