Intrusion Detection

72 Companies

Access all companies

Find technology partners quickly.

Spotfolio tracks over one million companies in technology industries.

There are 72 companies in the field of Intrusion Detection on spotfolio that produce or deliver products, that utilize or research technologies or that are otherwise engaged in topics such as Security, Detection, Threat, Detect, Data, Cyber, Intrusion, Attackers .

Start-ups (11)

Early-stage companies (20)

Established companies (40)

The majority of these companies is located in the following countries.

United States (34)

Japan (10)

Switzerland (4)

United Kingdom (4)

Example Companies

Find companies in your area

Bricata Bricata, Inc.

early-stage

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

founder and head of Capital One’s Cyber Security ML practice (CyberML), CEO of the Honeynet Project and CTO of the Global Cyber Alliance.  Back to team Take

More Blog Are Utilities Ready to Defend Against Industrial Cyber Threats? Analyzing the cyber risk, readiness and preparation of utility companies Read ...

Be Ready for an IDS Upgrade When was the last time you assessed your Intrusion Detection System (IDS)? These solutions remain vitally... Read More Blog ...

Ready for an IDS Upgrade When was the last time you assessed your Intrusion Detection System (IDS)? These solutions remain vitally... Read More Blog Four

large financial services company needed to upgrade their legacy network intrusion detection system (NIDS) to reduce false positives and eliminate blind spots ...

financial services company needed to upgrade their legacy network intrusion detection system (NIDS) to reduce false positives and eliminate blind spots

these scams in this CNBC article. Nation-State Actors State-sponsored attackers have also used the coronavirus to make their malware and phishing campaigns

Facts - Resources - Blog - Explore All - Contact - Get Info Blog No data? No hunt. Top tips to ensure a successful threat hunting environment By

Filter By: Indicator Data Sheet Bricata Cloud Retention Data Sheet The types of data Bricata captures and stores, and how long data is retained, can be

New Network Security Features in the Bricata Platform you Might have Missed Bricata recently released a new version of its network security product with

Principal (the 80/20 rule) to network security, about 80% of incidents are caused... Read More Blog 3 Cool New Network Security Features in the Bricata Platform

Comprehensive Network Detection & Response Platform Visibility. Context. Detection. Response. Threat Hunting. Bricata is leading the next generation of

Upgrade By Bricata When was the last time you assessed your Intrusion Detection System (IDS)? These solutions remain vitally important today, but as threats

Explore All - Contact - Get Info Get a Live Demo SCHEDULE A LIVE DEMO DETECT. PREVENT. HUNT. Bricata helps enterprises reduce time-to-discovery and

hybrid environments with full visibility - Easily instrument your network - Detect and respond to threats in real time - Multi-faceted advanced detection engines

Vinsula

early-stage

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

Posts tagged script Scripting Bot Malware: No Need to Learn C to Launch a Cyber Attack 6 years ago by Ivo Ivanov in Analysis, Technical Research T wo weeks

Posts tagged botnet Scripting Bot Malware: No Need to Learn C to Launch a Cyber Attack 6 years ago by Ivo Ivanov in Analysis, Technical Research T wo weeks

created AntiHook – a comprehensive kernel mode behavior based Host-based Intrusion Prevention (HIPS). Mr. Ivanov has also created many innovations in the

Point-of-sale terminal software appears to be an easy target in general for many attackers. There have recently been several high profile, and most likely non-coordinated

Point-of-sale terminal software appears to be an easy target in general for many attackers. There have recently been several high profile, and most likely non-coordinated

intriguing piece of malware (dubbed Sayad) that implements multiple host data collection methods and wraps them up into a single .NET DLL. Sayad malware

heuristic algorithms, our software captures and analyzes detailed behavioral data to identify malicious activity. Vínsula is built on proprietary technology

to Vinsula, Inc. - Security Blog - Security Tools - Unlock ZeroLocker - Our Team - Contact - google+ Posts tagged Ajax Security Team Sayad (Flying

- Welcome to Vinsula, Inc. - Security Blog - Security Tools - Unlock ZeroLocker - Our Team - Contact - google+ Posts tagged Sayad Sayad (Flying Kitten)

Malware authors frequently seek code-execution methods that not only evade detection by AV software but also cover tracks and remove evidence that could reveal

<p>Malware authors frequently seek code-execution methods that not only evade detection by AV software but also cover tracks and remove evidence that could reveal

right under the nose of the user, who will most likely fail to notice or detect these malicious activities. The bot also has the ability to remove any

picks it up and loads WSSE.DLL into Windows Explorer process. No AV would detect and report that as an issue. After Windows Explorer loads WSSE.DLL, the

Agam Security

start-up

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

Cybersecurity Training The need for public and private organizations to incorporate cyber-security in their development strategies Companies can no longer live in ...

#searchbox - Agam-AI - Consulting - Diagnostic & Intrusion Test - Security Audit - Sensitization & Training - About - About us ? - Mission & ...

defense system through: - A complete scan of your information systems - A detection of viruses and vulnerabilities - A check of security procedures - A check

- About us ? - Mission & Vision - Our Expertise - Client & Partner Cyber-defense Swiss Made In response to the lack of cyberdefense solutions accessible

#mobilemenu - #searchbox - Agam-AI - Consulting - Diagnostic & Intrusion Test - Security Audit - Sensitization & Training - About - About ...

advanced defense softwares in parallel. It filters all incoming and outgoing data flows to a company, by integrating in a single appliance all the necessary ...

