enterprisesecuritymag

BLUEDOG SECURITY MONITORING: People, Process and Technology— Enterprise Grade Network Security for All

Top 10 Enterprise Security Startups in UK - 2019

As the world adopts digital, connected technologies, the cyberthreat spectrum is growing wider every day. From phishing campaigns to sophisticated malware and ransomware to insider threats, the challenges are spiraling, sometimes going out of control.  The modern CIOs and technology decision-makers are striving hard to ensure every digital transaction or event transpiring in their enterprise network is safe from malicious intent. With the emergence of IoT and the subsequent blurring of the line between work and personal lives, foolproof security has become a moving target.

The modern organisations aim for a security solution that allows them to automate security and compliance management. There is an increasing demand for a solution that ensures ongoing protection from threat and non-compliance. While businesses want cutting edge security solutions, the concomitant complexity in implementation and maintenance is worrisome for them. To gain maximum ROI from their security investments, they look for solution providers who provide that extra cushion of streamlining the implementation and providing consistent support.

Many security solution vendors are offering cloud-based technologies in an effort to democratise access to security solutions. Leveraging cutting-edge technology developments such as artificial intelligence (AI) and machine learning, they are offering solutions that cover all the bases in scouting for the threats lurking in the enterprise environment. An automated security risk assessment protocol creates an individual’s profile and builds threat intelligence using data science for highly effective incident response. AI is widely used to detect online fraud. The use of AI allows a business to compare historical patterns of a user with the current behavior to detect an anomaly. Moreover, AI also plays a role in continuous threat monitoring through which modern security solutions ensure all the users, systems, devices, and end-points are protected.

There are intuitive solution providers specialised in securing the enterprises from the threats emanating from the third party networks. They focus on the gaps between the interfaces that often lead to exploitation of vulnerabilities proving to be costly for an organisation. To break down the information and technology siloes existing within the enterprise systems, the modern security solutions providers offer integrated risk management technologies that can be used across the supply chain for compliance, that include KYC, AML, and GDPR, among others. The use of biometric identification for authentication on any device on any channel is also proving to be groundbreaking in today’s world replete with evolving threats.

There are numerous enterprise security startups in the UK who are offering tailored solutions for the evolving threat and compliance requirements. In the last few months, a distinguished panel comprising of CEOs, CIOs, VCs, and analysts including Enterprise Security Magazine’s editorial board reviewed the top 10 enterprise security startups in the UK and shortlisted the ones that are at the helm of tackling the dynamic security challenges. The companies compiled in this issue have exhibited extensive cybersecurity knowledge and demonstrated integrated and innovative strategies in the security space.  

We present Enterprise Security Magazine’s “Top 10 Enterprise Security Startups in UK—2019.”

Top Startups Europe Companies

The enterprise security company, ATAR Labs, was founded by the experienced management team of Innovera. ATAR Labs provides its customers with the cutting edge cybersecurity technology with the vision of becoming one of the forerunners of the global industry. The company mission is building umbrella solutions to simplify and streamline security operations for a safe and secure future. ATAR Labs makes next-gen Security Orchestration and Automation and Response (SOAR) platforms. Their flagship product ATAR helps SOC teams to become more vigilant and active while assisting them to achieve more

atarlabs.io

With their hardware in a box—Sentinel, and the capabilities of a 500 strong SOC team, bluedog focuses more about the data science and people than the technology itself, to deliver enterprise quality tools to small and medium enterprises. bluedog provides businesses with a level of network protection typically only afforded by large corporations. bluedog understands that they are working with people who are not security specialists, that their clients are professionals who have their own work to do, security being ancillary for them. bluedog 24/7/365 managed monitoring provides ongoing network traffic analysis and feedback regarding each business’ security. With Sentinel, monitoring becomes the window into a network’s security; in real time, as it changes in the face of new attacks, threats, software updates, and reconfigurations

bluedog-security.com

ANOMALI

ANOMALI

As a network security company, Anomali detects adversaries and tells the clients who they are. Organizations rely on the Anomali Threat Platform to detect threats, understand adversaries, and respond effectively. The company arms security teams with machine learning optimized threat intelligence and also identifies hidden threats targeting the client’s environment. The platform enables organizations to collaborate and share threat information among trusted communities. It is considered as one the most widely adopted platform for ISACs and leading enterprises worldwide. At Anomali, they believe in making the benefits of cyber threat intelligence accessible to everyone for free!

