The Top 25 Cybersecurity Companies of 2019

The 2019 Top 25 Cybersecurity companies are pleased to announce in the tech survey. We have earned hundreds of nominations from cybersecurity practitioners over the past two months. They offered candid input on, among other items, the strength of each company’s technology, operational calibre, the productivity of the management team and the ability to keep up with recent cybersecurity challenges.
We have selected those with the highest results after a thorough analysis of the nomination survey of each organization. We concentrated especially on those who displayed consistency in all areas of results. This year’s best in cybersecurity are the following company awards.

For weekly software business news, sign up for our free email newsletter.

1. Crowdstrike
Category: Endpoint Security
Location: Sunnyvale, California

Founded in 2011, CrowdStrike was borne out of the realization that existing security solutions on the market weren’t enough to combat the sophisticated hackers that were infiltrating some of the nation’s largest and well-known corporations. Co-founders George Kurtz and Dmitri Alperovitch made a bet that marrying advanced endpoint protection with intelligence would be a better way to identify the perpetrators behind the attacks. And that bet has paid off. Today CrowdStrike is a premier cyber security company with presence in the U.S., Europe, and India. It employs about 2,000 and counts ADP, Rackspace, and Hyatt among its clients. The company provides security services to 12 of the 20 Fortune largest global companies, ten of the 20 largest financial institutions and five of the top ten largest healthcare provides. It’s also a leading cybersecurity provider for the energy market.

CrowdStrike CEO Kurtz, a serial entrepreneur, is an internationally recognized cybersecurity expert, holding executive roles at McAfee before creating CrowdStrike with Alperovitch. His company was also who the Democratic National Committee turned to when it suspected it was hacked during the run-up to the 2016 election. CrowdStrike’s IPO occurred in June of 2019.

Cybercriminals Advance Tactics, CrowdStrike Keeps Pace

CrowdStrike’s IPO A Stunning Success, $10 Billion Valuation And Rising

2. Gigamon
Category: Network Security
Location: Santa Clara, California

Gigamon has sustained its position as a leader in network visibility and analytics for digital applications and services for years. And their role in the cybersecurity landscape has been strengthened by their unshakeable sense of urgency. “Time is everything for threat response and responders,” says Josh Carlson, Vice President and INSIGHT General Manager at Gigamon.

The network visibility and traffic monitoring company, which supports digital apps and services across physical, virtual and cloud infrastructures, has been deployed in 80% of Fortune 100 companies. Since its acquisition by Elliott Management, the California-based company has focused on empowering organizations, helping them to run efficiently, stay secure, and innovate. Their unique Visibility FabricTM and GigaSECURE® technology are touted as the industry’s first security delivery platform created to operate government and service provider networks more efficiently.

Under the watchful eye of CEO, Paul Hooper, in 2019 Gigamon improved their solution suite with Application Intelligence, a framework that offers complete network visibility of a digital enterprise with insight into over 3000 applications. Since its inception in 2004, Gigamon has become one of the sector’s most trusted voices in network security.

3. Fortinet
Category: Cybersecurity Software, Services
Location: Sunnyvale, California

Founded back in 2000, Fortinet’s mission has long been to deliver security products and services across the entire information technology infrastructure. The company develops cybersecurity software including firewalls, anti-virus, intrusion detection and protection, and endpoint security. To meet that end it relies on its Security Processors, which is a security-focused operating system and applied threat intelligence to give customers enhanced security and better visibility into where threats are coming from. FortiGate is its flagship firewall platform that provides next-generation security and networking functionality. Fortinet is tasked with protecting companies networks, clouds, web applications and emails. It also offers advanced threat protection, secure unified access, and endpoint security.

The publicly traded company since November 2009, was founded by Ken Xie, the founder and former CEO of NetScreen and boasts a market capitalization of more than $17 billion. It has more than 6,000 employees across the globe and posted $1.8 billion in revenue for all of 2018.

