72 Companies
Access all companiesSpotfolio tracks over one million companies in technology industries.
There are 72 companies in the field of Intrusion Detection on spotfolio that produce or deliver products, that utilize or research technologies or that are otherwise engaged in topics such as Security, Detection, Threat, Detect, Data, Cyber, Intrusion, Attackers .
Start-ups (11)
Early-stage companies (20)
Established companies (40)
The majority of these companies is located in the following countries.
United States (34)
Japan (10)
Switzerland (4)
United Kingdom (4)
Example Companies
Find companies in your areaBricata Bricata, Inc.

Access
- Technologies
- Core data such as location, employees, revenues
- Similar and peer companies
- and more
Web Quotes
founder and head of Capital One’s Cyber Security ML practice (CyberML), CEO of the Honeynet Project and CTO of the Global Cyber Alliance. Back to team Take
More Blog Are Utilities Ready to Defend Against Industrial Cyber Threats? Analyzing the cyber risk, readiness and preparation of utility companies Read ...
Be Ready for an IDS Upgrade When was the last time you assessed your Intrusion Detection System (IDS)? These solutions remain vitally... Read More Blog ...
Ready for an IDS Upgrade When was the last time you assessed your Intrusion Detection System (IDS)? These solutions remain vitally... Read More Blog Four
large financial services company needed to upgrade their legacy network intrusion detection system (NIDS) to reduce false positives and eliminate blind spots ...
financial services company needed to upgrade their legacy network intrusion detection system (NIDS) to reduce false positives and eliminate blind spots
these scams in this CNBC article. Nation-State Actors State-sponsored attackers have also used the coronavirus to make their malware and phishing campaigns
Facts - Resources - Blog - Explore All - Contact - Get Info Blog No data? No hunt. Top tips to ensure a successful threat hunting environment By
Filter By: Indicator Data Sheet Bricata Cloud Retention Data Sheet The types of data Bricata captures and stores, and how long data is retained, can be
New Network Security Features in the Bricata Platform you Might have Missed Bricata recently released a new version of its network security product with
Principal (the 80/20 rule) to network security, about 80% of incidents are caused... Read More Blog 3 Cool New Network Security Features in the Bricata Platform
Comprehensive Network Detection & Response Platform Visibility. Context. Detection. Response. Threat Hunting. Bricata is leading the next generation of
Upgrade By Bricata When was the last time you assessed your Intrusion Detection System (IDS)? These solutions remain vitally important today, but as threats
Explore All - Contact - Get Info Get a Live Demo SCHEDULE A LIVE DEMO DETECT. PREVENT. HUNT. Bricata helps enterprises reduce time-to-discovery and
hybrid environments with full visibility - Easily instrument your network - Detect and respond to threats in real time - Multi-faceted advanced detection engines
Vinsula

Access
- Technologies
- Core data such as location, employees, revenues
- Similar and peer companies
- and more
Web Quotes
Posts tagged script Scripting Bot Malware: No Need to Learn C to Launch a Cyber Attack 6 years ago by Ivo Ivanov in Analysis, Technical Research T wo weeks
Posts tagged botnet Scripting Bot Malware: No Need to Learn C to Launch a Cyber Attack 6 years ago by Ivo Ivanov in Analysis, Technical Research T wo weeks
created AntiHook – a comprehensive kernel mode behavior based Host-based Intrusion Prevention (HIPS). Mr. Ivanov has also created many innovations in the
Point-of-sale terminal software appears to be an easy target in general for many attackers. There have recently been several high profile, and most likely non-coordinated
Point-of-sale terminal software appears to be an easy target in general for many attackers. There have recently been several high profile, and most likely non-coordinated
intriguing piece of malware (dubbed Sayad) that implements multiple host data collection methods and wraps them up into a single .NET DLL. Sayad malware
heuristic algorithms, our software captures and analyzes detailed behavioral data to identify malicious activity. Vínsula is built on proprietary technology
to Vinsula, Inc. - Security Blog - Security Tools - Unlock ZeroLocker - Our Team - Contact - google+ Posts tagged Ajax Security Team Sayad (Flying
- Welcome to Vinsula, Inc. - Security Blog - Security Tools - Unlock ZeroLocker - Our Team - Contact - google+ Posts tagged Sayad Sayad (Flying Kitten)
Malware authors frequently seek code-execution methods that not only evade detection by AV software but also cover tracks and remove evidence that could reveal
<p>Malware authors frequently seek code-execution methods that not only evade detection by AV software but also cover tracks and remove evidence that could reveal
right under the nose of the user, who will most likely fail to notice or detect these malicious activities. The bot also has the ability to remove any
picks it up and loads WSSE.DLL into Windows Explorer process. No AV would detect and report that as an issue. After Windows Explorer loads WSSE.DLL, the
Agam Security

