Navigator Overview

The HEALTH-ISAC NAVIGATOR PROGRAM provides business networking opportunities which is achieved through supporting educational related activities. Solution driven organizations that advocate for H-ISAC increasing resiliency across the health ecosystem, in the face of ongoing cybersecurity and other security threats, are prime candidates for participation in this program.

Navigator Sponsorship Program

Joining the Navigator program signifies that you are a solution provider, committed to sharing high level thought leadership content to H-ISAC’s global membership. By becoming a “Navigator,” your organization will be offered UNIQUE business networking opportunities with all of H-ISAC’s Global members. 

Learn What is Included

Download the Navigator Agreement, Sign, and Email Us

Current H-ISAC Navigators

Akamai

Akamai secures and delivers digital experiences for the world’s largest companies. Akamai’s intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart, and secure. Top brands globally rely on Akamai to help them realize competitive advantage through solutions that extend the power of their entire architecture. Akamai keeps decisions, apps, and experiences closer to users — and attacks and threats far away. Akamai’s portfolio of edge security, web and mobile performance, enterprise access, and video delivery solutions is supported by unmatched customer service, analytics, and 24/7/365 monitoring.

Back to Top

Armis

Armis is the leading agentless, enterprise-class device security platform, designed to protect organizations from cyberthreats created by the onslaught of unmanaged and IoT devices. Fortune 1000 companies trust our unique out-of-band sensing technology to discover and analyze all managed, unmanaged, un-agentable and IoT devices – from traditional devices like laptops and smartphones to new smart devices like smart TVs, webcams, printers, HVAC systems, industrial control systems and PLCs, medical devices and more. Armis provides unparalleled device discovery and intelligence, real-time continuous device behavior analysis and threat detection to identify and stop threats or secure suspicious or malicious devices.

Facebook 
https://www.facebook.com/ArmisInc/

Linkedin
https://www.linkedin.com/company/armis-security 

Twitter
https://twitter.com/armissecurity?lang=en 

Back to Top

Asimily

Asimily’s IoMT risk remediation platform holistically secures the mission-critical healthcare devices that deliver safe and reliable care. With the largest knowledgebase of medical devices and protocols, Asimily inventories and classifies every device across a healthcare organization, connected and stand-alone. We identify and prioritize vulnerabilities and provide actionable intelligence to remediate vulnerabilities in an efficient and effective manner . Because risk assessment – and threats – aren’t a static target, Asimily monitors your devices, detects anomalous behavior and alerts operators to remediate the identified anomalies. Asimily is working with small, medium and large Health systems across the country.

Back to Top

AttackIQ

AttackIQ, the leading independent vendor of breach and attack simulation solutions, built the industry’s first platform that enables security teams to test and measure the effectiveness of their security controls and staff. The AttackIQ Security Optimization Platform supports the MITRE ATT&CK framework, a curated knowledge base and model for cyber adversary behavior used for planning security improvements and verifying defenses work as expected. AttackIQ is trusted by leading companies around the world to improve security program effectiveness and productivity. For more information visit www.attackiq.com

Back to Top

Attivo Networks 

Attivo Networks® is the leader in deception for cyber security defense. Founded in 2011, Attivo Networks provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments. Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Unlike prevention systems, Attivo assumes the attacker is inside the network and uses high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves. With no dependencies on signatures or attack pattern matching, the BOTsink deception server is designed to accurately and efficiently detect the reconnaissance and lateral movement of advanced threats, stolen credential, ransomware, man-in-the-middle, and phishing attacks. The Attivo Multi-Correlation Detection Engine (MCDE) captures and analyzes attacker IPs, methods, and actions that can then be viewed in the Attivo Threat Intelligence Dashboard, exported for forensic reporting in IOC, PCAP, STIX, CSV formats or can be used to automatically update SIEM and prevention systems for blocking, isolation, and threat hunting. The ThreatOps offering simplifies incident response through information sharing, incident response automation, and the creation of repeatable playbooks.

Back to Top

Axonius

 Axonius is the only cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with nearly 200 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately. Covering millions of devices at customers like the New York Times, Schneider Electric, and AppsFlyer, Axonius was named the Most Innovative Startup of 2019 at the prestigious RSAC Innovation Sandbox and was named Rookie Security Company of the Year by SC Magazine. For more visit Axonius.com.

