Preempt Blog

The latest insights and advice to keep your company protected from insider threats and breaches

Preempt Security Named the Most Innovative Tech Company of the Year in the 17th Annual International Business Awards®

At Preempt Security, we are excited to be named the winner of a Gold Stevie® Award in the Most Innovative Tech Company of the Year (up to 100 employees) category in the 17th Annual International Business Awards®. 

We competeamongst our peers across industries from around the world. About 250 executives participated in the judging process, going through 3,800 award nominations from small, medium, and large organizations cutting across several industries and verticals. And here we are, sharing the dais (virtually) with organizations such as IBM, HP, LogRhythm, Cadence, and more in this year’s awards. 

With Preempt, organizations can not only detect threats to the identity store, but monitor and respond in real-time with our risk-based Conditional Access technology without logs or endpoint agents. And this is just one of the key differentiators from others in the market. It’s great to see comments like these from the judges: 

  • Detecting encrypted protocol attacks, LDAP anomaly detection, through pre-trained machine learning models, real-time threat detection and enforcement protects enterprises from a variety of sophisticated threats. Conditional Access or step up authentication (e.g. MFA) only when the risk increases – saving users from MFA fatigue, are executed well.”  
  • Extremely Innovative organization, pioneer in detecting encrypted protocol threats without depending on logs alone. Catering to cybersecurity needs of customers from different industry verticals and driving their digital transformation. 

Recently, we got several reviews from our customers on Gartner Peer Insights resonating similar thoughts, with straight 5-star ratings – which goes on to highlight why our customers love Preempt.

Gartner Peer Insights reviews

During these challenging times, Preempt has helped enterprises shift hundreds of thousands of users to remote locations while supporting their requirements to access critical business applications securely, whether from managed or unmanaged endpoints, and improve the user experience with intelligent Conditional Access. 

Topics: CISO,

Posted by Kapil Raina on September 16, 2020 3:40 AM

Product

Brute Force Attacks: Denying the Attacker, Not the User

According tohaveIbeenpwned.com, close to 8 billion accounts have been compromised...

Read More

Developer

What State-Sponsored Attacks Can Teach Us About Conditional Access

People often think that state-sponsored attacks from groups like Lazarus...

Read More

Events

A Simplified Approach to Network Segmentation

Network segmentation has long been one of the most valuable tools for protecting ...

Read More

Research

10 Things You Need to Know About Kerberos

As our research team continues to find vulnerabilities in Microsoft that bypass all major

Read More

Product

Brute Force Attacks: Denying the Attacker, Not the User

According tohaveIbeenpwned.com, close to 8 billion accounts have been compromised...

Read More