Promote this Nomination

Additional Info

Company size (employees)10 to 49
Headquarters RegionNorth America

In 3 bullets, summarize why this company is different from the competition and deserves recognition:

• While many vendors are trying to take legacy solutions and "snap on" artificial intelligence or machine learning capabilities, SlashNext was designed from the ground-up to simulate and automate the work of a thousand researchers. Everything the system does is based on a human action, including what they would look for or what they would do to test their findings. The major difference is that those actions are performed by smart machines who continue to learn based on previous decisions and results.
• The SlashNext service is designed for any organization who doesn't have dozens of dedicated security researchers. Our mission is to alleviate the IT team who needs to uplevel their security posture with advanced threat detection for their employees.
• The SlashNext service is easy to deploy - in fact, our promise is that the system is up and running in 20 minutes. We also know we detect things other systems are not catching. Within the first 30 days, if we don't catch something that a sandbox or other threat detection tool missed, we won't charge a penny for the service!

Brief Overview

In the past year, SlashNext received its first round of funding and launched the SlashNext Internet Access Protection System. The system blocks social engineering and phishing attacks by putting a human-like machine against attackers to protect organizations from cross platform social engineering and phishing, malware, exploits and callback attacks. The SlashNext system goes beyond previous generations, including network-based, signature-based and sandbox-based technologies by deploying human-like intelligence and cognitive thinking to stop Internet attacks that target unsuspecting employees as their entry points. The SlashNext solution is deployed via a simple, 20-minute installation process that requires zero policy configuration or ongoing maintenance. Once installed, the system employs a patent pending threat protection technology that includes a cross platform protocol analysis engine that processes gigabits of Internet-bound traffic in real-time to extract a complex set of artifacts. These artifacts are essentially the telltale signs of a malicious attack. The artifacts are further processed by a cognitive computing machine that uses massive cloud computing power to convert these features into clear Indicators of Compromise (IOCs). The IOCs are then handed over to hundreds of reasoning engines that behave like a team of decision-makers working together to reach a single verdict, “100% Malicious” or “Not Malicious.” Once a decision is made, the final outcome is shared back with all the decision makers as part of a peer feedback mechanism that gives the system its unique self-learning capability. This process is a huge contrast to machine learning-based systems that need to be manually trained repeatedly by data scientists and an exact replication of a team of human threat researchers who process raw data, compile evidence, analyze using cognition, discuss and then collectively reach a decision.