Fortinet Acquires Cybersecurity Automation Platform CyerSponse for SOAR Capabilities

Fortinet CEO Xie Is Ready for Network Security Growth

4. Infoblox
Category: Network Security
Location: Santa Clara, California

Infoblox, the leader in Secure Cloud-Managed Network Services has undergone a remarkable business transformation over the last year. For two decades, the company has been helping customers secure their networks, including Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), and IP address management (IPAM), collectively known as DDI.

In 2019 which coincides with their twentieth anniversary, the company evolved from a network control pioneer to a next-level networking leader. They also unveiled, BloxOne Threat Defense their simplified security platform to detect and stop cyber threats. The cloud-native platform which identifies and alleviates network security breaches works with an organization’s existing security stack to secure the ever-evolving nature of networks. This utilizes Infoblox’s pioneering use of DDI, leveraging data generated to automatically monitor network traffic, proactively identify threats, and quickly inform security systems and network managers of breaches. DDI isn’t just a core network service, but a critical part of an organization’s security infrastructure as well.

Notably, Infoblox has more than 8,000 customers around the world and nearly 60% of the Fortune 2000 count the company as their provider of choice.

5. BlackBerry
Category: Secure End-to-End Mobility
Location: Waterloo, Ontario

It’s been a long time since BlackBerry was known as the handheld device icon. These days it’s doing a brisk business in the cybersecurity market, inking a $1.4 billion acquisition of Cylance last year to further its goal to become the leader in providing end-to-end mobility services that are secure and trusted. The Waterloo, Ontario -based security company focuses on securing and managing Internet of Things endpoints. It boasts 37,500 patents, invests 23% of its revenue in research and development and counts all seven of the G7 governments as customers as well as all of the ten largest commercial banks and ten of the world’s largest insurance companies, among others.

Ever since current Chairman and Chief Executive John Chen took on the role of CEO back in November of 2013, Blackberry has been transitioning from a hardware icon to a mobile security player. Thanks to Chen’s vision and focus, the Blackberry of today has little to do with handheld devices and everything to do with becoming a leader in securing and accelerating the growth of the Enterprise of Things marketplace.

Blackberry Impresses With Auto Market Penetration

Blackberry’s Healthcare Lead: Industry Hacks Only Going To Get Worse

6. Palo Alto Networks
Category: Cybersecurity Software, Services
Location: Santa Clara, California

Founded in 2005, Santa Clara, California-based Palo Alto Networks is a global cybersecurity company serving more than 54,000 customers across roughly 150 countries. Its advanced firewalls and cloud-based security products are used by more than 85 of the Fortune 100 companies and 63% of the Global 2000. The company, which went public in July of 2012 employs over 7,000 worldwide and has a market capitalization of $22 billion.

Palo Alto Network’s core Security Operating Platform helps keep hackers out by utilizing analytics to automate routine tasks and enforcement, simplifying security so customers can focus on securing users, applications and data. Through the Security Operating Platform threat identification and enforcement across the cloud, network and endpoints is automated, blocking ransomware, malware and fileless attacks. The platform is optimized for a bevy of industries be it financial services or healthcare. The global cybersecurity company also provides cloud security, advanced firewall, endpoint protection and threat detection and prevention. The company underwent a management change in 2018, with new chairman and chief executive Nikesh Arora coming on board. He came from SoftBank, where he was president and chief operating officer. Prior to that, he held a number of positions at Google.

Palo Alto Networks CEO Challenges the Status Quo

Palo Alto Networks Fortifies Cybersecurity Offering With PureSec, Twistlock Acquisitions

Palo Alto Networks Acquires Demisto

7. A-LIGN
Category: Information Security and Cyber Risk Advisory
Location: Tampa, Florida

Founded in 2009 by CEO Scott Price, today cybersecurity and privacy compliance solutions provider, A-LIGN boasts over 300 employees and 2,300 clients worldwide.

Ever-evolving regulations concerning security and data privacy are driving growth at the company. As businesses become increasingly concerned about the regulatory fines that come with noncompliance, A-LIGN has been able to assist and accommodate companies on how to navigate the complexities of regulatory and business-driven security. Taking a consultative approach the company works with, educates, and creates solutions with each client. It’s a novel approach in an industry where there are lots of products to address a growing number of threats.

