www.bluevoyant.com Open in urlscan Pro
2606:4700::6812:886  Public Scan

URL: https://www.bluevoyant.com/press-releases/bluevoyant-acquires-conquest-cyber
Submission: On July 16 via api from US — Scanned from CA

Form analysis 0 forms found in the DOM

Text Content

THIS WEBSITE USES COOKIES

We use cookies to personalize content and ads, to provide social media features
and to analyze our traffic. We also share information about your use of our site
with our social media, advertising and analytics partners who may combine it
with other information that you’ve provided to them or that they’ve collected
from your use of their services.
Do not sell or share my personal information
Deny Allow all Show details
OK
Deny Allow selection Allow all
Necessary
Preferences
Statistics
Marketing
Show details
Cookie declaration [#IABV2SETTINGS#] About
 Necessary (10)  Preferences (2)  Statistics (7)  Marketing (14)  Unclassified
(1)
Necessary cookies help make a website usable by enabling basic functions like
page navigation and access to secure areas of the website. The website cannot
function properly without these cookies.

NameProviderPurposeExpiryType__cf_bmbluevoyant.comThis cookie is used to
distinguish between humans and bots. This is beneficial for the website, in
order to make valid reports on the use of their website.1 dayHTTP
Cookierc::aGoogleThis cookie is used to distinguish between humans and bots.
This is beneficial for the website, in order to make valid reports on the use of
their website.PersistentHTML Local Storagerc::cGoogleThis cookie is used to
distinguish between humans and bots. SessionHTML Local
Storageli_gcLinkedInStores the user's cookie consent state for the current
domain180 daysHTTP CookieCookieConsent [x2]CookiebotStores the user's cookie
consent state for the current domain1 yearHTTP
Cookievisitor_id#-hash [x3]www2.bluevoyant.com
PardotUsed to encrypt and contain visitor data. This is necessary for the
security of the user data. 1 yearHTTP CookiebscookieLinkedInThis cookie is used
to identify the visitor through an application. This allows the visitor to login
to a website through their LinkedIn application for example.1 yearHTTP Cookie

Preference cookies enable a website to remember information that changes the way
the website behaves or looks, like your preferred language or the region that
you are in.

NameProviderPurposeExpiryTypevidyardSettingsVidyardUsed to determine the optimal
video quality based on the visitor's device and network settings. PersistentHTML
Local StorageCookieConsentBulkSetting-#CookiebotEnables cookie consent across
multiple websites1 yearHTML Local Storage

Statistic cookies help website owners to understand how visitors interact with
websites by collecting and reporting information anonymously.

NameProviderPurposeExpiryTypevisitorIdVidyardRegisters statistical data on
users' behaviour on the website. Used for internal analytics by the website
operator. PersistentHTML Local Storage_gaGoogleRegisters a unique ID that is
used to generate statistical data on how the visitor uses the website.2
yearsHTTP Cookie_ga_#GoogleUsed by Google Analytics to collect data on the
number of times a user has visited the website as well as dates for the first
and most recent visit. 2 yearsHTTP Cookie_gatGoogleUsed by Google Analytics to
throttle request rate1 dayHTTP Cookie_gidGoogleRegisters a unique ID that is
used to generate statistical data on how the visitor uses the website.1 dayHTTP
CookiecollectGoogleUsed to send data to Google Analytics about the visitor's
device and behavior. Tracks the visitor across devices and marketing
channels.SessionPixel TrackerAnalyticsSyncHistoryLinkedInUsed in connection with
data-synchronization with third-party analysis service. 30 daysHTTP Cookie

Marketing cookies are used to track visitors across websites. The intention is
to display ads that are relevant and engaging for the individual user and
thereby more valuable for publishers and third party advertisers.

