Prevailion Recognized as a 2020 Gartner “Cool Vendor”

Gartner Cool Vendor 2020

We are pleased to announce that Prevailion has been named a Gartner Cool Vendor in the 2020 Cool Vendors in Security Operations and Threat Intelligence report.

In the October 13th report, Gartner points out that “Organizations struggle to mitigate vulnerabilities because of the inability to prioritize them due to a lack of context about the assets and external threat environment.”

We couldn’t agree more. It’s that lack of visibility, and subsequent inability to prioritize threats, which often hamper an organization’s cybersecurity posture.

Our mission is to change that. Prevailion’s exclusive intelligence capabilities empower organizations by giving them greater visibility into the numerous threats that are actively targeting their networks and the networks of their key partners. Instead of relying on risk assessments and error-prone alerts, we go directly to the source – the hackers’ own networks – to collect actual proof of compromise activity. This unprecedented real-time intelligence of malicious cyber activity gives companies a critical advantage in defending their networks against active and emerging threats.

But we’re not done yet. Prevailion’s threat intelligence and development teams are currently working on new upgrades to the APEX Platform that will further enhance our cyber intelligence capabilities.

Stay tuned for a new “breach intelligence” capability coming early next year!

 

 

Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Gartner, Cool Vendors in Security Operations and Threat Intelligence, Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, 13 October 2020.

The Latest

Diving Deep into UNC1151’s Infrastructure: Ghostwriter and beyond

Introduction: Prevailion’s Adversarial Counterintelligence Team (PACT) is using advanced infrastructure hunting techniques and Prevailion’s unparalleled visibility into threat actor infrastructure creation to uncover previously unknown domains associated with UNC1151 and the “Ghostwriter” influence campaign.  UNC1151 is likely a state-backed threat actor [1] waging an ongoing and far-reaching influence campaign that has targeted numerous countries across […]

Prevailion CEO, Karim Hijazi- Biden’s Cybersecurity Strategy

Prevailion CEO, Karim Hijazi, comments on lacking White House cybersecurity efforts Karim Hijazi lays out why Biden’s cybersecurity strategy lacks innovation and effectiveness to deal with modern adversaries already inside companies around the globe.    

Prevailion CEO, Karim Hijazi- Tmobile Hack

Prevailion CEO, Karim Hijazi, talks about the T-Mobile hack and cloned SIM cards Karim Hijazi says T-Mobile’s breach is the largest in carrier history and discusses SIM swapping and other forms of identity theft.    

Copyright 2021 Prevailion, Inc. All rights reserved.    

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.