Access
- Technologies
- Core data such as location, employees, revenues
- Similar and peer companies
- and more
Web Quotes
Cybersecurity Training The need for public and private organizations to incorporate cyber-security in their development strategies Companies can no longer live in ...
#searchbox - Agam-AI - Consulting - Diagnostic & Intrusion Test - Security Audit - Sensitization & Training - About - About us ? - Mission & ...
defense system through: - A complete scan of your information systems - A detection of viruses and vulnerabilities - A check of security procedures - A check
- About us ? - Mission & Vision - Our Expertise - Client & Partner Cyber-defense Swiss Made In response to the lack of cyberdefense solutions accessible
#mobilemenu - #searchbox - Agam-AI - Consulting - Diagnostic & Intrusion Test - Security Audit - Sensitization & Training - About - About ...
advanced defense softwares in parallel. It filters all incoming and outgoing data flows to a company, by integrating in a single appliance all the necessary ...
Diagnostic & Intrusion test - Security Audit - Cybersecurity Training Predict. Detect. Eliminate. Adapt Procurement of an adapted and affordable cyber-defense
#mobilemenu - #searchbox - Agam-AI - Consulting - Diagnostic & Intrusion Test - Security Audit - Sensitization & Training - About - About ...
accessible sensitive information - Test the effectiveness of your current intrusion detection - Evaluate the employees’ reactivity during a real-time attack The ...
Companies are faced with two problems: procure effective defense and detection equipment and correctly evaluate the risk and potential economic impact
#searchbox - Agam-AI - Consulting - Diagnostic & Intrusion Test - Security Audit - Sensitization & Training - About - About us ? - Mission &
caused by a faulty action by a collaborator. It takes on average 240 days to detect an infection, usually by a third party. Cyber-security is not only a question
Security On-Demand

Access
- Technologies
- Core data such as location, employees, revenues
- Similar and peer companies
- and more
Web Quotes
the European Union awards Security On-Demand Research Grant to accelerate cyber threat analytics technology development San Diego, CA Read More News Security
the European Union awards Security On-Demand Research Grant to accelerate cyber threat [...] READ MORE Security On-Demand Launches Major Channel Expansion
Protection - Threatwatch Hunt - Managed Firewall Service - Managed Intrusion Prevention (IPS/IDS) - Managed Web Application Firewall - Managed Network ...
Overviews - Partnership - Blog And Advisories Search Close Managed Intrusion Detection and Prevention 24x7 monitoring, investigations and response to cyber
Protection - Threatwatch Hunt - Managed Firewall Service - Managed Intrusion Prevention (IPS/IDS) - Managed Web Application Firewall - Managed Network
for any spikes of or unexpected DNS activity, events generated by intrusion detection / preventions systems or anti-virus, and looking for network anomalies
the attacker's reach and data loss that typically is costly to recover. Attackers are ahead of the defenders Even with great vigilance, threats are still ...
threats are still evading system defenses. Your organization must be able to: detect the unknown threats that can attack your systems prevent confidential information
intelligence community tradecraft - Robust Intelligence Repository mapping attackers to events & indicators - Big Data Analytics Capability to Speed IOC research
Blog And Advisories Search Close AQ TECHNOLOGY TM We Analyze All the Data, All the Time Security On-Demand is the only MSSP/MDR company in the world
that can attack your systems prevent confidential information leakage or data loss know if someone is going to bring your operations to a halt. Attack ...
state-sponsored hacking group to compromise a system is 19 minutes.* You can’t detect and respond that quickly, no human can. Attackers are ahead of the defenders
Service Security On-Demand’s™ Managed Web Application Firewall (WAF) Service is designed to help you solve issues that are critical to the security of your
Linkedin Twitter Envelope - About - Company Overview - Leadership Team - Security News & Events - Careers with SOD - Services - Advanced Threat & Log
Scans Service - Solutions - AQ Technology - 5th Generation Threat Detection - Threat Recon Unit - Industry Specializations - Healthcare - Financial
Scans Service - Solutions - AQ Technology - 5th Generation Threat Detection - Threat Recon Unit - Industry Specializations - Healthcare - Financial
Cinch Systems