Back to Top

BigID

BigID’s data intelligence platform enables organizations to know their enterprise data and take action for privacy, protection, and perspective.  Customers deploy BigID to proactively discover, manage, protect, and get more value from their regulated, sensitive, and personal data across their data landscape.

By applying advanced machine learning and deep data insight, BigID transforms data discovery and data intelligence to address data privacy, security, and governance challenges across all types of data, at petabyte-scale, on-prem and in the cloud.  Customers can automate manual processes, reduce risk, achieve compliance with regulations like CCPA, GDPR, and get more value from their data. 

Back to Top

BitSight

BitSight transforms how organizations manage information cybersecurity risk with objective, verifiable and actionable Security Ratings. Founded in 2011, the company built its Security Ratings Platform to continuously analyze vast amounts of data on security issues. Fifty percent of the world’s cybersecurity premiums are underwritten by BitSight customers, and 20 percent ofFortune 500 companies, and four out of the top five investment banks rely on BitSight to manage cyber risks. For more information, please visit www.BitSight.com, read our blog or follow @BitSight on Twitter.

Back to Top

Booz Allen Hamilton

For more than 100 years, business, government, and military leaders have turned to Booz Allen Hamilton to solve their most complex problems. As a consulting firm with experts in analytics, digital, engineering and cyber, we help organizations transform. We are a key partner on some of the most innovative programs for governments worldwide and trusted by the most sensitive agencies. We work shoulder to shoulder with clients, using a mission-first approach to choose the right strategy and technology to help them realize their vision.
With global headquarters in McLean, Virginia, our firm employs about 27,200 people globally, and had revenue of $6.70 billion for the 12 months ended March 31, 2019. To learn more, visit www.boozallen.com. (NYSE: BAH)

Back to Top

Clearwater

Clearwater is the leading provider of Enterprise Cyber Risk Management and HIPAA compliance software and services for healthcare organizations, including health systems, physician groups, and health IT companies. Our solutions include our proprietary SaaS-based platform IRM|Pro®, which helps organizations manage cyber risk and HIPAA compliance across the enterprise, and advisory support from our deep team of information security experts.

Back to Top

Cofense

Cofense® is the leading provider of phishing detection and response solutions. Designed for enterprise organizations, the Cofense Phishing Detection and Response (PDR) platform leverages a global network of over 25 million people actively reporting suspected phish, combined with advanced automation to stop phishing attacks faster and stay ahead of breaches. When deploying the full suite of Cofense solutions, organizations can educate employees on how to identify and report phish, detect phish in their environment and respond quickly to remediate threats. With seamless integration into most major TIPs, SIEMs, and SOARs, Cofense solutions easily align with existing security ecosystems. Across a broad set of Global 1000 enterprise customers, including defense, energy, financial services, healthcare and manufacturing sectors, Cofense understands how to improve security, aid incident response and reduce the risk of compromise. For additional information, please visit www.cofense.com or connect with us on Twitter and LinkedIn. 

Back to Top

Crowdstrike

CrowdStrike, a global cybersecurity leader, is redefining security for the cloud era with an endpoint and workload protection platform built from the ground up to stop breaches. The CrowdStrike Falcon® platform’s single lightweight-agent architecture leverages cloud-scale artificial intelligence (AI) and offers real-time protection and visibility across the enterprise, preventing attacks on endpoints and workloads on or off the network. Powered by the proprietary CrowdStrike Threat Graph®, CrowdStrike Falcon correlates 5 trillion endpoint-related events per week in real time from across the globe, fueling one of the world’s most advanced data platforms for security. With CrowdStrike, customers benefit from better protection, better performance and immediate time-to-value delivered by the cloud-native Falcon platform. There’s only one thing to remember about CrowdStrike: We stop breaches. Learn more: https://www.crowdstrike.com/.

Back to Top

CyberMDX

CyberMDX is an IoT security leader dedicated to protecting the quality care of health delivery worldwide. They provide cloud-based cyber security solutions that support the advancement of The Internet of Medical Things. The CyberMDX solution identifies endpoints and assesses vulnerabilities to detect, respond to, and prevent cyber incidents. Deployed worldwide, CyberMDX is designed to integrate with our customers’ existing environments through its scalable, easy-to-deploy and agentless solution.

