Company profile: Resilient Networks
1.1 - Company Overview
Company description
- Provider of network-based security and authentication services via The Trust Network and Resilient Access, a contextual access control solution that integrates with existing IAM to manage access to data and resources using policy-driven workflows; supports adaptive multi-factor authentication, single sign-on, user lifecycle management, and granular security, including for Box documents.
Products and services
- Resilient Access: Architects contextual access control using policy-driven workflows to manage data and resource access, integrating with existing IAM and security platforms
- Contextual Access Control: Creates dynamic access decisions via real-time evaluation of user attributes and context, supporting adaptive multi-factor authentication and single sign-on across applications
- Adaptive Multi-Factor Authentication (MFA): Adjusts authentication requirements in real-time based on the context of each access request, enhancing security through context-aware verification
Key contacts
🔒
🔒
Financial details
🔒
1.2 - Competitors and similar companies to Resilient Networks
Mi5 Networks
HQ: United States
Website
- Description: Provider of secure web gateway appliances.
- Rationale: This competitor operates in a highly similar market segment with overlapping features.
- Company type: Private company
- Employees: ●●●●●
- Total funding raised: $●●●m
- Backers: ●●●●●●●●●●
- Acquisitions: ●●
View full Mi5 Networks company profile →
Vector0
HQ: United States
Website
- Description: Provider of an attack surface management platform that discovers and identifies assets and unifies vulnerability and security data. Offers asset discovery and scanning to uncover misconfigurations and zero-day vulnerabilities, web vulnerability scanning, continuous performance testing, vulnerability orchestration and reporting, cybersecurity asset management with proactive suggestions to mitigate risks, and cybersecurity reporting on scan coverage and trends.
- Rationale: This competitor operates in a highly similar market segment with overlapping features.
- Company type: Private company
- Employees: ●●●●●
- Total funding raised: $●●●m
- Backers: ●●●●●●●●●●
- Acquisitions: ●●
View full Vector0 company profile →
Thor Technologies
HQ: United States
Website
- Description: Provider of identity management solutions for enterprises and public sector agencies, automating the management of identities and administering lifecycles of access privileges to enterprise resources. Solutions include Xellerate Identity Manager/XellerateIM.
- Rationale: This competitor operates in a highly similar market segment with overlapping features.
- Company type: Private company
- Employees: ●●●●●
- Total funding raised: $●●●m
- Backers: ●●●●●●●●●●
- Acquisitions: ●●
View full Thor Technologies company profile →
CloudCoreo
HQ: United States
Website
- Description: Provider of a next-generation cloud management platform that defines stacks as entire deployments, including provider-managed services (network, DNS, security groups) and VMs; offers tools to create, modify, and maintain stacks, a searchable repository of stacks, and an automation engine that keeps everything correct and allows any stack to be deployed.
- Rationale: This competitor operates in a highly similar market segment with overlapping features.
- Company type: Private company
- Employees: ●●●●●
- Total funding raised: $●●●m
- Backers: ●●●●●●●●●●
- Acquisitions: ●●
View full CloudCoreo company profile →
Cipherpoint
HQ: Australia
Website
- Description: Provider of solutions that help businesses and governments identify, protect, and control access to sensitive information, restricting access to sensitive content to IT administrators. Offerings include managed security services with SOC monitoring and incident response, advisory services and cybersecurity solutions aligned to the NIST framework, cloud IT services to optimize processes, and risk management tools and practices.
- Rationale: This competitor operates in a highly similar market segment with overlapping features.
- Company type: Private company
- Employees: ●●●●●
- Total funding raised: $●●●m
- Backers: ●●●●●●●●●●
- Acquisitions: ●●
View full Cipherpoint company profile →
🔒
2.M&A buyers
2.1 Potential strategic acquirers in the sector
🔒
🔒
🔒
🔒
View all strategic buyers with complete profiles
Start Free Trial →
2.2 - Strategic buyer groups for Resilient Networks
🔒
Buyer group 1: ████████ ████████
●● companies
Description: ████████ ████████ ████████ ████████ ████████ ████████ ████████ ████████ ████████ ████████
Key Products: ████████, ████████, ████████, ████████
🔒
View all companies in this group
Request Free Trial Now →
🔒
Buyer group 2: ████████ ████████
●● companies
Description: ████████ ████████ ████████ ████████ ████████ ████████ ████████ ████████ ████████ ████████
Key Products: ████████, ████████, ████████, ████████
🔒
View all companies in this group
Request Free Trial Now →
🔒
Buyer group 3: ████████ ████████
●● companies
Description: ████████ ████████ ████████ ████████ ████████ ████████ ████████ ████████ ████████ ████████
Key Products: ████████, ████████, ████████, ████████
🔒
View all companies in this group
Request Free Trial Now →
🔓 Unlock all detailed buyer group breakdowns with complete company profiles
Start Free Trial →
3. Investors and private equity firms
3.1 - Buyout funds investing in similar companies to Resilient Networks
2.2 - Growth funds investing in similar companies to Resilient Networks
🔒
View all growth equity funds with complete profiles
Start Free Trial →
4 - Top valuation comps for Resilient Networks
4.2 - Public trading comparable groups for Resilient Networks
🔓 Unlock all public trading comparable groups with complete valuation data
Start Free Trial →