AT PRESENT, there are something like 100,000 vendors globally, according to Forrester analyst Jay McBain. Software vendors, that is. Add in hardware makers, and you’ve got yourself a mound of potential technology partners bigger than any channel pro can even possibly sort through on his or her own.
Why not let us do some of the sorting for you, then? Here once again is our annual list of up-and-coming, underappreciated, and emerging vendors. There are many others out there, but we think you’ll find this batch especially worth the introduction.
Attivo Networks Inc.
Job No. 1 for any provider of security services is to keep bad guys out of customer environments. When those efforts fail—and they will eventually, no matter how good you are—Job No. 2 is spotting the breach and mitigating its effects.
That’s where Attivo Networks aims to help. In a new spin on the threat detection and response products businesses increasingly use to undo the effects of successful attacks, Attivo makes a threat deception and response solution that employs various kinds of decoys and lures to fool intruders into exposing their presence inside the firewall. Preassembled incident response processes can then kick in to implement automated, orchestrated remediation measures. The system is designed to be easy enough for small businesses to deploy and operate, and it’s priced to fit SMB budgets as well. attivonetworks.com
Deep Instinct Ltd.
In the beginning, there was anti-virus software, fundamentally unintelligent products that relied on signature matching to block dangerous files. Then came machine learning-based systems smart enough to identify threats too new to blacklist—provided highly skilled security experts have taught them what to look for.
Deep Instinct’s platform is the next step in that evolution. Equipped with “deep learning” technology designed to work the way a human brain does, the system can recognize and snuff out zero days and advanced persistent threats entirely on its own. The longer you use it, moreover, the more data it has to draw upon, and hence the smarter it gets. Versions of the underlying platform are available for PCs, virtual desktops, and mobile devices. deepinstinct.com
Though this company’s flagship product is a “network-as-a-service” solution, its core differentiator has more to do with security than networking. In the age of mobility and cloud computing, old-school security perimeters no longer really exist, so Meta Networks replaces them with “software-defined perimeters” that give each user access to the services and applications they need to do their job—and absolutely nothing more—wherever they are. The result is a flexible, cloud-native, “zero-trust” alternative to traditional VPN solutions. A three-tiered partner program launched last September offers sales engineering help, deployment and technical support, and marketing assistance. metanetworks.com
This recent addition to the security vendor landscape (see page 4, this issue) had a precisely defined market in mind when designing its core offering: managed service providers with limited security expertise but a keen desire to start profiting from cybersecurity services as quickly and painlessly as possible.
The solution RocketCyber came up with is built around a collection of mix-and-match, cloud-based “RocketApps” for functions like threat hunting, breach detection, cryptocurrency mining detection, and more that MSPs can learn swiftly and deploy easily. The software is priced affordably as well and backed by optional outsourced security operations and monitoring services, including one that offers suspicious event log monitoring assistance to channel pros too small for a full-blown SIEM. rocketcyber.com