Company Overview of Cyveillance, Inc.
Cyveillance, Inc. provides online threat intelligence solutions to protect network, customers, employees, information, and physical assets. It offers direct machine-readable threat intelligence data feeds to help correlate external threat activity with internal systems; threat analysis solutions; and cyber investigation solutions, which include open-source intelligence research, threat analysis, and cyber intelligence projects ranging from risk assessments, trend reports, travel advisories, digital artifact investigations, and other ad hoc requests. The company also provides response services, which include phishing attacks, identity theft, botted nodes and malware binaries, stolen credentia...
11091 Sunset Hills Road
Reston, VA 20190
Founded in 1997
Key Executives for Cyveillance, Inc.
Vice President of Finance & Accounting
Vice President of Human Resources
Vice President of Product Strategy
Compensation as of Fiscal Year 2016.
Cyveillance, Inc. Key Developments
Cyveillance Announces Launch of Advanced Text- and Image-Based Search and Retrieval Capabilities, Along with Enhanced Global Intelligence Tools, in its Cyber Threat Center™
Jun 1 15
Cyveillance announced the launch of advanced text- and image-based search and retrieval capabilities, along with enhanced Global Intelligence tools, in its Cyber Threat Center™. With the addition of these features, the cloud-based Cyber Threat Center offers even better visibility and more productivity for physical and information security professionals. Content-Based Image Retrieval (CBIR) mines the web for trademarks, imposter accounts, and counterfeit products, even if the images have been altered or do not include related keywords anywhere in the metadata. Security professionals can upload brand marks, logos, or images of executives, as well as images of physical locations, or confidential materials, to see if people are misusing them, planning attacks related to individuals or assets, or sharing or selling sensitive data. The Cyber Threat Center is the first cyber security platform to include this capability. The Cyber Threat Center combines a vast trove of data from web searches, social media monitoring, paste and post sites, IRC channels, and other sources with a robust suite of investigative tools and reference databases, including threat actors, phishing activity, domain name/IP data, and web-borne malware, to enable faster and better insights into threats and risks outside an organization's network perimeter. In addition to Open Source Threat Intelligence (OSINT) related to specific organizations, the latest version of the Cyber Threat Center also features enhanced Global Intelligence on potential threats across multiple industries. New online and exportable map and calendar options, including the ability to export .ICS files, offer a daily stream of updates around the latest physical and cyber security events, as well as summaries and visualization on a threat map and calendar. Global Intelligence data can be easily integrated into mapping platforms, internal calendars and other tools, enabling users to see visual clues for current and planned global and local events, attacks, protests, and other disruptions. The latest release of the Cyber Threat Center continues to build on long legacy of expertise in the threat intelligence industry. The new image-based tools, in particular, are cutting edge.
Cyveillance Partners with Centripetal Networks Inc. to Deliver Actionable Threat Intelligence
Mar 9 15
Cyveillance, Inc. announced a partnership with Centripetal Networks Inc. This partnership will deliver actionable cyber threat intelligence to organizations across all industries by enabling Centripetal's high-performance RuleGate platform to leverage Cyveillance's advanced threat intelligence streams. Cyveillance's team of security analysts and experts use the data to identify and analyze threats from around the world, turning unique data into rich, insightful intelligence. Data feeds from Cyveillance include real-time, specific intelligence about high-risk hosts, domain names, websites, malicious payloads, and IP addresses. Centripetal's RuleGate appliance is an Active Network Defense system with real-time attack visualizations and analytics. RuleGate devices are used to protect networks from cyber threats such as malware, malicious users, spam, phishing, scanning, and multiple adversaries. The RuleGate offers cyber analysts full visibility into which hosts are communicating from inside the network to specific hosts outside the network, in real-time. RuleGate is the key component of Centripetal's Network Protection System, a fully integrated Active Network Defense platform that includes Centripetal's full line of hardware and software solutions. Through the integration of Cyveillance's cyber intelligence with the RuleGate platform, organizations can activate large-scale policies in seconds while applying million-scale unique indicators to every packet entering and leaving the network, all without creating any degradation in network performance. Centripetal Networks utilizes Cyveillance's Phishing URL, Malicious URL, and suspect domain name feeds, which the RuleGate then operationalizes to enable organizations to block, alert, or allow threats in real-time. This helps to prevent data theft on organizations' networks before it occurs.
Similar Private Companies By Industry
Recent Private Companies Transactions
December 11, 2015