RazorThreat

Last updated
RazorThreat, Inc.
Company typePrivate
Industry Network Security, Cyber Security, Advanced Threat Protection
Founded2006
Founder Greg Guidice
Headquarters,
U.S.
Key people
Greg Guidice, Al Goldsworthy, Vern Smith, Dr. Peter Stephenson PhD
ProductsRazorThreat Vision, RazorDetect, RazorThreat HVA, Managed Security Services
Website www.razorthreat.com

RazorThreat is an American software company that develops advanced threat protection software that detects unknown and unauthorized activity occurring in a network. Its Threat Analysis Console was listed in 2007 as an "industry innovator" by Secure Computing [1] .

Contents

Company history

In September 2012, RazorThreat partnered with Ficus Consulting Group of Westborough, MA to resell its RazorThreat Vision threat intelligence software. [4]

Related Research Articles

<span class="mw-page-title-main">Trend Micro</span> Japanese multinational cyber security company

Trend Micro Inc. is an American-Japanese cyber security software company. The company has globally dispersed R&D in 16 locations across every continent excluding Antarctica. The company develops enterprise security software for servers, containers, & cloud computing environments, networks, and end points. Its cloud and virtualization security products provide automated security for customers of VMware, Amazon AWS, Microsoft Azure, and Google Cloud Platform.

Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs: conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Oracle Grid Engine, previously known as Sun Grid Engine (SGE), CODINE or GRD, was a grid computing computer cluster software system, acquired as part of a purchase of Gridware, then improved and supported by Sun Microsystems and later Oracle. There have been open source versions and multiple commercial versions of this technology, initially from Sun, later from Oracle and then from Univa Corporation.

Panda Security is a Spanish cybersecurity software company. Panda Security's core offering is an antivirus software and more recently has expanded into providing and developing cybersecurity software. This includes security products and services for both businesses and home users, as well as protection tools for systems, networks, emails, and other private information. Panda Security employs around 458 people.

<span class="mw-page-title-main">Ivanti</span> American IT software company

Ivanti is an IT software company headquartered in South Jordan, Utah, United States. It produces software for IT Security, IT Service Management, IT Asset Management, Unified Endpoint Management, Identity Management and supply chain management. It was formed in January 2017 with the merger of LANDESK and HEAT Software, and later acquired Cherwell Software. The company became more widely known after several major security incidents related to the VPN hardware it sells.

<span class="mw-page-title-main">SpySheriff</span> Spyware

SpySheriff is malware that disguises itself as anti-spyware software. It attempts to mislead the user with false security alerts, threatening them into buying the program. Like other rogue antiviruses, after producing a list of false threats, it prompts the user to pay to remove them. The software is particularly difficult to remove, since it nests its components in System Restore folders, and also blocks some system management tools. However, SpySheriff can be removed by an experienced user, antivirus software, or by using a rescue disk.

Webroot Inc. is an American privately-held cybersecurity software company that provides Internet security for consumers and businesses. The company was founded in Boulder, Colorado, US, and is now headquartered in Broomfield, Colorado, and has US operations in San Mateo and San Diego, and globally in Australia, Austria, Ireland, Japan and the United Kingdom.

Gideon Isaiah Gartner was an American businessman, investor, and philanthropist. He was often referred to as the father of the modern analyst industry. He is best known as the founder of Gartner, Inc. a Stamford, Connecticut information technology (IT) research and advisory company.

Opengear is a global computer network technology company headquartered in Edison, New Jersey, U.S., with engineering in Brisbane, Qld, Australia and production in Sandy, UT.

<span class="mw-page-title-main">Cadence Design Systems</span> American multinational computational software company

Cadence Design Systems, Inc., is an American multinational technology and computational software company. Headquartered in San Jose, California, Cadence was formed in 1988 through the merger of SDA Systems and ECAD. Initially specialized in electronic design automation (EDA) software for the semiconductor industry, currently the company makes software and hardware for designing products such as integrated circuits, systems on chips (SoCs), printed circuit boards, and pharmaceutical drugs, also licensing intellectual property for the electronics, aerospace, defense and automotive industries, among others.

