www.enterprisesecuritymag.com Open in urlscan Pro
52.26.133.50  Public Scan

Submitted URL: https://nds.naids.ibm.com/t/11687/c/0f1fdd42-83b9-496c-9bdd-0e32319c76b7/NB2HI4DTHIXS653XO4XGK3TUMVZHA4TJONSXGZLDOVZGS5DZN...
Effective URL: https://www.enterprisesecuritymag.com/news/reaqta-named-a-cool-vendor-by-gartner-pnid-78.html
Submission: On May 12 via manual from ES — Scanned from ES

Form analysis 2 forms found in the DOM

POST /searchnews.php

<form class="form-wrapper-2 cf" method="post" action="/searchnews.php" id="searchform" autocomplete="off" style="display: inline-block;position: relative;z-index: 999999999;">
  <input type="text" placeholder="Search here..." id="newssearchval" name="newssearchval" class="ft" onfocus="if(this.value=='Search') this.value='';" onblur="if(this.value=='') this.value='Search';" value="" onkeyup="return Press_Enter()"><input
    value="search" type="submit" class="fs" id="newssearchval_button">
</form>

<form id="popup_nl">
  <div class="form-group" style="float: left;margin-bottom: 5px;">
    <input type="email" class="form-control" placeholder=" Subscribe to Email Newsletter" id="email">
  </div>
  <a href="javascript:;" onclick="newsletterpop();" id="sb" class="btn btn-primary" style="margin-bottom: 15px !important;">Subscribe</a>
  <p id="sm"></p>
  <p id="picoutput"></p>
  <center> <img src="https://www.enterprisesecuritymag.com/images/load.gif" alt="loading" height="35px" width="35px" style="display:none;" id="load"> </center>
</form>

Text Content

 * Solutions
   * Biometric
   * Blockchain
   * Checkpoint
   * Digital Forensics
   * Encryption
   * Enterprise Fire Protection
   * Fraud and Breach Protection
   * Identity and Access Management
   * Multifactor Authentication
   * Risk and Compliance Management
   * Threat Management
   * Vulnerability Management
 * Application
   * Application Shielding
   * Cloud Security
   * Cyber Security
   * Endpoint Security
   * Enterprise Security Startups
   * Fortinet Platform
   * Managed Security Services (MSS)
   * Mobile Security
   * Security Analytics
   * Security Automation
   * Web Security
   * Zero Trust Security
 * White Papers
 * Conferences
 * Newsletter
 * Subscribe
 * News
 * Contact Us


 * 
 * Solutions
      
    * Biometric
    * Blockchain
    * Checkpoint
    * Digital Forensics
    * Encryption
    * Enterprise Fire Protection
    * Fraud and Breach Protection
    * Identity and Access Management
    * Multifactor Authentication
    * Risk and Compliance Management
    * Threat Management
    * Vulnerability Management

 * Application
      
    * Application Shielding
    * Cloud Security
    * Cyber Security
    * Endpoint Security
    * Enterprise Security Startups
    * Fortinet Platform
    * Managed Security Services (MSS)
    * Mobile Security
    * Security Analytics
    * Security Automation
    * Web Security
    * Zero Trust Security

 * White Papers
   
 * Conferences
   
 * Newsletter
   
 * Subscribe
   
 * News
   
 * 
 * Awards
 * 

US EUROPE APAC AFRICA LATAM ME
US
US
EUROPE
APAC
AFRICA
LATAM
MIDDLE EAST


 * SPECIALS

 * *  * Web Security
     
      * Zero Trust Security
     
      * Application Shielding
     
      * Biometric
     
      * Africa
     
      * Cyber Security Latin America
     
      * Cyber Security Africa
     
      * Threat Intelligence
   
 * Vulnerability Management
 * Endpoint Security
 * Enterprise Security Startups
 * Blockchain
 * Digital Forensics

×

Enterprise Security Mag Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO
interviews of medium and large enterprises exclusively from Enterprise Security
Mag