Access
- Technologies
- Core data such as location, employees, revenues
- Similar and peer companies
- and more
Web Quotes
Intrusion Detection Systems, IDS, Security Systems, AES, Encryption, Control Panels, Expansion Modules, Inputs, CINCH systems, CINCH, CINCH Security seee ...
Intrusion Detection Systems, IDS, Security Systems, AES, Encryption, Control Panels, Expansion Modules, Inputs, CINCH systems, CINCH, CINCH Security seee ...
Intrusion Detection Systems, IDS, Security Systems, AES, Encryption, Control Panels, Expansion Modules, Inputs, CINCH systems, CINCH, CINCH Security seee
CINCH systems - Intrusion Detection Systems, Modules, Sensors, Kits, and Enclosures Home Products - Intrusion Detection Products - Vehicle Barrier ...
CINCH systems - Intrusion Detection Systems, Modules, Sensors, Kits, and Enclosures Home Products - Intrusion Detection Products - Vehicle Barrier ...
CINCH systems - Intrusion Detection Systems, Modules, Sensors, Kits, and Enclosures Home Products - Intrusion Detection Products - Vehicle Barrier
delivering up to 25 mA. - CeLAN AES encrypted digital data bus technology provides secure, fast and reliable data transfer between the Protector and Protector II
Accessory Hardware kit. - CINCH Stick Field Upgradeable firmware. Download Data Sheet Product Applications: Government Agencies, Sensitive Compartmented
Vehicle Barrier Products - Door/Security Gate Controls About Us Wireless Sensing Training News Partners High-security technology, customer-driven solutions
Vehicle Barrier Products - Door/Security Gate Controls About Us Wireless Sensing Training News Partners High-security technology, customer-driven solutions
Topics
Search by any topicOnly spotfolio allows for searching with detailed technology terms, as we provide you with all topics that technology companies talk about.
Companies addressing these topics might be of specific interest to you, as they share more specific, niche topics.
The following topics addressed by the majority of companies help you discover major players in the field.
- About
- Access
- Activity
- Actors
- Advanced
- Alarm
- Alerts
- Attack
- Attackers
- Control
- Critical
- Critical-Infrastructure
- Cyber
- Cybersecurity
- Detect
- Detected
- Detection-Systems
- IT
- Infrastructure
- Intelligence
- Intrusion
- Intrusion-Detection
- Malicious
- Malware
- Monitoring
- Partner
- Product
- Protection
- Real-Time
- Response
- SIEM
- Security-Operations
- Security-Solutions
- Surveillance
- Threat
- Threat-Detection
- Threat-Intelligence
- Vulnerabilities
Use Cases
Register nowTechnology scouting is the basis for your innovation management, identifies new technological developments as early as possible and protects you from disruptive business models.
Collect technology leaders, providers, start ups and potential new partners in lists via simple tagging to take further steps with your team.