Back to Top

CyberPeace Institute

The CyberPeace Institute is an independent and neutral non governmental organization whose mission is to ensure the rights of people to security, dignity and equity in cyberspace.  The Institute works in close collaboration with relevant partners to reduce the harms from cyberattacks on people’s lives worldwide.  By analyzing cyberattacks, the Institute exposes their societal impact, how international laws and norms are being violated, and advances responsible behaviour to enforce cyberpeace.

Back to Top

CynergisTek

CynergisTek is a top-ranked cybersecurity firm dedicated to serving needs of the healthcare industry. CynergisTek offers specialized services and solutions to help organizations achieve privacy, security, and compliance goals. The company has served as a partner to hundreds of healthcare organizations and is dedicated to supporting and educating the industry. CynergisTek has been recognized by KLAS in the 2016 and 2018 Cybersecurity reports as a top-performing firm in healthcare cybersecurity, as well as 2017 Best in KLAS for Cybersecurity Advisory Services. CynergisTek was awarded Top Healthcare Cybersecurity Consults in Black Book IT Advisory outcomes Survey in 2019.

Back to Top

Cyware

Cyware helps enterprise cybersecurity teams build platform-agnostic virtual cyber fusion centers. Cyware is transforming security operations by delivering the cybersecurity industry’s only Virtual Cyber Fusion Center Platform with next-generation SOAR (security orchestration, automation, and response) technology. Built on innovation designed by SecOps practitioners and cybersecurity leaders, Cyware offers multiple technologies within its next-generation platform, including advanced threat intelligence solutions (TIP) for large and small security teams, vendor-agnostic security automation (SOAR), and security case management. As a result, organizations can increase speed and accuracy while reducing costs and analyst burnout. Cyware’s Virtual Cyber Fusion solutions make secure collaboration, information sharing, and enhanced threat visibility a reality for enterprises, sharing communities (ISAC/ISAO), MSSPs, and government agencies of all sizes and needs.

Back to Top

Duo Security at Cisco

Duo Security, now part of Cisco, is the leading multi-factor authentication (MFA) and Secure Access provider. Duo comprises a key pillar of Cisco Secure’s Zero Trust offering, the most comprehensive approach to securing access across IT applications and environments, from any user, device, and location. Duo is a trusted partner to more than 25,000 customers globally, including Dresser-Rand, Etsy, Facebook, Paramount Pictures, Random House, Zillow and more. Founded in Ann Arbor, Michigan, Duo has offices in growing hubs in Austin, Texas; San Francisco, California; and London. Visit Duo.com to find out more.

Cisco (NASDAQ: CSCO) is the worldwide leader in technology that powers the Internet. Cisco inspires new possibilities by reimagining your applications, securing your data, transforming your infrastructure, and empowering your teams for a global and inclusive future. Discover more on The Network and follow us on Twitter at @Cisco.

Back to Top

EclecticIQ

EclecticIQ is a global provider of threat intelligence, hunting and response technology and services. 

Stay ahead of rapidly evolving threats and outmaneuver your adversaries by embedding Intelligence at the core™ of your cyberdefenses with our open and extensible cybersecurity platform and ecosystem. 

The most targeted organizations in the world – including governments and large enterprises – use our platform to operationalize threat intelligence, enable threat hunting, detection and response, and accelerate collaboration. 

Founded in 2014, EclecticIQ is a leading European cybersecurity vendor operating worldwide with offices and teams across Europe and UK, North America, India and via value-add partners. www.eclecticiq.com

Back to Top

FireCompass

FireCompass is a SaaS platform for Continuous Automated Red Teaming (CART) & Attack Surface Management (ASM). It continuously indexes and monitors the deep, dark & surface web to map out an organization’s digital attack surface including Shadow IT blind spots. The platform then automatically launches safe multi-stage attacks, mimicking a real attacker, to help identify attack paths before hackers do. The platform eliminates the need for multiple tools and significant manual effort while providing continuous and proactive security. The product is being used by the top 3 telecom companies, top 3 IT companies, major banks/financial services companies, and others spanning multiple industries.

 

Back to Top

Flashpoint

Flashpoint delivers Business Risk Intelligence (BRI) that empowers organizations worldwide to combat threats and adversaries.

Fueled by a combination of sophisticated technology, advanced data collections, and human-powered analysis, Flashpoint tailors its offerings to customer requirements.

