Blue Hexagon References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (350)
    Premium1+ References
  • 4.7 / 5.0 (3639)
    Premium266+ References
  • 4.8 / 5.0 (6555)
    Premium509+ References

Blue Hexagon Case Studies

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References1 total
    About

    Bit9 and Carbon Black have joined together to offer the industry’s most complete solution for advanced threat protection for endpoints and servers. The merged company helps organizations protect themselves from advanced threats in two critical ways: by reducing their attack surface through new signature-less forms of prevention, and rapidly detecting and responding to threats. We do this by combining Carbon Black’s lightweight endpoint sensor, which can be rapidly deployed with no configuration to deliver "incident response in seconds," and Bit9’s industry-leading prevention technologies to continuously monitor and record all activity on endpoints and servers and stop cyber threats that evade traditional security defenses.

  • Reference Rating
    4.7 / 5.0
    Customer References266 total
    About

    CyberArk is the only security company laser-focused on striking down targeted cyber threats, those that make their way inside to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk is trusted by the world’s leading companies -- including 30 of the Fortune 100 -- to protect their highest-value information assets, infrastructure and applications.

  • Reference Rating
    4.7 / 5.0
    Customer References509 total
    About

    Proofpoint helps the most successful companies in the world protect and govern their most sensitive business data. Proofpoint is an innovative security-as-a-service vendor that delivers data protection solutions that help organizations protect their data from attack and enable them to effectively meet the complex and evolving regulatory compliance and data governance mandates that have been spawned from highly publicized data breaches.