Wickr
/in Merlin Ventures Remote Workers, Security Operations, SOC Automation, Zero Trust Homepage /by Rob Smelik
The most secure communication and collaboration platform
Designed from the ground up, Wickr is the foundational secure collaboration platform for security operations. Wickr has taken battle-tested secure communications and collaboration and built deep integrations with productivity and security tooling. The result is a communications and collaboration platform which allows network defenders and mission owners to ensure that they are able to securely carry through with their communication and response processes during incidents.
Key Features and Benefits
Secure
▪ State of the Art, End-to-End Encryption
▪ Zero Trust Platform Design
▪ Advanced Security Features
Capable
▪ 1:1 and Group Messaging, Teleconference and File Sharing
▪ Enterprise Integrations (SSO, MDM, etc.) and Bots
▪ Federated SaaS and On-Premises Deployment Options
Compliant
▪ Manageable Security and Administrative Controls
▪ Automatic Enforcement of Data Retention Policies
▪ Centralized Message Archiving Capability
Trusted
▪ Continuous Third-Party Audits
▪ Customer Promise Program
▪ Enterprise Grade Support
Additional Materials
White Paper: Toward a Zero Trust Future
View PDF
White Paper: End-to-End Encryption for Enterprises
View PDF
Case Study: How Wickr Helped the German Police Cybercrime Division During COVID-19
View PDF
Request a Wickr demo
Swimlane
/in Merlin Ventures Remote Workers, Security Operations, SOC Automation, Zero Trust Homepage /by Rob Smelik
Automate incident response workflows with SOAR
As a leader in security orchestration, automation and response (SOAR), Swimlane empowers Security Operations with machine-speed decision making. By automating time-intensive, manual processes and operational workflows and delivering powerful, consolidated analytics, real-time dashboards and reporting from across your security infrastructure, Swimlane maximizes the incident response capabilities of over-burdened and understaffed Security Operations teams.
Key Features and Benefits
Security Orchestration
Integrate all of your security tools and related infrastructure with your people and processes to orchestrate faster, more effective incident response and threat management. This helps to streamline incident response processes and automate workflows.
Playbook & Workflow Automation
Manage and automate tasks associated with responding to security alerts and incidents to enable security teams to replace slow, manual and repetitive activities with machine-speed decision making and remediation.
Adaptable, Dynamic Case Management
Track all enterprise security tasks and provide centralized access to manage cases, reports, dashboards and metrics for individuals and teams to enable analysts to dynamically interact with all data and components related to an incident through a single interface.
SOC Dashboards & Reporting
Deliver greater visibility into the performance, capacity and value of your SecOps investment by providing insight into the Security Operation Center’s productivity and efficacy with easily customized dashboards, granular reporting and extensive visualization capabilities.
Modernize Email Security
Spot subtle deviations that reveal even the most targeted, novel attacks before they can make an impact
Video - Overview
Video - Drawing the Future of Cybersecurity With Nicole Eagan
Additional Materials
Case Study: U.S. Government Agency
View PDF
SANS Survey on Automation and Integration 2020
View PDF
2020 SOAR Report
View PDF
Request a Swimlane demo
Cynet
/in Merlin Ventures Endpoint Protection, Integrated Risk Management, Remote Workers, Security Operations, SOC Automation, Zero Trust Homepage /by Rob Smelik
Autonomous breach protection
Cynet’s Sensor Fusion™ technology powers the world’s first autonomous breach protection platform, overcoming the limits of siloed and manually-operated solutions. The platform provides complete automation of monitoring and control, attack prevention and detection, and response orchestration across the entire environment. Sensor Fusion continuously collects and analyzes data across the entire environment, including memory-based execution, network traffic behavior, user account activity, and file access. This data provides visibility into the entire environment, enabling proactive discovery and monitoring and control of any exposed attack surface. The platform combines all these input sources to understand the complete context of each individual event, yielding unparalleled threat prevention and detection accuracy. This enables the safe automation of response workflows for all detected threats with zero human intervention.
Key Features and Benefits
Immediate Insights
Unique context into each event through analysis of activity signals, enabling full network discovery and inventory visibility
Monitoring & Control
Centralized visibility interface showing all endpoint configurations, installed software, process execution, network traffic, and user activity, enabling operators to continuously optimize asset management and proactively reduce exposed attack surfaces.
Attack Prevention & Detection
Full visibility across endpoints, networks and users, along with deception technology, to detect otherwise undetectable attacks.
Response Orchestration
Fully automated investigations, findings, and remediation workflows with the ability to use pre-built and custom scripts and playbooks.
Modernize Email Security
Spot subtle deviations that reveal even the most targeted, novel attacks before they can make an impact
Video - Overview
Video - Drawing the Future of Cybersecurity With Nicole Eagan
Additional Materials
Cynet 360 Autonomous Breach Protection
View PDF
Autonomous Breach Protection
View PDF
Request a Cynet demo
Cyber Observer
/in Merlin Ventures Cyber Hygiene, Integrated Risk Management, Security Operations, SOC Automation Homepage /by Rob Smelik
Holistic cybersecurity management and awareness
Cyber Observer is an agnostic solution that gives CISOs and their teams the ability to gauge current security posture across all tools and security domains, regardless of manufacturer. The platform retrieves and analyzes Critical Security Controls (CSCs) from every tool and uses the information to continuously measure the cybersecurity posture of an organization’s full environment. It provides a central place for organizations to monitor their tools and infrastructure, align with industry frameworks, and prioritize CSCs across their environment.