NameProviderPurposeExpiryTypev1/beacon/img.gifb.6sc.coUsed in context with
Account-Based-Marketing (ABM). The cookie registers data such as IP-addresses,
time spent on the website and page requests for the visit. This is used for
retargeting of multiple users rooting from the same IP-addresses. ABM usually
facilitates B2B marketing purposes.SessionPixel
Trackerads/ga-audiencesGoogleUsed by Google AdWords to re-engage visitors that
are likely to convert to customers based on the visitor's online behaviour
across websites.SessionPixel TrackerbcookieLinkedInUsed by the social networking
service, LinkedIn, for tracking the use of embedded services.1 yearHTTP
Cookieli_sugrLinkedInCollects data on user behaviour and interaction in order to
optimize the website and make advertisement on the website more relevant. 3
monthsHTTP CookielidcLinkedInUsed by the social networking service, LinkedIn,
for tracking the use of embedded services.1 dayHTTP
CookieUserMatchHistoryLinkedInEnsures visitor browsing-security by preventing
cross-site request forgery. This cookie is essential for the security of the
website and visitor. 30 daysHTTP Cookiepardot [x2]Pardot
www2.bluevoyant.comUsed in context with Account-Based-Marketing (ABM). The
cookie registers data such as IP-addresses, time spent on the website and page
requests for the visit. This is used for retargeting of multiple users rooting
from the same IP-addresses. ABM usually facilitates B2B marketing
purposes.SessionHTTP Cookievisitor_id# [x3]Pardot
www2.bluevoyant.comUsed in context with Account-Based-Marketing (ABM). The
cookie registers data such as IP-addresses, time spent on the website and page
requests for the visit. This is used for retargeting of multiple users rooting
from the same IP-addresses. ABM usually facilitates B2B marketing purposes.1
yearHTTP Cookie_gd_sessionj.6sc.coCollects visitor data related to the user's
visits to the website, such as the number of visits, average time spent on the
website and what pages have been loaded, with the purpose of displaying targeted
ads.1 dayHTTP Cookie_gd_visitorj.6sc.coCollects visitor data related to the
user's visits to the website, such as the number of visits, average time spent
on the website and what pages have been loaded, with the purpose of displaying
targeted ads.2 yearsHTTP Cookielpv#www2.bluevoyant.comUsed in context with
behavioral tracking by the website. The cookie registers the user’s behavior and
navigation across multiple websites and ensures that no tracking errors occur
when the user has multiple browser-tabs open. 1 dayHTTP Cookie

Unclassified cookies are cookies that we are in the process of classifying,
together with the providers of individual cookies.

NameProviderPurposeExpiryType{"words":[#,#,#,#,#],"sigBytes":20}VidyardPendingPersistentHTML
Local Storage

 [#IABV2_LABEL_PURPOSES#]  [#IABV2_LABEL_FEATURES#]  [#IABV2_LABEL_PARTNERS#]
[#IABV2_BODY_PURPOSES#]
[#IABV2_BODY_FEATURES#]
[#IABV2_BODY_PARTNERS#]
Cookies are small text files that can be used by websites to make a user's
experience more efficient.

The law states that we can store cookies on your device if they are strictly
necessary for the operation of this site. For all other types of cookies we need
your permission.

This site uses different types of cookies. Some cookies are placed by third
party services that appear on our pages.

You can at any time change or withdraw your consent from the Cookie Declaration
on our website.

Learn more about who we are, how you can contact us and how we process personal
data in our Privacy Policy.

Please state your consent ID and date when you contact us regarding your
consent.

Your consent applies to the following domains: www2.bluevoyant.com,
www.bluevoyant.com


Cookie declaration last updated on 2024-07-01 by Cookiebot


BLUEVOYANT

Menu
 * Platform & Solutions
 * Resources
 * Partners
 * Company

Platform & Solutions
 * Detection & Response
   
    * DETECTION & RESPONSE
      
      
    * MXDR for Microsoft
    * Solutions
    * Assessments
    * Deployment Services
    * Manage & Monitor
    * MXDR for Splunk
    * Solutions
    * Assessments
    * Deployment Services
    * Manage & Monitor
    * DFIR
    * Solutions
    * Digital Forensics and Incident Response Retainer
    * Incident Response
    * Digital Forensics

 * Supply Chain Defense
   
    * SUPPLY CHAIN DEFENSE
      
      
    * Continuous Monitoring & Remediation
    * Solutions
    * Analyst-Directed Remediation
    * Tiered Vendor Risk Analysis
    * Zero-Day & Emerging Vulnerability Alerting
    * Fourth-Party Identification and Analytics
    * Questionnaire Management
    * Solutions
    * Questionnaire Management & Response Validation
    * Questionnaire Managed Service
    * Point-in-Time Risk Assessments
    * Solutions
    * Due Diligence Reports
    * Pre-Procurement Reports
    * Vendor Risk Program Consulting
    * Solutions
    * Client Advisory Workshops
    * Vendor Cyber Risk Consulting

 * Digital Risk Protection
   
    * DIGITAL RISK PROTECTION
      
      
    * Brand Protection
    * Solutions
    * Web Impersonation
    * Social Media Impersonation
    * App Impersonation
    * Dark Web Watcher
    * Solutions
    * Fraud Campaign Discovery
    * Account Takeover Monitoring
    * Data Leakage Detection
    * Executive Cyber Guard
    * 

 * Cyber Posture Management
   
    * CYBER POSTURE MANAGEMENT
      
      
    * Cyber Posture Management
    * Solutions
    * Virtual CISO
    * Readiness Services

 * Proactive Defense
   
    * PROACTIVE DEFENSE
      
      
    * Proactive Defense
    * Solutions
    * VISIBL Vulnerability Identification Services
    * Offensive Cybersecurity Services

Resources


 * RESOURCES
   
   Our library of resources cover a variety of cyber defense topics.

