When it comes to cyber defense, depth is the name of the game. A single barrier is no longer enough. To resist increasingly sophisticated cyberattacks, network security companies rely on an arsenal of tools that detect, respond to, and protect against cybercrime in real time.
Application security, behavioral analysis, data loss prevention, email security and VPN tools are just tip of the iceberg. Along with traditional protection methods, network security companies are also focusing their efforts on the development of cloud-based products and IoT devices. With an estimate 200 billion connected devices online by 2020companies in the sector are already increasing their services to protect our privacy.
We’ve rounded up 12 network security companies using innovation to fight the bad guys.
Location: Seattle, Washington
How it uses network security: Temperate networks creates Identity Defined Networking (IDN) solutions for IoT infrastructure and devices in the energy, education, manufacturing, healthcare and water industries. The company’s Zero Trust identity overlay allows connected devices to “talk” to each other securely over a secure network.
Impact on industry: Temperate Networks and Smart Building Management Company Delta controls have partnered to integrate the network security company’s IDN onto their SaaS management platform. The partnership will help buildings managed by Delta Controls prevent data breaches.
Location: Boston, MA
How it uses network security: Snyk is a network security company whose platform helps developers find and fix vulnerabilities in their open source code through automation and precision patching. Additionally, Snyk’s vulnerability database only includes code that has been scanned and tested by his team before inclusion.
Impact on industry: Many global brands use Snyk’s network security system, including Google, Salesforce, Skyscanner, and Microsoft.
Location: Boulder, Colorado
How it uses network security: JumpCloud Directory-as-a-Service (DaaS) is a cloud-based platform that helps IT teams securely manage identities and securely connect employees to external resources. The identity management portion of the platform allows administrators to manage credentials and authentications, greatly limiting malicious network attacks.
Impact on industry: HelloFresh, CarGurus, and ClassPass all rely on JumpCloud’s DaaS platform to manage employee identity and access information.
Location: El Segundo, California
How it uses network security: Cujo uses AI-powered cybersecurity and network security tools to help protect devices from breaches. The company’s SaaS and firmware solutions integrate with an enterprise cloud to run everything from content access control to threat detection and endpoint security.
Impact on industry: Cujo powers the network security behind Comcast’s new connected device security system, using its AI to monitor, block, and notify customers of potential threats to all of their connected devices in their home.
Location: Broomfield, Colorado
How it uses network security: web root provides cloud endpoint intelligence and protection services for everything from home offices to enterprises. The company uses machine learning-based predictive threat intelligence to identify flaws in a network’s cybersecurity protocol before a malicious actor finds them. The Webroot platform then provides a detailed report showing any vulnerabilities and suggestions on how to fix them.
Impact on industry: Webroot was acquired by cloud-based data protection provider Carbonite in February. Carbonite will use Webroot’s expertise to address one of its top vulnerabilities: endpoint security for cloud-based products.
Location: Chicago, Ill.
How it uses network security: Xaptum provides real-time cybersecurity systems for Internet of Things networks. The company’s platform enables device authentication and authorization for secure messaging between an IoT device and the cloud.
Impact on industry: Xaptum targets $40 billion intermodal network. By securing their logistics networks with Xaptum, intermodal transportation companies are able to securely transfer data from their IoT devices to the cloud without worrying about a security breach.
Location: Burlington (Massachusetts)
How it uses network security: Edgewise Networks prevents cyber threats to applications, data centers and clouds with its Zero Trust Network Platform, which automatically identifies all communications within a network and monitors for suspicious outliers. Zero Trust also scans and verifies all software on a network to ensure predefined cybersecurity measures have been met.
Impact on industry: Edgewise Networks Zero Trust Platform recently received a patent for Innovation in “Network Application Security Policy Enforcement”.
To look for
Location: San Francisco, California
How it uses network security: To look for is a cybersecurity company that creates “post-perimeter” endpoint protection for mobile devices using predictive machine learning that continuously assesses the security of the networks that mobile devices connect to. Lookout protects mobile phones from data breaches by verifying sources in real time.
Impact on industry: Lookout’s AI quickly located a fake website who impersonated and attempted to breach the Democratic National Committee’s voter database, exposing the personal information of millions of people. Lookout contacted the DNC and the FBI to expose this security threat and have the website investigated.
Location: San Jose, California
How it uses network security: Vectra is a threat detection and hunting platform that identifies attacks on clouds, data centers and IoT devices in real time. Using AI-based behavioral detection algorithms, the company’s Cognito platform detects, responds to, and investigates attacks.
Impact on industry: Vectra had been named to the 2019 CB Insights AI 100 Most Innovative Artificial Intelligence Startups.
Location: San Francisco, California
How it uses network security: Fox pass helps businesses strengthen their network security with cloud-hosted tools that monitor existing directories (Google Apps, Okta, Office 365, etc.) to protect network connections across apps and WiFi.
Impact on industry: Optimally, Instacart, Imgur, and Boxed are just a few of the well-known brands that use Foxpass to automate and protect their networks.
Location: New York, New York
How it uses network security: Axonius is a network security platform that allows IT teams to manage and secure all their devices. With universal device visibility, IT teams can monitor every device connected to the network for performance issues or cyberattacks.
Impact on industry: Axonius was named 2019 finalist for the RSA Conference Innovation Sandbox competition. A leading information security conference, RSA gives 10 of the most innovative startups a platform to showcase their technologies.
Location: Santa Clara, California
How it uses network security: netronome develops a Domain Specific Architecture (DSA) that allows customers to build accelerators for network applications and edge computing. The company’s DSA network protection includes everything from intrusion detection tools to the latest firewalls and a zero-trust distributed security system.
Images via social media, Shutterstock and screenshots of company web pages.