Promote this Nomination
|Company size (employees)||500 to 999|
In 3 bullets, summarize why this company is different from the competition and deserves recognition:
• Group-IB has a stack of сutting-edge technologies patented worldwide: 33 patents in the USA, the Netherlands, Singapore, and Russia.
Group-IB is one of the global leaders in providing high‑fidelity Threat Hunting & Intelligence, best‑in‑class anti‑fraud solutions and high-profile cyber investigations. Our mission is to protect clients in cyberspace using a wide range of innovative products and services that prevent cybercrimes and protect any organizational assets.
Group-IB has a stack of сutting-edge patented technologies: 33 patents in the USA, the Netherlands, Singapore, and Russia.
Our cutting-edge technology is used worldwide and has been recognized by top industry researchers. Notably, the Group-IB Threat Intelligence & Attribution system has been named one of the best in class by Gartner, Forrester, and IDC, while Group-IB Threat Hunting Framework has been recognized as one of the leaders in Network Detection and Response. Group-IB Fraud Hunting Platform has also been recognized by Gartner as a Representative Vendor of online fraud detection.
Group-IB’s technological leadership is built on over 1,200 cybercrime investigations and 65,000 hours of cybersecurity incident response around the world. Our IR capabilities are supported by our forensic laboratory and CERT-GIB, which has been officially authorized by Carnegie Mellon University and accredited by the international communities FIRST, Trusted Introducer, and OIC-CERT.
Threat Intelligence & Attribution (TI&A) is one of Group-IB’s most heavily loaded innovative systems, which operates a multitude of data on hacker groups, their tools, and their infrastructure. Group-IB TI&A is a sophisticated engineering solution integrated into a smart technology ecosystem, which provides a new class solution for detecting organization-specific threat, adversary data collection, analyzing and proactively hunting for hackers combined with securing network infrastructure.