Key Features and Benefits
Quick Deploy
Deploys remotely to any enterprise IT network in under 4 hours
Pre-configured
Mapped to ObserverSecurity Framework out-of-the-box
Intuitive UI
Weighted, score-based UI works for you
Immediate Insights
Start seeing ROI after hours, not months
Video - Overview
Video - Drawing the Future of Cybersecurity With Nicole Eagan
Additional Materials
Data Sheet: Power to the CISO
View PDF
White Paper: Continuous Cybersecurity Management and Awareness
View PDF
Cyber Hygiene White Paper: If Tools Could Talk
View PDF
Request a Cyber Observer demo
Centerity
/in Merlin Ventures Cyber Hygiene, Integrated Risk Management, Security Operations Homepage /by Rob Smelik
Real-time, full-stack artificial intelligence for IT Operations

Centerity is a leading AIOps platform for on-premises, cloud, and hybrid environments. The platform seamlessly gathers and organizes data from complex IT, IoT, and IIoT assets into dynamic business service dashboards. These assets include all applications and IT and operational systems throughout the technology stack that support business services.
Centerity collects and correlates key metrics across the enterprise to ensure the availability, performance, and security of critical digital business processes. Continually evaluating against established service-level agreements while incorporating artificial intelligence and machine learning, the platform analytically and proactively guarantees that critical service level objectives are met. The result is a data-rich solution that reduces mean time to repair (MTTR) by up to 80 percent.

A Comprehensive Way to Deliver Business Value Across the Tech Stack
Centerity is the only enterprise-class AIOps platform that provides end-to-end visibility into any technical environment followed by real-time visualization of all technology-enabled business services. Through Centerity, administrators, managers, and executives can improve collaboration throughout their organizations while maintaining quality and achieving business goals. With Centerity, enterprises enhance:
Key Features and Benefits
Visibility
Examine your entire enterprise across a complex ecosystem of IT, IoT and IIoT assets
Connections
Map the relationships within complex multi-cloud environments
Mitigation
Get clear insights into application performance and infrastructure to resolve issues
Clarity
Get a full view of the risk to your organization
Prevention
Be proactive and smarter when developing remediation and prevention capabilities
Video - Overview
Video - Drawing the Future of Cybersecurity With Nicole Eagan
Additional Materials
Industry Report Names Centerity a Top Value Leader for AIOps
View PDF
Cyber Hygiene White Paper: If Tools Could Talk
View PDF
Data Sheet: CyberOps – Eliminating Internet Exposed Asset Risk
View PDF
Request a Centerity Demo
Use Cases
Markets
Partners
Insights
This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.
Accept settingsSettingsCookie and Privacy Settings
We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refuseing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
You can read about our cookies and privacy settings in detail on our Privacy Policy Page.
Privacy Policy