Meet the Awards Finalists for Innovative Tech: Security

0
95

The MassTLC Leadership Awards recognize and honor “the best and the brightest” of the Massachusetts tech ecosystem each year. On July 18, after months of nominations and judging, the finalists in each of fifteen different categories were announced (learn more about the selection process, here).

Who will be crowned the winners? Find out on October 3, 2018, at the 21st annual Mass Tech Leadership Awards Gala.

In the meantime, let us introduce you to our finalists and the great work that they are doing here in Massachusetts.

In the words of their nominators, meet the 2018 Innovative Tech of the Year: Security finalists.

Appsulate for Appsulate

Appsulate is a shield around web applications that protects from data leakage when third parties or remote employees need to access  web apps. Users access web applications through a secure, auditable workspace where only pixels are sent to the browser and no data can stay behind.

Appsulate enables access to web applications from any device and makes sure that no confidential or regulated data can stay behind. It is fully browser-based and doesn’t require any installation or infrastructure.

Appsulate delivers “last-mile-security” at lower complexity and cost and has the potential to disrupt the $7B+ virtual desktop market. As companies move into the cloud and deploy SaaS apps they need security more than ever – but don’t want to deploy expensive and cumbersome legacy solutions.

 

Edgewise for Edgewise

Edgewise verifies the identity of applications before allowing them to communicate and automatically builds policies to enforce least-privilege access.

While most network security tools are predicated on addresses, ports, and protocols, Edgewise’s Zero Trust product builds security policy on secure application identities, allowing for a 98% reduction in attack surface within the network.

Security operations professionals gain visibility into the communications patterns of their applications, as well as, machine learning-suggested policies to protect them, simplifying cloud security dramatically.

 

IBM Resilient for IBM Resilient

Intelligent Orchestration dramatically accelerates and sharpens security incident response by seamlessly combining incident case management, orchestration, automation, and intelligence into a single platform.

Man plus machine is the key to Intelligent Orchestration’s powerful effect. Intelligent Orchestration combines artificial intelligence with human context, enabling faster and more accurate decision making in the incident response process. It also codifies and unlocks human intelligence across the organization into playbooks for repeatability.

Each level of the security teams benefits greatly from the power of Intelligent Orchestration. Whether it is integrating their existing security tools to automate repeatable tasks, or improving their security processes before, during and after a security incident, each phase of the process is improved. Also, each level benefits from the combination of human decision making and intelligence with the speed and smarts of AI.

Mimecast for Mimecast Targeted Threat Protection

Mimecast Email Security with Targeted Threat Protection uses multiple, sophisticated, detection engines and a diverse set of threat intelligence sources to protect email from malware, spam, phishing, and targeted attacks delivered as a 100% cloud-based service.

Email is the number-one application used to communicate within business and often contain sensitive information. It’s also the number-one vector for cyberattacks. Mimecast Targeted Threat Protection is the most comprehensive cloud-based email security solution in the market.

With Targeted Threat Protection, organizations can secure emails in the most innovative and advanced way and provide the benefit of easy data recovery and archiving if, and when, systems go down or experience an attack.

 

ThreatStack for Threat Stack Cloud SecOps

The Threat Stack Cloud SecOps Program provides visibility into cloud infrastructure. Threat Stack provides the expertise needed to integrate Security and Operations — without recruiting hard-to-find talent or struggling to interpret data from multiple solutions.

Instead of simply offering another security solution that needs to be implemented and actively managed, Threat Stack helps customers close the cybersecurity skills gap by offering the expertise needed to integrate security and operations – without recruiting hard-to-find talent or struggling to integrate and interpret data from multiple point solutions.

Threat Stack customers harness the power of the Threat Stack Cloud Security Platform to gain wide and deep visibility. The Threat Stack Cloud SecOps Program enables businesses of all sizes to continue focusing on their core business without needing to hire, train and retain highly sought after security talent.