One of only a few globally recognized cybersecurity and privacy solutions providers that offer a single-provider approach for organizations, A-LIGN has the ability to work with small businesses all the way up to the largest global enterprises.

Having slipped under the radar for some time, A-LIGN found itself thrust into the spotlight following a $54.5 million growth equity investment from FTV Capital in July 2018. Since then, the company has experienced rapid growth, including a 74% increase in employees in the last year.

Top Cybersecurity Company A-LIGN Focuses On Innovation To Deliver The Most Advanced Privacy and Security Solutions

8. FireEye
Category: Cybersecurity Software, Services
Location: Milpitas, California

With a mission to relentlessly protect customers from the consequences of cyber attacks, FireEye develops security software and services that are aimed at meeting the rapidly changing cybersecurity environment where evolving cyber crimes are creating gaps that can be exploited. FireEye offers a host of solutions for companies including its flagship Helix Security Operations Platform that applies threat intelligence, automation and case management on a security operations platform. Its network security and forensics services provides companies with network visibility and protection against cyber attacks through comprehensive endpoint defense. It protects users from common threats while detecting more sophisticated ones. FireEye’s solutions also detect email-based cyber attacks and block the most dangerous email attacks such as phishing attempts and malicious attachments, among other services.

FireEye was founded in In 2004 and went public on the Nasdaq on September 20, 2013. The company had 2018 revenue of $831 million, up from $161.56 million in 2013, a recent market capitalization of $3.5 billion and more than 3,000 employees.

FireEye Stays On Pace With Latest Cybersecurity Offering and Partnership

Acquisitions Critical to FireEye Growth Strategy, Verodin is Latest

9. Zimperium
Category: Mobile Security
Location: Dallas, Texas

Zimperium, the global leader in mobile device and app security, offers real-time, on-device protection against Android and iOS threats. With mobile devices the de facto platform for productivity in business, containing all of the information of a traditional endpoint (e.g., desktops and laptops), organizations are beginning to understand these devices are an unprotected endpoint.

The Zimperium platform leverages an award-winning machine learning-based engine to protect mobile data, apps and sessions against device compromises, network attacks, phishing attempts and malicious apps. To date, z9 has detected 100% of zero-day device exploits in the wild without requiring an update or suffering from the delays and limitations of cloud-based detection – something no other mobile security provider can claim.

The Dallas-based firm, founded in 2010, announced this year it was selected by Google to be a founding member of its App Defense Alliance to help ensure the safety of the Google Play Store.

10. Deep Instinct
Category: Deep Learning Cybersecurity
Location: New York, New York

Founded in 2015, cybersecurity pioneers Deep Instinct hasn’t just experienced rapid growth but also boasts clients such as HP and Tech Data.

The New York-founded firm prides itself on being “the first deep learning cybersecurity company,” providing a zero-time threat prevention platform for organizations to protect themselves against zero-day threats and APT attacks. By fundamentally shifting the approach to cybersecurity from reactive to a proactive methodology, Deep Instinct automatically analyzes files and vectors to keep them protected in what they call, “a threat landscape.”

Armed with unmatched accuracy and speed, the firm’s ultimate goal is to eradicate cyber threats as well as evasive known and unknown malware attacks. Their comprehensive “deep learning” solution provides protection across endpoints, networks, servers, and mobile devices, and it can be applied to most OSs and files of any type.

This year, the company exposed one of the largest data breaches in the last decade. More than 250 million government, corporate and private users were impacted by nefarious malware, TrickBooster, which was stealing sensitive financial data.

Led by a highly experienced and interdisciplinary team of deep learning scientists and Ex-IDF Intelligence cyber units, this combined force is transforming the cybersecurity sector every day.

11. White Ops
Category: Bot Mitigation
Location: New York, New York

White Ops, the global leader in bot mitigation, ad verification, and cybersecurity, protects more than 200 enterprises worldwide.

