OPAQ is the premier network security cloud company. The OPAQ Cloud platform enables partners to deliver Fortune 100-grade network security-as-a-service to midsize enterprises on a software-defined network optimized for speed and performance. With OPAQ, service providers can centrally monitor security performance and compliance maturity, generate reports, manage security infrastructure, and enforce policies – all through a single interface. This empowers OPAQ partners to instantly grow revenue and margins, eliminate complexity and costs, and establish a competitive advantage that helps them attract and retain customers. Based in Northern Virginia, OPAQ is privately held and funded by Greenspring Associates, Columbia Capital, Harmony Partners, and Zero-G, Inc. To learn more, visit www.opaqnetworks.com.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

CISA RELEASES FIRST OF ITS SERIES OF SIX CYBERSECURITY ESSENTIALS TOOLKITS

CISA | June 02, 2020

news image

This is a starting point for small businesses and government agencies to understand and address cybersecurity risk as they do other risks, CISA’s toolkits will provide greater detail. Improve cybersecurity practices, the six cyber essentials toolkits will a...

Read More

Data Security, Platform Security, Software Security

CYMULATE ANNOUNCES SECURITY ANALYTICS FOR CONTINUOUS THREAT EXPOSURE MANAGEMENT

Businesswire | June 20, 2023

news image

Cymulate, the leader in exposure management and security validation, today announced the release of a ground-breaking new solution for organizations to run an informed continuous threat exposure management (CTEM) program. The CTEM program, which was coined by Gartner, Inc. is designed to diagnose the severity of exposures, create an action plan for remediation and facilitate a common language for discussions between business and technical teams. Disparate data sources, point-in-time collec...

Read More

BEWARE WINDOWS 7 USERS: MALWARE CAMPAIGN TARGETING IOT DEVICES

Cnet | February 05, 2020

news image

Windows 7 is officially dead, now that Microsoft has ended support for the operating system -- which means no more security updates or patches. Despite this, an estimated 200 million devices are still running the out-of-date system, and a malware campaign is targeting IoT devices still using it, according to a new report from TrapX Security. The malware used in the campaign is a self-spreading downloader, which runs malicious scripts as part of the Lemon_Duck PowerShell malware variant family. A...

Read More

Data Security

SYMPHONY TECHNOLOGY GROUP ANNOUNCES THE LAUNCH OF SKYHIGH SECURITY

Skyhigh Security | March 22, 2022

news image

Symphony Technology Group (“STG”), a leading Menlo Park-based private equity firm focused on the software, data, and analytics sectors, today announced the launch of Skyhigh Security. The new portfolio company was created to satisfy the growing cloud security requirements for large and small organizations. Skyhigh Security’s unique approach extends security beyond data access to securing how the data is used. Its data-aware Security Service Edge (SSE) is built to meet the needs...

Read More
news image

CISA RELEASES FIRST OF ITS SERIES OF SIX CYBERSECURITY ESSENTIALS TOOLKITS

CISA | June 02, 2020

This is a starting point for small businesses and government agencies to understand and address cybersecurity risk as they do other risks, CISA’s toolkits will provide greater detail. Improve cybersecurity practices, the six cyber essentials toolkits will a...

Read More
news image

Data Security, Platform Security, Software Security

CYMULATE ANNOUNCES SECURITY ANALYTICS FOR CONTINUOUS THREAT EXPOSURE MANAGEMENT

Businesswire | June 20, 2023

Cymulate, the leader in exposure management and security validation, today announced the release of a ground-breaking new solution for organizations to run an informed continuous threat exposure management (CTEM) program. The CTEM program, which was coined by Gartner, Inc. is designed to diagnose the severity of exposures, create an action plan for remediation and facilitate a common language for discussions between business and technical teams. Disparate data sources, point-in-time collec...

Read More
news image

BEWARE WINDOWS 7 USERS: MALWARE CAMPAIGN TARGETING IOT DEVICES

Cnet | February 05, 2020

Windows 7 is officially dead, now that Microsoft has ended support for the operating system -- which means no more security updates or patches. Despite this, an estimated 200 million devices are still running the out-of-date system, and a malware campaign is targeting IoT devices still using it, according to a new report from TrapX Security. The malware used in the campaign is a self-spreading downloader, which runs malicious scripts as part of the Lemon_Duck PowerShell malware variant family. A...

Read More
news image

Data Security

SYMPHONY TECHNOLOGY GROUP ANNOUNCES THE LAUNCH OF SKYHIGH SECURITY

Skyhigh Security | March 22, 2022

Symphony Technology Group (“STG”), a leading Menlo Park-based private equity firm focused on the software, data, and analytics sectors, today announced the launch of Skyhigh Security. The new portfolio company was created to satisfy the growing cloud security requirements for large and small organizations. Skyhigh Security’s unique approach extends security beyond data access to securing how the data is used. Its data-aware Security Service Edge (SSE) is built to meet the needs...

Read More

Resources

resource image

Data Security, Enterprise Security

Wallarm Demo: Shadow API Detection

Video

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us