 * Resources
 * Learning Center

Resources
 * Blogs
 * Case Studies
 * eBooks
 * Reports
 * Solution Briefs
 * Webinars
 * White Papers
 * Videos
 * View All Resources

Learning Center
 * Cybercrime
 * Cyber Threats
 * Data Leakage
 * Digital Brand Protection
 * Digital Forensics
 * Endpoint Security
 * Incident Response
 * MDR Security
 * Microsoft Security
 * Penetration Testing
 * Security Operations Center
 * SOAR Security
 * Splunk SIEM
 * Third-Party Risk Management
 * Threat Intelligence
 * Vulnerability Testing
 * XDR
 * View All Guides

Partners
 * Technology Partners
 * Partners Overview
 * Microsoft

Company
 * Leadership
 * Careers
 * News
 * Press Releases
 * Events
 * Company Overview
 * Awards

 * Blog
 * Contact us
 * Customer login
 * Request a demo

Skip to main content
BlueVoyant
 * Blog
 * Contact us
 * Customer login

 * Platform & SolutionsOpen Platform & Solutions
 * ResourcesOpen Resources
 * PartnersOpen Partners
 * CompanyOpen Company
 * Request a demo


BLUEVOYANT

Menu


BLUEVOYANT

Menu Placeholder
 1. Press Releases


BLUEVOYANT ACQUIRES CONQUEST CYBER TO MEET MARKET NEED FOR COMPREHENSIVE MANAGED
DETECTION AND RESPONSE AND CYBER RISK POSTURE SOLUTIONS

November 29, 2023

The acquisition unites Conquest Cyber's advanced SaaS technologies with
BlueVoyant's premier internal and external cyber defense solutions, creating a
comprehensive cyber risk management platform tailored for both enterprise and
highly-regulated environments

NEW YORK, November 29, 2023 — BlueVoyant, a cybersecurity company that
illuminates, validates, and mitigates internal and external risks, today
announced the acquisition of Conquest Cyber, a cyber defense company renowned
for its innovative SaaS technology that streamlines risk management across an
organization's entire cyber program. Conquest Cyber has proven successful within
high-security environments, including the U.S. Defense Industrial Base (DIB) and
Government organizations.

BlueVoyant raised more than $140 million in Series E funding to accompany the
acquisition of Conquest Cyber. The additional funding was led by existing
investors, Liberty Strategic Capital, a private equity firm, and ISTARI, a
cybersecurity investor and advisor founded by Temasek. Eden Global Capital
Partners, an affiliate of Eden Global Partners, served as a strategic advisor.

Many cybersecurity vendors offer point solutions but often fail to provide
comprehensive solutions that address assessing, operationalizing, verifying, and
remediating risk. Combining BlueVoyant and Conquest Cyber’s capabilities fills
this critical void.

Conquest Cyber's SaaS technology modernizes risk management with a platform that
unifies an organization's entire cyber risk management program. This innovative
approach integrates security posture, compliance, detection, and response,
offering an unmatched level of insight and control through a unique risk
maturity, visibility, and mitigation lens. This enables the visualization and
mitigation of risks across regulatory frameworks such as CMMC, while also
emphasizing the importance of active security posture management, detection, and
response operations. BlueVoyant will integrate Conquest Cyber’s technology into
its existing products and services to create the first solution to deliver
comprehensive internal and external cyber defense mapped to risk maturity.

“Despite the extensive range of cybersecurity vendors, a significant gap
persists in the market concerning comprehensive solutions that empower clients
to assess, operationalize, validate, and mitigate risks,” said James Rosenthal,
CEO and co-founder of BlueVoyant. “The integration of BlueVoyant's and Conquest
Cyber's capabilities addresses this shortfall, bolstering our ability to protect
clients' internal and external digital ecosystems in a more comprehensive
manner.”

The acquisition and enhanced capabilities come at a critical time for
high-security areas such as the Defense Industrial Base and Government sector.
The U.S. Department of Defense is set to enforce new cybersecurity rules, CMMC
2.0, while State and Local Governments face a surge in cyber incidents. The
integrated BlueVoyant solutions, enhanced by Conquest Cyber’s expertise, will
help clients mitigate risks while meeting new requirements.