The result is meaningful intelligence that enables large enterprises and the public sector to bolster cybersecurity, confront fraud, combat insider threats, enhance physical security, and address vendor risk and supply chain integrity.

Back to Top

Forescout

Forescout is the leader in Enterprise of Things security, offering a holistic platform that continuously identifies, segments and enforces compliance of every connected thing across any heterogeneous network. The Forescout platform is the most widely deployed, scalable, enterprise-class solution for agentless device visibility and control. It deploys quickly on your existing infrastructure –without requiring agents, upgrades or 802.1X authentication. Fortune 1000 companies and government organizations trust Forescout to reduce the risk of business disruption from security incidents or breaches, ensure and demonstrate security compliance and increase security operations productivity.

Don’t just see it. Secure it. Visit forescout.com to learn how Forescout provides active defense for the Enterprise of Things.

Back to Top

Fortinet

Fortinet Healthcare provides top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Our unique security fabric combines security processors, an intuitive operating system, and applied threat intelligence to deliver broad protection and visibility to every network segment, device, and appliance, whether virtual, in the cloud, or on-premises. Security resources automatically synchronize to enforce policies, coordinate automated responses to threats, and easily manage different security solutions and products through a single console.  healthcare@Fortinet.com

Back to Top

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer. Our platform is the industry standard for hacker-powered security. We partner with the global hacker community to surface the most relevant security issues of our customers before they can be exploited by criminals. HackerOne is headquartered in San Francisco with offices in London, New York City, Singapore, and the Netherlands. Investors include Benchmark, New Enterprise Associates, Dragoneer Investments, and EQT Ventures.

Back to Top

HYPR

HYPR is the leading provider of True Passwordless Security™

Backed by Comcast, Mastercard, and Samsung, HYPR is the first authentication platform designed to eliminate passwords and shared secrets across the enterprise. With HYPR, businesses are finally able to deploy Desktop MFA and Strong Customer Authentication to millions of users worldwide.

Eliminate The Target.

Back to Top

Imprivata

Imprivata®, the healthcare IT security company, provides healthcare organizations globally with a security and identity platform that delivers ubiquitous access, positive identity management, and multifactor authentication.  

Imprivata enables healthcare securely by establishing trust between people, technology, and information to address critical compliance and security challenges while improving productivity and the patient experience. 

For more information, please visit www.imprivata.com.

Back to Top

Irdeto

Irdeto is the world leader in digital platform security, protecting platforms and applications for video entertainment, video games, connected transport and IoT connected industries. Irdeto’s solutions and services enable customers to protect their revenue, create new offerings and fight cybercrime. With 50 years of expertise in security, Irdeto’s software security technology and cyberservices protect over 5 billion devices and applications for some of the world’s best-known brands. With a unique heritage in security innovation, Irdeto is the well-established and reliable partner to build a secure future where people can embrace connectivity without fear. Please visit Irdeto at www.irdeto.com.

Back to Top

Level Nine

Level Nine is an exclusive healthcare cybersecurity service provider with a reputation for elite cybersecurity professionals and dedication to product security. Our selective client list enables us to form deep relationships that drive unrivaled quality and expertise through an intimate understanding of their business. Our services are integral components of some of the largest healthcare products. Our success is measured by the success of our clients’ products. We empower clients to take full ownership of our efforts and improve their product under their brand, not ours.

Back to Top

Medigate

Medigate’s comprehensive and accurate device discovery capabilities combined with clinical-contextual anomaly detection enables automated, rule-based, clinically-driven security policies that keeps clinical networks and patients safe. 

Back to Top

MedSec

MedSec is the exclusively to the unique challenge of medical device and healthcare cybersecurity. MedSec partners with medical device manufacturers and healthcare delivery organizations to help address cybersecurity in medical devices throughout all stage of the device lifecycle. With medical device manufacturers MedSec leverages its cybersecurity expertise, coupled with its intimate knowledge of the healthcare regulatory and operating environments to offer support in design, architecture, verification, penetration testing, risk assessments, regulatory filings, and execution of security best practices in the development of new medical devices as well legacy systems. With Healthcare Delivery Organizations MedSec leverages its intimate knowledge of medical devices to offer software solutions for cybersecurity and asset management of connected medical devices in hospitals. MedSec is an active participant in helping move the cybersecurity healthcare community forward, and participates in a number of standards and best practice committees involved in furthering cybersecurity for medical products.

