AI Companies for Security
Explore AI vendor companies offering security solutions, including applications in cybersecurity, defense, fraud detection, and more.
Description: Cylance is a cybersecurity products and services company focusing on stopping tomorrow's attacks today. Founded in 2012 by ex-McAfee Global CTO Stuart McClure and ex-McAfee Chief Scientist Ryan Permeh, Cylance was created to solve the malware problem once and for all. Our flagship product, CylancePROTECT®, is the world's first next-generation antivirus built on artificial intelligence and machine learning. Named the SC Magazine Award winner for "Best Emerging Technology" in 2015, CylancePROTECT offers exponentially improved prevention capabilities when compared to other endpoint security solutions.
Description: Vectra® Networks automates the hunt for hidden cyber attacks inside campus networks, data centers and the cloud by continuously monitoring internal traffic to detect threats as they unfold. These threats are automatically correlated with host devices that are under attack and unique context about what attackers are doing enables organizations to quickly prevent or mitigate loss. Vectra prioritizes attacks that pose the greatest business risk so organizations can make rapid decisions on where to focus time and resources. The editorial team at Dark Reading recently presented Vectra with the Best of Black Hat 2016 award for Most Innovative Emerging Company. Vectra Networks’ investors include Khosla Ventures, Accel Partners, IA Ventures, AME Cloud Ventures, and DAG Ventures. The company’s headquarters are in San Jose, Calif. Products: Scalable Architecture: The scalable, distributed Vectra architecture enables customers to deploy a combination of physical S-series sensors, virtual sensors (vSensors) and X-series appliances across multiple locations for unified analysis, detection and correlation of threats. X-series appliances: Vectra X-series software can be ordered preloaded on a full-depth rack-mountable appliance that scales to accommodate the largest networks. The X-series is deployable in three modes -- Brain, Sensor or Mixed. In Brain mode, the X-series only receives metadata from one or more sensors. In Sensor mode, the X-series ingests traffic, extracts metadata and forwards it to another Brain or Mixed-mode X-series for processing. In Mixed mode, the X-series performs both Brain and Sensor functions. Physical S-series sensors: Vectra S-series sensors are easily deployed at remote sites or with access switches on internal network segments to extend the reach of your Vectra deployment. These small, dedicated devices passively monitor network traffic, extract critical metadata and forward it to the Brain for analysis and attack detection. Virtual sensors: Vectra vSensors running in VMware ESXi make it easy to extend threat detection coverage across the physical network and into virtualized data centers. Connect vSensors to any VMware vSwitch in the data center for visibility into all traffic and to detect threats that pass between workloads. Vectra also integrates with VMware vCenter for an authoritative, always up-to-date view of the virtual environment.
Description: CrowdStrike is the leader in next-generation endpoint protection, threat intelligence and response services. CrowdStrike’s core technology, the Falcon Platform, unifies next-gen AV, endpoint detection and response, and proactive hunting — all delivered via the cloud. Many of the world’s largest organizations already put their trust in CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies. Products: Falcon Host: Falcon Host unifies three technologies – next-generation antivirus, endpoint detection and response, and around-the-clock threat hunting to provide continuous breach prevention. Falcon Overwatch: Falcon Overwatch leverages the power of the CrowdStrike Threat Graph™ and when combined with Falcon Intelligence service, it alerts you not only when you’re being attacked, but also when specific industry sectors are being targeted by new or known adversaries. With Falcon Overwatch, sophisticated attacks are identified immediately, not hours or days, giving you the time to stop attacks before your organization is compromised. Falcon Intelligence: You’ve already invested a great deal in your security infrastructure to prevent, detect, and respond to cybersecurity attacks. Yet you may feel as if you’re still constantly putting out fires and are still uncertain about your current cybersecurity posture. You’re looking for ways to be more proactive, more effective, and more strategic about your defenses, without having to “rip and replace” all of your existing defense infrastructure. You need the right cyber security intelligence, delivered at the right time, in the right way to help you stop breaches. Falcon Architecture: CrowdStrike designed a new approach and architecture to overcome the limitations of existing endpoint security solutions and deliver true next-generation endpoint protection. Falcon Connect: Falcon Connect provides a rich set of resources, including APIs (Application Programming Interfaces), applications and tools to develop, integrate and extend the use of the Falcon Platform with existing security solutions.
Description: Sift Science has built the world’s most advanced fraud detection system. Using large-scale machine learning technology to predict fraudulent behavior with unparalleled accuracy, Sift Science leverages a global network of fraud data. Catch the fraud that is unique to your business and train your customized model to stop fraudsters in real time. Sift Science’s flexible, adaptive, and automated solution helps businesses of all sizes detect and prevent fraud, before it hits your bottom line. Products: Payment Fraud: Accurately detect fraudsters in real time with machine learning. Prevent fraudulent transactions and chargebacks before they happen. Content Abuse: Prevent bad actors from posting malicious or low-quality content that can permanently damage your business’ reputation and drive good users off your site. Promo Abuse: Leverage real-time machine learning to accurately prevent promo abusers from depleting your marketing budget. Account Abuse: Accurately detect bad actors in real time with machine learning, and prevent them from creating phony accounts on your site or app. Device Fingerprinting: Uniquely identifies and tracks every device that accesses your site. Once you know which devices are used by the bad guys, blocking them is a piece of cake.