Average Ratings 88 Ratings
Average Ratings 0 Ratings
Description
Adaptive Security is OpenAI’s investment for AI cyber threats. The company was founded in 2024 by serial entrepreneurs Brian Long and Andrew Jones. Adaptive has raised $50M+ from investors like OpenAI, a16z and executives at Google Cloud, Fidelity, Plaid, Shopify, and other leading companies.
Adaptive protects customers from AI-powered cyber threats like deepfakes, vishing, smishing, and email spear phishing with its next-generation security awareness training and AI phishing simulation platform.
With Adaptive, security teams can prepare employees for advanced threats with incredible, highly customized training content that is personalized for employee role and access levels, features open-source intelligence about their company, and includes amazing deepfakes of their own executives.
Customers can measure the success of their training program over time with AI-powered phishing simulations. Hyper-realistic deepfake, voice, SMS, and email phishing tests assess risk levels across all threat vectors. Adaptive simulations are powered by an AI open-source intelligence engine that gives clients visibility into how their company's digital footprint can be leveraged by cybercriminals.
Today, Adaptive’s customers include leading global organizations like Figma, The Dallas Mavericks, BMC Software, and Stone Point Capital. The company has a world class NPS score of 94, among the highest in cybersecurity.
Description
Skyhawk Security offers a comprehensive cloud breach prevention platform that is designed to continuously observe runtime activities across various public cloud ecosystems. By correlating potential threats into actionable narratives, it provides verified alerts, automates responses, and delivers remediation strategies aimed at preventing breaches from happening in the first place. Utilizing AI-powered Continuous Proactive Protection, the platform employs an Autonomous Purple Team to conduct realistic attack simulations tailored to the unique cloud infrastructure of each customer, refining detection models to keep pace with changing configurations and thereby minimizing noise and false alarms. This allows security teams to concentrate on genuine threats in real time. Additionally, it seamlessly integrates Cloud Threat Detection and Response (CDR) with alerts that are contextualized and scored for optimal tuning, facilitating swift resolutions and reducing the mean time to respond (MTTR). The platform also encompasses essential features such as Cloud Security Posture Management (CSPM) and Cloud Infrastructure Entitlement Management (CIEM) to effectively evaluate permissions and enhance overall security posture. In doing so, it empowers organizations to maintain a proactive stance against potential breaches.
API Access
Has API
API Access
Has API
Integrations
@Pay
ADP Workforce Now
BambooHR
CyberArk Customer Identity
Deel
Drata
Google Workspace
HiBob
JumpCloud
Justworks
Integrations
@Pay
ADP Workforce Now
BambooHR
CyberArk Customer Identity
Deel
Drata
Google Workspace
HiBob
JumpCloud
Justworks
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Adaptive Security
Founded
2024
Country
United States
Website
www.adaptivesecurity.com
Vendor Details
Company Name
Skyhawk Security
Founded
2022
Country
United States
Website
skyhawk.security/
Product Features
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Security Awareness Training
Analytics / Reporting
Certification Training
Custom Test Building
Gamification
Industry Benchmarking
Non-Email Based Testing
Online Courses
Phishing Simulation
Pre-Assessments
Prebuilt Training Library