HEXADITE

hexadite-logo

Hexadite is changing the way cyber incident response is done, with a fully automated incident response solution that enables organizations to investigate every cyber-alert they receive and close out incidents in minutes, even seconds. Built from the ground up, the Hexadite Automated Incident Response Solution (AIRS™) maximizes an enterprise’s ability to investigate all cyber-alerts, uncover hidden threats and remediate the full extent of a breach to increase the organization’s productivity, reduce ongoing costs, and strengthen the organization's overall security.

#SimilarOrganizations #People #Financial #Event #Website #More

HEXADITE

Social Links:

Industry:
Computer Cyber Security Network Security Security

Founded:
2014-01-01

Address:
Boston, Massachusetts, United States

Country:
United States

Website Url:
http://www.hexadite.com

Total Employee:
11+

Status:
Active

Contact:
(617)342-7163

Email Addresses:
Contact@hexadite.com

Total Funding:
10.5 M USD

Technology used in webpage:
SPF Domain Not Resolving Microsoft Exchange Online Microsoft Azure DNS Google Analytics Classic Microsoft DMARC Vimeo Microsoft Azure HubSpot COS


Similar Organizations

responsight-logo

ResponSight

ResponSight offers enterprise risk and security profiling technology using behavioral analytics without collecting private information.

rivetz-logo

Rivetz

Rivetz is a developer of a hardware-based cyber-security system used to offer a simplified approach to cybersecurity.

rubica-logo

Rubica

Advanced cybersecurity for remote workers & mixed-use device environments. Threat detection & prevention built for ease-of-use.

refirm-labs-logo

ReFirm Labs

ReFirm Labs is a group of IoT security experts that develops a new method for vetting and validating firmware.

revolutionary-security-logo

Revolutionary Security

Revolutionary Security provides cyber security services.

nok-nok-labs-logo

Nok Nok Labs

Nok Nok Labs is a security platform that provides online authentication solutions for organizations.

netspi-logo

NetSPI

NetSPI is a Penetration Testing Company.

nanotech-security-logo

Nanotech Security

Nanotech Security is a public company that designs and commercializes advanced security products and devices.

norse-logo

Norse

Norse provides internet security intelligence solutions to e-commerce and enterprise clients.

vault-one-logo

Vault One

Vault One is a cyber security company that enables your organization to safely guard, control, and share passwords.

vidder-logo

Vidder

Vidder is a pioneer of Trusted Access Control based on the Software-Defined Perimeter (SDP) initiative of the Cloud Security Alliance (CSA).

visual-threat-logo

Visual Threat

VisualThreat is a connected-car security vendor that offers vehicle firewall and OTA ECU update solutions.

vericlave-logo

Vericlave

Vericlave prevents cyberattacks on critical assets with a simple to deploy solution that mitigates risks and addresses security challenges.

omninet-logo

Omninet

Brings cloud-based, enterprise-level security technology to small businesses at an affordable price.

mwr-infosecurity-logo

MWR InfoSecurity

MWR InfoSecurity provide specialist cyber security advice and solutions.

airwatch-logo

AirWatch

AirWatch engages in enterprise-grade mobile device, application, and content management designed to simplify mobility.

allovoisins-logo

AlloVoisins

Rental of equipment between individuals, rental of tools and services between neighbors

augtera-networks-logo

Augtera Networks

Augtera Networks is enabling networks to keep up with increasing scale, complexity, and change.

alias-robotics-logo

Alias Robotics

The robot cybersecurity firm behind RIS, the Robot Immune System, a security certified solution that protects robots against malware.

avalance-global-solutions-logo

Avalance Global Solutions

Avalance is a complete cyber security solutions provider that enables clients to secure their web-based resources.

active-cypher-logo

Active Cypher

Active Cypher develops a crypto-agile file security solution, automated to provide end-to-end data protection.

agileblue-logo

AgileBlue

AgileBlue is a developer of cybersecurity products designed to keep confidential data secure and ensure the safety of the property.

everspin-logo

Everspin

Cybersecurity company that invented the world's first dynamic security module.

exosecure-logo

EXOsecure

EXOsecure is a cybersecurity service that helps in leveraging the crowd, cloud, and community.

efficientip-logo

EfficientIP

EfficientIP provides solutions to address organizations' needs to drive business efficiency through network services availability, security.

eyl-logo

EYL

EYL offers the world's "smallest, cheapest, fastest, and most energy-efficient" quantum random number generators and applications.

blackpoint-cyber-logo

Blackpoint Cyber

Blackpoint Cyber is a leading provider of cybersecurity threat hunting, detection, and response technology.

buildsecurity-logo

build.security

Build.Security provides developers with easy deployment, ecosystem integrations, and code extensibility.

blastwave-logo

BlastWave

BlastWave creates the next phase of cybersecurity solutions, built on proprietary hardware, software, and a social layer.