Diagnostic & Intrusion test - Security Audit - Cybersecurity Training Predict. Detect. Eliminate. Adapt Procurement of an adapted and affordable cyber-defense

#mobilemenu - #searchbox - Agam-AI - Consulting - Diagnostic & Intrusion Test - Security Audit - Sensitization & Training - About - About ...

accessible sensitive information - Test the effectiveness of your current intrusion detection - Evaluate the employees’ reactivity during a real-time attack The ...

Companies are faced with two problems: procure effective defense and detection equipment and correctly evaluate the risk and potential economic impact

#searchbox - Agam-AI - Consulting - Diagnostic & Intrusion Test - Security Audit - Sensitization & Training - About - About us ? - Mission &

caused by a faulty action by a collaborator. It takes on average 240 days to detect an infection, usually by a third party. Cyber-security is not only a question

Security On-Demand

established

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

the European Union awards Security On-Demand Research Grant to accelerate cyber threat analytics technology development San Diego, CA Read More News Security

the European Union awards Security On-Demand Research Grant to accelerate cyber threat [...] READ MORE Security On-Demand Launches Major Channel Expansion

Protection - Threatwatch Hunt - Managed Firewall Service - Managed Intrusion Prevention (IPS/IDS) - Managed Web Application Firewall - Managed Network ...

Overviews - Partnership - Blog And Advisories Search Close Managed Intrusion Detection and Prevention 24x7 monitoring, investigations and response to cyber

Protection - Threatwatch Hunt - Managed Firewall Service - Managed Intrusion Prevention (IPS/IDS) - Managed Web Application Firewall - Managed Network

for any spikes of or unexpected DNS activity, events generated by intrusion detection / preventions systems or anti-virus, and looking for network anomalies

the attacker's reach and data loss that typically is costly to recover. Attackers are ahead of the defenders Even with great vigilance, threats are still ...

threats are still evading system defenses. Your organization must be able to: detect the unknown threats that can attack your systems prevent confidential information

intelligence community tradecraft - Robust Intelligence Repository mapping attackers to events & indicators - Big Data Analytics Capability to Speed IOC research

Blog And Advisories Search Close AQ TECHNOLOGY TM We Analyze All the Data, All the Time Security On-Demand is the only MSSP/MDR company in the world

that can attack your systems prevent confidential information leakage or data loss know if someone is going to bring your operations to a halt. Attack ...

state-sponsored hacking group to compromise a system is 19 minutes.* You can’t detect and respond that quickly, no human can. Attackers are ahead of the defenders

Service Security On-Demand’s™ Managed Web Application Firewall (WAF) Service is designed to help you solve issues that are critical to the security of your

Linkedin Twitter Envelope - About - Company Overview - Leadership Team - Security News & Events - Careers with SOD - Services - Advanced Threat & Log

Scans Service - Solutions - AQ Technology - 5th Generation Threat Detection - Threat Recon Unit - Industry Specializations - Healthcare - Financial

Scans Service - Solutions - AQ Technology - 5th Generation Threat Detection - Threat Recon Unit - Industry Specializations - Healthcare - Financial

Cinch Systems

established

Access

  • Technologies
  • Core data such as location, employees, revenues
  • Similar and peer companies
  • and more

Web Quotes

Intrusion Detection Systems, IDS, Security Systems, AES, Encryption, Control Panels, Expansion Modules, Inputs, CINCH systems, CINCH, CINCH Security seee ...

Intrusion Detection Systems, IDS, Security Systems, AES, Encryption, Control Panels, Expansion Modules, Inputs, CINCH systems, CINCH, CINCH Security seee ...

Intrusion Detection Systems, IDS, Security Systems, AES, Encryption, Control Panels, Expansion Modules, Inputs, CINCH systems, CINCH, CINCH Security seee

CINCH systems - Intrusion Detection Systems, Modules, Sensors, Kits, and Enclosures Home Products - Intrusion Detection Products - Vehicle Barrier ...

CINCH systems - Intrusion Detection Systems, Modules, Sensors, Kits, and Enclosures Home Products - Intrusion Detection Products - Vehicle Barrier ...

CINCH systems - Intrusion Detection Systems, Modules, Sensors, Kits, and Enclosures Home Products - Intrusion Detection Products - Vehicle Barrier

delivering up to 25 mA. - CeLAN AES encrypted digital data bus technology provides secure, fast and reliable data transfer between the Protector and Protector II

Accessory Hardware kit. - CINCH Stick Field Upgradeable firmware. Download Data Sheet Product Applications: Government Agencies, Sensitive Compartmented

Vehicle Barrier Products - Door/Security Gate Controls About Us Wireless Sensing Training News Partners High-security technology, customer-driven solutions

Vehicle Barrier Products - Door/Security Gate Controls About Us Wireless Sensing Training News Partners High-security technology, customer-driven solutions

Use detailed technology terms.

Only spotfolio allows for searching with detailed technology terms, as we provide you with all topics that technology companies talk about.

Companies addressing these topics might be of specific interest to you, as they share more specific, niche topics.

All companies in this field address the following more general topics.

Use Cases

Register now

Why Technology Scouting?

Technology scouting is the basis for your innovation management, identifies new technological developments as early as possible and protects you from disruptive business models.

Identify technology partners

Boost your market research

Look beyond major players

Build long and short lists

Collect technology leaders, providers, start ups and potential new partners in lists via simple tagging to take further steps with your team.