Back to Top

NETSCOUT

NETSCOUT SYSTEMS, INC. assures digital business services against disruptions in availability, performance, and security. Our market and technology leadership stems from combining our patented smart data technology with smart analytics. We provide real-time, pervasive visibility, and insights customers need to accelerate, and secure their digital transformation. Our approach transforms the way organizations plan, deliver, integrate, test, and deploy services and applications.

Our mission is protecting the global leaders of industry from the risks of disruption, allowing them to solve their most challenging network performance and security problems, ensuring the connected world runs safely and smoothly.

Back to Top

Obsidian Security

Obsidian Security is the first truly comprehensive security and compliance solution built for SaaS. Obsidian analyzes state and activity data across business-critical applications to help manage privileges, optimize configurations, and identify compromised accounts and insider threats. By pairing a deep understanding of each application with proprietary machine learning models, Obsidian delivers value in minutes without agents to deploy or custom rules to write. Obsidian goes beyond alerts, providing actionable recommendations for security teams and detailing the exact impact of each change in customer environments. The company is led by industry veterans from cybersecurity and enterprise software and is backed by Greylock Partners, GV, Norwest Venture Partners, and Wing.

Back to Top

Palo Alto

We ensure each day is safer and more secure than the one before. – Every day we work to anticipate, intercept, and deflect a world of threats—your cybersecurity partner of choice, protecting our digital way of life.

We innovate relentlessly – Automation and machine learning are creating new possibilities in threat prediction and prevention, and we are harnessing our vast amounts of data to provide the most comprehensive security platform available.

Trusted today, prepared for tomorrow. – We are enabling businesses to transition to the cloud without fear, while our pioneering next-generation firewall helps tens of thousands of organizations protect billions of people worldwide.

 

Back to Top

Proofpoint

Proofpoint, Inc (NASDAQ: PFPT) is a leading cybersecurity company that provides health institutions protection and visibility for their greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps healthcare stop targeted threats, safeguard their data, and make their users more resilient against cyberattacks. We help stop threats before they reach staff, safeguard data, and ultimately help healthcare protect patients from cyber attacks. Leading healthcare organizations of all sizes, including more than two-thirds of the Fortune 1000 healthcare institutions, rely on Proofpoint to prevent, detect, and respond to their most critical security before they cause lasting harm. More information is available at www.proofpoint.com.

Back to Top

QOMPLX

Your business is more complex than ever. You need tools to tame that complexity. Unfortunately, many products produce more noise than signal. At QOMPLX, we are experts in building high-speed, highly-scaled event processing solutions. Our technology integrates all of your critical data sources to allow you to make better, more data-driven decisions. QOMPLX’s advanced algorithms, simulations, and machine learning tools help the world’s most demanding firms solve the toughest challenges in cyber security, insurance underwriting and finance. Find out what QOMPLX can do for you.

Back to Top

Recorded Future

Recorded Future delivers security intelligence to amplify the effectiveness of security and IT teams in reducing exposure by uncovering unknown threats and informing better, faster decisions. Working to provide a singular view of digital, brand, and third-party risk, the Recorded Future Platform provides proactive and predictive intelligence, analyzing data from open, proprietary, and aggregated customer-provided sources. Recorded Future arms threat analysts, vulnerability management teams, security operations centers, and incident responders with context-rich, actionable intelligence in real time that’s ready for integration across the security ecosystem. Learn more at www.recordedfuture.com and follow us on Twitter at @RecordedFuture.

Back to Top

RiskIQ

RiskIQ is the leader in attack surface management, providing the most comprehensive internet intelligence that enables organizations to discover unknowns and investigate threats across its digital presence. With a spike in attacks against healthcare organizations, visibility into unknown, unprotected, misconfigured, and unmonitored digital assets is imperative. RiskIQ’s platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand digital attack surfaces, assess risk, and protect the business, brand, and customers.

Back to Top

RiskRecon

RiskRecon, a Mastercard company, delivers the world’s easiest path to understanding and acting on third-party cyber risk. RiskRecon provides security and risk teams with AI-powered, continuous monitoring capabilities so companies of any size can know their cybersecurity posture through automated risk assessments that are custom-tuned to match an organization’s risk appetite.

