Company Overview of Cyveillance, Inc.
Cyveillance, Inc. provides online threat intelligence solutions. It offers anti-phishing services; Brand Intelligence that protects brand’s online reputation through real-time social media monitoring for issues that impact company’s brands, products, and services; and corporate compliance service that monitors the Internet to provide advanced warning of company-specific threats. The company also provides Brand Protection that keeps brands and customers safe by monitoring global domain registrations, Websites, mobile applications, and spam; corporate security services; cyber safety awareness training services; Cyber Threat Center, a cloud-based intelligence platform that is designed primarily...
11091 Sunset Hills Road
Reston, VA 20190
Founded in 1997
Key Executives for Cyveillance, Inc.
Vice President of Finance & Accounting
Vice President of Marketing & Communications
Vice President of Human Resources
Vice President of Product Strategy
Compensation as of Fiscal Year 2015.
Cyveillance, Inc. Key Developments
Cyveillance Announces Launch of Advanced Text- and Image-Based Search and Retrieval Capabilities, Along with Enhanced Global Intelligence Tools, in its Cyber Threat Center™
Jun 1 15
Cyveillance announced the launch of advanced text- and image-based search and retrieval capabilities, along with enhanced Global Intelligence tools, in its Cyber Threat Center™. With the addition of these features, the cloud-based Cyber Threat Center offers even better visibility and more productivity for physical and information security professionals. Content-Based Image Retrieval (CBIR) mines the web for trademarks, imposter accounts, and counterfeit products, even if the images have been altered or do not include related keywords anywhere in the metadata. Security professionals can upload brand marks, logos, or images of executives, as well as images of physical locations, or confidential materials, to see if people are misusing them, planning attacks related to individuals or assets, or sharing or selling sensitive data. The Cyber Threat Center is the first cyber security platform to include this capability. The Cyber Threat Center combines a vast trove of data from web searches, social media monitoring, paste and post sites, IRC channels, and other sources with a robust suite of investigative tools and reference databases, including threat actors, phishing activity, domain name/IP data, and web-borne malware, to enable faster and better insights into threats and risks outside an organization's network perimeter. In addition to Open Source Threat Intelligence (OSINT) related to specific organizations, the latest version of the Cyber Threat Center also features enhanced Global Intelligence on potential threats across multiple industries. New online and exportable map and calendar options, including the ability to export .ICS files, offer a daily stream of updates around the latest physical and cyber security events, as well as summaries and visualization on a threat map and calendar. Global Intelligence data can be easily integrated into mapping platforms, internal calendars and other tools, enabling users to see visual clues for current and planned global and local events, attacks, protests, and other disruptions. The latest release of the Cyber Threat Center continues to build on long legacy of expertise in the threat intelligence industry. The new image-based tools, in particular, are cutting edge.
Cyveillance Partners with Centripetal Networks Inc. to Deliver Actionable Threat Intelligence
Mar 9 15
Cyveillance, Inc. announced a partnership with Centripetal Networks Inc. This partnership will deliver actionable cyber threat intelligence to organizations across all industries by enabling Centripetal's high-performance RuleGate platform to leverage Cyveillance's advanced threat intelligence streams. Cyveillance's team of security analysts and experts use the data to identify and analyze threats from around the world, turning unique data into rich, insightful intelligence. Data feeds from Cyveillance include real-time, specific intelligence about high-risk hosts, domain names, websites, malicious payloads, and IP addresses. Centripetal's RuleGate appliance is an Active Network Defense system with real-time attack visualizations and analytics. RuleGate devices are used to protect networks from cyber threats such as malware, malicious users, spam, phishing, scanning, and multiple adversaries. The RuleGate offers cyber analysts full visibility into which hosts are communicating from inside the network to specific hosts outside the network, in real-time. RuleGate is the key component of Centripetal's Network Protection System, a fully integrated Active Network Defense platform that includes Centripetal's full line of hardware and software solutions. Through the integration of Cyveillance's cyber intelligence with the RuleGate platform, organizations can activate large-scale policies in seconds while applying million-scale unique indicators to every packet entering and leaving the network, all without creating any degradation in network performance. Centripetal Networks utilizes Cyveillance's Phishing URL, Malicious URL, and suspect domain name feeds, which the RuleGate then operationalizes to enable organizations to block, alert, or allow threats in real-time. This helps to prevent data theft on organizations' networks before it occurs.
Cyveillance, Inc. Launches Cyber Threat Center, Comprehensive Cloud-Based Intelligence Platform
Sep 15 14
Cyveillance, Inc. announced the launch of its Cyber Threat Center, the industry's most comprehensive cloud-based intelligence platform. The Center allows security and risk professionals to undertake their own collection and analysis of online threat intelligence, and to identify and respond to threats faster and more effectively. The Cyber Threat Center combines web search, social media monitoring, global intelligence reports, and a suite of investigative tools and databases in an easy-to-use, cloud-based portal. Professionals who are responsible for physical and IT security, incident response, cyber investigations, and online compliance can distill information from thousands of sources outside the firewall into useable intelligence, tailored for their business needs. The Center gives organizations access to the same powerful sources, tools and databases already used by Cyveillance analysts, as well as extensive data for cyber investigations and better intelligence. Cyveillance continues to grow its traditional threat analyst practice, which provides tailored, customer-specific threat intelligence to organizations around the world. Key features of the Cyber Threat Center include: One-stop web search and social media monitoring, including forums, blogs, underground channels, document-sharing and paste sites; customizable alerts and reporting, including graphical dashboards; an analyst's investigative toolbox with data on domain names and IP addresses, threat actors, phishing, and malware attacks; and global Threat Intelligence reports showing cyber and physical threats and disruptions around the world.
Similar Private Companies By Industry
Recent Private Companies Transactions
|No transactions available in the past 12 months.|