Company Overview of 21CT, Inc.
21CT, Inc. provides data analytics and visualization solutions. The company offers LYNXeon, an investigative analytics and pattern detection solution for cyber security and anti-fraud applications. It also offers network security solutions, including actionable security intelligence, security analytics and visualization, advanced threat detection, cybersecurity analysis, netflow analysis, digital forensics investigation, big data analytics, and predictive analytics. In addition, the company provides fraud detection solutions, such as fraud detection analytics, healthcare fraud detection, data mining and Medicaid fraud detection, big data analytics, intelligence analysis, and predictive analy...
6011 West Courtyard Drive
Austin, TX 78730
Founded in 1999
Key Executives for 21CT, Inc.
Vice President of Finance & Accounting
Chief Operating Officer and Chief Product Officer
CISO and Vice President of Analysis Services
Compensation as of Fiscal Year 2014.
21CT, Inc. Key Developments
21CT, Inc. Presents at AGC Partner's 10th Annual West Coast InfoSec and Emerging Growth Conference, Feb-24-2014 09:30 AM
Feb 10 14
21CT, Inc. Presents at AGC Partner's 10th Annual West Coast InfoSec and Emerging Growth Conference, Feb-24-2014 09:30 AM. Venue: Westin San Francisco Market Street, Metropolitan III - 2(nd) Floor, 50 Third Street, San Francisco, CA 94103, United States. Speakers: Robert WIlliams, Chief Product Officer.
21CT Releases Sourcefire Data Connector for LYNXeon
Apr 24 13
21CT Inc. introduced the Sourcefire Data Connector for LYNXeon, the investigative analytics and pattern detection solution for operational security insight. Using LYNXeon, organizations collect all network data, including critical alerts and logs generated from Sourcefire solutions, and fuse them together. As a result, network security teams can visualize the interconnected patterns between once disparate information and immediately use that insight to discover never before seen incident patterns and detect embedded cyber attackers. Intrusion Detection and Prevention Systems (IDS/IPS) such as Sourcefire excel at detecting malicious behavior and providing alerts that immediately stimulate incident response activity from a cyber security analyst team. Using LYNXeon in parallel with Sourcefire, security analysts not only can see the intelligence provided by the alerts but can now connect this event data with other sources in order to determine what happened before or after the trigger point, reduce root cause analysis time, and determine overall incident impact. LYNXeon enhances capabilities for network security analysis and empowers organizations to: gain operational security insight out of network data from IDS/IPS devices such as Sourcefire, flow from NetFlow and IPFix, malware detection solutions, DNS logs, and monitoring systems including Bro, PCAPs and more. Reduce root cause analysis time and determine incident impact with full activity history pre- and post-breach. Identify and examine previously hidden malicious behavior to create active cyber defense and go head-to-head against the adversaries.
21CT Inc. Announces Enhanced Graph Search Capabilities for LYNXeon
Feb 26 13
21CT Inc. announced enhanced graph search capabilities for LYNXeon. Challenged by commodity tools that simply regurgitate log data, enterprises and government organizations need more effective and efficient solutions that can turn big data into big insight. Using the newly enhanced LYNXeon graph search, these organizations now intuitively correlate and visualize data to detect never before seen patterns and gain the operational insight needed to identify embedded cyber attackers, detect fraud, and document criminal behavior. Update to LYNXeon, automatically available to all users under maintenance, enhances capabilities for cyber security analysis, fraud detection analytics, digital forensics investigations, and more, including: Graph Search for Powerful Pattern Detection—The enhanced LYNXeon graph search capability provides users with more effective analysis and visualization of data paths and links. Using this graph search allows analysts and investigators to: visualize previously undetectable threats and malicious activity to fortify IT infrastructure; dramatically shorten time-to-detect and increase their ability to investigate potential damage, down to the individual user level, from identified attacks; and shorten time-to-mitigate cycles, preventing any further damage to the infrastructure.
Similar Private Companies By Industry
Recent Private Companies Transactions
|No transactions available in the past 12 months.|