Movers and Shakers – 10 Cyber Security Firms Worth Exploring

Movers and Shakers – 10 Cyber Security Firms Worth Exploring

Cyber Security Firms

There are so many different options for cyber security for businesses, even wading through the CyberSecurity 500 is a daunting task. To that end we have assembled a list (in no particular order) of some of the leading cybersecurity firms around at the moment. These are some of the movers and shakers. The companies are both big and small and may specialize in different facets of the cyber security market from Anti-virus to DDoS protection services.  These are some of the biggest and brightest in the field at the moment.

Herjavec Group

Cyber Security Firms

Herjavec Group is a Toronto-based cyber security firm company, that provides 24/7/365 protection for your data and IT infrastructure operating on a global scale, with over 30 offices around the world in the likes of Canada, the United States, United Kingdom, and Australia, they have been rising quietly up the Cybersecurity 500 – from #23 in 2015, #10 in January 2016, to sitting where they are now at #2 on the list. They specialise in a number of cyber security facets; security gap assessments, consulting, implementation, managed services, networking, remediation & incident response.

IBM Security

IBM Security is a strand of IBM, focused on data and application security. Ranked #3 on the Cybersecurity 500, IBM aims to protect businesses using a unique enterprise security portfolio to identify and disrupt new threats, utilize security innovations and cut the cost and complexity of cyber-security. They have recently announced, that they will be teaching Watson (IBM’s AI project) to track reports, blogs and other information on emerging threats, so they’ll be able to assist companies facing cyberattacks. This is a new step in the fight against cyber-crime, as AI is relatively untested in this field, though Watson will only be offering advice for now.

AVG Technologies

AVG is a world renowned anti-virus software, with over 200 million active users of their software and products. They provide internet security to private and commercial interests, ranging from family homes to massive corporations, housing offices in Europe, Canada, Israel, The US, and Brazil. They provide software across all major platforms and operating systems, with a range of products tailored for businesses, like CloudCare to protect you and your clients data in the cloud, and various levels of task and security automation to keep you protected at all times.

Kaspersky Lab

Kaspersky Lab is a global cyber-security and anti-virus firm headquartered in Moscow. It was founded in 1997 by the storied Russian security specialist Eugene Kaspersky, initially providing anti-virus software to large companies and later expanding to offer consumer and mobile security products. It’s researchers famously uncovered several famous hacking groups and pieces of malware – including Flame, a cyber espionage program that was discovered in 2012. Their software currently has around 400 million users and has the largest market-share of cybersecurity software vendors in the whole of Europe.

 Cisco

Cisco is an American multinational technology conglomerate in San José, California. They offer a vast array of services, software, and hardware, and have a dedicated security sector. Cisco offer their cyber-security products and services to businesses of all sizes and requirements, providing cloud, email, web, and router protection, network visibility, and intrusion prevention systems. They can even provide consultation and remote monitoring, ensuring comprehensive security solutions.

Check Point Software Technologies Limited

 

Check Point Software Technologies Limited is an Israeli provider of security software and combined hardware and software, operating globally, with offices in Belarus, Ontario, California, Sweden, and Texas. Check Point is involved with the cyber-security in over 100,000 organizations – they utilize complete security architecture in addition to comprehensive and intuitive security, offering mobile, public and private cloud security as well as next generation threat detection and firewalls. They are by far the largest pure-play cyber security in terms of market capitalization in the world, with a rough value of $16 billion.

Cylance

Cylance was the fastest growing private cybersecurity firm in the market this year, over the past few years, they have seen a staggering growth of 7,613%. They were founded in 2012 and based out of California, CEO Stuart McClure founded the company as a reaction to his concern that most cyber security is simple reactive, and he wanted to build a more proactive model. They claim to provide ‘silent security’ (requiring very little maintenance and updates), that is easy to deploy and manage, utilizing AI and machine learning to revolutionize cyber security. Described by Cyber Secure India as “the first company to apply artificial intelligence, algorithmic science and machine learning to cyber security”, they offer an anti-virus software that is designed to prevent, rather than detect viruses and malware – doing away with with the signature-based technology used by traditional security vendors.

PhishMe

PhishMe is a US information security firm that provides technology that helps organizations educate their employees about how to spot potential phishing risks. Phishing is still the most common ways for a hacker to gain access to an organization’s IT – PhishMe claim that more than 90% of all breaches can be attributed to successful fishing campaigns (and companies usually attribute blame to their employees). They want to combat this risk by better educating employees of their clients in order to alleviate this risk, by empowering people to identify and spot potential danger themselves, they are cutting out the problem at the source.

KnowBe4

We are in the business of training employees to make smarter security decisions” is the ambitious mission statement that KnowBe4 operate by. The rules they live by are simple: “Do it right the first time, do it fast, and have fun while you do it” – they focus on user education and promoting their “new-school” security awareness training. Given that the majority of recent large scale security breaches are from targeted phishing attacks, it makes sense to spend time learning to identify these threats and combat them. KnowBe4 have subsequently become the world’s most popular integrated Security Awareness Training and Simulated Phishing platform – with many banks and credit unions using their services.

Root9b

It seemed natural to finish with the firm ranked #1 on Cybersecurity 500 for the last quarter of 2016 – making it 4 quarters in a row, that’s the whole of 2016. Root9B is cybersecurity consulting and operational support firm with clientele ranging from medium sized businesses to Fortune 100 companies across a range of industries (including some government DoD (Department of Defence contracts). They also offer training courses in an array of cyber security measures such as defensive cyber operations, adversary pursuit methodologies, and systems forensics.

None of the services included in this list were sponsored or paid for. However, companies interested in being involved in future sponsorship initiatives can contact us to discuss our other programs via: contact@cloudtweaks.com

By Josh Hamilton

About Josh Hamilton

An aspiring journalist and writer from Belfast, Northern Ireland, living in London, Ontario. Lover of music, politics, tech and life.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…