Founded in 2012 in a Brooklyn sci-fi bookstore, the security firm detects, prevents and outwits bot populations of every level of sophistication. The “pro-privacy and pro-human organization” uses privacy-sensitive code to detect bots without tracking humans, which has along the way garnered the trust of some of the biggest companies in the world.

“Sophisticated bots look and act like humans when they visit websites, fill out forms, scrape websites, create or take over accounts and commit payment fraud,” said Tamer Hassan, co-founder and CEO at White Ops. “Our mission is to protect the internet by verifying the humanity of every online interaction and disrupt the economics of cybercrime.”

The company’s White Ops Bot Mitigation Platform has the ability to not only determine the humanity of more than one trillion interactions weekly but protects platforms from fraud, cybercrime, and abuse. This year, Hassan was named the #1 most innovative person in business by Fast Company after his instrumental role in the takedown of the largest botnet crime organization in history, working in collaboration with the FBI, Google, and Facebook. “You can’t play defense. You have to play offense,” he says. “This makes the fight actually winnable.”

12. ThreatQuotient
Category: Threat Management
Location: Reston, Virginia

Leading security operations platform innovator, ThreatQuotient has been celebrated for its ability to help organizations achieve a successful threat management and security operations program. By enabling responsible automation, improved defenses, and overall security efficiency and effectiveness, the provider has achieved widespread industry recognition through multiple award programs, including its CEO and president John Czupak who was named Northern Virginia Technology Council’s (NVTC) 2019 Tech 100 list of top 25 executives.

The North Virginia-based company which was founded in 2013, believes that threat intelligence is the glue that binds together disparate systems and teams, and that a threat-centric security operations platform is vital to overall security. Last year, the company rolled out ThreatQ Investigations which is the only solution in the threat intelligence space that enables siloed security teams to work collaboratively and manage threats effectively. This year, it was announced that the integration of ThreatQ with MITRE, ATT&CK will support PRE-ATT&CK and Mobile Matrices. This facilitates expansive and shared understanding across teams and technologies allowing for speedier responses when a threat has occurred.

Not only has ThreatQuotient addressed the industry demand for greater threat visibility and customer-defined controls, but it’s also found a way to attain a single visual representation of a complete situation.

13. McAfee
Category: Cybersecurity Software, Services
Location: Santa Clara, California

By far one of the most well-known cybersecurity companies in the market, McAfee has been churning out cybersecurity software since its inception in 1987. Today it is a global player in protecting corporate networks and consumers online and when connected to corporate networks.

The Santa Clara, California-based security software company also works with governments around the globe, relying on its McAfee Global Threat Intelligence to keep businesses, governments, and consumers one step ahead of the hackers. On the business front, McAfee’s endpoint and mobile security products protect end-user devices from attacks while its network security products and services protect company servers, databases and data centers. For home users, McAfee provides security software to protect mobile devices and personal computers. Its McAfee Total Protection and McAfee LiveSafe products give consumers access to antivirus and antimalware protection, as well as internet security that includes protection from adware, spyware, phishing scams, malicious websites, identity theft, and other threats.

Container Security Company NanoSec Joins McAfee Family

14. eSentire
Category: Managed Detection and Response
Location: Waterloo, Ontario

eSentire reinvented enterprise network security by focusing on the protection of core assets inside the network using their human-driven, behavior-based solutions.

Notably, they’ve turned the traditional layered security approach on its head by operating on a zero-trust approach, based on the assumption that a network has already been compromised. By detecting behaviors indicative of advanced threats from criminals, nation-states, hacktivists or even those borne of ignorance, eSentire leaves no stone unturned. Using purpose-built, patented technology and processes, their 24x7x365 Security Operations Centers provide multi-signal visibility across on-premises, endpoint, log, cloud and hybrid environments identifying threats that evade a client’s last lines of defense. eSentire is innovating the MDR sector through the application of a proprietary AI methodology and advanced automation to enable experts to solve some of cybersecurity’s biggest challenges.