Acceleware Ltd. is a Canadian innovator of clean-tech oil and gas technologies composed of two business units: Radio Frequency (RF) Enhanced Oil Recovery and Seismic Imaging Software. The company is currently running a commercial-scale, RF XL pilot project at Marwayne, Alberta, Canada, to advance and validate its heavy oil and oil sands electrification technology. Acceleware's seismic imaging software solutions offer imaging for oil exploration in complex geologies.

<span class="mw-page-title-main">Samsung SDS</span> South Korean IT company and subsidiary of Samsung Group

Samsung SDS Co., Ltd., Established in 1985 as a subsidiary of Samsung Group, is a provider of Information Technology (IT) services, including consulting, technical, and outsourcing services. SDS is also active in research and development of emerging IT technologies such as Artificial Intelligence (AI), Blockchain, Internet of Things (IoT) and outsourcing in engineering. In 2019, Samsung SDS reported a net profit of 750.4 billion won, an increase of 17.5% year-on-year. The company is estimated to have the 11th most valuable brand among global IT service companies, at US$3.7 billion as of January 2020. Samsung SDS has headquarters in South Korea and eight other overseas subsidiaries, one in America, Asia-Pacific, China, Europe, Latin America, Middle East, India, and Vietnam.

NTT DATA Corporation is a Japanese multinational information technology (IT) service and consulting company headquartered in Tokyo, Japan. It is a partially-owned subsidiary of Nippon Telegraph and Telephone (NTT).

Magic Lantern is keystroke logging software created by the United States' Federal Bureau of Investigation (FBI). Magic Lantern was first reported in a column by Bob Sullivan of MSNBC on November 20, 2001 and by Ted Bridis of the Associated Press.

Secureworks Inc. is an American cybersecurity company. The company has approximately 4,000 customers in more than 50 countries, ranging from Fortune 100 companies to mid-sized businesses in a variety of industries.

Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The security of personal and business information now stored on smartphones is of particular concern.

<span class="mw-page-title-main">Sensory, Inc.</span>

Sensory, Inc. is an American company which develops software AI technologies for speech, sound and vision. It is based in Santa Clara, California.

<span class="mw-page-title-main">Sqrrl</span> Cyber security company

Sqrrl Data, Inc. is an American company founded in 2012 that markets software for big data analytics and cyber security. The company has roots in the United States Intelligence Community and National Security Agency. Sqrrl was involved in the creation of, and actively contributes to Apache Accumulo and other related Apache projects. Sqrrl’s primary product is its threat hunting platform, designed for active detection of advanced persistent threats.

Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices. The connection of endpoint devices such as laptops, tablets, mobile phones, Internet-of-things devices, and other wireless devices to corporate networks creates attack paths for security threats. Endpoint security attempts to ensure that such devices follow a definite level of compliance to standards.

<span class="mw-page-title-main">Alex Stamos</span> Greek American computer scientist

Alex Stamos is an American computer scientist and adjunct professor at Stanford University's Center for International Security and Cooperation. He is the former chief security officer (CSO) at Facebook. His planned departure from the company, following disagreement with other executives about how to address the Russian government's use of its platform to spread disinformation during the 2016 U.S. presidential election, was reported in March 2018.

References

  1. Stephenson, Peter (1 December 2007). "Industry innovators 2007: RazorThreat TAC - SC Magazine". Secure Computing. Retrieved 31 October 2012.[ failed verification ]
  2. "RazorThreat Overview". Tracxn. Retrieved 26 May 2020.[ dead link ]
  3. "Razorthreat Inc". manta. Retrieved 26 May 2020.[ failed verification ]
  4. "RazorThreat Partners with the Ficus Consulting Group Expanding its Reseller Program". 2012-09-17. Retrieved 2020-04-10.