search external-link twitter facebook feed google-plus linkedin angle-left angle-right angle-up angle-down youtube-play
Security Orchestration and Automation

Sign up and stay up-to-date.

Home>The Hexadite Blog>Security Orchestration and Automation
Awards /

Hexadite Named a “Breakout Vendor” in Security Automation and Orchestration (SAO) by Independent Research Firm

Today, we’re proud to announce that Hexadite has been named a Breakout Vendor by Forrester, one of the most influential research and advisory firms in the world, in a recent report titled Breakout Vendors: Security Automation and Orchestration (SAO). Organizations are realizing that manual approaches to cybersecurity are no longer sustainable and that technology is […]

Awards /

Adding to the Trophy Case: Hexadite wins 4 ISPG Global Excellence Awards

It’s been an awesome week here at RSA 2017, and we’re psyched to announce that we’ve won four Global Excellence Awards from Info Security Products Guide. Here’s how we fared: Gold Winner – Innovation in Enterprise Security – 11 – 99 Employees Silver Winner – Startup of the Year (11 – 99 Employees) – 2014 Silver […]

In The News /

Hexadite Featured in Momentum Partners Cybersecurity Market Review 2016

Momentum Partners, a boutique Cybersecurity focused advisory investment bank recently published its Cybersecurity Market Review: Year End 2016, featuring Hexadite in its Sector Watch: Security Orchestration and Automation. Noting the flurry of activity around incident response automation, Momentum partners subtitled the sector watch: “Next-Generation Incident Response Platforms Winning Accolades and Opening Checkbooks.” The report highlights some of […]

Incident Response /

With Massive Growth Ahead in 2017, Hexadite Opens 3 Key Sales Positions

Hexadite achieved 900% growth in 2016, and we’re just getting started. The momentum we’re seeing in the market for 2017 is incredible, and we’ve just opened 3 key sales roles to take advantage of the opportunity. Director of Channel Sales After announcing our strategic reseller relationship with HPE, being recognized by CRN and working with […]

Customer Case Studies /

Nuance Drives Down Business Disruption, Automating Incident Response with Hexadite AIRS

“When we first saw the technology from Hexadite, it seemed too good to be true. We tried the technology, and it all came true—it solved our problems and greatly reduced costs.” Doug Graham, CISO Nuance Communications A market leader in changing the ways people interact with technology innovates incident response to drive efficiency. Nuance Communications […]

Blog /

Cybersecurity 2017 New Year Resolution: Investigate Every Single Cyber Alert

It’s the New Year. A fresh start for many, both personally and professionally. One of the most popular resolutions people make for the New Year is to be more productive, and with productivity comes the need to prioritize. Prioritization is a necessary and useful part of life. People need to decide which things are most […]

Blog /

Hexadite Launches Automated Security Alliance Program (ASAP)

Today we’re proud to announce the Hexadite Automated Security Alliance Program (ASAP), with leading cybersecurity companies including Carbon Black, Check Point Software, CrowdStrike, Cybereason, Cylance, Exabeam, HPE, Palo Alto Networks, and Securonix as inaugural members. Customers always look for opportunities to improve the efficiency of their technology investments, and Hexadite  ASAP offers cybersecurity companies a collaboration […]

Blog /

Hexadite Expands Board of Directors with Cylance CTO Glenn Chisholm

This morning we are excited to announce that Cylance CTO Glenn Chisholm has joined the Hexadite Board of Directors. From today’s press release: Hexadite, provider of the first agentless intelligent security automation and orchestration platform, today announced that Glenn Chisholm, Chief Technology Officer at Cylance, is joining its Board of Directors. With decades of cybersecurity leadership […]

If You Could Investigate Every Security Alert, Would You?

It’s an interesting question, and at the surface a no-brainer. Let’s examine both possible answers. Of Course. Open the Floodgates First, the affirmative: if you had the capacity to investigate every alert from every detection system (SIEM, AV, Endpoint, etc.), of course you would. That’s why you have detection tools in the first place, right? […]

Blog /

People, Process, and Technology: How to Measure Incident Response Performance

Today’s organizations expend a significant amount of time and money on technologies that will help them reduce risk. Despite their efforts, measuring the efficacy of security tools and the incident response process remains a challenge. Consider these statistics from Lockheed Martin’s 2015 cybersecurity survey: 90% of companies abandon cybersecurity software soon after it’s deployed, and […]