Protecting more than $5.7 trillion assets under management in the financial sector alone, eSentire relieves companies of the complexity of cybersecurity while delivering enterprise-grade protection and the ability to comply with growing regulatory requirements.

Founded in 2001, the Canadian-based company is now a global leader in Managed Detection and Response (MDR) and boasts 450 employees across offices located in New York City, Seattle, London and Cork, Ireland.

15. Valimail
Category: Email Security
Location: San Francisco, California

One of the only companies in email security to offer a guarantee, San Francisco-based cybersecurity firm Valimail puts its money where its mouth is.

Launched in 2015, Valimail has built an automated cloud-based platform that helps companies establish the authenticity of inbound emails, as well as spotting outbound phishing attacks which are often referred to as BEC (“business email compromise”), where cybercriminals target a company’s customer base with emails that appear to come from one of the company’s employees. The San Francisco-based startup, which has adopted email authentication protocols such as DMARC (“Domain-based Message Authentication, Reporting and Conformance”) as part of its efforts, has claimed some big-name clients, including Uber, Yelp, and WeWork.

Most notably, this year Valimail reported on the vulnerability of the US election infrastructure by analyzing the 187 domains used by election officials in the three largest counties for every state. Finding a lack of DMARC enforcement at both state and local levels, the cybersecurity firm determined a serious problem including vulnerability to spoofed domains, impersonation, and attacks. This year, the company also revealed that at least 3.4 billion fake emails are sent around the world every day.

16. Avast
Category: Business and Consumer Cybersecurity
Location: Prague

Founded in 1988, Avast is the Prague-based multinational cybersecurity juggernaut, that has led the field in computer security software, machine learning, and artificial intelligence.

Using next-gen technologies to fight cyber attacks in real-time, the company’s immense cloud-based machine learning engine works by receiving a constant stream of data from hundreds of millions of users. This facilitates learning and improves its artificial intelligence engine at an unprecedented speed.

Protecting over 435 million people across the world, this year the global leader announced its new IoT security product, Avast Omni, which has been named a Best of Innovation Honoree in the CES 2020 Innovation Awards. What makes Avast Omni such an exciting product is its user-friendly interface, including an app and hardware that plugs into any router to secure all IoT at home. Omni then sends alerts if unusual behavior is detected and blocks access to potential threats.

While Avast may be a veteran of cybersecurity, it continues to adapt and readjust to the ever-changing landscape using machine learning and artificial intelligence technologies to detect and stop threats in real-time.

Adobe Creative Cloud Privacy Breach Affects 7.5 Million Users

17. Coalfire
Category: Cybersecurity Services
Location: Westminster, Colorado

With threats coming seemingly from everywhere, finding the right solution for businesses can be challenging. Coalfire aims to cut through all the noise, providing cyber security advice to private and public sector organizations to help them avert threats, close gaps in security and manage their cybersecurity risk. Coalfire provides independent, tailored advice and services that cover all aspects of cybersecurity. Its services include cyber risk assessment, cyber engineering, compliance services and Internet of Things security assessments. Its services are offered by a team of industry experts that help enterprise organizations get a handle on a wide range of compliance and risk management initiatives.

Founded in 2001, Coalfire is vendor agnostic, enabling it to provide unbiased and actionable advice to its clients. The Westminster, Colorado security consulting company has roughly 700 employees and counts heavy hitters such as Concur, Diebold and Cole Haan as customers. In 2015, The Carlyle Group and The Chertoff Group acquired a majority stake in the company.

18. Verimatrix
Category: Content Security
Location: San Diego, California

Founded in 1999, Verimatrix is a veteran in content security for digital television services across the globe. The trusted provider with over 20 years of experience has serviced some of the world’s leading innovators and largest enterprises. The firm has also maintained excellent relationships with the major Hollywood studios by providing valuable anti-piracy solutions for the fight against rampant digital piracy.

Uniquely positioned to recognize and proactively forecast security and business challenges for customers. Verimatrix provides innovative, customer-friendly resolutions that are cost-effective, easy to deploy and supported with responsive customer service teams based worldwide.