Subscribe





Home » Home

THANK YOU FOR SUBSCRIBING


REAQTA NAMED A COOL VENDOR BY GARTNER


ENTERPRISE SECURITY MAGAZINE | TUESDAY, NOVEMBER 17, 2020

Share



Amsterdam, Netherlands - ReaQta, a leading provider of Endpoint Security
solutions, today announced it was named Cool Vendor in Network and Endpoint
Security report by Gartner, Inc.
The report notes: “Attackers are becoming more sophisticated and targeting
organizations, carrying out reconnaissance to identify weaknesses in defenses.”
Gartner recommends that security and risk management leaders responsible for
infrastructure security should “evaluate the new and innovative uses of machine
learning (ML) and artificial intelligence (AI) to detect threats based on
learned behavior rather than pretrained models.”
Amidst a rapidly growing EDR market, ReaQta – which has a strong presence in
Europe and Asia – stands out with two main differentiators.
The first is ReaQta s proprietary NanoOS technology which provides deep
visibility into the processes and applications running on endpoints. The NanoOS
sits at the hypervisor layer and protects the endpoint from outside the
operating system, making it invisible to malware and attackers.
The second differentiator is ReaQta’s use of AI and ML in its AI-powered
endpoint security platform, ReaQta-Hive. While other EDR and endpoint solutions
use ML based on pretrained models and analysis, ReaQta’s initial learning model
identifies the normal behaviour of each endpoint, enabling greater accuracy in
detections and alerts when there are deviations from the normal.
Unlike most other vendors that require analysts to monitor events and alerts so
as to identify and augment results, ReaQta does not require the use of any
managed service capabilities for detection.
"I believe ReaQta’s nomination as Gartner's Cool Vendor in Network and Endpoint
Security confirms our ability to deliver cutting-edge technology to keep our
customers safe from advanced cyber attacks,” said Alberto Pelliccione, CEO of
ReaQta.
"We continue to push the boundaries of innovation to stay ahead of the steep
increase in attack sophistication. With ReaQta-Hive, we are making the entire
process of detection and response completely real-time and automated. Today’s
attackers are moving fast, so a new approach is necessary to ensure that the
risk of damages and data loss are reduced as much as possible.”
ReaQta-Hive allows its users to detect and block sophisticated, unknown threats
ranging from ransomware to fileless and in-memory attacks. The addition of
proactive threat hunting capabilities enable the discovery of hidden threats
within the infrastructure that go undetected by legacy solutions.
Gartner Disclaimer: Gartner does not endorse any vendor, product or service
depicted in our research publications, and does not advise technology users to
select only those vendors with the highest ratings or other designation. Gartner
research publications consist of the opinions of Gartner's research organization
and should not be construed as statements of fact. Gartner disclaims all
warranties, expressed or implied, with respect to this research, including any
warranties of merchantability or fitness for a particular purpose.


FINANCIAL

ON THE DECK

Identity and Access Management 2022

Top Vendors

Digital Forensics 2022

Top Vendors

Previous Next



READ ALSO


SECURITY CONSIDERATIONS FOR PROTECTING THE WEB SECURITY




WHAT ARE THE DIFFERENT TYPES OF SECURITY TESTS? AND WHY IT IS...




THE COMPONENTS OF CYBERSECURITY TO SECURE TECHNOLOGY INFRASTRUCTURE...




WHY IS ENDPOINT SECURITY SO CRUCIAL FOR ORGANIZATIONS?




COMODO AND DISTILOGIX TO OFFER ZERO TRUST ENDPOINT PROTECTION IN...




BENEFITS OF HAVING A ZERO TRUST NETWORK





I agree We use cookies on this website to enhance your user experience. By
clicking any link on this page you are giving your consent for us to set
cookies. More info

 * Back to top

Copyright © 2022 Enterprise Security. All rights reserved | Sitemap| Privacy
Policy | Contact Us

This content is copyright protected

However, if you would like to share the information in this article, you may use
the link below:

www.enterprisesecuritymag.com/news/reaqta-named-a-cool-vendor-by-gartner-pnid-78.html


TEXTO ORIGINAL


Sugiere una traducción mejor

--------------------------------------------------------------------------------