Data defense: 12 network security companies keeping our information safe

February 8, 2019
Updated: June 4, 2019
Written by Sam Daley

When it comes to cyber defense, depth is the name of the game. One barrier isn’t nearly enough anymore. To withstand increasingly sophisticated cyberattacks, network security companies rely on an arsenal of tools that detect, react and protect against cyber crime in real-time.

Application security, behavioral analytics, data loss prevention, email security and VPN tools are just the tip of the iceberg. Along with traditional methods of protection, network security companies are also focusing their efforts on developing cloud-based products and IoT devices. With an estimated 200 billion connected devices online by 2020, companies in the space are already augmenting their services to protect our privacy.

We’ve rounded up 12 network security companies using innovation to battle the bad guys.

 

cybersecurity applications network security tempered networks
Tempered Networks

Tempered Networks

Location: Seattle, Washington

How it’s using network security: Tempered Networks creates Identity Defined Networking (IDN) solutions for infrastructure and IoT devices in the energy, education, manufacturing, healthcare and water industries. The company’s Zero Trust identity overlay lets connected devices safely “talk” with one another on a secure network.     

Industry Impact: Tempered Networks and smart building management company Delta Controls teamed up to integrate the network security company’s IDN on their SaaS management platform. The partnership will help Delta Controls-managed buildings to prevent data breaches.   

 

cybersecurity applications network security synk
Snyk

Snyk

Location: Boston, Massachusetts

How it’s using network security: Snyk is a network security company whose platform helps developers find and fix vulnerabilities in their open source code through automation and precision patching. Additionally, Snyk's vulnerability database includes only code that has been analyzed and tested by its team prior to inclusion.  

Industry Impact: Many global brands use Snyk's network security system, including Google, Salesforce, Skyscanner and Microsoft.

 

cybersecurity applications network security companies jumpcloud
JumpCloud

JumpCloud

Location: Boulder, Colorado

How it’s using network security: JumpCloud’s Directory-as-a-Service (DaaS) is a cloud-based platform that assists IT teams in securely managing identities and safely connecting employees to outside resources. The identity management portion of the platform allows administrators to manage credentials and authentications, severely limiting malicious network attacks.

Industry Impact: HelloFresh, CarGurus and ClassPass all trust JumpCloud’s DaaS platform to manage employee identity and access information.

 

cyberesecurity applications network security cujo ai
Cujo AI

Cujo AI

Location: El Segundo, California

How it’s using network security: Cujo uses AI-based cyber and network security tools to help protect devices from breaches. The company’s SaaS and firmware solutions integrate with a business's cloud to perform everything from content access control to threat detection and endpoint security.

Industry Impact: Cujo powers the network security behind Comcast’s new connected device security system, using its AI to monitor, block and inform customers about potential threats for all their connected devices in their home.

 

cybersecurity applications network security webroot
Webroot

Webroot

Location: Broomfield, Colorado

How it’s using network security: Webroot provides cloud endpoint protection and intelligence services for everything from home offices to enterprise businesses. The company uses machine learning-based predictive threat intelligence to identify holes in a network’s cybersecurity protocol before a malicious actor finds them. The Webroot platform then provides a detailed report showing all vulnerabilities and suggestions on how to patch them.  

Industry Impact: Webroot was acquired by cloud-based data protection provider Carbonite in February. Carbonite will use Webroot’s expertise to address one of their top vulnerabilities: endpoint security for cloud-based products.  

 

cybersecurity applications network security xaptum
Xaptum

Xaptum

Location: Chicago, Illinois

How it’s using network security: Xaptum provides real-time cybersecurity systems for Internet-of-Things networks. The company’s platform allows device authentication and authorization for secure messaging between an IoT device and the cloud.    

Industry Impact: Xaptum is targeting the $40 billion intermodal network. By securing their logistics networks with Xaptum, intermodal shipping companies are able to securely transfer data from their IoT devices to the cloud without worrying about a security breach.

 

cybersecurity applications network security edgewise
Edgewise Networks

Edgewise Networks

Location: Burlington, Massachusetts

How it’s using network security: Edgewise Networks prevents cyber threats to applications, data centers and clouds with its Zero Trust networking platform, which automatically identifies all communication within a network and monitors suspicious outliers. Zero Trust also scans and verifies all softwares within a network to ensure that predefined cybersecurity metrics have been met.     

Industry Impact: Edgewise Networks' Zero Trust platform recently received a patent for innovation in “Network Application Security Policy Enforcement.” 

 

cybersecurity applications network security lookout
Lookout

Lookout

Location: San Francisco, California

How it’s using network security: Lookout is a cybersecurity company that creates “post-perimeter” endpoint protection for mobile devices using predictive machine learning that continually assesses the safety of networks on which mobile devices connect. Lookout secures mobile phones from data breaches by vetting sources in real-time.

Industry Impact: Lookout’s AI quickly located a fake website that mimicked and attempted to breach the Democratic National Committee’s voter database, exposing millions of people's personal information. Lookout contacted the DNC and the FBI to expose this security threat and have the website investigated.

 

cybersecurity applications network security vectra
Vectra

Vectra

Location: San Jose, California

How it’s using network security: Vectra is a threat detection and hunting platform that identifies attacks on clouds, data centers and IoT devices in real-time. Using AI-based behavioral detection algorithms, the company’s Cognito Platform detects, responds to and investigates attacks.      

Industry Impact: Vectra was named to the 2019 CB Insights AI 100 Most Innovative Artificial Intelligence Startups. 

 

cybersecurity applications network security foxpass
Foxpass

Foxpass

Location: San Francisco, California

How it’s using network security: Foxpass helps enterprises boost their network security with cloud-hosted tools that oversee existing directories (Google Apps, Okta, Office 365, etc.) to protect network logins on applications and WiFi.      

Industry Impact: Optimizely, Instacart, Imgur and Boxed are just a few of the well-known brands that use Foxpass to automate and protect their networks.

 

cybersecurity applications network security axonius
Axonius

Axonius

Location: New York, New York

How it’s using network security: Axonius is a network security platform that lets IT teams manage and secure all of their devices. With the help of universal device visibility, IT teams can monitor each network-connected device for performance or cyber attack issues.

Industry Impact: Axonius was named a 2019 finalist for the RSA Conference Innovation Sandbox Contest. The leading conference on information security, RSA gives 10 of the most innovative startups a platform to present their technologies.  

 

cybersecurity applications network security netronome
Netronome

Netronome

Location: Santa Clara, California

How it’s using network security: Netronome develops domain-specific architecture (DSA) that lets customers build accelerators for networking applications and edge computing. The company’s DSA network protection includes everything from intrusion detection tools to the newest firewalls and a zero-trust distributed security system.          

Industry Impact: Packet, a bare metal cloud for developers, chose Netronome to create a new hardware platform that powers and secures cloud-native workloads at the edge.

 

Images via social media, Shutterstock and screenshots of company web pages.

Great Companies Need Great People. That's Where We Come In.

Recruit With Us