{"id":410,"date":"2020-01-07T17:39:00","date_gmt":"2020-01-07T17:39:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=410"},"modified":"2024-08-02T08:55:15","modified_gmt":"2024-08-02T15:55:15","slug":"cycognito-named-a-cybersecurity-vendor-to-watch","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/","title":{"rendered":"CyCognito Named a \u201cCybersecurity Vendor to Watch\u201d"},"content":{"rendered":"\n<p>CyCognito ended 2019 with bang by making two key announcements: The\u00a0<a href=\"\/news\/press-releases\/cycognito-announces-next-generation-platform.php\" target=\"_blank\" rel=\"noreferrer noopener\">availability of the next-generation CyCognito platform<\/a>\u00a0and\u00a0<a href=\"\/news\/press-releases\/cycognito-secures-23-million-in-funding.php\" target=\"_blank\" rel=\"noreferrer noopener\">securing a total of $23 million<\/a>\u00a0in funding. These announcements caused a ripple among investor community and cybersecurity executives.<\/p>\n\n\n\n<p>And the momentum keeps building\u2026<\/p>\n\n\n\n<p>As the new year began, we burst out of the gate by being named one of the \u201c<a href=\"https:\/\/searchsecurity.techtarget.com\/news\/252476306\/5-cybersecurity-vendors-to-watch-in-2020\">5 Cybersecurity Vendors to Watch in 2020<\/a>\u201d by TechTarget. Take a few minutes to read the article with its observations about emerging security technologies and prediction that the $53+ billion of global investments in cybersecurity companies will continue to grow.<\/p>\n\n\n\n<p>The article highlights the premise behind CyCognito&#8217;s founding: that the best way to defend against cyberattacks is to see what potential attackers see. Says Rob Gurzeev, CyCognito CEO and Co-Founder:<\/p>\n\n\n\n<p><em>&#8220;We understood and learned that this reconnaissance process is what gives attackers [an] advantage over the defenders every single time, and no matter how many tens of millions of dollars you invest in defending the assets you know, it&#8217;s the assets you don&#8217;t know or don&#8217;t control that will eventually be targeted by attackers,&#8221; Gurzeev said.<\/em><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/searchsecurity.techtarget.com\/news\/252476306\/5-cybersecurity-vendors-to-watch-in-2020\" target=\"_blank\" rel=\"noreferrer noopener\">READ FULL ARTICLE ONLINE AT TECHTARGET &gt;&gt;<\/a><\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1224\" height=\"1584\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito_Data_Sheet_Vulnerability_Management.png\" alt=\"\" class=\"wp-image-411\" style=\"width:295px;height:auto\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito_Data_Sheet_Vulnerability_Management.png 1224w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito_Data_Sheet_Vulnerability_Management-396x512.png 396w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito_Data_Sheet_Vulnerability_Management-768x994.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito_Data_Sheet_Vulnerability_Management-1187x1536.png 1187w\" sizes=\"auto, (max-width: 1224px) 100vw, 1224px\" \/><\/figure><\/div>\n\n\n<h5 class=\"wp-block-heading\">Learn More About Our Capabilities<\/h5>\n\n\n\n<p><a href=\"\/resources\/datasheets\/vulnerability-management-with-the-cycognito-platform\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read our online data sheet<\/a>\u00a0to see how our discovery engine uses graph data modeling to map your organization\u2019s full attack surface. Review our core capabilities, key features and what differentiates us from legacy security tools.\u00a0\u00a0<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">SEE HOW OUR CUSTOMERS USE THE CYCOGNITO PLATFORM<br><br><a href=\"\/learn\/attack-surface-discovery.php\">Attack Surface Asset Management<\/a><\/h5>\n\n\n\n<p>Identify attacker-exposed assets in your IT ecosystem for a complete view of your attack surface. Most organizations identify 30 to 300% more assets than they knew existed prior to using the CyCognito platform.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Risk-based Vulnerability Management<\/h5>\n\n\n\n<p>Maintain an updated, prioritized view of your attacker-exposed IT ecosystem and pinpoint critical exposures just as attackers do so you can focus remediation efforts on the areas of greatest risk.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">IT Ecosystem Risk Monitoring<\/h5>\n\n\n\n<p>Discover and prioritize security risks introduced by your subsidiaries, partners, M&amp;A candidates and cloud services. Risks are graded to help you identify which parts of your IT ecosystem leave your organization most exposed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2020 is on target to be another banner year as we burst of the gate with being named one of the \u201cCybersecurity Vendors to Watch in 2020\u201d by TechTarget.<\/p>\n","protected":false},"author":22,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[9,127,49],"class_list":["post-410","post","type-post","status-publish","format-standard","hentry","category-company","tag-cybersecurity","tag-techtarget","tag-vulnerability-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CyCognito Named a \u201cCybersecurity Vendor to Watch\u201d | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyCognito Named a \u201cCybersecurity Vendor to Watch\u201d | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"2020 is on target to be another banner year as we burst of the gate with being named one of the \u201cCybersecurity Vendors to Watch in 2020\u201d by TechTarget.