This year the company announced the sale of its Silicon P and Secure Protocols business units to Rambus Inc, strengthening its focus as a software-based security and business intelligence provider.

CSO at Verimatrix Asaf Ashkenazi, also revealed the firm is working to create security that prevents easy access to software and provides the latest possible security measures for the future. “Good code protection makes it difficult to reverse engineer code, alerts to suspicious actions, and prevents unauthorized code execution in the first place.”

19. Sonatype
Category: Open-source Automation
Location: Fulton, Maryland

Based in Fulton, Maryland, Sonatype is a cybersecurity-focused open-source automation company trusted by more than 10 million software developers.

A leader in software supply chain automation technology, the company also scales DevOps through open source governance and software supply chain automation. Recently acquired by Vista Equity Partners, Sonatype announced the acquisition will help to build out its Nexus platform, an enterprise-ready repository manager and library with access to analysis on 65 million open-source components. The platform helps enterprises to keep track of open-source code to ensure software in the DevOps pipeline remains up-to-date with the latest bug and security fixes.

Last year, the company found over dozens of Fortune Global 100 companies that had downloaded outdated and vulnerable versions of Apache Struts, which Equifax failed to patch or update.

Founded in 2008 and run by veteran tech entrepreneur CEO Wayne Jackson, Sonatype grew annual revenue close to 250% over the past three years and counts 60 Fortune 100 companies among customers, including banks, credit card companies, and tech companies. It’s also confirmed that four out of five branches of the U.S. Armed Forces use its products. Sonatype has raised more than $150 million in venture capital and employs 350 people globally.

Wayne “Action” Jackson Sells Third Big Software Company

20. RiskIQ
Category: Internet Surveillance
Location: San Francisco, California

Global leader in attack surface management, RiskIQ is known for its extensive discovery, intelligence, and reduction of threats but it’s their reports of phishing, pyramid schemes, virtual card skimmers, and other digital traps that have caught the media’s attention of late.

Consumers are estimated to spend almost $143 billion throughout the 2019 holiday season, however, RiskIQ has identified almost 1,000 malicious apps and 65 websites using holiday keywords or posing as popular retail to fool people into handing away their personal information.

This is just part and parcel of the San Francisco-based company’s work. Founded in 2009, RiskIQ allows businesses and enterprises insight into and control over web, social and mobile platforms and how they can be compromised.

The cybersecurity firm is trusted by everyone from security analysts and security teams to CISO’s. Last year, the company announced major updates and enhancements to its Digital Footprint product to strengthen defenses and educate organizations to their exposure and risks. Their unique combination of advanced internet data surveillance and analytics expedites investigations, understands digital attack surfaces, assess risk and takes action to protect the business, brand, and customers.

21. Carbon Black
Category: Endpoint Security
Location: Waltham, Massachusetts

With mobile and cloud computing growing in popularity, the endpoint has become the new ground zero for hackers and security professionals. With new and emerging attacks getting past existing cybersecurity defenses, security companies protecting endpoints have to constantly evolve. Carbon Black, the newly public endpoint security company, is using big data and analytics to fight back. With the Waltham, Mass.-based endpoint security company’s CB Predictive Security Cloud platform, it is able to deliver a new generation of cloud-based security solutions to businesses that can protect against advanced threats. The cloud platform applies big data analytics across all endpoints within an organization and makes predictions, providing protection for current and future attacks.

Carbon Black, which had its initial public offering in May of 2018, was subsequently acquired by VMware in October of 2019. It has about 800 employees, managing more than 13 million endpoints for its roughly 6,000 customers which include 30 of the Fortune 100 companies. Its Chief Executive Patrick Morley has led Carbon Black since 2007, growing the company from a startup to one of the leaders in next-generation endpoint security.

Carbon Black: Endpoint Security Software Leader Charges to IPO

22. ThreatConnect
Category: Security Orchestration
Location: Arlington, Virginia

Ballston-based cybersecurity company, ThreatConnect uses multi-environment orchestration, Playbooks, automation, and apps to provide a unified view into the security stack. Companies that use ThreatConnect Playbooks have actually seen a 50% reduction in analyst burden in the first year.