“Conquest Cyber has built its powerful reputation from building technology that
helps secure the sectors critical to our ways of life,” said Jeffrey J. Engle,
chairman and president of Conquest Cyber. “We pride ourselves on providing
radical transparency to key decision-makers within high-security organizations
to enhance their cybersecurity posture and digital resiliency through risk
informed protection, detection, and response at machine speeds. We are excited
to join forces with BlueVoyant and combine our expertise to continue to ensure
customers have modern solutions for their unique cybersecurity needs.”

Both companies have earned recognition from Microsoft for their expertise and
collaborative efforts in protecting shared clients. Conquest Cyber was named the
Microsoft Partner of the Year for U.S. Defense and Intelligence in 2022.
BlueVoyant received the title of Microsoft Security U.S. Partner of the Year in
both 2023 and 2022, was named the Security MSSP (Managed Security Service
Provider) of the Year in the Microsoft Security Excellence Awards 2023, and Top
MDR (Managed Detection and Response) Team in 2021. Both companies have achieved
Microsoft Verified Managed XDR Solution Status. Furthermore, Conquest enhances
BlueVoyant’s already extensive Microsoft security capabilities, including
Defender for Cloud, Purview for Compliance, Defender for Vulnerability
Management, and more.

Conquest Cyber and BlueVoyant both hold CMMC Registered Provider Organization
(RPO) accreditation. Conquest Cyber’s ARMED ATK solution is on the FedRAMP
marketplace.

About Conquest Cyber

Conquest is an elite cybersecurity company that protects our nation’s critical
infrastructure sectors with a focus on the Defense Industrial Base, State and
Local Government, and Federal Government. Conquest helps companies achieve cyber
resilience through adaptive risk management. The company’s cutting-edge SaaS
platform and world-class customer service provide transparency, precision
control, and 24/7 protection through their flagship product ARMED ATK™ –
creating a competitive advantage for their customers on the new frontline for
freedom that Conquest has deemed The Thin Digital Line (TDL).

About BlueVoyant

BlueVoyant combines internal and external cyber defense capabilities into
outcomes-based, cloud-native cybersecurity solution by continuously monitoring
your network, endpoints, attack surface, and supply chain, as well as the clear,
deep, and dark web for threats. The full-spectrum cyber defense products and
services illuminate, validate, and quickly remediate threats to protect your
enterprise. BlueVoyant leverages both machine-learning-driven automation and
human-led expertise to deliver industry-leading cybersecurity to more than 900
clients across the globe.

BlueVoyant Press Contact:

Jennifer Schlesinger

+1 (201) 397-4976

jenny.schlesinger@bluevoyant.com

Learn more in the video

SHARE

Facebook Twitter LinkedIn


RELATED READING

 * Press Release
   
   BLUEVOYANT NAMED TO MES MIDMARKET 100 LIST FOR THE THIRD CONSECUTIVE YEAR
   
   July 16, 2024
   
   

 * Press Release
   
   BLUEVOYANT UNVEILS LEADING-EDGE SECURITY OPERATIONS PLATFORM
   
   July 15, 2024
   
   

 * Press Release
   
   BLUEVOYANT RECOGNIZED AS THE WINNER OF 2024 MICROSOFT WORLDWIDE SECURITY
   PARTNER OF THE YEAR
   
   June 28, 2024
   
   

PLATFORM

 * Detection & Response
   * MXDR for Microsoft
   * MXDR for Splunk
 * Supply Chain Defense
 * Digital Risk Protection
 * Cyber Posture Management
 * Proactive Defense

RESOURCES

 * eBooks
 * Solution Briefs
 * Infographics
 * Reports
 * Videos
 * Webinars
 * White Papers
 * Blog

PARTNERS

 * Technology Partners
 * Partners Overview
 * Microsoft

COMPANY

 * Leadership
 * Careers
 * News
 * Press Releases
 * Events
 * Company Overview
 * Awards
 * Government

CONTACT

 * Incident Response
 * Customer Login
 * Partner Login

BlueVoyant

 * Request a Demo
 * Contact Us

Visit BlueVoyant on LinkedIn Visit BlueVoyant on Twitter Visit BlueVoyant on
Youtube
335 Madison Ave, Suite 5G
New York, NY 10017
contact@bluevoyant.com

© Copyright 2024 BlueVoyant

 * Cookie Policy
 * Privacy Policy & Legal Notice
 * Trust