Exonar solves a problem common to all organizations and their senior information owners, “I just don’t know what I’ve got”. Exonar maps and understands organization’s information, from databases to documents - instantly and at scale. We use machine learning to understand what’s important, where it is and who has access to it. Exonar identifies documents containing passwords, customer and confidential information enabling successful governance, risk management, document retention, cyber security and compliance with forthcoming regulations such as GDPR - with ease.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

DATA SECURITY

SYMPHONY TECHNOLOGY GROUP ANNOUNCES THE LAUNCH OF SKYHIGH SECURITY

Skyhigh Security | March 22, 2022

news image

Symphony Technology Group (“STG”), a leading Menlo Park-based private equity firm focused on the software, data, and analytics sectors, today announced the launch of Skyhigh Security. The new portfolio company was created to satisfy the growing cloud security requirements for large and small organizations. Skyhigh Security’s unique approach extends security beyond data access to securing how the data is used. Its data-aware Security Service Edge (SSE) is built to meet the needs...

Read More

SOFTWARE SECURITY

TURING AI LAUNCHES SEARCH ATTRIBUTE IN VIDEO SECURITY PLATFORM

Turing AI | June 16, 2022

news image

Turing AI has added people attribute search, a game changing feature in AI Security, to their flagship AI-powered video security platform Turing Vision. Whereas other camera-based security system depends on facial recognition and object detection alone to safeguard facilities and locate events, people attribute search adds several factors to identification, enhancing speed and accuracy of finding and recognizing people at the scene of events. With the inclusion of individuals attr...

Read More

ACI WORLD AND A-ISAC TO WORK TOGETHER ON CYBER-SECURITY

International Airport View | January 24, 2020

news image

ACI World and A-ISAC to work together on cyber-security Improving airports’ access to cyber-threat intelligence and actionable data is the goal of this new collaboration in the aviation industry. Collaborating to improve cyber-security awareness Airports Council International (ACI) World and the Aviation Information Sharing and Analysis Centre (A-ISAC) have announced the signing of an agreement that will better enable ACI members to join the A-ISAC for access to airport-specific cyber-thre...

Read More

ODIX RELEASES FILEWALL FOR MICROSOFT 365 MAIL ATTACHMENTS (FIREWALL FOR FILES)

prnewswire | September 14, 2020

news image

odix, an Israel-based cybersecurity leader in enterprise CDR (Content Disarm and Reconstruction) technology, has officially launched FileWall for small and medium-sized businesses (SMBs).  FileWall provides effective malware-disarming capabilities against file-based attacks, leveraging cutting-edge technology previously available only for enterprises. With 62 percent of cyberattacks targeting SMBs resulting in 60 percent of them going out of business within six months, a new cybersecurity soluti...

Read More
news image

DATA SECURITY

SYMPHONY TECHNOLOGY GROUP ANNOUNCES THE LAUNCH OF SKYHIGH SECURITY

Skyhigh Security | March 22, 2022

Symphony Technology Group (“STG”), a leading Menlo Park-based private equity firm focused on the software, data, and analytics sectors, today announced the launch of Skyhigh Security. The new portfolio company was created to satisfy the growing cloud security requirements for large and small organizations. Skyhigh Security’s unique approach extends security beyond data access to securing how the data is used. Its data-aware Security Service Edge (SSE) is built to meet the needs...

Read More
news image

SOFTWARE SECURITY

TURING AI LAUNCHES SEARCH ATTRIBUTE IN VIDEO SECURITY PLATFORM

Turing AI | June 16, 2022

Turing AI has added people attribute search, a game changing feature in AI Security, to their flagship AI-powered video security platform Turing Vision. Whereas other camera-based security system depends on facial recognition and object detection alone to safeguard facilities and locate events, people attribute search adds several factors to identification, enhancing speed and accuracy of finding and recognizing people at the scene of events. With the inclusion of individuals attr...

Read More
news image

ACI WORLD AND A-ISAC TO WORK TOGETHER ON CYBER-SECURITY

International Airport View | January 24, 2020

ACI World and A-ISAC to work together on cyber-security Improving airports’ access to cyber-threat intelligence and actionable data is the goal of this new collaboration in the aviation industry. Collaborating to improve cyber-security awareness Airports Council International (ACI) World and the Aviation Information Sharing and Analysis Centre (A-ISAC) have announced the signing of an agreement that will better enable ACI members to join the A-ISAC for access to airport-specific cyber-thre...

Read More
news image

ODIX RELEASES FILEWALL FOR MICROSOFT 365 MAIL ATTACHMENTS (FIREWALL FOR FILES)

prnewswire | September 14, 2020

odix, an Israel-based cybersecurity leader in enterprise CDR (Content Disarm and Reconstruction) technology, has officially launched FileWall for small and medium-sized businesses (SMBs).  FileWall provides effective malware-disarming capabilities against file-based attacks, leveraging cutting-edge technology previously available only for enterprises. With 62 percent of cyberattacks targeting SMBs resulting in 60 percent of them going out of business within six months, a new cybersecurity soluti...

Read More

Resources

resource image

DATA SECURITY, ENTERPRISE IDENTITY, ENTERPRISE SECURITY

Secure by Design: Lexmark Print Devices

Whitepaper

resource image

PLATFORM SECURITY, SOFTWARE SECURITY

C2 Identity Security White Paper

Whitepaper

resource image

DATA SECURITY, ENTERPRISE IDENTITY, ENTERPRISE SECURITY

Secure by Design: Lexmark Print Devices

Whitepaper

resource image

PLATFORM SECURITY, SOFTWARE SECURITY

C2 Identity Security White Paper

Whitepaper

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us