Boston Cybersecurity Companies. PHOTO: Cybercrime Magazine.

List of Boston Cybersecurity Companies To Watch In 2020

Who’s fighting cybercrime in Massachusetts

 – Hillarie McClure, Multimedia Director

Portland, Maine – Aug. 19, 2020

Boston, like the rest of the U.S., needs to step up its cyber defense game.

A story in The Boston Globe points out the good, the bad, and the scary around cybercrime. Attacks and losses are on the rise, AI (artificial intelligence) can help, but there’s a cybersecurity labor shortage that may pose the biggest risk of all.

Cybersecurity companies are the best hope for filling in the talent gaps. Fortunately for Massachusetts, there’s an impressive roster of hot players we’re watching … and you should too.

THE LIST

Our list of Boston area cybersecurity companies to watch in 2020 and 2021 provides an alphabetical directory for CIOs, CISOs, IT and security leaders, and business executives who are seeking solution providers.

Akamai, Cambridge, Mass. Intelligent edge platform creates secure digital experiences via their defensive shield that protects websites, mobile infrastructure, and API-driven requests. 24/7 monitoring that collects and analyzes attack data to stay ahead of threats including malware, phishing, data exfiltration, DDoS, and others.

BitSight, Boston, Mass. Security ratings that measure an organization’s cybersecurity performance, as well as security performance management, and third-party risk management.

CyberArk, Newton, Mass. Privileged access management for on-premise, in the cloud, remote vendors, and applications. Dedicated to stopping attacks before they stop business by reducing the risks created by privileged credentials and secrets.

Cyberhaven, Boston, Mass. Protecting trade secrets from insider threats via Data Behavior Analytics (DaBA). Provides complete visibility into the movement of all data as it travels across cloud and on-premises environments.

Cybereason, Boston, Mass. Enterprise endpoint protection built to defend against tomorrow’s threats today by combining prevention, detection, response, and threat hunting. Their defense platform has a multi-tier data model with cloud, virtual, hybrid, and on-premises deployment options.


Cybercrime TV: Industry Experts on the Cybersecurity Labor Shortage

There is a supply and demand problem in our field


CyberSaint Security, Concord, Mass. The CyberStrong Platform seamlessly unites all governance, risk and compliance activities to support a holistic, all-in-one integrated risk management strategy. Proprietary artificial Intelligence and Machine Learning technology augment and enhance your cyber program at scale while eliminating manual effort. 

Cygliant, Boston, Mass. Cybersecurity-as-a-Service that helps manage, detect, and respond to cyber threats. With 24/7 dedicated cybersecurity advisors and comprehensive technology, they help businesses create high quality, personalized experiences so they don’t need to go the cybersecurity journey alone.

Datto, Boston, Mass. & Norwalk, Conn. Cloud-based unified continuity, networking, and business management solutions, creating a one-of-a-kind ecosystem of MSP partners.

Digital Guardian, Waltham, Mass. SaaS-delivered enterprise DLP. Allows for quick deployment and on-demand scalability, while providing full data visibility to protect critical data and IP from ransomware and insider threats on all devices, networks, and the cloud.

DUST Identity, Framingham, Mass. Diamond Unclonable Security Tag (DUST) technology uses nanodiamonds to securely link products and components with their digital records so that individual objects can be verified, authenticated, and ultimately trusted.

empow, Boston, Mass. i-SIEM that uses proprietary artificial intelligence, with Natural Language Processing (NLP), to proactively read, classify, and mitigate attacks. i-XDR works with i-SIEM to stop the noise of false positives in the network and allow greater visibility into different security products and their performance.

Great Horn, Waltham, Mass. Cloud-native email security solution to protect companies reliant on G suite and/or Office 365 against advanced threats, and can be deployed and operational in less than 5 minutes.

iboss, Boston, Mass. Cloud SaaS network security platform that eliminates the need for traditional network security appliances, allowing organizations to secure network traffic from anywhere, at any scale, while reducing costs and complexity.

IdentityForce, Framingham, Mass. Identity theft protection provider for individuals, businesses, and government agencies. Delivers ongoing monitoring, rapid alerts, and recovery services to ensure privacy, helping protect against identity and credit theft.

Imprivata, Lexington, Mass. Digital identity management for health delivery organizations. Comprehensive, purpose-built solutions for positive identity, ubiquitous access, and multifactor authentication for complex healthcare workflows and IT systems.

Mimecast, Lexington, Mass. Cloud security services that follow your employees home. Protects against email, data, and web security threats with an integrated, cloud-based platform that’s always working, always protecting.

Morphisec, Boston, Mass. Unified threat protection platform powered by Moving Target Defense, which first stops, then identifies attacks. Moving Target Defense technology morphs the memory space, dismantling the attack delivery mechanisms and killchain. Advanced endpoint, virtual desktop, cloud workload, and server protections.

Perception Point, Boston, Mass. Prevention-as-a-Service that enables digital transformation through 360-degree protection against any type of content-based attack, across all collaboration channels.

Privitar, Boston, Mass. Enterprise data privacy software that de-identifies data, minimizes risk, and achieves regulatory compliance. Frees users to use advanced analytics, AI, and machine learning to extract maximum value from the sensitive personal data they collect, manage, and use.

Rapid7, Boston, Mass. Rapid7 Insight cloud is the home for SecOps and SIEM solutions, providing the visibility, analytics, and automation needed to unite teams to work faster and smarter. Security, IT, and Development have one-click access to vulnerability management, application security, incident detection and response, automation, and more.

Recorded Future, Somerville, Mass. Universal threat intelligence that collects and analyzes vast amounts of data to deliver relevant cyber threat insights in real time. Empowers security teams to deliver intelligence and can be integrated with existing security solutions.

ReversingLabs, Cambridge, Mass. Machine learning that delivers the threat intelligence humans need to have visibility into malware files and locations, verifying local threats, and automating SOC processes.

RSA, Bedford, Mass. Provider of business-driven solutions that include integrated risk management, threat detection and response, identity and access management, and omnichannel fraud protection.

Threat Stack, Boston, Mass. Cloud security for infrastructure and applications. Threat Stack delivers proactive risk identification and real-time threat detection across cloud workloads from build-time to runtime.

Tufin, Boston, Mass. The Security Policy Company that automates and orchestrates security policies across firewalls and hybrid clouds to ensure compliance with industry regulations, and assess and manage risks.

Uptycs, Waltham, Mass. Osquery-powered security analytics cloud-based platform that pairs the universal agent with a scalable analytics platform for fleet visibility, intrusion detection, vulnerability monitoring, and compliance across operating systems and computing environments.

Veracode, Burlington, Mass. Addressing the challenges of AppSec programs with a unique combination of automated application analysis and DevSecOps expertise, all delivered through a scalable SaaS platform.

ZeroNorth, Boston, Mass. Provider of risk-based vulnerability orchestration across applications and infrastructure, enabling stronger security as businesses embark upon digital transformation initiatives, from DevOps to microservices to the cloud.

For information about this list, contact the editors at Cybersecurity Ventures.

 – Hillarie McClure is Multimedia Director at Cybercrime Magazine



Send this to a friend