We analyse the latest acquisitions in the sector de la ciberseguridad. Se trata de un mercado que no para de crecer y que va a seguir asentándose cuanta mayor penetración de los dispositivos tecnológicos haya, cosa que parece inamovible.
The pervasiveness of the internet, both in our private and professional lives, is completely affecting the way we function.
In the past, important information was archived and even armoured vans were available in case they were needed. Today, however, almost all information is stored directly in a technological format.
This change has led to an increasing number of attacks on the security of technological devices in an attempt to gain access to this information, a phenomenon that tends to become more professional and to set more ambitious goals.
One of the companies dedicated to the protection of online security is FireEyean American company dedicated to the cybersecurity and secure information storage using artificial intelligence.
Esta empresa ha crecido de manera inorgánica con más de 7 adquisiciones en los últimos años. Las últimas son las siguientes:
It is a company dedicated to the email securityand which has been able to win international awards due to the frontline security it offers its customers in both opening and shipping security.
The Email Laundry ofrece una plataforma en la nube de fácil acceso que permite mantener una red de emails protegidos de malware.
X15 Software is a company dedicated to the cyber protection of access to platforms. It takes care of the security of profile data, helping to control such protection through the use of advanced analytics. In addition, it has a pioneering operational intelligence platform, with which it is able to correlate access device information with common patterns to be able to find anomalies.
It is a cyber security company. leader in the automation of verification processes and customised solutions for each clientThe firm's solutions are therefore not homogeneous, and allow a degree of adaptability to the processes of each company that is not found in the market.
To this end, Invotas works closely with customers to be able to build and execute a digital library of approved courses of action, enabling them to transform their responses and create an iterative process that drives continuous improvement in cyber security.
Due to the increasing complexity of cyber attacks, the company is committed to automation and real-time information gathering in order to be able to anticipate upcoming attacks by regularly updating internal defence systems.