blackfog-logo

BlackFog

BlackFog is the leader in on device data privacy, data security and ransomware prevention

barricade-io-logo

Barricade IO

Barricade works like an early warning system against any attempts at breaching the security of servers.

broadbridge-networks-logo

BroadBridge Networks

Broadbridge Networks is a cybersecurity analytics platform developer specializing in GPU based solutions for modern, high speed networks

fortanix-logo

Fortanix

Fortanix solves cloud security and privacy using Runtime Encryption(R) technology build upon Intel SGX.

fortinet-logo

Fortinet

Fortinet is a provider of network security appliances that include firewalls, security gateways, and complementary products.

foxguard-solutions-logo

FoxGuard Solutions

FoxGuard Solutions is a cyber security company focused on protecting critical infrastructure control systems.

tego-cyber-logo

Tego Cyber

Tego Cyber is a security intelligence platform helping individuals and enterprises with their cybersecurity needs.

topspin-security-logo

TopSpin Security

TopSpin Security is a leading developer of cutting edge devices providing advanced malware deception and detection technology.

tcell-logo

tCell

tCell is a next-gen web app firewall for the cloud designed to overcome the limitations of traditional Web Application Firewalls.

transitnet-llc-logo

TransitNet LLC

TransitNet is building the world's first title registry for crypto wallets.

ultru-security-logo

Ultru Security

Ultru Security offers a cybersecurity platform that helps prevent security incidents.

uncommonx-logo

UncommonX

UncommonX offers cybersecurity protection for organizations by combining threat and intelligence software with 24/7 industry experts.

uniken-logo

Uniken

Customer-first, security platform that empowers transformative engagement with your customers, while taking fraud to zero

kasada-logo

Kasada

Kasada challenges the economics of leveraging automation when abusing applications and APIs.

kondukto-logo

Kondukto

Kondukto is an application security orchestration and correlation platform.

kela-group-logo

Kela Group

Kela Group is a cyber intelligence firm that provides a full range of cyber security solutions against all the potential threats of darknet.

whitehat-security-logo

WhiteHat Security

WhiteHat Security is an application security provider committed to securing digital business.

wootcloud-logo

Wootcloud

WootCloud is a Device Context driven security firm traversing the IT/OT space across wired, wireless and RF spectrum

witfoo-logo

WitFoo

WitFoo is a project dedicated to operationalizing the craft of information security.

synack-logo

Synack

Synack is a crowdsourced security platform that utilizes augmented intelligence to discover and secure vulnerable applications.

spikes-security-logo

Spikes Security

A cyber security company with innovative, patented isolation technology to prevent browser-borne malware attacks.

sirp-logo

SIRP

Risk-Based Security Orchestration, Automation & Response (SOAR) Platform

swimlane-logo

Swimlane

Swimlane is a developer of a security orchestration and response platform used to deliver security automation to organizations.

ssh-communication-security-logo

SSH Communication Security

SSH Communications Security is the market leader in developing advanced security solutions

secureset-logo

SecureSet

SecureSet is a premier educational resource for launching or accelerating a cybersecurity career.

secmation-logo

Secmation

Secmation offers technology, engineering solutions, and tools to integrate information security into industrial and defense products.

syndis-logo

Syndis

Syndis is a leading information security company providing bespoke services and innovative security solutions in the global market.

solcyber-logo

SolCyber

SolCyber offers a curated stack of enterprise-strength security tools and streamlined, accessible, and affordable services.

sikur-logo

SIKUR

Sikur is defining the future of secure communication. We believe that security is not only about platforms or systems but is a mindset.

security-platform-inc-logo

Security Platform Inc.

Hardware based device security solution provider for lightweight IoT devices. Intrinsic Security of Things (SoT), Security-by-Design.

skout-cybersecurity-logo

SKOUT Cybersecurity

SKOUT Cybersecurity is a channel-only provider of fully-managed SOC services, focusing on Security Monitoring, Endpoint and Email Protection

deepsurface-security-inc-logo

DeepSurface Security Inc

The first risk-based vulnerability management platform that automates the process of analyzing and prioritizing vulnerabilities.

db-cybertech-logo

DB CyberTech

DB Networks provide insights into your database infrastruture including database discovery, insider threats and database attacks.

deepfence-inc-logo

Deepfence Inc

Kubernetes, Serverless and Virtual Machines, Deepfence protects it all. Pioneering industry's first Cloud Native DPI technology.

dover-microsystems-logo

Dover Microsystems

Dover Microsystems is a provider of cybersecurity platform designed to prevent the exploitation of software vulnerabilities.

deja-view-concepts-logo

Deja View Concepts

Deja View Concepts Introduce a revolution in video security that keeps mPOS system on top.