Corrata

Corrata

The network security solution, Corrata is an award-winning provider of mobile security and data control solutions for enterprises. Their patent-pending software solution enables organizations to defend against mobile threats, block malicious and inappropriate content, and eliminate unnecessary data usage. The technology of Corrata provides enterprises with unprecedented visibility and control over mobile devices, protecting their employees from the web, method, and infrastructure based threat. The company’s unique on-device solution has led to the organization being recognized as a leader in next-generation mobile threat defense and data control in the marketplace

Optiv Security

Optiv Security

Created in 2015 from the merger of Accuvant and FishNet Security, Optiv is the largest holistic pure-play cybersecurity solutions provider in North America. They help clients plan, build, and run successful cybersecurity programs that achieve business objectives through their depth and breadth of cybersecurity offerings, extensive capabilities and proven expertise in cybersecurity strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology. Optiv’s inside-out approach to cybersecurity enables its clients to build a sustainable, risk-centric foundation for implementing proactive and measurable security programs

PerimeterX

PerimeterX

PerimeterX is the leading provider of application security solutions that keeps the web business safe in the complex digital world. The company’s Bot Defender and Code Defender solutions detect risks to the client’s web applications and proactively manage them. It frees the client and employee from mundane work to focus on growth and innovation. It brings together an elite engineering team, security research to continually update its solutions with current intelligence, and best-in-class customer enablement and support. World’s largest and most reputable websites and mobile applications count on PerimeterX to safeguard their consumers’ digital experience

Senseon

Senseon

The platform of Senseon is a unique and innovative AI-led approach to cyber threat detection. As a network security provider, Senseon offers security teams’ unparalleled visibility across their organizations, allowing for the detection of even the most subtle and sophisticated of cyberattacks. By alerting accurately on genuine threats, Senseon dramatically reduces false-positive alerts. The company’s ability to think like a human analyst allows it not only to automate many of the repetitive investigative tasks but to go beyond the capabilities of traditional tools by detecting advanced threats that bypass their systems

SharkGate

SharkGate

Sharkgate is a renowned AI-based website security provider looking to disrupt with the next generation of cybersecurity. SharkGate shifts cyber protection to an attack on the site enabling a global immunity to be immediately developed to protect all sites in the network from similar attacks. In addition to owners benefiting from having an infection-free website, will also be incentivized to contribute value in terms of witnessed attack data to the distributed network. SharkGate is revolutionizing the scene of cybersecurity arena by providing an open, intelligent, and website protection for all generated threat information to the blockchain

Tessian

Tessian

Tessian works on the world’s first Human Layer Security (HLS) platform uses stateful machine learning to analyze inbound and outbound emails to automatically prevent cybersecurity threats like spear-phishing, misdirected emails, unauthorized emails and other threats executable by humans. The company utilizes stateful machine learning to analyze real-time and historical email data to understand the context of human relationships and communication at every moment in time. Tessian’s machine intelligent and customizable filters sit on top of the Parallax Engine and can be applied to both inbound and outbound email channels to secure your people, prevent data breaches, and ensure compliance

Twistlock

Twistlock

At its inception, Twistlock was conceived to be the pioneer in purpose-built solution for containers and cloud native security. Instead of seeing containers and cloud infrastructures as inherently less secure, Twistlock founders viewed the technology of containers coupled with the processes that accompany devops related practices as an opportunity to provide better, speedier security than ever before. The company’s cloud Discovery open source tool helps infrastructure, operations and security teams identify all the cloud native platform services, such as container registries, cloud native nodes across managed Kubernetes platforms, and serverless services used across your cloud providers, accounts, and regions