With a 98.5% accuracy rate, RiskRecon offers the only solution in the cybersecurity risk ratings market that delivers risk-prioritized action plans specifically so teams can achieve dramatically better risk outcomes as they scale third-party risk management programs.

Built by practitioners for practitioners, RiskRecon offers solutions for organizations of any size, in any industry, worldwide, to prevent the multi-party data loss events from impacting customers and their growing ecosystem of third and fourth parties.

Back to Top

SafeBreach

SafeBreach is the leader in Breach and Attack Simulation. The company’s groundbreaking platform provides a “hacker’s view” of an enterprise’s security posture to proactively predict attacks, validate security controls and improve SOC analyst response. SafeBreach automatically executes thousands of breach methods from an extensive and growing Hacker’s Playbook™ of research and real-world investigative data. Headquartered in Sunnyvale, California, the company is funded by Sequoia Capital, Deutsche Telekom Capital Partners, Draper Nexus, Hewlett Packard Pathfinder, PayPal, and investor Shlomo Kramer. For more information, visit www.safebreach.com or follow on Twitter @SafeBreach.

Back to Top

Tanium

Tanium provides endpoint management and security built for the world’s most demanding IT environments. Our breakthrough approach decentralizes data collection, aggregation and distribution down to the endpoint, dramatically reducing direct client-to-server communications to deliver real-time visibility, comprehensive control and rapid response. This is why the world’s most sophisticated organizations –– including nearly half of the Fortune 100, multiple branches of the US Armed Forces, and over 70 percent of top retailers and financial institutions –– trust Tanium to help them confidently manage performance, detect and respond to threats, and ensure compliance across their operations. Learn more at www.tanium.com.

Back to Top

Team Cymru

Since 2005, Team Cymru’s mission has been to save and improve human lives by working with public and private sector analyst teams, enabling them to track and take down threat actors, criminals, terrorists and human traffickers around the globe. The company delivers comprehensive visibility into global cyber threat activity and is a key source of intelligence for many cyber security and threat intelligence vendors. The company’s Community Services division provides no cost threat detection and intelligence to network operators, hosting providers and more than 130 CSIRT teams across 86+ countries. Enterprise security analysts rely on its Pure Signal™ threat intelligence platform for on-demand access to global internet traffic telemetry, which allows them to see what’s happening virtually anywhere across the internet with a clarity similar to that of their own internal network telemetry. With this visibility, they close detection gaps, accelerate incident response, and get ahead of critical, recurring threats – mapping and monitoring threat infrastructures around the world and blocking attacks before they are launched. For more information visit https://team-cymru.com/.

Back to Top

TruStar Technology

The highest-fidelity intelligence is what’s already captured within the four walls of your organization. TruSTAR breaks down silos across tools and teams to surface the most relevant data, helping you speed investigation and response times.

At TruSTAR, we’re obsessed with getting the most value from your threat intelligence data. We believe that when analysts can integrate threat intelligence data into every stage of their workflow, they can make better decisions faster.

Founded in 2014 by a mix of seasoned entrepreneurs, former security and intelligence specialists, and killer product developers, TruSTAR is focused on building the best threat intelligence platform for enterprise cybersecurity.

Back to Top

VisibleRisk

VisibleRisk provides a board and C-suite level cyber security risk rating and report that evaluates the quality of various aspects of your Company’s cyber security preparedness. The business focused rating ranks and benchmarks your Company against a relevant peer group, based on industry, size, geography, and other factors. The platform utilizes proprietary and confidential technology, methodologies, and algorithms developed by VisibleRisk to holistically assess an organization. VisibleRisk is backed by two global leaders in related fields: Moody’s Corporation, a leading provider of credit ratings, research, and risk analysis, and Team8, a prominent cybersecurity-focused company creation platform.

Back to Top

World Wide Technology

World Wide Technology (WWT) is a $15B global re-seller with a $1 billion dollar Global Security Practice focused on enabling Transformation in large enterprises.  This practice brings leading experts in the security industry and a $500M Advanced Technology Center together to help enterprises plan, design, and execute their security transformation initiatives – from idea to secure business outcome.  WWT’s Global Security practice spans Cloud, Zero Trust, IT, OT, IoT and industrial security and supports many of the largest healthcare and life sciences enterprises on their security transformation journey.

Back to Top

Translate »