In fact, the company which was designed by analysts is designed for the entire team, from security operations and threat intelligence to incident response and security leadership. ThreatConnect’s intelligence-driven security operations platform brings together a novel combination of intelligence, automation, analytics, and workflows in a single platform. It also empowers companies to pinpoint redundant security subscriptions.

Using simple interfaces, like drag and drop capabilities and a logical process, the ease of ThreatConnect’s out-of-the-box support integrations makes its idiosyncratic Playbooks software a unique option.

Over time as the cyber solutions market has grown and increasingly become more competitive, ThreatConnect has adapted to stay at the top of its game. “We have had the same vision since we released the first version of the ThreatConnect Platform in 2013,” says CEO and Co-Founder Adam Vincent. “We were a step ahead of the market then, and I feel we are still in front of the market today.

23. Siemplify
Category: Security Orchestration
Location: New York, New York

Founded by Amos Stern, Alon Cohen and Garry Fatakhov, New York startup, Siemplify is the leading independent provider of security orchestration, automation and response (SOAR).

Touted for redefining security operations for enterprises and MSSPs worldwide, 2019 has been pivotal to the company, who announced in September a new patent related to its ability to group and connect cybersecurity events.

Siemplify’s proprietary method allows for the transformation of alert output in a structured and actionable way, allowing analysts to make faster decisions when tracking investigations from start to finish. Built into its Security Operations Platform, it’s an instinctive suite that facilitates security teams to conduct operations, react to cyber threats with agility and accuracy as well as become smarter with every interaction. The company also announced this year it now delivers an integration to the MITRE ATT&CK framework. Integrating the globally accessible playbook of adversary tactics and techniques into its framework will no doubt strengthen the firm’s incident response.

Founded in 2015 by Israeli Intelligence experts, the company is bolstered by extensive experience in running and training security operations centers worldwide. Having raised a total of $58 million, Siemplify is a burgeoning force in cybersecurity.

24. Netscout
Category: Business Assurance Services
Location: Westford, Massachusetts

Companies looking for more than cybersecurity out of their partners have been turning to Netscout for years, relying on the business assurance company to provide cybersecurity and business intelligence services that not only protect a corporate network but unlocks the power of a company’s data. Its product portfolio covers it all from the enterprise to the service provider environment, providing companies with visibility, security, performance and usage insight by unlocking all of their data. That, in turn, enables the customer to deliver service that is uninterrupted and secure. Netscout offers products that cover service assurance, troubleshooting, diagnostics, and business analytics, designed to provide end-to-end visibility of physical and virtual environments as well as speed up the time it takes to resolve issues and deliver actionable intelligence.

Headquartered in Westford, Mass., publicly traded Netscout, which was founded in 1984 and went public in 1999, has approximately 2,100 employees, $910 million revenue for its fiscal year 2019 and a market capitalization of $1.8 billion.

25. Pulse Secure
Category: Network Security
Location: San Jose, California

A leader in software-defined Secure Access solutions, Pulse Secure provides easy-to-use and comprehensive solutions for SSL VPN software.

Formed in 2014 from Juniper Networks’ Junos Pulse business, the San Jose-based company uniquely integrates cloud, mobile, application, and network access to enable hybrid IT. Yet, it’s their bottom line that sets Pulse Secure above the rest: keeping hackers from infiltrating corporate networks.

Pulse Secure’s scalable solution for application-level security, both for off-the-shelf solutions and complex custom applications, Virtual Web Application Firewall (vWAF), provides unprecedented scale and flexibility to enhance the performance and security of applications across the widest range of environments, from physical and virtual data centers to public and hybrid cloud. vWAF’s most prominent feature is its automated learning aptitude, which can make policy recommendations by learning about application behavior, making it easier for security teams to maintain policies.

Servicing over 23,000 enterprises and service providers, Pulse Secure has empowered businesses of every size to securely access and applications while ensuring business compliance.

Leave a Comment

Your email address will not be published. Required fields are marked *