dflabs-logo

DFLabs

DFLabs develops a SOAR platform to facilitate intelligence-driven security operations and incident response.

hansight-logo

HanSight

HanSight is dedicated to changing the cyber security landscape based on intelligent big data security analytics approach.

hopzero-logo

HOPZERO

HOPZERO provides new layer of distance based security protection to work in conjunction with all other methods adding a significant benefit.

hoxhunt-logo

Hoxhunt

HoxHunt provides cybersecurity training services.

iverify-logo

Iverify

Iverify integrates technology, security experience, professionalism and efficiency to deliver the solution you really need.

ironnet-cybersecurity-logo

IronNet Cybersecurity

IronNet Cybersecurity is a network security company that bridges gap between traditional cybersecurity approaches and evolving threat.

inseptra-systems-logo

Inseptra Systems

Inseptra Systems provides telecoms and enterprises with tools to visualize, optimize and secure their networks.

greycortex-logo

GreyCortex

A solutions for advanced network security and performance monitoring for enterprise, government and other critical infrastructure.

qubitekk-logo

Qubitekk

Qubitekk offers an optic-based cybersecurity solution enabling communication between electric grid automation equipment.

obsidian-security-logo

Obsidian Security

Obsidian Security is a threat detection and posture management for business-critical saas applications.

observable-networks-logo

Observable Networks

Observable Networks operates in the enterprise network security and management industry.

zecops-logo

zecOps

ZecOps is a cybersecurity automation company that finds attackers' mistakes.

zyston-logo

Zyston

Zyston, a new company providing strategic information security advisory services

cervello-logo

Cervello

The industry's leading dedicated Rail security platform, enabling rail companies to safely deliver connected service.

corero-network-security-logo

Corero Network Security

CNS is dedicated to improving the security of the Internet through the deployment of its innovative of Defense® DDoS protection solutions.

cyberwarrior-academy-logo

CyberWarrior Academy

CyberWarrior Academy renders penetration testing, identity management, security assessments, and cloud security solutions.

cyberinc-logo

Cyberinc

Cyberinc offers a secure, scalable, and high-performance security products that protect from cyber-attacks.

caulis-inc-logo

Caulis Inc.

Caulis is a cybersecurity startup which is building the open security platform for every single device.

cybercrunch-logo

CyberCrunch

Cybercrunch provides nationwide electronics recycling and hard drive shredding services.

shard-x-logo

Shard X

Shard X develops technology for crypto custodians, in order to boost the security of its services.

cybeready-logo

CybeReady

CybeReady offers the world’s fastest security training platform, that evolves your organization from security awareness to cyber readiness.

cybertrust-logo

Cybertrust

Cybertrust is a provider of a comprehensive security certification services to various public and private entities.

cider-security-logo

Cider Security

Cider Security provides security teams with a single, consistent method to orchestrate and implement end-to-end CI/CD security.

cyber-observer-logo

Cyber Observer

Cyber Observer is an innovator in Continuous Controls Monitoring (CCM) and Cloud Security Posture Management (CSPM).

cynet-logo

Cynet

Cynet is an autonomous breach protection platform that provides a single, enterprise-grade solution for the internal network.

cleanio-logo

clean.io

Clean.io is a digital engagement security platform that helps businesses control the third party code that executes on their websites.

praetorian-logo

Praetorian

Praetorian is a cybersecurity company whose mission is to make the world safer and more secure.

preempt-security-logo

Preempt Security

Preempt secures all workforce identities everywhere.

perimeterx-logo

PerimeterX

PerimeterX offers a web security service, protecting web sites from modern security threats.

Founder


barak-klinghofer_image

Barak Klinghofer

eran-barak_image

Eran Barak

idan-levin_image

Idan Levin

Investors List

yl-ventures_image

YL Ventures

YL Ventures investment in Series A - Hexadite

ten-eleven-ventures_image

Ten Eleven Ventures

Ten Eleven Ventures investment in Series A - Hexadite

hewlett-packard-ventures_image

Hewlett Packard Pathfinder

Hewlett Packard Pathfinder investment in Series A - Hexadite

yl-ventures_image

YL Ventures

YL Ventures investment in Seed Round - Hexadite

moshe-lichtman_image

Moshe Lichtman

Moshe Lichtman investment in Seed Round - Hexadite

Newest Events participated

gartner-security-risk-management-summit-national-harbor-2018_event_image Participated in Gartner Security & Risk Management Summit National Harbor 2018 on 2018-06-04 as exhibitor

black-hat-usa-2017_event_image Participated in Black Hat USA 2017 on 2017-07-22 as sponsor

agc-13th-annual-west-coast-technology-conference_event_image Participated in AGC 13th Annual West Coast Technology Conference on 2017-02-13 as exhibitor

rsa-conference-2017_event_image Participated in RSA Conference 2017 on 2017-02-13 as exhibitor

Official Site Inspections

http://www.hexadite.com

  • Host name: 20.236.44.162
  • IP address: 20.236.44.162
  • Location: United States
  • Latitude: 37.751
  • Longitude: -97.822
  • Timezone: America/Chicago

Loading ...

