Minerva Labs References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (1381)
    9+ References
  • 4.7 / 5.0 (4320)
    Premium240+ References
  • 4.8 / 5.0 (1970)
    Verified13+ References

Minerva Labs Case Studies

  • currently locked
  • currently locked
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References9 total
    About

    Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats. They've built the industry's first real-time deep learning platform for network threat protection. They have a world class team of deep learning and security experts innovating and setting a new standard for cyber defense.

  • Reference Rating
    4.7 / 5.0
    Customer References240 total
    About

    Duo Security is a cloud-based access security provider protecting the world’s fastest-growing and largest companies and thousands of organizations worldwide, including Box, Etsy, Facebook, K-Swiss, The Men’s Wearhouse, NASA, Palantir, Paramount Pictures, Random House, Toyota, TripAdvisor Twitter, Yelp, Zillow, and more. Duo Security’s innovative and easy-to-use technology can be quickly deployed to protect users, data, and applications from breaches, credential theft and account takeover. Duo Security is backed by Benchmark, Google Ventures, Radar Partners, Redpoint Ventures and True Ventures.

  • Reference Rating
    4.7 / 5.0
    Customer References13 total
    About

    Tanium gives the world’s largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the enterprise within seconds. Serving as the “central nervous system” for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current and historical state and execute change as necessary, all within seconds. With the unprecedented speed, scale and simplicity of Tanium, organizations now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations.

  • currently locked