
Malware
Malicious software designed to infiltrate or damage a computer system without the owner’s consent. Common forms of malware include computer viruses, worms, trojans, spyware, and adware.
Phishing
Threat actors attempt to solicit confidential information from an individual, group, or organization by mimicking or spoofing, a specific, usually well-known brand for financial gain. Phishers attempt to trick users into disclosing personal data, such as credit card numbers, online banking credentials, and other sensitive information, which they may then use to commit fraudulent acts.
Insider threats
An insider threat is anyone who has knowledge of or access to your organization’s infrastructure and information and who uses, either knowingly or inadvertently, the infrastructure or information to cause harm. Ransomware: Malware that denies you access to your files until a sum of money is paid.
Credential stuffing
A cyber attack where stolen account credentials are used to gain unauthorized access to user accounts through large-scale automated login requests directed against a web application.
Oryx Industries provides award winning technologies and solutions
Adaptive Shield
Adaptive Shield’s SSPM platform features proactive, deep, continuous and automated monitoring & management capabilities. As a SaaS app that integrates with all SaaS apps, within minutes Adaptive Shield identifies misconfigurations, provides visibility to all SaaS apps connected to the core SaaS stack, and manages risks stemming from compromised devices accessing the SaaS environment.
Winner of Editor’s Choice Award in Cybersecurity Education for Enterprises
CybelAngel
A company’s external attack surface is Cloud High, Dark-Web Deep, Supply-Chain Wide, and Internet Infinite. Protect it all. Identify shadow IT, detect exposures, prioritize threats, and gain control of your external digital landscape with External Attack Surface Management from CybelAngel (EASMX)
Terranova
Terranova training platform delivers engaging and impactful cybersecurity training for employees, offering a diverse range of modules, from phishing and password security to social engineering, utilizing interactive scenarios and gamification to create a fun and engaging learning experience
CoSoSys Endpoint Protector
Endpoint Protector is an advanced, all-in-one Data Loss Prevention solution for Windows, macOS and Linux, that puts an end to data leaks and data theft and offers seamless control of portable storage devices. Endpoint Protector’s filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or data protection regulations such as GDPR, HIPAA etc
Endpoint Protector is a Gold Winner in the Data Leakage Prevention (DLP) Europe category at the 2022 Cybersecurity Excellence Awards
Cynet
Introducing the modern approach to cybersecurity: All the prevention, detection, correlation, investigation, and response you need backed by a 24/7 MDR service – without the cost and complexity. Free your security team from constant pressure by automating their day-to-day cybersecurity operations.
Arcon
ARCON is a leading enterprise information risk control solution provider, specializing in Privileged Access Management
(PAM) and continuous risk assessment solutions. Our mission is to help enterprises identify emerging technology risks and help mitigate them by robust solutions that predict, protect and prevent.
Ironscales
IRONSCALES offers security professionals and end users an AI-driven, self-learning email security platform that provides a comprehensive solution to stop tomorrow’s phishing attacks today.
NetSPI
Discover, prioritize, and remediate security vulnerabilities with the most comprehensive suite of continuous, real-time, and scalable offensive security solutions. NetSPI drives innovation to help teams confidently grow their security testing programs and keep pace with today’s rate of change.