More informations about "Hexadite"

Hexadite - Crunchbase Company Profile & Funding

Hexadite is changing the way cyber incident response is done, with a fully automated incident response solution that enables organizations to investigate every cyber-alert they receive and close out incidents in minutes, even seconds.See details»

Hexadite Company Profile 2024: Valuation, Investors ... - PitchBook

Hexadite General Information Description. Developer of a security automation and orchestration platform designed to address the deficiencies within the IR tools and processes that …See details»

Hexadite Company Profile - Office Locations, Competitors ... - Craft

Sep 22, 2017 See insights on Hexadite including office locations, competitors, revenue, financials, executives, subsidiaries and more at Craft.See details»

Hexadite Company Profile | Management and Employees List

Hexadite Profile and History . Hexadite is changing the way cyber incident response is done with the first security orchestration and automation solution that automatically investigates and …See details»

Hexadite - Products, Competitors, Financials, Employees, …

Headquarters Location. 101 Federal St . Boston, Massachusetts, 02210, United States. 617-342-7163See details»

Hexadite’s Competitors, Revenue, Number of Employees, Funding …

Jun 15, 2017 Hexadite’s Profile, Revenue and Employees. Hexadite is a security orchestration and automation platform that investigates cyber alerts and drives remediation actions. …See details»

Microsoft Acquires Security Orchestration Firm Hexadite

Jun 8, 2017 Microsoft announced on Thursday that it has agreed to acquire Boston-based security orchestration firm Hexadite for an undisclosed sum.. Hexadite’s flagship Automated …See details»

Hexadite - Tech Stack, Apps, Patents & Trademarks - Crunchbase

Hexadite solves the cybersecurity capacity problem with the first agentless intelligent security automation and orchestration platform.See details»

A Deep Dive into Hexadite’s Founding, Growth, and ... - LinkedIn

Jun 8, 2017 IDT: This was actually Hexadite’s first paying customer, and it continued to maintain a strong relationship with the company due to the value that Hexadite provides. Golan Ben …See details»

Hexadite - Crunchbase

Hexadite solves the cybersecurity capacity problem with the first agentless intelligent security automation and orchestration platform.See details»

Hexadite, Inc. Company Profile | Boston, MA - Dun & Bradstreet

Find company research, competitor information, contact details & financial data for Hexadite, Inc. of Boston, MA. Get the latest business insights from Dun & Bradstreet.See details»

Microsoft reportedly acquires Israeli cybersecurity startup Hexadite ...

May 24, 2017 Microsoft has acquired Israeli cybersecurity startup Hexadite in a deal thought to be worth around $100 million, according to a report (in Hebrew) in local Israeli business …See details»

Microsoft makes Hexadite acquisition official - OnMSFT.com

Jun 8, 2017 Microsoft has just confirmed the acquisition of Israeli IT security startup Hexadine, which will join the company's Windows and Devices Group to improve Microsoft’s enterprise …See details»

Microsoft signs accord to buy cyber firm Hexadite

Jun 8, 2017 Modeled on the logic and processes used by “top cyber analysts” and driven by artificial intelligence, Hexadite’s software “investigates every alert in seconds,” the startup’s …See details»

Microsoft Confirms Acquisition Of Security Automation Firm …

Jun 8, 2017 Microsoft did not disclose the terms of the acquisition agreement. The May report had put the acquisition price for the company at $100 million. Hexadite's platform uses artificial …See details»

Hexadite debuts, offers new cybersecurity solutions

Jul 1, 2014 Hexadite works with a range of large-scale enterprises as well as government agencies and technology businesses. This is one of many cybersecurity providers attempting …See details»

Hexadite for Microsoft - Eyerys

Aug 6, 2017 Microsoft is getting more active in the field of cybersecurity as it acquires Hexadite, an Israel startup that uses AI to identify attacks and protect users. Said to worth $100 million, …See details»

CRN Exclusive: Hexadite Launches Partner Program, Names Former ...

Apr 4, 2017 Security automation startup Hexadite has launched its first partner program and appointed channel veteran Jessica Couto to lead the charge, the company announced Tuesday.See details»

Hexadite | Ten Eleven

Hexadite's Cyber Incident Response Solution is the world's first security orchestration and automation solution that can investigate and resolve cyber security alerts in minutes.See details»

Hexadite Launches Security Automation Channel Program with …

Apr 4, 2017 Using artificial intelligence and automation, Hexadite AIRS integrates with an organization’s existing security technologies to investigate alerts just as a trained cyber analyst …See details»

linkstock.net © 2022. All rights reserved