We are happy to announce that based on its recent analysis of the European and Israeli cyber threat intelligence (CTI) market, Frost & Sullivan recognizes Sixgill with the 2020 European & Israeli Technology Innovation Award for empowering companies to take a proactive approach to cybersecurity by presenting automated and actionable intelligence.
Each year, Frost & Sullivan presents this award to the company that has developed a product with innovative features and functionality that is gaining rapid acceptance in the market. The award recognizes the quality of the solution and the customer value enhancements it enables.
Sixgill's platform provides automated and actionable intelligence to protect clients against possible attacks and hacks and in the process, generates a large database of active cybercriminals, trending common vulnerabilities and exposures (CVE), attacks in planning, and exposed credentials. Using Artificial Intelligence and machine learning algorithms, Sixgill automates the production cycle of cyber intelligence, from monitoring through extraction to production, significantly increasing ROI for its customers and partners.
"Sixgill enables clients to assess their level of exposure on the deep, dark, and clear web to identify vulnerabilities. It has designed proprietary algorithms that extract data from a wide range of sources, such as dark web social networks, forums, and marketplaces. The algorithm offers deep visibility into channels such as Twitter, Telegram, QQ, and instant relay chats (IRC). This data is then used to create profiles and patterns of dark web threat actors and their interactions with peers across platforms, which otherwise remain invisible or inaccessible to enterprises," said Hiten Kamleshkumar Shah, Industry Manager at Frost & Sullivan.
With Sixgill, security teams are able to extract granular details of instances in which their company or any of their companies’ clients have been mentioned among a hacker’s activity on the dark web. The robust data collection mechanism presents security teams with data such as a threat actors' usernames, activity log, social network, active times, languages known, and other details.
To read the full press release click here or download the report.