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-07T17:39:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-02T15:55:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito_Data_Sheet_Vulnerability_Management.png\" \/>\n<meta name=\"author\" content=\"Raphael Reich\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Raphael Reich\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/\"},\"author\":{\"name\":\"Raphael Reich\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/5fc71e29aa32c6153db0b1cbcfd395a7\"},\"headline\":\"CyCognito Named a \u201cCybersecurity Vendor to Watch\u201d\",\"datePublished\":\"2020-01-07T17:39:00+00:00\",\"dateModified\":\"2024-08-02T15:55:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/\"},\"wordCount\":356,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito_Data_Sheet_Vulnerability_Management.png\",\"keywords\":[\"Cybersecurity\",\"TechTarget\",\"Vulnerability Management\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/\",\"name\":\"CyCognito Named a \u201cCybersecurity Vendor to Watch\u201d | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito_Data_Sheet_Vulnerability_Management.png\",\"datePublished\":\"2020-01-07T17:39:00+00:00\",\"dateModified\":\"2024-08-02T15:55:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito_Data_Sheet_Vulnerability_Management.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito_Data_Sheet_Vulnerability_Management.png\",\"width\":1224,\"height\":1584},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CyCognito Named a \u201cCybersecurity Vendor to Watch\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/5fc71e29aa32c6153db0b1cbcfd395a7\",\"name\":\"Raphael Reich\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a187c2484d7ae7c4068cf1f26c507972?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a187c2484d7ae7c4068cf1f26c507972?s=96&d=mm&r=g\",\"caption\":\"Raphael Reich\"},\"description\":\"Was Vice President of Marketing at CyCognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/raphael-reich\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CyCognito Named a \u201cCybersecurity Vendor to Watch\u201d | CyCognito Blog","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_US","og_type":"article","og_title":"CyCognito Named a \u201cCybersecurity Vendor to Watch\u201d | CyCognito Blog","og_description":"2020 is on target to be another banner year as we burst of the gate with being named one of the \u201cCybersecurity Vendors to Watch in 2020\u201d by TechTarget.","og_url":"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/","og_site_name":"CyCognito Blog","article_published_time":"2020-01-07T17:39:00+00:00","article_modified_time":"2024-08-02T15:55:15+00:00","og_image":[{"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito_Data_Sheet_Vulnerability_Management.png","type":"","width":"","height":""}],"author":"Raphael Reich","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Raphael Reich","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/"},"author":{"name":"Raphael Reich","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/5fc71e29aa32c6153db0b1cbcfd395a7"},"headline":"CyCognito Named a \u201cCybersecurity Vendor to Watch\u201d","datePublished":"2020-01-07T17:39:00+00:00","dateModified":"2024-08-02T15:55:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/"},"wordCount":356,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito_Data_Sheet_Vulnerability_Management.png","keywords":["Cybersecurity","TechTarget","Vulnerability Management"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/","url":"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/","name":"CyCognito Named a \u201cCybersecurity Vendor to Watch\u201d | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito_Data_Sheet_Vulnerability_Management.png","datePublished":"2020-01-07T17:39:00+00:00","dateModified":"2024-08-02T15:55:15+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito_Data_Sheet_Vulnerability_Management.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito_Data_Sheet_Vulnerability_Management.png","width":1224,"height":1584},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/cycognito-named-a-cybersecurity-vendor-to-watch\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CyCognito Named a \u201cCybersecurity Vendor to Watch\u201d"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/5fc71e29aa32c6153db0b1cbcfd395a7","name":"Raphael Reich","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a187c2484d7ae7c4068cf1f26c507972?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a187c2484d7ae7c4068cf1f26c507972?s=96&d=mm&r=g","caption":"Raphael Reich"},"description":"Was Vice President of Marketing at CyCognito","url":"https:\/\/www.cycognito.com\/blog\/author\/raphael-reich\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=410"}],"version-history":[{"count":3,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/410\/revisions"}],"predecessor-version":[{"id":595,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/410\/revisions\/595"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=410"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=410"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}